|
陈立新 张琳 黄颖:中美欧日韩五局专利报告3561.docx
█武汉大学科教管理与评价研究中心 陈立新 张琳 黄颖
2022年,易安信知识产权公司获得美国发明专利1289项,比上一年增长了4%,是获得美国专利数量第22多的机构。
相对来讲,易安信知识产权公司专利研发的优势领域是:计算机一般部件、计算机接口、数据库与信息检索、计算机核心部件、计算机安全。其在这5个技术领域上的专利份额相对较高,为3.9%至1.1%。
表18.22-1 2022年易安信知识产权公司主要技术领域的专利分布
技术领域 | 专利数量 | 占比(%) | |
1 | 计算机一般部件 | 657 | 3.9% |
2 | 计算机接口 | 507 | 2.8% |
3 | 数据库与信息检索 | 394 | 2.6% |
4 | 计算机核心部件 | 292 | 1.8% |
5 | 计算机安全 | 83 | 1.1% |
6 | 网络协议 | 222 | 1.0% |
7 | 数据交换网络 | 79 | 0.8% |
8 | 人工智能 | 101 | 0.7% |
9 | 计算机应用与软件 | 88 | 0.7% |
10 | 管理系统与电商 | 45 | 0.3% |
11 | 数据与图像识别 | 38 | 0.2% |
12 | 计算机辅助设计 | 5 | 0.2% |
13 | 电气元件与电路 | 29 | 0.1% |
14 | 图像处理 | 7 | 0.1% |
15 | 物理信号与控制 | 7 | 0.0% |
16 | 通信传输系统 | 4 | 0.0% |
17 | 广播电视与电话 | 8 | 0.0% |
18 | 无线通信网络 | 7 | 0.0% |
19 | 显示展示与声学 | 3 | 0.0% |
20 | 物理测量 | 3 | 0.0% |
注:占比(%)指其在某领域上的专利数量占该领域的比例。
从绝对数量上来看,易安信知识产权公司的重点技术领域是:计算机一般部件、计算机接口、数据库与信息检索、计算机核心部件、网络协议。其在这5个技术领域上的专利数量最多,为657至222项。
可见,易安信知识产权公司的专利技术研发重点主要集中在计算机一般部件领域。
从发明人来看,2022年易安信知识产权公司的研发人员较多,达到1500人,人均发明专利1.23项。其中,Gao Jian、Chopra Shelesh、Danilov Mikhail、Han Geng、Xu Xinlei、Don Arieh、Armangau Philippe、Natanzon Assaf、Shveidel Vladimir、Meiri David等人的专利数量较多,高达58至28项。
图18.22-1 2022年易安信知识产权公司在20个相对优势领域中的专利占比
感谢大连理工大学刘则渊教授、河南师范大学梁立明教授、科技部中国科学技术发展战略研究院武夷山研究员对本报告的支持与帮助。同时,向以不同形式对本报告提出意见和建议的专家学者们表示诚挚的感谢。
附表18.22-1 2022年易安信知识产权公司的美国局授权发明专利
Patent No. | Title | Inventors |
11215409 | Fixing device for double sided heat sink and associated heat dissipating system | Zhai Haifang; Wu Hendry; Dong David; Zhou Yujie |
11216186 | Managing inline data compression in storage systems | Armangau Philippe; Bassov Ivan; Chaudhary Monica; Karri Ajay |
11216195 | Sharing blocks of non-volatile data storage to support cache flushes in a multi-node data storage system | Armangau Philippe; Vankamamidi Vamsi K.; Caram Bruce E.; Karri Ajay |
11216197 | System and method for smart pool space reclamation | Wang Leonid; Costa Kent J.; Zhou Haitao Kenny; Zhang Feng; Sun Jiajie |
11216198 | Method, device and computer program product for data processing | Gao Jian; Gong Shaoqin; Yang Lifeng; Xu Xinlei; Li Xiongcheng |
11216199 | Applying deduplication digests to avoid same-data writes | Armangau Philippe; Chaudhary Monica; Karri Ajay; Daniel Alexander |
11216200 | Partition utilization awareness of logical units on storage arrays used for booting | Kanjirathinkal Joseph G.; Charles Peniel; Mohanan Shamin P. |
11216201 | Caching and data promotion techniques | Martin Owen; Desyatov Vladimir; Moreau Mark D.; Zentz Dustin H.; Raghunathan Anoop; Reilly Sean B. |
11216205 | Intelligent checkpoint page server for containers | Fong Victor; Durazzo Kenneth |
11216263 | Policy-based automated generation of software-defined storage deployments | Dawe Trevor H.; Gallacher Sean R.; Young Eric |
11216314 | Dynamic reallocation of resources in accelerator-as-a-service computing environment | Harwood John S.; Natanzon Assaf |
11216316 | Facilitating object deletion based on delete lock contention in distributed file systems | Sproat Lisa; Steinke Ron; Kilpatrick Douglas |
11216340 | Adaptive change of redundancy level of raid | Ma Chun; Yang Lifeng |
11216351 | System program change detection via parallel monitoring techniques | Bergantino Matthew |
11216388 | Tiering between storage media in a content aware storage system | Kucherov Anton; Meiri David |
11216413 | Processing platform configured for data set management utilizing metadata-based data set operational signatures | Nanda Nihar; Reiner David Stephen |
11216427 | Method, electronic device and computer-readable medium for managing metadata | Zhang Alex Pengbo; Chen Xiao |
11216443 | Processing device configured for data integrity testing utilizing signature-based multi-phase write operations | Meiri David; Kucherov Anton |
11216483 | Methods, electronic devices and computer program product for replicating metadata | Chen Xiao; Ding Richard |
11216778 | Automatic detection of disruptive orders for a supply chain | Saffar Or Herman; Garg Mridul Vinay; Ben-Harush Oshry |
11217324 | Validating data in storage systems | Liu Yousheng; Yang Lifeng; Jia Ruiyong; Xu Xinlei; Gao Jian |
11218294 | Anonymized storage of monitoring data | Moriarty Kathleen; Seibel Amy; Robbins Alex; Santaus Benjamin |
11218318 | Two-step data deletion having confirmation hold | Ducker Zachary Ian |
11218361 | System, method, apparatus, and computer program product for enabling management of a converged infrastructure through a user interface | Dolinsky Todd J.; Fontanez Jonathan; Hansen Nicholas A.; Bonczkowski Joshua L. |
11221786 | Fast recovery in recoverpoint using direct storage access | Solan Alex; Shemer Jehuda; Benhanokh Gabi |
11221862 | Capturing data from a live web application to populate a demo application | Hally Aidan; O'Mahony Conor E.; O'Connell Caroline |
11221921 | Method, electronic device and computer readable storage medium for data backup and recovery | Zhang Jimmy; Deng Hong; Wang Sammi Hongying |
11221943 | Creating an intelligent testing queue for improved quality assurance testing of microservices | Gamliel Roi; Savir Amihai; Gefen Avitan |
11221948 | Coordinated reclaiming of data storage space | Armangau Philippe; Vankamamidi Vamsi K.; Karri Ajay; Wang Yubing |
11221964 | Allocating adjacent file parts to different virtual cylinder groups mapped to physical storage devices | Steinke Ronald |
11221975 | Management of shared resources in a software-defined storage environment | Puder Avi; Keller Itay; Tcharny Galina; Koren Dvir; Sahar Jonathan; Grimberg Benjamin |
11221983 | Multi-level indexing of backup files | Chakravarthy Arun; Hu Ning |
11221991 | Techniques for selectively activating and deactivating entropy computation | Bassov Ivan; Armangau Philippe; Faibish Sorin; Gonczi Istvan |
11221993 | Limited deduplication scope for distributed file systems | Desai Rajiv; Tolia Niraj |
11222005 | Proactive storage system configuration consistency validation | Wu Eric; Zhou Haitao; Wu Jun; Khokhar Muzhar; Sun Jiangping; Wu Minqiang |
11222017 | Storage system query mechanism and techniques | Liubovich Ilya; Michel Ruben; Suryanarayan Satish; Zeliger Ohad |
11222072 | Graph database management system and method for a distributed computing environment | Bourne Geoffrey D. |
11222449 | Smart visualization transformation for intuitive presentations | Ram Mohan Maddala Rakesh; Ramamurthy Timothy; Subramanian Rameshkrishnan |
11223473 | Client-driven shared secret updates for client authentication | Mullins Brian C.; Bowers Kevin |
11223484 | Enhanced authentication method for Hadoop job containers | Wang Dong |
11223623 | Method, apparatus and non-transitory processor-readable storage medium for providing security in a computer network | Kolman Eyal; Mendelson Assaf; Gulko Eugene; Karpati Dan |
11223654 | System and method for managing secured communication channel sessions for applications sharing a port | Ippatapu Venkata L. R.; Dorman Kenneth M. |
11223679 | Host device with multi-path layer configured for detection and reporting of path performance issues | Rao Vinay G.; Mallick Sanjib; Nuthakki Krishna Deepak; Don Arieh |
11224140 | Top cover arrangement for a storage and the corresponding storage | Zhai Haifang; Zhou Yujie; Guo Qingqiang; Zuo Weidong; Xu Wenjin Seraph |
11226739 | Method, device and computer program product for storage management | Zhao Jingrong; Zheng Qingxiao; Li Kerry; Wang Yi |
11226740 | Selectively performing inline compression based on data entropy | Shabi Uri; Kabishcer Alexei |
11226741 | I/O behavior prediction based on long-term pattern recognition | Martin Owen; Alshawabkeh Malak |
11226756 | Indirect storage data transfer | LeCrone Douglas E. |
11226758 | Volume migration using cross-appliance asymmetric namespace access group | Tylik Dmitry Nikolayevich; Gupta Mukesh; Krishna Murthy Sathya; Shem Tov Marina; Reichbach Chen |
11226774 | Deep data-compression | Vankamamidi Vamsi K.; Armangau Philippe; Cummins Daniel E.; Morley Steven A. |
11226775 | Extracting drive letters for partitions in an offline virtual disk | Tewari Abinas |
11226778 | Method, apparatus and computer program product for managing metadata migration | Zhao Zhenhua; Xia Sihang; Feng Changyu; Xu Xinlei |
11226836 | Dynamic restructuring of user interface based on usage data | Holland Elaine; McSweeney Paul J. |
11226851 | Execution of multipath operation triggered by container application | Marappan Gopinath; Singhal Maneesh |
11226865 | Mostly unique file selection method for deduplication backup systems | Wong Tony; Satyanarayana Hemanth; Duggal Abhinav |
11226868 | Replication link smoothing using historical data | Stronge William; Meiri David |
11226871 | Efficient targeted file-level restore from cloud snapshots | Ghodake Ganesh; Patil Sachin |
11226877 | Hybrid NVRAM logging in filesystem namespace | Shang Pengju; Mathew George; Bhagwat Dhawal; Singh Pranay; Koay Englin |
11226881 | Responding to a fault of a disk which stores metadata and user data in different disk slices | Sun Lei; Kang Jianbin; Han Geng; Xu Xinlei; Gao Jian |
11226882 | Method and device for data center management | Peng Layne; Lin Lynn; Huang Peter; Xia Sharon; Xia Guowu |
11226935 | Method, device and computer program product for determining duplicated data | Zhang Ming; Gong Chen; Lv Shuo |
11227058 | System and method for shredding a forum of secrets | Chiu Naizhong; Lazar Gregory W.; Heard Grace L. |
11227222 | System and method for prioritizing and preventing backup failures | Vishwakarma Rahul Deo; Chopra Shelesh; Prasad Parmeshwr |
11227323 | Smart software recommendation using an application network | Goshen Idan Richman; Gefen Avitan; Savir Amihai; Gaber Shiri |
11228322 | Rebalancing in a geographically diverse storage system employing erasure coding | Danilov Mikhail; Altaye Yohannes |
11228545 | Cross application granular restore of backed-up email attachments | Chopra Shelesh; Yadav Sunil; Behera Amarendra; Chitloor Ravi Vijayakumar; Arora Himanshu; Dethe Tushar; Singh Deependra; Dubey Prabhat Kumar; Rao Anjana; Chauhan Sapna |
11231857 | Methods, apparatuses and computer program products for processing and managing storage unit access | Xia Sihang; Zhao Zhenhua; Feng Changyu; Xu Xinlei; Li Xiongcheng |
11231859 | Providing a RAID resiliency set from a plurality of storage devices | Han Geng; Lee Shuyu; Gao Jian; Gao Hongpo; Kang Jamin; Dong Jibing |
11231860 | Doubly mapped redundant array of independent nodes for data storage with high performance | Danilov Mikhail; Altaye Yohannes |
11231861 | Host device with active-active storage aware path selection | Mallick Sanjib; Rao Vinay G.; Don Arieh |
11231867 | Data replication using deduplication and synchronized hash tables | Ippatapu Venkata L R; Dorman Kenneth |
11231869 | Method, electronic device, and computer program product for processing data | Zhao Shijie; Cai Colin Yuanfei; Wang Qirong; Gao Bei |
11232002 | Method and system for seamless database backup live-mounting using self-contained database backups | Upadhyay Navneet; Chopra Shelesh |
11232005 | Method, device, and computer program product for managing storage system | Lv Shuo; Liu Qingyun |
11232009 | Model-based key performance indicator service for data analytics processing platforms | Vijendra Sudhir; Krishnaswamy Shashidhar |
11232010 | Performance monitoring for storage system with core thread comprising internal and external schedulers | Kamran Lior; Kleiner Vladimir |
11232025 | Method, device and computer program product for storage management | Lei Lu; Wu Young Yangchun |
11232036 | Managing write access to data storage devices for spontaneous de-staging of cache | Benhanokh Gabriel; Chanler Andrew L.; Don Arieh |
11232043 | Mapping virtual block addresses to portions of a logical address space that point to the virtual block addresses | Patel Dixitkumar Vishnubhai; Chawla Rohit K.; Sen Soumyadeep |
11232072 | Method and apparatus for file system | Zhai Jia; Zhou Yingchao; Wang Wengang; Guo Jun; Zhang Sen |
11232074 | Systems and methods for searching deduplicated data | Shilane Philip |
11232075 | Selection of hash key sizes for data deduplication | Bassov Ivan; Faibish Sorin; Rafikov Rustem |
11232128 | Storage systems configured with time-to-live clustering for replication in active-active configuration | Meiri David |
11233796 | Data-driven attribute selection for user application entitlement analysis | Li Zhou; Zaslavsky Alex; Bowers Kevin |
11237738 | Managing operation of a data storage system with reservation of metadata space | Li Xiongcheng; Vankamamidi Vamsi K.; Xu Xinlei; Gao Jian; Han Geng |
11237740 | Automatically determining sizing configurations for storage components using machine learning techniques | Thakkar Bina K.; Gowda Deepak; Liu Wenjin |
11237743 | Sub-block deduplication using sector hashing | Shabi Uri; Shveidel Vladimir; Rahamim Maor; Gazit Ronen |
11237749 | System and method for backup data discrimination | Bansal Aaditya Rakesh; Yadav Sunil; Sharma Manish |
11237771 | Transactional update system and method | Shveidel Vladimir; David Bar |
11237914 | Intelligent handling of consistency level of virtual machines | Rakesh Aaditya; Yadav Sunil |
11237916 | Efficient cloning of logical storage devices | Chandrashekhara Sandeep; Ferrari Michael; Wilson Jeffrey; Halstead Mark J.; Longden Art |
11237921 | Protecting storage backup configuration | LeCrone Douglas E.; Linstead Paul A.; Quinn Brett A.; Burt Denis J. |
11237964 | Caching techniques for migrating and replicating data | Kucherov Anton; Meiri David |
11238010 | Sand timer algorithm for tracking in-flight data storage requests for data replication | Hu Ying; Chen Xiangping |
11238011 | Intelligent method to index storage system files accounting for snapshots | Morton James; Zhang Ming; Liu Weiyang; Su Lihui; Liu Min |
11238020 | Maintaining temporal associations for event data in an event database | D'Souza Aldrin; Douglas Kevin T. |
11238063 | Provenance-based replication in a storage system | Meiri David; Kucherov Anton |
11238157 | Efficient detection of ransomware attacks within a backup storage environment | Saad Yossef; Glick Itay |
11240005 | Method and system for querying a secure database located on an untrusted device | Perlman Radia Joy; Kaufman Charles William |
11240024 | Cryptographic key management using key proxies and generational indexes | Villapakkam Sridhar; Bhagwat Ajit; Caccavale Frank Samuel |
11240121 | Methods and systems for controlling data backup | Zhang Simon Yuting; Gao Gluth Xuedong; Peng Felix Fei; Dai Eddie Wenhao; Lin Aaron Chao |
11240209 | Data transfer in a data protection system | Jauhal Shern S.; Quesnelle Scott |
11240295 | Intelligent service distributor and controller with real time service calibration | Panikkar Shibi; Devendranath Murali |
11243705 | Method and system for policy class based data migration | Perneti Jayanth Kumar Reddy; Vishwakarma Rahul Deo |
11243717 | Method, electronic device and computer program product for processing data | Liu Bing; Chen Tao |
11243780 | System and method for operating system installation using a dual-flash device | Yu Xinghai; Zou Colin |
11243829 | Metadata management in data storage systems | Krasner John; Duquette Jason |
11243843 | Method and system for optimizing backup and backup discovery operations using change based metadata tracking (CBMT) | Behera Amarendra; Dethe Tushar B.; Arora Himanshu; Soma Gururaj; Bagchi Krishnendu; Chopra Shelesh |
11243845 | Method and device for data backup | Zhao Frank Junping; Bao Jie; Wang Kun; Sun Ricky Yuxi |
11243850 | Image recovery from volume image files | Mam Neelabh; Mandic Vladimir; Shankar Ravi |
11243851 | Intelligent storage and recovery of backup data using multiple storage tiers of a cloud-based storage | Saad Yossef; Solan Alex |
11243872 | Generating and aggregating test result data of a distributed system of devices into a test case result for facilitating access of the test case result via a single iterator | Bryan Matthew; Van Voorhis, II Henry Courtlandt |
11243890 | Compressed data verification | Wu Peng; Yu Rong; Gong Tao |
11243925 | Verification microservice for deployment of controller and worker nodes for verification paths | Truong Tipper; Brandt Joseph; Shilane Philip |
11243930 | System and method for scalable and space efficient hardening of a fixed sized hash table over an unreliable tier | Harel Bar; Shabi Uri; Rahamim Maor |
11243932 | Method, device, and computer program product for managing index in storage system | Liu Jie; Li Haitao; Wen Jian; Lin Chao |
11243978 | Non-centralized data synchronization for IoT and other distributed applications | Ben-David David; Wolfson Kfir; Volij Jonathan |
11245774 | Cache storage for streaming data | Paduroiu Andrei |
11249654 | Storage system with efficient data and parity distribution across mixed-capacity storage devices | Shatsky Yosef; Matosevich Rivka |
11249656 | Performance optimization for active-active locking using sticking affinity for storage objects | Shveidel Vladimir; Gazit Ronen |
11249673 | Performance of replication system with small number of IP links available | Kronrod Svetlana; Kucherov Anton |
11249692 | Data placement for raid groups of heterogeneous storage device capacities | Martin Owen |
11249800 | System and method for dynamic CPU multitasking | Kamran Lior; Zharkov Vitaly; Alkalay Amitai |
11249811 | Method, apparatus, and computer program product for processing computing task | Zhao Junping; Peng Layne Lin; Ying Zhi; Wang Kun |
11249834 | Storage system with coordinated recovery across multiple input-output journals of different types | Chen Xiangping; Kronrod Svetlana |
11249856 | Application consistent snapshots as a sidecar of a containerized application | Natanzon Assaf; Al-Alem Luay; Bett Antony; Rhodes Michael |
11249859 | System and method for intelligent backup scheduling and management | Liao Mengze; Zhang Ming; Rengasamy Karimuthu; Guo Yongsheng; Jingjing Guo |
11249862 | Method for managing backup system, electronic device and computer program product | Wang Aaron Ren; Liu Weiyang; Zhang Ming; Wang Qi; Zhang Jerry Zengjie |
11249885 | Test case generator and user interface | Yosef Ilan; Vernik Bella Bekker |
11249901 | Ownership-based garbage collection of data | Danilov Mikhail; Buinov Konstantin |
11249944 | Anomaly-based retention policies for snapshot-based data protection systems | Savir Amihai; Gefen Avitan; Wolfson Kfir; Azaria Itay |
11249946 | Path name cache for notifications of file changes | Roy Dipankar |
11249959 | Ecosystem-aware storage arrays for unified analytics using edge architecture | Govindan Balasundaram |
11252015 | Determining cause of excessive I/O processing times | Scharland Michael J.; Jung Jaeyoo; Don Arieh |
11252051 | Method, device and computer program product for configuring service instance | Guo Yongsheng; Zhang Ming; Liao Mengze; Zhang Raynor; Zhu Mike; Yu Jing |
11256420 | Method and apparatus for scaling out storage devices and scaled-out storage devices | Gao Jian; Gao Hongpo; Han Geng; Xu Xinlei; Dong Jibing |
11256421 | Path selection modification for non-disruptive upgrade of a host device | Patel Rimpesh; Anchi Amit Pundalik; Tah Arnab |
11256439 | System and method for parallel journaling in a storage cluster | Shveidel Vladimir; Kucherov Anton; Alkalay Amitai; Gazit Ronen |
11256446 | Host bus adaptor (HBA) virtualization aware multi-pathing failover policy | Patel Rimpesh; Anchi Amit Pundalik |
11256549 | Method and apparatus for thread scheduling | Shveidel Vladimir; Gazit Ronen |
11256571 | Serverless application operational recovery and manifest creation | Natanzon Assaf; Lieberman Amit |
11256573 | Method of categorizing data and its backup destination | Ambaljeri Mahantesh; Noordeen Jafarullah; Gadikar Iresha; Kandambeth Sunil Amban; Venkatasubramanyam Venkatraman |
11256574 | Method and system for backing up cloud native and non-cloud native applications | Reddy Anand; Kulkarni Gururaj |
11256575 | Methods, electronic devices and computer program products for managing and performing data backup jobs | Wang Yi; Liu Qin; Zheng Qingxiao |
11256577 | Selective snapshot creation using source tagging of input-output operations | Kumar Kundan; Iqbal Md Haris; Nayaka B Govindaraja; Gokam Kurumurthy |
11256628 | Volatile read cache in a content addressable storage system | Meiri David; Kucherov Anton |
11256677 | Method, device, and computer program product for managing storage system | Gong Yunhai; Sun Ao; Chen You |
11256678 | Reconstruction of links between logical pages in a storage system | Patel Dixitkumar Vishnubhai; Owens James O. |
11256764 | Managing content searches in computing environments | Nistala Amrita; Roy Mainak; Avinash .; Tadikamalla Vamsi Krishna |
11256881 | Data valuation via language-neutral content addressing | Todd Stephen J.; Danilov Mikhail |
11258603 | Access controls for question delegation environments | Sunkavally Naveen; Mullins Brian C. |
11258839 | Data storage management and resource scaling | Paduroiu Andrei; Satyanarayana Srikanth |
11258853 | Storage management system and method | Bono Jean-Pierre; Srinivasan Sudhir; De Souter Marc A. |
11262920 | Mapped raid (redundant array of independent disks) with drive health aware protection groups | Dalmatov Nickolay; Danilov Mikhail |
11262922 | Dynamic shared journal | Sharvit Erez; Shemer Jehuda; Lotosh Valerie |
11262925 | Performance partitioning leveraging dynamic masking change | Beckett Violet S.; Jung Jaeyoo; Don Arieh |
11262930 | Method, apparatus, and storage medium for managing stripe in storage system | Fan Huijuan; Chen Chi |
11262932 | Host-aware discovery and backup configuration for storage assets within a data protection environment | Chaturvedi Shivam; Bejjanke LahariCharan; Lochab Sanjeev; Singh Pawan; Kanp Rintu; Singhal Upanshu |
