Method of tracking and analyzing data integrity issues by leveraging cloud services

    公开(公告)号:US10936426B2

    公开(公告)日:2021-03-02

    申请号:US16685638

    申请日:2019-11-15

    Abstract: One example method, which may be performed by a data integrity check entity, includes receiving a request from a data protection entity to perform a data integrity check regarding a backup dataset, and the backup dataset includes a backup of an entity other than the data integrity check entity and the data protection entity, accessing an information set created by the data protection entity concerning the backup dataset, performing a data integrity check process that includes analyzing the backup dataset and information contained in the information set and, based on the analysis, identifying a data integrity problem that resulted from the data corruption event involving the backup dataset, and as between the data integrity check entity and the data protection entity, only the data integrity check entity checks the integrity of data in the backup dataset, and reporting results of the analysis of the backup dataset and the information set.

    Data reduction techniques for a multi-sensor internet of things environment

    公开(公告)号:US10931546B2

    公开(公告)日:2021-02-23

    申请号:US16024757

    申请日:2018-06-30

    Abstract: Data reduction techniques are provided for a multi-sensor IoT environment. An exemplary method comprises: dynamically determining, by a device within a distributed network comprised of a plurality of sensors, an amount of sensor data to be collected by and/or transmitted by a sensor within the distributed network based on at least one predefined spatial-based rule and/or at least one predefined temporal-based rule; and processing the sensor data based on the dynamically determined amount of sensor data. A percentage of the plurality of sensors within the distributed network that collect and/or transmit the sensor data can optionally be specified. One or more sensors optionally collect the sensor data at a default resolution and a predefined spatial-based rule and/or a predefined temporal-based rule specifies a predefined trigger for at least one sensor to collect and/or transmit the sensor data at a higher resolution.

    SYSTEM AND METHOD FOR DEVICE OPERATION MONITORING

    公开(公告)号:US20210025738A1

    公开(公告)日:2021-01-28

    申请号:US16521586

    申请日:2019-07-24

    Abstract: A sensing device monitor for monitoring operation of sensing devices includes persistent storage for storing a scene signature associated with a sensing device of the sensing devices and a sensing device manager. The sensing device manager generates a challenge based, at least in part, on the scene signature; issues the challenge to, at least, the sensing device to obtain a challenge response; makes a determination that the challenge response does not pass the challenge; and in response to the determination: remediates the sensing device.

    AUTOMATICALLY SETTING A DYNAMIC RESTORE POLICY IN A NATIVE CLOUD ENVIRONMENT

    公开(公告)号:US20210011808A1

    公开(公告)日:2021-01-14

    申请号:US17032802

    申请日:2020-09-25

    Abstract: One example method includes identifying a group of microservices that form respective portions of an application, capturing any relations among microservices in the group of microservices, generating one or more restore policies for the application, based on identified relations among the microservices in the group of microservices, and configuring one of the restore policies so that such restore policy specifies restoring, together, a microservice that was identified as a partial cause of a problem, and any other microservices that are dependent on that microservice.

    EVALUATING SOFTWARE LICENSE USAGE USING REINFORCEMENT LEARNING AGENTS

    公开(公告)号:US20200349662A1

    公开(公告)日:2020-11-05

    申请号:US16401610

    申请日:2019-05-02

    Abstract: Techniques are provided for reinforcement learning-based evaluation of software product usage. One method comprises obtaining key performance indicators indicating software product usage by a user; determining, for a predefined time window: (i) a mean and/or a median of the obtained KPIs; (ii) an amount of time that the software product was active; and (iii) an amount of interactions by the user with a user interface; evaluating possible login states of the software product using at least one reinforcement learning agent, wherein the evaluating comprises (a) observing the plurality of possible login states, including a current state comprising a current login state of the software product, and (b) obtaining an expected utility score for changing from the current login state to a different login state of the software product; and determining whether to change from the current login state to a different login state of the software product based on the expected utility score.

    AUTOMATIC SECURITY CONFIGURATIONS IN DISASTER RECOVERY

    公开(公告)号:US20200336574A1

    公开(公告)日:2020-10-22

    申请号:US16389754

    申请日:2019-04-19

    Abstract: Systems and methods for automatically configuring security groups during data protection operations including disaster recovery operations. In preparation for recovering a source site to a target site, security information at the source site is collected and classified. The classified security information is stored as a disaster recovery plan at least for security aspects of the disaster recovery process. The disaster recovery plan can be implemented at the target site such that security risks are minimized and connectivity errors are minimized during the recovery process.

    DYNAMICALLY SELECTING OPTIMAL INSTANCE TYPE FOR DISASTER RECOVERY IN THE CLOUD

    公开(公告)号:US20200326964A1

    公开(公告)日:2020-10-15

    申请号:US16380780

    申请日:2019-04-10

    Abstract: One example includes performing a VM restore instance type discovery process, creating a test VM with a VM restore instance type matching a VM restore instance type identified during discovery, using the test VM to create a test restore VM at a cloud storage site, restoring the test VM at the cloud storage site using the test restore VM, generating a 4-D baseline vector based on the restoration of the test VM, the 4-D baseline vector identifying a particular VM restore instance type, generating a 5-D vector based on the 4-D baseline vector, ranking the 5-D vector relative to other 5-D vectors, the 5-D vectors identifying the same production site VM, and restoring, at the cloud storage site, the production site VM identified in the 5-D vectors, the production site VM restored at the cloud storage site has a VM restore instance type identified in the highest ranked 5-D vector.

    SERVERLESS SOLUTION FOR CONTINUOUS DATA PROTECTION

    公开(公告)号:US20200264775A1

    公开(公告)日:2020-08-20

    申请号:US16868774

    申请日:2020-05-07

    Inventor: Assaf Natanzon

    Abstract: A serverless application is provided to a cloud site of a cloud services provider. The cloud services provider offers backend services that include an object store and a database. Input/output (IO) writes sent to a volume of a block storage device at a production site are intercepted and aggregated. The aggregated IOs and metadata for the IOs are transmitted from the production site to the cloud site of the cloud services provider. Upon receipt of the aggregated IOs and metadata at the cloud site, the aggregated IOs are stored in an object in the object store at the cloud site, and a function of the serverless application is triggered to write the metadata to the database offered by the cloud services provider.

Patent Agency Ranking