-
公开(公告)号:US12210904B2
公开(公告)日:2025-01-28
申请号:US16023091
申请日:2018-06-29
Applicant: International Business Machines Corporation
Inventor: Sasikanth Eda , Sandeep R. Patil , William W. Owen , Kumaran Rajaram
Abstract: A method for more efficiently storing genomic includes designating multiple different data storage techniques for storing genomic data generated by a genomic pipeline. The method further identifies a file, made up of multiple blocks, generated by the genomic pipeline. The method determines which data storage technique is most optimal to store each block of the file. In doing so, the method may consider the type of the file, the stage of the genomic pipeline that generated the file, the access frequency for blocks of the file, the most accessed blocks of the file, and the like. The method stores each block using the data storage technique determined to be most optimal after completion of a designated stage of the genomic pipeline, such that blocks of the file are stored using several different data storage techniques. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US11789512B2
公开(公告)日:2023-10-17
申请号:US16242553
申请日:2019-01-08
Applicant: International Business Machines Corporation
Inventor: Kushal Patel , Sandeep R. Patil , Sarvesh Patel
IPC: G06F1/03 , G06F1/3212 , G06F1/3215 , G06F9/44 , G06F1/30
CPC classification number: G06F1/30 , G06F1/3212 , G06F1/3215 , G06F9/44
Abstract: A processor may identify that an external power source has begun powering a computing device. The processor may identify computational data in a volatile memory of the computing device. The processor may determine that the external power source does not have sufficient energy capacity to provide the computing device enough power to process the computational data at a first I/O throttling rate. The processor may increase the first I/O throttling rate to a second I/O throttling rate. The second I/O throttling rate may allow the computational data to be processed by the computing device with the energy capacity of the external power source.
-
公开(公告)号:US11675915B2
公开(公告)日:2023-06-13
申请号:US16386134
申请日:2019-04-16
Applicant: International Business Machines Corporation
Inventor: Nilesh P. Bhosale , Joseph W. Dain , Gregory T. Kishi , Sandeep R. Patil
CPC classification number: G06F21/62 , G06F21/577 , G06N3/08 , G06F2221/034
Abstract: A computer-implemented method according to an aspect includes training a cognitive network, utilizing metadata associated with historic data threats, inputting metadata associated with a current data threat into the trained cognitive network, identifying, by the trained cognitive network, one or more stored instances of data determined to be vulnerable to the current data threat, and adjusting one or more security aspects of the one or more stored instances of data determined to be vulnerable to the current data threat.
-
公开(公告)号:US11301578B2
公开(公告)日:2022-04-12
申请号:US16376960
申请日:2019-04-05
Applicant: International Business Machines Corporation
Inventor: Nilesh P. Bhosale , Joseph W. Dain , Gregory T. Kishi , Sandeep R. Patil
Abstract: A computer-implemented method according to an aspect includes determining a sensitivity level for an instance of data, comparing the sensitivity level to one or more policies, and conditionally performing a backup of the instance of data, based on the comparing.
-
公开(公告)号:US11194727B2
公开(公告)日:2021-12-07
申请号:US16732638
申请日:2020-01-02
Applicant: International Business Machines Corporation
Inventor: Amey Gokhale , Ranjith R. Nair , Sandeep R. Patil , Sasikanth Eda
IPC: G06F12/02 , G06F12/0884 , G06F11/14 , G06F12/0897 , G06F12/06
Abstract: A computer-implemented method, according to one embodiment, includes: identifying block addresses which are associated with a given object, and combining the block addresses to a first set in response to determining that at least one token is currently issued on one or more of the identified block addresses. A first portion of the block addresses is transitioned to a second set, where the first portion includes ones of the block addresses determined as having a token currently issued thereon. Moreover, a second portion of the block addresses is divided into equal chunks, where the second portion includes the block addresses remaining in the first set. The chunks in the first set are allocated across two or more parallelization units. Furthermore, the block addresses in the second set are divided into equal chunks, and the chunks in the second set are allocated to at least one dedicated parallelization unit.
