4565 patents
Page 47 of 229
Utility
Method, device, and computer-readable storage medium for bitmap conversion
8 Nov 22
Techniques convert a first bitmap into a second bitmap.
Yuan Gu, Xin Zhong, Qinghua Ling, Yue Yang, Yan Shao, Lei Han, Jianbao Li
Filed: 21 May 20
Utility
Lock contention resolution for active-active replication performed in conjunction with journal recovery
8 Nov 22
An apparatus in one embodiment includes at least one processing device comprising a processor coupled to a memory, with the at least one processing device being configured to maintain a replication journal for recording replication write requests in a storage system, to detect a failure impacting the replication journal, and to initiate recovery of the replication journal responsive to the detected failure.
Xiangping Chen, David Meiri
Filed: 21 Dec 20
Utility
Secrets as a service
8 Nov 22
Systems and methods for securing objects in a computing environment.
Ray David Whitmer
Filed: 8 May 20
Utility
Direct response to IO request in storage system with remote replication
1 Nov 22
An apparatus comprising a processing device is configured to communicate with a storage node of a storage system via at least one network and to communicate with a compute node that implements at least a portion of an application via the at least one network.
Dan Aharoni, Itay Keller
Filed: 8 Oct 20
Utility
Load balancing in a storage system
1 Nov 22
Techniques are used for balancing load on a storage system according to multiple variables.
Shaul Dar, Avitan Gefen, Amihai Savir
Filed: 29 Apr 21
Utility
Deferred reclamation of invalidated entries associated with replication in a log-structured array
1 Nov 22
In some embodiments, a storage system comprises at least one processor coupled to memory.
Itay Keller, Dan Aharoni
Filed: 16 Dec 20
Utility
Adaptive replication modes in a storage system
1 Nov 22
In one aspect, adaptive replication modes in a storage system are provided.
Xiangping Chen, Ying Hu
Filed: 6 May 21
Utility
Managing system upgrades in a network computing environment
1 Nov 22
Techniques are provided for managing system upgrades in a network computing environment.
Roman Spiegelman, Rivka Matosevich
Filed: 22 Jul 21
Utility
Efficient creation of endpoints for accessing services directly within a cloud-based system
1 Nov 22
Described is a system (and method) that provides the ability to create an endpoint to allow cloud-based components to access services directly using network infrastructure of a cloud system.
Boris Shpilyuck, Yossi Matatov
Filed: 15 Oct 19
Utility
Self-adaptive batch dataset partitioning for distributed deep learning using hybrid set of accelerators
1 Nov 22
Systems and methods are provided for implementing a self-adaptive batch dataset partitioning control process which is utilized in conjunction with a distributed deep learning model training process to optimize load balancing among a set of accelerator resources.
Wei Cui, Sanping Li, Kun Wang
Filed: 17 Sep 18
Utility
Dynamic application migration across storage platforms
1 Nov 22
Embodiments of the present disclosure relate to load balancing application processing between storage platforms.
Owen Martin, Michael E. Specht, Benjamin A. Randolph
Filed: 22 Jan 20
Utility
Automated alert augmentation for deployments of software-defined storage
1 Nov 22
Methods, apparatus, and processor-readable storage media for automated alert augmentation for deployments of software-defined storage are provided herein.
Sean R. Gallacher, Trevor H. Dawe, Eric Young, Ian D. Bibby
Filed: 29 May 20
Utility
Method, device and computer program product for managing data backup
1 Nov 22
A method, a device and a computer program product for managing data backup are provided.
Adona Li Sun, Qingxiao Zheng, Sager Liao, Jing Wang, Beryl Xueqing Wang, Bing Bai
Filed: 2 Apr 20
Utility
Global inline name space verification for distributed file systems
1 Nov 22
Embodiments for providing global inline name space verification for a distributed file system in a network of a metadata server coupled to a plurality of data servers by taking a global dataless snapshot of a namespace of the distributed file system; walking all of the files in the namespace for each data server and the metadata server to generate parsed information; combining, by an XOR operation, the parsed information into data blocks for each server; obtaining a checksum of each data block of the data blocks; comparing actual and expected checksums from the metadata server and all of the data servers; and generating an alert if a comparison of any actual and expected checksums do not match.
Charles I Hickey, Murthy V Mamidi, Neerajkumar N Chourasia
Filed: 19 Jul 19
Utility
Micro services recommendation system for identifying code areas at risk
1 Nov 22
Identifying risky code in microservices is described.
Avitan Gefen, Roi Gamliel, Amihai Savir
Filed: 25 Nov 19
Utility
Performing data reduction during host data ingest
1 Nov 22
A technique performs data reduction on host data of a write request during ingest under certain circumstances.
Vamsi K. Vankamamidi, Ronen Gazit
Filed: 21 Apr 21
Utility
Method, a device, and a computer program product for adjusting a storage space
1 Nov 22
Techniques for adjusting storage space involve: receiving a request for adjusting available storage space of a user in a filesystem from a first size to a second size; determining whether to allow to adjust the available storage space based on the request; and in response to allowing to adjust the available storage space, adjusting the available storage space to the second size.
Jiang Tan, Hao Wang, Chaojun Zhao, Hongyuan Zeng, Yang Zhang
Filed: 26 May 20
Utility
Basic input/output system protection using multi-factor authentication based on digital identity values
1 Nov 22
Techniques are provided for basic input/output system (BIOS) protection using multi-factor authentication (MFA) based on digital identity values.
Tomer Shachar, Yevgeni Gehtman, Maxim Balin, Or Herman Saffar
Filed: 18 Jan 21
Utility
Risk score generation utilizing monitored behavior and predicted impact of compromise
1 Nov 22
A method includes monitoring user behavior in an enterprise system, identifying a given user of the enterprise system associated with a given portion of the monitored user behavior, determining a predicted impact of compromise of the given user on the enterprise system, generating a risk score for the given user based on the predicted impact of compromise and the given portion of the monitored user behavior, and identifying one or more remedial actions to reduce the risk score for the given user.
Zulfikar A. Ramzan, Sashka T. Davis, Kevin J. Arunski, Ed G. Quackenbush, Scott Moore, Kevin T. Douglas, Abram Thielke
Filed: 22 Jan 19
Utility
Client-side encryption and processing of telemetry data
1 Nov 22
Techniques are provided for client-side encryption and/or processing of telemetry data.
Naveen Sunkavally, Sashka T. Davis
Filed: 27 Dec 19