4565 patents
Page 7 of 229
Utility
Near continuous data protection without using snapshots
24 Oct 23
One example method includes performing delta operations to protect data.
Jehuda Shemer, Ravi Vijayakumar Chitloor
Filed: 27 Oct 21
Utility
Synchronization of multi-pathing settings across clustered nodes
24 Oct 23
An apparatus comprises a processing device configured to receive multi-pathing settings from a plurality of nodes of one or more clusters, and to identify at least one group of the plurality of nodes belonging to a same cluster of the one or more clusters.
Peniel Charles, Manikandan Sethuraman, Gopinath Marappan
Filed: 26 Feb 21
Utility
System and method for recovering an operating system after an upgrade hang using a dual-flash device
24 Oct 23
One embodiment provides a computer implemented method for recovering an operating system (OS) after an upgrade hang using a dual-flash device.
Xinghai Yu, Colin Zou
Filed: 19 May 20
Utility
Hybrid NVRAM logging in filesystem namespace
24 Oct 23
In one example, a method for writing data includes receiving a write request and performing a first type of logging process in connection with the write request, and creating a corresponding first logging record.
Pengju Shang, George Mathew, Dhawal Bhagwat, Pranay Singh, Englin Koay
Filed: 28 Oct 21
Utility
One path metadata page reconstruction with no dynamical memory allocation for delta-log based storage
24 Oct 23
Techniques for reconstructing or building metadata pages in storage nodes that have a delta-log based architecture.
Vladimir Shveidel, Ami Sabo
Filed: 23 Jun 21
Utility
System and method for data registration
24 Oct 23
A computing device of a data register includes persistent storage and a data register manager.
Pengfei Wu, Assaf Natanzon, Stephen James Todd, Zhenzhen Lin
Filed: 2 Aug 19
Utility
Access control rights assignment capabilities utilizing a new context-based hierarchy of data based on new forms of metadata
24 Oct 23
One example method includes extracting content metadata from data, storing the content metadata in a data catalogue, receiving at the data catalogue, from a user, a request to access the data, transmitting, by the data catalogue to a security service provider, an access request that includes the extracted content metadata and metadata relating to the access request, accessing, by the security service provider, identity metadata concerning an identity of the user, and a data access policy, and transmitting, by the security service provider to the data catalogue, a decision as to whether or not access can be granted to the data, and the decision is based on the data access policy, the identity metadata, and the metadata in the access request.
Nicole Reineke, Hanna Yehuda, Omar Abdul Aal, Farida Shafik, Joel Christner, Shary Beshara, Ahmad Refaat Abdel Fadeel Ahmad El Rouby
Filed: 11 Mar 21
Utility
Method, device and computer program product for storage management
17 Oct 23
Techniques perform storage management.
Jianbin Kang, Jian Gao, Hongpo Gao, Xinlei Xu
Filed: 4 Mar 21
Utility
Copying data between storage systems
17 Oct 23
Copying data from a source storage system to a target storage system includes resetting a write tracker on the source storage system to track writes to the source storage system by one or more host computing systems, copying data from the source storage system to the target storage system after resetting the write tracker, suspending writes to the source storage system after copying the data, and copying data portions of the source storage system to the target storage system that are indicated as being written by the write tracker after suspending writes to the source storage system.
Douglas E. LeCrone, Denis J. Burt, Brett A. Quinn, Paul A. Linstead
Filed: 28 Jan 21
Utility
System and method for estimation of time to completion for heterogeneous application upgrades in a customer environment
17 Oct 23
A method for managing a client environment includes identifying, by an application upgrade monitoring agent, the application upgrade for an application, in response to the identifying: obtaining device configuration information associated with a client device executing an instance of the application, wherein the client device is executing on the client environment, sending an upgrade time estimation request to a device emulation system, wherein the upgrade time estimation request comprises the device configuration information, obtaining, in response to the upgrade time estimation request, an upgrade estimation from the device emulation system, wherein the upgrade estimation specifies a period of time the application upgrade is expected to take to complete on the client device, and initiating execution of the application upgrade on the client device based on the upgrade estimation.
Parminder Singh Sethi, Lakshmi Nalam, Vasanth DS, Shelesh Chopra
Filed: 27 Jul 21
Utility
Compression switching for federated learning
17 Oct 23
Methods for compression switching that includes distributing a model to client nodes, which use the model to generate a gradient vector (GV) based on a client node data set.
Paulo Abelha Ferreira, Pablo Nascimento Da Silva, Tiago Salviano Calmon, Roberto Nery Stelling Neto, Vinicius Michel Gottin
Filed: 29 Oct 20
Utility
Managing containers on a data storage system
17 Oct 23
Mechanisms and techniques are employed for managing the allocation and load balancing of storage system resources for the containerized, distributed execution of applications on a storage system.
Adarsh Pradhan Jmt, Maneesh Singhal
Filed: 7 Nov 22
Utility
Resource utilization method, electronic device, and computer program product
17 Oct 23
Embodiments of the present disclosure provide a resource utilization method, an electronic device, and a computer program product.
Tao Chen, Bing Liu
Filed: 22 Oct 20
Utility
Hyper-scale P2P deduplicated storage system using a distributed ledger
17 Oct 23
One example method includes receiving from a node, in an HSAN that includes multiple nodes, an ADD_DATA request to add an entry to a distributed ledger of the HSAN, the request comprising a user ID that identifies the node, a hash of a data segment, and a storage location of the data segment at the node, performing a challenge-and-response process with the node to verify that the node has a copy of the data that was the subject of the entry, making a determination that a replication factor X has not been met, and adding the entry to the distributed ledger upon successful conclusion of the challenge-and-response process.
Arun Murti, Joey C. Lei, Adam E. Brenner, Mark D. Malamut
Filed: 18 Jul 19
Utility
Intelligent control plane communication
10 Oct 23
A control node and/or a storage processing node maybe configured to modify a control path between a control node and storage processing node to include at least a portion of a data fabric and another processing node.
Akash B. Appaiah, Julie Zhivich, Jason J. Duquette
Filed: 23 Jul 21
Utility
Systems and methods for selecting optimal proxy devices for backup and restore operations for virtual machines
10 Oct 23
Techniques described herein relate to methods for managing backup and restore operations.
Shelesh Chopra, Rahul Deo Vishwakarma, Sharath Talkad Srinivasan, Parmeshwr Prasad
Filed: 11 Feb 21
Utility
Bottom-up pre-emptive cache update in a multi-level redundant cache system
10 Oct 23
Providing cache updates in a multi-node system through a service component between a lower level component and a next higher level component by maintaining a ledger storing an incrementing number indicating a present state of the datasets in a cache of the lower level component.
Sirisha Kaipa, Madhura Srinivasa Raghavan, Neha R. Naik
Filed: 23 Jul 21
Utility
Systems and methods for searching deduplicated data
10 Oct 23
A deduplicated storage system storing objects receives a search term.
Philip Shilane
Filed: 14 Dec 21
Utility
Method, device, and program product for managing computing system
10 Oct 23
The present disclosure relates to a method, a device, and a program product for managing a computing system.
Bin He, Zhen Jia, Danqing Sha, Anzhou Hou
Filed: 23 Jul 21
Utility
Method, electronic device, and computer program product for data protection
10 Oct 23
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data protection.
Chao Lin, Yuting Zhang
Filed: 28 Jul 21