-
6.
公开(公告)号:US11076020B2
公开(公告)日:2021-07-27
申请号:US16800505
申请日:2020-02-25
Applicant: International Business Machines Corporation
Inventor: Duane M. Baldwin , Sasikanth Eda , John T. Olson , Sandeep R. Patil
Abstract: A system and method dynamically transitions the file system role of compute nodes in a distributed clustered file system for an object that includes an embedded compute engine (a storlet). Embodiments of the invention overcome prior art problems of a storlet in a distributed storage system with a storlet engine having a dynamic role module which dynamically assigns or changes a file system role served by the node to a role which is more optimally suited for a computation operation in the storlet. The role assignment is made based on a classification of the computation operation and the appropriate filesystem role that matches computation operation. For example, a role could be assigned which helps reduce storage needs, communication resources, etc.
-
公开(公告)号:US10983826B2
公开(公告)日:2021-04-20
申请号:US16529201
申请日:2019-08-01
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sasikanth Eda , Akshat Mithal , Sandeep R. Patil
Abstract: A method, computer system, and a computer program product for designing and executing at least one storlet is provided. The present invention may include receiving a plurality of restore operations based on a plurality of data. The present invention may also include identifying a plurality of blocks corresponding to the received plurality of restore operations from the plurality of data. The present invention may then include identifying a plurality of grain packs corresponding with the identified plurality of blocks. The present invention may further include generating a plurality of grain pack index identifications corresponding with the identified plurality of grain packs. The present invention may also include generating at least one storlet based on the generated plurality of grain pack index identifications. The present invention may then include returning a plurality of consolidated objects by executing the generated storlet.
-
公开(公告)号:US10958744B2
公开(公告)日:2021-03-23
申请号:US16431951
申请日:2019-06-05
Applicant: International Business Machines Corporation
Inventor: Sandeep Bazar , Sandeep R. Patil , Sachin C. Punadikar
IPC: H04L29/08
Abstract: A computer system receives digital content for communication to a user. Digital fingerprints are calculated from the digital content. The fingerprints are compared to identify redundant digital content. Digital identifications associated with the digital fingerprints are communicated to a user device to determine whether the digital content exists in local storage.
-
公开(公告)号:US10949393B2
公开(公告)日:2021-03-16
申请号:US16000227
申请日:2018-06-05
Applicant: International Business Machines Corporation
Inventor: Akshat Mithal , Sandeep R. Patil , Sasikanth Eda
Abstract: A microservice executing in a distributed computing system may receive a request to delete a target object stored in the distributed computing system. The microservice may identify dependent objects for the target object using information received in the request. The microservice may generate a new object that includes the data from the target object and the data from the one or more dependent objects. The new object may be stored in the distributed computing system, and the target object may be removed from the distributed computing system.
-
10.
公开(公告)号:US10936240B2
公开(公告)日:2021-03-02
申请号:US16209804
申请日:2018-12-04
Applicant: International Business Machines Corporation
Inventor: Abhishek S. Dave , Shailesh S. Jeurkar , Sandeep R. Patil , Sasikanth Eda
Abstract: A computer-implemented method, according to one embodiment, includes: selecting two previously captured snapshots and calculating a checksum for each file in each of the two snapshots. The checksums are used to determine whether the two snapshots are sufficiently similar to each other. In response to determining that the two snapshots are sufficiently similar to each other, important ones of the files in each of the two snapshots are identified. The identified important files which are located in a lower performance tier of a multi-tier data storage system are transitioned to a higher performance tier of the multi-tier data storage system. Moreover, a merged snapshot is created by merging the two snapshots, and the merged snapshot is provided for additional operations. Other systems, methods, and computer program products are described in additional embodiments.
-
-
-
-
-
-
-
-
-