Patents by Inventor Bharti Soni
Bharti Soni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11803309Abstract: Described herein are techniques for managing replication in a data storage environment. The techniques including selectively compressing and selectively encrypting, by a production site, a set of files for replication from the production site to a remote site. Files can be selectively compressed based on a compression ratio satisfying a compression threshold, and files can be selectively encrypted based on a file content satisfying an encryption criteria. The techniques can further include updating, by the production site, metadata associated with selectively compressed files and updating metadata associated with selectively encrypted files. The techniques can further include replicating the set of files for replication from the production site to the remote site, the set of files for replication including the selectively compressed and the selectively encrypted files.Type: GrantFiled: July 9, 2019Date of Patent: October 31, 2023Assignee: International Business Machines CorporationInventors: Komal Shailendra Shah, Bharti Soni, Subhojit Roy
-
Patent number: 11687492Abstract: Computer implemented methods for selective data deduplication in a multitenant environment are disclosed. Data deduplication of blocks written to a storage area associated with a tenant and redundant copies of the blocks written to other storage areas of other tenants is permitted or prevented based on tagging the first storage area associated with the tenant with a particular type of parameter. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is not permitted, a block to be written to the storage area is modified prior to hashing the block. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is permitted, a block to be written to the storage area is prevented from being modified prior to hashing the block.Type: GrantFiled: June 21, 2021Date of Patent: June 27, 2023Assignee: International Business Machines CorporationInventors: Komal Shailendra Shah, Bharti Soni, Tej Parkash, Subhojit Roy
-
Publication number: 20230032090Abstract: Described are techniques including a computer-implemented method that comprises defining a respective priority classification for each of a plurality of sockets used for communicating between an initiator computational system and a target computational system. The method further comprises automatically assigning a respective priority classification to each of a plurality of Input/Output (IO) requests based on a type of data associated with each IO request. The method further comprises sending the plurality of IO requests to respective sockets of the plurality of sockets with a matching priority classification.Type: ApplicationFiled: July 29, 2021Publication date: February 2, 2023Inventors: Bharti Soni, Komal Shailendra Shah, Tej Parkash, Subhojit Roy
-
Publication number: 20220405251Abstract: Computer implemented methods for selective data deduplication in a multitenant environment are disclosed. Data deduplication of blocks written to a storage area associated with a tenant and redundant copies of the blocks written to other storage areas of other tenants is permitted or prevented based on tagging the first storage area associated with the tenant with a particular type of parameter. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is not permitted, a block to be written to the storage area is modified prior to hashing the block. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is permitted, a block to be written to the storage area is prevented from being modified prior to hashing the block.Type: ApplicationFiled: June 21, 2021Publication date: December 22, 2022Inventors: Komal Shailendra Shah, Bharti Soni, Tej Parkash, Subhojit Roy
-
Publication number: 20220405789Abstract: A computer-implemented method for dynamic storage pricing in a multitenant environment is disclosed. The computer-implemented method includes dynamically modifying a storage cost for one or more tenants pointing to a block written to a storage area of the multitenant environment based, at least in part, on detecting a change in a number of tenants pointing to the block.Type: ApplicationFiled: June 21, 2021Publication date: December 22, 2022Inventors: Komal Shailendra Shah, Bharti Soni, Tej Parkash, Subhojit Roy
-
Patent number: 11474907Abstract: Apparatuses, methods, systems, and program products are disclosed for cluster configuration backup and recovery. One method includes receiving, by use of a processor, configuration data for a cluster. The method includes storing the configuration data for the cluster. The method also includes forming a machine-readable code that corresponds to the stored configuration data for the cluster. The machine-readable code may be used for restoring the stored configuration data to the cluster.Type: GrantFiled: August 1, 2018Date of Patent: October 18, 2022Assignee: International Business Machines CorporationInventors: Komal S. Shah, Shweta Kulkarni, Bharti Soni, Shrirang S. Bhagwat
-
Patent number: 11354204Abstract: Described herein are techniques for managing failover in a data center environment interconnected using an internet small computer systems interface (iSCSI) communication protocol, the techniques including receiving, at a host and from a kernel driver, an asynchronous message comprising an indication of a failed path associated with a first node having a first port, a list of internet protocol (IP) addresses associated with a plurality of failover paths including a first failover path associated with a second node having a second port, and an expiration. The techniques further including performing, by the host and before the expiration, a first input/output (I/O) operation on the second port associated with the second node. The techniques further including performing, by the host and after the expiration, a second I/O operation on the first port of the first node.Type: GrantFiled: June 3, 2019Date of Patent: June 7, 2022Assignee: International Business Machines CorporationInventors: Komal Shailendra Shah, Bharti Soni, Shrirang Shrikant Bhagwat, Sourab Gupta
-
