Patents by Inventor Scott Quesnelle

Scott Quesnelle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11947415
    Abstract: According to various embodiments, a method, medium, and system for exporting log messages related to a particular job running in a micro services system is described in this disclosure. The method uses a mapping table to narrow down the search scope for finding relevant log files. The mapping table maps a job attribute combination to one or more micro services, and thus will direct the search for relevant log messages only to those log files related to the one or more micro services. The search scope can be further narrowed down using a start time and end time of the job. Once the relevant log files are found, log messages containing an identifier of the job can be extracted from the relevant log files for display or for a user to download. The mapping table can be automatically generated by parsing through historical files in a system non-busy time.
    Type: Grant
    Filed: January 13, 2022
    Date of Patent: April 2, 2024
    Assignee: DELL PRODUCTS L.P.
    Inventors: Mengze Liao, Pankaj Pande, Jinjin Wang, Scott Quesnelle
  • Publication number: 20230222028
    Abstract: According to various embodiments, a method, medium, and system for exporting log messages related to a particular job running in a micro services system is described in this disclosure. The method uses a mapping table to narrow down the search scope for finding relevant log files. The mapping table maps a job attribute combination to one or more micro services, and thus will direct the search for relevant log messages only to those log files related to the one or more micro services. The search scope can be further narrowed down using a start time and end time of the job. Once the relevant log files are found, log messages containing an identifier of the job can be extracted from the relevant log files for display or for a user to download. The mapping table can be automatically generated by parsing through historical files in a system non-busy time.
    Type: Application
    Filed: January 13, 2022
    Publication date: July 13, 2023
    Inventors: Mengze LIAO, Pankaj PANDE, Jinjin WANG, Scott QUESNELLE
  • Patent number: 11687505
    Abstract: A current retention mode is identified as being one of conservative or aggressive. When the retention mode is identified as aggressive, a check is made as to whether used space on backup storage is below a lower threshold. If the used space is below the lower threshold, a switch is made into the conservative mode. If the used space is above the lower threshold, the aggressive mode is maintained. While in the aggressive mode, a backup chain of a database is selected for pruning, the selected backup chain having a shortest retention term of all backup chains not yet pruned and not being a latest backup chain. Log backups of the database in the selected backup chain are identified. Each log backup that has expired is deleted regardless of dependency of other backups on an expired log backup.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: June 27, 2023
    Assignee: EMC IP Holding Company LLC
    Inventors: Mengze Liao, Scott Quesnelle, Yasemin Ugur-Ozekinci, Jin Ru Yan, Mike Xiaoliang Zhu
  • Patent number: 11552861
    Abstract: A method, apparatus, and system for performing a Location SLO check based on a location scatter table is disclosed. A location scatter table is maintained, the location scatter table indicative of updated geographical location distribution of all backups of all assets. A Location Service Level Objective (SLO) associated with a first asset is determined, the Location SLO associated with the first asset specifying one or more allowed locations where backups of the first asset are permitted to be located. All locations where at least one backup of the first asset is located are determined. A Location SLO check for the first asset is performed, wherein the Location SLO check passes when all the locations where at least one backup of the first asset is located fall within the allowed locations specified by the Location SLO.
    Type: Grant
    Filed: July 11, 2019
    Date of Patent: January 10, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Ren Wang, Scott Quesnelle, Mengze Liao
  • Publication number: 20220398167
    Abstract: One example method includes receiving, by a first computing entity from a second computing entity, a request for data, providing, by the first computing entity, a compliance API (Application Program Interface) to the second computing entity, receiving, by the first computing entity from the second computing entity, location information and/or data compliance information, by way of the compliance API, consulting, by the first computing entity, a mapping, and determining, based on information in the mapping and the location information and/or data compliance information, whether or not the data is permitted to be transmitted by the first computing entity to the second computing entity, and either transmitting the data to the second computing entity, or not transmitting the data to the second computing entity, based on data tags, the information in the mapping and the location information and/or data compliance information.
    Type: Application
    Filed: June 9, 2021
    Publication date: December 15, 2022
    Inventors: Michael Roche, Michal Drozd, Scott Quesnelle
  • Publication number: 20220342858
    Abstract: A current retention mode is identified as being one of conservative or aggressive. When the retention mode is identified as aggressive, a check is made as to whether used space on backup storage is below a lower threshold. If the used space is below the lower threshold, a switch is made into the conservative mode. If the used space is above the lower threshold, the aggressive mode is maintained. While in the aggressive mode, a backup chain of a database is selected for pruning, the selected backup chain having a shortest retention term of all backup chains not yet pruned and not being a latest backup chain. Log backups of the database in the selected backup chain are identified. Each log backup that has expired is deleted regardless of dependency of other backups on an expired log backup.
