4565 patents
Page 53 of 229
Utility
Detecting and mitigating malicious software code embedded in image files using machine learning techniques
4 Oct 22
Techniques are provided for detecting malicious software code embedded in image files, using machine learning.
Or Herman Saffar, Amihai Savir, Yevgeni Gehtman
Filed: 1 May 19
Utility
Machine learning-based recommendation engine for storage system usage within an enterprise
4 Oct 22
Methods, apparatus, and processor-readable storage media for implementing a machine learning-based recommendation engine for storage system usage within an enterprise are provided herein.
Bina K. Thakkar, Roopa A. Luktuke, Chao Su, Aditya Krishnan, Deepak Gowda
Filed: 31 Jul 19
Utility
Message management using machine learning techniques
4 Oct 22
Methods, apparatus, and processor-readable storage media for implementing a message management framework using machine learning techniques are provided herein.
Sivaraman Damodaran, Mahesh Reddy Nagaiah Reddy, Vijayasri Chikmagalur Shivakumar, Narendra Buwade, Bijan K. Mohanty, Hung T. Dinh, Navin Kumar Neithalath, Girish VenkateshaMurthy, Rohit Das, Sristirupa Tripathy
Filed: 27 Mar 20
Utility
Managing I/O connectivity issues
27 Sep 22
Information pertinent to a connectivity issue reported by a switch may be determined, compiled and reported; and action may be taken autonomously to address the connectivity issue based on the information.
Alan Rajapa, Scott Rowlands, Erik P. Smith, Igor Fradkin, Arieh Don
Filed: 30 Sep 20
Utility
Identifying and recovering unused storage resources on a storage system
27 Sep 22
A storage reclamation orchestrator is implemented to identify and recover unused storage resources on a storage system.
Finbarr O'Riordan, Tim O'Connor, Warren Fleury
Filed: 23 Jun 21
Utility
Consolidation and migration of cloud data
27 Sep 22
A method of migrating or consolidating cloud data includes generating a container on a cloud platform and receiving, at the container, source metadata identifying a set of data to be migrated from a source cloud bucket associated with a source data domain to a destination cloud bucket associated with a destination data domain.
Ramprasad N. Chinthekindi, George Mathew, Rahul Goyal, Mahesh Kamat
Filed: 26 Mar 21
Utility
Reservation handling in conjunction with switching between storage access protocols
27 Sep 22
At least one processing device is configured to register a logical storage device of a storage system for a first set of paths associated with a first access protocol using a host identifier, to send a first reservation command in the first access protocol over each of the paths in the first set of paths, to register the logical storage device of the storage system for a second set of paths associated with a second access protocol using the same host identifier used in registering the logical storage device for the first set of paths, to receive an additional reservation command in the first access protocol, and responsive to receipt of the additional reservation command in the first access protocol, to translate the additional reservation command to the second access protocol, and to send the additional reservation command in the second access protocol to the storage system.
Amit Pundalik Anchi, Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 16 Dec 20
Utility
Method and system for parallel data transmission and cooperating backups
27 Sep 22
In general, the invention relates to a method for performing operations.
Navneet Upadhyay, Rejith Mohan M
Filed: 5 Feb 20
Utility
Client data driven smart backup scheduler
27 Sep 22
First, second, and third threshold limits are configured.
Pravin Kumar Ashokkumar, Sunder Ramesh Andra, Elakkuvan Chidambaram
Filed: 21 May 20
Utility
Method and system for generating synthetic backups using pseudo-asset backups
27 Sep 22
A method that is performed for backing up data.
Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra, Sunil Yadav
Filed: 7 Aug 20
Utility
Cloud to cloud disaster recovery
27 Sep 22
Methods, systems, and computer program products for cloud to cloud disaster recovery are disclosed.
Boris Shpilyuck, David Zlotnick, Assaf Natanzon
Filed: 7 May 19
Utility
Generating and morphing a collection of files in a folder/sub-folder structure that collectively has desired dedupability, compression, clustering and commonality
27 Sep 22
One example method includes receiving a set of filesystem parameters, creating a simulated filesystem based on the filesystem parameters, receiving a set of target characteristics for a file collection, based on the target characteristics, slicing a datastream into a grouping of data slices, populating the simulated files with the data slices to create the file collection and forward or reverse morphing the file collection from one generation to another without rewriting the entire file collection.
Salil Dangi, Ernest Daza
Filed: 19 Apr 19
Utility
System for queuing backup operations in a deduplicating storage system
27 Sep 22
A system for queuing deduplication backup operations comprises an input interface and a processor.
Gururaj Kulkarni, Manjunatha Hebbar
Filed: 10 Dec 13
Utility
Merkle tree forest for synchronizing data buckets of unlimited size in object storage systems
27 Sep 22
Embodiments extend using sparse Merkle trees for smart synchronization of S3 buckets by overcoming fixed size limitations through creating another Merkle tree when the fixed size limit of the first tree is exceeded, and creating yet another tree when the second tree is filled up, and so on as needed.
Alex Solan, Jehuda Shemer
Filed: 27 Feb 20
Utility
Automated expansion and reduction of replicated data sets
27 Sep 22
Techniques for modifying an application data set may include receiving a request to modify a storage group of logical devices used by an application; and performing processing that modifies, in accordance with the request, the storage group and an existing remote replication configuration.
Brian O'Halloran, Siobhan McLoughlin, Peter Fleming, Martin Neville, Brid O'Driscoll
Filed: 31 Aug 20
Utility
Optimizing docker image encryption—tradeoff between performance and protection level
27 Sep 22
One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
Kfir Wolfson, Jehuda Shemer, Stav Sapir, Amos Zamir, Naor Radami
Filed: 7 Aug 20
Utility
Framework for measuring telemetry data variability for confidence evaluation of a machine learning estimator
27 Sep 22
A deployment manager includes storage for storing a prediction model based on telemetry data from the deployments and a prediction manager.
Paulo Abelha Ferreira, Adriana Bechara Prado, Pablo Nascimento da Silva
Filed: 27 Apr 20
Utility
Automatically allocating device resources using machine learning techniques
27 Sep 22
Methods, apparatus, and processor-readable storage media for automatically allocating device resources using machine learning techniques are provided herein.
Rahul Vishwakarma, Hemant Gaikwad, Gopal Singh
Filed: 31 Jan 20
Utility
Data-driven hardware configuration recommendation system based on user satisfaction rating
27 Sep 22
Techniques are provided for recommending hardware configuration changes using a user satisfaction rating.
Anat Parush Tzur, Avitan Gefen, Amihai Savir
Filed: 3 May 19
Utility
Data set valuation for service providers
27 Sep 22
Data set valuation techniques are provided.
Stephen Todd, David Dietrich
Filed: 17 Dec 15