948 patents
Page 6 of 48
Utility
Modify access restrictions in response to a possible attack against data stored by a storage system
12 Sep 23
An illustrative method includes a data protection system determining that data stored by a storage system is under a possible attack, detecting a modify request with respect to the storage system while the data stored by the storage system is under the possible attack, determining that the modify request may be related to the possible attack, and performing, in response to determining that the modify request may be related to the possible attack, a remedial action with respect to the modify request.
Roy Child, Ronald Karr
Filed: 19 Oct 20
Utility
Storage system metric optimization for container orchestrators
5 Sep 23
An illustrative method includes receiving, by an integrated storage manager from an operating system level virtualization service, a request to perform an operation with respect to one or more storage systems; determining, by the integrated storage manager, multiple versions of a performance impact among the one or more storage systems based on potentially implementing the request in multiple ways; and implementing, by the integrated storage manager based on the determining of the multiple versions of the performance impact, the request in a particular way that improves one or more storage system metrics of the one or more storage systems.
Patrick East
Filed: 17 Nov 20
Utility
Mount path management for virtual storage volumes in a containerized storage environment
5 Sep 23
An illustrative method includes determining whether a virtual storage volume is successfully mounted to a mount path associated with a compute node, the mount path being marked as read-only, marking, if the determining includes determining that the virtual storage volume is successfully mounted to the mount path, the mount path as writable, and maintaining, if the determining includes determining that the virtual storage volume is unsuccessfully mounted to the mount path, the mount path as read-only.
Dinesh Israni, Harsh Desai, Goutham Rao, Vinod Jayaraman
Filed: 6 Apr 21
Utility
Utilizing different data compression algorithms based on characteristics of a storage system
5 Sep 23
Utilizing different data compression algorithms based on characteristics of a storage system, including: selecting, in dependence upon a priority for conserving processing resources or storage resources in a storage system, a data compression algorithm to utilize to compress data; detecting that at least one of an amount of processing resources available in the storage system or the amount of space available to store additional data in the storage system has changed; and responsive to detecting that at least one of the amount of processing resources available in the storage system or the amount of space available to store additional data in the storage system has changed, selecting a different data compression algorithm to utilize to compress data.
Ethan Miller, John Colgrove, Joern Engel, Christopher Golden, Naveen Neelakantam
Filed: 17 Jun 22
Utility
Dynamic volume storage adjustment
22 Aug 23
A virtual storage volume that includes storage space on potentially many different physical disks may be implemented as one or more chunks.
Ganesh Sangle, Vinod Jayaraman
Filed: 25 Feb 21
Utility
Providing persistent storage to transient cloud computing services
22 Aug 23
Providing persistent storage to transient cloud computing services, including: creating a cloud computing instance, wherein the cloud computing instance is created on on-premises cloud infrastructure; and storing, in non-volatile storage in a storage system that is communicatively coupled to the on-premises cloud infrastructure, data associated with the cloud computing instance.
Emily Potyraj, Joshua Robinson, Brian Carpenter
Filed: 11 Jan 21
Utility
Delaying deletion of a dataset
22 Aug 23
Delaying deletion of a dataset, including: associating an eradication timer with the dataset, wherein the eradication timer specifies an amount of time to delay a requested deletion of the dataset; determining that the amount of time to delay the requested deletion of the dataset should be modified; and modifying the eradication timer to specify a modified amount of time to delay the requested deletion of the dataset.
Chenguang Sun, Jeroen Antonius Egidius Habraken, Chia-Hao Kan, Qingyu Zhang, David Grunwald, Larry Touchette, John Colgrove
Filed: 30 Apr 21
Utility
Machine learning-based hardware component monitoring
22 Aug 23
An illustrative method includes identifying, based on an output of a machine learning model that receives data associated with an operation of a hardware component as an input, an anomaly in the data, determining that the anomaly is representative of an issue associated with the hardware component, and performing, based on the determining that the anomaly is representative of the issue associated with the hardware component, a remedial action that affects a performance of the operation of the hardware component.
Christopher Golden, Emily Watkins
Filed: 27 Jan 21
Utility
Optimizing spool and memory space management
22 Aug 23
A system establishes spools that have spool regions in first memory.
Svitlana Tumanova, Ying Gao, Jintao Shen
Filed: 20 Apr 21
Utility
Heterogeneous storage with preserved addressing
22 Aug 23
A method for preserving a media access control (MAC) address of a virtual server is provided.
