Dell Products L.P. patent applications on April 4th, 2024

From WikiPatents
Jump to navigation Jump to search

Patent Applications by Dell Products L.P. on April 4th, 2024

Dell Products L.P.: 51 patent applications

Dell Products L.P. has applied for patents in the areas of G06F11/14 (8), G06F16/16 (6), G06F9/50 (5), G06F2221/034 (5), G06F21/56 (5)

With keywords such as: data, storage, embodiments, node, verification, based, backup, processing, files, and information in patent application abstracts.



Patent Applications by Dell Products L.P.

20240109756.COVER FOR USE WITH VACUUM HOIST_simplified_abstract_(dell products l.p.)

Inventor(s): Gabriel Jose BRAUN of El Paso TX (US) for dell products l.p., Eduardo ESCAMILLA of Round Rock TX (US) for dell products l.p.

IPC Code(s): B66C1/62, B66C1/02, H05K7/14



Abstract: a cover assembly may include a cover having a top surface which is generally planar and substantially void of any features formed thereon and an attach and release mechanism mechanically coupled to the top surface and configured to mechanically engage with a corresponding engagement feature of a physical object in order to mechanically retain the cover assembly in a fixed position relative to the physical object.


20240111327.SYSTEM AND METHOD TO MAINTAIN CLOCK STABILITY IN A COMPLEX COMPUTING PLATFORM_simplified_abstract_(dell products l.p.)

Inventor(s): JASON CHRISTOPHER ROCK of Austin TX (US) for dell products l.p., JONATHAN FOSTER LEWIS of Round Rock TX (US) for dell products l.p.

IPC Code(s): G06F1/12, G06F1/06, G06F1/20



Abstract: methods and systems for performing timekeeping by a data processing system are disclosed. to perform timekeeping, the data processing system may include an oscillator that provides signals upon which time keeping is based. the signal provided by the oscillator may be impacted by the temperature of the oscillator. during periods of time when the data processing system may communicate with other devices, the data processing system may perform cooperative timekeeping synchronization through exchange of data with the other devices. during periods of time when the data processing system may not perform cooperative timekeeping synchronization, the data processing system may perform independent timekeeping synchronization by attempting to thermally stabilize the oscillator.


20240111338.RECYCLABLE LIQUID CRYSTAL POLYMER AND POLYETHYLENE FABRIC FOR AN INFORMATION HANDLING SYSTEM COVER_simplified_abstract_(dell products l.p.)

Inventor(s): Deeder M. Aurongzeb of Austin TX (US) for dell products l.p., Peng Lip Goh of Singapore (SG) for dell products l.p., Weijong Sheu of Austin TX (US) for dell products l.p., Chad Alan Rabe of Round Rock TX (US) for dell products l.p.

IPC Code(s): G06F1/16



Abstract: disclosed is a composite that can include a first layer including a liquid crystal polymer (lcp), and a second layer including an ultra-high molecular weight polyethylene (uhmwpe). an outer surface of the second layer can form at least a portion of an outer surface of the composite, and an inner surface of the second layer opposite to the outer surface of the second layer can abut against the first layer.


20240111348.SYSTEMS AND METHODS FOR GRANULAR AND SCALABLE SUBSYSTEM POWER CONTROLS, FAULT HANDLING, AND FIELD-REPLACEABLE UNIT ISOLATION IN A MODULAR ARCHITECTURE_simplified_abstract_(dell products l.p.)

Inventor(s): Jeffrey L. KENNEDY of Austin TX (US) for dell products l.p., Timothy M. LAMBERT of Austin TX (US) for dell products l.p., Sanjiv C. SINHA of Austin TX (US) for dell products l.p.

IPC Code(s): G06F1/26, G06F11/07, G06F13/20



Abstract: an information handling system may include a host processor module comprising a host processor field programmable gate array, a management controller communicatively coupled to the host processor field programmable gate array and configured to provide out-of-band management facilities for management of the information handling system, and an interposer configured to interface between the host processor field programmable gate array and one or more peripheral devices in order to perform power management and control of the one or more peripheral device. the interposer may include a general purpose input/output extender configured to enable and control power delivery to the one or more peripheral devices and a microcontroller unit communicatively coupled to the host processor field programmable gate array and configured to perform monitoring and discovery of the one or more peripheral devices.


20240111369.INFORMATION HANDLING SYSTEM AND KVM DISPLAY AUTOMATED CONFIGURATION_simplified_abstract_(dell products l.p.)

Inventor(s): Vui Khen Thien of Singapore (SG) for dell products l.p., Aik Keong Ong of Singapore (SG) for dell products l.p.

IPC Code(s): G06F3/023, G06F3/0354, G06F3/038, G06F13/38, G06F13/42



Abstract: a display keyboard, video, mouse (kvm) switch associates video and data ports with an information handling system by communicating identifiable information between the kvm switch and information handling system through both video and data ports to confirm which of the data ports is associated with a video port that presents visual images of the information handling system. the identifiable information includes a unique token or virtual mouse inputs communicated as data to an information handling system that are detected in visual information communicated as mouse cursor movements.


20240111414.SYSTEMS AND METHODS FOR ESTABLISHING SCALABLE STORAGE TARGETS_simplified_abstract_(dell products l.p.)

Inventor(s): Xiangping Chen of Harvard MA (US) for dell products l.p., Walter A. O'Brien, III of Westborough MA (US) for dell products l.p., Xunce Zhou of Austin TX (US) for dell products l.p.

