| 11675521 |
Comprehensive data protection backup |
James P. Smith, Austen M. Cook, Thomas Franklin Ramke, Jr., Jason Ferris Basler, David George Derk +2 more |
2023-06-13 |
| 11416452 |
Determining chunk boundaries for deduplication of storage objects |
Mark A. Smith |
2022-08-16 |
| 10972569 |
Apparatus, method, and computer program product for heterogenous compression of data streams |
Avishai H. Hochberg, Hunny W. Kershaw |
2021-04-06 |
| 10565166 |
Determining chunk boundaries for deduplication of storage objects in a network computing environment |
Mark A. Smith |
2020-02-18 |
| 10474639 |
Determining chunk boundaries for deduplication of storage objects |
Mark A. Smith |
2019-11-12 |
| 9740563 |
Controlling software processes that are subject to communications restrictions by freezing and thawing a computational process in a virtual machine from writing data |
Mandeep K. Jandir, Limor Provizor, Asaf Yeger |
2017-08-22 |
| 9619342 |
Back up and recovery in virtual machine environments |
Zhengwen He, Mandeep K. Jandir, James P. Smith, Christopher Zaremba |
2017-04-11 |
| 9606876 |
Back up and recovery in virtual machine environments |
Zhengwen He, Mandeep K. Jandir, James P. Smith, Christopher Zaremba |
2017-03-28 |
| 9396073 |
Optimizing restores of deduplicated data |
Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg |
2016-07-19 |
| 9110603 |
Identifying modified chunks in a data set for storage |
Mark A. Smith |
2015-08-18 |
| 9058298 |
Integrated approach for deduplicating data in a distributed environment that involves a source and a target |
Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, James P. Smith, David G. Van Hise |
2015-06-16 |
| 9047304 |
Optimization of fingerprint-based deduplication |
Mark A. Smith |
2015-06-02 |
| 8892603 |
Restoring deduplicated data objects from sequential backup devices |
Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg |
2014-11-18 |
| 8769310 |
Encrypting data objects to back-up |
David M. Cannon, Avishai H. Hochberg, James P. Smith |
2014-07-01 |
| 8762743 |
Encrypting data objects to back-up |
David M. Cannon, Avishai H. Hochberg, James P. Smith |
2014-06-24 |
| 8612392 |
Identifying modified chunks in a data set for storage |
Mark A. Smith |
2013-12-17 |
| 8561024 |
Developing software components and capability testing procedures for testing coded software component |
Jason Ferris Basler, James Michael Dile, Neeta Garimella, Avishai H. Hochberg, Ursula Richter +1 more |
2013-10-15 |
| 8453257 |
Approach for securing distributed deduplication software |
Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, Alexei Kojenov, James P. Smith |
2013-05-28 |
| 8452732 |
Identifying modified chunks in a data set for storage |
Mark A. Smith |
2013-05-28 |
| 8370297 |
Approach for optimizing restores of deduplicated data |
Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg |
2013-02-05 |
| 8316057 |
Restoring deduplicated data objects from sequential backup devices |
Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg |
2012-11-20 |
| 8209298 |
Restoring a restore set of files from backup objects stored in sequential backup devices |
Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, David G. Van Hise |
2012-06-26 |