Patents by Inventor Mark L. Yakushev
Mark L. Yakushev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11675521Abstract: An inventory of computer resources requiring backup data protection including an estimate of future growth of storage resources along with a set of data retention policies, rules, and outcomes in conformance with business requirements, is created. An architecture for initial ingest of protected data and a backup execution approach is created, based on the resource inventory, a sizing and assumptions of resources and data, and the set of data retention policies, rules, and outcomes. An initial ingest copies the protected data to the backup storage. The initial ingest architecture is transformed to a steady-state ingest phase, by incrementally adjusting the resources based on progress of the initial ingest. Responsive to completing the initial ingest of protected data, a steady-state backup ingest is performed. A validity of the sizing and assumptions of architecture resources is determined and an adjustment to the resources is performed based on the validity determination.Type: GrantFiled: August 19, 2021Date of Patent: June 13, 2023Assignee: International Business Machines CorporationInventors: James Patrick Smith, Austen M. Cook, Thomas Franklin Ramke, Jr., Jason Ferris Basler, David George Derk, Lisa Anne Huston, Edward M. Collins, Mark L. Yakushev
-
Publication number: 20230056105Abstract: An inventory of computer resources requiring backup data protection including an estimate of future growth of storage resources along with a set of data retention policies, rules, and outcomes in conformance with business requirements, is created. An architecture for initial ingest of protected data and a backup execution approach is created, based on the resource inventory, a sizing and assumptions of resources and data, and the set of data retention policies, rules, and outcomes. An initial ingest copies the protected data to the backup storage. The initial ingest architecture is transformed to a steady-state ingest phase, by incrementally adjusting the resources based on progress of the initial ingest. Responsive to completing the initial ingest of protected data, a steady-state backup ingest is performed. A validity of the sizing and assumptions of architecture resources is determined and an adjustment to the resources is performed based on the validity determination.Type: ApplicationFiled: August 19, 2021Publication date: February 23, 2023Inventors: James Patrick Smith, Austen M. Cook, Thomas Franklin Ramke, JR., Jason Ferris Basler, David George Derk, Lisa Anne Huston, Edward M. Collins, Mark L. Yakushev
-
Patent number: 11416452Abstract: Described are a method, system, and computer program product for deduplicating a storage object. A hash of a window of data of a storage object is determined and a determination is made as to whether the window of data of the storage object corresponds to a chunk boundary. A determination is made as to whether the hash of the object matches one pseudo fingerprints in a list of at least one pseudo fingerprint. A storage object chunk boundary based on the window of data is stored in response to the window of data corresponding to the chunk boundary or in response to determining that the hash of the object matches one of the pseudo fingerprints. A determination is made of a new window of data in the storage object following the window of data when the window of data is not an end of data of the storage object.Type: GrantFiled: September 3, 2019Date of Patent: August 16, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark L. Yakushev, Mark A. Smith
-
Patent number: 10972569Abstract: An apparatus for heterogeneous compression of data streams is disclosed. In at least one embodiment, the apparatus includes a sampling module that samples a data stream at one or more intervals to determine a content type for data within the one or more intervals. The apparatus further includes a mapping module that determines whether the content type is linked to a preferred data compression method. The apparatus further includes a processing module that compresses the data within the one or more intervals to produce compressed data using the preferred data compression method in response to determining that the content type is linked to the preferred data compression method. Embodiments of corresponding methods and computer program products are also disclosed.Type: GrantFiled: April 24, 2017Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Avishai H. Hochberg, Hunny W. Kershaw, Mark L. Yakushev
-
Determining chunk boundaries for deduplication of storage objects in a network computing environment
Patent number: 10565166Abstract: Described are a method, network system, and computer program product for deduplication of storage objects in a network. A hash of a window of data of a storage object is determined and a determination is made as to whether the window of data of the storage object corresponds to a chunk boundary. A determination is made as to whether the hash of the object matches one pseudo fingerprints in a list of at least one pseudo fingerprint. A storage object chunk boundary based on the window of data is stored in response to the window of data corresponding to the chunk boundary or in response to determining that the hash of the object matches one of the pseudo fingerprints. A determination is made of a new window of data in the storage object following the window of data when the window of data is not an end of data of the storage object.Type: GrantFiled: April 28, 2015Date of Patent: February 18, 2020Assignee: International Business Machines CorporationInventors: Mark L. Yakushev, Mark A. Smith -
Publication number: 20190391962Abstract: Described are a method, system, and computer program product for deduplicating a storage object. A hash of a window of data of a storage object is determined and a determination is made as to whether the window of data of the storage object corresponds to a chunk boundary. A determination is made as to whether the hash of the object matches one pseudo fingerprints in a list of at least one pseudo fingerprint. A storage object chunk boundary based on the window of data is stored in response to the window of data corresponding to the chunk boundary or in response to determining that the hash of the object matches one of the pseudo fingerprints. A determination is made of a new window of data in the storage object following the window of data when the window of data is not an end of data of the storage object.Type: ApplicationFiled: September 3, 2019Publication date: December 26, 2019Inventors: Mark L. Yakushev, Mark A. Smith
