4565 patents
Page 51 of 229
Utility
Reducing failover time between data nodes
11 Oct 22
A storage node that maintains a replica of a logical volume for use in response to a failover trigger includes a data node with volatile memory in which a filesystem and its metadata and a VDM and its metadata associated with the replica are maintained prior to the failover trigger.
Amit Dharmadhikari, Adnan Sahin, Ajay Potnis
Filed: 5 Sep 19
Utility
Method, apparatus, and compute program product for determining consistence level of snapshots of virtual machines
11 Oct 22
Embodiments of the present disclosure relate to a method, device and computer program product for determining a consistency level of a virtual machine snapshot.
Jingjing Guo, Lei Wang, Jing Yu, Xiaoliang Zhu
Filed: 18 Jan 19
Utility
Maintaining consistency of asynchronous replication
11 Oct 22
Maintaining consistency for asynchronous replication of LUNs of a local storage system to corresponding LUNs of a remote storage system includes copying application data written to LUNs to cache slots, copying metadata of LUNs to cache slots, associating a first sequence number to all metadata modifications and all application data writes that are begun after a first time and before a second time, associating a second sequence number, different from the first sequence number, to all metadata modifications and all application data writes that are begun after the second time, and, after completion of all metadata modifications and all application data writes associated with the first sequence number, initiating transfer to the remote storage system of all metadata modifications and all application data writes associated with the first sequence number.
Bhaskar Bora, Mark J. Halstead, Michael E. Specht, Benjamin Yoder, Deepak Vokaliga
Filed: 17 Sep 20
Utility
Leveraging sensor data valuation
11 Oct 22
Data valuation leveraging techniques in a sensor data environment are provided.
Stephen J. Todd
Filed: 18 Oct 18
Utility
Data at rest encryption (DARE) using credential vault
11 Oct 22
A subset of data encryption keys are stored in plain text form in system memory of an information handling system.
Senthil Ponnuswamy, Elie Jreij, Marcelo Vinante, Anurag Sharma
Filed: 20 Aug 20
Utility
Analysis of smart meter data based on frequency content
4 Oct 22
Analysis of smart meter and/or similar data based on frequency content is disclosed.
Kaushik K. Das, Rashmi Raghu
Filed: 11 May 20
Utility
Creating and managing dynamic workflows based on occupancy
4 Oct 22
Techniques described herein relate to a method for deploying workflows.
John S. Harwood, Robert Anthony Lincourt, Jr., William Jeffery White
Filed: 21 Apr 21
Utility
Digital twin architecture for internet-connected device computing environment
4 Oct 22
Techniques are disclosed for generating a virtual representation (e.g., one or more digital twin models) of an internet-connected device computing environment, and managing the internet-connected device computing environment via the virtual representation.
Danqing Sha, Zhen Jia, Jinpeng Liu, Kenneth Durazzo
Filed: 27 Aug 21
Utility
Protecting against and learning attack vectors on web artifacts
4 Oct 22
A server includes a service processor hosted by a baseboard management controller (BMC) and independent of a CPU of the server.
Mainak Roy, Chitrak Gupta
Filed: 1 Feb 21
Utility
Method, device, and computer program product for managing a mobile terminal
4 Oct 22
A method, a device, and a computer program product for managing a mobile terminal are provided.
Bin He, Pengfei Wu, Zhenzhen Lin, Si Chen, Ruixue Zhang
Filed: 22 Jun 20
Utility
Method, device, and computer program product for determining failures and causes of storage devices in a storage system
4 Oct 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for managing a storage system.
Lingdong Weng, Bing Liu
Filed: 15 Jan 21
Utility
Non-disruptive data migration from a source storage array to a destination storage array
4 Oct 22
Data access techniques involve: determining whether there is a copy operation that is being performed from a first LU to a second LU in response to receiving a write operation request for a first data block in the first logic unit (LU); detecting a copy status of data in the first data block in response to determining that there is the copy operation that is being performed; and determining a processing strategy of the write operation request during execution of the copy operation based on the copy status.