11262933 | Sharing memory resources between asynchronous replication workloads | Matosevich Rivka; Katz Evgeny; Tal Doron; Spiegelman Roman |
11262935 | Optimized distributed deduplication for distributed cluster | Liu Bing; Mathew George |
11262945 | Quality of service (QOS) system and method for non-volatile memory express devices | Kamran Lior; Alkalay Amitai |
11262952 | Concurrent tape modification | LeCrone Douglas E.; McCloskey Larry; Goodwill Richard; Feeney Martin |
11262987 | User interface isolation verification | Lyman Richard B. |
11263080 | Method, apparatus and computer program product for managing cache | Li Xiongcheng; Dong Jibing; Gao Hongpo; Kang Jianbin; Xu Xinlei; Gao Jian |
11263082 | Data recovery of guest virtual machines | Rakesh Aaditya; Hebsur Sudha |
11263085 | Systems and methods for performing backups of a server database | Bhanushali Jigar Premajibhai; Yadav Sunil |
11263087 | Methods and systems for serverless data deduplication | Natanzon Assaf; Cohen Saar |
11263089 | Achieving guaranteed application performance using transactional I/O scheduling for SSD storage by interleaving and splitting read/write I/Os with required latency configurations | Ugale Rahul; Zou Colin |
11263093 | Method, device and computer program product for job management | Tang Jun; Wang Yi; Zheng Qingxiao |
11263110 | Inter-object validation system and method for the objects of a test system | Hayward Jeffery J. |
11263194 | File block addressing for backups | Graham Debra H.; Buchman Matthew D. |
11263369 | Workflow simulation using provenance data similarity and sequence alignment | Gottin Vinícius Michel; Menasché Daniel Sadoc; Bordignon Alex Laier; Sousa Eduardo Vera; Avila Manuel Ramón Vargas |
11265261 | Access path management based on path condition | Charles Peniel; Kanjirathinkal Joseph G.; Sethuraman Manikandan |
11265374 | Cloud disaster recovery | LeCrone Douglas E.; Quinn Brett A. |
11265393 | Applying a data valuation algorithm to sensor data for gateway assignment | Todd Stephen J. |
11269516 | Pattern detection system and method | Armangau Philippe; Chiodelli Pierluca; Papadopoulos George |
11269521 | Method, device and computer program product for processing disk unavailability states | Kang Jianbin; Gao Jian |
11269530 | Method for storage management, electronic device and computer program product | Gao Jian; Dong Jibing; Han Geng; Kang Jianbin; Yang Lifeng |
11269532 | Data reduction by replacement of repeating pattern with single instance | Shabi Uri; Alkalay Amitai |
11269540 | Method, apparatus, and computer program product for managing application system | Zhou Yizhou; Zhang Simon Yuting |
11269541 | Efficient utilization of storage resources on data recovery sites using machine learning | Savir Amihai; Gefen Avitan; Wolfson Kfir; Azaria Itay |
11269547 | Reusing overwritten portion of write buffer of a storage system | Liu Yousheng; Heng Socheavy D.; Xu Xinlei; Han Geng; Gao Jian |
11269548 | Methods, devices, and a computer program product for processing an access request and updating a storage system | Lei Lu; Sun Ao |
11269554 | Meeting backup window requirements while managing storage array backup load | Smaldone Stephen; Wigmore Ian; Don Arieh |
11269562 | System and method for content aware disk extent movement in raid | Dalmatov Nickolay Alexandrovich; Danilov Mikhail Viktorovich |
11269595 | Encoding and evaluating multisets using prime numbers | Ramzan Zulfikar A.; Davis Sashka T.; Hoang Nicholas H. |
11269615 | Automatically orchestrating deployments of software-defined storage stacks | Hoppe Alexander; Saring Alik; Bibby Ian D.; Dawe Trevor H.; Gallacher Sean R. |
11269688 | Scaling distributed computing system resources based on load and trend | Wu Jeff; Li Hui |
11269726 | Method and device for managing storage system | Xu Tao; Xu Xinlei; Li Liam Xiongcheng; Yang Lifeng; Gao Jian; Han Geng |
11269735 | Methods and systems for performing data backups | Venkataramana Mahesh Reddy Appireddygari; Chopra Shelesh; Yadav Sunil; Sisodia Divyangana; Chennojwala Yagnavalkya; Khan Asif; Gurindapalli Aneesh Kumar |
11269738 | System and method for fast rebuild of metadata tier | Armangau Philippe; Vankamamidi Vamsi K.; Heng Socheavy D.; Han Geng; Gao Jian; Gao Hongpo |
11269746 | Recovery of page description blocks based on context | Zhao Edward; Heng Socheavy; Xia Sihang; Xu Xinlei; Vankamamidi Vamsi K. |
11269770 | Method, apparatus, and computer program product for managing storage space provided across multiple storage systems | Xu Xinlei; Li Xiongcheng; Yang Lifeng; Han Geng; Gao Jian |
11269776 | Direct input/output path to compressed data | Chen Xiangping; Armangau Philippe; Kucherov Anton; Zhou Xunce; Davenport William C. |
11269792 | Dynamic bandwidth management on a storage system | Martin Owen; Smith Erik P. |
11269817 | System and method for efficiently measuring physical space for an ad-hoc subset of files in protection storage filesystem with stream segmentation and data deduplication | Menezes Guilherme; Botelho Fabiano; Reza Abdullah |
11269855 | On-demand remote snapshot creation for a synchronous replication session in automatic recovery | Parasnis Archana; Kronrod Svetlana; Chen Xiangping |
11269958 | Input and output files that offload search pattern matching from clients to servers | Potnuru Lokanadham |
11271992 | Lazy lock queue reduction for cluster group changes | Richards Antony; Kilpatrick Douglas |
11272006 | Intelligently distributing retrieval of recovery data amongst peer-based and cloud-based storage sources | Saad Yossef; Solan Alex |
11275417 | Apparatus, method and system for managing power of user accounts | Guo Feng Golfen; Wang Grissom Tianqing; Chen Roby Qiyan; Peng Layne Lin; Zhang Vivian Yun; Yan Kay Kai |
11275504 | Method for upgrading system, electronic device, and computer program product | Liu Min; Zhang Ming; Wang Qi; Liu Yuanyi; Liu Weiyang |
11275506 | Storage-efficient DR for edge devices | Saad Yossef |
11275507 | Method, electronic device, and computer storage medium for information processing | Hu Chenxi; Dong Shixu |
11275513 | System and method for selecting a redundant array of independent disks (RAID) level for a storage device segment extent | Dalmatov Nickolay; Danilov Mikhail |
11275518 | System and method for implementing heterogeneous media types with raid | Gao Jian; Lee Shuyu; Han Geng; Xu Xinlei; Gao Hongpo; Dong Jibing |
11275529 | Maintenance management on backup storage systems | Kulkarni Gururaj; Tiwari Priyank; Drozd Michal Jacek |
11275601 | System and method for auto recovery of deleted virtual machines identified through comparison of virtual machine management application snapshots and having corresponding backups at a storage device | Tiwari Priyank; Kulkarni Gururaj |
11275652 | Storing erasure coded data based on reliability of storage devices | Danilov Mikhail; Altaye Yohannes |
11275655 | Method, electronic device, and computer program product for selecting backup destination | Jia Zhen; Wang Qi; Zhang Yun; Wang Ren; Yu Jing |
11275656 | Autonomous data protection | Martin Owen; Wilson Jeffrey |
11275657 | Method and system for minimizing rolling database recovery downtime | Upadhyay Navneet; Chopra Shelesh; Ramachandran Amith |
11275658 | Rescue package for uncontrollable splitters | Shemer Jehuda; Cohen Saar; Wolfson Kfir; Azaria Itay |
11275672 | Run-time determination of application performance with low overhead impact on system performance | Khosrowpour Farzad; Savir Amihai; Parush Tzur Anat |
11275691 | Intelligent control of cache | Desai Keyur |
11275719 | Incremental metadata aggregation for a file storage system | Olderdissen Jan Ralf Alexander |
11275764 | Highly resilient synchronous replication with automatic recovery | Chen Xiangping; Kronrod Svetlana |
11275765 | Storage systems configured for storage volume addition in synchronous replication using active-active configuration | Chen Xiangping; Meiri David |
11277335 | Host device with path selection modification responsive to mismatch in initiator-target negotiated rates | Rao Vinay G.; Mallick Sanjib; Don Arieh |
11277478 | Application aware copy data management of apps deployed in public cloud environments | Kumar Sunil |
11281374 | Automated storage network reconfiguration for heterogeneous storage clusters | Krivenok Dmitry Vladimirovich |
11281377 | Method and apparatus for managing storage system | Yan Bob Biao; Hu Bernie Bo; Huang Jia; Ye Jessica Jing; Wu Vicent Qian |
11281384 | Method, device and computer program product for managing memory of dedicated processing resource | Zhao Junping; Wang Kun |
11281386 | Disk array enclosure with metadata journal | Glimcher Boris; Alkalay Amitai |
11281387 | Multi-generational virtual block compaction | Tamilarasan Ashok; Vankamamidi Vamsi; Armangau Philippe |
11281390 | Techniques for data migration | Kucherov Anton; Meiri David |
11281391 | Method, device, and computer program for migrating backup system | Zhang Yuting; Jia Kaikai |
11281404 | Storage volume migration scheduling based on storage volume priorities and specified constraints | Ben Zeev Gil; Katz Evgeny; Shusterman Zeev; Segev Tamir; Bahat Lior Oded; Brifman Nir; Rosenblatt Itai |
11281407 | Verified write command in active-active replication | Meiri David; Chen Xiangping |
11281509 | Shared memory management | Hershkovitz Gabriel; Don Arieh; Barber Michael R. |
11281517 | System and method for resolving error messages in an error message repository | Kanagovi Ramakanth; Gupta Ankur; Aurosikha |
11281527 | Method and system for data integrity | Xu Xinlei; Liu Yousheng; Armangau Philippe; Vankamamidi Vamsi K; Gao Jian |
11281528 | System and method for persistent atomic objects with sub-block granularity | Shveidel Vladimir; Alkalay Amitai |
11281536 | Method, device and computer program product for managing storage system | Gao Jian; Han Geng; Kang Jamin Jianbin; Gao Hongpo; Gong Shaoqin |
11281537 | Managing mapped raid extents in data storage systems | Gao Jian; Usvyatsky Ilya; Li Weihua; Han Geng; Xu Xinlei; Dong Jibing |
11281541 | Dynamic snapshot backup in multi-cloud environment | Jin Qi; Tang Xuan |
11281542 | System and method for backup generation for deployments | Sengupta Sonali; Behera Amarendra; Yadav Sunil; Chopra Shelesh; Chauhan Sapna |
11281546 | System and method for performing an incremental backup for a persistent storage system that stores data for a node cluster | Yadav Sunil; Sharma Manish; Bansal Aaditya Rakesh; Chopra Shelesh |
11281548 | 2-phase sync replication recovery to optimize recovery point objective (RPO) | Chen Xiangping; Kronrod Svetlana |
11281550 | Disaster recovery specific configurations, management, and application | Tolstoy Mikhail; Kupriyanov Roman; Kelley Karyn; McCloskey Larry; Matveevskiy Igor |
11281588 | Method, apparatus and computer program product for managing I/O operation using prediction model to predict storage area to be accessed | Yang Lifeng; Jia Ruiyong; Xu Xinlei; Liu Yousheng; Gao Jian |
11281610 | Method, device, and computer program product for managing data transfer | Gong Shuguang; Wang Long; Chen Tao; Liu Bing |
11281623 | Method, device and computer program product for data migration | Wang Yi; Wang Lei; Zheng Qingxiao; Guo Yongsheng; Li Haitao; Zhao Jingrong |
11281628 | Namespace performance acceleration by selective SSD caching | Mamidi Murthy; Mathew George; Shang Pengju |
11281630 | Deadlock-free locking for consistent and concurrent server-side file operations in file systems | Gupta Nishesh; Lopez Julio |
11281635 | Serverless solution for optimization of object versioning | Natanzon Assaf; Saad Yossef |
11281637 | System and method for policy based migration using Mtree replication with data protection applications | Quesnelle Scott; Kulkarni Gururaj |
11281669 | Parallel processing database system | Welton Caleb E.; Harada Hitoshi; Cohen Jeffrey Ira; Chang Lei; Reddy Radhika; Ma Tao; Wang Zhanwei |
11283841 | Community-based anomaly detection policy sharing among organizations | Zaslavsky Alex; Machani Salah E. |
11283853 | Generating a data stream with configurable commonality | Dangi Salil; Daza Ernest |
11283861 | Connection management during non-disruptive upgrade of nodes | Kumar Shiv; Mungre Avadut |
11283867 | Decentralized and distributed continuous replication system for moving devices | Natanzon Assaf; Wolfson Kfir; Shemer Jehuda |
11287976 | Method, electronic device and computer readable storage medium for storage management | Shang Rongrong; Jia Ruiyong; Ni Shuai; Xia Sihang; Zhao Zhenhua |
11287993 | Method, device, and computer program product for storage management | Gong Shaoqin; Dong Jibing; Gao Hongpo; Kang Jianbin; Zhuo Baote |
11287996 | Method, device and computer program product for storing data | Kang Jianbin; Han Geng; Gao Jian; Dong Jibing; Xu Xinlei |
11287997 | Method, electronic device and computer program product for managing disk array | Shang Rongrong; Tang Haiying; Zhang Xiaobo; Gao Jian; Wu Zhilong |
11288000 | Data migration in heterogeneous storage environment | Anchi Amit Pundalik; Kangyampeta Srinivas; Konnur Santoshkumar |
11288096 | System and method of balancing mixed workload performance | Ugale Rahul; Zou Colin |
11288113 | System and method for communicating messages with a sideband communication channel | Fredette Gerry; Song Mike Xizhan; Jinqing Xu; McCann Peter J. |
11288126 | Incremental backup with eventual name space consistency | Patwardhan Kedar; Papadakis Thomas; Daza Ernest |
11288131 | Extending snapshot retention | LeCrone Douglas E.; Quinn Brett A. |
11288132 | Distributing multiple phases of deduplication processing amongst a set of nodes within a clustered storage environment | Rajimwale Abhishek; Mathew George |
11288133 | System and method for resilient data protection | Khan Asif; Ramachandran Amith; Behera Amarendra; Nagabushanam Deepika; Kumar Ashish; Mohan Pati; Dethe Tushar; Arora Himanshu; Soma Gururaj; Chauhan Sapna; Acharya Soumen; Jawed Reshmee; Chopra Shelesh; Ugur-Ozekinci Yasemin |
11288134 | Pausing and resuming copying of snapshots from a local snapshot lineage to at least one cloud snapshot lineage | Varma Mithun Mahendra; Gunasekaran Shanmuga Anand |
11288136 | Configuring parameters in backup environments | Panchanathan Balaji; Ashokkumar Pravin Kumar; Patra Satchidananda |
11288137 | Restorations of virtual machines in virtual systems using a restoration policy | Samad Mohammed; Chopra Shelesh |
11288139 | Two-step recovery employing erasure coding in a geographically diverse data storage system | Danilov Mikhail; Altaye Yohannes |
11288141 | AI-based online recovery of non-critical business process data with referential integrity | Veluswamy Pratheek; Panikkar Shibi; Ponnayan Sekar |
11288190 | Method, electronic device and computer program product for caching information using active and standby buffers | Ma Chun; Gao Jian; Gao Hongpo; Kang Jianbin; Dong Jibing |
11288196 | Efficient data read operation | Benhanokh Gabriel; Wigmore Ian; Don Arieh |
11288210 | Method, device and computer program product for managing storage system | Xu Xinlei; Yang Lifeng; Gao Jian; Dong Jibing; Kang Jianbin; Gao Hongpo |
11288211 | Methods and systems for optimizing storage resources | Bono Jean-Pierre; De Souter Marc A.; Michaud Adrian |
11288229 | Verifiable intra-cluster migration for a chunk storage system | Danilov Mikhail; Edkov Mikhail |
11288230 | Method, device and computer program product for managing data replication | Jiang Eason; Peng Felix; Dai Eddie; Zhang Fubin; Wang Beryl |
11288238 | Methods and systems for logging data transactions and managing hash tables | Bono Jean-Pierre; De Souter Marc A. |
11288267 | Pluggable storage system for distributed file systems | Chang Lei; Ma Tao; Wang Zhanwei; Jian Lirong; Ma Lili; Sherry Gavin |
11288286 | Storage system with data consistency checking in synchronous replication using active snapshot set | Harduf Yuval; Chen Xiangping; Meiri David |
11288364 | Data protection based on cybersecurity feeds | Savir Amihai; Natanzon Assaf; Gefen Avitan |
11288391 | Filename-based malware pre-scanning | Mungre Avadut; Gahlot Jai Prakash; Kumar Shiv Shankar |
11288449 | Method to input content in a structured manner with real-time assistance and validation | Chen Kai; Chen Ping; Dutch Michael John; Chen Bo; Claudatos Christopher Hercules; Shao Feng |
11290254 | Centralized transaction tracking using multi-blockchain technology | Dash Sudeshna; Chimata Anitha Bhavani; Mounica Muvvala Venkata Lakshmi; Kottali Lakshmi |
11290276 | Method and system for a signed document validity service | Perlman Radia Joy; Kaufman Charles William |
11290492 | Malicious data manipulation detection using markers and the data protection layer | Wolfson Kfir; Shemer Udi; Zamir Amos |
11290546 | Common model for pairing physical and/or cloud-based storage systems for data mobility | Yadlapalli Vasu; Sheelvant Girish; Jean Matthew P. |
11294566 | Method, electronic device and computer program product for managing disks | Huang Liang; Yang Ruipeng; Zhao Xiaoliang; Liu Xianlong; Chen Yunfei |
11294569 | Method and apparatus for maintaining reliability of a RAID | Han Geng; Gao Jian; Dong Jibing; Gao Hongpo; Gong Shaoqin |
11294570 | Data compression for having one direct connection between host and port of storage system via internal fabric interface | Wigmore Ian; Benhanokh Gabriel; Don Arieh; Tringale Alesia A. |
11294583 | Proactive allocation of non-volatile data storage to storage objects in a data storage system to anticipate storage object access trends | Dalmatov Nickolay Alexandrovich; Bezugly Kirill Alexsandrovich |
11294702 | Method and system for processing data using a processing pipeline and processing units | Krasner Jonathan I.; Chalmer Steven R.; Pirotte Serge Joseph; McClure Steven T. |
11294712 | Method, device and computer program product for task management | Deng Binbin; Xiong Tianfang; Xiong Mancheng; Liang Shaocong; Zhang Zhipeng |
11294725 | Method and system for identifying a preferred thread pool associated with a file system | Bono Jean-Pierre; De Souter Marc A.; Michaud Adrian |
11294734 | Method and system optimizing the use of sub-data confidence fabrics | Todd Stephen James; Shepherd Jason A. |
11294769 | Unified protection of cluster suite | Viswanathan Sathyamoorthy; Kumar Kishore; Gopinath Ajith |
11294770 | Dynamic prioritized recovery | Dutch Michael John; Claudatos Christopher Hercules; Rao Mandavilli Navneeth |
11294771 | Storage of discovered data object to storage layouts | Chopra Shelesh; Rokicki John C. |
11294772 | System and method to achieve virtual machine backup load balancing using machine learning | Kumar Avinash; Appireddygari Venkataramana Mahesh Reddy; Chockalingam Elango |
11294773 | Method, apparatus and computer program product for managing backup system | Liu Qin; Jiang Yi; Chen Wei; Xu Jianxu |
11294774 | Method for managing backup data on first, second, or third virtual machine management platform | Wang Phoenix Yun; Li Rita Na; Bai Bing; Ye Eric Qiang; Wang Jing |
11294775 | Systems and methods for file level prioritization during data backups | Reddy A V Mahesh; Shankar D H Swaroop; Battal Chetan |
11294778 | Efficient recovery of backups for deleted checkpoints | Bansal Aaditya Rakesh; Yadav Sunil |
11294782 | Failover affinity rule modification based on node health information | Charles Peniel; Kulkarni Shashidhar R.; Sethuraman Manikandan |
11294805 | Fast and safe storage space reclamation for a data storage system | Danilov Mikhail; Brook Daniel |
11294818 | Method, electronic device and computer program product for data storage | Liu Yousheng; Han Geng; Gao Jian; Jia Ruiyong; Kang Jianbin |
11294855 | Cloud-aware snapshot difference determination | Datta Pankaj |
11294856 | Method, device, and computer program product for deleting snapshots | Wang Fei; Jiang Changxu |
11294862 | Compounding file system metadata operations via buffering | Chheda Deepti; Gupta Diwaker; Kamra Vaibhav; Rosenblum Nathan; Tolia Niraj |
11294877 | Efficient file renames using B-tree based persistence for file system name spaces | Mathew George; Mamidi Murthy V |
11294880 | Method, device and computer program product for data processing | Sun Ao; Lei Lu; Sun Wesley Wei; Wu Gary Jialei; Teng Yu |
11294990 | Method and system for data license agreements and licensee auditability | Todd Stephen James |
11296974 | Information processing method, electronic device and computer storage medium | Dong Shixu; Hu Chenxi |
11299046 | Method, device, and computer program product for managing application environment | Jia Zhen; Fernandez Orellana Pedro; Sha Danqing |
11301138 | Dynamic balancing of input/output (IO) operations for a storage system | Kucherov Anton; Meiri David |
11301141 | Optimized selection of subset of storage devices for data backup | Wang Qi; Jia Zhen; Zhang Yun; Wang Ren; Yu Jing |
11301155 | Smart de-fragmentation of file systems inside VMs for fast rehydration in the cloud and efficient deduplication to the cloud | Natanzon Assaf; Zlotnick David; Shpilyuck Boris |
11301156 | Virtual disk container and NVMe storage management system and method | Tylik Dmitry; Gupta Mukesh; Black David L. |
11301161 | Recommendation system for replication policies | Sapojnik Arik; Savir Amihai; Tzur Anat Parush |
11301162 | Balancing resiliency and performance by selective use of degraded writes and spare capacity in storage systems | Matosevich Rivka; Shatsky Yosef; Tal Doron |
11301263 | System and method for suspending and processing commands on a configuration object | Zinger Eldad; Anner Ran |
11301302 | Techniques for converting jobs into scripts | McSweeney Paul J.; O'Maolcatha Fearghal; Twohig Aaron T.; Walsh Helen |
