4565 patents
Page 87 of 229
Utility
Serverless solution for optimization of object versioning
22 Mar 22
One example method includes implementing a function as a service (FaaS) at a datacenter by performing operations including receiving an application program interface (API) gateway call from a client application, wherein the API gateway call is associated with an object PUT request, and automatically triggering, with the API gateway call, performance of an object insertion function.
Assaf Natanzon, Yossef Saad
Filed: 26 Oct 18
Utility
System and method for policy based migration using Mtree replication with data protection applications
22 Mar 22
Embodiments are described for performing online migration of backup appliances in automated and monitored process from a backup application.
Scott Quesnelle, Gururaj Kulkarni
Filed: 17 Dec 19
Utility
Parallel processing database system
22 Mar 22
A method and system for executing database queries in parallel using a shared metadata store.
Caleb E. Welton, Hitoshi Harada, Jeffrey Ira Cohen, Lei Chang, Radhika Reddy, Tao Ma, Zhanwei Wang
Filed: 9 Jan 20
Utility
Host device with path selection modification responsive to mismatch in initiator-target negotiated rates
15 Mar 22
An apparatus comprises at least one processing device that includes a processor coupled to a memory.
Vinay G. Rao, Sanjib Mallick, Arieh Don
Filed: 26 Dec 19
Utility
Method and apparatus for optimizing performance of a storage system
15 Mar 22
A method for optimizing performance of a storage system includes creating a structured state index from a universe of I/O traces of memory access operations in a storage system.
Vinicius Michel Gottin, Jonas Furtado Dias, Tiago Salviano Calmon, Alex Laier Bordignon, Daniel Sadoc Menasché
Filed: 9 Jul 19
Utility
Adaptive distributive data protection system
15 Mar 22
Embodiments for protecting data stored and transmitted in a computer network, by receiving confidential data from a client, the data organized into labeled fields and corresponding data elements; filtering the received data to identify fields that require data masking; generating a security prediction on the corresponding data elements using a machine learning process; separating the masked data into tokenized data having a respective token associated with each corresponding data element; and storing the tokenized data on a blockchain secure ledger to ensure integrity of the received data and prevent an ability to tamper with the received data.
Gregsie Leighton, Julius Bernotas, Vaidotas Simaitis
Filed: 3 May 19
Utility
Application aware copy data management of apps deployed in public cloud environments
15 Mar 22
One example method includes discovering an application instance on a host, reporting the existence of the application instance, discovering application components of the application instance, and mapping the application components to information concerning an underlying filesystem and information concerning an underlying physical drive.
Sunil Kumar
Filed: 31 Jan 20
Utility
Method for upgrading system, electronic device, and computer program product
15 Mar 22
Embodiments of the present disclosure relate to a method for upgrading a system, an electronic device, and a computer program product.
Min Liu, Ming Zhang, Qi Wang, Yuanyi Liu, Weiyang Liu
Filed: 31 May 20
Utility
Storage-efficient DR for edge devices
15 Mar 22
One example method includes receiving multiple raw data streams, each of the raw data streams including data generated and/or collected by a respective IoT device, storing the data of the raw data streams, splitting the data of the raw data streams into ‘N’ storage data streams, and transmitting each of the storage data streams to a different respective storage node.
Yossef Saad
Filed: 16 Oct 19
Utility
Method, electronic device, and computer storage medium for information processing
15 Mar 22
A method, an electronic device, and a computer-readable storage medium for information processing are provided according to example embodiments of the present disclosure.
Chenxi Hu, Shixu Dong
Filed: 15 May 20
Utility
System and method for selecting a redundant array of independent disks (RAID) level for a storage device segment extent
15 Mar 22
A method, computer program product, and computing system for receiving telemetry data associated with a plurality of storage devices.
Nickolay Dalmatov, Mikhail Danilov
Filed: 22 May 20
Utility
Maintenance management on backup storage systems
15 Mar 22
Maintenance management on backup storage systems.
Gururaj Kulkarni, Priyank Tiwari, Michal Jacek Drozd
Filed: 7 Aug 20
Utility
System and method for auto recovery of deleted virtual machines identified through comparison of virtual machine management application snapshots and having corresponding backups at a storage device
15 Mar 22
A method for managing virtual machines includes selecting a virtual machine (VM) on a recoverable deleted VMs List, and initiating recovery of the VM on the production host.
Priyank Tiwari, Gururaj Kulkarni
Filed: 25 Apr 19
Utility
Storing erasure coded data based on reliability of storage devices
15 Mar 22
The disclosed technology is generally directed towards selecting storage devices, based on predicted reliability, for storing erasure coded data fragments and coding fragments.
Mikhail Danilov, Yohannes Altaye
Filed: 1 Sep 20
Utility
Method, electronic device, and computer program product for selecting backup destination
15 Mar 22
Implementations of the present disclosure provide a method, an electronic device, and a computer program product for selecting a backup destination.
Zhen Jia, Qi Wang, Yun Zhang, Ren Wang, Jing Yu
Filed: 16 Oct 20
Utility
Autonomous data protection
15 Mar 22
Embodiments of the present disclosure relate to autonomous data protection.
Owen Martin, Jeffrey Wilson
Filed: 20 Apr 20
Utility
Method and system for minimizing rolling database recovery downtime
15 Mar 22
A method and system for minimizing rolling database recovery downtime.
Navneet Upadhyay, Shelesh Chopra, Amith Ramachandran
Filed: 6 Sep 19
Utility
Rescue package for uncontrollable splitters
15 Mar 22
A data protection system configured to replicate data may generate rescue packages that allow the system to recover when communication between a splitter or source of the production data being replicated and an appliance that stores the replicated data is disrupted.
Jehuda Shemer, Saar Cohen, Kfir Wolfson, Itay Azaria
Filed: 27 Feb 20
Utility
Method and apparatus for identifying high importance devices of a consistency group
15 Mar 22
A consistency group is defined to include a set of required devices on a set of storage systems.
Dennis Trulli, Jr., Peter Callewaert
Filed: 1 Oct 20
Utility
Run-time determination of application performance with low overhead impact on system performance
15 Mar 22
Techniques are disclosed for determining the run-time performance of an application executing on a computing system with low impact on the performance of the computing system.
Farzad Khosrowpour, Amihai Savir, Anat Parush Tzur
Filed: 29 Jan 19