Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Using data similarity to select segments for garbage collection 2023-7-10 2023-9-01
Replication Among Storage Systems Hosting An Application 2023-6-01 2023-9-28
Optimizing Storage System Performance Using Data Characteristics 2023-6-01 2023-9-28
Managed Data Distribution Using a Wireless Network 2023-5-31 2023-9-28
Creating A Modifiable Cloned Image Of A Dataset 2023-5-26 2023-9-21
Allocation of blocks based on power loss protection 2023-5-26 2023-9-21
Independent communication pathways 2023-5-25 2023-9-28
Asynchronous Data Replication in a Storage Network 2023-5-25 2023-9-28
Training Artificial Intelligence Workflows 2023-5-19 2023-9-21
Managing Storage System Replication 2023-5-19 2023-9-14
Load Balancing For A Storage System 2023-5-12 2023-9-07
Partitioning Data Into Chunk Groupings For Use In A Dispersed Storage Network 2023-5-09 2023-8-31
Managing Memory Devices in a Storage Network 2023-5-09 2023-9-07
Traffic Priority Based Creation of a Storage Volume within a Cluster of Storage … 2023-5-08 2023-8-31
Lightweight Copying Of Data Using Metadata References 2023-5-05 2023-8-31
Storage Optimization for Serverless Functions 2023-5-04 2023-8-31
Multilevel Load Balancing 2023-5-04 2023-8-31
Data Block Allocation For Storage System 2023-5-03 2023-8-31
Error Correction Incident Tracking 2023-5-01 2023-8-24
Using Mirrored Copies For Data Availability 2023-5-01 2023-8-24
Rebuilding an Encoded Data Slice Based on a Slice Integrity Value 2023-4-30 2023-8-24
Selecting Storage Units Based on Storage Pool Traits 2023-4-30 2023-8-24
Modifying Slice Storage in Flash Memory Based on Utilization Level 2023-4-30 2023-8-24
Mapping Storage Slots to a Set of Storage Units 2023-4-30 2023-8-17
Migrating Applications To A Cloud-Computing Environment 2023-4-25 2023-8-17
Low Latency Reads Using Cached Deduplicated Data 2023-4-24 2023-8-17
Storage System With Distributed Deletion 2023-4-21 2023-8-10
Cost Considerate Placement Of Data Within A Pool Of Storage Resources 2023-4-20 2023-8-17
Copying Data Using References To The Data 2023-4-20 2023-9-21
Sharing Encryption Information Amongst Storage Devices In A Storage System 2023-4-18 2023-8-10
Transitioning Between Source Data Repositories For A Dataset 2023-4-10 2023-8-03
Uniform Model For Distinct Types Of Data Replication 2023-4-07 2023-8-24
Selecting Storage Resources Based On Data Characteristics 2023-4-06 2023-8-03
Deallocated Block Determination 2023-4-06 2023-8-03
Data Rebuild Based On Solid State Memory Characteristics 2023-4-03 2023-8-10
Preventing Applications From Overconsuming Shared Storage Resources 2023-4-03 2023-7-27
Managing Correlated Outages in a Dispersed Storage Network 2023-3-29 2023-7-27
Similar Block Detection-based Detection of a Ransomware Attack 2023-3-29 2023-8-10
Calculating Storage Utilization For Distinct Types Of Data 2023-3-27 2023-8-17
Efficient Replication Based On Dataset Versioning 2023-3-27 2023-8-10
Performing Low Latency Operations Using A Distinct Set Of Resources 2023-3-27 2023-8-10
Maintaining Object Policy Implementation Across Different Storage Systems 2023-3-27 2023-7-27
Storage of Data Objects with a Common Trait in a Storage Network 2023-3-27 2023-7-20
Hyper-convergence with scheduler extensions for software-defined container … 2023-3-24 2023-7-20
Tiering Valid Data after a Disaster Recovery Operation 2023-3-20 2023-7-20
Selectable Write Paths With Different Formatted Data 2023-3-17 2023-7-13
Allocation Of Differing Erase Block Sizes 2023-3-13 2023-9-07
Synchronized Vault Management In A Distributed Storage Network 2023-3-10 2023-7-06
Erasure Coded Data Within Zoned Drives 2023-3-10 2023-7-06
