LG

Lokesh M. Gupta

IBM: 594 patents #14 of 70,183Top 1%
Oracle: 7 patents #1,763 of 14,854Top 15%
IB International Business: 2 patents #2 of 119Top 2%
Globalfoundries: 1 patents #2,221 of 4,424Top 55%
MC Malzine Co.: 1 patents #39 of 89Top 45%
📍 Tucson, AZ: #1 of 6,004 inventorsTop 1%
🗺 Arizona: #2 of 32,909 inventorsTop 1%
Overall (All Time): #247 of 4,157,543Top 1%
607
Patents All Time

Issued Patents All Time

Showing 301–325 of 607 patents

Patent #TitleCo-InventorsDate
10387321 Securing exclusive access to a copy of a metadata track via a process while the metadata track is held in a shared mode by another process Kyler A. Anderson, Kevin J. Ash, Matthew J. Kalos, Beth A. Peterson 2019-08-20
10380035 Using an access increment number to control a duration during which tracks remain in cache Kevin J. Ash, Matthew G. Borlick, Matthew J. Kalos 2019-08-13
10379943 Management of foreground and background processes in a storage controller Matthew G. Borlick, Trung N. Nguyen, Karl A. Nielsen 2019-08-13
10379905 Distributing tracks to add to cache to processor cache lists based on counts of processor access requests to the cache Kevin J. Ash, Matthew G. Borlick 2019-08-13
10372624 Destaging pinned retryable data in cache Kyler A. Anderson, Kevin J. Ash, Matthew G. Borlick 2019-08-06
10372371 Dynamic data relocation using cloud based ranks Matthew G. Borlick 2019-08-06
10372363 Thin provisioning using cloud based ranks Matthew G. Borlick 2019-08-06
10346317 Determining cores to assign to cache hostile tasks Matthew G. Borlick, Trung N. Nguyen 2019-07-09
10320936 Populating a secondary cache with unmodified tracks in a primary cache when redirecting host access from a primary server to a secondary server Kevin J. Ash, Matthew G. Borlick, Matthew J. Kalos, Brian A. Rinaldi 2019-06-11
10318156 Invoking input/output (I/O) threads on processors to demote tracks from a cache Kevin J. Ash, Matthew G. Borlick, Trung N. Nguyen 2019-06-11
10318192 Performing preprocessing operations in anticipation of log file writes Kevin J. Ash, Matthew J. Kalos 2019-06-11
10318352 Distributing tracks to add to cache to processor cache lists based on counts of processor access requests to the cache Kevin J. Ash, Matthew G. Borlick 2019-06-11
10318429 Adjustment of the number of tasks for a cache storage scan and destage application based on the type of elements to be destaged from the cache storage Kevin J. Ash, Brian A. Rinaldi, Micah Robison 2019-06-11
10310738 Avoid out of space outage in a thinly provisioned box Matthew G. Borlick 2019-06-04
10303607 Preservation of modified cache data in local non-volatile storage following a failover Kyler A. Anderson, Kevin J. Ash, Matthew J. Kalos 2019-05-28
10282543 Determining whether to destage write data in cache to storage based on whether the write data has malicious data Matthew G. Borlick, Carol S. Mellgren, John G. Thompson 2019-05-07
10282303 Using cache lists for processors to determine tracks to demote from a cache Kevin J. Ash, Matthew G. Borlick, Matthew J. Kalos 2019-05-07
10275280 Reserving a core of a processor complex for a critical task Matthew G. Borlick, Clint A. Hardy, Trung N. Nguyen 2019-04-30
10275360 Considering a density of tracks to destage in groups of tracks to select groups of tracks to destage Kevin J. Ash 2019-04-30
10257023 Dual server based storage controllers with distributed storage of each server data in different clouds Matthew G. Borlick 2019-04-09
10255061 Zero down time upgrade for a multi-tenant identity and data security management cloud service Vadim Lander 2019-04-09
10248457 Providing exclusive use of cache associated with a processing entity of a processor complex to a selected task Matthew G. Borlick, Clint A. Hardy, Trung N. Nguyen 2019-04-02
10248464 Providing additional memory and cache for the execution of critical tasks by folding processing units of a processor complex Matthew G. Borlick, Trung N. Nguyen 2019-04-02
10248577 Using a characteristic of a process input/output (I/O) activity and data subject to the I/O activity to determine whether the process is a suspicious process Matthew G. Borlick 2019-04-02
10241918 Considering a frequency of access to groups of tracks to select groups of tracks to destage Kevin J. Ash 2019-03-26