Patents by Inventor Thomas L. Watson
Thomas L. Watson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12175078Abstract: Techniques for container environment management are disclosed. For example, a method manages, via a virtual container storage interface controller, a generic mapping for one or more container storage attributes for a set of storage specific container storage interface drivers respectively associated with a set of storage arrays of a storage system so as to isolate an application program, executing on a host device accessing one or more storage volumes stored on the set of storage arrays, from the set of storage specific container storage interface drivers. For example, the isolation can provide a layer of abstraction for application specific handles from the actual underlying storage and then enable use of the abstraction to provide services such as, but not limited to, seamless data mobility.Type: GrantFiled: October 21, 2022Date of Patent: December 24, 2024Assignee: Dell Products L.P.Inventors: Thomas L. Watson, Prakash Venkatanarayanan
-
Publication number: 20240370189Abstract: Described herein are systems and methods for providing persistent storage for a container based application running on and unaware of a container orchestration system. An empty directory volume is mounted in a pod of the container orchestration system. A read to a persistent storage is performed by an init container of the pod. The persistent storage is not local to the node of the pod. Writing of the read is performed to the empty directory volume. The empty directory volume is to an application container that runs the container based application, allowing read/write operations between the empty directory volume and application container. Monitoring and providing changes is of the empty directory volume is performed to the persistent storage.Type: ApplicationFiled: May 2, 2023Publication date: November 7, 2024Applicant: Dell Products L.P.Inventors: Trevor H. Dawe, Pooja Prasannakumar, Thomas L. Watson
-
Publication number: 20240256395Abstract: Described are system and methods that provide instant access of data of a workload/container-based application, allowing the workload/container-based application to be recreated at the destination container platform. A connection is established between the destination container platform and a source storage; A volume of the container-based application is taken and stored to the source storage. A storage accessed by the destination container platform creates a proxy volume which maps and copies data of the snapshot. The data is pulled from the proxy volume as needed to recreate the container-based application at the destination host platform.Type: ApplicationFiled: January 31, 2023Publication date: August 1, 2024Applicant: Dell Products L.P.Inventors: Salil Gupta, Bahubali Jain, Prakash Venkatanarayanan, Thomas L. Watson, Abhijit Tripathy, Harish Prabhakara
-
Publication number: 20240256562Abstract: Described herein are systems and methods for replication and moving data to provide for container-based application mobility. The configuration of the of the container-based application is determined and copied to an intermediate object storage. Depending on the replication compatibility of source array backing the source cluster and the target array backing the target cluster either a replication engine or data mover are used to move data. Configuration of the container-based application in the common storage is copied and stored to the target cluster.Type: ApplicationFiled: January 31, 2023Publication date: August 1, 2024Applicant: Dell Products L.P.Inventors: Pooja Prasannakumar, Thomas L. Watson, Prakash Venkatanarayanan, Nagasimha G. Haravu, Girish Sheelvant
-
Publication number: 20240256189Abstract: Techniques for container environment management are disclosed. For example, a method comprises deploying a first container storage interface driver, wherein the first container storage interface driver comprises multiple interfaces and is configured to: (i) receive a first request from a host configured to execute an application program, wherein the first request is related to a first storage volume associated with a storage system; (ii) receive a second request from a second container storage interface driver configured to provide an additional functionality with respect to the first container storage interface driver, wherein the second request is related to a second storage volume associated with the storage system; and (iii) send the first request and the second request to the storage system.Type: ApplicationFiled: January 31, 2023Publication date: August 1, 2024Inventors: Oleksandr Babiychuk, Thomas L. Watson, Alykhan Nathoo
-
Publication number: 20240231620Abstract: Techniques for container environment management are disclosed. For example, a method manages, via a virtual container storage interface controller, a generic mapping for one or more container storage attributes for a set of storage specific container storage interface drivers respectively associated with a set of storage arrays of a storage system so as to isolate an application program, executing on a host device accessing one or more storage volumes stored on the set of storage arrays, from the set of storage specific container storage interface drivers. For example, the isolation can provide a layer of abstraction for application specific handles from the actual underlying storage and then enable use of the abstraction to provide services such as, but not limited to, seamless data mobility.Type: ApplicationFiled: October 21, 2022Publication date: July 11, 2024Inventors: Thomas L. Watson, Prakash Venkatanarayanan
-
Publication number: 20240211157Abstract: Techniques for application mobility in an information processing system environment are disclosed. For example, a method comprises managing, via an automatic data mover selection controller, a plurality of data movers to select at least one of the plurality of data movers for use in moving data associated with an application program from a first storage location to a second storage location.Type: ApplicationFiled: December 21, 2022Publication date: June 27, 2024Inventors: Pooja Prasannakumar, Thomas L. Watson