    Type: Application
    Filed: April 21, 2021
    Publication date: October 27, 2022
    Inventors: Mengze Liao, Scott Quesnelle, Yasemin Ugur-Ozekinci, Jin Ru Yan, Mike Xiaoliang Zhu
  • Patent number: 11461187
    Abstract: Responsibility for protecting a distributed file system is split across different client hosts. Each client host is assigned a subset of the distributed file system to backup. An index host is identified to create a common namespace under which different client file indexes generated by the different client hosts during backups of respective subsets of the file system will be maintained. During backups, different client file indexes are received from the different client hosts. The client file indexes include metadata about files in the file system included in the backups. Each of the different client file indexes are associated to the same common namespace to provide a unified view of all files across all subsets of the file system that have been backed up by the different client hosts.
    Type: Grant
    Filed: December 14, 2020
    Date of Patent: October 4, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Scott Quesnelle, Gururaj Kulkarni, Ati Pavan Kumar, Rangapuram Ravi Kishore Yadav
  • Patent number: 11442793
    Abstract: Described is a system for utilizing fully dynamic proxies for data flow during data protection. The system determines threshold parameters for each respective virtual proxy in a plurality of virtual proxies. The system receives virtual machine protection data of each respective virtual proxy. The system detects a current data protection workload experienced by each virtual proxy operating according to its respective threshold parameters and virtual machine protection data. The system identifies at least one under-utilized virtual proxy and at least one over-utilized virtual proxy based on the current data protection workload detected on each virtual proxy. The system causes the at least one under-utilized virtual proxy to receive upcoming backup data flow before the at least one over-utilized virtual proxy.
    Type: Grant
    Filed: September 23, 2019
    Date of Patent: September 13, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Gururaj Kulkarni, Scott Quesnelle
  • Patent number: 11435927
    Abstract: One example method includes moving a volume from a source server to a target server. In one example, the volume is moved and the need to copy the source data is eliminated. The volume to be moved is selected and metadata associated with the save sets stored on the volume is exported to a volume bootstrap, which is also stored on the selected volume. The volume is mounted or attached to the target server and the metadata is imported from the volume bootstrap. The volume is made read/write and is moved from the source server to the target server.
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: September 6, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Michael Roche, Ashish Goyal, Scott Quesnelle, Kiran Kumar Malle Gowda
  • Patent number: 11436036
    Abstract: An application is provided as a compound virtual appliance having components to be hosted by virtual machines. Each component includes a set of virtual machine disks. Partial versions of the components are created by removing from each component each virtual machine disk determined to be a duplicate of a virtual machine disk of another component. A compact version of the compound virtual appliance is created by packing together the partial versions of the components and a single copy of each virtual machine disk having been determined to be a duplicate. The compact compound virtual appliance is deployed to a customer site. At the customer site, a complete version of the compound virtual appliance is reconstructed by adding back the single copy of each virtual machine disk having been determined to be a duplicate into each component having had the duplicate virtual machine disk removed.
    Type: Grant
    Filed: June 23, 2020
    Date of Patent: September 6, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: James Morton, Ming Zhang, Lihui Su, Min Liu, Yujun Liang, Scott Quesnelle
  • Publication number: 20220188199
    Abstract: Responsibility for protecting a distributed file system is split across different client hosts. Each client host is assigned a subset of the distributed file system to backup. An index host is identified to create a common namespace under which different client file indexes generated by the different client hosts during backups of respective subsets of the file system will be maintained. During backups, different client file indexes are received from the different client hosts. The client file indexes include metadata about files in the file system included in the backups. Each of the different client file indexes are associated to the same common namespace to provide a unified view of all files across all subsets of the file system that have been backed up by the different client hosts.
    Type: Application
    Filed: December 14, 2020
    Publication date: June 16, 2022
    Inventors: Scott Quesnelle, Gururaj Kulkarni, Ati Pavan Kumar, Rangapuram Ravi Kishore Yadav
  • Publication number: 20220137847
    Abstract: One example method includes moving a volume from a source server to a target server. In one example, the volume is moved and the need to copy the source data is eliminated. The volume to be moved is selected and metadata associated with the save sets stored on the volume is exported to a volume bootstrap, which is also stored on the selected volume. The volume is mounted or attached to the target server and the metadata is imported from the volume bootstrap. The volume is made read/write and is moved from the source server to the target server.
    Type: Application
    Filed: October 30, 2020
    Publication date: May 5, 2022
    Inventors: Michael Roche, Ashish Goyal, Scott Quesnelle, Kiran Kumar Malle Gowda
  • Patent number: 11281637
    Abstract: Embodiments are described for performing online migration of backup appliances in automated and monitored process from a backup application. The data migration process uses certain Mtree replication methods. It is configured to provide capabilities a backup application server would control, such as Mtree replication configuration from the backup application, a policy driven approach for data center migration, and accommodation of specific customer data recovery needs, and providing a choice to end users for leveraging both Managed File Replication and Mtree replication based on the customer data movement requirements. Such a solution is configured to be generic and applicable to any data protection applications with a policy driven implementation that leverages certain integration points of the system.
