Issued Patents All Time
Showing 351–375 of 607 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10042779 | Selective space reclamation of data storage memory employing heat and relocation metrics | Michael T. Benhase, Evangelos S. Eleftheriou, Robert Haas, Xiao-Yu Hu, Matthew J. Kalos +2 more | 2018-08-07 |
| 10031844 | NVS thresholding for efficient data management | Kevin J. Ash, Michael T. Benhase, Kenneth W. Todd | 2018-07-24 |
| 10013181 | Distributed storage of data in a local storage and a heterogeneous cloud | Matthew G. Borlick, Roger G. Hathorn, Karl A. Nielsen | 2018-07-03 |
| 10007600 | NVS thresholding for efficient data management | Kevin J. Ash, Michael T. Benhase, Kenneth W. Todd | 2018-06-26 |
| 9996476 | Management of cache lists via dynamic sizing of the cache lists | Kevin J. Ash, Matthew J. Kalos, Rose L. Manz | 2018-06-12 |
| 9971689 | Invoking input/output (I/O) threads and demote threads on processors to demote tracks from a cache | Kevin J. Ash, Matthew G. Borlick, Trung N. Nguyen | 2018-05-15 |
| 9971508 | Invoking input/output (I/O) threads on processors to demote tracks from a cache | Kevin J. Ash, Matthew G. Borlick, Trung N. Nguyen | 2018-05-15 |
| 9952982 | Invoking demote threads on processors to demote tracks indicated in demote ready lists from a cache when a number of free cache segments in the cache is below a free cache segment threshold | Kevin J. Ash, Matthew G. Borlick, Trung N. Nguyen | 2018-04-24 |
| 9952904 | Distributing tracks to add to cache to processor cache lists based on counts of processor access requests to the cache | Kevin J. Ash, Matthew G. Borlick | 2018-04-24 |
| 9952974 | Preservation of modified cache data in local non-volatile storage following a failover | Kyler A. Anderson, Kevin J. Ash, Matthew J. Kalos | 2018-04-24 |
| 9934083 | Requesting manual intervention on failure of initial microcode load attempts during recovery of modified customer data | Kevin J. Ash, Matthew J. Kalos | 2018-04-03 |
| 9928004 | Assigning device adaptors to use to copy source extents to target extents in a copy relationship | Michael T. Benhase, Theresa M. Brown, Carol S. Mellgren | 2018-03-27 |
| 9921974 | Assigning cache control blocks and cache lists to multiple processors to cache and demote tracks in a storage system | Kevin J. Ash, Matthew G. Borlick, Matthew J. Kalos | 2018-03-20 |
| 9921973 | Cache management of track removal in a cache for storage | Michael T. Benhase | 2018-03-20 |
| 9921879 | Using queues corresponding to attribute values associated with units of work to select the units of work to process | Theresa M. Brown, Nicolas M. Clayton, Theodore T. Harris, Jr., Brian D. Hatfield, Matthew Sanchez +1 more | 2018-03-20 |
| 9880903 | Intelligent stress testing and raid rebuild to prevent data loss | Matthew G. Borlick, John C. Elliott, Clint A. Hardy, Karl A. Nielsen | 2018-01-30 |
| 9870323 | Thresholding task control blocks for staging and destaging | Michael T. Benhase | 2018-01-16 |
| 9870275 | Processor thread management | Kevin J. Ash, Matthew G. Borlick, Trung N. Nguyen | 2018-01-16 |
| 9864534 | Validation of storage volumes that are in a peer to peer remote copy relationship | Matthew G. Borlick, Brian A. Rinaldi, Micah Robison | 2018-01-09 |
| 9864686 | Restriction of validation to active tracks in non-volatile storage during a warmstart recovery | Kevin J. Ash, Matthew J. Kalos | 2018-01-09 |
| 9864532 | Performing preprocessing operations in anticipation of log file writes | Kevin J. Ash, Matthew J. Kalos | 2018-01-09 |
| 9857997 | Replicating tracks from a first storage site to a second and third storage sites | Michael T. Benhase, Brian D. Hatfield, Gail A. Spear | 2018-01-02 |
| 9858148 | Raid data loss prevention | Matthew G. Borlick, Clint A. Hardy, Karl A. Nielsen, Brian A. Rinaldi | 2018-01-02 |
| 9858180 | Management of point-in-time copy relationship for extent space efficient volumes | Theresa M. Brown, Ellen J. Grusy, Brian D. Hatfield, Kurt A. Lovrien, Carol S. Mellgren +1 more | 2018-01-02 |
| 9852059 | NVS thresholding for efficient data management | Kevin J. Ash, Michael T. Benhase, Kenneth W. Todd | 2017-12-26 |