4565 patents
Page 68 of 229
Utility
System and method for redirecting data access to local trust managers via an indirection logic service
12 Jul 22
A method for managing data includes obtaining, by an indirection logic service, a data request for data, wherein the data request specifies a ledger entry, identifying an indirection logic entry stored in the indirection logic service based on the ledger entry, obtaining a selection of trust data from a client, wherein the ledger entry comprises metadata of the trust data, and initiating communication between the client and a local trust manager based on the selection of trust data, wherein the trust data was generated by the local trust manager.
Stephen James Todd, Jason A. Shepherd, Jimmy Doyle Pike, Aurelian Dumitru, Gaurav Chawla
Filed: 31 Jan 20
Utility
Method, device, and program product for managing computer system
12 Jul 22
The present disclosure relates to a method, a device, and a program product for managing a computer system.
Jiacheng Ni, Min Gong, Zijia Wang, Zhen Jia, Bin He
Filed: 25 Feb 21
Utility
Methods and apparatus for automatic media file transcoding
12 Jul 22
Methods and apparatus are provided for automatically transcoding media files.
Karin Breitman
Filed: 26 Jun 20
Utility
Snapshot-enabled storage system implementing algorithm for efficient reclamation of snapshot storage space
5 Jul 22
An apparatus in an illustrative embodiment comprises at least one processing device comprising a processor coupled to a memory.
Yonatan Shtarkman, Itay Keller, Asaf Porath, Erez Webman
Filed: 29 Mar 19
Utility
Method and system for performing data protection management using an add-on application programming interface
5 Jul 22
A system for providing data protection services for data generated by host components hosted by hosts includes persistent storage for storing data and a local data protection manager.
Matthew Dickey Buchman, Yasemin Ugur-Ozekinci, Jayashree B. Radha, Kenneth William Owens, Adrian Dobrean, Krishnendu Bagchi, Navneet Upadhyay, Pawan Singh
Filed: 27 Jan 21
Utility
Compliance of replicated data sets
5 Jul 22
Techniques for determining a compliance level may include: receiving a remote replication policy for a data set; determining a current remote replication configuration of the data set; and performing evaluation processing that determines, in accordance with the remote replication policy for the data set, the compliance level for remote replication of the data set, wherein said evaluation processing includes verifying that the topology of the current remote replication configuration for the data set matches a specified topology of the remote replication policy for the data set.
Brian O'Halloran, Siobhan McLoughlin
Filed: 29 Sep 20
Utility
Upgrade of a software product
5 Jul 22
An apparatus for upgrading a software product is provided.
Min Liu, Weiyang Liu, Ming Zhang, Yubing Zhang, Naveen Rastogi
Filed: 22 May 19
Utility
Monitoring and processing storage resource data using smart tagging techniques
5 Jul 22
Methods, apparatus, and processor-readable storage media for monitoring and processing storage resource data using smart tagging techniques are provided herein.
Balasundaram Govindan
Filed: 13 Oct 20
Utility
Efficient method for generating asset backup scheduling plans
5 Jul 22
An efficient method for generating asset backup scheduling plans.
Hugo De Oliveira Barbalho, Tiago Salviano Calmon, Eduardo Vera Sousa
Filed: 30 Nov 20
Utility
Method, device, and computer program product for managing backup task
5 Jul 22
The present disclosure relates to a method, device and computer program product for managing a backup job.
Yi Wang, Qingxiao Zheng, Lanjun Liao
Filed: 19 Feb 20
Utility
System and method for a backup data verification for a file system based backup
5 Jul 22
A method for verifying data includes obtaining, by a backup agent, a backup verification trigger for a backup stored in a backup storage system, in response to the backup verification trigger, obtaining backup metadata associated with the backup, performing a hierarchical structure data mapping based on the backup metadata to obtain a hierarchical structure associated with the backup, performing, using the hierarchical structure, a backup verification to generate a backup health state of the backup, after the backup verification is generated: making a determination, based on the backup verification, that the backup health state is not in a healthy state, and in response to the determination, performing a remediation of the backup policies.
Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra
Filed: 7 Aug 20
Utility
Uninterrupted file level restore service using siamese engine
5 Jul 22
Methods and systems for restoring data to a host device are described.
Mahesh Reddy Appireddygari Venkataramana, Chetan Battal, Mahantesh Ambaljeri, Swaroop Shankar DH
Filed: 3 Jan 20
Utility
Data access method, apparatus and computer program product
5 Jul 22
Techniques perform data access to a disk array.
Jibing Dong, Jian Gao
Filed: 19 Mar 20
Utility
Customizing option-selections in application based on usage pattern
5 Jul 22
Data is collected during use of an application program to determine an option-selection usage pattern for a given user with respect to a given option-selection list with options listed in a first order.
Raksha B. Nayak, Abhijit Ashok Bindage
Filed: 23 Oct 19
Utility
System and method for cache management
5 Jul 22
An information handling system for managing a storage system includes storage for storing profile-based cache policy performance prediction models.
Vinicius Michel Gottin, Hugo de Oliveira Barbalho, Rômulo Teixeira de Abreu Pinho, Roberto Nery Stelling Neto, Alex Laier Bordignon, Daniel Sadoc Menasché
Filed: 20 Apr 21
Utility
Path failure information sharing between host devices connected to a storage system
5 Jul 22
An apparatus comprises a first host device that is configured to deliver input-output (IO) operations to a storage system over selected ones of a plurality of paths.
Gopinath Marappan
Filed: 4 Oct 19
Utility
Multiple overlapping hashes at variable offset in a hardware offload
5 Jul 22
A hardware offload includes a hash engine that performs hashing for a block-based storage system.
Jeremy O'Hare, Kuolin Hua, Ken Dorman, Anoop Raghunathan, Jason Duquette, Lionel Bella, Alesia Tringale
Filed: 29 Aug 19
Utility
Transitioning from a donor four site data replication system to a target four site data replication system
5 Jul 22
Transitioning from using a donor four site replication system to using a target four site replication system includes initiating synchronization between a first local storage system of the donor four site replication system that receives I/O from a host with an alternative first local storage system of the target four site replication system, the host switching to automatically fail over to a synchronous storage system of the target four site replication system that receives synchronous data from the alternative first local storage system following synchronizing the first local storage system with the alternative first local storage system, and the host switching to perform I/O operations with the alternative first local storage system following switching to automatically fail over to the synchronous storage system.
Brett A. Quinn, Paul A. Linstead, Douglas E. LeCrone
Filed: 29 Sep 20
Utility
System and method for managing file system references at scale
5 Jul 22
A system for managing file systems includes memory.
Jean-Pierre Bono
Filed: 1 Nov 19
Utility
Method, device, and computer program product for managing access request in storage system
5 Jul 22
The present disclosure relates to a method, device and program product for managing an access request in a storage system.
Bing Liu
Filed: 30 Apr 20