4565 patents
Page 43 of 229
Utility
Asymmetric fulfillment of remote procedure calls by multi-core systems
22 Nov 22
A method of performing a remotely-initiated procedure on a computing device is provided.
Leonid Ravich, Yuri Chernyavsky
Filed: 21 Jan 21
Utility
Method, electronic device and computer program product for storage management
22 Nov 22
Techniques involve: writing, when a first disk for dirty page storage has a failure, a first target page description generated by a first node and associated with a first set of target dirty pages of the first node and a second set of target dirty pages of a second node to a first page description storage layer for the first node in a second disk; writing a second target page description generated by the second node and associated with the first set of target dirty pages and the second set of target dirty pages to a second page description storage layer for the second node in the second disk; and restoring, when the failure has been eliminated, the first set of target dirty pages and the second set of target dirty pages in the first disk based on at least one of the descriptions.
Yousheng Liu, Xinlei Xu, Jibing Dong, Xiongcheng Li
Filed: 19 Nov 21
Utility
System and method for bug deduplication using classification models
22 Nov 22
A method for managing bugs includes obtaining, by a bug deduplication system, a set of bugs, performing an encoding on each section of a first bug of the set of bugs to obtain encoded sections, wherein the encoded sections comprise a first encoded section and a second encoded section, applying a first classification model to the first encoded section to obtain a first section score, applying a second classification model to the second encoded section to obtain a second section score, generating a confidence score based on the first encoded section and the second section, and providing the confidence score to a client, wherein the client initiates a corrective action for the first bug based on the confidence score.
Jayanth Kumar Reddy Perneti, Vindhya Gangaraju
Filed: 19 Mar 21
Utility
Storage management method, device, and computer program product
22 Nov 22
A storage management technique involves: selecting a first disk from a plurality of disks in a storage system as an anchor disk; allocating a first backup slice from the plurality of disks to a redundant array of independent disks (RAID) associated with the first disk, the first RAID including at least a slice allocated from the first disk; and if it is detected that there is an inaccessible disk in the plurality of disks, determining a backup slice for a slice of the inaccessible disk based on the allocation of the first backup slice to the first RAID, for use in data reconstruction of the inaccessible disk.
Baote Zhuo, Jianbin Kang, Geng Han, Jian Gao
Filed: 7 May 21
Utility
Method, apparatus, and computer readable medium for I/O control
22 Nov 22
Techniques providing I/O control involve: in response to receiving an I/O request, detecting a first set bits for a stripe in a RAID.
Geng Han, Jianbin Kang, Jibing Dong
Filed: 30 Sep 19
Utility
Method and system for asset protection threat detection and mitigation using interactive graphics
22 Nov 22
A method and system for asset protection threat detection and mitigation using interactive graphics.
Amarendra Behera, Shelesh Chopra, Tushar B. Dethe, Gururaj Soma, Himanshu Arora, Deependra Pratap Singh
Filed: 4 Nov 19
Utility
Method and system for risk score based asset data protection using a conformal framework
22 Nov 22
A method and system for risk score based asset data protection using a conformal framework.
Shelesh Chopra, Mahantesh M. Ambaljeri, Rahul Deo Vishwakarma, Parmeshwr Prasad
Filed: 22 Dec 20
Utility
Method, apparatus and computer program product for managing backup system
22 Nov 22
Embodiments of the present disclosure provide a method, device, and computer program product for managing a backup system.
Qin Liu, Yi Jiang, Jianxu Xu
Filed: 31 Mar 20
Utility
Methods, devices and computer program products for data backup and restoration
22 Nov 22
Embodiments of the present disclosure provide methods, devices, and computer program products for data backup and restoration.
Zhibin Zhang
Filed: 31 Aug 19
Utility
System and method for efficient backup generation
22 Nov 22
A backup manager for providing backup services includes persistent storage and a backup orchestrator.
