-
公开(公告)号:US20240273001A1
公开(公告)日:2024-08-15
申请号:US18168744
申请日:2023-02-14
发明人: Sasikanth Eda , Abhishek Jain , Deepak R. Ghuge
CPC分类号: G06F11/3089 , G06F11/1461 , G06F2201/805
摘要: Described are techniques for determining a quiesce timeout for a containerized workload used to identify a storage unit for the containerized workload. The techniques include determining an Input/Output (I/O) rate associated with a containerized workload that executes in a container environment, where the containerized workload interfaces with a storage system to store the data. The techniques further include determining a quiesce timeout for the containerized workload that is based at least in part on the I/O rate of data associated with the containerized workload and an amount of memory allocated for buffering the data during performance of a backup operation without incurring an I/O overflow. The techniques further include determining storage unit specifications that enable performance of the backup operation within the quiesce timeout and evaluating storage units available to the container environment to identify a storage unit for the containerized workload based on the storage unit specifications.
-
公开(公告)号:US12019867B2
公开(公告)日:2024-06-25
申请号:US17028267
申请日:2020-09-22
CPC分类号: G06F3/0604 , G06F3/0647 , G06F3/067
摘要: A method for assigning and migrating files among tiers within a unified storage environment. The method includes one or more computer processors determining a plurality of files stored within a tiered storage environment that are accessed by a set executing applications. The method further includes determining that one or more files of the plurality of files are accessed utilizing two or more protocols. The method further includes identifying a group of two or more tiering policies utilized within a tiered storage environment. The method further includes determining protocol-based heat count values corresponding the plurality of files. The method further includes storing the plurality of files among tiers of the tiered storage environment based on the identified group of two or more tiering polices and the protocol-based heat count values corresponding to the plurality of files.
-
公开(公告)号:US20230300193A1
公开(公告)日:2023-09-21
申请号:US17655018
申请日:2022-03-16
发明人: Krishnasuri Narayanam , Phani Kumar V. U. Ayyagari , Rahul Rahul , Subhojit Roy , Sasikanth Eda
IPC分类号: H04L67/1097 , H04L67/1008 , H04L67/1014 , H04L67/561
CPC分类号: H04L67/1097 , H04L67/1008 , H04L67/1014 , H04L67/2804
摘要: Disclosed are techniques for programmatically mapping workloads for storage in different classes of a networked computer data storage environment, using a set of rules or data storage hints and properties of the workloads themselves. With the set of data storage hints, metadata sets are assigned to files of the incoming workloads to the networked computer data storage environment based on the properties of the workloads. Then, a target storage class is determined for each file of the workload from the plurality of storage classes present in the networked computer data storage environment. The workload files are then mapped to a logical bucket that is associated with the plurality of storage classes through a shared namespace, with the assigned metadata set for a file cueing the filesystem modules as to which storage class within the logical bucket to direct the various files of the workload to.
-
公开(公告)号:US11676599B2
公开(公告)日:2023-06-13
申请号:US17315397
申请日:2021-05-10
CPC分类号: G10L15/22 , G10L25/78 , G10L2015/223
摘要: A method for managing commands utilizing command boundaries includes establishing a first command boundary for a first intelligent virtual assistant operating on a first electronic device. The method also includes, responsive to receiving audio from a plurality of sources within a vicinity of the first electronic device, identifying a portion of the audio from the plurality of sources within the first command boundary. The method also includes, responsive to determining a command is identifiable in the portion of the audio from the plurality of sources within the first command boundary, sending the command to the first intelligent virtual assistant on the first electronic device.