11301330 | System and method for restoring metadata pages | Shveidel Vladimir; Gazit Ronen; Shabi Uri; Soukhman Alex |
11301337 | Method, device, and computer program product for managing backup system | Liao Lanjun; Wang Jing; Bai Bing; Zheng Qingxiao; Sun Li; Wang Xueqing |
11301338 | Recovery on virtual machines with existing snapshots | Srinivasan Sharath Talkad; Rao Mahesh |
11301355 | Method, electronic device, and computer program product for analyzing log file | Gong Min; Wang Xiaogang; Chen Chun Xi |
11301374 | Method and system for distributed garbage collection of deduplicated datasets | Wallace Grant |
11301417 | Stub file selection and migration | Shaw Rabi Shankar; Bhatnagar Anurag; Behera Sarat Kumar |
11301418 | Method and system for provenance-based data backups | Natanzon Assaf; Zlotnick David; Shpilyuck Boris |
11301427 | Inline and post-process data deduplication for a file system | McIlroy Lachlan; Shelton Robert |
11301442 | Method and system for using array level time buckets to efficiently calculate top contributors using relevant performance metric | Maunsell Caroline; Jaen Francisco; Barrett Elizabeth; Stepniak Wioletta |
11301454 | System and method for consistency checks in cloud object stores using microservices | Burkule Shyam; Balakrishnan Kalidas; Chinthekindi Ramprasad |
11301487 | Automated server discovery | Kumar Sunil; Rao Vinay; Michaely Boaz; Don Arieh |
11301488 | Method, electronic device and computer program product for data processing | Wu Pengfei; Liu Jinpeng; Wang Kun; Zhang Ming |
11302078 | Three-dimensional map generation with metadata overlay for visualizing projected workflow impact in computing environment | Reineke Nicole; Charry Valerie |
11303566 | Method, electronic device, and computer program product for data processing | Hu Chenxi; Dong Shixu |
11307780 | Cluster group change preparation techniques | Richards Antony; Kilpatrick Douglas |
11307790 | Method, device, and computer program product for managing data placement | Lin Zhenzhen; Wu Pengfei; Chen Si; Hou Anzhou |
11307899 | System and method for validating virtual storage appliance deployment | Krivenok Dmitry V.; Lyon Jared C. |
11307922 | Application crash analysis techniques when memory dump and debug symbols are not co-located | Koropoff Brian |
11307933 | Automated targetless snapshots | Wilson Jeffrey; Martin Owen |
11307934 | Virtual backup and restore of virtual machines | Earl Min-Chih L.; Bishop Brian J.; Buchman Matthew D.; Akanda Mohammed A.; Gruszka Jerzy |
11307935 | Management of volume snapshots in a data storage system | Keller Itay; Porath Asaf; Yarimi Michal; Shusterman Zeev; Koren Dvir |
11307938 | System and method for efficient garbage collection by generating deduplication pools in a backup storage system based on application types | Gunda Kalyan Chakravarthy; Kulkarni Gururaj |
11308004 | Multi-path layer configured for detection and mitigation of slow drain issues in a storage area network | Rao Vinay G.; Charles Peniel; Mallick Sanjib |
11308028 | Predicting and deleting idle remote sessions in a distributed file system | Vaykole Tejas Anil; Rupala Pratik; Gupta Kaushik |
11308036 | Selection of digest hash function for different data sets | Gonczi Istvan; Bassov Ivan; Faibish Sorin |
11308076 | Dynamic scoring in data confidence fabrics | Todd Stephen James; Conn Trevor Scott |
11308125 | Storage system with fast recovery and resumption of previously-terminated synchronous replication | Chen Xiangping; Kucherov Anton; Meiri David; Kronrod Svetlana |
11310272 | Method and system creating and using data confidence fabric processing paths | Todd Stephen James; Shepherd Jason A. |
11310316 | Methods, devices and computer program products for storing and accessing data | Zhang Ruixue; Wu Pengfei; Lin Zhenzhen; Chen Si |
11310718 | Wireless discovery, routing and advertisement protocol for secure remote services in a communication environment | King James R.; Kenney Justin A. |
11314414 | Methods, devices, and computer program products for storage management | Hu Jun; Liu Yang |
11314416 | Defragmentation of striped volume in data storage system | Shveidel Vladimir; Kamran Lior |
11314419 | Method, device and computer program product for managing disks | Huang Liang; Liu Xianlong; Yang Ruipeng; Zhao Xiaoliang; Yu Changyong |
11314430 | Reading data in sub-blocks using data state information | Yang Lifeng; Li Xiongcheng; Xu Xinlei |
11314432 | Managing data reduction in storage systems using machine learning | Faibish Sorin; Rafikov Rustem; Bassov Ivan |
11314443 | Method, device, and computer program product for managing image of container | Chen Si; Wu Pengfei; Lin Zhenzhen; Zhang Ruixue |
11314447 | System and method for sustaining single NVMe subsystem by a federated storage array for NVMe-oF connectivity | Reichbach Chen; Shem Tov Marina; Zinger Eldad; Tylik Dmitry |
11314448 | Registering storage hosts for use in automating software-defined storage deployments | Bibby Ian D. |
11314524 | Method, apparatus, and computer program product for managing service container | Li Samuel; Xu Terry; Dai Eddie; Jiang Eason; Zhou Zhongyi |
11314553 | Method, apparatus, and computer program product for determining usage change rate of storage system | Zheng Jim; He Guangjun; Zheng Qingxiao |
11314557 | Method, apparatus, and computer program product for selecting computing resources for processing computing task based on processing performance | Zhao Junping; Wang Kun |
11314580 | Generating recommendations for initiating recovery of a fault domain representing logical address space of a storage system | Chawla Rohit K.; Patel Dixitkumar Vishnubhai |
11314581 | Control method of disk failure, electronic device and computer readable storage medium | Li Chenglin; Luo Mingyi; Zeng Hongyuan; Zhang Ruiyang |
11314594 | Method, device and computer program product for recovering data | Tang Haiying; Wu Zhilong; Kang Jianbin; Shang Rongrong; Gao Jian |
11314598 | Method for approximating similarity between objects | Marelas Peter |
11314599 | Method, apparatus and computer program product for data replication | Xu Hongru; Xiong Tianfang; Shang Qiu; Qian Yue; Long Fei |
11314600 | Data placement method based on health scores | Prasad Parmeshwr; Liu Bing; Vishwakarma Rahul Deo |
11314601 | Automated capture and recovery of applications in a function-as-a-service environment | Natanzon Assaf; Lieberman Amit |
11314605 | Selecting optimal disk types for disaster recovery in the cloud | Shpilyuck Boris; Shemer Jehuda; Kushnir Tomer |
11314609 | Diagnosing and remediating errors using visual error signatures | Rafey Mohammad |
11314689 | Method, apparatus, and computer program product for indexing a file | Wang Donglei; Li Zhiqiang; Gao Lei |
11314694 | Facilitating access to data in distributed storage system | Guo Feng; Wang Tianqing; Yan Kai; Chen Qiyan; Zhang Yun; Wu Yicang; Peng Lin; Lu Zhihao |
11314705 | Opportunistic partial deduplication | Gazit Ronen; Shabi Uri |
11314724 | Data deduplication acceleration | Chalmer Steven; Krasner Jonathan; Ouarraoui Chakib; Pirotte Serge J. |
11314809 | System and method for generating common metadata pointers | Shani Nimrod; Kredi Amir |
11315013 | Implementing parameter server in networking infrastructure for high-performance computing | Savic Dragan; Zhao Junping |
11315014 | Workflow optimization | Dias Jonas F.; Ciarlini Angelo; Pinho Romulo D.; Gottin Vinicius; Maximo Andre; Pacheco Edward; Holmes David; Rangarajan Keshava; Senften Scott David; Winston Joseph Blake; Wang Xi; Walker Clifton Brent; Dev Ashwani; Yeleshwarapu Chandra; Srinivasan Nagaraj |
11315605 | Method, device, and computer program product for storing and providing video | Liu Qin; Liu Jie |
11316761 | Automated stateful counter aggregation of device data | Labonte Kevin S.; Ramasamy Vijayagomathi; Patel Kshitij; Beale Peter |
11316851 | Security for network environment using trust scoring based on power consumption of devices within network | Sohail Mohamed; Tabet Said |
11316907 | System and method for secure communication channel establishment | Ippatapu Venkata L. R.; Dorman Kenneth M. |
11320914 | Computer interaction method, device, and program product | Ni Jiacheng; Wang Zijia; Chen Qiang; Liu Jinpeng; Jia Zhen |
11320988 | Method, apparatus and computer program product for managing disk array | Kang Jianbin; Feng Changyu; Dong Jibing |
11320994 | Dynamic configuration change control in a storage system using multi-path layer notifications | Patel Rimpesh; Anchi Amit Pundalik; Charles Peniel |
11320996 | Methods, apparatuses and computer program products for reallocating resource in a disk system | Ma Chun; Gong Shaoqin; Tang Haiying; Sun Tianshu; Qiu Zhihui |
11320997 | Method, device, and computer program for storage management | Zeng Hongyuan; Wang Hao; Zhao Chaojun; Zhang Yang; Tan Jiang |
11321003 | Extending deduplication matches using data comparison | Shabi Uri; Gazit Ronen |
11321120 | Data backup method, electronic device and computer program product | Guo Yongsheng; Zhu Mike Xiaoliang; Yu Jing; Guo Crystal Jingjing; Zeng Roger Zhihong |
11321169 | End-to-end datapath protection | Vankamamidi Vamsi K.; Armangau Philippe; Han Geng; Xu Xinlei |
11321182 | Data backup method, a data backup device, and a computer program product | Liu Weiyang; Liao Mengze; Wang Qi; Wang Ren; Zhang Ming |
11321185 | Method to detect and exclude orphaned virtual machines from backup | Srinivasan Sharath Talkad; Kalburgi Smitha Prakash |
11321206 | Cluster feature activation and update system | Seungshik Thompson Adam Marshall; Smithhart Carter |
11321443 | Password resetting system and method | Myers Jackson B.; Kaufman Charles W.; Lazar Gregory W. |
11321461 | Malware scan task processing in a data storage system | Mungre Avadut; Kumar Shiv Shankar |
11323497 | Expiration of data streams for application programs in a streaming data storage platform | Danilov Mikhail; Paduroiu Andrei |
11323509 | Union formation of edge cloud-native clusters | Lincourt Robert A; Fong Victor |
11323514 | Data tiering for edge computers, hubs and central systems | Das Gupta Arunava; Bhattacharya Niladri |
11323552 | Automatic security configurations in disaster recovery | Shpilyuck Boris; Natanzon Assaf; Zlotnick David |
11327662 | Method and system for managing storage device | Liu Yousheng; Han Geng; Dong Jibing; Jia Ruiyong; Gao Jian; Xu Xinlei |
11327679 | Method and system for bitmap-based synchronous replication | Xiong Tianfang; Yim Wai; Lu Yifeng; Yang Yue |
11327680 | Serverless solution for continuous data protection | Natanzon Assaf |
11327799 | Dynamic allocation of worker nodes for distributed replication | Karmarkar Atul Avinash; Shilane Philip; Xu Kevin; Duggal Abhinav |
11327801 | Initialization of resource allocation for a workload characterized using a regression model | Calmon Tiago Salviano; Gottin Vinícius Michel; Sousa Eduardo Vera |
11327812 | Distributed storage system with per-core rebalancing of thread queues | Shveidel Vladimir; Alkalay Amitai |
11327834 | Efficient computation of parity data in storage system implementing data striping | Schneider Zvi; Alkalay Amitai; Natanzon Assaf |
11327876 | Verifying a software or firmware update using a container before deploying to a client | Sethi Parminder Singh; Naik Sharmad Shashir; Das Akshita |
11327895 | Protocol for processing requests that assigns each request received by a node a sequence identifier, stores data written by the request in a cache page block, stores a descriptor for the request in a cache page descriptor, and returns a completion acknowledgement of the request | Vankamamidi Vamsi K.; Gazit Ronen |
11327948 | Managing deduplication of data in storage systems | Dalmatov Nickolay; Ruef Richard P.; Everson Kurt William |
11330001 | Platform for the extraction of operational technology data to drive risk management applications | Schlarman Steven G. |
11330078 | Method and system for managing updates of a data manager | Chopra Shelesh; Gaikwad Hemant Ramesh; Vishwakarma Rahul Deo |
11334255 | Method and device for data replication | Wang Kun; Zou Colin Yong; Ye Sean Cheng; Li Lyne Yuwei |
11334293 | Facilitating the implementation of cluster counters on lock value blocks in distributed file systems | Leimbach David; Kilpatrick Douglas |
11334456 | Space efficient data protection | Natanzon Assaf; Wu Pengfei; Wang Kun |
11334496 | Method and system for providing processor-addressable persistent memory to guest operating systems in a storage system | Fredette Matthew H.; Krasner Jonathan I.; Bono Jean-Pierre; Ouarraoui Chakib; Sahin Adnan |
11334521 | System and method that determines a size of metadata-based system snapshots | Danilov Mikhail; Gusakov Kirill |
11334523 | Finding storage objects of a snapshot group pointing to a logical page in a logical address space of a storage system | Mathews Alexander S.; Patel Dixitkumar Vishnubhai |
11334531 | Virtual private cloud that provides enterprise grade functionality and compliance | Hrebicek Ondrej; Chung Leonard |
11334557 | Method and system for deriving metadata characteristics of derivative assets | Todd Stephen James |
11334746 | Facial recognition for multi-stream video using high probability group | Gefen Avitan; Sagi Omer; Savir Amihai |
11334925 | Normalization and secure storage of asset valuation information | Todd Stephen J.; Norton Jeffrey |
11336438 | Remote approval and execution of restricted operations | Atzmony Yedidia; Nir Yoav |
11336509 | Detecting single points of failure on a storage system | Smith Erik P.; Rowlands Scott; Westin Vincent H.; Martin Kevin; Don Arieh |
11336580 | Methods, apparatuses and computer program products for transmitting data | Ying Zhi; Zhao Junping; Wang Kun |
11336750 | Remote procedure calls that offload search pattern matching from clients to servers | Potnuru Lokanadham |
11340784 | Verification microservice for a deduplicated object storage system with worker node estimation | Truong Tipper; Brandt Joseph; Shilane Philip |
11340792 | Ordered event stream merging | Danilov Mikhail; Buinov Konstantin |
11340794 | Multiprocessor system with independent direct access to bulk solid state memory resources | Himelstein Mark; Yarbrough James; Carlson Rick; Durai Vishwas; Venkataraghavan Vikram; Wilford Bruce A.; Ho Grace; Katz Bill; Van Gaasbeck Richard; Arai Dan; Emberson David R. |
11340795 | Snapshot metadata management | Wilson Jeffrey; Ferrari Michael; Halstead Mark J.; Chandrashekara Sandeep |
11340803 | Method for configuring resources, electronic device and computer program product | Wang Donglei; Gao Lei; Li Xiaoang |
11340809 | Redirecting i/o communications based on network topology | Crowley Owen; Charles Peniel; Sethuraman Manikandan; Kanjirathinkal Joseph G. |
11340811 | Determining reclaim information for a storage block based on data length and matching write and delete parameters | Zhu Julius; Lei Lu; Sun Ao; Teng Yu |
11340814 | Placing data in a data storage array based on detection of different data streams within an incoming flow of data | Dalmatov Nickolay Alexandrovich; Ruef Richard P.; Everson Kurt W. |
11340815 | Storage management system and method | Love Philip; Gazit Ronen |
11340816 | Deallocation of drive extents for mapped raid (redundant array of independent disks) extents | Dalmatov Nickolay; Danilov Mikhail |
11340817 | Data management in multi-cloud computing environment | Reineke Nicole; King James R.; Kenney Justin A.; Lincourt Robert A. |
11340818 | Migrating virtual tapes between different virtual tape storages without host involvement | Ashkadov Dmitry; Kotov Yuri; Alekseev Vladislav |
11340819 | Method, device and computer program product for locking at least two address references pointing to storage block in raid type conversion | Gao Jian; Xu Xinlei |
11340822 | Movement of stored data based on occurrences of one or more n-gram strings in the stored data | Davis Sashka T.; Arunski Kevin J. |
11340824 | Efficient object storage management when performing backups to a cloud-based object storage | Yadav Sunil; Chitloor Ravi Vijayakumar; Chopra Shelesh; Behera Amarendra; Dethe Tushar; Bhanushali Jigar; Singh Deependra; Arora Himanshu; Dubey Prabhat Kumar |
11340825 | Method, device, and computer program product for managing storage system | Wang Yi; Liu Bing |
11340827 | Method, device, and program product for managing storage space in storage system | Jiang Changxu; Chen Xu; Jiang Zhenzong; Chen Peilei; Dong Hailan |
11340829 | Techniques for log space management involving storing a plurality of page descriptor (PDESC) page block (PB) pairs in the log | Shveidel Vladimir; Baruch Oran; Gazit Ronen |
11340834 | Scaling of an ordered event stream | Danilov Mikhail; Altaye Yohannes |
11340900 | Flushing dirty pages from page buffers indicated by non-sequential page descriptors | Han Geng; Armangau Philippe; Gao Jian; Vankamamidi Vamsi K. |
11340911 | Installing patches using a jail | O'Dell Jared; Kilpatrick Douglas; Lee Gene W.; Anderson Sophia |
11340928 | System and method for efficient entity transition | Kulkarni Mahipat Rao; Kulkarni Gururaj; Sharma Preeti |
11340953 | Method, electronic device and computer program product for load balance | Lei Alex; Ke Andy Li; Wang Jing; Li Lawrence Jie |
11340957 | Method for managing computing devices, electronic device and computer storage medium | Zhang Min; Huang Yechen |
11340967 | High availability events in a layered architecture | Talukdar Rohit; Singh Pankaj |
11340968 | Executing repetitive custom workflows through API recording and playback | Malamut Mark; Brenner Adam; Murti Arun |
11340997 | Method, device and computer program product for transmitting data | Wang Yi; Tang Jun; Zheng Qingxiao |
11340999 | Fast restoration method from inode based backup to path based structure | Zhang Wuyun; Zhang Zhibin |
11341003 | Availability of a storage system | Liu Bing; Lv Man |
11341009 | Directing placement of data in cloud storage nodes | Wu Pengfei; Natanzon Assaf; Wang Kun |
11341010 | Dynamic reclamation of storage stripes | Han Geng; Gao Hongpo; Gao Jian; Lee Shuyu; Vankamamidi Vamsi K. |
11341012 | Test platform employing test-independent fault insertion | Wilson, Jr. Charles R. |
11341026 | Facilitating detection of anomalies in data center telemetry | de Abreu Pinho Rômulo Teixeira; Sousa Vitor Silva; de Souza Rodrigo Rios Almeida; Stelling Neto Roberto Nery |
11341035 | Optimizing virtual storage devices by determining and optimizing associations between virtual storage devices and physical storage devices | Hickey Charles J. |
11341049 | Method, apparatus, and computer program product for managing storage system | Lv Shuo; Zhang Ming; Chen Huan |
11341055 | Method, electronic device, and computer program product for storage management | Wang Cheng; Liu Bing |
11341089 | Self-optimizing interval detection data structure | Raju Suraj |
11341099 | Data storage agnostic deduplication for virtual machines | Wolfson Kfir; Shemer Jehuda; Azaria Itay |
11341107 | Verification microservice for execution of a slice verification path by worker nodes | Truong Tipper; Brandt Joseph; Shilane Philip |
11341230 | Maintaining dual-party authentication requirements for data retention compliance | Ponnuswamy Senthil; Vinante Marcelo; Anjali Anjali; Sharma Anurag; Sampath Rekha |
11341234 | System for securely recovering backup and data protection infrastructure | Voss Stefan; Balaraman Sadagopan |
11341245 | Secure delivery of software updates to an isolated recovery environment | Voss Stefan; Balaraman Sadagopan |
11341359 | Multi-domain monitoring services for intelligent infrastructure automation | Charry Valerie; King James R. |
11341514 | Determining user retention values using machine learning and heuristic techniques | Thakkar Bina K.; Su Chao; Luktuke Roopa A.; Krishnan Aditya; Gowda Deepak |
11343255 | Security policy exchange and enforcement for question delegation environments | Sunkavally Naveen; Mullins Brian C. |
11343282 | Storage and data protection as a service in a cloud native environment | Bett Antony Siloiy; Alem Luay |
11347395 | Cache management system and method | Izhar Amnon; Weiler Patrick J. |
11347397 | Traffic class management of NVMe (non-volatile memory express) traffic | Martin Owen; Don Arieh |
11347399 | Method, device, and computer program product for extending partition of storage system | Gong Yunhai; Sun Wesley Wei; Dong John Guoxin; Huang Stan Feng |
11347404 | System and method for sharing spare storage capacity between a log structured file system and RAID | Vankamamidi Vamsi; Armangau Philippe; Lee Shuyu |
11347406 | Method, electronic device and computer program product for updating information | Gong Shaoqin; Han Geng; Gao Jian; Xu Xinlei; Shao Changrui |
11347407 | RAID (redundant array of independent disks) group configuration and storage drive distribution based on storage drive health | Dalmatov Nickolay; Danilov Mikhail |
11347416 | Compacting data streams in a streaming data storage platform | Danilov Mikhail; Altaye Yohannes |
11347417 | Locking structures in flash memory | Wallace Grant R.; Shilane Philip N. |
11347418 | Method, device and computer program product for data processing | Chen Xiao; Zhang Alex Pengbo |
11347419 | Valency-based data convolution for geographically diverse storage | Danilov Mikhail; Altaye Yohannes |
11347423 | System and method for detecting deduplication opportunities | Basov Ivan; Faibish Sorin; Gonczi Istvan |
11347427 | Separation of dataset creation from movement in file replication | Voecks Austin; Frank Michael; Popovich Evgeny |
11347428 | Solid state tier optimization using a content addressable caching layer | Dalmatov Nickolay A.; Natanzon Assaf |
