4565 patents
Page 65 of 229
Utility
Authenticated boot to protect storage system data by restricting image deployment
26 Jul 22
A boot image is modified to require authentication based on stable system values that are uniquely associated with a storage array.
Sindhura Chamala, Kannan Subbaraman, Venkat Mattapalli Reddy, Debra Robitaille, Mark Arakelian
Filed: 8 Jul 19
Utility
Snapshot transmission from storage array to cloud using multi-path input-output
26 Jul 22
A processing device is configured to communicate over a network with a storage system comprising a plurality of storage devices.
Rabi Shankar Shaw, Anurag Bhatnagar, Sarat Kumar Behera
Filed: 6 Mar 20
Utility
Consistent IO performance on undefined target devices in a cascaded snapshot environment
26 Jul 22
A snapshot for use in a cascaded snapshot environment includes a device level source sequence number and a Direct Image Lookup (DIL) data structure.
Sandeep Chandrashekhara, Michael Ferrari, Jeffrey Wilson
Filed: 16 Oct 20
Utility
Storage system configured to generate sub-volume snapshots
26 Jul 22
A method includes designating one or more particular portions of a storage volume of a storage system for inclusion in a sub-volume snapshot.
Assaf Natanzon, Arieh Don
Filed: 26 Feb 19
Utility
Methods and systems for data backup and recovery on power failure
26 Jul 22
A method for storing encrypted data in a non-volatile memory device, that includes receiving, by a processor, an indication of a power interruption event; disabling, based on the indication, decryption of encrypted data read from a volatile memory module; copying the encrypted data from the volatile memory module to cache; and copying the encrypted data from the cache to the non-volatile memory device.
Walter A. O'Brien, III, Thomas N. Dibb
Filed: 31 Jul 20
Utility
System and method for self-healing of upgrade issues on a customer environment
26 Jul 22
A method for managing applications in a production host environment includes obtaining, by an application upgrade management system, an upgrade issue report for the application, applying a self-healing classification model to the upgrade issue report to obtain a state of the upgrade issue report, making a determination that the state indicates a self-healable state, based on the determination, performing a self-healing process on the application based on the upgrade issue report, and storing a resolution report based on results of the self-healing process.
Shelesh Chopra, Anannya Roy Chowdhury, Parminder Singh Sethi
Filed: 9 Apr 21
Utility
System and method of obtaining data from private cloud behind enterprise firewall
26 Jul 22
A public cloud includes a processor.
Rohan Pednekar, Pramod Biradar, Ritansh Raj
Filed: 1 Nov 19
Utility
System and method for selecting a lossless compression algorithm for a data object based on performance objectives and performance metrics of a set of compression algorithms
19 Jul 22
A method for managing data includes obtaining a compression algorithm selection request for a data object, wherein the data object is generated by a production host, identifying, in response to the compression algorithm selection request, a set of production host performance objectives of the production host, performing a compression algorithm selection analysis using the set of production host performance objectives and a compression selection model to obtain a compression algorithm selection for a compression algorithm, specifying the compression algorithm to the production host using a data agent, wherein the data agent is operatively connected to the production host, initiating a compression on the data object using the data agent by applying the compression algorithm to obtain a compressed data object, and initiating a storage of the compressed data object.
RĂ´mulo Teixeira De Abreu Pinho, Vinicius Michel Gottin, Joel Evans Christner
Filed: 27 Oct 20
Utility
Automatic elevation of system security
19 Jul 22
A system for automatic setting of system security comprises an input interface and a processor.
Raghavendra Anantha Rao
Filed: 23 Oct 19
Utility
Dynamic display of operation timing and success rate
19 Jul 22
A method and system of providing estimates or recommendations for software lifecycle management tasks by obtaining and storing local timing and result data for a current run of an application task on a local client, and gathering global timing and result data in a server computer for a plurality of clients including the local client.
Arun Murti, Adam Brenner, Mark Malamut, Vijay Anand
Filed: 24 Jun 20
Utility
Overlapping replication cycles for asynchronous replication
19 Jul 22
Peer storage systems share the workload of asynchronously replicating a shared logical storage unit (LSU) to a target system.
David Meiri, Benjamin Yoder
Filed: 30 Oct 20
Utility
Storage array error mitigation
19 Jul 22
An aspect of the present disclosure relates to one or more techniques to identify and resolve storage array errors.
Malak Alshawabkeh, Sunil Gumaste, Abhilash Sanap, Ravish Sachdeva, Pankaj Soni, Rong Yu
Filed: 19 Apr 21
Utility
Front-end offload of storage system processing
19 Jul 22
A storage system in one embodiment comprises a front-end device and a plurality of storage nodes.
Lior Kamran, Amitai Alkalay
Filed: 27 May 20
Utility
Methods and systems for mirroring and failover of nodes
19 Jul 22
A method for managing nodes includes detecting, by a failover node, a failure of a primary node, based on the detecting, updating a sparse virtual space to indicate that a file system previously local to the primary node is now local to the failover node, wherein the sparse virtual space is managed by a file system container executing on the failover node, and initiate execution of an instance of an application on the failover node, wherein a second instance of the application was previously executing on the primary node, and wherein the instance of the application uses the file system.
Jean-Pierre Bono, Marc A. De Souter, Adrian Michaud
Filed: 1 Nov 19
Utility
Techniques for performing offload copy operations
19 Jul 22
Techniques for processing operations may include: receiving, at a data storage system from a host, an operation requesting to perform an offload copy operation internally within the data storage system, wherein the operation indicates that the offload copy operation copies data from a source interval to a destination interval; inserting a record in a log file logging the offload copy operation; inserting a source node representing the source interval in a source interval tree, wherein each node in the source interval tree represents a source interval of an offload copy operation having a corresponding record in the log file; inserting a destination node representing the destination interval in a destination interval tree, wherein each node in the destination interval tree represents a destination interval of an offload copy operation having a corresponding record in the log file; and returning an acknowledgement to the host regarding the offload copy operation.
Bar David, Ronen Gazit
Filed: 15 Jan 20
Utility
Uniform host attachment
19 Jul 22
Two data storage systems, DS1 and DS2, may be initially configured with identifiers for target ports and target port groups.
Dmitry Tylik, Dave J. Lindner, Carole Ann Gelotti, Matthew Long
Filed: 13 Apr 21
Utility
Using storage system memory as host memory
19 Jul 22
Memory of a storage system is made available (i.e., exposed) for use as host memory of a host, for example, as an extension of the main memory of the host.
Jon I. Krasner, Arieh Don, Yaron Dar
Filed: 1 May 20
Utility
Sequentially writing metadata into a solid state disk by redirect-on-write
19 Jul 22
Techniques involve receiving a write request for writing metadata of a file system into a solid state disk having a multi-level cell, and then caching the to-be-written metadata into a memory.
Shuo Lv, Ming Zhang
Filed: 21 Sep 20
Utility
Reconstructing lost data objects by generating virtual user files from available nodes within a cluster
19 Jul 22
Embodiments of method and system are directed to a best effort method to reconstruct corrupt files from available nodes or tiers and heal or repair the corrupt files within a cluster of nodes.
Ramprasad Chinthekindi, Shyam Burkule, Kalidas Balakrishnan, Kalyan C Gunda, Subrahmanyam Josyula
Filed: 25 Oct 19
Utility
Virtualization server aware multi-pathing failover policy
19 Jul 22
A host device is configured to communicate over a network with a storage system comprising a plurality of storage devices.
Rimpesh Patel, Amit Pundalik Anchi
Filed: 14 Sep 20