DATA REDUCTION TECHNIQUES FOR A MULTI-SENSOR INTERNET OF THINGS ENVIRONMENT

    公开(公告)号:US20200007420A1

    公开(公告)日:2020-01-02

    申请号:US16024757

    申请日:2018-06-30

    Abstract: Data reduction techniques are provided for a multi-sensor IoT environment. An exemplary method comprises: dynamically determining, by a device within a distributed network comprised of a plurality of sensors, an amount of sensor data to be collected by and/or transmitted by a sensor within the distributed network based on at least one predefined spatial-based rule and/or at least one predefined temporal-based rule; and processing the sensor data based on the dynamically determined amount of sensor data. A percentage of the plurality of sensors within the distributed network that collect and/or transmit the sensor data can optionally be specified. One or more sensors optionally collect the sensor data at a default resolution and a predefined spatial-based rule and/or a predefined temporal-based rule specifies a predefined trigger for at least one sensor to collect and/or transmit the sensor data at a higher resolution.

    SERVERLESS SOLUTION FOR CONTINUOUS DATA PROTECTION

    公开(公告)号:US20190332781A1

    公开(公告)日:2019-10-31

    申请号:US15965620

    申请日:2018-04-27

    Inventor: Assaf Natanzon

    Abstract: Input/output IO writes sent to a volume to be protected are intercepted and aggregated. The aggregated IOs and IO metadata of each IO are transmitted to a replica site. The aggregated IOs are stored in an object of an object store at the replica site. The metadata of each IO, including an identification of the object in which the aggregated IOs are stored, are written to a database table at the replica site.

    DECENTRALIZED DATA MANAGEMENT ACROSS HIGHLY DISTRIBUTED SYSTEMS

    公开(公告)号:US20190327180A1

    公开(公告)日:2019-10-24

    申请号:US15959421

    申请日:2018-04-23

    Abstract: In a system environment comprising a plurality of computing resources, wherein at least a portion of the computing resources are mobile, a method maintains a decentralized messaging network of interconnected messaging nodes and a decentralized data network of interconnected data nodes. Each of the plurality of computing resources is associated with a given messaging node and a given data node. The method manages transfer of a data set between the plurality of computing resources in association with the decentralized messaging network and the decentralized data network. Managing transfer of the data set comprises inserting a policy file into the decentralized data network specifying one or more policies for managing the transfer of the data set and inserting a message into the decentralized messaging network instructing implementation of the one or more policies.

    DATA MANAGEMENT AND BACKUP FOR IMAGE AND VIDEO MEDIA

    公开(公告)号:US20190310919A1

    公开(公告)日:2019-10-10

    申请号:US15947834

    申请日:2018-04-08

    Abstract: The management and backup of image and video media is automatically performed by evaluating a media file to characterize the content; transforming the media file, as by compressing it, based upon its evaluation and established policies and requirements; and storing the transformed media file with a high resolution in a storage tier having first access characteristics for a first retention period. Following the first retention period, the stored file is re-evaluated and further transformed and stored with lesser resolution in another tier having different access characteristics for a second retention period. Subsequently, the further transformed media file may be transformed again and stored in archive storage.

    Ransomware detection in a continuous data protection environment

    公开(公告)号:US10409986B1

    公开(公告)日:2019-09-10

    申请号:US15275768

    申请日:2016-09-26

    Abstract: A computer program product, system, and method for generating coded fragments comprises intercepting, at a splitter, a write request from a host to storage, the write request comprising write data; sending the write request to a data protection appliance (DPA); calculating a probability of ransomware within the host; if the probability of ransomware is less than or equal to a first threshold, sending an acknowledgement (ACK) to the splitter; if the probability of ransomware is greater than a first threshold value and less than or equal to a second threshold value, creating a bookmark and sending an ACK to the splitter; and if the probability of ransomware is greater than the second threshold value, sending a delayed ACK to the splitter.

    Content-based deduplicated storage having multilevel data cache

    公开(公告)号:US10366011B1

    公开(公告)日:2019-07-30

    申请号:US15970243

    申请日:2018-05-03

    Abstract: Methods and apparatus for a content-based deduplicated storage system for generating an address to hash (A2H) value for a control module as data blocks are received and generating, for a data module, hash to physical (H2P) values corresponding to the A2H values. A first cache can be provided for the control module, where the first cache can comprise an address value, a hash value, and physical location information. A second cache can be provided for the data module, where the second cache can comprise a bucket value, a hash value, and a filter mechanism, where the filter mechanism is configured to determine whether the hash value is present.

    Metadata paging mechanism tuned for variable write-endurance flash

    公开(公告)号:US10318180B1

    公开(公告)日:2019-06-11

    申请号:US15384445

    申请日:2016-12-20

    Abstract: A storage array uses both high endurance SSDs and low endurance SSDs for metadata paging. Wear cost values are calculated for each page of metadata in cache. The wear cost values are used to select pages for swapping out of the cache to the SSDs. The wear cost values may be calculated as a function of a first term that is indicative of whether the respective page of metadata will be written to high endurance or low endurance SSDs; a second term that is indicative of likelihood of data associated with the respective pages of metadata that will possibly be changed due to a write; and a third term that is indicative of age of the respective page of metadata in the cache since most recent use. The terms may be estimated and independently weighted. The portion of cache allocated for the metadata may be increased to avoid exceeding DWPD targets.

Patent Agency Ranking