1653 patents
Page 12 of 83
Utility
Machine learning-based hardware component monitoring
22 Aug 23
An illustrative method includes identifying, based on an output of a machine learning model that receives data associated with an operation of a hardware component as an input, an anomaly in the data, determining that the anomaly is representative of an issue associated with the hardware component, and performing, based on the determining that the anomaly is representative of the issue associated with the hardware component, a remedial action that affects a performance of the operation of the hardware component.
Christopher Golden, Emily Watkins
Filed: 27 Jan 21
Utility
Optimizing spool and memory space management
22 Aug 23
A system establishes spools that have spool regions in first memory.
Svitlana Tumanova, Ying Gao, Jintao Shen
Filed: 20 Apr 21
Utility
Heterogeneous storage with preserved addressing
22 Aug 23
A method for preserving a media access control (MAC) address of a virtual server is provided.
John Hayes, Par Botes, Robert Lee, Peter Vajgel
Filed: 12 Nov 21
Utility
Decrypting secure packages in a storage network
22 Aug 23
A method for execution by a computing device of a storage network includes dispersed storage error decoding a plurality of sets of encoded data slices to recover a plurality of secure packages, where the plurality of secure packages include a plurality of encrypted data segments and a plurality of sets of encoded key slices, and where encoded key slices are appended to the encrypted data segments in accordance with an appending approach.
Gary W. Grube, Timothy W. Markison
Filed: 10 Mar 21
Utility
Obfuscating a set of encoded data slices
22 Aug 23
A method includes a computing device of a storage network obfuscating encoded data slices of a first set of encoded data slices of a plurality of sets of encoded data slices using an obfuscating method to produce obfuscated encoded data slices.
S. Christopher Gladwin, Thomas F. Shirley, Jr., Gary W. Grube
Filed: 18 May 22
Utility
Mapping Storage Slots to a Set of Storage Units
17 Aug 23
A method includes determining an information dispersal algorithm width number and determining a number of primary storage slots from a number of storage slots associated with a set of storage units deployed across multiple sites, where the number of primary storage slots is equal to or greater than the information dispersal algorithm width number.
Ravi V. Khadiwala, Wesley B. Leggette, Andrew D. Baptist, Greg R. Dhuse, Ilya Volvovski, Jason K. Resch, Manish Motwani
Filed: 30 Apr 23
Utility
Cost Considerate Placement Of Data Within A Pool Of Storage Resources
17 Aug 23
Cost considerate placement of data within a pool of storage resources, including: receiving one or more data objects for storage; selecting, based at least upon a storage policy and upon one or more characteristics of storage data, one or more storage classes from among a plurality of storage classes of one or more data storage services, wherein the storage policy specifies parameters for one or more of: storage costs, storage operation response time, data resiliency, or service level agreement specifications; and storing the one or more data objects to the selected one or more storage classes of the one or more data storage services.
DIRK MEISTER, SUBRAMANIAM PERIYAGARAM, REESE ROBERTSON, PRUDHVI LOKIREDDY
Filed: 20 Apr 23
Utility
Calculating Storage Utilization For Distinct Types Of Data
17 Aug 23
Determining storage consumption in group of storage resources, including for the group of data units within a group of storage resources: for each data unit in the group of data units, determining whether the data unit is associated with one or more client entities; and for each data unit associated with one or more client entities, determining a category for the data unit; calculating storage consumption for a client based on the category of each data unit; and reporting the calculated storage consumption.
MATTHEW FAY, NAVEEN NEELAKANTAM, RONALD KARR, TAHER VOHRA
Filed: 27 Mar 23
Utility
Low Latency Reads Using Cached Deduplicated Data
17 Aug 23
Methods, computer systems, and computer readable medium are described for low latency reads using cached deduplicated data, including: receiving a request to read data from a storage system; query, using a generated hash value associated with the request to read data, one or more deduplication tables that corresponds to the hash value; and responsive to determining that the one or more deduplication tables includes an entry that corresponds to the hash value, using a mapping contained in the entry to perform the requested to read data, wherein the mapping includes a pointer to a physical location where at least a portion of the data is stored.