-
公开(公告)号:US11650975B2
公开(公告)日:2023-05-16
申请号:US17119009
申请日:2020-12-11
发明人: Asmahan Ali , Christina Lara , Abhishek Jain , Sasikanth Eda
IPC分类号: G06F16/23 , G06F16/182
CPC分类号: G06F16/2365 , G06F16/182
摘要: Online file system consistency check for container data on a clustered file system is provided via identifying inodes (index nodes) of a group of files in a clustered file system based on a cyber-resiliency for the clustered file system; grouping the inodes based on a buffer size allocated to a FSCK (File System Consistency Check) operation; passing the inodes of to the FSCK operation in a single iteration when a total size of the inodes is less than the buffer size; or when the total size of the inodes is greater than the buffer size, identifying inodes that belong to a first container and that belong to a second container; passing the inodes that belong to the first container to the FSCK operation in a first iteration; and passing, after the first iteration completes, the inodes that belong to the second container to the FSCK operation in a second iteration.
-
公开(公告)号:US20220391135A1
公开(公告)日:2022-12-08
申请号:US17338507
申请日:2021-06-03
IPC分类号: G06F3/06
摘要: A computational device configures a storage system that supports a plurality of submission queues. A file system of the computational device monitors characteristics of writes received from an application to distribute the writes among the plurality of submission queues of the storage system.
-
公开(公告)号:US11520664B2
公开(公告)日:2022-12-06
申请号:US16920918
申请日:2020-07-06
摘要: A plurality of computing nodes is monitored for updates to one or more files located on the plurality. Based on the monitoring, a first file operation is detected that is related to a first file located on a first node. The first file is related to a first copy that is located on a second node. Based on the first file operation, it is determined that the first file operation is a copy operation of the first file to a second file located on the first node. A copy command related to the first file is transferred, in response to the copy operation, to the second node. In response to the copy operation, a second copy file is created on the second computing node of the plurality. The second copy file is related to the second file located on the first computing node of the plurality.
-
公开(公告)号:US20220358914A1
公开(公告)日:2022-11-10
申请号:US17315397
申请日:2021-05-10
摘要: A method for managing commands utilizing command boundaries includes establishing a first command boundary for a first intelligent virtual assistant operating on a first electronic device. The method also includes, responsive to receiving audio from a plurality of sources within a vicinity of the first electronic device, identifying a portion of the audio from the plurality of sources within the first command boundary. The method also includes, responsive to determining a command is identifiable in the portion of the audio from the plurality of sources within the first command boundary, sending the command to the first intelligent virtual assistant on the first electronic device.
-
公开(公告)号:US11194727B2
公开(公告)日:2021-12-07
申请号:US16732638
申请日:2020-01-02
发明人: Amey Gokhale , Ranjith R. Nair , Sandeep R. Patil , Sasikanth Eda
IPC分类号: G06F12/02 , G06F12/0884 , G06F11/14 , G06F12/0897 , G06F12/06
摘要: A computer-implemented method, according to one embodiment, includes: identifying block addresses which are associated with a given object, and combining the block addresses to a first set in response to determining that at least one token is currently issued on one or more of the identified block addresses. A first portion of the block addresses is transitioned to a second set, where the first portion includes ones of the block addresses determined as having a token currently issued thereon. Moreover, a second portion of the block addresses is divided into equal chunks, where the second portion includes the block addresses remaining in the first set. The chunks in the first set are allocated across two or more parallelization units. Furthermore, the block addresses in the second set are divided into equal chunks, and the chunks in the second set are allocated to at least one dedicated parallelization unit.
-
10.
公开(公告)号:US20210286425A1
公开(公告)日:2021-09-16
申请号:US16817151
申请日:2020-03-12
发明人: Deepak Ghuge , Sasikanth Eda , Sarbajit K. Rakshit
摘要: A computer-implemented system and method for assigning security profiles comprises receiving bounded region information that is located within a defined region associated with a user from an augmented reality device (ARD) associated with the user. A bounded region is created from the bounded region information. A first set of selectable entities, such as subjects for whom the security profile is being applied and/or secure elements, such as cabinets, doors, or computer resources, are selected as those being within the bounded region information. A security profile to the first set of selectable entities is then applied relative to a second set of selectable entities.
-
-
-
-
-
-
-
-
-