11347431 | Signal events for synchronization to facilitate mode changes in a streaming data storage platform | Danilov Mikhail; Paduroiu Andrei |
11347439 | Managing I/O communications based on transceiver state | Kanjirathinkal Joseph G.; Charles Peniel; Crowley Owen |
11347494 | Installing patches during upgrades | O'Dell Jared; Lee Gene W. |
11347552 | Resource monitoring and allocation using proportional-integral-derivative controllers | Krasner Jonathan I.; Ouarraoui Chakib |
11347553 | Data distribution for fast recovery in cluster-based storage systems | Danilov Mikhail; Altaye Yohannes |
11347568 | Conditional appends in an ordered event stream storage system | Paduroiu Andrei |
11347571 | Sub-routing key splits in scaling distributed streaming data storage | Paduroiu Andrei |
11347575 | Service advisory system and method | Wu Minqiang; Wu Jun; Zhang Butong |
11347583 | Techniques for correcting errors in cached pages | Armangau Philippe; Vankamamidi Vamsi K.; Han Geng; Xu Xinlei |
11347588 | Method, electronic device and computer program product for data processing | Dong Hailan; Chen Xu; Jiang Changxu; Jiang Zhenzong; Chen Peilei |
11347589 | Evaluation for rebuilding performance of redundant arrays of independent disks | Gao Jian; Gao Hongpo; Han Geng; Dong Jibing; Xu Xinlei |
11347591 | Cumulative backups | Richter Mark; Starling Jennifer; Olsen Eric; Snyder Emile |
11347595 | Directory selective backups | Patwardhan Kedar; Chan Wallun; Terrien Dale |
11347596 | Preliminary data protection using composite copies of data in a data storage system | Danilov Mikhail; Buinov Konstantin |
11347599 | Improving the recovery time objective of backup recovery from the cloud | Mondal Santi Gopal; Gunda Kalyan C. |
11347607 | Data storage cluster with witness node for selecting surviving storage node after replication failure | Tylik Dmitry Nikolayevich; Meiri David |
11347616 | Cost anomaly detection in cloud data protection | Gamliel Roi; Savir Amihai; Gefen Avitan |
11347641 | Efficient memory usage for snapshots based on past memory usage | Wilson Jeffrey; Ferrari Michael; Gupta Shruti; Lettery George F. |
11347645 | Lifetime adaptive efficient pre-fetching on a storage system | Gottin Vinicius; Dias Jonas F.; Barbalho Hugo de Oliveira; Pinho Romulo D.; Calmon Tiago |
11347646 | Method, device and computer program product for managing cache based on matching API | Liang Mengjia; Yan Sandy Yu; Peng Felix Fei |
11347681 | Enhanced reading or recalling of archived files | Kumar Shiv; Gahlot Jai; Mungre Avadut |
11347683 | Policy-based performance of storage management operations on objects of a file system using an index of the file system | Ramsden Raymond; Mahuli Harsha |
11347687 | Incremental inline journaling in a journaled file system | Raju Suraj; Roberson Jefferey |
11347689 | Method, device and computer program product for event ordering | Ma Tianyu |
11347690 | Data masking in a microservice architecture | Lu Kimberly R.; Brandt Joseph S.; Shilane Philip N. |
11347692 | Zero block elimination reporting for a file system | McIlroy Lachlan |
11347725 | Efficient handling of highly amortized metadata page updates in storage clusters with delta log-based architectures | Shveidel Vladimir; Krauthgamer Daniel; Katzengold Adi |
11347746 | Efficient rolling transactions in a data storage system | Danilov Mikhail; Altaye Yohannes |
11347747 | Ordering data stream events in a streaming data storage platform | Paduroiu Andrei |
11347778 | Scale-out indexing for a distributed search engine | Liu Cherami Min; Zhang Scott Ming; Yu Jing; Zhao Bruce Ke; Ruvala Kunal |
11347799 | Space accounting for data storage usage | Nanda Kumari Bijayalaxmi; Marko Michal; Palsetia Nushafreen Dara; Wils Joris Johannes |
11348167 | Method and storage medium for private edge-station auction house | Fong Victor; Lincourt Robert A. |
11348656 | Efficient resource sharing | Koren Henrik; Yosef Ilan |
11349339 | Usage-based cost structuring system and method | Streete Jonathan; Butzer Daniel J. |
11349500 | Data recovery in a geographically diverse storage system employing erasure coding technology and data convolution technology | Danilov Mikhail; Altaye Yohannes |
11349501 | Multistep recovery employing erasure coding in a geographically diverse data storage system | Danilov Mikhail; Altaye Yohannes |
11349728 | Dynamic resource allocation based on fingerprint extraction of workload telemetry data | Sousa Eduardo Vera; Calmon Tiago Salviano; Gottin Vinicius Michel |
11349773 | Maintaining distributed references to data for use by devices of a computer network | Datta Pankaj |
11349906 | Multipart upload for large data events in streaming data storage | Paduroiu Andrei; Danilov Mikhail |
11349915 | Distributed replication and deduplication of an object from a source site to a destination site | Xu Kevin; Duggal Abhinav; Karmarkar Atul Avinash; Shilane Philip |
11349916 | Learning client preferences to optimize event-based synchronization | Hrebicek Ondrej; Kumar Srin; Basu Hironmay; Verma Ashwani; Rondeau Andrew |
11349920 | Methods, devices and computer readable mediums for data synchronization | Yang Lifeng; Gao Jian; Xu Xinlei; Jia Ruiyong; Liu Yousheng |
11349921 | Cloud based storage migration | LeCrone Douglas E.; Quinn Brett A. |
11349930 | Identifying and deleting idle remote sessions in a distributed file system | Vaykole Tejas Anil; Gupta Kaushik; Rupala Pratik |
11349937 | Passive management of network connections | Szczesniak Rafal; Hitt Jeremy |
11349959 | Delayed node upgrade in distributed systems | Lee Gene W.; Ranger Mark; Kilpatrick Douglas |
11354054 | Compaction via an event reference in an ordered event stream storage system | Danilov Mikhail; Paduroiu Andrei |
11354061 | Storage system configuration based on workload characteristics and performance metrics | Prado Adriana Bechara; Da Silva Pablo Nascimento; Ferreira Paulo Abelha |
11354159 | Method, a device, and a computer program product for determining a resource required for executing a code segment | Liu Jinpeng; Wu Pengfei; Zhao Junping; Wang Kun |
11354191 | Erasure coding in a large geographically diverse data storage system | Danilov Mikhail; Buinov Konstantin |
11354195 | System and method for intelligent asset classification | Chopra Shelesh; Yadav Sunil; Sharma Manish; Bansal Aaditya Rakesh |
11354229 | Method and apparatus for automated information lifecycle management using a federation of arrays | Dysert David C.; DeSimone Salvatore; Lal Puneet B.; Kathiravelupillai Ananthan; St. Pierre Edgar J. |
11354268 | Optimizing snapshot creation | Jones Evan G.; LeCrone Douglas E.; Quinn Brett A. |
11354275 | Method, electronic device and computer program product for file management | Liao Lanjun; Zheng Qingxiao; Wang Yi |
11354314 | Method for connecting a relational data store's meta data with hadoop | Tiwari Sameer; Bhandarkar Milind Arun |
11354444 | Access control for an ordered event stream storage system | Danilov Mikhail; Altaye Yohannes |
11354671 | Fraud mitigation using one or more enhanced spatial features | Goshen Idan Richman; Gaber Shiri |
11356384 | Modelling and predicting resource allocation using eigenvalues and eigenvectors | Desai Keyur |
11360675 | Method and system for improving rebuild for a storage system | Dong Jibing; Han Geng; Vankamamidi Vamsi; Gao Jian |
11360687 | Method of processing a input-output request, an electronic device, and a computer program product | Tong Renyuan; Huang Juan; Yang Yi Han |
11360688 | Cascading snapshot creation in a native replication 3-site configuration | Meiri David; Kucherov Anton |
11360691 | Garbage collection in a storage system at sub-virtual block granularity level | Soukhman Alex; Shabi Uri |
11360693 | Identifying point-in-time asynchronous application data | Quinn Brett A.; LeCrone Douglas E. |
11360703 | Method and system for a trusted actuation via data fabric metadata | Todd Stephen James; Conn Trevor Scott |
11360712 | Storage system with continuous data verification for synchronous replication of logical storage volumes | Meiri David; Chen Xiangping |
11360755 | Method, electronic device, and computer program product for installing application | Lin Zhenzhen; Hou Anzhou; Wu Pengfei |
11360785 | Execution path determination in a distributed environment | Kumar Vinod |
11360797 | System and method for enabling dynamic configuration of virtual hardware | Goodman Bradley K. |
11360845 | Datacenter preemptive measures for improving protection using IOT sensors | Wolfson Kfir; Shemer Jehuda; Natanzon Assaf |
11360855 | System and method for analyzing application maximum parallel clone sessions for storage devices | Sharma Anupam |
11360857 | Method and approach for pagination over data stream with sliding window | Tiwari Priyank; Sharma Hari |
11360858 | Method and approach for pagination over data stream with sliding window | Tiwari Priyank; Sharma Hari |
11360862 | System and method for managing backup operations of storage devices in a backup storage system using cluster evaluations based on usage telemetry | Barbalho Hugo de Oliveira; Calmon Tiago Salviano; Vera Sousa Eduardo |
11360954 | System and method for hash-based entropy calculation | Faibish Sorin; Shilane Philip; Basov Ivan; Gonczi Istvan; Armangau Philippe; Vankamamidi Vamsi |
11360968 | System and method for identifying access patterns | Shafik Farida Ahmed Ali; Abdulaal Omar Mohammed Mohammed; Beshara Shary George Waheeb; Reineke Nicole; ElRouby Ahmad Refaat Abdelfadeel Ahmad; Christner Joel Evans |
11360992 | Watermarking of events of an ordered event stream | Danilov Mikhail; Altaye Yohannes |
11361044 | Event-based search engine | Arif Khan Falaah; Mohammed Tousif; Gupta Shubham; Dinh Hung The; Kannappan Ramu |
11361197 | Anomaly detection in time-series data using state inference and machine learning | Calmon Tiago Salviano; Pinho Rômulo Teixeira de Abreu |
11361366 | Method, computer program product, and apparatus for workspace recommendations based on prior user ratings and similar selections | Gaber Shiri; Gefen Avitan |
11362928 | Method, electronic device and computer program product for generating network topology | Chen Tianxiang; Ying Zhi; Wu Pengfei; Liu Jinpeng |
11366590 | Host device with multi-path layer providing dynamic control of one or more path selection algorithms | Mallick Sanjib; Rao Vinay G.; Don Arieh |
11366594 | In-band extent locking | Raff Jason; Vietry Shari; Bernard David |
11366600 | Moving snapshots from a local snapshot lineage on a storage system to a cloud snapshot lineage on cloud storage | Gunasekaran Shanmuga Anand; Vokaliga Deepak; Anthony Michael; Aldred Mark; Bhatnagar Anurag |
11366601 | Regulating storage device rebuild rate in a storage system | Vankamamidi Vamsi K.; Lee Shuyu; Everson Kurt W.; Vutukuri Pavan Kumar; Kubicki Andrew P. |
11366605 | Storage management system and method for storage migration services | Natu Gajanan S.; Hu Kenneth; Young Susan Rundbaken |
11366608 | Method, electronic device and computer readable storage medium for i/o management | Kang Jianbin; Han Geng; Dong Jibing; Gao Hongpo; Tang Haiying; Xu Xinlei; Gao Jian |
11366609 | Technique for encoding deferred reference count increments and decrements | Vankamamidi Vamsi; Armangau Philippe; Tamilarasan Ashok |
11366693 | System and method for deployment interface | Reineke Nicole; King James Robert |
11366697 | Adaptive controller for online adaptation of resource allocation policies for iterative workloads using reinforcement learning | Calmon Tiago Salviano |
11366703 | Dynamic application management across multi-cloud computing environment | Nguyen Thinh Lam Truong; Fong Victor; He Xuebin; Durazzo Kenneth; Nieves Orlando X. |
11366719 | Method, device and computer program product for storage management | Ma Chun; Han Geng; Zhuo Baote; Gao Hongpo |
11366750 | Caching techniques | Soukhman Alex; Shabi Uri; David Bar |
11366756 | Local cached data coherency in host devices using remote direct memory access | Mallick Sanjib; Westin Vincent H.; Benhanokh Gabriel; Wigmore Ian; Don Arieh |
11366758 | Method and devices for managing cache | Jia Ruiyong; Xu Xinlei; Yang Lifeng; Li Xiongcheng; Gao Jian |
11366771 | Host device with multi-path layer configured for detection and resolution of initiator-related conditions | Smith Erik P.; Arnan Ron; Don Arieh |
11366788 | Parallel pipelined processing for snapshot data deletion | Lv Shuo; Zhang Ming |
11366795 | System and method for generating bitmaps of metadata changes | Love Philip; Shveidel Vladimir; David Bar |
11366984 | Verifying a target object based on confidence coefficients generated by trained models | Ni Jiacheng; Liu Jinpeng; Chen Qiang; Jia Zhen |
11368399 | Congestion aware multipathing based on network congestion notifications | Nagaraj Venkatesh Doddamane; Charles Peniel; Gokam Kurumurthy |
11368527 | Decentralized node finder in multi-cloud computing environment | Wu Pengfei; Ying Zhi; Wang Kun |
11372554 | Cache management system and method | Feng Changyu; Spang, IV Henry Austin; Gao Jian; Xu Xinlei; Jia Ruiyong; Liu Yousheng |
11372561 | Techniques for identifying misconfigurations and evaluating and determining storage tier distributions | Thakkar Bina K.; Pancholi Ashish A.; Waser David C. |
11372565 | Facilitating data reduction using weighted similarity digest | Kabishcer Alexei; Shabi Uri; Gazit Ronen |
11372566 | Method and device for storing data | Lei Lu; Wang Chen; Wu Gary Jialei; Cai Ronnie Yu; Sun Ao |
11372573 | System and method for synchronous replication write handling | Taylor Alan L.; Brundage Michael C.; Seela Nagapraveen Veeravenkata; Davenport William C.; Chen Xiangping; Zhou Xunce |
11372579 | Techniques for generating data sets with specified compression and deduplication ratios | Bassov Ivan; Gonczi Istvan; Faibish Sorin |
11372665 | System and method for native and non-native replication for virtual volume based machines | Tylik Dmitry; Sheelvant Girish; Zeldich Michael; Haravu Nagasimha G.; Whitney William C. |
11372681 | Slab memory allocator with dynamic buffer resizing | Wong Tony; Duggal Abhinav; Satyanarayana Hemanth |
11372682 | Method and system for deadline inheritance for resource synchronization | Veprinsky Alexandr; Shvaiger Felix; Kucherov Anton; Don Arieh |
11372705 | Intelligent monitoring of backup and recovery activity in data storage systems | Minarik Jennifer M.; Freeman Brian E.; Malamut Mark |
11372713 | Backup workload prediction and notification for storage systems | Kumar Sunil |
11372722 | Environment independent data protection in a highly available data system | Doshi Girish; Ghodake Ganesh |
11372726 | Method and system for adaptive incrementally updated backups with dynamic data file detection | Upadhyay Navneet; Chunekar Shraddha; Mohan M Rejith |
11372727 | Method, device, and computer-readable storage medium for managing storage system | Ling Qinghua; Zhong Xin; Yang Yue; Shao Yan |
11372728 | Retention time based consistent hash ring | Liao Mengze; Su Lihui; Murti Arun; Che Roger Hongyi; Lin Zhenzhen; Hu Xiaolei |
11372731 | System and method to enable file level recovery of virtual disks and dynamic disks | Srinivasan Sharath Talkad; Kalburgi Smitha Prakash |
11372767 | Selectively processing storage commands at different granularities based on command types | Vankamamidi Vamsi K.; Armangau Philippe; Bernard David; Vietry Shari |
11372772 | Content addressable storage system configured for efficient storage of count-key-data tracks | Meiri David; Kucherov Anton |
11372810 | Storage system implementing snapshot longevity ranking for efficient management of snapshots | Keller Itay; Milstein Nir; Shtarkman Yonatan |
11372814 | Distributed client side deduplication index cache | Simha Dilip N.; Sandholm Thomas; Lopez Julio |
11372887 | Method, device and computer program product for providing visual representation | He Zheng; Zhang Zhipeng; Yang Zhe; Chen Yao; Deng Binbin |
11372904 | Automatic feature extraction from unstructured log data utilizing term frequency scores | Kaushik Vibhor; Beale Peter; Arnold Zachary W. |
11372951 | Proxy license server for host-based software licensing | Sokkalal Mahalakshmi; Pusalkar Maneesh; Rajasekaran Vigneshwaran; Chauhan Surendra Singh; Tyagi Udit; Bhavi Nagaveni; Marappan Gopinath |
11373062 | Model training method, data processing method, electronic device, and program product | Wang Zijia; Ni Jiacheng; Tang Xuwei; Jia Zhen; Yan Jin Ru; Hu Chenxi |
11373189 | Self-learning online multi-layer method for unsupervised risk assessment | Gorelik Boris; Blatt Marcelo; Liptz Liron; Villa Yael; Kaufman Alon |
11374767 | Key-based authentication for backup service | Yu Jing; Zhang Ming; Ruvala Kunal; Zhu Xiaoliang; Liu Min |
11374769 | Efficient and secure distributed ledger maintenance | Perlman Radia J.; Kaufman Charles |
11374811 | Automatically determining supported capabilities in server hardware devices | Sharma Anurag; Korinek Brian P.; Thammaiah Sujayendra R. |
11379118 | Method and system for storage load balancing based on virtual synthetics metadata | Godbole Kedar Sadanand; Madan Nitin; Viswanathan Srikant |
11379121 | Generating recommendations for protection operations performed for virtual storage volumes | Kumar Sunil; Pokharna Prashant; Singh Ashutosh Kumar |
11379138 | Method, device, and computer program product for managing access request in storage system | Liu Bing |
11379142 | Snapshot-enabled storage system implementing algorithm for efficient reclamation of snapshot storage space | Shtarkman Yonatan; Keller Itay; Porath Asaf; Webman Erez |
11379144 | Compliance of replicated data sets | O'Halloran Brian; McLoughlin Siobhan |
11379145 | Systems and methods for selecting devices for backup and restore operations for virtual machines | Chopra Shelesh; Vishwakarma Rahul Deo; Srinivasan Sharath Talkad; Prasad Parmeshwr |
11379146 | Method and system for performing data protection management using an add-on application programming interface | Buchman Matthew Dickey; Ugur-Ozekinci Yasemin; Radha Jayashree B.; Owens Kenneth William; Dobrean Adrian; Bagchi Krishnendu; Upadhyay Navneet; Singh Pawan |
11379147 | Method, device, and computer program product for managing storage system | Wang Yi; Tang Jun; Zheng Qingxiao |
11379209 | Upgrade of a software product | Liu Min; Liu Weiyang; Zhang Ming; Zhang Yubing; Rastogi Naveen |
11379246 | Automatic configuration of multiple virtual storage processors | Burriss Michael L.; Yim Wai C.; Papadopoulos George; Parenti David A.; Dion Christopher R.; De Smet Jochen F. |
11379289 | Encryption detection | LeCrone Douglas E.; Quinn Brett A. |
11379312 | Monitoring and processing storage resource data using smart tagging techniques | Govindan Balasundaram |
11379313 | Efficient method for generating asset backup scheduling plans | Barbalho Hugo De Oliveira; Calmon Tiago Salviano; Vera Sousa Eduardo |
11379314 | Method, device, and computer program product for managing backup task | Wang Yi; Zheng Qingxiao; Liao Lanjun |
11379315 | System and method for a backup data verification for a file system based backup | Yadav Sunil; Sharma Manish; Bansal Aaditya Rakesh; Chopra Shelesh |
11379317 | Uninterrupted file level restore service using siamese engine | Appireddygari Venkataramana Mahesh Reddy; Battal Chetan; Ambaljeri Mahantesh; Shankar DH Swaroop |
11379325 | Path failure information sharing between host devices connected to a storage system | Marappan Gopinath |
11379326 | Data access method, apparatus and computer program product | Dong Jibing; Gao Jian |
11379328 | Transitioning from a donor four site data replication system to a target four site data replication system | Quinn Brett A.; Linstead Paul A.; LeCrone Douglas E. |
11379338 | Customizing option-selections in application based on usage pattern | Nayak Raksha B.; Bindage Abhijit Ashok |
11379375 | System and method for cache management | Gottin Vinicius Michel; Barbalho Hugo de Oliveira; Teixeira de Abreu Pinho Rômulo; Nery Stelling Neto Roberto; Bordignon Alex Laier; Sadoc Menasché Daniel |
11379387 | Storage system with submission queue selection utilizing application and submission queue priority | Gokam Kurumurthy; Nagaraj Venkatesh Doddamane |
11379409 | System and method for managing file system references at scale | Bono Jean-Pierre |
11379449 | Method, electronic device and computer program product for creating metadata index | Zhao Jingrong; Zheng Qingxiao; Wang Yi |
11379482 | Methods, systems, and computer readable mediums for performing an aggregated free-form query | Bourne Geoffrey David; Boettcher James K. |
11379559 | Automatic copy validation using real-world application traffic | Golan Oron; Fireberger Aviram; Zamir Amos; Wolfson Kfir; Shemer Jehuda |
11379595 | Zero-knowledge protection for side channels in data protection to the cloud | Zamir Amos; Shemer Jehuda; Wolfson Kfir |
11381400 | Using double hashing schema to reduce short hash handle collisions and improve memory allocation in content-addressable storage systems | Shoikhet Kirill; Braunschvig Gilad; Zinger Eldad; Luz Kobi; Schneider Zvi |
11381451 | Methods, systems, and computer readable mediums for selecting and configuring a computing system to support a replicated application | Sandham Adrian John |
11385796 | Method, device, and program product for reducing delay in I/O processing due to mirroring of cache data | Liu Yousheng; Jia Ruiyong; Xu Xinlei |
11385804 | Storing de-duplicated data with minimal reference counts | Patwardhan Kedar; Ghatnekar Anand |
11385805 | Method, electronic device and computer program product for managing storage unit | Zhuo Baote; Gao Jian; Han Geng; Gong Shaoqin |
11385813 | Method, device, and computer program product for managing stripe in storage system | Zhang Xiaobo; Xia Sihang; Gong Shaoqin; Zhuo Baote; Han Geng; Gao Jian |