IPC Code(s): G06F3/06



Abstract: a method for facilitating a connection to a storage volume, that includes receiving, by a storage manager, an access request from compute node, where the access request includes a storage volume identifier associated with the storage volume, performing a lookup, in a target database, to identify a target entry that includes the storage volume identifier, making a first determination that the target database does not comprise the target entry, and based on the first determination, creating a first storage target cluster for the storage volume, and sending first connection instructions to the compute node, where the first connection instructions comprise a first storage target cluster identifier associated with the first storage target cluster.


20240111428.METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING COMPRESSED DATA_simplified_abstract_(dell products l.p.)

Inventor(s): Qinghua Ling of Beijing (CN) for dell products l.p.

IPC Code(s): G06F3/06



Abstract: techniques for processing compressed data involve: determining, based on parsing of a header of a compressed data packet, a size of original data corresponding to compressed data, wherein the compressed data packet comprises the header, compressed metadata, and the compressed data. the techniques further involve: allocating, based on the size of the original data, a shared buffer space for receiving and converting the compressed metadata and the compressed data; and storing the compressed data packet in the shared buffer space. the shared buffer space can be used for the receiving and conversion processing of compressed data at the same time, without allocating a separate buffer space for each processing, thereby improving the memory efficiency. since the allocated shared buffer space is used for both receiving processing and conversion processing, the complexity of configuration of a memory pool is also reduced.


20240111429.TECHNIQUES FOR COLLECTING AND UTILIZING ACTIVITY METRICS_simplified_abstract_(dell products l.p.)

Inventor(s): Vamsi K. VANKAMAMIDI of Hopkinton MA (US) for dell products l.p., Ajay Karri of South Grafton MA (US) for dell products l.p.

IPC Code(s): G06F3/06



Abstract: in a multi-tiered system, read temperature and write temperature per virtual block (vlb) can be determined based on the content referenced by each vlb. the read temperature can describe vlb read activity relative to the recency and frequency of read misses of content referenced by the vlb. the write temperature can describe vlb write activity relative to the recency and frequency of overwrites with respect to content referenced by the vlb. read misses and overwrites can be recorded per processing core in an active tablet used for recording by only a single core. active and analytic tablet sets across cores can be switched based on criteria. analytic tablets can be processed and used to update metrics, including read and write temperatures, stored for vlbs. the metrics can be used to determine temperature classifications of vlbs. content referenced by vlbs can be promoted and/or demoted using vlb temperature classifications.


20240111520.TARGETED UPDATES OF STORAGE MANAGEMENT SOFTWARE BASED ON CLASS FILE USAGE_simplified_abstract_(dell products l.p.)

Inventor(s): Paul McSweeney of Silver Springs (IE) for dell products l.p., Ellen Murphy of Whites Cross (IE) for dell products l.p., Caoimhe Ward of Swinford (IE) for dell products l.p.

IPC Code(s): G06F8/658, G06F16/17



Abstract: customized updates are generated for instances of storage management software running on storage management servers in different storage systems. the filenames of class files used by each instance of the storage management software are stored in respective databases associated with those storage management software instances. thread dumps are created and searched for class files of the storage management software to create a baseline. the baseline is updated by comparing class files used in response to ui actions and rest api calls and storing names of class files that are not already in the database. to update an instance of the storage management software, the class files of a general update are compared with the filenames in the database associated with the instance and non-matching files are omitted from the customized update foe that instance.


20240111544.SYSTEMS AND METHODS FOR REMOTE HARDWARE AUTHORIZATION_simplified_abstract_(dell products l.p.)

Inventor(s): Elie Antoun Jreij of Pflugerville TX (US) for dell products l.p., Austin Patrick Bolen of Austin TX (US) for dell products l.p.

IPC Code(s): G06F9/4401, G06F9/38



Abstract: a node, that includes a processor executing a first operating system, a peripheral port connected to a peripheral device, where the peripheral port is configured to block access to the peripheral device, a system control processor executing a second operating system, where the system control processor is configured to perform a method for providing access of the peripheral device to the first operating system, the method that includes receiving a peripheral access message from a remote authentication server, where the peripheral access message includes a peripheral device identifier associated with the peripheral device, and in response to receiving the peripheral access message, unblocking the access to the peripheral device.


20240111583.SYSTEMS AND METHODS FOR MEASURING HARDWARE UTILIZATION_simplified_abstract_(dell products l.p.)

Inventor(s): Elie Antoun Jreij of Pflugerville TX (US) for dell products l.p., Austin Patrick Bolen of Austin TX (US) for dell products l.p.

IPC Code(s): G06F9/50, G06F9/4401



Abstract: a node comprising, a processor executing a first operating system, a peripheral port connected to a peripheral device, a system control processor executing a second operating system, where the system control processor is configured to perform a method for metering usage of the peripheral device by the first operating system, the method that includes obtaining utilization data from a peripheral device, and sending the utilization data to a remote authentication server, where the first operating system cannot access the system control processor.


20240111593.DYNAMIC SLICING USING A BALANCED APPROACH BASED ON SYSTEM RESOURCES FOR MAXIMUM OUTPUT_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil K. Yadav of Bangalore (IN) for dell products l.p., Soumen Acharya of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F9/50



Abstract: one example method includes gathering information regarding filesystem resources, based on the system resource information, identifying a thread pool size, starting a thread pool having the thread pool size, where the thread pool size is dynamically adjustable based on changes in the system resources, crawling a filesystem and identifying crawl jobs to be performed, adding the crawl jobs to the thread pool, and performing the crawl jobs. the method may further include slicing data in one or more directories that have been crawled.


20240111600.SYSTEMS AND METHODS FOR CONSISTENCY GROUP BASED RESOURCE THROTTLING_simplified_abstract_(dell products l.p.)

