4565 patents
Page 8 of 229
Utility
Source versus target metadata-based data integrity checking
10 Oct 23
A method and system for source versus target metadata-based data integrity checking.
Savitha Susan Bijoy, Gururaj Kulkarni, Mahesh Kamath, Kiran Kumar Malle Gowda
Filed: 26 Jul 21
Utility
System and method for snapshot cleanup and report consolidation
10 Oct 23
A method for data consolidation and preservation during backups of data stored in a source device from the source device to a target device is provided.
Navneet Upadhyay, Shraddha Chunekar, Sunder Ramesh Andra, Yasemin Ugur-Ozekinci, Deepthi Urs, Amith Ramachandran, Adrian Dobrean
Filed: 24 Sep 21
Utility
Method and system for virtual machine protection
10 Oct 23
A method and system for virtual machine protection.
Sharath Talkad Srinivasan, Rakesh Kumar
Filed: 7 Aug 20
Utility
Storage device health status controller
10 Oct 23
One or more aspects of the present disclosure relate to a storage health status.
Aaron Twohig, Paul McSweeney
Filed: 26 Oct 20
Utility
Method and system for intelligent power distribution management
10 Oct 23
A method and system for intelligent power distribution management.
Santosh Kumar Sahu, Sathish Kumar Ponnusamy, Suren Kumar J, Vinod Durairaj
Filed: 30 Jul 20
Utility
Logical storage device access using device-specific keys in an encrypted storage environment
10 Oct 23
Data encrypted using a first device-specific key of a first host device is written to a first logical storage device of a storage system.
Tomer Shachar, Arieh Don, Yevgeni Gehtman, Maxim Balin
Filed: 13 Apr 21
Utility
Dynamic use of non-volatile ram as memory and storage on a storage system
10 Oct 23
Non-volatile Random Access Memory (NVR) on a storage system may be dynamically converted between use as temporary memory in a memory context and use as persistent memory in a storage context.
Owen Martin, Earl Medeiros, Parmeshwr Prasad, Rahul Deo Vishwakarma
Filed: 28 Sep 20
Utility
Method and system for mapping data protection services to data cluster components
3 Oct 23
Techniques described herein relate to a method for managing data protection services for data clusters.
Mohammed Abdul Samad, Prakash Appayya Acharya, Shelesh Chopra, Pradeep Kumar Tulagapu
Filed: 27 Jul 21
Utility
Size-based organization of backup files within an object storage for efficient object re-tiering
3 Oct 23
Described is a system (and method) for size-based organization of backup files within an object storage for efficient object re-tiering.
Sunil Yadav, Shelesh Chopra, Ravi Vijayakumar Chitloor
Filed: 13 Jul 21
Utility
System and method for a predictive application and data migration based on external source event probability and application priority across local data systems
3 Oct 23
A method for managing data includes obtaining, by a data migration manager, a notification of an event occurrence from an external event source, wherein the event occurrence is predicted to take place in a geographical location, performing a threat assessment on the event occurrence to generate an impact prediction for a local data system located in the geographical location, making a first determination that the impact prediction exceeds an impact threshold for a first application executing in the local data system, performing, in response to the first determination, a location assessment to identify a migration destination for first application data stored in the local data system, and initiating a first data migration of the first application data to the migration destination.
James Robert King, Nicole Reineke
Filed: 29 Jan 20
Utility
Intelligent cache warm-up on data protection systems
3 Oct 23
System identifies multiple data blocks in workload stored in slow access persistent storage, data blocks copied to fast access persistent storage, and, after speed of accessing workload satisfies threshold, copied data blocks that remained in fast access persistent storage.
Shuai Hua, Yong Zou, Wenhao Hu, Rahul Ugale
Filed: 7 Aug 20
Utility
Automated server discovery
3 Oct 23
In one example, a method involves performing an initial discovery process that includes querying a storage array, and identifying, based on the query, one or more hosts that are registered with the storage array.
Sunil Kumar, Vinay Rao, Boaz Michaely, Arieh Don
Filed: 1 Mar 22
Utility
Expanding raid systems
3 Oct 23
Physical storage devices (PSDs) of a protection group cluster (PGC) may be represented by a protection group matrix (PGM) having a plurality of rows and a plurality of columns, where each row corresponds to a PSD of the PGC, and each column corresponds to a partition of each PSD.
Kuolin Hua, Kunxiu Gao
Filed: 22 Jul 21
Utility
Generating data replication configurations using artificial intelligence techniques
3 Oct 23
Methods, apparatus, and processor-readable storage media for generating data replication configurations using AI techniques are provided herein.
Kasnadi Sitaram Nandan, Mohit Kolluri, Vinod Kumar, Sujay Prasheel Sundaram, Sarat Manchiraju, Bijan Kumar Mohanty, Hung T. Dinh, Subrato Nath, Naveen Silvester
Filed: 27 May 20
Utility
Read stream identification in a distributed storage system
3 Oct 23
An apparatus comprises at least a first storage node of a plurality of storage nodes of a distributed storage system.
Doron Tal
Filed: 12 Jul 21
Utility
Methods and devices for writing data into a degraded array using a persistent cache
3 Oct 23
Embodiments of the present disclosure relate to methods, devices and computer program products for writing data in a disk array in a storage system.
Liam Xiongcheng Li, Xinlei Xu, Jian Gao, Lifeng Yang, Yousheng Liu
Filed: 23 Oct 18
Utility
Generating hexadecimal trees to compare file sets
3 Oct 23
First and second trees having entities identified by hexadecimal values are generated.
Yossef Saad, Itay Glick
Filed: 6 May 22
Utility
Method, electronic device, and computer program product for data transmission
3 Oct 23
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for data transmission.
Qiang Chen, Zhenzhen Lin, Si Chen
Filed: 23 Feb 21
Utility
Differential snapshot without array support
26 Sep 23
Methods, apparatus, and processor-readable storage media for implementing differential snapshots without array support are provided herein.
Thomas L. Watson
Filed: 30 Nov 20
Utility
Anomaly-based ransomware detection for encrypted files
26 Sep 23
Techniques are provided for anomaly-based ransomware detection of encrypted files.
Or Herman Saffar, Amihai Savir
Filed: 31 Jul 18