11385818 | Method, electronic device and computer program product for managing disks | Shang Rongrong; Han Geng; Gao Jian; Zhang Xiaobo; Dong Jibing; Gao Hongpo |
11385822 | Moving data from a first group of slices to a second group of slices | Shang Rongrong; Tang Haiying; Zhang Xiaobo; Ni Shuai; Shao Changrui |
11385823 | Method, electronic device and computer program product for rebuilding disk array | Yang Ke; Zhao Zhenhua; Zhuo Baote; Qiu Zhihui; Xia Sihang |
11385824 | Automated seamless migration across access protocols for a logical storage device | Anchi Amit Pundalik; Rao Vinay G.; Mallick Sanjib; Don Arieh |
11385826 | Method, electronic device and computer program product for restoring orphan block via replication | Yao Sicong; Yu Changyong; Shao Jianhua; Liu Xianlong |
11385922 | Elastic cloud service with data driven cost reduction for VMS in the cloud | Savir Amihai; Gefen Avitan; Gamliel Roi |
11385928 | System and method for priority orchestration and scheduling of different background operations | Vankamamidi Vamsi; Armangau Philippe; Gillono John F.; Kachmar Maher; Penney Jason C. |
11385931 | Method, electronic device, and computer program product for processing computing job | Liu Jinpeng; Li Jin |
11385940 | Multi-cloud framework for microservice-based applications | Junior Jaumir Valença da Silveira |
11385941 | System and method for address space slicing with strong CPU core affinity | Gazit Ronen; Shveidel Vladimir |
11385958 | Multi cloud transactional storage for availability and security | Cohen Saar; Natanzon Assaf |
11385965 | Automatically setting a dynamic restore policy in a native cloud environment | Al-Alem Luay; Bett Antony; Natanzon Assaf; Rhodes Michael |
11385967 | Method for managing backup data by having space recycling operations on executed backup data blocks | Tang Jun; Wang Yi; Zheng Qingxiao |
11385968 | System and method for a dynamic data stream prioritization using content based classification | Appireddygari Venkataramana Mahesh Reddy; Kulkarni Gururaj Reddy; Shankar D H Swaroop |
11385989 | Automated code review process using relevance analysis to control selection of and interaction with code reviewers | Chen Xiangping; Meiri David |
11385995 | Method and apparatus for developer code risk assessment | Benny Anilkumar |
11386023 | Retrieval of portions of storage device access data indicating access state changes | Tarikere Madhu; Rao Vinay G. |
11386039 | Userspace split data-centric heterogeneous computing architecture | Liu Jinpeng; Hou Andrew Anzhou; MacLellan Christopher S. |
11386042 | Snapshot-enabled storage system implementing algorithm for efficient reading of data from stored snapshots | Porath Asaf; Keller Itay; Shtarkman Yonatan; Yarimi Michal |
11386043 | Method, device, and computer program product for managing snapshot in application environment | Ling Qinghua; Zhong Xin; Yang Yue; Shao Yan |
11386047 | Validating storage virtualization metadata supporting redirection | Chen Xiangping; Shabi Uri; Gazit Ronen |
11386070 | Method and system for secure data replication data integrity verification | Natanzon Assaf |
11386118 | Physical to virtual journal cascading | Shemer Jehuda; Don Arieh; Cohen Saar |
11386119 | System and method for data orchestration for non-relational databases and key-value storage in multiple computing environments | Fong Victor; He Xuebin |
11386122 | Self healing fast sync any point in time replication systems using augmented Merkle trees | Shemer Jehuda; Solan Alex |
11386207 | Metadata-based floating code signature generation for endpoint devices of a computer network | Rosa Martin; Boucher Etienne |
11387988 | Method, device, and computer program product for managing message in application system | Wu Qian; Hu Bo; Ye Jing |
11388071 | Cloud launch wizard | Brenner Adam E.; Malamut Mark D. |
11388106 | Method, device, and computer program product for edge resource aggregation | He Bin; Hu Chenxi; Li Lian; Wu Baorui |
11388135 | Automated management server discovery | Sethuraman Manikandan; Charles Peniel; Bhavi Nagaveni; Krishnasamy Amudha; Chauhan Surendra Singh |
11388147 | System and method for redirecting data access to local trust managers via an indirection logic service | Todd Stephen James; Shepherd Jason A.; Pike Jimmy Doyle; Dumitru Aurelian; Chawla Gaurav |
11388164 | Distributed application programming interface whitelisting | Joyce Scott E.; Miles Norman M. |
11388168 | Data governance operations in highly distributed data platforms | Dumitru Aurelian; Chawla Gaurav |
11388244 | Method, device, and program product for managing computer system | Ni Jiacheng; Gong Min; Wang Zijia; Jia Zhen; He Bin |
11388367 | Methods and apparatus for automatic media file transcoding | Breitman Karin |
11392295 | Front-end offload of storage system processing | Kamran Lior; Alkalay Amitai |
11392306 | Using storage system memory as host memory | Krasner Jon I.; Don Arieh; Dar Yaron |
11392311 | Overlapping replication cycles for asynchronous replication | Meiri David; Yoder Benjamin |
11392314 | Sequentially writing metadata into a solid state disk by redirect-on-write | Lv Shuo; Zhang Ming |
11392329 | Uniform host attachment | Tylik Dmitry; Lindner Dave J.; Gelotti Carole Ann; Long Matthew |
11392442 | Storage array error mitigation | Alshawabkeh Malak; Gumaste Sunil; Sanap Abhilash; Sachdeva Ravish; Soni Pankaj; Yu Rong |
11392458 | Reconstructing lost data objects by generating virtual user files from available nodes within a cluster | Chinthekindi Ramprasad; Burkule Shyam; Balakrishnan Kalidas; Gunda Kalyan C; Josyula Subrahmanyam |
11392459 | Virtualization server aware multi-pathing failover policy | Patel Rimpesh; Anchi Amit Pundalik |
11392464 | Methods and systems for mirroring and failover of nodes | Bono Jean-Pierre; De Souter Marc A.; Michaud Adrian |
11392490 | Marking impacted similarity groups in garbage collection operations in deduplicated storage systems | Lu Kimberly R.; Brandt Joseph S.; Noto Nicholas A.; Truong Tipper; Arevalo Mariah; Shilane Philip |
11392543 | System and method for optimizing capacity and performance for sparse snapshots | Shveidel Vladimir; Gazit Ronen |
11392551 | Storage system utilizing content-based and address-based mappings for deduplicatable and non-deduplicatable types of data | Natanzon Assaf; Schneider Zvi; Alkalay Amitai |
11392614 | Techniques for performing offload copy operations | David Bar; Gazit Ronen |
11392733 | Multi-dimensional event model generation | Todd Stephen J.; Natanzon Assaf; Savic Dragan; Tabet Said |
11392868 | Data retention cost control for data written directly to object storage | Malamut Mark; Murti Arun; Brenner Adam; Ayzenberg Lev; Vitek Sharon |
11392870 | Maintenance cost estimation | Brit-Artzi Hagit; Alshawabkeh Malak; Don Arieh |
11394397 | System and method for selecting a lossless compression algorithm for a data object based on performance objectives and performance metrics of a set of compression algorithms | Teixeira De Abreu Pinho Rômulo; Gottin Vinicius Michel; Christner Joel Evans |
11394562 | Automatic elevation of system security | Rao Raghavendra Anantha |
11394802 | Dynamic display of operation timing and success rate | Murti Arun; Brenner Adam; Malamut Mark; Anand Vijay |
11397539 | Distributed backup using local access | Kumar Sunil; Nuthakki Krishna Deepak; Don Arieh |
11397540 | Write pressure reduction for remote replication | Mallick Sanjib; Rao Vinay G.; Nuthakki Krishna Deepak; Don Arieh |
11397589 | Snapshot transmission from storage array to cloud using multi-path input-output | Shaw Rabi Shankar; Bhatnagar Anurag; Behera Sarat Kumar |
11397646 | Testing verification paths provided by a verification microservice for a deduplicated object storage system | Truong Tipper; Brandt Joseph; Shilane Philip |
11397705 | Storage system configured to generate sub-volume snapshots | Natanzon Assaf; Don Arieh |
11397834 | Methods and systems for data backup and recovery on power failure | O'Brien, III Walter A.; Dibb Thomas N. |
11397907 | Centralized enterprise integration and services monitoring portal | Gowda Gnanesh; Yathiraj Sharath; Dinh Hung T.; Yeruva Praveen; S Apeksha |
11397919 | Electronic agreement data management architecture with blockchain distributed ledger | Thiagrajan Senthil; Vijendra Sudhir; Todd Stephen |
11398960 | System and method for self-healing of upgrade issues on a customer environment | Chopra Shelesh; Chowdhury Anannya Roy; Sethi Parminder Singh |
11399014 | System and method of obtaining data from private cloud behind enterprise firewall | Pednekar Rohan; Biradar Pramod; Raj Ritansh |
11402998 | Re-placing data within a mapped-RAID environment comprising slices, storage stripes, RAID extents, device extents and storage devices | Dalmatov Nickolay Alexandrovich |
11403001 | System and method for storage system node fencing | Hadav Aric; Glimcher Boris; Alkalay Amitai |
11403017 | Data compression method, electronic device and computer program product | Lv Shuo; Chen Huan; Gong Chen; Zhang Ming; Zhang Leihu |
11403026 | Method, device and computer program product for managing storage system | Zhang Yue; Kang Jianbin; Gao Hongpo; Dong Jibing |
11403036 | Recover time improvement mechanism after device path failure in a storage system | Kamran Lior; Soukhman Alex |
11403175 | Rebuilding data previously stored on a failed data storage drive | Armangau Philippe; Han Geng; Gao Jian |
11403183 | Iterative integer programming with load balance for cyclic workloads | Barbalho Hugo de Oliveira; Calmon Tiago Salviano; Vera Sousa Eduardo |
11403184 | Mitigating and automating backup failure recoveries in data protection policies | Kumar Pravin Ashok; Wang Wei |
11403186 | Accelerating backup by writing to performance ranked memory | Prasad Parmeshwr; Liu Bing; Vishwakarma Rahul Deo |
11403187 | Prioritized backup segmenting | Dutch Michael John; Claudatos Christopher Hercules; Rao Mandavilli Navneeth |
11403190 | Dynamic snapshot scheduling for data storage | Nagarajegowda Deepak; Sethi Parminder Singh |
11403191 | Method for backup destination selection, electronic device, and computer program product | Wang Ren; Jia Zhen; Yu Jing; Wang Qi; Zhang Yun |
11403192 | Enabling point-in-time recovery for databases that change transaction log recovery models | Chockalingam Elango; Bhanushali Jigar; Andra Sunder Ramesh; Behera Amarendra |
11403198 | Managing data within solid state drive storage based on recurring write quotas | Dalmatov Nickolay Alexandrovich |
11403224 | Method and system for managing buffer device in storage system | Xu Xinlei; Gao Jian; Liu Yousheng; Feng Changyu; Han Geng |
11403232 | Sequence thrashing avoidance via fall through estimation | Barbalho Hugo De Oliveira; Dias Jonas F.; Gottin Vinicius Michel |
11403233 | Determining capacity in a global deduplication system | Shabi Uri; Gazit Ronen |
11403258 | Generating hexadecimal trees to compare file sets | Saad Yossef; Glick Itay |
11405446 | Encoding and transmitting stream data without prior knowledge of data size | Kaitchuck Thomas |
11409445 | Method, device, and computer program product for managing storage system | Wang Yi; Zheng Qingxiao; Cheng Qianyun |
11409454 | Container ownership protocol for independent node flushing | Shveidel Vladimir; Vankamamidi Vamsi K. |
11409455 | Method and system for enabling deduplication for asynchronous replication in a storage system | Chen Xiangping; Gazit Ronen |
11409460 | Performance-driven movement of applications between containers utilizing multiple data transmission paths with associated different access protocols | Anchi Amit Pundalik; Mallick Sanjib; Rao Vinay G.; Don Arieh |
11409558 | Method, device and computer program product for job management | Wen Jian; Wang Yi; Min Xing |
11409559 | System and method for weak lock allowing force preemption by high priority thread | Shveidel Vladimir; Gazit Ronen |
11409612 | System and method for an application container backup prioritization based on container information and resource availability | Appireddygari Venkataramana Mahesh Reddy; Chopra Shelesh; Battal Chetan; Shankar D H Swaroop |
11409613 | System and method for raw disk backup and recovery | Doshi Girish Balvantrai; Biradar Pramod Dnyanoba; Pednekar Rohan Sudhakar |
11409614 | Systems and methods for multiple recovery types using single backup type | Chopra Shelesh; Yadav Sunil; Sharma Manish; Bansal Aaditya Rakesh |
11409652 | Estimating worker nodes needed for performing garbage collection operations | Noto Nicholas A; Arevalo Mariah; Shilane Philip; Brandt Joseph S. |
11409666 | Techniques for providing I/O hints using I/O flags | Benhanokh Gabriel; Mallick Sanjib; Don Arieh |
11409670 | Managing lock coordinator rebalance in distributed file systems | Steinke Ron |
11409696 | Methods and systems for utilizing a unified namespace | Bono Jean-Pierre; De Souter Marc A.; Michaud Adrian |
11409700 | Method, electronic device and computer program product for snapshot replication | Ren Changsheng; Shang Qiu; Qian Yue |
11409704 | Method, device and computer program product for managing storage system | Liu Bing; Lin Wei |
11410034 | Cognitive device management using artificial intelligence | Sethi Parminder Singh; Dinh Hung T.; Syed Sabu K.; Kishore Anay; Ramu Kannappan |
11410121 | Proactively predicting large orders and providing fulfillment support related thereto | Chandra Sekar Rao Venkata; Gupta Abhishek; Sudhakar Rashmi; A R Sham; Shipman Peter; Gupta Sumit; R Velmurugan |
11411819 | Automatic network configuration in data protection operations | Shpilyuck Boris; Natanzon Assaf; Zlotnick David |
11411862 | Method, electronic device and computer-readable medium for processing data generated by service | Ying Zhi; Wang Kun; Liu Jinpeng |
11416057 | Power disruption data protection | Krasner John; Lim Clifford; Singh Sweetesh |
11416159 | Method and system for prioritizing critical data object storage during backup operations | Appireddygari Venkataramana Mahesh Reddy; Battal Chetan M.; Shankar D. H. Swaroop; Chopra Shelesh |
11416230 | Smart contract mapping to trusted hardware in a data confidence fabric | Todd Stephen J.; Chawla Gaurav |
11416265 | Performance tuning a data storage system based on quantified scalability | Raghavan Rasa; Morley Steven A. |
11416288 | Method, device and computer program product for service management | Wen Jian; Wang Yi; Min Xing; Li Haitao; Lin Lili; Zou Longcai; Qiao Rong; Yang Hao |
11416289 | Task scheduling method, electronic device, and computer storage medium | Liu Jinpeng; Li Jin; Wu Pengfei; Jia Zhen |
11416330 | Lifecycle of handling faults in next generation storage systems | Chawla Rohit K.; Armangau Philippe; Patel Dixitkumar; Vankamamidi Vamsi K. |
11416342 | Automatically configuring boot sequence of container systems for disaster recovery | Zlotnick David; Natanzon Assaf; Shpilyuck Boris |
11416354 | Techniques for providing intersite high availability of data nodes in a virtual cluster | Sathavalli Bharadwaj R.; Gururajarao Shampavman Chenjeri |
11416380 | Micro services tests prioritization | Gefen Avitan; Gamliel Roi; Savir Amihai |
11416396 | Volume tiering in storage systems | Shatsky Yosef; Matosevich Rivka; Tal Doron |
11416427 | Method, device and computer program product for information processing | Cai Chaoqian; Huang Frank Yifan |
11416441 | RPC-less locking mechanism based on RDMA CAW for storage cluster with active-active architecture | Shveidel Vladimir; Ravich Leonid |
11416450 | Clustering data management entities distributed across a plurality of processing nodes | Du Lejin; Tang Xuan; Babiychuk Oleksandr; Wang Yixuan |
11416453 | Facilitating checkpoint locks for distributed systems | Steinke Ronald |
11416460 | Source-agnostic service for performing deduplication for an object storage | Lu Kimberly; Shilane Philip; Noto Nicholas |
11416462 | Techniques for efficient data deduplication | Wu Peng; Dai Bin; Yu Rong |
11416498 | Method, electronic device, and computer program product for data stream processing | Lei Lu; Huang Frank Yifan; Zhu Julius Jian; Teng Yu |
11416506 | Facilitating temporal data management for anomalous state detection in data centers | de Abreu Pinho Rômulo Teixeira; Sousa Vítor Silva; de Souza Rodrigo Rios Almeida; Stelling Neto Roberto Nery |
11416516 | Prioritization and quality-of-service control for near-zero-added-latency any point in time virtual replication | Cohen Saar; Shemer Jehuda; Wolfson Kfir; Azaria Itay |
11416629 | Method for dynamic pseudofs creation and management in a network filesystem | Fair Robert L.; Vanderputten Thomas R. |
11418331 | Importing cryptographic keys into key vaults | Villapakkam Sridhar; Bhagwat Ajit |
11418588 | Intelligent peer-to-peer container filesystem | Fong Victor; He Xuebin |
11418589 | Object synchronization of server nodes in a network computing environment | Spiegelman Roman |
11418623 | Home-smartmedia-MEC with cloud marketplace | Fong Victor; Bhattacharjee Malini; Seibel Amy; He Xuebin |
11419233 | Adaptor for storage device | Zhai Haifang; Dong David; Zhou Michael Hao; Hu Sandburg Hao; Chen Sean Xu |
11422608 | Power supply method, electronic device, and computer program product | Zhang Min; Cheng Qiulin; Zhang Haohan |
11422680 | Workflow execution framework | Mahapatra Akshaya; Rao Vandana; Chheda Nilay; Kirchhofer Richard; Tan Michael |
11422698 | Method, electronic device, and computer program product for storage management | Liu Jinpeng; Li Jin; Liao Mengze; Yang Wenbin |
11422704 | Adapting service level policies for external latencies | Adams John A.; Don Arieh; Lynch John R. |
11422715 | Direct read in clustered file systems | Walton Jonathan; Laier Max; Raju Suraj; van Rij Cornelis |
11422718 | Multi-path layer configured to provide access authorization for software code of multi-path input-output drivers | Chauhan Surendra Singh; Tyagi Udit |
11422729 | Method, device, and computer readable storage medium for data relocation based on periodicity of access frequency of the data | Chen Chi; Pu Weilan; Zhang Ruiyang |
11422733 | Incremental replication between foreign system dataset stores | Popovich Evgeny; Frank Michael; Voecks Austin; Chung Oliver; Walton Jonathan |
11422735 | Artificial intelligence-based storage monitoring | Gong Min; Marrotte Michael |
11422851 | Cloning running computer systems having logical partitions in a physical computing system enclosure | LeCrone Douglas E.; Linstead Paul A. |
11422865 | Dynamic workload migration to edge stations | Fong Victor; Durazzo Kenneth |
11422899 | System and method for an application container evaluation based on container events | Appireddygari Venkataramana Mahesh Reddy; Chopra Shelesh; Battal Chetan; Shankar D H Swaroop |
11422909 | Method, device, and storage medium for managing stripe in storage system | Gao Jian; Xu Xinlei |
11422975 | Compressing data using deduplication-like methods | Faibish Sorin; Bassov Ivan; Gonczi Istvan; Armangau Philippe |
11423010 | System and method for invalidating multi-level hash table buckets | Harel Bar; David Bar; Shabi Uri |
11423807 | Universal branding panel | Marrs Samuel Maxwell |
11424910 | Enterprise storage of customer transaction data using a blockchain | Savir Amihai; Parush Tzur Anat; Herman Saffar Or; Gefen Avitan; Shitrit Alon |
11425191 | Unified and efficient method to generate file system table (FSTAB) to support on-premise and multi-cloud environment | Su Lihui; Liang Zak Yujun; Tran Dan; Zhang Yubing; Khanna Amit; Wei Olivia |
11429287 | Method, electronic device, and computer program product for managing storage system | Wu Andy Ling; Sun Roland Fei |
11429293 | Techniques for storage management | Vankamamidi Vamsi K.; Armangau Philippe; Lee Shuyu |
11429303 | Method, device, and computer program product for managing storage system | Wang Xingshan; Sun Ao |
11429317 | Method, apparatus and computer program product for storing data | Xiao Pan; Chen Peilei; Du Fang; Chen Xu |
11429318 | Redirect-on-write snapshot mechanism with delayed data movement | Alexeev Sergey Alexandrovich; Shusharin Alexey Vladimirovich; Tylik Dmitry; Belikov Yakov Stanislavovich; Sigalova Ekaterina Konstantinovna |
11429383 | Method, device, and program product for managing development job in development environment | Fu Weijia; Zhao Jun |
11429436 | Method, device and computer program product for determining execution progress of task | Zhu Xiaoliang; Zhang Ming; Yu Jing; Guo Yongsheng; Liu Min |
11429491 | Source-side accelerated indexing for data protection search | Yu Jing; Liao Mengze; Guo Yongsheng; Brenner Adam; Zhang Ming |
11429492 | Protecting and identifying virtual machines that have the same name in a multi-tenant distributed environment | Dethe Tushar; Mallik Shubhashish |
11429493 | Remote rollback of snapshots for asynchronous replication | Chen Xiangping; Meiri David |
11429494 | File backup based on file type | Lin Chao; Sun Li; Qing Tao |
11429497 | Predicting and handling of slow disk | Liu Bing; Weng Lingdong |
11429500 | Selective utilization of processor cores while rebuilding data previously stored on a failed data storage drive | Gao Hongpo; Armangau Philippe; Han Geng; Gao Jian; Gong Shaoqin |
11429517 | Clustered storage system with stateless inter-module communication for processing of count-key-data tracks | Meiri David; Kucherov Anton |
11429531 | Changing page size in an address-based data storage system | Meiri David; Kucherov Anton |
11429537 | Method, device, and computer program product for managing storage system | Ma Chun; Zhuo Baote; Tang Haiying; Qiu Zhihui; Xia Sihang |
11429559 | Compliance recycling algorithm for scheduled targetless snapshots | Von Hein Nicholas; Ferrari Michael; Kinney Daryl; Anwar Shakil; Tao Tao |