John Hayes, Par Botes, Robert Lee, Peter Vajgel
Filed: 12 Nov 21
Utility
Decrypting secure packages in a storage network
22 Aug 23
A method for execution by a computing device of a storage network includes dispersed storage error decoding a plurality of sets of encoded data slices to recover a plurality of secure packages, where the plurality of secure packages include a plurality of encrypted data segments and a plurality of sets of encoded key slices, and where encoded key slices are appended to the encrypted data segments in accordance with an appending approach.
Gary W. Grube, Timothy W. Markison
Filed: 10 Mar 21
Utility
Obfuscating a set of encoded data slices
22 Aug 23
A method includes a computing device of a storage network obfuscating encoded data slices of a first set of encoded data slices of a plurality of sets of encoded data slices using an obfuscating method to produce obfuscated encoded data slices.
S. Christopher Gladwin, Thomas F. Shirley, Jr., Gary W. Grube
Filed: 18 May 22
Utility
Performance aided data migration in a distributed storage network
15 Aug 23
A method begins by a processing module of a storage unit of a storage network identifying a first storage format used to store a plurality of encoded data slices in a first memory of the storage unit and continues with the processing module determining to utilize another storage format for storage of the plurality of encoded data slices.
Jason K. Resch, Greg R. Dhuse, Bart R. Cilfone
Filed: 16 May 22
Utility
Remote and secure management of a storage system
15 Aug 23
Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.
Shiva Ankam, Yu Tan, Hongkai Wu, Ziyuan Song, Divya Marlapalle, Samridh Srinath, Miranda Steele
Filed: 28 Jul 21
Utility
Cluster rebalance using user defined rules
15 Aug 23
Distributed storage systems are implemented with rule based rebalancing mechanisms.
Ganesh Sangle, Harsh Desai, Vinod Jayaraman
Filed: 26 Feb 21
Utility
Verifying revision levels while storing data in a storage network
15 Aug 23
A method includes receiving, by a storage unit of a set of storage units of a storage network, a write request regarding an encoded data slice, where the write request includes a slice payload and a corresponding revision level of the encoded data slice.
Andrew Baptist, Wesley Leggette, Jason K. Resch
Filed: 14 Apr 21
Utility
Private page cache-based sharing of access to application image layers by application containers
15 Aug 23
An example system may be configured to instantiate a first application container based on a plurality of application image layers; and instantiate a second application container based, at least in part, on the plurality of application image layers; wherein a private page cache stores storage information for the plurality of application image layers and is used to provide shared access to the plurality of application image layers by the first application container and the second application container.
Joseph Jobi, Goutham Rao
Filed: 22 Dec 21
Utility
Increasing or decreasing the amount of log data generated based on performance characteristics of a device
15 Aug 23
Dynamically adjusting an amount of log data generated for a storage system that includes a plurality of storage devices, including: setting, for a component within the storage system, a logging level for the component, the logging level specifying the extent to which log data should be generated for a particular component; determining, in dependence upon one or more measured operating characteristics of the storage system, whether the logging level for the component should be changed; and responsive to determining that the logging level for the component should be changed, changing the logging level associated with the component.
John Colgrove, Sergey Zhuravlev
Filed: 22 Oct 21
Utility
Inferred nonsequential prefetch based on data access patterns
8 Aug 23
Nonsequential readahead based on data access patterns, the method comprising: determining a set of access patterns for stored content; determining, based on the set of access patterns, a list of storage locations for content expected to be used; and prefetching, based on the list of storage locations for content expected to be used, one or more data objects.
Bennett Amodio, Emily Potyraj, Brian Gold
Filed: 25 Feb 20
Utility
Encryption indicator-based retention of recovery datasets for a storage system
8 Aug 23
An illustrative method includes determining an encryption indicator for a first recovery dataset by determining a difference in an amount or percentage of incompressible data associated with the first recovery dataset compared to an amount or percentage of incompressible data associated with a second recovery dataset that temporally precedes the first recovery dataset, the encryption indicator representative of data within or represented by the first recovery dataset that cannot be compressed more than a threshold amount; and performing, based on the encryption indicator for the first recovery dataset, an action with respect to the second recovery dataset, wherein the second recovery dataset is usable to restore data maintained by a storage system to a second state corresponding to a second point in time that temporally precedes a first point in time corresponding to the first recovery dataset.
Benjamin P Borowiec, Ronald Karr
Filed: 3 Nov 22