-
Publication number: 20240134526Abstract: Techniques for container environment management are disclosed. For example, a method manages, via a virtual container storage interface controller, a generic mapping for one or more container storage attributes for a set of storage specific container storage interface drivers respectively associated with a set of storage arrays of a storage system so as to isolate an application program, executing on a host device accessing one or more storage volumes stored on the set of storage arrays, from the set of storage specific container storage interface drivers. For example, the isolation can provide a layer of abstraction for application specific handles from the actual underlying storage and then enable use of the abstraction to provide services such as, but not limited to, seamless data mobility.Type: ApplicationFiled: October 20, 2022Publication date: April 25, 2024Inventors: Thomas L. Watson, Prakash Venkatanarayanan
-
Patent number: 11816462Abstract: Techniques for application copy management in container environments are disclosed. For example, a method obtains a copy of an application program, wherein the copy of the application program is a copy generated for a first cluster of a container-based information processing system within which the application program is deployed. The method then utilizes the copy of the application program from the first cluster to deploy the application program in a second cluster of the container-based information processing system.Type: GrantFiled: March 24, 2021Date of Patent: November 14, 2023Assignee: EMC IP Holding Company LLCInventors: Sunil Kumar, Anil Arun Degwekar, Thomas L. Watson
-
Patent number: 11809276Abstract: Techniques for managing node failures in container environments are disclosed. In one example, a method determines when a first node executing at least one containerized workload has failed. In response to determining the first node has failed, the method marks a configuration object for the first node with an indicator that the first node is not to be used to schedule execution of a subsequent containerized workload, isolates from the first node one or more storage volumes used by the first node, and deletes configuration objects for the one or more storage volumes and for the containerized workload. The method then causes creation of a replacement containerized workload for execution on a second node, removes one or more artifacts associated with the containerized workload from the first node, and removes the indicator from the configuration object for the first node.Type: GrantFiled: February 26, 2021Date of Patent: November 7, 2023Assignee: EMC IP Holding Company LLCInventors: Kumar Prashant, Thomas L Watson
-
Publication number: 20230333993Abstract: Techniques for obfuscating and/or de-obfuscating data using bit-level shard masks are disclosed. Shard masks are generated. The shard masks are designed to shard a block of data into a number of shards for distribution and storage among a number of storage arrays. The shard masks shard the block of data at a bit-level granularity. The shard masks are applied to the block of data to generate the shards. The shards are then distributed among the storage arrays for storage on the storage arrays.Type: ApplicationFiled: April 19, 2022Publication date: October 19, 2023Inventors: Thomas L. Watson, Yevgeni Gehtman, Tomer Shachar, Maxim Balin, Arieh Don
-
Patent number: 11768622Abstract: Methods, apparatus, and processor-readable storage media for implementing differential snapshots without array support are provided herein. An example computer-implemented method includes determining whether one or more of a plurality of data blocks in a first snapshot of a storage volume have changed relative to a plurality of data blocks in a second snapshot of the storage volume; generating a respective data structure for each of the plurality of data blocks in the first snapshot, wherein the data structure comprises data content of the corresponding data block of the first snapshot only if the corresponding data block has changed relative to the second snapshot; and transmitting the data structures to a remote storage system, wherein the remote storage system generates a copy of the first snapshot based at least in part on the data structures.Type: GrantFiled: November 30, 2020Date of Patent: September 26, 2023Assignee: EMC IP Holding Company LLCInventor: Thomas L. Watson
-
Publication number: 20220308849Abstract: Techniques for application copy management in container environments are disclosed. For example, a method obtains a copy of an application program, wherein the copy of the application program is a copy generated for a first cluster of a container-based information processing system within which the application program is deployed. The method then utilizes the copy of the application program from the first cluster to deploy the application program in a second cluster of the container-based information processing system.Type: ApplicationFiled: March 24, 2021Publication date: September 29, 2022Inventors: Sunil Kumar, Anil Arun Degwekar, Thomas L. Watson
-
Publication number: 20220276929Abstract: Techniques for managing node failures in container environments are disclosed. In one example, a method determines when a first node executing at least one containerized workload has failed. In response to determining the first node has failed, the method marks a configuration object for the first node with an indicator that the first node is not to be used to schedule execution of a subsequent containerized workload, isolates from the first node one or more storage volumes used by the first node, and deletes configuration objects for the one or more storage volumes and for the containerized workload. The method then causes creation of a replacement containerized workload for execution on a second node, removes one or more artifacts associated with the containerized workload from the first node, and removes the indicator from the configuration object for the first node.Type: ApplicationFiled: February 26, 2021Publication date: September 1, 2022Inventors: Kumar Prashant, Thomas L. Watson