Rebuilding Data Slices in a Storage Network Based on Priority 2023-3-02 2023-6-29
System Having Dynamic Power Management 2023-3-01 2023-6-29
Device Host Operations In A Storage System 2023-3-01 2023-9-07
Heterogenous Memory Accommodating Multiple Erasure Codes 2023-2-27 2023-6-29
Rebuilding Missing Data in a Storage Network via Locally Decodable Redundancy … 2023-2-27 2023-6-29
Acquiring Failure Information Span 2023-2-24 2023-7-20
Determining A Performance Error For A Storage Device 2023-2-21 2023-6-22
Testing A Storage Unit In A Storage Network 2023-2-21 2023-6-29
Decommissioning Keys In A Decryption Storage System 2023-2-21 2023-6-22
Performance Impact Information For Adjusting Rate Of A Data Reconstruction … 2023-2-15 2023-6-22
Offset Protection Data In A RAID Array 2023-2-13 2023-6-22
Servicing input/output ('i/o') operations during data migration 2023-2-13 2023-6-22
Toke Based Communication 2023-2-08 2023-6-15
Error Prediction Based on Correlation Using Event Records 2023-2-06 2023-6-08
Protection of Objects in an Object-based Storage System 2023-2-06 2023-6-15
Adjusting Efficiency Of Storing Data 2023-2-03 2023-6-08
Dynamically Rebuilding Encoded Data Slices in a Storage Network 2023-2-02 2023-6-15
Data Availability in Vast Network in Event of Memory Device Failure 2023-2-01 2023-6-01
Cloud-based Providing of One or More Corrective Measures for a Storage System 2023-2-01 2023-6-15
Restoring lost data 2023-1-27 2023-8-03
Balancing Data Transfer Amongst Paths Between A Host and A Storage System 2023-1-23 2023-7-27
Utilizing Metadata To Represent Data 2023-1-23 2023-5-25
Containers as volumes in a container-aware storage system 2023-1-19 2023-7-27
Managing Copy Revisions in a Distributed Storage System 2023-1-12 2023-6-08
Profile-Based Disaster Recovery for a Containerized Application 2023-1-11 2023-6-22
Policy-Based Disaster Recovery for a Containerized Application 2023-1-11 2023-6-29
Establishing a guarantee for maintaining a replication relationship between … 2023-1-10 2023-7-13
Method for Determining the Legal Basis for Transfer of a Data Object 2023-1-09 2023-5-25
Processing Access Anomalies in a Storage Network 2023-1-03 2023-5-18
Enabling communication between a single-port device and multiple storage system … 2022-12-30 2023-7-06
Generating A Transformed Dataset For Use By A Machine Learning Model In An … 2022-12-27 2023-4-27
Generating a transformed dataset for use by a machine learning model in an … 2022-12-27 2023-9-26 2023-9-26
Migrating Similar Data To A Single Data Reduction Pool 2022-12-27 2023-5-04
Reassignment of requests for high availability 2022-12-19 2023-4-20
Delegation of data ownership 2022-12-19 2023-4-20
Temporarily Limiting Access To A Storage Device 2022-12-19 2023-4-20
Zone namespace 2022-12-19 2023-4-20
Edge accelerator card 2022-12-13 2023-8-03
Dynamic data segment sizing 2022-12-13 2023-7-27
Cloud-Based Disaster Recovery 2022-12-13 2023-4-13
Storage system with selectable write modes 2022-12-13 2023-7-13
Replicating A Storage System 2022-12-12 2023-4-06
Recovering Data In A Virtual Storage System 2022-12-08 2023-4-13
Storage Modification Process for a Set of Encoded Data Slices 2022-12-08 2023-4-06
Memory Allocation for Block Rebuilding in a Storage Network 2022-11-30 2023-3-30
Utilizing Integrity Information to Determine Corruption in a Vast Storage … 2022-11-29 2023-3-23
Similarity data for reduced data usage 2022-11-29 2023-3-23
Directing I/O To An Active Membership Of Storage Systems 2022-11-28 2023-3-23
Aggregating Audit Records in a Storage Network 2022-11-28 2023-4-13
Writing Data To Compressed And Encrypted Volumes 2022-11-23 2023-3-23
Actions for reserved filenames 2022-11-22 2023-3-16