Patents by Inventor Bharti Soni

Bharti Soni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11803309
    Abstract: Described herein are techniques for managing replication in a data storage environment. The techniques including selectively compressing and selectively encrypting, by a production site, a set of files for replication from the production site to a remote site. Files can be selectively compressed based on a compression ratio satisfying a compression threshold, and files can be selectively encrypted based on a file content satisfying an encryption criteria. The techniques can further include updating, by the production site, metadata associated with selectively compressed files and updating metadata associated with selectively encrypted files. The techniques can further include replicating the set of files for replication from the production site to the remote site, the set of files for replication including the selectively compressed and the selectively encrypted files.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: October 31, 2023
    Assignee: International Business Machines Corporation
    Inventors: Komal Shailendra Shah, Bharti Soni, Subhojit Roy
  • Patent number: 11687492
    Abstract: Computer implemented methods for selective data deduplication in a multitenant environment are disclosed. Data deduplication of blocks written to a storage area associated with a tenant and redundant copies of the blocks written to other storage areas of other tenants is permitted or prevented based on tagging the first storage area associated with the tenant with a particular type of parameter. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is not permitted, a block to be written to the storage area is modified prior to hashing the block. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is permitted, a block to be written to the storage area is prevented from being modified prior to hashing the block.
    Type: Grant
    Filed: June 21, 2021
    Date of Patent: June 27, 2023
    Assignee: International Business Machines Corporation
    Inventors: Komal Shailendra Shah, Bharti Soni, Tej Parkash, Subhojit Roy
  • Publication number: 20230032090
    Abstract: Described are techniques including a computer-implemented method that comprises defining a respective priority classification for each of a plurality of sockets used for communicating between an initiator computational system and a target computational system. The method further comprises automatically assigning a respective priority classification to each of a plurality of Input/Output (IO) requests based on a type of data associated with each IO request. The method further comprises sending the plurality of IO requests to respective sockets of the plurality of sockets with a matching priority classification.
    Type: Application
    Filed: July 29, 2021
    Publication date: February 2, 2023
    Inventors: Bharti Soni, Komal Shailendra Shah, Tej Parkash, Subhojit Roy
  • Publication number: 20220405251
    Abstract: Computer implemented methods for selective data deduplication in a multitenant environment are disclosed. Data deduplication of blocks written to a storage area associated with a tenant and redundant copies of the blocks written to other storage areas of other tenants is permitted or prevented based on tagging the first storage area associated with the tenant with a particular type of parameter. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is not permitted, a block to be written to the storage area is modified prior to hashing the block. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is permitted, a block to be written to the storage area is prevented from being modified prior to hashing the block.
    Type: Application
    Filed: June 21, 2021
    Publication date: December 22, 2022
    Inventors: Komal Shailendra Shah, Bharti Soni, Tej Parkash, Subhojit Roy
  • Publication number: 20220405789
    Abstract: A computer-implemented method for dynamic storage pricing in a multitenant environment is disclosed. The computer-implemented method includes dynamically modifying a storage cost for one or more tenants pointing to a block written to a storage area of the multitenant environment based, at least in part, on detecting a change in a number of tenants pointing to the block.
    Type: Application
    Filed: June 21, 2021
    Publication date: December 22, 2022
    Inventors: Komal Shailendra Shah, Bharti Soni, Tej Parkash, Subhojit Roy
  • Patent number: 11474907
    Abstract: Apparatuses, methods, systems, and program products are disclosed for cluster configuration backup and recovery. One method includes receiving, by use of a processor, configuration data for a cluster. The method includes storing the configuration data for the cluster. The method also includes forming a machine-readable code that corresponds to the stored configuration data for the cluster. The machine-readable code may be used for restoring the stored configuration data to the cluster.
    Type: Grant
    Filed: August 1, 2018
    Date of Patent: October 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: Komal S. Shah, Shweta Kulkarni, Bharti Soni, Shrirang S. Bhagwat
  • Patent number: 11354204
    Abstract: Described herein are techniques for managing failover in a data center environment interconnected using an internet small computer systems interface (iSCSI) communication protocol, the techniques including receiving, at a host and from a kernel driver, an asynchronous message comprising an indication of a failed path associated with a first node having a first port, a list of internet protocol (IP) addresses associated with a plurality of failover paths including a first failover path associated with a second node having a second port, and an expiration. The techniques further including performing, by the host and before the expiration, a first input/output (I/O) operation on the second port associated with the second node. The techniques further including performing, by the host and after the expiration, a second I/O operation on the first port of the first node.