-
Patent number: 10474639Abstract: Described are a method, system, and computer program product for deduplicating a storage object. A hash of a window of data of a storage object is determined and a determination is made as to whether the window of data of the storage object corresponds to a chunk boundary. A determination is made as to whether the hash of the object matches one pseudo fingerprints in a list of at least one pseudo fingerprint. A storage object chunk boundary based on the window of data is stored in response to the window of data corresponding to the chunk boundary or in response to determining that the hash of the object matches one of the pseudo fingerprints. A determination is made of a new window of data in the storage object following the window of data when the window of data is not an end of data of the storage object.Type: GrantFiled: April 28, 2015Date of Patent: November 12, 2019Assignee: International Business Machines CorporationInventors: Mark L. Yakushev, Mark A. Smith
-
Publication number: 20180309841Abstract: An apparatus for heterogeneous compression of data streams is disclosed. In at least one embodiment, the apparatus includes a sampling module that samples a data stream at one or more intervals to determine a content type for data within the one or more intervals. The apparatus further includes a mapping module that determines whether the content type is linked to a preferred data compression method. The apparatus further includes a processing module that compresses the data within the one or more intervals to produce compressed data using the preferred data compression method in response to determining that the content type is linked to the preferred data compression method. Embodiments of corresponding methods and computer program products are also disclosed.Type: ApplicationFiled: April 24, 2017Publication date: October 25, 2018Inventors: Avishai H. Hochberg, Hunny W. Kershaw, Mark L. Yakushev
-
Patent number: 9740563Abstract: Controlling a software process by causing the execution of a first software process on a computer, where the first software process is configured to exclusively access a resource on the computer, causing the execution of a second software process on the computer when the first software process has exclusive access to the resource, where the second software process is configured to perform a first predefined action that is independent of the second software process accessing the resource, attempt to access the resource, and perform a second predefined action that is dependent on the second software process accessing resource, and causing the first software process to terminate its exclusive access to the resource, thereby causing the second software process to access the resource and perform the second predefined action.Type: GrantFiled: May 24, 2013Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Mandeep Kaur Jandir, Limor Provizor, Mark L. Yakushev, Asaf Yeger
-
Patent number: 9619342Abstract: Embodiments of the present invention provide efficient and cost-effective systems and methods for backing up and recovering a virtual machine and application data therein. Embodiments of the present invention can be used to satisfy near-zero RPOs by providing more recovery points for backups in virtual machine environments, while also providing increased granularity for recovery (i.e., single virtual disk, single file, etc.) and maintaining central management capabilities and back up efficiencies offered by virtual machine-level backups.Type: GrantFiled: June 24, 2014Date of Patent: April 11, 2017Assignee: International Business Machines CorporationInventors: Zhengwen He, Mandeep K. Jandir, James P. Smith, Mark L. Yakushev, Christopher Zaremba
-
Patent number: 9606876Abstract: Embodiments of the present invention provide efficient and cost-effective systems and methods for backing up and recovering a virtual machine and application data therein. Embodiments of the present invention can be used to satisfy near-zero RPOs by providing more recovery points for backups in virtual machine environments, while also providing increased granularity for recovery (i.e., single virtual disk, single file, etc.) and maintaining central management capabilities and back up efficiencies offered by virtual machine-level backups.Type: GrantFiled: August 29, 2014Date of Patent: March 28, 2017Assignee: International Business Machines CorporationInventors: Zhengwen He, Mandeep K. Jandir, James P. Smith, Mark L. Yakushev, Christopher Zaremba
-
Patent number: 9396073Abstract: For restoring deduplicated data, a method maintains a chunk index on a client computing system coupled to a client data store. The chunk index tracks chunks within files remaining on the client data store after storage of the files to a deduplicated server data store coupled to a server computing system. The method determines whether a valid entry for a first chunk exists in the chunk index. In addition, the method retrieves the first chunk from the server data store responsive to determining the valid entry for the first chunk does not exist in the chunk index. The method further retrieves the first chunk from the client data store specified in the valid entry of the chunk index responsive to determining that the valid entry exists in the chunk index and the first chunk resides in a first file at a first offset.Type: GrantFiled: January 31, 2013Date of Patent: July 19, 2016Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, Mark L. Yakushev
-
Publication number: 20150370639Abstract: Embodiments of the present invention provide efficient and cost-effective systems and methods for backing up and recovering a virtual machine and application data therein. Embodiments of the present invention can be used to satisfy near-zero RPOs by providing more recovery points for backups in virtual machine environments, while also providing increased granularity for recovery (i.e., single virtual disk, single file, etc.) and maintaining central management capabilities and back up efficiencies offered by virtual machine-level backups.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Zhengwen He, Mandeep K. Jandir, James P. Smith, Mark L. Yakushev, Christopher Zaremba
-
