| 11831714 |
Programmatically mapping workloads to networked object storage |
Krishnasuri Narayanam, Phani Kumar V. U. Ayyagari, Rahul Rahul, Sasikanth Eda |
2023-11-28 |
| 11811609 |
Storage target discovery in a multi-speed and multi-protocol ethernet environment |
Komal Shailendra Shah, Subhamay BARUI, Anuj Chandra |
2023-11-07 |
| 11803309 |
Selective compression and encryption for data replication |
Komal Shailendra Shah, Bharti Soni |
2023-10-31 |
| 11748195 |
Detect multifold disturbance and minimize read-disturb errors in NAND flash |
Kushal S. Patel, Puja Leekha, Sarvesh S. Patel |
2023-09-05 |
| 11701436 |
Gene editing-based method of attenuating the beta-amyloid pathway |
Jichao Sun |
2023-07-18 |
| 11687492 |
Selective data deduplication in a multitenant environment |
Komal Shailendra Shah, Bharti Soni, Tej Parkash |
2023-06-27 |
| 11622029 |
Optimizing information transmitted over a direct communications connection |
Anuj Chandra, Kushal S. Patel, Sarvesh S. Patel |
2023-04-04 |
| 11604743 |
Input/output queue hinting for resource utilization |
Kushal S. Patel, Sarvesh S. Patel |
2023-03-14 |
| 11579982 |
Calculating bandwidth requirements for a specified recovery point objective |
Shweta V. Kulkarni, William J. Scales |
2023-02-14 |