4565 patents
Page 62 of 229
Utility
Prioritization and quality-of-service control for near-zero-added-latency any point in time virtual replication
16 Aug 22
Prioritization and quality of service control operations for any PiT replication operations.
Saar Cohen, Jehuda Shemer, Kfir Wolfson, Itay Azaria
Filed: 20 May 20
Utility
Micro services tests prioritization
16 Aug 22
One example method includes identifying a changed microservice whose code has been changed, mapping, for each microservice in a group of microservices that includes the changed microservice, microservice dependencies associated with the changed microservice, determining, for each microservice in the group, a relative risk that the microservice will be adversely affected by the change to the code of the changed microservice, and based on the respective relative risks, generating a test order indicating an order in which the microservices in the group will be tested.
Avitan Gefen, Roi Gamliel, Amihai Savir
Filed: 14 Jan 20
Utility
Volume tiering in storage systems
16 Aug 22
An apparatus comprises a processing device configured to receive a request to create a given storage volume in a storage system, the storage system providing a plurality of storage features.
Yosef Shatsky, Rivka Matosevich, Doron Tal
Filed: 22 Oct 20
Utility
RPC-less locking mechanism based on RDMA CAW for storage cluster with active-active architecture
16 Aug 22
Techniques for providing an RPC-less locking mechanism based on RDMA CAW for a storage cluster with an active-active architecture.
Vladimir Shveidel, Leonid Ravich
Filed: 11 Jan 21
Utility
Source-agnostic service for performing deduplication for an object storage
16 Aug 22
Described is a system for a providing a service (or microservice) for performing deduplication for an object storage.
Kimberly Lu, Philip Shilane, Nicholas Noto
Filed: 29 Jun 20
Utility
Method, electronic device, and computer program product for data stream processing
16 Aug 22
Data stream processing is performed.
Lu Lei, Frank Yifan Huang, Julius Jian Zhu, Yu Teng
Filed: 17 Dec 20
Utility
Method for dynamic pseudofs creation and management in a network filesystem
16 Aug 22
One example method includes connecting to a fileserver of a data protection system, initiating, at a client, an operation that is associated with a master pseudofs of the fileserver, creating, at the client, a client-specific pseudofs based upon the master pseudofs, and the client-specific pseudofs includes only those nodes of the master pseudofs that the client is authorized to access, and performing the operation using the client-specific pseudofs.
Robert L. Fair, Thomas R. Vanderputten
Filed: 30 Jan 18
Utility
Techniques for providing intersite high availability of data nodes in a virtual cluster
16 Aug 22
Creating and using a virtual cluster may include: creating a first cluster logical device on a first data storage system including data nodes; creating a second cluster logical device on a second data storage system including data nodes; configuring the first cluster logical device and the second cluster logical device as a same first logical device; establishing bidirectional remote replication between the first and second cluster logical devices; determining pairs of data nodes including a data node from the first data storage system and another data node from the second data storage system; determining a failure of a first data node on the first data storage system, wherein one of the pairs of data nodes includes the first data node and a second data node of the second data storage system; and responsive to determining the failure of the first data node, performing failover processing by the second data node.
Bharadwaj R. Sathavalli, Shampavman Chenjeri Gururajarao
Filed: 5 Sep 19
Utility
Lifecycle of handling faults in next generation storage systems
16 Aug 22
Techniques for providing lifecycle handling of faults associated with a storage appliance.
Rohit K. Chawla, Philippe Armangau, Dixitkumar Patel, Vamsi K. Vankamamidi
Filed: 29 Oct 20
Utility
Importing cryptographic keys into key vaults
16 Aug 22
Techniques are provided to import a cryptographic key into a key vault in which an application programming interface for the key vault does not support importing existing cryptographic keys into the key vault.
