1653 patents
Page 15 of 83
Utility
Acquiring Failure Information Span
20 Jul 23
An indication is received from a storage device that an attempt to read a portion of data from a block of the storage device has failed.
DAMIAN YURZOLA, VIDYABHUSHAN MOHAN, GORDON JAMES COLEMAN, MELISSA KIMBLE, HARI KANNAN
Filed: 24 Feb 23
Utility
Container Recovery Layer Prioritization
20 Jul 23
An illustrative method of container recovery using layer prioritization includes identifying a set of immutable layers of container images included in a dataset used by a container system to run containerized applications on a first cluster; copying the set of immutable layers of container images to a second cluster in preparation for a recovery event; receiving, after the set of immutable layers of container images are copied to the second cluster, a recovery request to recover the containerized applications; and copying, in response to the recovery request, a set of mutable layers included in the dataset to the second cluster, the second cluster configured to use the copied set of immutable layers and the copied set of mutable layers to recover the containerized applications on the second cluster.
Kshithij Iyer, Luis Pablo Pabón
Filed: 26 Jul 22
Utility
Container Recovery Using Volumes Comprising Container Images
20 Jul 23
A container recovery using volumes comprising container images may be performed by a method comprising: determining, by a recovery process and based on node data, to recover a container operating on a first node onto a second node, where a container image is associated with the container; determining, by the recovery process and based on the container image, volume data indicative of a volume comprising the container image; and initiating, by the recovery process and based on the volume data, recovery of the container from the first node onto the second node.
Luis Pablo Pabón, Taher Vohra, Anne Cesa Klein
Filed: 29 Apr 22
Utility
Storage System Based Threat Detection and Remediation for Containers
20 Jul 23
A storage system, associated with a container system, may be configured to perform a method that includes: providing, by a storage system, storage services to a container system; determining, by the storage system and based on the providing the storage services to the container system, a potential security threat; and performing, by the storage system, a remedial action based on the potential security threat.
Taher Vohra, Anne Cesa Klein, Luis Pablo Pabón
Filed: 29 Apr 22
Utility
Mesh-aware Storage Systems
20 Jul 23
A storage system proxy associated with a storage system may receive a service mesh policy used by a service mesh.
Taher Vohra, Luis Pablo Pabón, Naveen Neelakantam, Michael Carpendale, Paul Michael Rosham, Krishna Kant, Virendra Prakashaiah
Filed: 20 Jan 22
Utility
Unified storage on block containers
18 Jul 23
An illustrative unified data storage method includes providing, by a data storage system, block containers that represent a linear address space of blocks; and using, by the data storage system, the block containers to store content for a plurality of different data storage services.
Dirk Meister, Matthew Paul Fay, Subramaniam Periyagaram, Ronald Karr, David A. Grunwald
Filed: 30 Mar 20
Utility
Deduplication decision based on metrics
18 Jul 23
Systems and method for implementing deduplication process based on performance analyses.
John Colgrove, Ronald Karr, Ethan L. Miller
Filed: 16 Nov 18
Utility
Modifying a cloned image of replica data
18 Jul 23
Modifying a clone image of a dataset, including: generating, based on metadata describing one or more updates to a dataset, a tracking copy of replica data on a target data repository; generating, after receiving an indication to begin accepting modifications to the tracking copy of the replica data, a cloned image of the dataset that is modifiable without modifying the tracking copy of the replica data; and responsive to a storage operation directed to the target data repository, modifying the cloned image of the dataset without modifying the tracking copy of the replica data.
David Grunwald, Thomas Gill, Ronald Karr, John Colgrove, Larry Touchette, Lawrence Mertes
Filed: 26 May 22
Utility
Heterogeneous erase blocks
18 Jul 23
A method of using flash storage devices with different sized erase blocks is provided.
Eric D. Seppanen, Andrew R. Bernat, Timothy W. Brennan, Mark L. McAuliffe, Neil Buda Vachharajani
Filed: 15 Jun 21
Utility
Ownership determination for accessing a file
18 Jul 23
A method for accessing a file in a storage system is provided.
John Hayes, Robert Lee, Igor Ostrovsky, Peter Vajgel
Filed: 26 Mar 21
Utility
Storage network with enhanced data access performance
18 Jul 23
A method for execution by a storage network begins by issuing a decode threshold number of read requests for a set of encoded data slices to a plurality of storage units of a set of storage units and continues by determining whether less than a decode threshold number of read requests has been received in a time window.
Ilir Iljazi
Filed: 30 Nov 21
Utility
Budgeting open blocks based on power loss protection
18 Jul 23
A storage system has zones in solid-state storage memory, with power loss protection.
