Patents by Inventor Andrew George Peake

Andrew George Peake has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10841376
    Abstract: A method begins by one or more processing modules of one or more computing devices of a dispersed storage network (DSN) receiving a delete data request for a data object of a set of data objects, where each data object of the set of data objects has substantially identical data to other data objects of the set of data objects and where only one plurality of sets of encoded data slices corresponding to one data object of the set of data objects is stored in memory of the DSN. The method continues with the one or more processing modules determining whether the data object is associated with a data ID and when the data object is associated with a data ID, identifying linking information associated with the data object. Linking information is updated to indicate that the set of data objects includes one fewer copy of the data object and then it is determined whether the Data ID is associated with a link-object and when the Data ID is associated with a link-object the link-object is deleted from the DSN memory.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: November 17, 2020
    Assignee: PURE STORAGE, INC.
    Inventor: Andrew George Peake
  • Patent number: 10686880
    Abstract: A dispersed storage and task (DST) processing unit receives a data access request corresponding to a data segment. Range availability information is obtained for a plurality of DST execution units of the DST network. A subset of the plurality of DST execution units is selected based on the range availability information and a threshold number corresponding to the data access request. Execution unit access requests are generated and sent to the subset of the plurality of DST execution units corresponding to a plurality of slices of the data segment, wherein the execution unit access requests include address information that is based on the range availability information.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: June 16, 2020
    Assignee: PURE STORAGE, INC.
    Inventors: Andrew George Peake, Jason K. Resch
  • Patent number: 9794337
    Abstract: A method begins by a dispersed storage (DS) processing module determining memory space utilization state of logical storage nodes of a dispersed storage network DSN. When a logical storage node is in an over-utilized memory space utilization state and another logical storage node is in an under-utilized memory space utilization state, the method continues with the DS processing module selecting the other logical storage node to produce a selected logical storage node and reassigning a portion of a DSN address range assigned to the selected logical storage node to a logical storage node that is in an average memory space utilization state to create an address free logical storage node. The method continues with the DS processing module reassigning address blocks assigned to the logical storage node that is in the over-utilized memory space utilization state to the address free logical storage node.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: October 17, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew George Peake, Jason K. Resch, Manish Motwani
  • Publication number: 20170147611
    Abstract: A method begins by one or more processing modules of one or more computing devices of a dispersed storage network (DSN) receiving a delete data request for a data object of a set of data objects, where each data object of the set of data objects has substantially identical data to other data objects of the set of data objects and where only one plurality of sets of encoded data slices corresponding to one data object of the set of data objects is stored in memory of the DSN. The method continues with the one or more processing modules determining whether the data object is associated with a data ID and when the data object is associated with a data ID, identifying linking information associated with the data object. Linking information is updated to indicate that the set of data objects includes one fewer copy of the data object and then it is determined whether the Data ID is associated with a link-object and when the Data ID is associated with a link-object the link-object is deleted from the DSN memory.
    Type: Application
    Filed: February 6, 2017
    Publication date: May 25, 2017
    Inventor: Andrew George Peake
  • Patent number: 9661074
    Abstract: A method begins by a dispersed storage (DS) processing module of a dispersed storage network (DSN) determining whether a change has occurred to a data object of a set of data objects. When a change has occurred, the method continues with the DS processing module accessing de-duplication tracking data for the set of data objects. When the change is deletion of an identified data object of the set of data objects, the method continues with the DS processing module determining whether the identified data object is the only data object in the set of data objects. When the identified data object is not the only data object in the set of data objects, the method continues with the DS processing module updating the linking information to delete linking the identified data object to addressing information.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: May 23, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONS
    Inventor: Andrew George Peake
  • Patent number: 9298542
    Abstract: A method begins by a dispersed storage (DS) processing module receiving a set of encoded data slices, where some of the encoded data slices have an integrity issue such that less than a decode threshold number of encoded data slices have valid integrity. The method continues with the DS processing module creating partial coded matrices from the set of encoded data slices and generating partial decoding matrices. The method continues with the DS processing module generating a test data matrix based on the partial coded matrices and the partial decoding matrices, encoding the test data matrix into a set of test encoded data slices, and generating integrity information for the set of test encoded data slices. When the integrity information is valid, the method continues with the DS processing module utilizing the test data matrix as a data matrix and converting the data matrix into a recovered data segment.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: March 29, 2016
    Assignee: CLEVERSAFE, INC.