Sridhar Villapakkam, Ajit Bhagwat
Filed: 25 Feb 21
Utility
Method and apparatus for cache slot allocation based on data origination location or final data destination location
16 Aug 22
Operational information in a storage system is collected regarding storage media storage tiers, devices, drives, tracks on drives, and logical storage layers, to determine an estimated amount of time it will take to write data from cache to the intended drive when a new write operation arrives at the storage system.
John Creed
Filed: 22 May 20
Utility
Object synchronization of server nodes in a network computing environment
16 Aug 22
A management server modifies a set of objects which is utilized by the management server to manage a network computing environment including server node.
Roman Spiegelman
Filed: 16 Apr 21
Utility
Home-smartmedia-MEC with cloud marketplace
16 Aug 22
One example method includes configuring an input device based in part on a type of network with which the input device is expected to be used, configuring an output device based in part on a type of network with which the output device is expected to be used, registering the input device and the output device with an orchestrator, downloading a service needed to process a data stream generated by the input device, configuring an execution pipeline, and the execution pipeline includes the service, receiving the data stream from the input device and processing the data stream with the execution pipeline, and transmitting information relating to the processed data stream to the output device.
Victor Fong, Malini Bhattacharjee, Amy Seibel, Xuebin He
Filed: 25 Nov 20
Utility
Intelligent peer-to-peer container filesystem
16 Aug 22
A peer container filesystem is provided.
Victor Fong, Xuebin He
Filed: 29 Sep 20
Utility
Adaptor for storage device
16 Aug 22
An adaptor for incorporating a function of an Open Compute Project (OCP) mezzanine card into a storage device includes a framework, a baseboard mounted to the framework and arranged to have the Open Compute Project (OCP) mezzanine card mounted thereon, an adapting part on the baseboard, the adapting part including an insertion slot for receiving a first interface of the OCP mezzanine card, and a connector on the baseboard, the connector configured to connect with the storage device, the baseboard including interconnections between the connector and the adapting part to provide for data exchange between the OCP mezzanine card and the storage device.
Haifang Zhai, David Dong, Michael Hao Zhou, Sandburg Hao Hu, Sean Xu Chen
Filed: 14 Jan 20
Utility
Performance-driven movement of applications between containers utilizing multiple data transmission paths with associated different access protocols
9 Aug 22
An apparatus in one embodiment comprises at least one processing device.
Amit Pundalik Anchi, Sanjib Mallick, Vinay G. Rao, Arieh Don
Filed: 8 Dec 20
Utility
Method and apparatus for accelerating deduplication processing
9 Aug 22
A deduplication engine maintains a hash table containing hash values of tracks of data stored on managed drives of a storage system.
Venkata Ippatapu, Ramesh Doddaiah
Filed: 15 Apr 21
Utility
Managing lock coordinator rebalance in distributed file systems
9 Aug 22
Managing lock coordinator rebalance in distributed file systems is provided herein.
Ron Steinke
Filed: 17 Dec 20
Utility
Methods and systems for utilizing a unified namespace
9 Aug 22
A method for managing file systems includes receiving, by a unified namespace manager, a first message that indicates a new file system has been created on a first node, performing an update on a top level file system namespace to include a reference to the new file system to generate an updated top level file system namespace, generating, based on the update, a second message that indicates the top level file system namespace has been updated, and sending, to a second node, the second message.
Jean-Pierre Bono, Marc A. De Souter, Adrian Michaud
Filed: 1 Nov 19
Utility
System and method for an application container backup prioritization based on container information and resource availability
9 Aug 22
A method for performing a backup operation includes obtaining, by a backup server, container information associated with a plurality of application containers, generating a container score for each application container in the plurality of application containers based on the container information, identifying a resource availability for a backup agent associated with the plurality of application containers, generating an ordering of the plurality of application containers based on the availability and the container scores, and sending a prioritization list update request to the backup agent based on the ordering.
Mahesh Reddy Appireddygari Venkataramana, Shelesh Chopra, Chetan Battal, Swaroop Shankar D H
Filed: 10 Jul 20