Patent number: 11200005Abstract: A computer-implemented method, according to one embodiment, includes: receiving an unmap command, the unmap command identifying a first logical extent located in a higher storage tier of a multi-tiered data storage system having the higher storage tier and a lower storage tier, sending an instruction to unmap the first logical extent from the higher storage tier, sending an instruction to decrement a heat associated with the unmapped first logical extent in response to sending the instruction to unmap the first logical extent, sending an instruction to remove the unmapped first logical extent from the higher storage tier, selecting, using a heat map, at least one second logical extent located in the lower storage tier for promotion to the higher storage tier, and sending an instruction to relocate the at least one second logical extent from the lower storage tier to the higher storage tier.Type: GrantFiled: December 6, 2017Date of Patent: December 14, 2021Assignee: International Business Machines CorporationInventors: Kushal S. Patel, Sarvesh S. Patel, Subhojit Roy, Bharti Soni
-
Publication number: 20210011637Abstract: Described herein are techniques for managing replication in a data storage environment. The techniques including selectively compressing and selectively encrypting, by a production site, a set of files for replication from the production site to a remote site. Files can be selectively compressed based on a compression ratio satisfying a compression threshold, and files can be selectively encrypted based on a file content satisfying an encryption criteria. The techniques can further include updating, by the production site, metadata associated with selectively compressed files and updating metadata associated with selectively encrypted files. The techniques can further include replicating the set of files for replication from the production site to the remote site, the set of files for replication including the selectively compressed and the selectively encrypted files.Type: ApplicationFiled: July 9, 2019Publication date: January 14, 2021Inventors: Komal Shailendra Shah, Bharti Soni, Subhojit Roy
-
Patent number: 10891064Abstract: Embodiments for optimizing connectivity in a storage system by a processor. A preferred connectivity path may be determined between a host and a storage controller via one or more selected nodes, one or more storage virtualization systems, or combination thereof. A current connectivity path between the host and the storage controller may be determined to fail to match the preferred connectivity path. The host may be triggered to reconnect to the storage controller via the preferred connectivity path to enhance connectivity to between the host and the storage controller.Type: GrantFiled: March 13, 2018Date of Patent: January 12, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bharti Soni, Shrirang S. Bhagwat, Komal S. Shah, Shweta Kulkarni
-
Publication number: 20200379857Abstract: Described herein are techniques for managing failover in a data center environment interconnected using an internet small computer systems interface (iSCSI) communication protocol, the techniques including receiving, at a host and from a kernel driver, an asynchronous message comprising an indication of a failed path associated with a first node having a first port, a list of internet protocol (IP) addresses associated with a plurality of failover paths including a first failover path associated with a second node having a second port, and an expiration. The techniques further including performing, by the host and before the expiration, a first input/output (I/O) operation on the second port associated with the second node. The techniques further including performing, by the host and after the expiration, a second I/O operation on the first port of the first node.Type: ApplicationFiled: June 3, 2019Publication date: December 3, 2020Inventors: Komal Shailendra Shah, Bharti Soni, Shrirang Shrikant Bhagwat, Sourab Gupta
-
Publication number: 20200042403Abstract: Apparatuses, methods, systems, and program products are disclosed for cluster configuration backup and recovery. One method includes receiving, by use of a processor, configuration data for a cluster. The method includes storing the configuration data for the cluster. The method also includes forming a machine-readable code that corresponds to the stored configuration data for the cluster. The machine-readable code may be used for restoring the stored configuration data to the cluster.Type: ApplicationFiled: August 1, 2018Publication date: February 6, 2020Inventors: Komal S. Shah, Shweta Kulkarni, Bharti Soni, Shrirang S. Bhagwat
-
Publication number: 20190286353Abstract: Embodiments for optimizing connectivity in a storage system by a processor. A preferred connectivity path may be determined between a host and a storage controller via one or more selected nodes, one or more storage virtualization systems, or combination thereof. A current connectivity path between the host and the storage controller may be determined to fail to match the preferred connectivity path. The host may be triggered to reconnect to the storage controller via the preferred connectivity path to enhance connectivity to between the host and the storage controller.Type: ApplicationFiled: March 13, 2018Publication date: September 19, 2019Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bharti SONI, Shrirang S. BHAGWAT, Komal S. SHAH, Shweta KULKARNI
-
Publication number: 20190171397Abstract: A computer-implemented method, according to one embodiment, includes: receiving an unmap command, the unmap command identifying a first logical extent located in a higher storage tier of a multi-tiered data storage system having the higher storage tier and a lower storage tier, sending an instruction to unmap the first logical extent from the higher storage tier, sending an instruction to decrement a heat associated with the unmapped first logical extent in response to sending the instruction to unmap the first logical extent, sending an instruction to remove the unmapped first logical extent from the higher storage tier, selecting, using a heat map, at least one second logical extent located in the lower storage tier for promotion to the higher storage tier, and sending an instruction to relocate the at least one second logical extent from the lower storage tier to the higher storage tier.Type: ApplicationFiled: December 6, 2017Publication date: June 6, 2019Inventors: Kushal S. Patel, Sarvesh S. Patel, Subhojit Roy, Bharti Soni