Sunil Yadav, Shelesh Chopra, Aaditya Rakesh Bansal, Manish Sharma
Filed: 30 Oct 19
Utility
System and method for a backup and recovery of application using containerized backups comprising application data and application dependency information
22 Nov 22
A method for performing a backup operation includes obtaining, by a backup agent, a backup request for a file system, and in response to the backup request: generating a first application partition for an application associated with the file system, performing a dependency analysis on the application to identify application dependency information, populating a first application partition with a copy of the application dependency information and a copy of application data associated with the application, and initiating a storage of a backup to a backup storage system, wherein the backup comprises the first application partition.
Manish Sharma, Aaditya Bansal, Shelesh Chopra, Sunil Yadav
Filed: 28 May 20
Utility
Recovering consistency of a raid (redundant array of independent disks) metadata database
22 Nov 22
Technology is disclosed for recovering the consistency of a RAID (Redundant Array of Independent Disks) metadata database when data corruption is detected in the RAID metadata database.
Charles Ma, Shaoqin Gong, Geng Han, Vamsi K. Vankamamidi, Shuyu Lee, Ping Ge, Jian Gao
Filed: 20 Jan 21
Utility
Method, electronic device and computer program product for storing data
22 Nov 22
Techniques for storing data involve estimating a hit ratio of a digest cache associated with a target storage device, the digest cache recording a digest of data that is stored in the target storage device after preprocessing; generating, according to a determination that the hit ratio is lower than a predetermined threshold, a digest for target data to be stored and performing the preprocessing; and storing, according to a determination that the digest of the target data is missing in the digest cache, the preprocessed target data in the target storage device, and recording the digest of the target data in the digest cache.
Leihu Zhang, Chen Gong, Shuo Lv
Filed: 24 Jul 20
Utility
Fault tolerant cluster data handling
22 Nov 22
The described technology is generally directed towards fault tolerant cluster data handling techniques, as well as devices and computer readable media configured to perform the disclosed fault tolerant cluster data handling techniques.
Ben Ellerby, Austin Voecks, Evgeny Popovich
Filed: 8 Dec 20
Utility
Method, apparatus and computer storage medium for file storage
22 Nov 22
Techniques perform file storage.
Donglei Wang, Zhiqiang Li, Lei Gao, Weibing Zhang
Filed: 18 Dec 18
Utility
Decentralized file system and message bus architecture for processing training sets in multi-cloud computing environment
22 Nov 22
In a multi-cloud computing environment comprising a plurality of cloud platforms, wherein one cloud platform is a source of a model and a data set and further wherein the model is to be executed against the data set on one or more of the other cloud platforms, the method maintains a decentralized architecture comprising a file system and a message bus, wherein the file system comprises a plurality of decentralized file system nodes corresponding to the plurality of cloud platforms, and the message bus comprises a plurality of decentralized message bus nodes corresponding to the plurality of cloud platforms.
Stephen J. Todd, Kun Wang, Layne Lin Peng, Pengfei Wu
Filed: 15 Feb 18
Utility
System and method for mirroring a file system journal
22 Nov 22
Systems and methods for mirroring a file system journal are described herein.
Suraj Raju, Max Laier, Ron Steinke
Filed: 30 Jul 20
Utility
Eventual consistency in a deduplicated cloud storage system
22 Nov 22
One example method includes receiving a write request that includes a data structure version to be written, wherein the data structure version is associated with a unique identifier, storing the data structure version in association with the unique identifier, receiving a read request for a most recent version of the data structure and, when the stored data structure version is not the most recent version of the data structure, examining respective unique identifiers of each of a group of other stored data structure versions to determine which stored data structure version is the most recent.
Philip Shilane, Venkata Ravi Chandra Bandlamudi, Atul A. Karmarkar
Filed: 1 Feb 21
Utility
Methods, systems, and computer readable mediums for command engine execution
22 Nov 22
Methods, systems, and computer readable mediums for command engine execution are disclosed.
Geoffrey David Bourne, Jeffery Jon Hayward, Jonathan Peter Streete
Filed: 29 Jan 20
Utility
Agent-less replication management
22 Nov 22
Systems and methods for performing data protection operations including replication management or data copy operations.
Sunil Kumar, Vinay Rao, Boaz Michaely, Arieh Don
Filed: 17 Jul 17