Publication number: 20150370652Abstract: Embodiments of the present invention provide efficient and cost-effective systems and methods for backing up and recovering a virtual machine and application data therein. Embodiments of the present invention can be used to satisfy near-zero RPOs by providing more recovery points for backups in virtual machine environments, while also providing increased granularity for recovery (i.e., single virtual disk, single file, etc.) and maintaining central management capabilities and back up efficiencies offered by virtual machine-level backups.Type: ApplicationFiled: August 29, 2014Publication date: December 24, 2015Inventors: Zhengwen He, Mandeep K. Jandir, James P. Smith, Mark L. Yakushev, Christopher Zaremba
-
DETERMINING CHUNK BOUNDARIES FOR DEDUPLICATION OF STORAGE OBJECTS IN A NETWORK COMPUTING ENVIRONMENT
Publication number: 20150234855Abstract: Described are a method, network system, and computer program product for deduplication of storage objects in a network. A hash of a window of data of a storage object is determined and a determination is made as to whether the window of data of the storage object corresponds to a chunk boundary. A determination is made as to whether the hash of the object matches one pseudo fingerprints in a list of at least one pseudo fingerprint. A storage object chunk boundary based on the window of data is stored in response to the window of data corresponding to the chunk boundary or in response to determining that the hash of the object matches one of the pseudo fingerprints. A determination is made of a new window of data in the storage object following the window of data when the window of data is not an end of data of the storage object.Type: ApplicationFiled: April 28, 2015Publication date: August 20, 2015Inventors: Mark L. Yakushev, Mark A. Smith -
Publication number: 20150234854Abstract: Described are a method, system, and computer program product for deduplicating a storage object. A hash of a window of data of a storage object is determined and a determination is made as to whether the window of data of the storage object corresponds to a chunk boundary. A determination is made as to whether the hash of the object matches one pseudo fingerprints in a list of at least one pseudo fingerprint. A storage object chunk boundary based on the window of data is stored in response to the window of data corresponding to the chunk boundary or in response to determining that the hash of the object matches one of the pseudo fingerprints. A determination is made of a new window of data in the storage object following the window of data when the window of data is not an end of data of the storage object.Type: ApplicationFiled: April 28, 2015Publication date: August 20, 2015Inventors: Mark L. Yakushev, Mark A. Smith
-
Patent number: 9110603Abstract: Provided are a computer program product, system, and method for identifying modified chunks in a data set for storage. Information is maintained on a data set of variable length chunks, including a digest of each chunk and information to locate the chunk in the data set. Modifications are received to at least one of the chunks in the data set. A determination is made of chunks including data affected by the modifications. The determined chunks including data affected by the modifications are processed to determine new chunks and for each determined new chunk and for each determined new chunk, new digest information of the new chunk. The new digest information on the at least one new chunk and information to locate the new chunk in the data set are added to the set information.Type: GrantFiled: December 11, 2013Date of Patent: August 18, 2015Assignee: International Business Machines CorporationInventors: Mark L. Yakushev, Mark A. Smith
-
Patent number: 9058298Abstract: One aspect of the present invention includes a configuration of a storage management system that enables the performance of deduplication activities at both the client (source) and at the server (target) locations. The location of deduplication operations can then be optimized based on system conditions or predefined policies. In one embodiment, seamless switching of deduplication activities between the client and the server is enabled by utilizing uniform deduplication process algorithms and accessing the same deduplication index (containing information on the hashed data chunks). Additionally, any data transformations on the chunks are performed subsequent to identification of the data chunks. Accordingly, with use of this storage configuration, the storage system can find and utilize matching chunks generated with either client- or server-side deduplication.Type: GrantFiled: July 16, 2009Date of Patent: June 16, 2015Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, James P. Smith, David G. Van Hise, Mark L. Yakushev
-
Patent number: 9047304Abstract: Described are embodiments of an invention for identifying chunk boundaries for optimization of fingerprint-based deduplication in a computing environment. Storage objects that are backed up in a computing environment are often compound storage objects which include many individual storage objects. The computing device of the computing environment breaks the storage objects into chunks of data by determining a hash value on a range of data. The computing device creates an artificial chunk boundary when the end of data of the storage object is reached. When an artificial chunk boundary is created for the end of data of a storage object, the computing device stores a pseudo fingerprint for the artificial chunk boundary. If a hash value matches a fingerprint or a pseudo fingerprint, then the computing device determines that the range of data corresponds to a chunk and the computing system defines the chunk boundaries.Type: GrantFiled: November 28, 2011Date of Patent: June 2, 2015Assignee: International Business Machines CorporationInventors: Mark L. Yakushev, Mark A. Smith
-
Publication number: 20140351822Abstract: Controlling a software process by causing the execution of a first software process on a computer, where the first software process is configured to exclusively access a resource on the computer, causing the execution of a second software process on the computer when the first software process has exclusive access to the resource, where the second software process is configured to perform a first predefined action that is independent of the second software process accessing the resource, attempt to access the resource, and perform a second predefined action that is dependent on the second software process accessing resource, and causing the first software process to terminate its exclusive access to the resource, thereby causing the second software process to access the resource and perform the second predefined action.Type: ApplicationFiled: May 24, 2013Publication date: November 27, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mandeep Kaur Jandir, Limor Provizor, Mark L. Yakushev, Asaf Yeger