-
Publication number: 20220171536Abstract: Methods, apparatus, and processor-readable storage media for implementing differential snapshots without array support are provided herein. An example computer-implemented method includes determining whether one or more of a plurality of data blocks in a first snapshot of a storage volume have changed relative to a plurality of data blocks in a second snapshot of the storage volume; generating a respective data structure for each of the plurality of data blocks in the first snapshot, wherein the data structure comprises data content of the corresponding data block of the first snapshot only if the corresponding data block has changed relative to the second snapshot; and transmitting the data structures to a remote storage system, wherein the remote storage system generates a copy of the first snapshot based at least in part on the data structures.Type: ApplicationFiled: November 30, 2020Publication date: June 2, 2022Inventor: Thomas L. Watson
-
Patent number: 10275776Abstract: Described are techniques for performing compliance testing. Configuration state information is received for one or more devices managed using a configuration management system. The configuration state information is stored in a data container. One or more compliance tests are executed using the configuration state information to determine if the one or more devices are compliant. The one or more compliance tests are defined using one or more queries and one or more compliance rules. The one or more queries are used for retrieving a portion of said configuration state information from said data container and generating one or more result sets. The one or more compliance rules specifying compliance criteria are used for determining whether the one or more result sets include configuration state information which is compliant.Type: GrantFiled: June 28, 2017Date of Patent: April 30, 2019Assignee: EMC IP Holding Company LLCInventors: Thomas L. Watson, Fredrick A. Crable
-
Patent number: 10241712Abstract: Example embodiments of the present invention relate to a method, a system, and a computer program product for replicating a virtual volume. The method includes creating a volume in a first datacenter, the volume in the first datacenter accessible as a virtual volume exposed to the first datacenter and a second datacenter, and establishing replication of the virtual volume to a third datacenter.Type: GrantFiled: June 30, 2014Date of Patent: March 26, 2019Assignee: EMC IP HOLDING COMPANY LLCInventors: William J. Elliott, IV, Bradley J. Hughes, Sean R. Gallacher, Bharath Sreekanth, Anoop Ninan, Joseph A. Condlin, Michael G. Hegerich, Thomas L. Watson
-
Patent number: 10191958Abstract: A system, method, and computer program product for storage provisioning in a data storage environment comprising protecting, through an orchestration API, a source volume at a source site by setting the source volume to be replicated to a target volume at a target site through the use of a replication appliance; wherein the API is enabled to create network zones between the source site and the target site for replication from the source site to the target site and wherein the network zone is configured to include the replication appliance; wherein the API is enabled to mask storage devices used to store data on the source volume and the target volume.Type: GrantFiled: April 26, 2017Date of Patent: January 29, 2019Assignee: EMC IP Holding Company LLCInventors: William J Elliott, IV, Anoop G. Ninan, Evgeny Roytman, Thomas L. Watson, Ameer Jabbar
-
Patent number: 10067794Abstract: A method, system, and computer program product for allocating one or more available ports on a data storage system, the data storage system having one or more data storage volumes, to enable communication with the one or more data storage volumes on the data storage system, the method, system, and computer program comprising filtering the one or more available ports on the data storage system to determine a balanced allocation of a port of the one or more available ports through one or more storage components on the data storage system, and allocating the port to the data storage volume thereby enabling access to the data storage volume through the one or more storage components.Type: GrantFiled: May 3, 2013Date of Patent: September 4, 2018Assignee: EMC Ip Holding Company LLCInventors: Thomas L. Watson, Anoop G. Ninan, Ameer Jabbar, Hala El-Ali
-
Patent number: 9933967Abstract: Example embodiments of the present invention relate to a method, a system, and a computer program product for aggregating physical storage pools and ports into a virtual storage array. The method includes selecting a plurality of physical storage pools in a storage environment, selecting a plurality of ports in the storage environment, and aggregating the physical storage pools and ports into a virtual storage array. Example embodiments of the present invention relate to a method, a system, and a computer program product for aggregating a plurality of storage resource from a plurality of physical storage pools into a virtual storage pool. The method includes selecting a plurality of storage resource from a plurality of physical storage pools and aggregating the plurality of resources from the plurality of physical storage pools into a virtual storage pool.Type: GrantFiled: June 30, 2014Date of Patent: April 3, 2018Assignee: EMC IP HOLDING COMPANY LLCInventors: Hala S. El-Ali, Michael G. Hegerich, Thomas L. Watson, Katakam Gangadhar, Stalin Saravanakumar Thangapalam, Anoop Ninan