4565 patents
Page 48 of 229
Utility
Artificial intelligence techniques for prediction of data protection operation duration
1 Nov 22
Techniques are provided for predicting a time to complete a data protection operation.
Tiago Salviano Calmon, Eduardo Vera Sousa, Hugo de Oliveira Barbalho
Filed: 13 Apr 20
Utility
Ground distance determination using zone-based location data
1 Nov 22
Techniques are provided for ground distance calculations using sanitized location data.
Alex Zaslavsky, Guoying Luo, Salah E. Machani
Filed: 30 Oct 19
Utility
Automatically replicating configuration parameters from securely identified connected systems
1 Nov 22
Methods, apparatus, and processor-readable storage media for automatically replicating configuration parameters from securely identified connected systems are provided herein.
Maunish A. Shah, Anurag Sharma, Gavin D. Scott
Filed: 23 Mar 21
Utility
Automated key management for remote devices using single sign-on techniques
1 Nov 22
Techniques are provided for automated key management for accessing remote devices using single sign-on techniques.
Alex John Robbins, Seth Jacob Rothschild
Filed: 29 May 20
Utility
Method and system for backing up and restoring data
1 Nov 22
A method and system for backing up and restoring data includes: determining, at a server storage area network (SAN) node, an LUN required for protection within a server SAN node based on communication between a backup agent and a logic unit number (LUN) agent in the server SAN node; determining a target backup device based on communication between the backup agent and respective target agent of a plurality of backup devices, the plurality of backup devices being connected with the server SAN node; and transmitting a virtual disk control command to the target backup device in response to the backup or restoration being triggered, such that data in the LUN required for protection is backed up to the target backup device or restored from the target backup device via an activated virtual disk interface of the target backup device.
Ried Ruifang Liu, Colin Yong Zou, Man Lv, Tao Xu
Filed: 4 May 21
Utility
High-density cable management bar
25 Oct 22
Example high-density cable management bars are provided.
Ilhan C. Gundogan, Keith C. Johnson
Filed: 26 Jul 19
Utility
Method, electronic device and computer program product for processing operation commands
25 Oct 22
Techniques involve determining a target identifier of an operation command if a type of the operation command is determined to be a target type, the target type indicating that the operation command is a command for acquiring data.
Zhibin Zhang, Yalan Kuang
Filed: 22 Sep 20
Utility
Techniques for estimating deduplication between storage volumes
25 Oct 22
Determining and using deduplication estimates may include: determining two deduplication sample indexes (DSIs) for two logical device sets each including one or more logical devices, determining a Jaccard Similarity for the two DSIs, wherein the Jaccard Similarity denotes a measurement of similarity and mutual deduplication between the two logical device sets; determining, in accordance with one or more criteria, whether the two logical device sets should be located in different data storage systems or a same data storage system that performs data deduplication, wherein the one or more criteria uses the Jaccard Similarity in determining whether to locate the two logical device sets in the same data storage system or the different data storage systems; and responsive to determining that the two logical device sets should be located in the same data storage system, locating the two logical device sets in the same data storage system.
Shaul Dar, Uri Shabi, Ronen Gazit
Filed: 3 Dec 20
Utility
Creating indentical snapshots
25 Oct 22
Snapshots are created on replicated storage systems R1 and R2 in a manner resulting in identical snapshots being generated on R1 and R2.
Michael Barber, Yaron Dar, Michael E. Specht, Arieh Don
Filed: 30 Sep 20
Utility
Buffer allocation techniques
25 Oct 22
Techniques for transmitting data may include: statically allocating a first buffer by a first entity; determining, by the second code entity, whether first data to be returned to the first entity fits into a data area of the first buffer; storing the first data in the data area of the first buffer responsive to determining the first data fits into the data area of the first buffer; and responsive to determining the first data does not fit into the data area of the first buffer, performing first processing by the second entity to store the first data in a dynamically allocated second buffer having a descriptor stored in the first buffer.
