Fast key-value storage for continuous data protection systems

    公开(公告)号:US11086837B2

    公开(公告)日:2021-08-10

    申请号:US16248690

    申请日:2019-01-15

    Abstract: Embodiments for providing memory for continuous data protection in a data storage system by storing a first key-value map as a data structure wherein the key is an address of a volume and the value comprises timestamp and hash value pairs for each time the address had data written thereto, and corresponding hash values of the written data, and storing a second key-value map as a data structure wherein the key comprises the hash value and the value comprises the written data. The first key-value map and second key-value map are implemented as a driver component in a server computer of the data storage system. The driver exposes a block device protocol on the server computer and leverages the key-value data structures for use with a deduplication storage system.

    Application aware deduplication allowing random access to compressed files

    公开(公告)号:US11061867B2

    公开(公告)日:2021-07-13

    申请号:US16248625

    申请日:2019-01-15

    Inventor: Assaf Natanzon

    Abstract: A file is received from a client for storage at a deduplication file system. The file is in an archive file format that is used by an application on the client. The file includes subfiles compressed together in the file according to the archive file format, local headers corresponding to the subfiles, and a central directory used by the application to locate information stored in the file. The file is decompressed to store the subfiles separately. A metadata file is created that describes a structure of the file. The metadata file includes the local headers, central directory, pointers to the subfiles, but does not include the subfiles. The file is presented to the client as a single file having the archive file format. A request from the client is received to read the file and the metadata file is read to return data responsive to the request.

    DATACENTER PREEMPTIVE MEASURES FOR IMPROVING PROTECTION USING IOT SENSORS

    公开(公告)号:US20210165710A1

    公开(公告)日:2021-06-03

    申请号:US17168423

    申请日:2021-02-05

    Abstract: One example method includes receiving information concerning a threat to stored data, correlating the information with a preemptive action which, when taken, prevents harm to the stored data by the threat, implementing the preemptive action before the threat causes harm to the stored data, and taking an action to at least partly return a system associated with the stored data to a pre-threat state. The threat may be a natural disaster, or a human-caused condition, for example.

    Dual layer deduplication for application specific file types in an information processing system

    公开(公告)号:US11003629B2

    公开(公告)日:2021-05-11

    申请号:US16176820

    申请日:2018-10-31

    Abstract: An apparatus in one embodiment comprises at least one processing device comprising a processor coupled to a memory. The at least one processing device is configured to obtain a file and to determine a type of the file. A structure of the file may be determined based at least in part on the determined type of the file and at least one location in the file may be identified based at least in part on the determined structure. The file may be divided at the identified at least one location into a plurality of chunks and the plurality of chunks may be provided to a block deduplication module of a storage system where the block deduplication module is configured to perform a deduplication process based at least in part on the plurality of chunks.

    CONTINUOUS REPLICATION AND GRANULAR APPLICATION LEVEL REPLICATION

    公开(公告)号:US20210089410A1

    公开(公告)日:2021-03-25

    申请号:US16953571

    申请日:2020-11-20

    Abstract: Systems and methods for discovering applications. An application may be discovered by determining a topology of the application in a containerized platform. Discovering the topology may include determining the components of the application and then determining relationships between the components. The relationships may include whether a component (e.g., a microservice) is user facing and may be based on traffic patterns between the components. The components or microservices may be prioritized or ranked based on the topology. The topology can be used when performing a data protection operation such as a restore operation.

    Data management for vehicle event data recorder

    公开(公告)号:US10909782B1

    公开(公告)日:2021-02-02

    申请号:US15896635

    申请日:2018-02-14

    Inventor: Assaf Natanzon

    Abstract: In an information processing system comprising at least one vehicle wherein the at least one vehicle comprises an event data recorder and a data management module resident in the at least one vehicle, a method records a plurality of data elements in the event data recorder, and evaluates each of the plurality of data elements to determine which of the plurality of data elements to maintain in a memory region of the event data recorder and which of the plurality of data elements to delete from the memory region of the event data recorder.

    Performance improvement for an active-active distributed non-ALUA system with address ownerships

    公开(公告)号:US10853286B2

    公开(公告)日:2020-12-01

    申请号:US16653328

    申请日:2019-10-15

    Abstract: An aspect of performance improvement for an active-active distributed non-ALUA (asymmetrical logical unit assignment) system with address ownerships includes receiving, by a routing module of a content-addressable storage system, an input/output (IO) request; and determining, by the routing module from a table that provides a listing of addresses and compute nodes having ownership to the address, a target location of the IO request. The target location specifies an address. An aspect also includes determining, by the routing module, a mapping between each of the compute modules and a physical path to corresponding storage controllers, an address owner of a storage controller port of a storage controller that owns the address of the IO; selecting a physical path associated with the address owner; and transmitting, by the routing module, the IO request to the storage controller port via a direct call.

Patent Agency Ranking