Fremont, CA, United States of America

Yafen Peggy Chang


Average Co-Inventor Count = 5.6

ph-index = 9

Forward Citations = 365(Granted Patents)


Location History:

  • Fremont, CA (US) (2005 - 2011)
  • Sunnyvale, CA (US) (2010 - 2011)

Company Filing History:


Years Active: 2005-2011

Loading Chart...
16 patents (USPTO):Explore Patents

Title: Yafen Peggy Chang: Innovator in Data Protection Technologies

Introduction

Yafen Peggy Chang is a prominent inventor based in Fremont, CA, known for her significant contributions to data protection technologies. With a total of 16 patents to her name, she has made remarkable advancements in the field, particularly in methods and systems that enhance data storage and protection.

Latest Patents

Among her latest patents is a "Method and system for emulating tape libraries." This innovation discloses a method for emulating tape library commands in response to commands received from a data protection application. It allows existing data protection applications to copy data to and from a disk-based storage medium effectively. Another notable patent is the "Method and system for restoring a volume in a continuous data protection system." This system synchronizes a secondary volume with a primary volume, utilizing scanning, comparing, and copying means to ensure data integrity during the protection process.

Career Highlights

Yafen has worked with notable companies such as NetApp, Inc. and Network Appliance, Inc. Her experience in these organizations has allowed her to develop and refine her innovative ideas, contributing to the advancement of data protection technologies.

Collaborations

Yafen has collaborated with several professionals in her field, including Roger Keith Stager and Craig Anthony Johnston. These collaborations have further enriched her work and expanded her impact on the industry.

Conclusion

Yafen Peggy Chang's contributions to data protection technologies through her patents and collaborations highlight her role as a leading innovator in the field. Her work continues to influence the way data is managed and protected in modern computing environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…