11429593 | Maintaining a shared state among networked computing devices using a shared data store | Steinke Ronald; Leimbach David T.; Ranger Mark; Kilpatrick Douglas |
11429626 | Method, device, and program product for managing index of storage system | Su Pengfei; Zhu Julius Jian; Yao Lingling |
11429648 | Method and device for creating an index | Zhang Winston Lei; Chen Charlie; Huang Kun Wu; Liu Jingjing; Dai Duke |
11429679 | System and method for augmenting element records associated with the elements of a distributed computing environment with user-defined content | Bourne Geoffrey D.; Beall, III Arthur O. |
11429902 | Method, device and computer program product for deploying a machine learning model | Liu Jinpeng; Wu Pengfei; Zhao Junping; Wang Kun |
11430413 | Method, device, and computer program product for managing virtual visual content | Jia Zhen; Sha Danqing; He Bin; Tang Xuwei |
11430534 | Method for testing storage systems, electronic device, and computer program product | Wang Hao; Chen Xu; Xiao Pan; Zhang Si |
11431349 | Method, electronic device and computer program product for processing data | Liu Bing; Chen Tao |
11431353 | Encoding method, electronic device, and program product | Lin Zhenzhen; Chen Si; Hou Anzhou |
11431480 | Smart compressor based on adaptive CPU/QAT scheduling method | Liu Bing; Chen Tao; Lin Wei; Zou Yong |
11431647 | Resource allocation using distributed segment processing credits | Desai Keyur B. |
11431666 | Machine learning-based recommendations for modifying delivery of notifications | Bhargava Vivek; Gupta Shubham |
11431674 | Method, device, and program product for managing address of device in network | Chen Rui; Wang Hua; Zou Yuhan |
11431799 | Method, electronic device and computer program product for storing and accessing data | Lin Zhenzhen; Wu Pengfei; Chen Si; Zhang Ruixue |
11435906 | Method, electronic device and computer program product for storage management | Wang Xingshan; Sun Ao; Liu Xiaochen |
11435907 | Ensuring data authenticity using notary as a service | Saad Yossef; Perlman Radia J.; Kaufman Charles William |
11435910 | Heterogeneous mapped redundant array of independent nodes for data storage | Danilov Mikhail; Altaye Yohannes |
11435912 | Method, electronic device, and computer program product for data storage | Zou Weining; Wu Gary Jialei; Zhang Zhiyao |
11435916 | Mapping of data storage system for a redundant array of independent nodes | Danilov Mikhail; Buinov Konstantin |
11435921 | Selective deduplication in a distributed storage system | Meiri David; Chen Xiangping |
11435923 | Forking data streams in a streaming data storage platform | Danilov Mikhail; Paduroiu Andrei |
11435926 | Method, device, and computer program product for managing storage system | Zhang Alex Pengbo; Chen You |
11435927 | Protected saveset volume movement via metadata bootstrap | Roche Michael; Goyal Ashish; Quesnelle Scott; Malle Gowda Kiran Kumar |
11435930 | Intelligent recovery from multiple clouds copies | Saad Yossef |
11435933 | Using any-pit backups for retroactive backup compliance and hardening | Cohen Saar; Shemer Jehuda; Lotosh Valerie; Sharvit Erez |
11435937 | Monitoring for service processors | Esposito Jeffrey D.; Blanchard Michael P. |
11435938 | System and method for generating asset maps | Reineke Nicole; King James Robert |
11435948 | Methods and systems for user space storage management | Bono Jean-Pierre; Tal Doron |
11435954 | Method and system for maximizing performance of a storage system using normalized tokens based on saturation points | Lee Shuyu; Vankamamidi Vamsi K.; Grummon Jeffrey L. |
11435955 | System and method for offloading copy processing across non-volatile memory express (NVMe) namespaces | Venkatanarayanan Prakash; Black David Lionel; Tylik Dmitry |
11435956 | Method, electronic device, and computer program product for data compression | Chen Tao; Han Geng |
11435957 | Selective instantiation of a storage service for a doubly mapped redundant array of independent nodes | Danilov Mikhail; Altaye Yohannes |
11436021 | Adaptive system for smart boot sequence formation of VMs for disaster recovery | Zlotnick David; Natanzon Assaf; Shpilyuck Boris |
11436036 | Systems and methods to decrease the size of a compound virtual appliance file | Morton James; Zhang Ming; Su Lihui; Liu Min; Liang Yujun; Quesnelle Scott |
11436050 | Method, apparatus and computer program product for resource scheduling | Peng Layne Lin; Wang Kun; Li Sanping |
11436056 | Allocation of shared computing resources using source code feature extraction and clustering-based training of machine learning models | Dias Jonas F.; Prado Adriana Bechara; Calmon Tiago Salviano |
11436070 | Achieving storage system performance guarantees by applying transactional I/O scheduling | Ugale Rahul; Zou Colin |
11436089 | Identifying database backup copy chaining | Upadhyay Navneet; M Rejith Mohan |
11436093 | Method, electronic device, and computer program product for backing up data | Yan Jin Ru; Liao Mengze; Wang Qi; Liu Weiyang; Yu Jing |
11436094 | Efficient method to build a backup scheduling plan for a server | Calmon Tiago Salviano; Barbalho Hugo de Oliveira; Sousa Eduardo Vera |
11436098 | Crash recovery of vRPA cluster protection engine | Dudala Kiran Kumar |
11436099 | Backup client agent | Skowronski Andrew; Cline Joseph; Li Jian; Simons Russell Budd; Wu Zhaoding |
11436100 | Backup client agent | Skowronski Andrew; Cline Joseph; Li Jian; Simons Russell Budd; Wu Zhaoding |
11436103 | Replication for cyber recovery for multiple tier data | Madan Nitin; Gunda Kalyan C.; Bhanjois Bhimsen |
11436104 | Decreasing data restoration times using advanced configuration and power interface (ACPI) | Prasad Parmeshwr; Vishwakarma Rahul; Liu Bing |
11436106 | Efficient method for optimizing long-term retention backup policy within recovery point objectives (RPO) | Liao Mengze; Quesnelle Scott Randolph; Yan Jinru; Zhu Xiaoliang; Hu Xiaolei |
11436108 | File system agnostic content retrieval from backups using disk extents | Jourdain Gerald M.; Tewari Abinas |
11436120 | System and method for capacity prediction | Arnold Zachary W.; Kaushik Vibhor |
11436123 | Application execution path tracing for inline performance analysis | Kleiner Vladimir; Shveidel Vladimir; Kucherov Anton |
11436138 | Adaptive endurance tuning of solid-state storage system | Kamran Lior; Alkalay Amitai |
11436142 | System and method for moving metadata without updating references used by the metadata | Vankamamidi Vamsi K.; Armangau Philippe; Seibel Christopher; Shveidel Vladimir |
11436190 | Vaulting data from a public cloud | Marelas Peter |
11436203 | Scaling out geographically diverse storage | Danilov Mikhail; Rakulenko Alexander |
11436209 | Techniques for efficiently determining similarity hashes | Shabi Uri; Titelman Alon; Kabishcer Alexei |
11436219 | Ordering events within a streaming data storage platform | Paduroiu Andrei |
11436224 | Parallel processing database system with a shared metadata store | Welton Caleb E.; Harada Hitoshi; Cohen Jeffrey Ira; Chang Lei; Reddy Radhika; Ma Tao; Wang Zhanwei |
11436231 | Continuous query scheduling and splitting in a cluster-based data storage system | Danilov Mikhail; Vazhenin Maksim |
11436251 | Data size based replication | Kumar Shiv S.; Gahlot Jai P. |
11436345 | Protection of secret client data in a multiple client data deduplication environment | Perlman Radia J.; Kaufman Charles W. |
11436354 | Sparse creation of per-client pseudofs in network filesystem with lookup hinting | Fair Robert L.; Vanderputten Thomas R. |
11436396 | Estimating replication completion time using machine learning techniques | Singh Jitendra; Vishwakarma Rahul D.; Chopra Shelesh |
11436412 | Predictive event searching utilizing a machine learning model trained using dynamically-generated event tags | Rafey Mohammad |
11436509 | Adaptive learning system for information infrastructure | Roy Mainak; Gupta Chitrak |
11438010 | System and method for increasing logical space for native backup appliance | Ugale Rahul; Zou Colin |
11438243 | Adaptive adjustment of links per channel based on network metrics | Ippatapu Venkata L. R.; Dorman Kenneth |
11438245 | System monitoring with metrics correlation for data center | Tao Simon; Cao Yu; Guo Xiaoyan; Durazzo Kenneth |
11438292 | Method and apparatus for filtering undesired email messages | Thangaraj Shankar; Kannan Jaganathan; Dinh Hung; Coleman Shirley |
11438295 | Efficient backup and recovery of electronic mail objects | Chopra Shelesh; Yadav Sunil; Behera Amarendra |
11438325 | Trust establishment by escalation | Begun Ido; Shemer Jehuda |
11438408 | Transferring applications from overutilized arrays of computer systems to underutilized arrays of computer systems | Pancholi Ashish Arvindbhai; Thakkar Bina K.; Waser David C. |
11438413 | Intelligent data storage and management for cloud computing | Sohail Mohamed; Zhao Junping |
11438415 | Managing hash tables in a storage system | Harel Bar; Shabi Uri; Rahamim Maor |
11438423 | Method, device, and program product for transmitting data between multiple processes | Wang Xingshan; Liu Xiaochen; Cao Jiang |
11438436 | System and method for preserving a minority protocol name in a multiple protocol migration | Shi Rongrong; Long Fei; Bankier John D.; Brown Ronald |
11442626 | Network scaling approach for hyper-converged infrastructure (HCI) and heterogeneous storage clusters | Krivenok Dmitry Vladimirovich |
11442633 | Method, electronic device and computer program product for storage management | Kang Jianbin; Dong Jibing; Gong Shaoqin; Gao Jian; Zhuo Baote |
11442636 | Method, apparatus for managing the redundant array of independent disks (RAID) and related computer readable medium | Dong Jibing; Gao Jian; Kang Jianbin |
11442637 | Managing drive space among different data services environments within a storage system | Harduf Yuval; McCann Peter J. |
11442639 | Method, apparatus, and storage medium for managing stripe in storage system | Chen Chi; Fan Huijuan |
11442650 | Generating predicted usage of storage capacity | Huang Jie; Wang Xudong; Wang Ming; Ren Xiaoyu |
11442651 | Method and device for rebuilding data in storage array group | Sun Lei; Gao Jian; Gao Hongpo |
11442663 | Managing configuration data | Gong Shaoqin; Han Geng; Xu Xinlei; Gao Jian; Kang Jianbin |
11442701 | Filtering security controls | Dhillon Danny V.; Lazar Greg W. |
11442793 | Fully dynamic virtual proxies for data protection | Kulkarni Gururaj; Quesnelle Scott |
11442815 | Coordinating backup configurations for a data protection environment implementing multiple types of replication | Kanp Rintu; Syed Razi; Lohchab Sanjeev; Singhal Upanshu |
11442819 | Specialized metadata for managing and searching backup data stored on a cloud-based object storage | Chopra Shelesh; Yadav Sunil; Behera Amarendra; Chitloor Ravi Vijayakumar; Arora Himanshu; Dethe Tushar; Bhanushali Jigar; Singh Deependra; Dubey Prabhat Kumar |
11442822 | Providing an efficient preview capability for restoring emails backed up to an object storage | Chopra Shelesh; Yadav Sunil; Behera Amarendra; Chitloor Ravi Vijayakumar; Arora Himanshu; Dethe Tushar; Singh Deependra; Dubey Prabhat Kumar; Rao Anjana; Chauhan Sapna |
11442860 | Host cache coherency when reading data | Scharland Michael J.; Wigmore Ian; Don Arieh |
11442895 | Method for copying data, electronic device and computer program product | Hu Bo; Wu Qian; Ye Jing |
11442927 | Storage performance-based distribution of deduplicated data to nodes within a clustered storage environment | Mamidi Murthy; Mathew George; Rajimwale Abhishek |
11442958 | Data distribution in continuous replication systems | Savir Amihai; Natanzon Assaf |
11443146 | Methods, devices, and computer program products for model adaptation | Zhang Ruixue; Liu Jinpeng; Lin Zhenzhen; Wu Pengfei; Chen Si |
11443168 | Log analysis system employing long short-term memory recurrent neural net works | Srinivas Vivek; Jindal Bhavna |
11443556 | Method, device, and program product for keystroke pattern analysis | Wang Zijia; Chen Qiang; Ni Jiacheng; Jia Zhen |
11449234 | Efficient data access operations via a mapping layer instance for a doubly mapped redundant array of independent nodes | Danilov Mikhail; Buinov Konstantin |
11449237 | Targetless snapshot system replication data pointer table | Ferrari Michael; Wilson Jeffrey; Chandrashekhara Sandeep |
11449248 | Mapped redundant array of independent data storage regions | Danilov Mikhail; Buinov Konstantin |
11449257 | Host device with efficient automated seamless migration of logical storage devices across multiple access protocols | Rao Vinay G.; Mallick Sanjib; Gaurav Natasha; Don Arieh |
11449279 | Performance of a multi-core storage system | Kang Jianbin; Han Geng; Shveidel Vladimir |
11449398 | Embedded container-based control plane for clustered environment | Jean Matthew; O'Reilly Daniel K.; Hicks Richard |
11449399 | Mitigating real node failure of a doubly mapped redundant array of independent nodes | Danilov Mikhail; Altaye Yohannes |
11449400 | Method, device and program product for managing data of storage device | Han Geng; Xu Xinlei; Feng Changyu; Gao Jian |
11449402 | Handling of offline storage disk | Zhuo Baote; Dong Jibing; Gao Jian; Kang Jianbin |
11449406 | Controlling a storage system based on available power | Zhang Min; Cheng Qiulin; Zhang Haohan |
11449408 | Method, device, and computer program product for obtaining diagnostic information | Xu Maoyang; Du Fang |
11449425 | Using storage class memory as a persistent operating system file/block cache | Don Arieh; Sahin Adnan; Martin Owen; Blok Peter; Derbeko Philip |
11449440 | Data copy offload command support across multiple storage access protocols | Anchi Amit Pundalik; Patel Rimpesh |
11449466 | Deleting orphan archived files from storage array using a time-based decision algorithm | Corniquet Frederic; Bhatnagar Anurag; Ghosh Priyamrita |
11449468 | Enforcing minimum space guarantees in thinly-provisioned file systems | Yu Changyong; Liu Xianlong; Jiang Yuetao; Dou Ruiling; Luo Banghui; Forrester Walter C. |
11449480 | Similarity hash for binary data pages | Shabi Uri; Titelman Alon; Gazit Ronen |
11449749 | Issuing alerts for storage volumes using machine learning | Meiri David; Kucherov Anton |
11451574 | Detecting security threats in storage systems using artificial intelligence techniques | Gowda Deepak; Thakkar Bina K.; Liu Wenjin |
11455101 | Managing I/O connectivity issues | Rajapa Alan; Rowlands Scott; Smith Erik P.; Fradkin Igor; Don Arieh |
11455114 | Consolidation and migration of cloud data | Chinthekindi Ramprasad N.; Mathew George; Goyal Rahul; Kamat Mahesh |
11455116 | Reservation handling in conjunction with switching between storage access protocols | Anchi Amit Pundalik; Rao Vinay G.; Mallick Sanjib; Don Arieh |
11455213 | Method and system for parallel data transmission and cooperating backups | Upadhyay Navneet; Mohan M Rejith |
11455214 | Client data driven smart backup scheduler | Ashokkumar Pravin Kumar; Andra Sunder Ramesh; Chidambaram Elakkuvan |
11455216 | Method and system for generating synthetic backups using pseudo-asset backups | Sharma Manish; Bansal Aaditya Rakesh; Chopra Shelesh; Yadav Sunil |
11455220 | Cloud to cloud disaster recovery | Shpilyuck Boris; Zlotnick David; Natanzon Assaf |
11455281 | Generating and morphing a collection of files in a folder/sub-folder structure that collectively has desired dedupability, compression, clustering and commonality | Dangi Salil; Daza Ernest |
11455282 | System for queuing backup operations in a deduplicating storage system | Kulkarni Gururaj; Hebbar Manjunatha |
11455319 | Merkle tree forest for synchronizing data buckets of unlimited size in object storage systems | Solan Alex; Shemer Jehuda |
11455320 | Automated expansion and reduction of replicated data sets | O'Halloran Brian; McLoughlin Siobhan; Fleming Peter; Neville Martin; O'Driscoll Brid |
11455405 | Optimizing docker image encryption—tradeoff between performance and protection level | Wolfson Kfir; Shemer Jehuda; Sapir Stav; Zamir Amos; Radami Naor |
11455556 | Framework for measuring telemetry data variability for confidence evaluation of a machine learning estimator | Abelha Ferreira Paulo; Bechara Prado Adriana; da Silva Pablo Nascimento |
11455577 | Automatically allocating device resources using machine learning techniques | Vishwakarma Rahul; Gaikwad Hemant; Singh Gopal |
11455676 | Data-driven hardware configuration recommendation system based on user satisfaction rating | Parush Tzur Anat; Gefen Avitan; Savir Amihai |
11456885 | Data set valuation for service providers | Todd Stephen; Dietrich David |
11460320 | Analysis of smart meter data based on frequency content | Das Kaushik K.; Raghu Rashmi |
11461007 | Method, device, and computer program product for determining failures and causes of storage devices in a storage system | Weng Lingdong; Liu Bing |
11461012 | Non-disruptive data migration from a source storage array to a destination storage array | Feng Changyu; Liu Yousheng; Tang Haiying; Zhang Xiaobo; Xia Sihang |
11461014 | Modifying function pointers to back up application data | Yadav Sunil; Buchman Matthew; Mandic Vladimir |
11461018 | Direct snapshot to external storage | Quinn Brett A.; Linstead Paul A.; LeCrone Douglas E. |
11461023 | Flexible expansion of data storage capacity | Li Jun; Guyer James M.; Ives Stephen R. |
11461026 | Non-disruptive update of host multipath device dependency | Marappan Gopinath; Tarikere Madhu; Rajappa Ajaykumar |
11461029 | Techniques for storage management | Han Geng; Proulx Ronald D.; Gong Shaoqin; Zhuo Baote; Zhang Xiaobo |
11461054 | Concurrent tape access | LeCrone Douglas E.; Linstead Paul A.; McLoskey Larry W. |
11461084 | Optimizing docker image encryption—kubernetes using shamir secrets to enforce multiple constraints in container runtime environment | Wolfson Kfir; Shemer Jehuda; Sapir Stav; Radami Naor |
11461133 | Method for managing backup jobs, electronic device and computer program product | Liu Min; Zhang Ming; Wang Ren; Zhu Xiaoliang; Yu Jing |
11461140 | Systems and methods for controller-worker architecture for searching a storage system | Shilane Philip |
11461145 | Building neural networks for resource allocation for iterative workloads using reinforcement learning | Calmon Tiago Salviano; Gottin Vinícius Michel |
11461180 | Optimized document backup to cloud-based object store | Malamut Mark; Brenner Adam; Murti Arun |
11461182 | Storage system backup and de-duplication | Nagarajegowda Deepak; Bikumala Sathish |
11461183 | Trivial snapshots | Govindan Balasundaram |
11461187 | Protecting large distributed file systems | Quesnelle Scott; Kulkarni Gururaj; Kumar Ati Pavan; Yadav Rangapuram Ravi Kishore |
11461188 | Automated failover backup reconfiguration management for storage systems | Kumar Sunil |
11461189 | Method and system for archiving user data during backup generation | Yadav Sunil; Chopra Shelesh; Behera Amarendra; Dethe Tushar; Arora Himanshu; Singh Deependra Pratap; Bhanushali Jigar Premjibhai; Chauhan Sapna; Rao Anjana; Kaushal Vipin Kumar; Chitloor Ravi Vijayakumar |
11461190 | Filesystem operation bookmarking for any point in time replication | Shemer Jehuda; Solan Alex |
11461211 | Method and system for provisioning workflows with data management services | Harwood John S.; Lincourt, Jr. Robert Anthony; White William Jeffery |
11461218 | Analyzing user API usage from recorded API macros for software product improvement | Malamut Mark; Brenner Adam; Murti Arun |
11461250 | Tuning data storage equipment based on comparing observed I/O statistics with expected I/O statistics which are defined by operating settings that control operation | Dalmatov Nickolay Alexandrovich; Bezugly Kirill Alexsandrovich |
11461267 | Method, device and computer readable medium for accessing files | Liao Lanjun; Zheng Qingxiao; Wang Yi |
11461269 | Metadata separated container format | Liang Shuang; Kamat Mahesh; Bhanjois Bhimsen |
11461276 | Method and device for deduplication | Zhang Leon; Fang Henry Hao; Gong Chen; Zhang Lester Ming; Wang Yongli; Chen Huan |
11461284 | Method, device and computer program product for storage management | Nie YuHong; Wu Pengfei; Chen Tianxiang |
11461287 | Managing a file system within multiple LUNS while different LUN level policies are applied to the LUNS | Dalmatov Nickolay Alexandrovich |
11461291 | Method, electronic device and computer program product for processing machine learning model | Liu Jinpeng; Wu Pengfei; Ying Zhi; Zhao Min |
11461303 | IO metadata management for directly connected host | Tobin Kevin M.; Benhanokh Gabi; Chanler Andrew L.; Cartmell Jerome J. |
11461362 | Merkle super tree for synchronizing data buckets of unlimited size in object storage systems | Solan Alex; Shemer Jehuda |
11461441 | Machine learning-based anomaly detection for human presence verification | Shapiro Dany; Gaber Shiri; Arnon Ohad |
11461467 | Detecting and mitigating malicious software code embedded in image files using machine learning techniques | Saffar Or Herman; Savir Amihai; Gehtman Yevgeni |
11461676 | Machine learning-based recommendation engine for storage system usage within an enterprise | Thakkar Bina K.; Luktuke Roopa A.; Su Chao; Krishnan Aditya; Gowda Deepak |
11461679 | Message management using machine learning techniques | Damodaran Sivaraman; Reddy Mahesh Reddy Nagaiah; Shivakumar Vijayasri Chikmagalur; Buwade Narendra; Mohanty Bijan K.; Dinh Hung T.; Neithalath Navin Kumar; VenkateshaMurthy Girish; Das Rohit; Tripathy Sristirupa |
11463315 | Creating and managing dynamic workflows based on occupancy | Harwood John S.; Lincourt, Jr. Robert Anthony; White William Jeffery |
