Patents by Inventor Alex Veprinsky

Alex Veprinsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240405783
    Abstract: Example implementations relate to storing data in a storage system. An example includes receiving, by a storage controller of a storage system, a data unit to be stored in persistent storage of the storage system. The storage controller calculates multiple entropy values for the data unit. The storage controller selects, based on the multiple entropy values, at least one reduction operation from multiple different reduction operations. The storage controller performs the selected at least one reduction operation on the received data unit.
    Type: Application
    Filed: May 31, 2023
    Publication date: December 5, 2024
    Inventors: Robert Michael Lester, Matthew S. Gates, Alex Veprinsky
  • Patent number: 12093544
    Abstract: In some examples, a computer system computes a rate of operations that involves a first system, and classifies, using a classifier, a request for an operation. The computer system determines a relationship between the computed rate of operations and a dynamic threshold rate determined during a training phase, and based on the determined relationship and a classification of the request by the classifier, selectively activates or disables an operational feature of the first system.
    Type: Grant
    Filed: June 22, 2023
    Date of Patent: September 17, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sriram Narasimhan, Alex Veprinsky
  • Patent number: 12072844
    Abstract: Example implementations relate to storing data in a storage system. An example includes receiving, by a storage controller of a storage system, a data unit to be stored in persistent storage of the storage system. The storage controller determines maximum and minimum entropy values for the received data unit. The storage controller determines, based on at least the minimum entropy value and the maximum entropy value, whether the received data unit is viable for data reduction. In response to a determination that the received data unit is viable for data reduction, The storage controller performs at least one reduction operation on the received data unit.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: August 27, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Robert Michael Lester, Susan Agten, Matthew S. Gates, Alex Veprinsky
  • Patent number: 12061695
    Abstract: In some examples, a storage system creates a first copy of a data volume, and receives write requests having a specified characteristic from a host system, the write requests to write data of the data volume, where the storage system is to reject the write requests having the specified characteristic and to accept write requests without the specified characteristic. The storage system maintains metadata for the first copy of the data volume, the metadata indicating blocks of the data volume that have changed since the first copy of the data volume was created. The storage system determines, using the metadata, whether an unauthorized data encryption of the data of the data volume has occurred.
    Type: Grant
    Filed: April 28, 2022
    Date of Patent: August 13, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Joseph E. Algieri, Alex Veprinsky
  • Publication number: 20240143761
    Abstract: Example implementations relate to storing data in a storage system. An example includes accessing a first portion of a data stream to be stored in a storage system; selecting sample data blocks included in the first portion; determining entropy values based on the sample data blocks; selecting, based on the sample data blocks, a entropy threshold from multiple precalculated entropy thresholds; determining whether the generated set of entropy values matches the selected entropy threshold within a probability level; and in response to a determination that the generated set of entropy values matches the selected entropy threshold within the probability level, identifying the first portion of the data stream as potentially including encrypted data affected by a ransomware attack.
    Type: Application
    Filed: October 31, 2022
    Publication date: May 2, 2024
    Inventors: Alex Veprinsky, Gil Barash, Oded Kedem
  • Publication number: 20240037072
    Abstract: Example implementations relate to storing data in a storage system. An example includes receiving, by a storage controller of a storage system, a data unit to be stored in persistent storage of the storage system. The storage controller determines maximum and minimum entropy values for the received data unit. The storage controller determines, based on at least the minimum entropy value and the maximum entropy value, whether the received data unit is viable for data reduction. In response to a determination that the received data unit is viable for data reduction, The storage controller performs at least one reduction operation on the received data unit.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 1, 2024
    Inventors: Robert Michael Lester, Susan Agten, Matthew S. Gates, Alex Veprinsky
  • Patent number: 11853221
    Abstract: In some examples, a system dynamically adjusts a prefetching load with respect to a prefetch cache based on a measure of past utilizations of the prefetch cache, wherein the prefetching load is to prefetch data from storage into the prefetch cache.