Inventor(s): Gururaj Kulkarni of Bangalore (IN) for dell products l.p., Shelesh Chopra of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F9/50



Abstract: one example method includes, within a microservice architecture: (i) obtaining, via a monitor engine, a resource utilization associated with a set of parameters for each microservice within a consistency group, wherein each microservice within the consistency group is associated with a particular distributed operation within the microservice architecture, and wherein the consistency group defines, for each microservice within the consistency group, one or more threshold values associated with each parameter of the set of parameters, (ii) determining, via an analytical engine, whether resource utilization satisfies a particular threshold of the one or more threshold values associated with a particular parameter of the set of parameters for a particular microservice within the consistency group, and (iii) based upon resource utilization satisfying the particular threshold of the particular parameter for the particular microservice within the consistency group, throttling resource utilization for one or more microservices within the consistency group.


20240111604.CLOUD COMPUTING QOS METRIC ESTIMATION USING MODELS_simplified_abstract_(dell products l.p.)

Inventor(s): Miguel Paredes Quinones of Campinas (BR) for dell products l.p., Romulo Teixeira de Abreu Pinho of Niteroi (BR) for dell products l.p.

IPC Code(s): G06F9/50



Abstract: models to predict quality of service metrics are disclosed. a response time is predicted using an occupancy status of an infrastructure and models that have been trained to predict a response time. estimating a metric, such as the response time, allows the infrastructure to adjust to issues such that requests better satisfy quality of service requirements.


20240111607.SIMILARITY-BASED QUANTIZATION SELECTION FOR FEDERATED LEARNING WITH HETEROGENEOUS EDGE DEVICES_simplified_abstract_(dell products l.p.)

Inventor(s): Pablo Nascimento da Silva of Niteroi (BR) for dell products l.p., Vinicius Michel Gottin of Rio de Janeiro (BR) for dell products l.p., Paulo Abelha Ferreira of Rio de Janeiro (BR) for dell products l.p.

IPC Code(s): G06F9/50, G06F9/38



Abstract: one example method includes receiving, by a central node, respective data and statistics from each edge node in a group of edge nodes, performing, by the central node, a similarity-based clustering of the edge nodes so that different clusters of edge nodes are defined, sampling, by the central node, edge nodes from each of the clusters to perform a quantization selection method, receiving, by the central node, from the sampled edge nodes, a respective indication of a best-performing quantization method, and electing, by the central node, a quantization method to be used by all the edge nodes.


20240111630.SYSTEMS AND METHODS FOR CONSISTENCY GROUP BASED SELF HEALING_simplified_abstract_(dell products l.p.)

Inventor(s): Gururaj Kulkarni of Bangalore (IN) for dell products l.p., Shelesh Chopra of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F11/14, G06F9/54, H04L41/0897



Abstract: one example method includes, within a microservice architecture: (i) obtaining, via a monitor engine, a resource utilization associated with a set of parameters for each microservice within a consistency group, wherein each microservice within the consistency group is associated with a particular distributed operation, and wherein the consistency group defines, for each microservice within the consistency group, one or more threshold values associated with each parameter of the set of parameters, (ii) determining, via an analytical engine, whether resource utilization satisfies a particular threshold of the one or more threshold values associated with a particular parameter of the set of parameters for a particular microservice within the consistency group, and (iii) based upon resource utilization satisfying the particular threshold of the particular parameter for the particular microservice within the consistency group, implementing a self-healing process to selectively modify resource allocation for one or more microservices within the consistency group.


20240111631.VALUE-DRIVEN PRIORITIZATION OF BACKUPS THROUGH TIME-LIMITED AIRGAP_simplified_abstract_(dell products l.p.)

Inventor(s): Ofir Ezrielev of Beer Sheva (IL) for dell products l.p., Jehuda Shemer of Kfar Saba (IL) for dell products l.p., Amihai Savir of Newton MA (US) for dell products l.p.

IPC Code(s): G06F11/14



Abstract: one example method includes assigning, at a production site, a priority to a portion of a dataset to be backed up, checking to determine if the priority meets or exceeds a threshold priority; and, when the priority meets or exceeds the threshold priority, and when an air gap between the production site and a storage vault is closed, backing up, by way of the closed air gap, the portion of the dataset to the storage vault.


20240111633.META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil Yadav of Bangalore (IN) for dell products l.p., Shelesh Chopra of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F11/14, G06F11/32



Abstract: in general, one or more embodiments of the invention relates to systems and methods for performing a backup and later determining a level or percentage of corruption of the resulting backup set. by having a cyber-security module analyze the backup data periodically, corruption of backup data both caused by cyber-attacks or by hardware failures may be detected and characterized. by knowing how corrupted a particular corrupted backup data set is, an informed decision may be made with regards to purging the backup data set and/or using the backup data set or portion thereof in any further restorations. by making these determinations, a quick identification of possible ransomware attacks may be made, and additional degradation of a user's data may be avoided.


20240111635.APPLICATION-CENTRIC CYBER RECOVERY_simplified_abstract_(dell products l.p.)

Inventor(s): Ofir Ezrielev of Beer Sheva (IL) for dell products l.p., Jehuda Shemer of Kfar Saba (IL) for dell products l.p., Amihai Savir of Newton MA (US) for dell products l.p.

IPC Code(s): G06F11/14



Abstract: one method includes listening, by a storage vault, to a port that is specific to a particular data structure in the storage vault, determining that an air gap between the storage vault and an entity external to the storage vault, is closed, such that communication between the storage vault and the external entity, by way of the port, is enabled, signaling, by the storage vault to the external entity, that the air gap is closed, and receiving, at the storage vault by way of the port, data from the external entity.