11463322 | Digital twin architecture for internet-connected device computing environment | Sha Danqing; Jia Zhen; Liu Jinpeng; Durazzo Kenneth |
11463458 | Protecting against and learning attack vectors on web artifacts | Roy Mainak; Gupta Chitrak |
11463888 | Method, device, and computer program product for managing a mobile terminal | He Bin; Wu Pengfei; Lin Zhenzhen; Chen Si; Zhang Ruixue |
11467635 | Storage processor and storage system | Cheng Jesse; Yu Adam; Liu Ricky |
11467738 | Failsafe mechanism to import snapshots | Singh Ashutosh Kumar; Chikkanayakanahally Manjesh Venkatanarayana |
11467751 | Migation of data portions between different sized slices in the same of different performance tier | Dalmatov Nickolay |
11467755 | Method and system for enabling agentless backup and restore operations on a container orchestration platform | Bett Antony; Natanzon Assaf; Al-Alem Luay |
11467756 | System and method for service device initiated backup generation | Shankar D H Swaroop; Appireddygari Venkataramana Mahesh Reddy; Battal Chetan |
11467765 | Detection and mitigation of slow drain issues using response times and storage-side latency view | Rao Vinay G.; Smith Erik P.; Tannous Massarrah N.; Pierre Jean Evans |
11467778 | Creating high availability storage volumes for software containers | Degwekar Anil Arun; Dubey Utkarsh; Padhi Prasant Kumar |
11467906 | Storage system resource rebuild based on input-output operation indicator | Doddaiah Ramesh; Mulligan, III Bernard A. |
11467915 | System and method for backup scheduling using prediction models | Shetty Sujan Kumar; Balasubramanian Prasanth; Shet Sushanth; Chopra Shelesh; Balasubramanian Jaishree |
11467916 | Method, device, and computer program product for storage management | Li Haitao; Wang Yi; Zheng Qingxiao; Li Ke |
11467918 | System and method for resilient backup generation | Singhal Upanshu; Mehta Shilpa; Onkarappa Shivakumar Kunnal; Seth Archit; Singh Chakraveer; Prakash Chandra; Bhardwaj Rahul; Mittal Pradeep; Priyanka Kumari; Purwar Akansha; Dabburi Lalita; Sharma Manish; Khan Asif; Chopra Shelesh |
11467920 | Methods and systems to index file data of virtual machine (VM) image | Liu Cherami; Zhang Yubing; Zhang Scott; Su Lihui; Jourdain Jerry; Brenner Adam |
11467930 | Distributed failover of a back-end storage director | Yin Peng; Li Ningdong; Wang Jiahui; Hu Shao Kuang |
11467947 | Automated mocking of computer system deployments | Bryan Matthew; Kumar Shiv Shankar; Chandra Anurag; Patil Shubham |
11467963 | System and method for reducing reference count update contention in metadata blocks | David Bar; Harel Bar; Zalstein Dror |
11468010 | Method, apparatus, and compute program product for determining consistence level of snapshots of virtual machines | Guo Jingjing; Wang Lei; Yu Jing; Zhu Xiaoliang |
11468012 | Garbage collection assisted deduplication in a log structured file system | Chinthekindi Ramprasad; Duggal Abhinav |
11468016 | Method and system for parallelizing backup generation operations using pseudo-asset backups | Sharma Manish; Bansal Aaditya Rakesh; Chopra Shelesh; Yadav Sunil |
11468091 | Maintaining consistency of asynchronous replication | Bora Bhaskar; Halstead Mark J.; Specht Michael E.; Yoder Benjamin; Vokaliga Deepak |
11468193 | Data masking in a microservice architecture | Lu Kimberly R.; Brandt Joseph S.; Shilane Philip N. |
11468451 | Leveraging sensor data valuation | Todd Stephen J. |
11469880 | Data at rest encryption (DARE) using credential vault | Ponnuswamy Senthil; Jreij Elie; Vinante Marcelo; Sharma Anurag |
11474715 | Storage system configuration change tracking for root cause/troubleshooting | Nagarajegowda Deepak; Thakkar Bina |
11474716 | Method, device, and computer program product for creating stripe in storage system | Chen Michael; Fan Huijuan |
11474733 | Public cloud provider cost optimization for writing data blocks directly to object storage | Ayzenberg Lev; Malamut Mark; Drobachevsky Maxim; Vitek Sharon; Shemer Jehuda; Brenner Adam; Murti Arun |
11474734 | Tracking data mirror differences | Lake Brian; Salamon Victor |
11474744 | Method, device, and computer program product for managing memories | Chen Chi; Dong Hailan |
11474749 | Configuring host access for virtual volumes | Black David L.; Tylik Dmitry Nikolayevich; Shusharin Alexey Vladimirovich; Shem Tov Marina; Gupta Mukesh |
11474803 | Method and system for dynamic upgrade predictions for a multi-component product | Su Lihui; Zhang Scott; Liang Zak; Morton James; Che Roger Hongyi |
11474817 | Provenance-based reuse of software code | Sousa Vitor; Dias Jonas F.; Prado Adriana Bechara |
11474850 | Method and system for efficient virtual machine operation while recovering data | Yu Jing; Zhang Ming; Wang Ren; Liu Weiyang; Quesnelle Scott Randolph; Liao Mengze |
11474904 | Software-defined suspected storage drive failure identification | Sharma Anurag; Korinek Brian P. |
11474906 | Method and system for performing data protection services for user data associated with calendar groups | Rao Anjana; Dethe Tushar; Chauhan Sapna; Bhanushali Jigar Premjibhai; Yadav Sunil; Behera Amarendra; Chopra Shelesh; Arora Himanshu; Kaushal Vipin Kumar; Singh Deependra Pratap |
11474910 | Method, device and computer program product to backup data | Zhong Xin; Ling Qinghua; Shao Yan; Li Jianbao |
11474913 | Restoration of snapshots from cloud using differential snapshot mechanism | Bhatnagar Anurag; Behera Sarat Kumar |
11474919 | Method for managing multiple disks, electronic device and computer program product | Gao Jian; Gao Hongpo; Sun Lei |
11474938 | Data storage system with multiple-size object allocator for disk cache | Shveidel Vladimir; Han Geng; Bao Haiyun; Gong Shaoqin |
11475073 | System and method for management of data from deployments | Todd Stephen James |
11475125 | Distribution-based aggregation of scores across multiple events | Sunkavally Naveen; Diato Leandro E. |
11475159 | System and method for efficient user-level based deletions of backup data | Yadav Sunil; Sharma Manish; Bansal Aaditya Rakesh |
11475160 | Data masking in a microservice architecture | Lu Kimberly R.; Brandt Joseph S.; Shilane Philip N. |
11475171 | Authentication using pairwise secrets constructed from partial secrets | Levy Shoham; Nir Yoav |
11475356 | Data processing method, electronic device and computer readable storage method for deduplication of a training dataset | Cui Wei; Wang Kun |
11481130 | Method, electronic device and computer program product for processing operation commands | Zhang Zhibin; Kuang Yalan |
11481131 | Techniques for estimating deduplication between storage volumes | Dar Shaul; Shabi Uri; Gazit Ronen |
11481137 | Data replication techniques | Bora Bhaskar |
11481138 | Creating indentical snapshots | Barber Michael; Dar Yaron; Specht Michael E.; Don Arieh |
11481147 | Buffer allocation techniques | Fradkin Igor; Rowlands Scott; Don Arieh |
11481275 | Managing reconstruction of a malfunctioning disk slice | Zhuo Baote; Ma Chun; Gao Hongpo; Dong Jibing; Kang Jianbin; Gao Jian |
11481276 | Backup agent scaling with evaluation of prior backup jobs | Wang Wei; Malamut Mark |
11481277 | System and method for automated restoration of recovery device | Peros Roko; Lee Kenneth D.; Sonner Helga |
11481278 | System and method for recovering an operating system after a runtime hang using a dual-flash device | Yu Xinghai; Zou Colin |
11481286 | Storage based file FTP | Don Arieh; Smaldone Stephen D.; Rao Vinay G.; Mallick Sanjib |
11481291 | Alternative storage node communication channel using storage devices group in a distributed storage system | Kamran Lior; Shveidel Vladimir |
11481312 | Automation framework for monitoring and reporting on resource consumption and performance bottlenecks | Tetreault Brian R.; Sullivan William James; Spiridigliozzi Ginamarie E. |
11481341 | System and method for dynamically adjusting priority-based allocation of storage system resources | Kachmar Maher; Armangau Philippe; Wahl Michael P.; Vankamamidi Vamsi; Wang Yubing; Seibel Christopher; Jones Christopher J.; McCoy James Vega |
11481356 | Techniques for providing client interfaces | Singhal Maneesh; Jmt Adarsh Pradhan; Nayak Jharanabala |
11481381 | System and method for non-disruptive in-memory certificate management | Kollu Ranjit; Fang Yi; Zhao Jingyan |
11481740 | Distributed ledger for peer-to-peer cloud data asset valuation | Todd Stephen; Lincourt, Jr. Robert A.; Nossik Misha; Du Lejin |
11483286 | System and method for identifying network addresses assigned to computing devices | Tolstoy Vasiliy |
11483945 | High-density cable management bar | Gundogan Ilhan C.; Johnson Keith C. |
11486709 | Ground distance determination using zone-based location data | Zaslavsky Alex; Luo Guoying; Machani Salah E. |
11487432 | Direct response to IO request in storage system with remote replication | Aharoni Dan; Keller Itay |
11487453 | Load balancing in a storage system | Dar Shaul; Gefen Avitan; Savir Amihai |
11487460 | Deferred reclamation of invalidated entries associated with replication in a log-structured array | Keller Itay; Aharoni Dan |
11487463 | Adaptive replication modes in a storage system | Chen Xiangping; Hu Ying |
11487470 | System and method for managing storage space usage on a storage system | Vankamamidi Vamsi K.; Li Liam; Liu Yousheng; Xu Xinlei |
11487528 | Managing system upgrades in a network computing environment | Spiegelman Roman; Matosevich Rivka |
11487570 | Efficient creation of endpoints for accessing services directly within a cloud-based system | Shpilyuck Boris; Matatov Yossi |
11487589 | Self-adaptive batch dataset partitioning for distributed deep learning using hybrid set of accelerators | Cui Wei; Li Sanping; Wang Kun |
11487592 | Dynamic application migration across storage platforms | Martin Owen; Specht Michael E.; Randolph Benjamin A. |
11487606 | Automated alert augmentation for deployments of software-defined storage | Gallacher Sean R.; Dawe Trevor H.; Young Eric; Bibby Ian D. |
11487629 | Method, device and computer program product for managing data backup | Sun Adona Li; Zheng Qingxiao; Liao Sager; Wang Jing; Wang Beryl Xueqing; Bai Bing |
11487637 | Global inline name space verification for distributed file systems | Hickey Charles I; Mamidi Murthy V; Chourasia Neerajkumar N |
11487641 | Micro services recommendation system for identifying code areas at risk | Gefen Avitan; Gamliel Roi; Savir Amihai |
11487664 | Performing data reduction during host data ingest | Vankamamidi Vamsi K.; Gazit Ronen |
11487704 | Method, a device, and a computer program product for adjusting a storage space | Tan Jiang; Wang Hao; Zhao Chaojun; Zeng Hongyuan; Zhang Yang |
11487706 | System and method for lazy snapshots for storage cluster with delta log based architecture | Shveidel Vladimir; Love Philip |
11487862 | Basic input/output system protection using multi-factor authentication based on digital identity values | Shachar Tomer; Gehtman Yevgeni; Balin Maxim; Saffar Or Herman |
11487873 | Risk score generation utilizing monitored behavior and predicted impact of compromise | Ramzan Zulfikar A.; Davis Sashka T.; Arunski Kevin J.; Quackenbush Ed G.; Moore Scott; Douglas Kevin T.; Thielke Abram |
11487895 | Client-side encryption and processing of telemetry data | Sunkavally Naveen; Davis Sashka T. |
11488045 | Artificial intelligence techniques for prediction of data protection operation duration | Calmon Tiago Salviano; Sousa Eduardo Vera; Barbalho Hugo de Oliveira |
11489727 | Automatically replicating configuration parameters from securely identified connected systems | Shah Maunish A.; Sharma Anurag; Scott Gavin D. |
11489824 | Automated key management for remote devices using single sign-on techniques | Robbins Alex John; Rothschild Seth Jacob |
11489917 | Method and system for backing up and restoring data | Liu Ried Ruifang; Zou Colin Yong; Lv Man; Xu Tao |
11494091 | Using checksums for mining storage device access data | Patel Rimpesh; Anchi Amit Pundalik |
11494096 | System and method for storage array enclosure discovery | Glimcher Boris; Krivenok Dmitry |
11494099 | Method, device, and computer program product for managing storage system | Li Xiongcheng; Xu Xinlei; Feng Changyu; Xia Sihang |
11494100 | Method, device and computer program product for storage management | Liao Mengze; Yu Jing; Zhang Ming; Guo Yongsheng; Yan Jin Ru |
11494103 | Memory-efficient processing of RAID metadata bitmaps | Kucherov Anton; Meiri David |
11494127 | Controlling compression of input/output (I/O) operations) | Martin Owen; Alshawabkeh Malak |
11494129 | Method, electronic device and computer program product for accessing storage system | Hu Jun; Yim Wai C.; Liu Yang; Fu Fengwei; Lu Yinlong |
11494185 | Method, device and computer program product for thread management | Zhang Ming; Chen Huan; Lv Shuo |
11494210 | Maintaining management communications across virtual storage processors | Krivenok Dmitry Vladimirovich; Dion Christopher R.; Burriss Michael L. |
11494239 | Method for allocating computing resources, electronic device, and computer program product | Fernandez Orellana Pedro; Jia Zhen |
11494250 | Method and system for variable level of logging based on (long term steady state) system error equilibrium | Chopra Shelesh; Ambaljeri Mahantesh; Sadananda Girish Chandra Belmanu; Kulkarni Gururaj; Vishwakarma Rahul Deo |
11494253 | Data record anomaly reconciliation using machine learning models | Savir Amihai; Gershon Noga |
11494268 | Dynamically selecting optimal instance type for disaster recovery in the cloud | Shemer Jehuda; Shpilyuck Boris; Dubrovsky Igor |
11494269 | Intelligent data dissemination | Chopra Shelesh; Kulkarni Gururaj; Mandic Vladimir |
11494271 | Dynamically updating database archive log dependency and backup copy recoverability | Upadhyay Navneet; M Rejith Mohan; Ramachandran Amith; Chopra Shelesh; Ugur-Ozekinci Yasemin; Owens Ken |
11494272 | Method, device, and computer program product for data protection | Zhang Simon; Cheng Leon Qianyun |
11494282 | Method, device and computer program product for sensor data analysis | Lin Zhenzhen; Wu Pengfei; Chen Si |
11494301 | Storage system journal ownership mechanism | Shveidel Vladimir; Kamran Lior |
11494303 | Data storage system with adaptive, memory-efficient cache flushing structure | Shveidel Vladimir; Han Geng; Liu Yousheng |
11494335 | Reconstructing lost data objects by generating virtual user files from available tiers within a node | Chinthekindi Ramprasad; Burkule Shyam; Balakrishnan Kalidas; Gunda Kalyan C; Josyula Subrahmanyam |
11494399 | Method, device, and computer-readable storage medium for bitmap conversion | Gu Yuan; Zhong Xin; Ling Qinghua; Yang Yue; Shao Yan; Han Lei; Li Jianbao |
11494405 | Lock contention resolution for active-active replication performed in conjunction with journal recovery | Chen Xiangping; Meiri David |
11494508 | Secrets as a service | Whitmer Ray David |
11496284 | Detection of unauthorized encryption using key length evaluation | Gehtman Yevgeni; Balin Maxim; Shachar Tomer |
11496550 | Method, system, and computer program product for deploying application | Liu Jinpeng; Li Jin |
11500209 | Method, electronic device, and computer program product for displaying graphic interfaces | Sha Danqing; Jia Zhen; Hou Anzhou; He Bin |
11500540 | Adaptive inline compression | Faibish Sorin; Bassov Ivan; Gonczi Istvan; Armangau Philippe; Vankamamidi Vamsi K. |
11500549 | Secure host access to storage system resources via storage system interface and internal switching fabric | Wigmore Ian; Tringale Alesia A.; Duquette Jason J. |
11500556 | Storage system with passive witness node | Golan Sally; Loya Liran; Harduf Yuval |
11500558 | Dynamic storage device system configuration adjustment | O'Halloran Brian; Bradley Paul |
11500560 | Method to suggest best SCM configuration based on resource proportionality in a de-duplication based backup storage | Prasad Parmeshwr; Vishwakarma Rahul Deo |
11500577 | Method, electronic device, and computer program product for data processing | Gong Shuguang; Liu Bing |
11500579 | Consolidated write system and method | Taylor Alan L.; Seela Nagapraveen Veeravenkata; Haidar Tarek |
11500590 | Method, device and computer program product for data writing | Zhang Leihu; Gong Chen; Lv Shuo |
11500712 | Method and system for intelligent proactive error log activation | Chopra Shelesh; Ambaljeri Mahantesh; Sadananda Girish Chandra Belmanu; Kulkarni Gururaj; Vishwakarma Rahul Deo |
11500717 | Method for detecting data storage system, device and data storage system | Zhang Min; Zhu Zhonghua; Tang Guifeng; Cheng Qiulin; Huang Yechen; Dong Zhenhua; Dibb Thomas |
11500726 | Method, device, and program product for selecting rebuild destination in storage system | Zhuo Baote; Gao Jian; Yang Lifeng; Xu Xinlei; Dong Jibing |
11500732 | Method and system for performing data protection services for user data associated with calendar events | Yadav Sunil; Chopra Shelesh; Behera Amarendra; Dethe Tushar; Arora Himanshu; Bhanushali Jigar Premjibhai; Kaushal Vipin Kumar; Chauhan Sapna; Rao Anjana; Singh Deependra Pratap |
11500734 | System and method for prioritizing backup generation | Chopra Shelesh; Balasubramanian Jaishree; Shetty Sujan Kumar |
11500735 | Dynamic optimization of backup policy | Wang Wei; Lei Boda |
11500738 | Tagging application resources for snapshot capability-aware discovery | Chopra Shelesh; Singh Pawan; Ugur-Ozekinci Yasemin; Radha Jayashree |
11500739 | Creating remote backup copies in asynchronous replication arrangements involving relatively long cycle times | Kumar Sunil; Dar Yaron; Mankad Udgith; Don Arieh |
11500740 | Continuous data protection | LeCrone Douglas E. |
11500746 | Method, device and computer program product for managing data storage | Zhuo Baote; Xu Xinlei; Liu Yousheng |
11500749 | Distributed data store for testing data center services | Tischler Wyatt; Simons Brian; Qin Antony |
11500799 | Managing access to a CPU on behalf of a block application and a non-block application | Kamran Lior; Alkalay Amitai |
11500813 | Instant replay of a file to a cloud tier on a deduplication file system | Madan Nitin; Godbole Kedar; Viswanathan Srikant; Bhanjois Bhimsen; Gunda Kalyan; Balakrishnan Kalidas; Nambiar Vivek; Risbud Chetan |
11500815 | Dual relationship-based hash structure for non-volatile memory technology | Singh Gopal; Singh Pooja; Vishwakarma Rahul D.; Chopra Shelesh |
11500873 | Methods and systems for searching directory access groups | Huang Frank; Liu Cherami; Wang Aaron Ren; Wang Hanson |
11500879 | Method, device, and program product for managing index of streaming data storage system | Su Pengfei; Yao Lingling |
11500943 | Method and system for cached early-binding document search | Chen Chao; Liu Jingjing; Zhang Lei; Huang Kunwu; Dai Hongtao; Teng Ying |
11501155 | Learning machine behavior related to install base information and determining event sequences based thereon | Sivaraman Diwahar; Sudhakar Rashmi; Putturaya Kartikeya; Gupta Abhishek; Chandra Sekar Rao Venkata |
11502853 | Establishing trust on a data storage network | Don Arieh; Jreij Elie Antoun |
11507273 | Data reduction in block-based storage systems using content-based block alignment | Shabi Uri; Gazit Ronen |
11507276 | Systems and methods to submit unaligned IO on an alignment-required IO stack | Zhu Zhonghua; Yim Wai C.; McCann Peter J.; Tang Guifeng; Huang Yechen; Li Honggang; Dong Zhenhua |
11507278 | Proactive copy in a storage environment | Xu Xinlei; Gao Jian; Han Geng |
11507279 | Data storage migration in replicated environment | Danilov Mikhail; Altaye Yohannes |
11507286 | Performing storage provision operations on a file system | Yao Sicong; Huang Liang; Yang Ruipeng; Shao Jianhua; Liu Xianlong |
11507287 | Adding single disks to an array by relocating raid members | Hua Kuolin; Gao Kunxiu |
11507290 | Method and apparatus for storage device management | Dalmatov Nickolay; Natanzon Assaf |
11507293 | Method, electronic device and computer program product for managing storage blocks | Bao Haiyun; Han Geng; Gong Shaoqin; Kang Jianbin; Gao Jian |
11507294 | Partitioning a cache for fulfilling storage commands | Alkalay Amitai; Glimcher Boris |
11507305 | Concurrently performing normal system operations and garbage collection | Truong Tipper; Arevalo Mariah; Shilane Philip; Lu Kimberly R.; Brandt Joseph S.; Noto Nicholas A. |
11507308 | Disk access event control for mapped nodes supported by a real cluster storage system | Danilov Mikhail; Altaye Yohannes |
11507327 | System and method of estimating performance headroom in a storage system | Shveidel Vladimir; Alkalay Amitai; Dar Shaul |
11507396 | Method, device and computer program product for storage management | Dong Dazhi; Lu Binhua; Meng Shufang; Chen Xing; Zhang Chen; Xu Tongyin |
11507419 | Method,electronic device and computer program product for scheduling computer resources in a task processing environment | Li Jin; Liu Jinpeng; Wong Wuichak |
11507422 | Method and system for intelligently provisioning resources in storage systems | Vishwakarma Rahul Deo; Kannery Supriya |
11507441 | Asymmetric fulfillment of remote procedure calls by multi-core systems | Ravich Leonid; Chernyavsky Yuri |
11507457 | Method, electronic device and computer program product for storage management | Liu Yousheng; Xu Xinlei; Dong Jibing; Li Xiongcheng |
11507458 | Storage management method, device, and computer program product | Zhuo Baote; Kang Jianbin; Han Geng; Gao Jian |
11507461 | Method, apparatus, and computer readable medium for I/O control | Han Geng; Kang Jianbin; Dong Jibing |
