-
公开(公告)号:US20220066986A1
公开(公告)日:2022-03-03
申请号:US17454420
申请日:2021-11-10
Applicant: EMC IP Holding Company LLC
Inventor: Amihai Savir , Avitan Gefen , Kfir Wolfson , Itay Azaria
IPC: G06F16/11 , G06N7/00 , G06N20/00 , G06F16/178
Abstract: One example method includes monitoring performance of an element of a runtime environment, where the monitoring includes collecting performance information concerning the element, analyzing the collected information, detecting, based on the analysis of the collected information, an anomaly in the performance of the element and, in response to detection of the anomaly, automatically marking a snapshot of the runtime environment element, and the marking of the snapshot overrides a retention policy applicable to the snapshot.
-
公开(公告)号:US20210365339A1
公开(公告)日:2021-11-25
申请号:US16878206
申请日:2020-05-19
Applicant: EMC IP Holding Company LLC
Inventor: Bing Liu , Jehuda Shemer , Kfir Wolfson , Jawad Said
Abstract: Data protection operations including replication operations that dynamically adapt a topology of replica virtual machines. A data protection system may implement a machine model that is trained using, as input, characteristics of virtual machines. When a failure is predicted, a topology of the replica virtual machines is changed. The topology may also change when changes in the environment are detected. The changes may include redistributing the protected applications to the replica virtual machines and/or scaling the replica virtual machines.
-
公开(公告)号:US20210365330A1
公开(公告)日:2021-11-25
申请号:US16880080
申请日:2020-05-21
Applicant: EMC IP Holding Company LLC
Inventor: Tomer Kushnir , Jehuda Shemer , Jawad Said , Kfir Wolfson
Abstract: On-the-fly point-in-time recovery operations are disclosed. During a recovery operation, the PiT being restored can be changed on-the-fly or during the existing recovery operation without restarting the recovery process from the beginning. IN one example, this improves recovery time operation (RTO) and prevents aspects of the recovery operation to be avoided when changing to a different PiT.
-
公开(公告)号:US11106811B2
公开(公告)日:2021-08-31
申请号:US16170767
申请日:2018-10-25
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Jehuda Shemer , Kfir Wolfson
Abstract: Systems, apparatus and methods for managing an object's lifecycle in an object store. A distributed ledger is used to record transactions between a client and an object store. The distributed ledger records the transaction and also attests to the object authenticity. Thus, the transactions can be verified and may assist in resolving issues that arise with respect to the stored objects.
-
公开(公告)号:US20210263650A1
公开(公告)日:2021-08-26
申请号:US16802120
申请日:2020-02-26
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Jawad Said , Kfir Wolfson
Abstract: One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.
-
公开(公告)号:US11086837B2
公开(公告)日:2021-08-10
申请号:US16248690
申请日:2019-01-15
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Udi Shemer , Assaf Natanzon
Abstract: Embodiments for providing memory for continuous data protection in a data storage system by storing a first key-value map as a data structure wherein the key is an address of a volume and the value comprises timestamp and hash value pairs for each time the address had data written thereto, and corresponding hash values of the written data, and storing a second key-value map as a data structure wherein the key comprises the hash value and the value comprises the written data. The first key-value map and second key-value map are implemented as a driver component in a server computer of the data storage system. The driver exposes a block device protocol on the server computer and leverages the key-value data structures for use with a deduplication storage system.
-
公开(公告)号:US20210165710A1
公开(公告)日:2021-06-03
申请号:US17168423
申请日:2021-02-05
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Assaf Natanzon
IPC: G06F11/07
Abstract: One example method includes receiving information concerning a threat to stored data, correlating the information with a preemptive action which, when taken, prevents harm to the stored data by the threat, implementing the preemptive action before the threat causes harm to the stored data, and taking an action to at least partly return a system associated with the stored data to a pre-threat state. The threat may be a natural disaster, or a human-caused condition, for example.
-
88.
公开(公告)号:US11005886B2
公开(公告)日:2021-05-11
申请号:US16145529
申请日:2018-09-28
Applicant: EMC IP Holding Company LLC
Inventor: Amos Zamir , Oron Golan , Jehuda Shemer , Kfir Wolfson
IPC: H04L29/06 , G06F9/54 , H04L12/755
Abstract: Network level Moving Target Defense techniques are provided with substantially continuous access to protected applications. An exemplary method comprises identifying a first application listening to a first port or a first network address; notifying the first application to listen to a second port or a second network address; notifying at least one additional application that the first application is listening to the second port or the second network address; and notifying the first application to unlisten to the first port or the first network address, wherein the first application operates in a substantially continuous manner during a change from listening to one or more of the first port and the first network address and listening to one or more of the second port and the second network address. The first application can be a stateful application having persistent storage.
-
公开(公告)号:US20210081431A1
公开(公告)日:2021-03-18
申请号:US17107393
申请日:2020-11-30
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Kfir Wolfson , Itay Azaria
IPC: G06F16/27 , G06F16/215
Abstract: Systems, apparatus, and methods for any point in time replication to the cloud. Data is replicated by replicating data to a remote storage or a data bucket in the cloud. At the same time, a metadata stream is generated and stored. The metadata stream establishes a relationship between the data and offsets of the data in the production volume. This allows continuous replication without having to maintain a replica volume. The replica volume can be generated during a rehydration operation that uses the metadata stream to construct the production volume from the cloud data.
-
公开(公告)号:US20200344264A1
公开(公告)日:2020-10-29
申请号:US16395847
申请日:2019-04-26
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Udi Shemer , Amos Zamir
IPC: H04L29/06
Abstract: Embodiments for detecting malicious modification of data in a network, by: setting, by a first layer of network resources, a number of markers associated with input/output (I/O) operations of the network; saving the markers, location, and associated metadata in a marker database; reading, by a second layer of the network resources, the markers corresponding to relevant I/O operations; and verifying each scanned I/O operation against a corresponding marker to determine whether or not data for a scanned specific I/O operation has been improperly modified for the first and second layers and any intermediate layer resulting in a fault condition, and if so, taking remedial action to flag or abort the specific I/O operation.
-
-
-
-
-
-
-
-
-