Igor Fradkin, Scott Rowlands, Arieh Don
Filed: 17 Jun 21
Utility
Managing reconstruction of a malfunctioning disk slice
25 Oct 22
Techniques involve: determining, according to a determination that a performance level of a target storage unit is lower than a threshold level, whether idle disk slices that can be used for reconstructing malfunctioning disk slices in the target storage unit exist in a slice pool; determining a priority of the target storage unit according to a determination that the idle disk slices do not exist; and selecting replacing disk slices for reconstructing the malfunctioning disk slices from available storage units based at least in part on the priority, wherein the available storage units have performance levels not lower than the threshold level.
Baote Zhuo, Chun Ma, Hongpo Gao, Jibing Dong, Jianbin Kang, Jian Gao
Filed: 15 Sep 20
Utility
Backup agent scaling with evaluation of prior backup jobs
25 Oct 22
A number of backup agents to be deployed to a system can be predicted by training one or more machine learning (ML) objects of a first prediction algorithm and training one or more ML objects of a second prediction algorithm.
Wei Wang, Mark Malamut
Filed: 13 Feb 20
Utility
System and method for recovering an operating system after a runtime hang using a dual-flash device
25 Oct 22
One embodiment provides a computer implemented method for recovering an operating system (OS) after a runtime hang using a dual-flash device.
Xinghai Yu, Colin Zou
Filed: 19 May 20
Utility
Storage based file FTP
25 Oct 22
Transferring files directly from a storage system to a backup storage system includes determining identifiers for blocks on the storage system that correspond to files that are to be backed up, providing the identifiers for the blocks to the storage system, and the storage system pushing the blocks indicated by the identifiers directly from the storage system to the backup storage system.
Arieh Don, Stephen D. Smaldone, Vinay G. Rao, Sanjib Mallick
Filed: 19 Feb 20
Utility
Alternative storage node communication channel using storage devices group in a distributed storage system
25 Oct 22
An apparatus comprises at least one processing device that includes a processor coupled to a memory.
Lior Kamran, Vladimir Shveidel
Filed: 12 Jan 21
Utility
Automation framework for monitoring and reporting on resource consumption and performance bottlenecks
25 Oct 22
Techniques for testing may include: receiving a first command at a framework, wherein the first command includes first information identifying a first test to be executed and a first collector that collects data during execution of the first test; and responsive to receiving the first command, perform processing to execute the first command, wherein the processing is coordinated by the framework and wherein the processing includes: executing the first test; collecting test data, wherein the test data is collected by the first collector during execution of the first test; and generating a report regarding the test data collected while executing the first test.
Brian R. Tetreault, William James Sullivan, Ginamarie E. Spiridigliozzi
Filed: 15 Oct 20
Utility
Techniques for providing client interfaces
25 Oct 22
Techniques for providing client interfaces may include: configuring a plurality of file server applications, wherein each of the plurality of file server applications is associated with a different one of a plurality of virtual network devices, wherein each of the plurality of virtual network devices is bound to a different one of a plurality of unique MAC (media access control) addresses; binding the plurality of virtual network devices to a second network device; and exposing the plurality of virtual network devices directly on a network using the plurality of unique MAC addresses, wherein each of the plurality of virtual network devices exposes an associated one of the plurality of file server applications directly on the network to one or more clients.
Maneesh Singhal, Adarsh Pradhan Jmt, Jharanabala Nayak
Filed: 21 Jul 20
Utility
Distributed ledger for peer-to-peer cloud data asset valuation
25 Oct 22
An apparatus comprises at least one processing device having a processor coupled to a memory.
Stephen Todd, Robert A. Lincourt, Jr., Misha Nossik, Lejin Du
Filed: 25 Apr 17
Utility
Storage system configuration change tracking for root cause/troubleshooting
18 Oct 22
Architectures and techniques are described that can monitor or track change to storage system configuration.
Deepak Nagarajegowda, Bina Thakkar
Filed: 22 Oct 20
Utility
Method, device, and computer program product for creating stripe in storage system
18 Oct 22
A method, a device, and a computer program product for creating a stripe in a storage system.
Michael Chen, Huijuan Fan
Filed: 29 Sep 20