    Type: Grant
    Filed: February 18, 2022
    Date of Patent: December 26, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Xiali He, Alex Veprinsky, Matthew S. Gates, William Michael McCormack, Susan Agten
  • Publication number: 20230367876
    Abstract: In some examples, a storage system intercepts a write request communicated over a network from a requester in a host system, the write request to write data of a data volume. The storage system determines whether the data of the write request matches a specified pattern. In response to determining that the data of the write request does not match the specified pattern, the storage system indicates that the write request from the requester in the host system has been corrupted by malware that has performed an unauthorized encryption on the data.
    Type: Application
    Filed: May 10, 2022
    Publication date: November 16, 2023
    Inventors: Joseph E. Algieri, Alex Veprinsky
  • Publication number: 20230351015
    Abstract: In some examples, a storage system creates a first copy of a data volume, and receives write requests having a specified characteristic from a host system, the write requests to write data of the data volume, where the storage system is to reject the write requests having the specified characteristic and to accept write requests without the specified characteristic. The storage system maintains metadata for the first copy of the data volume, the metadata indicating blocks of the data volume that have changed since the first copy of the data volume was created. The storage system determines, using the metadata, whether an unauthorized data encryption of the data of the data volume has occurred.
    Type: Application
    Filed: April 28, 2022
    Publication date: November 2, 2023
    Inventors: Joseph E. Algieri, Alex Veprinsky
  • Publication number: 20230333757
    Abstract: In some examples, a computer system computes a rate of operations that involves a first system, and classifies, using a classifier, a request for an operation. The computer system determines a relationship between the computed rate of operations and a dynamic threshold rate determined during a training phase, and based on the determined relationship and a classification of the request by the classifier, selectively activates or disables an operational feature of the first system.
    Type: Application
    Filed: June 22, 2023
    Publication date: October 19, 2023
    Inventors: Sriram Narasimhan, Alex Veprinsky
  • Publication number: 20230325257
    Abstract: In some examples, a system samples a subset of input/output (I/O) accesses of a storage, the I/O accesses being part of a workload. The system determines, based on the sampled subset of the I/O accesses, a first reuse distance distribution for a first time interval, determines a similarity measure representing a similarity of the first reuse distance distribution and a second reuse distance distribution for a second time interval different from the first time interval, and based on a change in the similarity measure, triggers a workload placement process to determine a placement of the workload on a compute node of a plurality of compute nodes.
    Type: Application
    Filed: April 11, 2022
    Publication date: October 12, 2023
    Inventors: Srikant Varadan, Alex Veprinsky, Anirudha Kumar
  • Publication number: 20230315526
    Abstract: Systems and methods are provided for lock-free thread scheduling. Threads may be placed in a ring buffer shared by all computer processing units (CPUs), e.g., in a node. A thread assigned to a CPU may be placed in the CPU's local run queue. However, when a CPU's local run queue is cleared, that CPU checks the shared ring buffer to determine if any threads are waiting to run on that CPU, and if so, the CPU pulls a batch of threads related to that ready-to-run thread to execute. If not, an idle CPU randomly selects another CPU to steak threads from, and the idle CPU attempts to dequeue a thread batch associated with the CPU from the shared ring buffer. Polling may be handled through the use of a shared poller array to dynamically distribute polling across multiple CPUs.
    Type: Application
    Filed: May 31, 2023
    Publication date: October 5, 2023
    Inventors: Matthew Gates, Joel E. Lilienkamp, Alex Veprinsky, Susan Agten
  • Publication number: 20230306108
    Abstract: In some examples, a system applies an inline detection of a write of data in a storage, the inline detection to detect potential data encryption of the data. In response to an indication of the potential data encryption, the system creates a first object that represents a first version of the data, and applies a further analysis to determine whether the potential data encryption constitutes unauthorized data encryption, the further analysis based on the first object and a second object that represents a second version of the data that is prior to the first version of the data.