20240111636.ENABLING RECOVERY OF CORRUPTED BACKUPS USING BACKUP COPIES_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil Yadav of Bangalore (IN) for dell products l.p., Shelesh Chopra of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F11/14



Abstract: embodiments of the invention relate to generating backups of assets. more specifically, in one or more embodiments of the invention, multiple copies of a backup are stored in separate locations. the copies may then be used to perform a restoration when one of the copies is corrupted. if all copies are corrupted the invention allows for partial restoration of those portions of the copies that are not corrupted. by using copies, embodiments of the invention allow the backups to be more resilient to attacks and system failures.


20240111637.SMART RESTORATION FOR UNAVAILABLE DATA USING META-DATA_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil Yadav of Bangalore (IN) for dell products l.p., Aaditya Rakesh Bansal of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F11/14



Abstract: embodiments of the invention relate to methods and systems that improve the operation of one or more computing devices by allowing backups and restorations to be performed on files and folders that are normally unavailable for normal restoration. by utilizing the backup's meta-data, a backup agent can receive an indication that a file or folder is not available and take appropriate actions so that the files and folders that are normally not available can be properly restored. making it possible to efficiently perform a backup of a file-system that can be restored even when files and/or folders are normally unavailable to be restored normally.


20240111649.MULTI-TIER HEAT MAPS_simplified_abstract_(dell products l.p.)

Inventor(s): Shuyu Lee of Acton MA (US) for dell products l.p., Vamsi K. Vankamamidi of Hopkinton MA (US) for dell products l.p.

IPC Code(s): G06F11/30, G06F11/07



Abstract: techniques for providing multi-tier heat maps in a storage system. the techniques include obtaining a temperature of a storage object using a first heat map of data io activity at a storage object level of the data, and determining that the temperature of the storage object exceeds a predetermined threshold. the techniques further include, in response to determining that the temperature of the storage object exceeds the predetermined threshold, obtaining at least one temperature of at least one storage element associated with the storage object using a second heat map of data io activity at a storage element level of the data, and performing a storage operation on the storage object based on the temperature of the storage object and/or the temperature of the storage element. such use of multi-tier heat maps allow accurate temperature predictions to be made in a manner that conserves and adapts to available system resources.


20240111662.ASCERTAINING APPLICATION TEST COVERAGE_simplified_abstract_(dell products l.p.)

Inventor(s): Ishay Zekri of Kfar Yona (IL) for dell products l.p., Lev Faiman of Netanya (IL) for dell products l.p., Amit Ramraz of Hod Hasharon (IL) for dell products l.p.

IPC Code(s): G06F11/36



Abstract: a technique is directed to ascertaining application test coverage. the technique involves receiving a command to test an application having a set of unmarked sections and a set of marked sections. the command includes a selection parameter that requests at least one of unmarked section coverage results and marked section coverage results. the technique further involves running a test procedure that operates the application to generate section coverage data. the technique further involves, after running the test procedure, generating application coverage results from the section coverage data. the application coverage results describes test procedure coverage of at least one of the set of unmarked sections of the application and the set of marked sections of the application based on the selection parameter of the command.


20240111705.SYSTEM AND METHOD FOR SUPPORTING COMMUNICATIONS BETWEEN MANAGEMENT CONTROLLERS AND DEVICES_simplified_abstract_(dell products l.p.)

Inventor(s): JONATHAN FOSTER LEWIS of Round Rock TX (US) for dell products l.p., FLORENCE GILBERTE DORSEY of Round Rock TX (US) for dell products l.p.

IPC Code(s): G06F13/40, G06F8/65



Abstract: methods and systems for managing the operation of data processing systems are disclosed. to manage the operation of data processing systems, a management controller hosted by a data processing system may communicate with other components of the data processing system via sideband communications. to facilitate sideband communications between the management controller and other devices, the data processing system may include a sideband communication system. the sideband communication system may facilitate sideband communications between devices over large distances and/or under conditions that may otherwise render the sideband communications infeasible.


20240111715.ATTRIBUTE BASED ASSET DISCOVERY FOR INTELLIGENT PROTECTION_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil Yadav of Bangalore (IN) for dell products l.p., Aaditya Rakesh Bansal of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F16/16, G06F16/11



Abstract: embodiments of the invention relate to methods and systems for backing up user defined logical assets. in accordance with one or more embodiments, a user may define a logical asset type prior to a backup being performed. the user may define the logical asset type based on any rules, filters, or attributes of files and/or folders stored in a file system. once the user has defined the asset type, the system may utilize file-system meta-data to quickly ascertain which files and folders meet the definition of the logical asset type, allowing for the backup of the user defined asset to be performed with minimal additional workload by the production hosts, clients, backup agents, and other associated components of the system.


20240111720.CONTINUOUS NAMESPACE VERIFICATION FOR CLUSTER FILESYSTEMS_simplified_abstract_(dell products l.p.)

Inventor(s): Shashikanth Lakshmikantha of San Jose CA (US) for dell products l.p., Charles J. Hickey of Aptos CA (US) for dell products l.p., Murthy V. Mamidi of Queen Creek AZ (US) for dell products l.p.

IPC Code(s): G06F16/16, G06F16/11, G06F16/185



Abstract: embodiments for providing adaptive namespace verification with high efficiency. the verification process is used in modern filesystems to check the integrity of key data structures, such for backup systems where providing thorough and efficient mechanisms for verification is critical. embodiments accelerate the verification process by selectively applying continuous, differential, and integral verification techniques for startup and runtime repair purposes to overcome present problems for system capacities that exceed the petabyte range and impose significant time requirements using existing verification methods. embodiments work with both single-node and distributed filesystems.


