4565 patents
Page 49 of 229
Utility
Public cloud provider cost optimization for writing data blocks directly to object storage
18 Oct 22
Embodiments for optimizing a cost of storing backup data in an object store of a public cloud network provided by a cloud provider by storing delta objects each embodying changes to blocks of the backup data between a full backup incremental backups.
Lev Ayzenberg, Mark Malamut, Maxim Drobachevsky, Sharon Vitek, Jehuda Shemer, Adam Brenner, Arun Murti
Filed: 5 Mar 21
Utility
Tracking data mirror differences
18 Oct 22
Methods, apparatus, and processor-readable storage media for tracking data mirror differences are provided herein.
Brian Lake, Victor Salamon
Filed: 4 May 21
Utility
Method, device, and computer program product for managing memories
18 Oct 22
Techniques for managing memory involve: determining a set of weights corresponding to a plurality of command queues in the memory, each weight indicating the number of commands allowed to be transmitted in a corresponding command queue; detecting whether a transmission delay occurs in the plurality of command queues; and adjusting the set of weights based on a result of the detection.
Chi Chen, Hailan Dong
Filed: 11 Sep 20
Utility
Configuring host access for virtual volumes
18 Oct 22
Discovery service contact information is provided from a data storage system to administration logic of a virtualization environment, and distributed within the virtualization environment to hypervisor hosts, enabling the hypervisor hosts to discover logical ports within the data storage system, and then establish logical communication paths between the hypervisor hosts and the ports.
David L. Black, Dmitry Nikolayevich Tylik, Alexey Vladimirovich Shusharin, Marina Shem Tov, Mukesh Gupta
Filed: 21 Jan 21
Utility
Method and system for dynamic upgrade predictions for a multi-component product
18 Oct 22
Techniques are disclosed for generating a dynamic upgrade prediction.
Lihui Su, Scott Zhang, Zak Liang, James Morton, Roger Hongyi Che
Filed: 30 Dec 19
Utility
Provenance-based reuse of software code
18 Oct 22
Techniques are provided for provenance-based software script reuse.
Vitor Sousa, Jonas F. Dias, Adriana Bechara Prado
Filed: 2 May 19
Utility
Method and system for efficient virtual machine operation while recovering data
18 Oct 22
A method and system for efficient virtual machine operation while recovering data.
Jing Yu, Ming Zhang, Ren Wang, Weiyang Liu, Scott Randolph Quesnelle, Mengze Liao
Filed: 28 Feb 20
Utility
Software-defined suspected storage drive failure identification
18 Oct 22
Methods, apparatus, and processor-readable storage media for software-defined suspected storage drive failure identification are provided herein.
Anurag Sharma, Brian P. Korinek
Filed: 23 Oct 20
Utility
Reliable RAID system with embedded spare capacity and flexible growth
18 Oct 22
A subset of drives with protection groups that have D data members and P parity members is created with (D+P+1) drives each having (D+P) partitions.
Kuolin Hua
Filed: 2 Sep 20
Utility
Method and system for performing data protection services for user data associated with calendar groups
18 Oct 22
A system for providing data protection services for user data associated with calendar groups generated by an application includes persistent storage for storing user data backups and a manager.
Anjana Rao, Tushar Dethe, Sapna Chauhan, Jigar Premjibhai Bhanushali, Sunil Yadav, Amarendra Behera, Shelesh Chopra, Himanshu Arora, Vipin Kumar Kaushal, Deependra Pratap Singh
Filed: 5 Mar 21
Utility
Method, device and computer program product to backup data
18 Oct 22
Techniques for backing up data involve receiving, by a proxy server and from an application, a backup request comprising a backup path.
Xin Zhong, Qinghua Ling, Yan Shao, Jianbao Li
Filed: 20 May 20
Utility
Restoration of snapshots from cloud using differential snapshot mechanism
18 Oct 22
A method comprises receiving a request to restore a given snapshot of a plurality of snapshots from a cloud storage platform to a storage array.
Anurag Bhatnagar, Sarat Kumar Behera
Filed: 19 Oct 20
Utility
Method for managing multiple disks, electronic device and computer program product
18 Oct 22
Techniques involve: detecting whether a first set of disks include an inaccessible disk, respective disk sections in the first set of disks forming a first set of stripes; in response to detecting the first set of disks including the inaccessible disk, determining faulty stripes in the first set of stripes, the faulty stripes including a first number of inaccessible disk sections; and in response to the first number exceeding a second number of free sections of the first set of disks, moving data in at least one stripe in the first set of stripes to free sections of the second set of disks to release sections of the at least one stripe, respective disk sections in the second set of disks forming a second set of stripes, each stripe in the first set of stripes and the second set of stripes having the same number of sections.
Jian Gao, Hongpo Gao, Lei Sun
Filed: 3 Oct 19
Utility
Data storage system with multiple-size object allocator for disk cache
18 Oct 22
Managing pool memory in a data storage system includes maintaining free lists for corresponding object sizes.
Vladimir Shveidel, Geng Han, Haiyun Bao, Shaoqin Gong
Filed: 18 Jan 21
Utility
System and method for management of data from deployments
18 Oct 22
A global data aggregator for managing deployments includes persistent storage and a global data manager.
Stephen James Todd
Filed: 2 Aug 19
Utility
Distribution-based aggregation of scores across multiple events
18 Oct 22
Techniques are provided for distribution-based aggregation of scores across multiple events.
Naveen Sunkavally, Leandro E. Diato
Filed: 1 May 19
Utility
System and method for efficient user-level based deletions of backup data
18 Oct 22
A backup storage for providing backup services includes storage and a compliance manager.
Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal
Filed: 30 Oct 19
Utility
Data masking in a microservice architecture
18 Oct 22
A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object.
Kimberly R. Lu, Joseph S. Brandt, Philip N. Shilane
Filed: 20 May 20
Utility
Authentication using pairwise secrets constructed from partial secrets
18 Oct 22
Techniques are provided for authentication using pairwise secrets constructed from partial secrets.
Shoham Levy, Yoav Nir
Filed: 17 Aug 20
Utility
Platform to deliver artificial intelligence-enabled enterprise class process execution
18 Oct 22
An apparatus in one embodiment comprises a processing platform that includes a plurality of processing devices each comprising a processor coupled to a memory.
Maik A. Lindner, Sean C. O'Brien, Eloy F. Macha
Filed: 31 Oct 17