4565 patents
Page 60 of 229
Utility
Remote rollback of snapshots for asynchronous replication
30 Aug 22
An aspect of performing rollback of a snapshot between source and target storage systems in an asynchronous replication session in which Sr′ represents a remote snapshot subject to the rollback includes suspending host input/output operations to a current source volume (Vs), determining whether a snapshot (Sr) matching the snapshot Sr′ is present in the source system and, upon determining the snapshot Sr is not present in the source storage system, searching a snapshot pair (Sk, Sk′) that is closest to the remote snapshot Sr′.
Xiangping Chen, David Meiri
Filed: 20 Jan 20
Utility
Clustered storage system with stateless inter-module communication for processing of count-key-data tracks
30 Aug 22
A storage system in one embodiment comprises multiple storage nodes each comprising at least one storage device.
David Meiri, Anton Kucherov
Filed: 20 Jun 18
Utility
Changing page size in an address-based data storage system
30 Aug 22
Host I/O requests directed to a logical storage volume are initially processed by accessing physical pages of non-volatile data storage having a default page size.
David Meiri, Anton Kucherov
Filed: 3 Feb 20
Utility
System and method for augmenting element records associated with the elements of a distributed computing environment with user-defined content
30 Aug 22
A distributed computing environment data store management system includes a computer-based system for identifying a subset of element records in a data store associated with the elements of a distributed computing environment, receiving at least one user-defined data element from a user interface.
Geoffrey D. Bourne, Arthur O. Beall, III
Filed: 17 Jul 15
Utility
Method and device for creating an index
30 Aug 22
Embodiments of the present disclosure generally relate to a method and device for creating an index.
Winston Lei Zhang, Charlie Chen, Kun Wu Huang, Jingjing Liu, Duke Dai
Filed: 28 Apr 20
Utility
Method, device and computer program product for deploying a machine learning model
30 Aug 22
Embodiments of the present disclosure relate to a method, device and computer program product for deploying a machine learning model.
Jinpeng Liu, Pengfei Wu, Junping Zhao, Kun Wang
Filed: 20 May 19
Utility
Method for testing storage systems, electronic device, and computer program product
30 Aug 22
Techniques test a storage system.
Hao Wang, Xu Chen, Pan Xiao, Si Zhang
Filed: 9 Mar 21
Utility
Method, device, and computer program product for managing virtual visual content
30 Aug 22
Embodiments of the present disclosure relate to a method, a device, and a computer program product for managing virtual visual content.
Zhen Jia, Danqing Sha, Bin He, Xuwei Tang
Filed: 26 Oct 20
Utility
Method, electronic device and computer program product for processing data
30 Aug 22
Embodiments of the present disclosure provide a method, electronic device and a computer program product for processing data.
Bing Liu, Tao Chen
Filed: 30 Apr 20
Utility
Encoding method, electronic device, and program product
30 Aug 22
An encoding method includes: receiving configuration data related to encoding with a predetermined encoding mode; determining an encoding strategy based on the configuration data, wherein the encoding strategy includes parameters associated with encoding the data on an entity; and causing the data to be encoded on the entity based on the encoding strategy.
Zhenzhen Lin, Si Chen, Anzhou Hou
Filed: 17 May 21
Utility
Smart compressor based on adaptive CPU/QAT scheduling method
30 Aug 22
A method, apparatus, and system for assigning the execution of a cryptography and/or compression operation on a data segment to either a central processing unit (CPU) or a hardware cryptography/compression accelerator is disclosed.
Bing Liu, Tao Chen, Wei Lin, Yong Zou
Filed: 11 Jul 19
Utility
Power supply method, electronic device, and computer program product
23 Aug 22
Techniques involve: if it is determined that a power supply level of a processing unit in a normal mode in a computer system is lower than a threshold level, determining the remaining power of a battery backup unit in the computer system; and if it is determined that the remaining power is higher than the threshold power, causing the battery backup unit to supply power to the processing unit to maintain the processing unit in the normal mode.
Min Zhang, Qiulin Cheng, Haohan Zhang
Filed: 10 Mar 21
Utility
Direct read in clustered file systems
23 Aug 22
Direct read in clustered file systems is described herein.
Jonathan Walton, Max Laier, Suraj Raju, Cornelis van Rij
Filed: 21 Apr 21
Utility
Multi-path layer configured to provide access authorization for software code of multi-path input-output drivers
23 Aug 22
An apparatus comprises a processing device configured to receive, from a given multi-path input-output driver of a given one of a plurality of host devices that utilizes a given piece of software for controlling delivery of input-output operations to a storage system over selected ones of a plurality of paths through a network, an access authorization check request for the given piece of software in response to expiration of a designated access authorization refresh interval, wherein authorization to access software code of the given piece of software is provided by an access authorization server external to the plurality of host devices.
Surendra Singh Chauhan, Udit Tyagi
Filed: 3 May 21
Utility
Artificial intelligence-based storage monitoring
23 Aug 22
Techniques are provided for artificial intelligence-based storage monitoring.
Min Gong, Michael Marrotte
Filed: 1 May 20
Utility
Adapting service level policies for external latencies
23 Aug 22
Techniques for processing I/O operations in a data storage system may include: receiving I/O operations directed to a logical device associated with a service level specifying a target I/O response time goal; receiving a input identifying whether to calculate an observed I/O response time for the logical device using only an internal processing time associated with processing performed within the data storage system when servicing I/O operations directed to the logical device; determining, in accordance with the input and the I/O operations directed to the logical device, the observed I/O response time for the logical device; determining a service level violation for the first logical device whereby the observed I/O response time violates the service level; and responsive to determining the service level violation whereby the observed I/O response time violates the service level, performing processing to alleviate or remove the first service level violation.
John A. Adams, Arieh Don, John R. Lynch
Filed: 27 Oct 20
Utility
Incremental replication between foreign system dataset stores
23 Aug 22
Incremental replication between foreign system dataset stores is described herein.
Evgeny Popovich, Michael Frank, Austin Voecks, Oliver Chung, Jonathan Walton
Filed: 29 Jun 20
Utility
Dynamic workload migration to edge stations
23 Aug 22
One example method, which may be performed at an end device configured to communicate with an edge station, includes listening for a broadcast signal from the edge station, joining a broadcast channel, receiving edge station information, selecting an edge station, transmitting a manifest to the selected edge station, receiving route information from the selected edge station, accessing a container identified in the route information, and issuing a call to the selected edge station to execute an application workload on the container.
Victor Fong, Kenneth Durazzo
Filed: 23 Jan 20
Utility
Method, electronic device, and computer program product for storage management
23 Aug 22
Embodiments include a method, an electronic device, and a computer program product for storage management.
Jinpeng Liu, Jin Li, Mengze Liao, Wenbin Yang
Filed: 10 Nov 20
Utility
System and method for an application container evaluation based on container events
23 Aug 22
A method for a backup operation in accordance with one or more embodiments of the invention includes obtaining, by a vulnerability analyzer executing on a backup server, a plurality of container event entries, wherein a container event entry of the plurality of container event entries specifies a an application container identifier, a container event identifier, an event severity, and an event type, selecting the container event identifier, identifying a portion of the plurality of container event entries that specify the container event identifier, generating a mean event severity based on the portion of the plurality of container event entries, generating a first vulnerability value associated with the application container identifier, and initiating a backup policy update based on a vulnerability ranking, wherein the vulnerability ranking is based on the first vulnerability value.
Mahesh Reddy Appireddygari Venkataramana, Shelesh Chopra, Chetan Battal, Swaroop Shankar D H
Filed: 10 Jul 20