    Type: Grant
    Filed: June 3, 2019
    Date of Patent: June 7, 2022
    Assignee: International Business Machines Corporation
    Inventors: Komal Shailendra Shah, Bharti Soni, Shrirang Shrikant Bhagwat, Sourab Gupta
  • Patent number: 11200005
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving an unmap command, the unmap command identifying a first logical extent located in a higher storage tier of a multi-tiered data storage system having the higher storage tier and a lower storage tier, sending an instruction to unmap the first logical extent from the higher storage tier, sending an instruction to decrement a heat associated with the unmapped first logical extent in response to sending the instruction to unmap the first logical extent, sending an instruction to remove the unmapped first logical extent from the higher storage tier, selecting, using a heat map, at least one second logical extent located in the lower storage tier for promotion to the higher storage tier, and sending an instruction to relocate the at least one second logical extent from the lower storage tier to the higher storage tier.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: December 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Kushal S. Patel, Sarvesh S. Patel, Subhojit Roy, Bharti Soni
  • Publication number: 20210011637
    Abstract: Described herein are techniques for managing replication in a data storage environment. The techniques including selectively compressing and selectively encrypting, by a production site, a set of files for replication from the production site to a remote site. Files can be selectively compressed based on a compression ratio satisfying a compression threshold, and files can be selectively encrypted based on a file content satisfying an encryption criteria. The techniques can further include updating, by the production site, metadata associated with selectively compressed files and updating metadata associated with selectively encrypted files. The techniques can further include replicating the set of files for replication from the production site to the remote site, the set of files for replication including the selectively compressed and the selectively encrypted files.
    Type: Application
    Filed: July 9, 2019
    Publication date: January 14, 2021
    Inventors: Komal Shailendra Shah, Bharti Soni, Subhojit Roy
  • Patent number: 10891064
    Abstract: Embodiments for optimizing connectivity in a storage system by a processor. A preferred connectivity path may be determined between a host and a storage controller via one or more selected nodes, one or more storage virtualization systems, or combination thereof. A current connectivity path between the host and the storage controller may be determined to fail to match the preferred connectivity path. The host may be triggered to reconnect to the storage controller via the preferred connectivity path to enhance connectivity to between the host and the storage controller.
    Type: Grant
    Filed: March 13, 2018
    Date of Patent: January 12, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bharti Soni, Shrirang S. Bhagwat, Komal S. Shah, Shweta Kulkarni
  • Publication number: 20200379857
    Abstract: Described herein are techniques for managing failover in a data center environment interconnected using an internet small computer systems interface (iSCSI) communication protocol, the techniques including receiving, at a host and from a kernel driver, an asynchronous message comprising an indication of a failed path associated with a first node having a first port, a list of internet protocol (IP) addresses associated with a plurality of failover paths including a first failover path associated with a second node having a second port, and an expiration. The techniques further including performing, by the host and before the expiration, a first input/output (I/O) operation on the second port associated with the second node. The techniques further including performing, by the host and after the expiration, a second I/O operation on the first port of the first node.
    Type: Application
    Filed: June 3, 2019
    Publication date: December 3, 2020
    Inventors: Komal Shailendra Shah, Bharti Soni, Shrirang Shrikant Bhagwat, Sourab Gupta
  • Publication number: 20200042403
    Abstract: Apparatuses, methods, systems, and program products are disclosed for cluster configuration backup and recovery. One method includes receiving, by use of a processor, configuration data for a cluster. The method includes storing the configuration data for the cluster. The method also includes forming a machine-readable code that corresponds to the stored configuration data for the cluster. The machine-readable code may be used for restoring the stored configuration data to the cluster.
    Type: Application
    Filed: August 1, 2018
    Publication date: February 6, 2020
    Inventors: Komal S. Shah, Shweta Kulkarni, Bharti Soni, Shrirang S. Bhagwat
  • Publication number: 20190286353
    Abstract: Embodiments for optimizing connectivity in a storage system by a processor. A preferred connectivity path may be determined between a host and a storage controller via one or more selected nodes, one or more storage virtualization systems, or combination thereof. A current connectivity path between the host and the storage controller may be determined to fail to match the preferred connectivity path. The host may be triggered to reconnect to the storage controller via the preferred connectivity path to enhance connectivity to between the host and the storage controller.
    Type: Application
    Filed: March 13, 2018
    Publication date: September 19, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bharti SONI, Shrirang S. BHAGWAT, Komal S. SHAH, Shweta KULKARNI
  • Publication number: 20190171397
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving an unmap command, the unmap command identifying a first logical extent located in a higher storage tier of a multi-tiered data storage system having the higher storage tier and a lower storage tier, sending an instruction to unmap the first logical extent from the higher storage tier, sending an instruction to decrement a heat associated with the unmapped first logical extent in response to sending the instruction to unmap the first logical extent, sending an instruction to remove the unmapped first logical extent from the higher storage tier, selecting, using a heat map, at least one second logical extent located in the lower storage tier for promotion to the higher storage tier, and sending an instruction to relocate the at least one second logical extent from the lower storage tier to the higher storage tier.
    Type: Application
    Filed: December 6, 2017
    Publication date: June 6, 2019
    Inventors: Kushal S. Patel, Sarvesh S. Patel, Subhojit Roy, Bharti Soni