    Inventors: Andrew George Peake, Jason K. Resch
  • Patent number: 9223723
    Abstract: A method begins by a dispersed storage (DS) processing module of a storage unit receiving, over time, access requests regarding reading or writing of various data blocks. The method continues with the DS processing module establishing an internal verification access rate for verifying data blocks stored in a memory device of the storage unit based on a rate of the access requests and a maximum access rate of the memory device. The method continues with the DS processing module generating internal verification requests in accordance with the internal verification access rate, coordinating the internal verification requests and the access requests for accessing the memory device, and accessing the memory device based on the internal verification requests to verify the data blocks.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: December 29, 2015
    Assignee: Cleversafe, Inc.
    Inventors: Andrew George Peake, Jason K. Resch, Ilya Volvovski
  • Publication number: 20150066875
    Abstract: A method begins by a dispersed storage (DS) processing module of a dispersed storage network (DSN) determining whether a change has occurred to a data object of a set of data objects. When a change has occurred, the method continues with the DS processing module accessing de-duplication tracking data for the set of data objects. When the change is deletion of an identified data object of the set of data objects, the method continues with the DS processing module determining whether the identified data object is the only data object in the set of data objects. When the identified data object is not the only data object in the set of data objects, the method continues with the DS processing module updating the linking information to delete linking the identified data object to addressing information.
    Type: Application
    Filed: June 30, 2014
    Publication date: March 5, 2015
    Applicant: CLEVERSAFE, INC.
    Inventor: Andrew George Peake
  • Publication number: 20150067100
    Abstract: A dispersed storage and task (DST) processing unit receives a data access request corresponding to a data segment. Range availability information is obtained for a plurality of DST execution units of the DST network. A subset of the plurality of DST execution units is selected based on the range availability information and a threshold number corresponding to the data access request. Execution unit access requests are generated and sent to the subset of the plurality of DST execution units corresponding to a plurality of slices of the data segment, wherein the execution unit access requests include address information that is based on the range availability information.
    Type: Application
    Filed: June 26, 2014
    Publication date: March 5, 2015
    Applicant: CLEVERSAFE, INC.
    Inventors: Andrew George Peake, Jason K. Resch
  • Publication number: 20140122925
    Abstract: A method begins by a dispersed storage (DS) processing module of a storage unit receiving, over time, access requests regarding reading or writing of various data blocks. The method continues with the DS processing module establishing an internal verification access rate for verifying data blocks stored in a memory device of the storage unit based on a rate of the access requests and a maximum access rate of the memory device. The method continues with the DS processing module generating internal verification requests in accordance with the internal verification access rate, coordinating the internal verification requests and the access requests for accessing the memory device, and accessing the memory device based on the internal verification requests to verify the data blocks.
    Type: Application
    Filed: September 16, 2013
    Publication date: May 1, 2014
    Applicant: CLEVERSAFE, INC.
    Inventors: Andrew George Peake, Jason K. Resch, Ilya Volvovski
  • Publication number: 20140122636
    Abstract: A method begins by a dispersed storage (DS) processing module determining memory space utilization state of logical storage nodes of a dispersed storage network DSN. When a logical storage node is in an over-utilized memory space utilization state and another logical storage node is in an under-utilized memory space utilization state, the method continues with the DS processing module selecting the other logical storage node to produce a selected logical storage node and reassigning a portion of a DSN address range assigned to the selected logical storage node to a logical storage node that is in an average memory space utilization state to create an address free logical storage node. The method continues with the DS processing module reassigning address blocks assigned to the logical storage node that is in the over-utilized memory space utilization state to the address free logical storage node.
    Type: Application
    Filed: September 17, 2013
    Publication date: May 1, 2014
    Applicant: Cleversafe, Inc.
    Inventors: Andrew George Peake, Jason K. Resch, Manish Motwani
  • Publication number: 20140122440
    Abstract: A method begins by a dispersed storage (DS) processing module receiving a set of encoded data slices, where some of the encoded data slices have an integrity issue such that less than a decode threshold number of encoded data slices have valid integrity. The method continues with the DS processing module creating partial coded matrices from the set of encoded data slices and generating partial decoding matrices. The method continues with the DS processing module generating a test data matrix based on the partial coded matrices and the partial decoding matrices, encoding the test data matrix into a set of test encoded data slices, and generating integrity information for the set of test encoded data slices. When the integrity information is valid, the method continues with the DS processing module utilizing the test data matrix as a data matrix and converting the data matrix into a recovered data segment.
    Type: Application
    Filed: September 16, 2013
    Publication date: May 1, 2014
    Applicant: CLEVERSAFE, INC.
    Inventors: Andrew George Peake, Jason K. Resch