Andrew R. Bernat, Matthew Paul Fay, Ronald Karr
Filed: 21 Apr 21
Utility
Pre-positioning target content in a storage network
18 Jul 23
A method for execution in a storage network, the method begins by determining a user device group content preference, wherein the user group content includes target content for a user device group and the determining includes predicting future target content for the user group.
S. Christopher Gladwin, Gary W. Grube, Timothy W. Markison
Filed: 4 Feb 21
Utility
Independent scaling of compute resources and storage resources in a storage system
18 Jul 23
A storage system that supports independent scaling of compute resources and storage resources, the storage system including: one or more chassis, wherein each chassis includes a plurality of slots, each slot configured to receive a blade; a plurality of compute resources; a plurality of storage resources; a plurality of blades, where each blade includes at least one compute resource or at least one storage resource and each of the storage resources may be directly accessed by each of the compute resources without utilizing an intermediate compute resource; a first power domain configured to deliver power to one or more of the compute resources; and a second power domain configured to deliver power to the storage resources, wherein the first power domain and the second power domain can be independently operated.
John Davis, Hari Kannan, Robert Lee, Yuhong Mao
Filed: 19 Jul 16
Utility
Recovering from system faults for replicated datasets
18 Jul 23
Recovering from system faults for replicated datasets, including: receiving, by the cloud-based storage system, a request to modify a dataset that is stored by the cloud-based storage system, wherein the dataset is synchronously replicated among a plurality of storage systems that includes the cloud-based storage system, wherein a request to modify the dataset is acknowledged as being complete when each of the plurality of storage systems has modified its copy of the dataset; generating recovery information indicating whether the request to modify the dataset has been applied on all storage systems in the plurality of storage systems synchronously replicating the dataset; and after a system fault, applying a recovery action in dependence upon the recovery information indicating whether the request to modify the dataset has been applied on all storage systems in the plurality of storage systems synchronously replicating the dataset.
Joshua Freilich, Aswin Karumbunathan, Naveen Neelakantam, Ronald Karr
Filed: 24 Mar 22
Utility
Secret distribution among storage devices
18 Jul 23
In a storage system that includes a plurality of storage devices configured into one or more write groups, quorum-aware secret sharing may include: encrypting a device key for each storage device using a master secret; generating a plurality of shares from the master secret such that a minimum number of storage devices required from each write group for a quorum to boot the storage system is not less than a minimum number of shares required to reconstruct the master secret; and storing the encrypted device key and a separate share of the plurality of shares in each storage device.
Andrew Bernat, Ethan Miller
Filed: 13 Aug 21
Utility
Selectable Write Paths With Different Formatted Data
13 Jul 23
A storage system has a first memory, and a second memory that includes storage memory.
YING GAO, BORIS FEIGIN, HARI KANNAN, IGOR OSTROVSKY, JEFFREY TOFANO
Filed: 17 Mar 23
Utility
Resolving failed or hanging mount points in a clustered storage solution for containers
11 Jul 23
A clustered storage system may include potentially many different nodes.
Dinesh Israni, Vinod Jayaraman, Goutham Rao
Filed: 29 Nov 21
Utility
Consistent recovery of a dataset
11 Jul 23
Servicing I/O operations in a cloud-based storage system, including: receiving, by the cloud-based storage system, a request to write data to the cloud-based storage system; storing, in solid-state storage of the cloud-based storage system, the data; storing, in object storage of the cloud-based storage system, the data; detecting that at least some portion of the solid-state storage of the cloud-based storage system has become unavailable; identifying data that was stored in the portion of the solid-state storage of the cloud-based storage system that has become unavailable; retrieving, from object storage of the cloud-based storage system, the data that was stored in the portion of the solid-state storage of the cloud-based storage system that has become unavailable; and storing, in solid-state storage of the cloud-based storage system, the retrieved data.
Constantine Sapuntzakis, Naveen Neelakantam, Ronald Karr
Filed: 17 Jun 21
Utility
Managing storage systems that are synchronously replicating a dataset
11 Jul 23
Managing storage systems that are synchronously replicating a dataset, including: detecting a change in membership to the set of storage systems synchronously replicating the dataset; and applying one or more membership protocols to determine a new set of storage systems to synchronously replicate the dataset, wherein the one or more membership protocols include a quorum protocol, an external management protocol, or a racing protocol, and wherein one or more I/O operations directed to the dataset are applied to a new set of storage systems.
Ronald Karr, David Grunwald, Naveen Neelakantam, Zoheb Shivani, Thomas Gill, Connor Brooks, Aswin Karumbunathan, Kunal Trivedi
Filed: 26 May 22