20240111724.REPURPOSING PREVIOUS SLICING ARTIFACTS FOR A NEW SLICING FOR CONTROLLABLE AND DYNAMIC SLICE SIZE AND REDUCING THE IN-MEMORY FOOTPRINT FOR LARGER SHARES HAVING BILLIONS OF FILES_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil K. Yadav of Bangalore (IN) for dell products l.p., Soumen Acharya of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F16/16, G06F16/14, G06F16/182



Abstract: one example method includes, in response to completion of a portion of a crawling process performed in a filesystem, instantiating a slice creation process, receiving slicing criteria concerning the slice creation process, slicing filesystem data to create slices according to the slicing criteria, and servicing a query by returning a list that lists one or more of the slices. the slicing criteria may include a specified number of slices and/or a specified size for the slices.


20240111725.INTELLIGENT SLICING OF ASSETS FOR EFFICIENT TRANSFER_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil Yadav of Bangalore (IN) for dell products l.p., Shelesh Chopra of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F16/16, G06F11/14



Abstract: embodiments of the invention relate to methods and systems for efficiently sharing assets such as files and folders in the form of slices. assets are shared or transferred between a host computer system and a target computer system such as a client computer system. in one or more embodiments, assets such as files and folders that are to be shared or transferred are placed in appropriate network slice queues by the hosts in such a manner that each slice has a size that is the same as the others within a predetermined tolerance. this ensures efficient use of network resources when sharing or transferring the files, while minimizing the amount of work the hosts and/or clients must perform.


20240111726.CONTINUOUS NAMESPACE VERIFICATION FOR SINGLE-NODE FILESYSTEMS_simplified_abstract_(dell products l.p.)

Inventor(s): Shashikanth Lakshmikantha of San Jose CA (US) for dell products l.p., Charles J. Hickey of Aptos CA (US) for dell products l.p., Murthy V. Mamidi of Queen Creek AZ (US) for dell products l.p.

IPC Code(s): G06F16/17



Abstract: embodiments for providing adaptive namespace verification with high efficiency. the verification process is used in modern filesystems to check the integrity of key data structures, such for backup systems where providing thorough and efficient mechanisms for verification is critical. embodiments accelerate the verification process by selectively applying continuous, differential, and integral verification techniques for startup and runtime repair purposes to overcome present problems for system capacities that exceed the petabyte range and impose significant time requirements using existing verification methods. embodiments work with both single-node and distributed filesystems.


20240111727.ADAPTIVE NAMESPACE VERIFICATION FOR CLUSTER FILESYSTEMS_simplified_abstract_(dell products l.p.)

Inventor(s): Charles J. Hickey of Aptos CA (US) for dell products l.p., Shashikanth Lakshmikantha of San Jose CA (US) for dell products l.p., Murthy V. Mamidi of Queen Creek AZ (US) for dell products l.p.

IPC Code(s): G06F16/17, G06F16/11



Abstract: embodiments for providing adaptive namespace verification with high efficiency. the verification process is used in modern filesystems to check the integrity of key data structures, such for backup systems where providing thorough and efficient mechanisms for verification is critical. embodiments accelerate the verification process by selectively applying continuous, differential, and integral verification techniques for startup and runtime repair purposes to overcome present problems for system capacities that exceed the petabyte range and impose significant time requirements using existing verification methods. embodiments work with both single-node and distributed filesystems.


20240111728.ADAPTIVE NAMESPACE VERIFICATION FOR SINGLE-NODE FILESYSTEMS_simplified_abstract_(dell products l.p.)

Inventor(s): Charles J. Hickey of Aptos CA (US) for dell products l.p., Shashikanth Lakshmikantha of San Jose CA (US) for dell products l.p., Murthy V. Mamidi of Queen Creek AZ (US) for dell products l.p.

IPC Code(s): G06F16/17, G06F16/16, G06F16/172



Abstract: embodiments for providing adaptive namespace verification with high efficiency. the verification process is used in modern filesystems to check the integrity of key data structures, such for backup systems where providing thorough and efficient mechanisms for verification is critical. embodiments accelerate the verification process by selectively applying continuous, differential, and integral verification techniques for startup and runtime repair purposes to overcome present problems for system capacities that exceed the petabyte range and impose significant time requirements using existing verification methods. embodiments work with both single-node and distributed filesystems.


20240111732.CRAWLER-LESS TIERING FOR CLOUD BASED FILE SYSTEMS_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil Yadav of Bangalore (IN) for dell products l.p., Shelesh Chopra of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F16/185, G06F16/182



Abstract: in accordance with one or more embodiments of the invention, a method is provided for re-tiering files and folders located in a cloud-based file system without crawling all the files and folders in the cloud-based file system. the method utilizes the meta-data for the files and folders to determine, based upon provided rules, which tier a file or folder should be assigned to. by utilizing the meta-data, the use of expensive cloud resources may be minimized when there is a need for re-tiering the files and folders into appropriate cloud tiers.


20240111740.DETERMINING DIFFERENCES BETWEEN WEB ELEMENTS OF DIFFERENT VERSIONS OF A WEB APPLICATION_simplified_abstract_(dell products l.p.)

Inventor(s): Abhishek Mishra of Bangalore (IN) for dell products l.p., Anusha N of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F16/21, G06F16/22, G06F16/81



Abstract: an apparatus comprises a processing device configured to select first and second versions of at least a given portion of a web application, to obtain first and second document object model structures of the first and second versions of the given portion of the web application, and to generate, based at least in part on the first and second document object model structures, first and second tree structures, the first and second tree structures comprising nodes representing web elements of the given portion of the web application. the processing device is also configured to identify node differences between the first and second tree structures, to generate information characterizing differences between web elements in the given portion of the first and second versions of the web application, and to initiate automated action based at least in part on the generated information.