    Type: Grant
    Filed: December 17, 2019
    Date of Patent: March 22, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Scott Quesnelle, Gururaj Kulkarni
  • Patent number: 11240209
    Abstract: Systems and methods for performing a data transfer in a data protection system are disclosed. A user interface is provided that includes a workflow. The workflow is effective to configure a data transfer by identifying the source of the data, the destination of the data, and the data itself. A data control process associated with the data protection system is performed to authenticate the requesting user and determine whether the user is authorized to access the data. The data is transferred in accordance with the data control process of the data protection system.
    Type: Grant
    Filed: August 30, 2019
    Date of Patent: February 1, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Shern S. Jauhal, Scott Quesnelle
  • Publication number: 20210397468
    Abstract: An application is provided as a compound virtual appliance having components to be hosted by virtual machines. Each component includes a set of virtual machine disks. Partial versions of the components are created by removing from each component each virtual machine disk determined to be a duplicate of a virtual machine disk of another component. A compact version of the compound virtual appliance is created by packing together the partial versions of the components and a single copy of each virtual machine disk having been determined to be a duplicate. The compact compound virtual appliance is deployed to a customer site. At the customer site, a complete version of the compound virtual appliance is reconstructed by adding back the single copy of each virtual machine disk having been determined to be a duplicate into each component having had the duplicate virtual machine disk removed.
    Type: Application
    Filed: June 23, 2020
    Publication date: December 23, 2021
    Inventors: James Morton, Ming Zhang, Lihui Su, Min Liu, Yujun Liang, Scott Quesnelle
  • Publication number: 20210182253
    Abstract: Embodiments are described for performing online migration of backup appliances in automated and monitored process from a backup application. The data migration process uses certain Mtree replication methods. It is configured to provide capabilities a backup application server would control, such as Mtree replication configuration from the backup application, a policy driven approach for data center migration, and accommodation of specific customer data recovery needs, and providing a choice to end users for leveraging both Managed File Replication and Mtree replication based on the customer data movement requirements. Such a solution is configured to be generic and applicable to any data protection applications with a policy driven implementation that leverages certain integration points of the system.
    Type: Application
    Filed: December 17, 2019
    Publication date: June 17, 2021
    Inventors: Scott Quesnelle, Gururaj Kulkarni
  • Publication number: 20210014131
    Abstract: A method, apparatus, and system for performing a Location SLO check based on a location scatter table is disclosed. A location scatter table is maintained, the location scatter table indicative of updated geographical location distribution of all backups of all assets. A Location Service Level Objective (SLO) associated with a first asset is determined, the Location SLO associated with the first asset specifying one or more allowed locations where backups of the first asset are permitted to be located. All locations where at least one backup of the first asset is located are determined. A Location SLO check for the first asset is performed, wherein the Location SLO check passes when all the locations where at least one backup of the first asset is located fall within the allowed locations specified by the Location SLO.
    Type: Application
    Filed: July 11, 2019
    Publication date: January 14, 2021
    Inventors: Ren WANG, Scott QUESNELLE, Mengze LIAO
  • Publication number: 20190386998
    Abstract: Systems and methods for performing a data transfer in a data protection system are disclosed. A user interface is provided that includes a workflow. The workflow is effective to configure a data transfer by identifying the source of the data, the destination of the data, and the data itself. A data control process associated with the data protection system is performed to authenticate the requesting user and determine whether the user is authorized to access the data. The data is transferred in accordance with the data control process of the data protection system.
    Type: Application
    Filed: August 30, 2019
    Publication date: December 19, 2019
    Inventors: Shern S. Jauhal, Scott Quesnelle
  • Patent number: 10404705
    Abstract: Systems and methods for performing a data transfer in a data protection system are disclosed. A user interface is provided that includes a workflow. The workflow is effective to configure a data transfer by identifying the source of the data, the destination of the data, and the data itself. A data control process associated with the data protection system is performed to authenticate the requesting user and determine whether the user is authorized to access the data. The data is transferred in accordance with the data control process of the data protection system.
    Type: Grant
    Filed: May 1, 2017
    Date of Patent: September 3, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Shern S. Jauhal, Scott Quesnelle
  • Patent number: 9641486
    Abstract: Systems and methods for performing a data transfer in a data protection system are disclosed. A user interface is provided that includes a workflow. The workflow is effective to configure a data transfer by identifying the source of the data, the destination of the data, and the data itself. A data control process associated with the data protection system is performed to authenticate the requesting user and determine whether the user is authorized to access the data. The data is transferred in accordance with the data control process of the data protection system.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: May 2, 2017
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Shern S. Jauhal, Scott Quesnelle