4565 patents
Page 81 of 229
Utility
Method, device and computer program product for recovering data
26 Apr 22
Techniques involve determining whether data read from a redundant array of independent disks (RAID) is corrupted, the RAID including two parity disks.
Haiying Tang, Zhilong Wu, Jianbin Kang, Rongrong Shang, Jian Gao
Filed: 17 Sep 20
Utility
Method for approximating similarity between objects
26 Apr 22
Systems and methods for determining similarity between sets of objects are disclosed.
Peter Marelas
Filed: 27 Apr 18
Utility
Method, apparatus and computer program product for data replication
26 Apr 22
Techniques perform data backup.
Hongru Xu, Tianfang Xiong, Qiu Shang, Yue Qian, Fei Long
Filed: 21 Mar 19
Utility
Data placement method based on health scores
26 Apr 22
Embodiments described herein relate to techniques for placing backup data based on health scores.
Parmeshwr Prasad, Bing Liu, Rahul Deo Vishwakarma
Filed: 29 May 20
Utility
Automated capture and recovery of applications in a function-as-a-service environment
26 Apr 22
An apparatus in one embodiment comprises at least one processing platform including a plurality of processing devices.
Assaf Natanzon, Amit Lieberman
Filed: 24 Oct 17
Utility
Selecting optimal disk types for disaster recovery in the cloud
26 Apr 22
Embodiments for providing automated selection of optimal disk types for virtualized storage by defining a minimum number of backup samples, selecting, if the minimum number of backup samples is not met for a backup operation, a solid state drive (SSD) for a virtual machine (VM) storage for a disaster recovery operation, otherwise selecting a hard disk drive (HDD) for the VM storage.
Boris Shpilyuck, Jehuda Shemer, Tomer Kushnir
Filed: 3 Aug 20
Utility
Creating and distributing spare capacity of a disk array
26 Apr 22
A subset of drives with protection groups that have D data members and P parity members is created with (W+1) drives each having W partitions where W=(D+P).
Kuolin Hua, Kunxiu Gao
Filed: 2 Oct 20
Utility
Diagnosing and remediating errors using visual error signatures
26 Apr 22
A method includes detecting an error that has occurred in one or more assets of an enterprise system and generating a visual error signature of the detected error, the visual error signature comprising at least a portion of a graph-based visualization of operation of the assets.
Mohammad Rafey
Filed: 24 Oct 19
Utility
Method, apparatus, and computer program product for indexing a file
26 Apr 22
Techniques index a file.
Donglei Wang, Zhiqiang Li, Lei Gao
Filed: 16 Jan 19
Utility
Opportunistic partial deduplication
26 Apr 22
A technique for managing deduplication performs partial-block matching opportunistically by leveraging information acquired during times when a storage system has available resources.
Ronen Gazit, Uri Shabi
Filed: 30 Oct 19
Utility
Data deduplication acceleration
26 Apr 22
Techniques for data deduplication may include: receiving write operations that write first data; partitioning the first data into a plurality of data portions; generating, using a first hash function, a plurality of data deduplication hash values for the plurality of data portions, wherein a first data deduplication hash value of the plurality of data deduplication hash values is produced by said generating for a first of the plurality of data portions; performing first processing using a Bloom filter to determine whether the first data deduplication hash value has a corresponding first entry in a data store of deduplication hash values; and responsive to the first processing determining the first data deduplication hash value does not have the corresponding first entry in the data store of deduplication hash values, performing second processing, said second processing including adding the corresponding first entry in the data store of deduplication hash values.
Steven Chalmer, Jonathan Krasner, Chakib Ouarraoui, Serge J. Pirotte
Filed: 4 May 20
Utility
Implementing parameter server in networking infrastructure for high-performance computing
26 Apr 22
Techniques are provided for implementing a parameter server within a networking infrastructure of a computing system to reduce the communication bandwidth and latency for performing communication synchronization operations of the parameter server.
Dragan Savic, Junping Zhao
Filed: 23 Apr 18
Utility
Workflow optimization
26 Apr 22
A computer implemented method, computer program product, and system for managing execution of a workflow comprising a set of subworkflows, comprising optimizing the set of subworkflows using a deep neural network, wherein each subworkflow of the set of subworkflows has a set of tasks, wherein each task of the sets of tasks has a requirement of resources of a set of resources; wherein each task of the sets of tasks is enabled to be dependent on another task of the sets of tasks, training the deep neural network by: executing the set of subworkflows, collecting provenance data from the execution, and collecting monitoring data that represents the state of said set of resources, wherein the training causes the neural network to learn relationships between the states of said set of resources, the said sets of tasks, their parameters and the obtained performance, optimizing an allocation of resources of the set of resources to each task of the sets of tasks to ensure compliance with a user-defined quality metric based on the deep neural network output.
Jonas F. Dias, Angelo Ciarlini, Romulo D. Pinho, Vinicius Gottin, Andre Maximo, Edward Pacheco, David Holmes, Keshava Rangarajan, Scott David Senften, Joseph Blake Winston, Xi Wang, Clifton Brent Walker, Ashwani Dev, Chandra Yeleshwarapu, Nagaraj Srinivasan
Filed: 16 Aug 18
Utility
Method, device, and computer program product for storing and providing video
26 Apr 22
Embodiments of the present disclosure relate to a method, a device, and a computer program product for storing and providing a video.
Qin Liu, Jie Liu
Filed: 30 Jun 20
Utility
Method and apparatus for increasing the accuracy of predicting future IO operations on a storage system
26 Apr 22
A method of increasing the accuracy of predicting future IO operations on a storage system includes creating a snapshot of a production volume, linking the snapshot to a thin device, mounting the thin device in a cloud tethering subsystem, and tagging the thin device to identify the thin device as being used by the cloud tethering subsystem.
Deepak Vokaliga, Rong Yu
Filed: 3 Sep 20
Utility
Automated stateful counter aggregation of device data
26 Apr 22
Methods, apparatus, and processor-readable storage media for automated stateful counter aggregation of device data are provided herein.
Kevin S. Labonte, Vijayagomathi Ramasamy, Kshitij Patel, Peter Beale
Filed: 31 Jan 20
Utility
Security for network environment using trust scoring based on power consumption of devices within network
26 Apr 22
Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security mechanisms for network environments.
Mohamed Sohail, Said Tabet
Filed: 19 Jun 19
Utility
System and method for secure communication channel establishment
26 Apr 22
Embodiments described herein relate to techniques for establishing a secure communication channel.
Venkata L. R. Ippatapu, Kenneth M. Dorman
Filed: 6 Dec 19
Utility
Cluster group change preparation techniques
19 Apr 22
Described herein are technologies directed to cluster group change preparation techniques.
Antony Richards, Douglas Kilpatrick
Filed: 23 Jan 20
Utility
Method and system creating and using data confidence fabric processing paths
19 Apr 22
In general, in one aspect, the invention relates to a method for managing data, the method includes performing, by a data confidence fabric (DCF) node, a trust operation with a remote DCF node, updating, based on the trust operation, a trust level associated with the remote DCF node to obtain an updated trust level, integrating, based on the updated trust level, the remote DCF node into a DCF processing path to obtain a second DCF processing path, wherein the DCF processing path comprises the DCF node, and processing data using the second DCF processing path.
Stephen James Todd, Jason A. Shepherd
Filed: 28 Oct 19