20240111752.METHOD FOR LINEAGE SAMPLING TO EFFICIENTLY DETECT CORRUPTIONS_simplified_abstract_(dell products l.p.)

Inventor(s): Nitin Madan of Cupertino CA (US) for dell products l.p., Bhimsen Bhanjois of Fremont CA (US) for dell products l.p., Kiran Kumar Malle Gowda of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F16/23, G06F11/14



Abstract: corruption detection in backups is disclosed. backups that are received into a backup environment are stored in corresponding lineages. a detection engine is configured to perform corruption detection operations on the most recent backups in each of the lineages based on a sample frequency. corruption detection operations may also be performed randomly and based on unexpected or unusual changes in backup metadata.


20240111810.DATA READ METHOD, DATA UPDATE METHOD, ELECTRONIC DEVICE, AND PROGRAM PRODUCT_simplified_abstract_(dell products l.p.)

Inventor(s): Xiao Le Shang of Shanghai (CN) for dell products l.p., Xia Wang of Shanghai (CN) for dell products l.p., Xiangdong Huang of Shanghai (CN) for dell products l.p., Wesley Wei Sun of Shanghai (CN) for dell products l.p., Young Yangchun Wu of Shanghai (CN) for dell products l.p., Xin Li of Shanghai (CN) for dell products l.p.

IPC Code(s): G06F16/901, H04L41/14



Abstract: data reads and related data reading processes are described. an example data read method includes: receiving a data read request, the data read request being aimed at target node data stored in a target node of a b+ tree; acquiring node location information, the node location information indicating a storage location of node data in a node data set of the b+ tree, and the node data set including the target node data; and determining a target storage location of the target node data. beneficially, data stored in the b+ tree can be read and updated efficiently while reducing computing overhead.


20240111836.METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR DATA PROCESSING_simplified_abstract_(dell products l.p.)

Inventor(s): Xia Wang of Shanghai (CN) for dell products l.p., Xiao Le Shang of Shanghai (CN) for dell products l.p., Wesley Wei Sun of Shanghai (CN) for dell products l.p., Young Yangchun Wu of Shanghai (CN) for dell products l.p., Xiangdong Huang of Shanghai (CN) for dell products l.p., Xin Li of Shanghai (CN) for dell products l.p.

IPC Code(s): G06F18/2413, G06F16/21



Abstract: data processing is disclosed in various aspects. for instance, an example method includes acquiring a plurality of objects with a sortable schema, the sortable schema specifying at least one field of the plurality of objects; determining metadata, sortable data, and non-sortable data of the plurality of objects on the basis of a value of the at least one field of the plurality of objects; and generating a serialized representation of the plurality of objects on the basis of the metadata, the sortable data, and the non-sortable data. by the method, one group of objects is converted into a serialized representation with sortable information, so that efficient object searching can be achieved without relying on an additional comparator.


20240111855.DEVICE PROTECTION USING PRE-EXECUTION COMMAND INTERCEPTION AND EVALUATION_simplified_abstract_(dell products l.p.)

Inventor(s): Tomer Shachar of Beer Sheva (IL) for dell products l.p., Maxim Balin of Gan-Yavne (IL) for dell products l.p., Yevgeni Gehtman of Modi'in (IL) for dell products l.p.

IPC Code(s): G06F21/44



Abstract: techniques are provided for device protection using pre-execution command interception and evaluation. one method comprises obtaining, by a software entity associated with an operating system kernel of a device, a command from a user prior to an execution of the command; providing, by the software entity associated with the operating system kernel, a request to an approval entity to evaluate whether to execute the command; and initiating the execution of the command based on a result of the evaluation, by the approval entity, of whether to execute the command. the approval entity may be identified by accessing a registry of one or more users that are authorized to provide an authorization to execute the command. the evaluation of whether to execute the command may comprise one or more tasks specified by a policy.


20240111861.USING BACKUP META-DATA AND ANALYTICS FOR DETECTING CYBER-ATTACKS_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil Yadav of Bangalore (IN) for dell products l.p., Shelesh Chopra of Bangalore (IN) for dell products l.p.

IPC Code(s): G06F21/55



Abstract: embodiments of the invention relate to generating backups of assets. more specifically, in one or more embodiments of the invention, the meta-data generated during the backups is leveraged for detecting cyber-attacks by leveraging backup meta-data, to reduce the amount of data that needs to be scanned by a cyber-security module to detect a cyber-attack, such as a ransomware attack. this allows any attacks to be detected earlier and reduce processing by leveraging the periodic backups that are performed as part of data protection, to detect when an attack has or is occurring. by making these determinations, a quick identification of possible ransomware attacks may be made and other methods of mitigating the attack may be deployed when the method of mitigating the attack might still be useful to mitigate potential damage to a user's data.


20240111863.USING SNAPSHOTS FOR ANOMALY DETECTION_simplified_abstract_(dell products l.p.)

Inventor(s): Arieh Don of Newton MA (US) for dell products l.p., Michael Ferrari of Douglas MA (US) for dell products l.p., Benjamin Randolph of Uxbridge MA (US) for dell products l.p.

IPC Code(s): G06F21/56



Abstract: a profile of characteristics of a normal snapshot of a storage object is computed from previous snapshots of the storage object. characteristics of a new snapshot are compared with the characteristics in the profile to identify an anomaly indicative of a malicious attack. the characteristics include percent data changed between consecutive snapshots, write lba dispersion, write data reducibility, number and size of writes, write workload profile, and write content profile. the new snapshot is only vaulted or air-gapped if all its characteristics are within ranges defined by the profile.