11507467 | Method and system for asset protection threat detection and mitigation using interactive graphics | Behera Amarendra; Chopra Shelesh; Dethe Tushar B.; Soma Gururaj; Arora Himanshu; Singh Deependra Pratap |
11507469 | Method and system for risk score based asset data protection using a conformal framework | Chopra Shelesh; Ambaljeri Mahantesh M.; Vishwakarma Rahul Deo; Prasad Parmeshwr |
11507471 | Method, apparatus and computer program product for managing backup system | Liu Qin; Jiang Yi; Xu Jianxu |
11507472 | Methods, devices and computer program products for data backup and restoration | Zhang Zhibin |
11507473 | System and method for efficient backup generation | Yadav Sunil; Chopra Shelesh; Bansal Aaditya Rakesh; Sharma Manish |
11507474 | System and method for a backup and recovery of application using containerized backups comprising application data and application dependency information | Sharma Manish; Bansal Aaditya; Chopra Shelesh; Yadav Sunil |
11507482 | Recovering consistency of a raid (redundant array of independent disks) metadata database | Ma Charles; Gong Shaoqin; Han Geng; Vankamamidi Vamsi K.; Lee Shuyu; Ge Ping; Gao Jian |
11507511 | Method, electronic device and computer program product for storing data | Zhang Leihu; Gong Chen; Lv Shuo |
11507512 | Fault tolerant cluster data handling | Ellerby Ben; Voecks Austin; Popovich Evgeny |
11507537 | Method, apparatus and computer storage medium for file storage | Wang Donglei; Li Zhiqiang; Gao Lei; Zhang Weibing |
11507540 | Decentralized file system and message bus architecture for processing training sets in multi-cloud computing environment | Todd Stephen J.; Wang Kun; Peng Layne Lin; Wu Pengfei |
11507545 | System and method for mirroring a file system journal | Raju Suraj; Laier Max; Steinke Ron |
11507546 | Management network organization approach for clustered and federated storage systems | Krivenok Dmitry Vladimirovich |
11507550 | Eventual consistency in a deduplicated cloud storage system | Shilane Philip; Bandlamudi Venkata Ravi Chandra; Karmarkar Atul A. |
11507591 | Methods, systems, and computer readable mediums for command engine execution | Bourne Geoffrey David; Hayward Jeffery Jon; Streete Jonathan Peter |
11507595 | Agent-less replication management | Kumar Sunil; Rao Vinay; Michaely Boaz; Don Arieh |
11507599 | Processing transactions in a synchronized replication system | Xu Ning; Zhang Alex Minghui; Xiong Brian Tianfang; Wu Yuanyang; Lu Yifeng |
11507770 | Precomputed similarity index of files in data protection systems with neural network | Chen Qiang; Yu Jing; Wu Pengfei; Rastogi Naveen |
11507782 | Method, device, and program product for determining model compression rate | Yang Wenbin; Liu Jinpeng; Wong WuiChak; Li Sanping; Jia Zhen |
11509458 | Method and system for securely replicating encrypted deduplicated storages | Shemer Jehuda; Natanzon Assaf |
11509468 | Method and system for verifying secret decryption capability of escrow agents | Rothschild Seth Jacob; Perlman Radia Joy; Robbins Alex |
11509528 | Dynamic cloud native cluster construction using under-utilized machines | Fong Victor; He Xuebin; Murawski Megan |
11509662 | Method, device and computer program product for processing access management rights | Wang Fei; Jiang Changxu |
11509868 | Method and apparatus for failover in a video surveillance system | Chen Kenny; Huang Bo; Shi Carl |
11513681 | Method, device, and computer program product for managing storage system | Wu Zhilong; Tang Haiying; Xu Xinlei; Shang Rongrong; Zhang Xiaobo |
11513684 | Data storage system management techniques and metrics | Tylik Dmitry; Gelotti Carole Ann; Haravu Nagasimha G.; Blitzer Aharon; Izikson Alexander; Harduf Yuval; Taylor Alan L.; Shem Tov Marina |
11513687 | Accessing storage space of a physical data fragment in a storage system | LeCrone Douglas E.; O'Hare Jeremy J.; Linstead Paul A. |
11513688 | System and method for continuously offloading input-output (IO) traces from a storage system | Wang Wei; Beauregard Benjamin James |
11513690 | Multi-dimensional I/O service levels | Jung Jaeyoo; Challa Narasimha R.; Randolph Benjamin A. |
11513692 | Arranging SSD resources based on estimated endurance | Dalmatov Nickolay Alexandrovich |
11513693 | Smart network interface card-based splitter for data replication | Saad Yossef |
11513701 | Storage management system and method | Shveidel Vladimir; Gazit Ronen |
11513702 | Placement of metadata on data storage drives in a first storage enclosure of a data storage system | Vankamamidi Vamsi K.; Armangau Philippe; Cummins Daniel E. |
11513705 | System and method for volume polarization across multiple storage systems | Meiri David; Chen Xiangping |
11513709 | Data rebalancing after a scale-out event in a data storage system | Danilov Mikhail; Altaye Johannes |
11513711 | Method, device, and program product for creating stripe based on dynamic window | Fan Huijuan; Chen Chi |
11513712 | Method for storage management, device and computer program product | Kang Jianbin; Han Geng; Dong Jibing; Gao Hongpo |
11513714 | Migration of legacy data into an ordered event stream | Danilov Mikhail; Paduroiu Andrei; Vazhenin Maksim |
11513715 | Method and system for generating synthetic backups using block based backups | Rangapuram Ravi Kishore Yadav; Jagannatha Manjunath; Madiraju Varadaraju Kiran Kumar |
11513716 | Write first to winner in a metro cluster | Haravu Nagasimha; Taylor Alan L.; Meiri David; Tylik Dmitry Nikolayevich |
11513718 | Method, electronic device and computer program product for configuring buffer size associated with backup threads | Liu Jie; Liu Qin |
11513727 | System and method for extending NVRAM-based write-cache onto SSDs | Vankamamidi Vamsi K.; Gazit Ronen; Armangau Philippe; Alkalay Amitai |
11513731 | System and method for non-disruptive storage protocol conversion | Venkatanarayanan Prakash; Azruel Amihay; Sathyanarayana Sreenivasa Honnur; Iqbal Md Haris; Kumar Kundan; Long Matthew; Schiff Jean Marie |
11513739 | File layer to block layer communication for block organization in storage | Faibish Sorin; Bassov Ivan; Gonczi Istvan; Armangau Philippe |
11513742 | Distributed hot space in a data storage server | Nannapaneni Rajasekhar; Chichakar Ganesh |
11513787 | Non-disruptive firmware upgrade of asymmetric hardware accelerator systems | Chen Tao; Zou Yong; Liu Ran |
11513829 | Method and system for instant recovery of application data using virtual machine backups | Jagannatha Manjunath; Yadav Sunil |
11513841 | Method and system for scheduling tasks in a computing system | Ippatapu Venkata L R |
11513855 | System and method for allocating central processing unit (CPU) cores for system operations | Gao Jian; Vankamamidi Vamsi K.; Gao Hongpo; Kang Jamin |
11513856 | Method, devices and computer program products for resource usage | Liu Bing; Chen Tao |
11513870 | Method, device, and computer program product for managing a task in an application node | Luo Yuan; Zhuo Jia |
11513871 | Employing triggered retention in an ordered event stream storage system | Danilov Mikhail; Medvedev Igor |
11513882 | Dynamic modification of IO shaping mechanisms of multiple storage nodes in a distributed storage system | Soukhman Alex; Kamran Lior |
11513896 | Managing a redundant array of independent disks (RAID) using row parity and diagonal parity | Kang Jianbin; Dong Jibing; Gao Hongpo |
11513900 | Remote replication of snapshots taken while replication was inactive | Bora Bhaskar; Halstead Mark J.; Wilson Jeffrey |
11513901 | Optimizing backup performance with heuristic configuration selection | Kumar Dinesh; Reddy Anand |
11513902 | System and method of dynamic system resource allocation for primary storage systems with virtualized embedded data protection | Smaldone Stephen; Wigmore Ian; Don Arieh |
11513904 | Gold image library management system to reduce backup storage and bandwidth utilization | Malamut Mark; Smaldone Stephen |
11513905 | Controlling search access to assets in a data protection product | Morton James; Zhang Ming; Su Lihui; Jourdain Gerald |
11513906 | Systems and methods for automatic backup scheduling based on backup history | AshokKumar Pravin Kumar; Andra Sunder Ramesh |
11513907 | Method and system for resuming interrupted database backup operations using checkpoints | Upadhyay Navneet; Chopra Shelesh |
11513908 | Backup and tiered policy coordination in time series databases | Wolfson Kfir; Natanzon Assaf; Shemer Jehuda |
11513909 | System and method for scheduled snapshot pacing with deduplication | Haravu Nagasimha G.; Jin Qi |
11513910 | Compliance as a service for multi-cloud backup systems | Natanzon Assaf; Saad Yossef |
11513911 | Global snapshot backups of a distributed name space | Mathew George; Rajimwale Abhishek; Hickey Charles; Mamidi Murthy V |
11513912 | Application discovery using access pattern history | Smaldone Stephen D.; Don Arieh; Martin Owen |
11513913 | Method for storage management, electronic device, and computer program product | Liu Qin; Liao Lanjun |
11513915 | System and method for micro-backup generation | Viveki Pradeep; Ambaljeri Mahantesh Murageppa; Appireddygari Venkataramana Mahesh Reddy |
11513919 | System and method of generating automatic checkpoints of a distributed file system | Hickey Charles; Mamidi Murthy; Mathew George; Kapoor Sirisha |
11513920 | Distributed site data recovery in a geographically distributed data storage environment | Danilov Mikhail; Buinov Konstantin |
11513921 | Leveraging file-based backups to facilitate bare-metal and system-state recovery operations | Yadav Sunil; Chopra Shelesh |
11513925 | Artificial intelligence-based redundancy management framework | Sethi Parminder Singh; Mohanty Bijan K.; Dinh Hung T. |
11513931 | Anomaly aware log retrieval from disk array enclosures (DAEs) | Liu Bing; Vishwakarma Rahul |
11513938 | Determining capacity in storage systems using machine learning techniques | Gowda Deepak; Thakkar Bina K. |
11513939 | Multi-core I/O trace analysis | Hershkovitz Gabriel; Cartmell Jerome J.; Don Arieh |
11513944 | Ranking tests based on code change and coverage | Oguara Tonworio; Kilpatrick Douglas; Jian Xu; Sun Chen; Lo YuChan |
11513947 | Method, device and computer program product for building and verifying index file | Li Haitao; Liu Jie; Wen Jian; Lin Chao |
11513951 | System and method for improving write performance for log structured storage systems | Alkalay Amitai; Shabi Uri |
11513953 | Synchronizing garbage collection and incoming data traffic | Danilov Mikhail; Buinov Konstantin |
11513956 | Maintaining availability of a non-volatile cache | Vankamamidi Vamsi K.; Han Geng; Ma Chun; Kang Jianbin |
11513961 | Online heuristic sequentiality detection over input/output streams for cache systems in large address spaces | Gottin Vinicius Michel; Calmon Tiago Salviano; Abelha Ferreira Paulo; Barbalho Hugo de Oliveira; Teixeira de Abreu Pinho Rômulo |
11513982 | Techniques for recommending configuration changes using a decision tree | Martin Owen; Azmandian Fatemeh; Beale Peter |
11513988 | System and method for multi-node buffer transfer | Baruch Oran; Gazit Ronen; Derzhavetz Jenny; Chernyavsky Yuri |
11513996 | Non-disruptive and efficient migration of data across cloud providers | Bhutani Neeraj; Chinthekindi Ramprasad; Madan Nitin; Srinivasan Srikanth |
11513997 | Assignment of longevity ranking values of storage volume snapshots based on snapshot policies | Keller Itay; Webman Erez; Milstein Nir; Shtarkman Yonatan |
11514001 | Concurrent computations operating on same data for CPU cache efficiency | Bassov Ivan; Armangau Philippe |
11514002 | Indexing splitter for any pit replication | Shemer Jehuda; Solan Alex |
11514025 | Snapshot conscious internal file data modification for network-attached storage | Batchu Ravi V. |
11514046 | Tiering with pluggable storage system for parallel query engines | Tiwari Sameer; Bhandarkar Milind Arun; Mogal Bhooshan Deepak |
11514074 | Method and system for optimizing data replication for large scale archives | van Rotterdam Jeroen Mattijs; Mohen Michael T.; Kumar Pardeep |
11514075 | System and method for prioritizing replication copy activity | Haravu Nagasimha G.; Bailey Charles C.; Sheelvant Girish; Seela Nagapraveen Veeravenkata |
11514100 | Automatic detection and identification of gold image library files and directories | Malamut Mark; Smaldone Stephen; Murti Arun |
11514140 | Method and system for post-purchase data usage and license enforcement | Todd Stephen James |
11514145 | Linking individual biometric data to protected resources accessed via user devices | Sharma Nagendra Gudibande Srikanta; Gottapu Udayendranaidu; Kathriki Pedda Reddy |
11514147 | Increasing security of a computing device based on determining a user's state of consciousness | Gupta Shubham; Sharma Rohan; Basu Rangan; Patro Gyanendra Kumar |
11514295 | Continuous learning techniques with machine learning systems to adapt to new input data sets | Faibish Sorin |
11514317 | Machine learning based resource availability prediction | Lakshmikantha Shashikanth; Taralekar Sankalp Suhas; Nguyen Tuan; Kuchi Venkata Narasa Kumar; Godbole Koushik Nagaraj |
11514360 | Method and system for verifying state monitor reliability in hyper-converged infrastructure appliances | Gao Han; Tang Wenyu; Shen Huiying; Khokhar Muzhar S. |
11514407 | System and method for asset management | Reineke Nicole; Lincourt, Jr. Robert Anthony |
11516084 | Device compatibility in a communication architecture | Nelson Joshua; Ramsden Raymond; Robert Curtis |
11516109 | Application of data services based on services policies | White William Jeffery; Harwood John S.; Lincourt, Jr. Robert Anthony; Tabet Said |
11516116 | Domain name system multipathing distributed applications | Marrotte Michael |
11516243 | Data confidence fabric trust brokers | Todd Stephen J.; Shepherd Jason A. |
11520486 | Using a smart network interface controller with storage systems | Sahin Adnan; LeCrone Douglas E.; Wigmore Ian |
11520492 | Method and system for migrating data clusters using heterogeneous data cluster infrastructures | Chopra Shelesh; Acharya Prakash Appayya; Samad Mohammed Abdul |
11520503 | Method and system for efficient allocation of storage | Tamilarasan Ashok; Vankamamidi Vamsi; Armangau Philippe |
11520509 | System and method for improving space efficiency by compressing multi-block aggregates | Faibish Sorin; Basov Ivan |
11520512 | Method for storage management, electronic device and computer program product | Shang Rongrong; Gong Shaoqin; Liu Yousheng; Xu Xinlei; Feng Changyu |
11520522 | System and method for faster RAID rebuild via allocation knowledge | Dalmatov Nickolay; Danilov Mikhail |
11520527 | Persistent metadata storage in a storage system | Alkalay Amitai; Shveidel Vladimir; Kamran Lior |
11520665 | Optimizing incremental backup for clients in a dedupe cluster to provide faster backup windows with high dedupe and minimal overhead | Mathew George; Wang Xiaohong; Rajimwale Abhishek |
11520667 | Information technology resource forecasting based on time series analysis | Savir Amihai; Levy Idan; Harmelin Shai; Gaber Shiri; Gefen Avitan; Braine Lindsay |
11520668 | Vendor-neutral models of vendors' application resources | Chopra Shelesh; Singh Pawan; Radha Jayashree; Ugur-Ozekinci Yasemin; Owens Ken |
11520669 | System and method for efficient backup system aware direct data migration between cloud storages | Perneti Jayanth Kumar Reddy; Vishwakarma Rahul Deo; Gunda Kalyan C |
11520671 | Fast multipath failover | Tidke Ashwin; Nagaraj Venkatesh Doddamane; Gokam Kurumurthy |
11520674 | Managing containers on a data storage system | Jmt Adarsh Pradhan; Singhal Maneesh |
11520675 | Accelerated replay of computer system configuration sequences | Bryan Matthew; Kumar Shiv Shankar |
11520703 | Adaptive look-ahead configuration for prefetching data in input/output operations | Dias Jonas F.; Pinho Rômulo Teixeira de Abreu; Bruno Diego Salomone; Martin Owen |
11520737 | Blockchain-as-a-service integrated hybrid object storage system in multi-cloud computing environment | Chen Si; Wu Pengfei; Lin Zhenzhen; Zhang Ruixue; Christner Joel |
11520744 | Utilizing data source identifiers to obtain deduplication efficiency within a clustered storage environment | Rajimwale Abhishek; Mathew George; Mamidi Murthy; Lewis Donna Barry |
11520805 | Method and system for replication | Kamran Lior; Alkalay Amitai |
11520818 | Method, apparatus and computer program product for managing metadata of storage object | Yang Yong; Cao Jiang |
11520833 | Method for data item recommendation, electronic device and storage medium | Liu Bing; Zhang Ming; Liu Min; Zhang Yun |
11520898 | Intrusion detection | Byrne Kenneth |
11521017 | Confident peak-aware response time estimation by exploiting telemetry data from different system configurations | Abelha Ferreira Paulo; Bechara Prado Adriana; da Silva Pablo Nascimento |
11521087 | Method, electronic device, and computer program product for processing information | Ni Jiacheng; Wang Zijia; Gong Min; Wu Pengfei; Jia Zhen |
11521125 | Compression and decompression of telemetry data for prediction models | Ferreira Paulo Abelha; da Silva Pablo Nascimento; Prado Adriana Bechara |
11522845 | Methods and systems for automatically and securely joining an association | Bao Qi; Tummala Himabindu |
11522914 | Peer-based policy definitions | Malamut Mark D.; Brenner Adam; Murti Arun |
11526283 | Logical storage device access using per-VM keys in an encrypted storage environment | Mallick Sanjib; Anchi Amit Pundalik |
11526292 | Remotely replicating duplicated data | Yoder Benjamin; Stronge William R. |
11526297 | Framed event access in an ordered event stream storage system | Danilov Mikhail; Altaye Yohannes |
11526376 | Method, electronic device and computer program product for running application | Zhang Yuting; Jia Kaikai |
11526447 | Destaging multiple cache slots in a single back-end track in a RAID subsystem | Wu Peng; Yu Rong; Wang Jiahui; Pang Lixin |
11526469 | File system reorganization in the presence of inline compression | Mathews Alexander; De Souter Marc; Si Yining; Armangau Philippe; Rashid Ahsan; Sethi Pranit |
11526621 | Method and system for capturing asset protection metadata pertinent to analytics | Behera Amarendra; Dethe Tushar B.; Soma Gururaj; Chopra Shelesh; Bagchi Krishnendu; Arora Himanshu |
11528236 | User-based data tiering | Kumar Shiv S.; Gahlot Jai P. |
11528678 | Crowdsourcing and organizing multiple devices to perform an activity | Gupta Shubham; Bikumala Sathish Kumar |
11531470 | Offload of storage system data recovery to storage devices | Kamran Lior; Alkalay Amitai |
11531592 | Method and system for determining favorability of upgrade window | Chopra Shelesh; Gaikwad Hemant Ramesh; Vishwakarma Rahul Deo |
11531597 | Method and system for generating user data visualization enhanced user data backups of limited-access user data | Chopra Shelesh; Yadav Sunil; Behera Amarendra; Arora Himanshu; Dethe Tushar; Chauhan Sapna; Rao Anjana; Singh Deependra Pratap; Bhanushali Jigar Premajibhai; Chitloor Ravi V. |
11531598 | On-the-fly pit selection in cloud disaster recovery | Kushnir Tomer; Shemer Jehuda; Said Jawad; Wolfson Kfir |
11531599 | On the fly pit selection in cloud disaster recovery | Shemer Jehuda; Wolfson Kfir; Kushnir Tomer; Said Jawad |
11531644 | Fractional consistent global snapshots of a distributed namespace | Hickey Charles J.; Mamidi Murthy V.; Shendge Geetha; Chivukula Sai; Wang Xiaohong W.; Mathew George; Rajimwale Abhishek |
11531659 | Extensible version history and comparison within a backup | Morton James; Su Lihui; Jourdain Gerald; Zhang Ming |
11533063 | Techniques for determining compression tiers and using collected compression hints | Martin Owen; Tringale Alesia A. |
11533317 | Serverless application center for multi-cloud deployment of serverless applications | Zhang Ruixue; Junior Jaumir Valença da Silveira |
11537300 | Identifying allocated blocks in a storage system | Tamilarasan Ashok; Armangau Philippe; Vankamamidi Vamsi K.; Mullis, II Samuel L. |
11537312 | Maintaining replication consistency during distribution instance changes | Bar Shalom Adi; Shusterman Zeev; Zilpa Lior; Goft German; Ashkenazi Oren |
11537313 | Dual cast mirroring from host devices | Duquette Jason J; Guyer James M; Mackintosh Thomas; Medeiros Earl |
11537459 | Automatically predicting device failure using machine learning techniques | Sethi Parminder Singh; Dinh Hung T.; Mohanty Bijan K. |
11537478 | Automation and optimization of data recovery after a ransomware attack | O'Mahony Niamh; Byrne Andrew; Wenner Regis; Brandy Celine |
11537553 | Managing snapshots stored locally in a storage system and in cloud storage utilizing policy-based snapshot lineages | Aldred Mark; Anthony Michael; Gunasekaran Shanmuga Anand; Sullivan Shane; Varma Mithun Mahendra; Bhatnagar Anurag |
11537555 | Managing network shares utilizing filesystem snapshots comprising metadata characterizing network shares | Narayana Gowda Shivasharan Dalasanur; Kumar Sunil; Pokharna Prashant |
11537714 | Facilitating antivirus scan filing locking based on cluster lock mechanism in distributed file systems | Leimbach David; Kilpatrick Douglas |
11537735 | Trusted enterprise data assets via data confidence fabrics | Todd Stephen J.; Reineke Nicole |
11537970 | Processing order experience data across multiple data structures | Aggarwal Aditya; Mishra Abhishek |
11538293 | Preparation of vehicle bulk data for high speed terahertz offloading | Ahearne Seán; Murphy Liam |
11539730 | Method, device, and computer program product for abnormality detection | Peng Fei; Jia Kaikai |
Archiver|手机版|科学网 ( 京ICP备07017567号-12 )
GMT+8, 2024-11-1 19:25
Powered by ScienceNet.cn
Copyright © 2007- 中国科学报社