Changyu Feng, Yousheng Liu, Haiying Tang, Xiaobo Zhang, Sihang Xia
Filed: 4 Oct 19
Utility
Modifying function pointers to back up application data
4 Oct 22
Techniques to back up data are disclosed.
Sunil Yadav, Matthew Buchman, Vladimir Mandic
Filed: 30 Sep 15
Utility
Direct snapshot to external storage
4 Oct 22
Directly writing snapshot data for a volume on a storage system to an external storage includes receiving a write of new data to a portion of the storage system, forming encapsulated data by encapsulating either the new data or data at the portion of the storage system in a format that is native to the storage system, and directly writing the encapsulated data to the external storage.
Brett A. Quinn, Paul A. Linstead, Douglas E. LeCrone
Filed: 29 Sep 20
Utility
Flexible expansion of data storage capacity
4 Oct 22
Flexibly expanding the storage capacity of a data storage system by adding a single physical storage device or any number of disk drives to an existing storage system without the need to reconfigure existing erasure encoding groups of the system.
Jun Li, James M. Guyer, Stephen R. Ives
Filed: 31 Jan 18
Utility
Non-disruptive update of host multipath device dependency
4 Oct 22
A host device is configured to communicate with a storage system comprising a root logical volume.
Gopinath Marappan, Madhu Tarikere, Ajaykumar Rajappa
Filed: 21 Jan 20
Utility
Techniques for storage management
4 Oct 22
Techniques for storage management may include: adding first storage devices to a pool, wherein prior to adding the first storage devices to the pool, the pool includes second storage devices with existing physical storage units (PUs) distributed across the second storage devices; and in response to adding the first storage devices to the pool, performing processing to evenly distribute the existing PUs among the pool of storage devices, said processing including: defining logical pairs of storage devices in accordance with rules; binding each of the logical pairs to a resiliency set; determining that a first PU of the existing PUs includes disk slices that span across more than a single resiliency set; andin response to determining that the first PU includes disk slices that span across more than a single resiliency set, performing second processing to restripe the first PU in accordance with a target layout.
Geng Han, Ronald D. Proulx, Shaoqin Gong, Baote Zhuo, Xiaobo Zhang
Filed: 18 Mar 21
Utility
Concurrent tape access
4 Oct 22
Providing concurrent access to a tape volume of a tape emulation unit includes a first process generating a first attachment request to attach to the tape emulation unit, generating a first unique id corresponding to the first attachment request, a second process generating a second attachment request, different from the first attachment request, to attach to the tape emulation unit, generating a second unique id corresponding to the second attachment request, and allowing the first process to access a tape volume on the tape emulation unit using the first unique id while the second process concurrently accesses the tape volume on the tape emulation unit using the second unique id.
Douglas E. LeCrone, Paul A. Linstead, Larry W. McLoskey
Filed: 23 Apr 19
Utility
Optimizing docker image encryption—kubernetes using shamir secrets to enforce multiple constraints in container runtime environment
4 Oct 22
One example method includes using a primary key to encrypt a decryption key, splitting the primary key into ‘n’ parts, where at least ‘k’ parts of the ‘n’ parts are required to restore the primary key, and ‘k’≤‘n’, storing some of the ‘k’ parts in respective locations in a production environment, and one of the stored ‘k’ parts is held by a verifier stage, receiving, at the verifier stage, a request for restoration of the primary key, where the request is received from a deployment pod and the request includes a subset of the ‘k’ parts and the encrypted decryption key, performing, by the verifier stage, a validation process concerning the deployment pod, and restoring, by the verifier stage, the primary key, wherein the primary key is restored using the ‘k’ part held by the verifier stage.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Naor Radami
Filed: 5 Mar 21
Utility
Method for managing backup jobs, electronic device and computer program product
4 Oct 22
Embodiments of the present disclosure relate to a method for managing backup jobs, an electronic device, and a computer program product.
Min Liu, Ming Zhang, Ren Wang, Xiaoliang Zhu, Jing Yu
Filed: 31 May 20