4565 patents
Page 7 of 229
Utility
Hybrid NVRAM logging in filesystem namespace
24 Oct 23
In one example, a method for writing data includes receiving a write request and performing a first type of logging process in connection with the write request, and creating a corresponding first logging record.
Pengju Shang, George Mathew, Dhawal Bhagwat, Pranay Singh, Englin Koay
Filed: 28 Oct 21
Utility
Cost-optimized true zero recovery time objective for multiple applications based on interdependent applications
24 Oct 23
Data protection operations including replication operations from a production site to a replica site are disclosed.
Bing Liu, Jehuda Shemer, Kfir Wolfson, Jawad Said
Filed: 19 May 20
Utility
True zero RTO: planned failover
24 Oct 23
One example method includes performing, as part a planned failover procedure, operations that include connecting a replica OS disk to a replica VM, powering up the replica VM, booting an OS of the replica VM, disconnecting a source VM from a network, and connecting replica data disks to the replica VM.
Jawad Said, Kfir Wolfson, Jehuda Shemer
Filed: 24 Jun 20
Utility
Transient caching to support short-term recall of tiered files
24 Oct 23
A method comprises receiving a request to configure a temporary cache associated with at least one storage array and configuring the temporary cache in response to the request.
Mithun Mahendra Varma, Rabi Shankar Shaw, Srikantha Kalaghatta, Sarat Kumar Behera
Filed: 19 Jul 21
Utility
One path metadata page reconstruction with no dynamical memory allocation for delta-log based storage
24 Oct 23
Techniques for reconstructing or building metadata pages in storage nodes that have a delta-log based architecture.
Vladimir Shveidel, Ami Sabo
Filed: 23 Jun 21
Utility
System and method for data registration
24 Oct 23
A computing device of a data register includes persistent storage and a data register manager.
Pengfei Wu, Assaf Natanzon, Stephen James Todd, Zhenzhen Lin
Filed: 2 Aug 19
Utility
Access control rights assignment capabilities utilizing a new context-based hierarchy of data based on new forms of metadata
24 Oct 23
One example method includes extracting content metadata from data, storing the content metadata in a data catalogue, receiving at the data catalogue, from a user, a request to access the data, transmitting, by the data catalogue to a security service provider, an access request that includes the extracted content metadata and metadata relating to the access request, accessing, by the security service provider, identity metadata concerning an identity of the user, and a data access policy, and transmitting, by the security service provider to the data catalogue, a decision as to whether or not access can be granted to the data, and the decision is based on the data access policy, the identity metadata, and the metadata in the access request.
Nicole Reineke, Hanna Yehuda, Omar Abdul Aal, Farida Shafik, Joel Christner, Shary Beshara, Ahmad Refaat Abdel Fadeel Ahmad El Rouby
Filed: 11 Mar 21
Utility
Method, device and computer program product for storage management
17 Oct 23
Techniques perform storage management.
Jianbin Kang, Jian Gao, Hongpo Gao, Xinlei Xu
Filed: 4 Mar 21
Utility
Copying data between storage systems
17 Oct 23
Copying data from a source storage system to a target storage system includes resetting a write tracker on the source storage system to track writes to the source storage system by one or more host computing systems, copying data from the source storage system to the target storage system after resetting the write tracker, suspending writes to the source storage system after copying the data, and copying data portions of the source storage system to the target storage system that are indicated as being written by the write tracker after suspending writes to the source storage system.
Douglas E. LeCrone, Denis J. Burt, Brett A. Quinn, Paul A. Linstead
Filed: 28 Jan 21
Utility
System and method for estimation of time to completion for heterogeneous application upgrades in a customer environment
17 Oct 23
A method for managing a client environment includes identifying, by an application upgrade monitoring agent, the application upgrade for an application, in response to the identifying: obtaining device configuration information associated with a client device executing an instance of the application, wherein the client device is executing on the client environment, sending an upgrade time estimation request to a device emulation system, wherein the upgrade time estimation request comprises the device configuration information, obtaining, in response to the upgrade time estimation request, an upgrade estimation from the device emulation system, wherein the upgrade estimation specifies a period of time the application upgrade is expected to take to complete on the client device, and initiating execution of the application upgrade on the client device based on the upgrade estimation.
Parminder Singh Sethi, Lakshmi Nalam, Vasanth DS, Shelesh Chopra
Filed: 27 Jul 21
Utility
Resource utilization method, electronic device, and computer program product
17 Oct 23
Embodiments of the present disclosure provide a resource utilization method, an electronic device, and a computer program product.
Tao Chen, Bing Liu
Filed: 22 Oct 20
Utility
Hyper-scale P2P deduplicated storage system using a distributed ledger
17 Oct 23
One example method includes receiving from a node, in an HSAN that includes multiple nodes, an ADD_DATA request to add an entry to a distributed ledger of the HSAN, the request comprising a user ID that identifies the node, a hash of a data segment, and a storage location of the data segment at the node, performing a challenge-and-response process with the node to verify that the node has a copy of the data that was the subject of the entry, making a determination that a replication factor X has not been met, and adding the entry to the distributed ledger upon successful conclusion of the challenge-and-response process.
Arun Murti, Joey C. Lei, Adam E. Brenner, Mark D. Malamut
Filed: 18 Jul 19
Utility
Managing containers on a data storage system
17 Oct 23
Mechanisms and techniques are employed for managing the allocation and load balancing of storage system resources for the containerized, distributed execution of applications on a storage system.
Adarsh Pradhan Jmt, Maneesh Singhal
Filed: 7 Nov 22
Utility
Compression switching for federated learning
17 Oct 23
Methods for compression switching that includes distributing a model to client nodes, which use the model to generate a gradient vector (GV) based on a client node data set.
Paulo Abelha Ferreira, Pablo Nascimento Da Silva, Tiago Salviano Calmon, Roberto Nery Stelling Neto, Vinicius Michel Gottin
Filed: 29 Oct 20
Utility
Intelligent control plane communication
10 Oct 23
A control node and/or a storage processing node maybe configured to modify a control path between a control node and storage processing node to include at least a portion of a data fabric and another processing node.
Akash B. Appaiah, Julie Zhivich, Jason J. Duquette
Filed: 23 Jul 21
Utility
Method, device, and program product for managing computing system
10 Oct 23
The present disclosure relates to a method, a device, and a program product for managing a computing system.
Bin He, Zhen Jia, Danqing Sha, Anzhou Hou
Filed: 23 Jul 21
Utility
Source versus target metadata-based data integrity checking
10 Oct 23
A method and system for source versus target metadata-based data integrity checking.
Savitha Susan Bijoy, Gururaj Kulkarni, Mahesh Kamath, Kiran Kumar Malle Gowda
Filed: 26 Jul 21
Utility
Method and system for virtual machine protection
10 Oct 23
A method and system for virtual machine protection.
Sharath Talkad Srinivasan, Rakesh Kumar
Filed: 7 Aug 20
Utility
Systems and methods for selecting optimal proxy devices for backup and restore operations for virtual machines
10 Oct 23
Techniques described herein relate to methods for managing backup and restore operations.
Shelesh Chopra, Rahul Deo Vishwakarma, Sharath Talkad Srinivasan, Parmeshwr Prasad
Filed: 11 Feb 21
Utility
Method, electronic device, and computer program product for data protection
10 Oct 23
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data protection.
Chao Lin, Yuting Zhang
Filed: 28 Jul 21