20240111865.CYBER RECOVERY FORENSICS KIT CONFIGURED TO SEND RETURN MALWARE_simplified_abstract_(dell products l.p.)

Inventor(s): Ofir Ezrielev of Be'er Sheba (IL) for dell products l.p., Jehuda Shemer of Kfar Saba (IL) for dell products l.p., Amihai Savir of Newton MA (US) for dell products l.p.

IPC Code(s): G06F21/56



Abstract: data protection including malware response operations are disclosed. when a production system is attacked, the malware is allowed to run in a forensic environment in order to learn its operational characteristics. once learned, a return malware can be placed in the data. the return malware is transmitted to a malware host system by the malware itself and executed.


20240111866.A CYBER RECOVERY FORENSICS KIT CONFIGURED TO MAINTAIN COMMUNICATION AND SEND RETURN MALWARE_simplified_abstract_(dell products l.p.)

Inventor(s): Ofir Ezrielev of Be'er Sheba (IL) for dell products l.p., Jehuda Shemer of Kfar Saba (IL) for dell products l.p., Amihai Savir of Newton MA (US) for dell products l.p.

IPC Code(s): G06F21/56, G06F21/55



Abstract: data protection including malware response operations are disclosed. when a production system is attacked, the malware is allowed to run in a forensic environment in order to learn its operational characteristics. the forensic environment includes a working scenario that may be prepared in advance with false data that allows the malware to communicate with a malware host system. once the operational characteristics are learned, a return malware can be placed in the data. the return malware is transmitted to a malware host system by the malware itself and executed.


20240111867.CYBER RECOVERY FORENSICS KIT - EXPERIMENTATION AUTOMATION_simplified_abstract_(dell products l.p.)

Inventor(s): Ofir Ezrielev of Be'er Sheba (IL) for dell products l.p., Jehuda Shemer of Kfar Saba (IL) for dell products l.p., Amihai Savir of Newton MA (US) for dell products l.p.

IPC Code(s): G06F21/56, G06F21/53



Abstract: automated research experimentation on malware is disclosed. when malware is detected, an infected backup is generated. the infected backup is deployed to multiple working environments as recovered production systems, starting from the same state. different scenarios are performed on the recovered production systems to learn the operational characteristics of the malware operating in the recovered production systems. the insights may be used to protect against the malware and/or other malware.


20240111868.DELAYED INFERENCE ATTACK DETECTION FOR IMAGE SEGMENTATION-BASED VIDEO SURVEILLANCE APPLICATIONS_simplified_abstract_(dell products l.p.)

Inventor(s): Pablo Nascimento da Silva of Niterói (BR) for dell products l.p., Hugo de Oliveira Barbalho of Rio de Janeiro (BR) for dell products l.p., Roberto Nery Stelling Neto of Rio de Janeiro (BR) for dell products l.p.

IPC Code(s): G06F21/56, G06F21/55, G06V10/764, G06V10/776, G06V20/40, G06V20/52



Abstract: one example method includes dynamically monitoring a stream of image portions that have been classified by a segmentation model of a video surveillance system, evaluating the image portions, based on the evaluating, determining that an attack on the video surveillance system is occurring, or has occurred, and implementing, or causing the implementation of, a remedial action with regard to the attack. the image portions may be image portions that have been classified by a segmentation model.


20240111902.DEFENSE AGAINST XAI ADVERSARIAL ATTACKS BY DETECTION OF COMPUTATIONAL RESOURCE FOOTPRINTS_simplified_abstract_(dell products l.p.)

Inventor(s): Iam Palatnik de Sousa of Rio de Janeiro (BR) for dell products l.p., Adriana Bechara Prado of Niteroi (BR) for dell products l.p.

IPC Code(s): G06F21/64, G06F21/57



Abstract: one example method includes initiating an audit of a machine learning model, providing input data to the machine learning model as part of the audit, while the audit is running, receiving information regarding operation of the machine learning model, wherein the information comprises a computational resource footprint, analyzing the computational resource footprint, and determining, based on the analyzing, that the computational resource footprint is characteristic of an adversarial attack on the machine learning model.


20240111903.DETECTING CLIENT ISOLATION ATTACKS IN FEDERATED LEARNING THROUGH OVERFITTING MONITORING_simplified_abstract_(dell products l.p.)

Inventor(s): Maira Beatriz Hernandez Moran of Rio de Janeriro (BR) for dell products l.p., Paulo Abelha Ferreira of Rio de Janeiro (BR) for dell products l.p., Pablo Nascimento da Silva of Niteroi (BR) for dell products l.p.

IPC Code(s): G06F21/64, G06N20/00



Abstract: one example method includes receiving at a client node of a federation a global machine-learning model that is to be trained by the client node using a training dataset that is local to the client node. in response to receiving the global machine-learning model, determining at the client node if the global machine-learning model is trending toward an overfitted state using a validation dataset. the overfitted state indicates that the global machine-learning model has not been received from a server that is part of the federation because of a client isolation attack. in response to determining that the global machine-learning model is trending towards the overfitting state, causing the client node to leave the federation. in response to determining that the global machine-learning model is not trending towards the overfitted state, training the global machine-learning model using the training dataset to thereby update the global machine-learning model.


20240112070.DRIFT MODE ACQUISITION USING SUCCESSIVE MODEL TRAINING_simplified_abstract_(dell products l.p.)