JOHN COLGROVE, JOHN HAYES, ETHAN MILLER, FENG WANG
Filed: 24 Apr 23
Utility
Migrating Applications To A Cloud-Computing Environment
17 Aug 23
A method of migrating applications to a cloud-computing environment is disclosed.
VIRENDRA PRAKASHAIAH, TAHER VOHRA
Filed: 25 Apr 23
Utility
Performance aided data migration in a distributed storage network
15 Aug 23
A method begins by a processing module of a storage unit of a storage network identifying a first storage format used to store a plurality of encoded data slices in a first memory of the storage unit and continues with the processing module determining to utilize another storage format for storage of the plurality of encoded data slices.
Jason K. Resch, Greg R. Dhuse, Bart R. Cilfone
Filed: 16 May 22
Utility
Remote and secure management of a storage system
15 Aug 23
Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.
Shiva Ankam, Yu Tan, Hongkai Wu, Ziyuan Song, Divya Marlapalle, Samridh Srinath, Miranda Steele
Filed: 28 Jul 21
Utility
Cluster rebalance using user defined rules
15 Aug 23
Distributed storage systems are implemented with rule based rebalancing mechanisms.
Ganesh Sangle, Harsh Desai, Vinod Jayaraman
Filed: 26 Feb 21
Utility
Verifying revision levels while storing data in a storage network
15 Aug 23
A method includes receiving, by a storage unit of a set of storage units of a storage network, a write request regarding an encoded data slice, where the write request includes a slice payload and a corresponding revision level of the encoded data slice.
Andrew Baptist, Wesley Leggette, Jason K. Resch
Filed: 14 Apr 21
Utility
Private page cache-based sharing of access to application image layers by application containers
15 Aug 23
An example system may be configured to instantiate a first application container based on a plurality of application image layers; and instantiate a second application container based, at least in part, on the plurality of application image layers; wherein a private page cache stores storage information for the plurality of application image layers and is used to provide shared access to the plurality of application image layers by the first application container and the second application container.
Joseph Jobi, Goutham Rao
Filed: 22 Dec 21
Utility
Increasing or decreasing the amount of log data generated based on performance characteristics of a device
15 Aug 23
Dynamically adjusting an amount of log data generated for a storage system that includes a plurality of storage devices, including: setting, for a component within the storage system, a logging level for the component, the logging level specifying the extent to which log data should be generated for a particular component; determining, in dependence upon one or more measured operating characteristics of the storage system, whether the logging level for the component should be changed; and responsive to determining that the logging level for the component should be changed, changing the logging level associated with the component.
John Colgrove, Sergey Zhuravlev
Filed: 22 Oct 21
Utility
Storage System With Distributed Deletion
10 Aug 23
A method of distributed file deletion, performed by a storage system, is provided.
ROBERT LEE, IGOR OSTROVSKY, RONALD KARR
Filed: 21 Apr 23
Utility
Performing Low Latency Operations Using A Distinct Set Of Resources
10 Aug 23
A first set of physical units of a storage device of a storage system is selected for performance of low latency access operations, wherein other access operations are performed by remaining physical units of the storage device.
HARI KANNAN, BORIS FEIGIN, YING GAO, JOHN COLGROVE
Filed: 27 Mar 23
Utility
Data Rebuild Based On Solid State Memory Characteristics
10 Aug 23
A plurality of storage nodes within a single chassis is provided.
JOHN D. DAVIS, JOHN HAYES, HARI KANNAN, NENAD MILADINOVIC, ZHANGXI TAN
Filed: 3 Apr 23
Utility
Similar Block Detection-based Detection of a Ransomware Attack
10 Aug 23
An illustrative method includes maintaining, by a data protection system, a metric associated with a similar block detection process performed by a storage system with respect to data processed by the storage system, the metric representative of a measure of similar blocks in the data as detected by the similar block detection process; determining, by the data protection system, that the metric changes by more than a threshold amount; and determining, by the data protection system based on the determining that the metric changes by more than the threshold amount, that the data processed by the storage system is possibly being targeted by a security threat.
Ajay De’souza, Sandeep Phadke, Ronald Karr
Filed: 29 Mar 23