    Type: Application
    Filed: March 22, 2022
    Publication date: September 28, 2023
    Inventors: Alex Veprinsky, Charles F. Clark, John Blumenthal, Ayman Abouelwafa
  • Publication number: 20230267077
    Abstract: In some examples, a system dynamically adjusts a prefetching load with respect to a prefetch cache based on a measure of past utilizations of the prefetch cache, wherein the prefetching load is to prefetch data from storage into the prefetch cache.
    Type: Application
    Filed: February 18, 2022
    Publication date: August 24, 2023
    Inventors: Xiali He, Alex Veprinsky, Matthew S. Gates, William Michael McCormack, Susan Agten
  • Patent number: 11698816
    Abstract: Systems and methods are provided for lock-free thread scheduling. Threads may be placed in a ring buffer shared by all computer processing units (CPUs), e.g., in a node. A thread assigned to a CPU may be placed in the CPU's local run queue. However, when a CPU's local run queue is cleared, that CPU checks the shared ring buffer to determine if any threads are waiting to run on that CPU, and if so, the CPU pulls a batch of threads related to that ready-to-run thread to execute. If not, an idle CPU randomly selects another CPU to steal threads from, and the idle CPU attempts to dequeue a thread batch associated with the CPU from the shared ring buffer. Polling may be handled through the use of a shared poller array to dynamically distribute polling across multiple CPUs.
    Type: Grant
    Filed: August 31, 2020
    Date of Patent: July 11, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Matthew S. Gates, Joel E. Lilienkamp, Alex Veprinsky, Susan Agten
  • Patent number: 11687258
    Abstract: In some examples, a computer system computes a rate of operations that involves a first system, and classifies, using a classifier, a request for an operation. The computer system determines a relationship between the computed rate of operations and a dynamic threshold rate determined during a training phase, and based on the determined relationship and a classification of the request by the classifier, selectively activates or disables an operational feature of the first system.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: June 27, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sriram Narasimhan, Alex Veprinsky
  • Publication number: 20230070722
    Abstract: In some examples, a computer system computes a rate of operations that involves a first system, and classifies, using a classifier, a request for an operation. The computer system determines a relationship between the computed rate of operations and a dynamic threshold rate determined during a training phase, and based on the determined relationship and a classification of the request by the classifier, selectively activates or disables an operational feature of the first system.
    Type: Application
    Filed: September 8, 2021
    Publication date: March 9, 2023
    Inventors: Sriram Narasimhan, Alex Veprinsky
  • Patent number: 11588924
    Abstract: In some examples, a system includes a Fibre Channel (FC) interface to communicate over an FC network, and a network stack including a network layer and a transport layer. Machine-readable instructions are executable to produce a command packet including a payload including data for transmission to another system, the payload further including headers for the network layer and the transport layer, where the command packet is according to a storage interface protocol. The FC interface is to communicate the command packet over the FC network.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: February 21, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sriram Narasimhan, Alex Veprinsky
  • Publication number: 20220374310
    Abstract: In some examples, a system receives a write request from a requester to write first data to a storage system that implements redundancy in which redundancy information is stored for data in the storage system. The system initiates the write to the storage system. The system determines that partial hardening for the first data has been achieved based on detecting that an information portion has been written to the storage system for the write request, the information portion being less than an entirety of the first data and the first parity information. In response to the determining of the partial hardening, the system notifies the requester of completion of the write request.
    Type: Application
    Filed: May 18, 2021
    Publication date: November 24, 2022
    Inventors: Alex Veprinsky, Matthew S. Gates, Lee L. Nelson
  • Publication number: 20220141320
    Abstract: In some examples, a system includes a Fibre Channel (FC) interface to communicate over an FC network, and a network stack including a network layer and a transport layer. Machine-readable instructions are executable to produce a command packet including a payload including data for transmission to another system, the payload further including headers for the network layer and the transport layer, where the command packet is according to a storage interface protocol. The FC interface is to communicate the command packet over the FC network.
    Type: Application
    Filed: October 29, 2020
    Publication date: May 5, 2022
    Inventors: Sriram Narasimhan, Alex Veprinsky