Inventor(s): Herberth Birck Fröhlich of Florianópolis (BR) for dell products l.p., Vinicius Michel Gottin of Rio de Janeiro (BR) for dell products l.p.

IPC Code(s): G06N20/00, G06K9/62, G06N5/04



Abstract: one example method includes defining a time window during which a drift mode of a machine learning model will be evaluated, and the time window begins at t, training, beginning at the time t, a reduced reference model rwith a data sample dthat is a subset of a training dataset that was used to train the machine learning model; for ‘n’ iterations: at a time t, when new data samples dare available, train a new version rof the reduced reference model r; after ris trained, collect data v; and compare respective inference values generated by the reduced reference model rand r, using the data samples dand v, and store an absolute difference between the inference values; defining a drift mode curve using the absolute differences; and based on the drift mode curve, determining a drift mode of the machine learning model.


20240113352.SYSTEMS AND METHODS FOR HEATING BATTERY IN LOW-TEMPERATURE ENVIRONMENTS_simplified_abstract_(dell products l.p.)

Inventor(s): Tsz LEUNG of New Taipei City (TW) for dell products l.p., Chia Fa CHANG of New Taipei City (TW) for dell products l.p., Jui Chin FANG of Taipei City (TW) for dell products l.p., John R. LERMA of Cedar Park TX (US) for dell products l.p., Wen-Yung CHANG of Taoyuan City (TW) for dell products l.p.

IPC Code(s): H01M10/615, H01M10/0525, H01M10/48, H01M10/63, H01M10/657



Abstract: an information handling system may include one or more information handling resources, a main battery configured to power the one or more information handling resources, a heater thermally coupled to the main battery, a supportive battery configured to power the heater, and a control unit communicatively coupled to the supportive battery and configured to control the supportive battery and the heater to heat the main battery.


20240113791.Power Detection in the Time Domain on a Periodic Basis with Statistical Counters_simplified_abstract_(dell products l.p.)

Inventor(s): John Bradley Deforge of Chelsea (CA) for dell products l.p., Sewvanda Don of Ottawa (CA) for dell products l.p., Tommy Ivarsson of Ottawa (CA) for dell products l.p.

IPC Code(s): H04B17/18, H04B17/29



Abstract: technology described herein can gather and statistically analyze time domain power data for enabling real-time adjustment of one or more parameters of a radio system. in an embodiment, a system can comprise a processor and a read circuit communicatively coupled to the processor, wherein the processor controls the read circuit to read power data in a time domain from a radio system, and an analysis component communicatively coupled to the processor, wherein the analysis component compares the power data in the time domain to a power threshold, and wherein, based on a result of the power data being compared to the power threshold, the analysis component sorts the power data into bins at a storage component communicatively coupled to the processor.


20240113946.TARGETED SERVICE LEVEL RESPONSE TIME MANAGEMENT_simplified_abstract_(dell products l.p.)

Inventor(s): John Creed of Innishannon (IE) for dell products l.p., Arieh Don of Newton MA (US) for dell products l.p., John Krasner of Coventry RI (US) for dell products l.p.

IPC Code(s): H04L41/5009, H04L41/0604



Abstract: the cause of a failure to satisfy a high priority service level objective of a storage object or storage group is localized within a storage array. storage objects that have been assigned low priority service level objectives are analyzed to determine whether their performance paths overlap with the performance path of the high priority service level objective storage object or storage group at the location of the cause of the failure. the low priority service level objective storage objects having performance paths that overlap with the performance path of the high priority service level objective storage object or storage group at the location of the cause of the failure are targeted for io data rate reduction in order to free resources to restore compliance with the high priority service level objective. the other low priority service level objective storage objects are not targeted.


20240114072.OFFLOAD INEFFICIENT SLICING FROM CLIENTS TO THE SERVERS_simplified_abstract_(dell products l.p.)

Inventor(s): Sunil Yadav of Bangalore (IN) for dell products l.p., Shelesh Chopra of Bangalore (IN) for dell products l.p.

IPC Code(s): H04L67/1097, G06F16/172, G06F16/176



Abstract: embodiments of the invention relate to methods and systems for efficiently sharing assets such as files and folders between a host computer system and a client computer system while minimizing the amount of work the client must perform to efficiently transfer an asset. in one or more embodiments, assets such as files and folders that are to be shared or transferred are placed in appropriate network slice queues by the hosts rather than the clients. these network slice queues allow the files and folders to be placed in slices without utilizing the resources of the clients as well as much of the available network resources. this ensures efficient use of network resources, while minimizing the amount of work the hosts and/or clients must perform in order to perform a backup.


20240114279.INFORMATION HANDLING SYSTEM WITH AN INTEGRATED WIRELESS CHARGER_simplified_abstract_(dell products l.p.)

Inventor(s): Jonathan C. Giffen of Austin TX (US) for dell products l.p., Gregory L. Henderson of Round Rock TX (US) for dell products l.p., Mikaela M. Noe of Wimberley TX (US) for dell products l.p., Stefanie Marie Thompson of Brownsville TX (US) for dell products l.p.

IPC Code(s): H04R1/10, H02J50/00, H02J50/10, H02J50/40



Abstract: a wireless charger inductively charges devices of various shapes and/or types, such as with multiple bend radii. smartphones, headphones, key fobs, and other wireless devices may be laid atop the wireless charger. the wireless charger has flexible and pliable features that conform to the shape of the wireless device. the flexible and pliable features maintain a conformal relationship with the wireless device laid atop the wireless charger. the flexible and pliable features increase the efficiency of inductive power transfer and can reduce charge times and/or reduce heat generated due to thermal losses.


Dell Products L.P. patent applications on April 4th, 2024