4565 patents
Page 85 of 229
Utility
Method, device and computer program product for managing data replication
29 Mar 22
Embodiments of the present disclosure provide a method, a device and a computer program product for managing data replication.
Eason Jiang, Felix Peng, Eddie Dai, Fubin Zhang, Beryl Wang
Filed: 27 Feb 19
Utility
Methods and systems for logging data transactions and managing hash tables
29 Mar 22
A method for storing transaction records includes receiving, by a transaction log manager, a first commit request for a first transaction record from a first core, copying, based on the first commit request, the first transaction record to a first region of memory, making a first determination that the first region surpasses a space threshold, and copying, based on the first determination, a first plurality of transaction records from the first region to storage, wherein the first plurality of transaction records comprises the first transaction record.
Jean-Pierre Bono, Marc A. De Souter
Filed: 1 Nov 19
Utility
Pluggable storage system for distributed file systems
29 Mar 22
A method, article of manufacture, and apparatus for managing data.
Lei Chang, Tao Ma, Zhanwei Wang, Lirong Jian, Lili Ma, Gavin Sherry
Filed: 17 Sep 19
Utility
Storage system with data consistency checking in synchronous replication using active snapshot set
29 Mar 22
An apparatus comprises at least one processing device configured to define a consistency group comprising a plurality of storage volumes subject to replication from a source storage system to a target storage system.
Yuval Harduf, Xiangping Chen, David Meiri
Filed: 22 Jan 19
Utility
Data protection based on cybersecurity feeds
29 Mar 22
Data protection based on cybersecurity feeds is described.
Amihai Savir, Assaf Natanzon, Avitan Gefen
Filed: 25 Apr 19
Utility
Filename-based malware pre-scanning
29 Mar 22
Filename-based malware pre-scanning is described herein.
Avadut Mungre, Jai Prakash Gahlot, Shiv Shankar Kumar
Filed: 13 Sep 19
Utility
Method to input content in a structured manner with real-time assistance and validation
29 Mar 22
A user-defined, structured input which identifies a column in a database and includes an active input associated with the column is received via a UI.
Kai Chen, Ping Chen, Michael John Dutch, Bo Chen, Christopher Hercules Claudatos, Feng Shao
Filed: 15 Mar 16
Utility
Centralized transaction tracking using multi-blockchain technology
29 Mar 22
Methods, apparatus, and processor-readable storage media for centralized transaction tracking using multi-blockchain technology are provided herein.
Sudeshna Dash, Anitha Bhavani Chimata, Muvvala Venkata Lakshmi Mounica, Lakshmi Kottali
Filed: 30 Oct 19
Utility
Method and system for a signed document validity service
29 Mar 22
A method for managing documents includes obtaining, from a first computing device, a first signed document, and in response to obtaining the first signed document: identifying a first plurality of validity services associated with the signed document, sending a verification request to the first plurality of validity services, wherein each of the plurality of verification requests specifies the first signed document, obtaining a plurality of verification responses from the first plurality of validity services, and making a determination, based on the plurality of verification responses, that the first signed document is valid.
Radia Joy Perlman, Charles William Kaufman
Filed: 2 Aug 19
Utility
Malicious data manipulation detection using markers and the data protection layer
29 Mar 22
Embodiments for detecting malicious modification of data in a network, by: setting, by a first layer of network resources, a number of markers associated with input/output (I/O) operations of the network; saving the markers, location, and associated metadata in a marker database; reading, by a second layer of the network resources, the markers corresponding to relevant I/O operations; and verifying each scanned I/O operation against a corresponding marker to determine whether or not data for a scanned specific I/O operation has been improperly modified for the first and second layers and any intermediate layer resulting in a fault condition, and if so, taking remedial action to flag or abort the specific I/O operation.
Kfir Wolfson, Udi Shemer, Amos Zamir
Filed: 26 Apr 19
Utility
Common model for pairing physical and/or cloud-based storage systems for data mobility
29 Mar 22
Techniques for providing a common object model for storage systems that facilitates the performance of data mobility use cases.
Vasu Yadlapalli, Girish Sheelvant, Matthew P. Jean
Filed: 2 Apr 21
Utility
Community-based anomaly detection policy sharing among organizations
22 Mar 22
Techniques are provided for community-based anomaly detection policy sharing among organizations.
Alex Zaslavsky, Salah E. Machani
Filed: 25 Jan 19
Utility
Generating a data stream with configurable commonality
22 Mar 22
One example method includes receiving ‘n’ data streams, where ‘n’ is ≥2, receiving a commonality parameter ‘F’, creating a mixed data stream having a commonality of ‘F’ by mixing data from the ‘n’ data streams together, and outputting the mixed data stream.
Salil Dangi, Ernest Daza
Filed: 19 Apr 19
Utility
Connection management during non-disruptive upgrade of nodes
22 Mar 22
Connection of clients to nodes associated with a storage system can be managed during non-disruptive upgrades (NDUs) of software or firmware of nodes.
Shiv Kumar, Avadut Mungre
Filed: 23 Jan 20
Utility
Decentralized and distributed continuous replication system for moving devices
22 Mar 22
A replication system for data of mobile devices is disclosed.
Assaf Natanzon, Kfir Wolfson, Jehuda Shemer
Filed: 21 Sep 20
Utility
Automated storage network reconfiguration for heterogeneous storage clusters
22 Mar 22
An apparatus includes a processing device configured to receive a request to change a given storage network from a first to a second configuration, the given storage network being associated with a heterogeneous storage cluster comprising a plurality of storage targets and initiators having first network addresses in the first configuration.
Dmitry Vladimirovich Krivenok
Filed: 28 Oct 20
Utility
Method and apparatus for managing storage system
22 Mar 22
Embodiments of the present disclosure provide methods, apparatuses and computer program products for managing a storage system.
Bob Biao Yan, Bernie Bo Hu, Jia Huang, Jessica Jing Ye, Vicent Qian Wu
Filed: 24 Apr 20
Utility
Method, device and computer program product for managing memory of dedicated processing resource
22 Mar 22
A method comprises determining, in a process of storing data for a computing task of a first dedicated processing resource of a set of dedicated processing resources to the first dedicated processing resource, a size of an available space of a memory of the first dedicated processing resource; in response to the size of the available space of the memory of the first dedicated processing resource being lower than a predetermined threshold value, determining a second dedicated processing resource of the set of dedicated processing resources, a size of an available space of a memory of the second dedicated processing resource is greater than the predetermined threshold value; and causing at least one portion of the data not stored on the memory of the first dedicated processing resource to be stored on the memory of the second dedicated processing resource.
Junping Zhao, Kun Wang
Filed: 26 Apr 19
Utility
Disk array enclosure with metadata journal
22 Mar 22
A storage system comprises a disk array enclosure comprising an enclosure controller, a cache comprising a metadata journal, a plurality of data storage devices and a plurality of metadata storage devices.
Boris Glimcher, Amitai Alkalay
Filed: 25 Feb 20
Utility
Multi-generational virtual block compaction
22 Mar 22
A method, system, and computer program product for multi-generational virtual block compaction comprising identifying a first virtual block, the first virtual block being associated with a first generation number, determining a second virtual block as an appropriate target for live information in the first virtual block, creating an association between the second virtual block and the first virtual block, updating the live information in the first virtual block to be associated with the second virtual block, updating a generation information mapping associated with the first virtual block; and associating a second generation number with the first virtual block.
Ashok Tamilarasan, Vamsi Vankamamidi, Philippe Armangau
Filed: 1 Jul 19