COMMVAULT SYSTEMS, INC. Patent applications |
Patent application number | Title | Published |
20160100007 | DATA TRANSFER TECHNIQUES WITHIN DATA STORAGE DEVICES, SUCH AS NETWORK ATTACHED STORAGE PERFORMING DATA MIGRATION - A stand-alone, network accessible data storage device, such as a filer or NAS device, is capable of transferring data objects based on portions of the data objects. The device transfers portions of files, folders, and other data objects from a data store within the device to external secondary storage based on certain criteria, such as time-based criteria, age-based criteria, and so on. A portion may be one or more blocks of a data object, or one or more chunks of a data object, or other segments that combine to form or store a data object. For example, the device identifies one or more blocks of a data object that satisfy a certain criteria, and migrates the identified blocks to external storage, thereby freeing up storage space within the device. The device may determine that a certain number of blocks of a file have not been modified or called by a file system in a certain time period, and migrate these blocks to secondary storage. | 04-07-2016 |
20160041997 | DATA STORAGE SYSTEM FOR ANALYSIS OF DATA ACROSS HETEROGENEOUS INFORMATION MANAGEMENT SYSTEMS - Systems and methods for generating customized reports from data storage databases and other information management system databases. The methods include normalizing queried information from different types of information management system databases to enable system-wide report generation. Other implementations are disclosed. | 02-11-2016 |
20160034506 | METHOD AND SYSTEM FOR OFFLINE INDEXING OF CONTENT AND CLASSIFYING STORED DATA - A method and system for creating an index of content without interfering with the source of the content includes an offline content indexing system that creates an index of content from an offline copy of data. The system may associate additional properties or tags with data that are not part of traditional indexing of content, such as the time the content was last available or user attributes associated with the content. Users can search the created index to locate content that is no longer available or based on the associate attributes. | 02-04-2016 |
20150350321 | OFFLINE MESSAGING BETWEEN A REPOSITORY STORAGE OPERATION CELL AND REMOTE STORAGE OPERATION CELLS VIA AN INTERMEDIARY MEDIA AGENT - Offline messaging between a repository storage operation cell and one or more mobile/remote storage operation cells is disclosed. The repository cell is managed by a repository storage manager that communicates to and from the remote cell via a specially-configured media agent. The illustrative intermediary media agent is configured to: queue messages directed to the remote cell, process them according to applicable parameters (e.g., time-to-live constraints, updates, cancellations, etc.), and transmit the processed messages to the remote cell when connectivity is available. The intermediary media agent also relays messages from the remote cell to the repository, including responses by the remote to the processed messages received from the repository via the intermediary media agent. | 12-03-2015 |
20150324255 | LOAD BALANCING ACROSS MULTIPLE DATA PATHS - Multiple data paths may be available to a data management system for transferring data between a primary storage device and a secondary storage device. The data management system may be able to gain operational advantages by performing load balancing across the multiple data paths. The system may use application layer characteristics of the data for transferring from a primary storage to a backup storage during data backup operation, and correspondingly from a secondary or backup storage system to a primary storage system during restoration. | 11-12-2015 |
20150301903 | CROSS-SYSTEM, USER-LEVEL MANAGEMENT OF DATA OBJECTS STORED IN A PLURALITY OF INFORMATION MANAGEMENT SYSTEMS - Systems and methods are disclosed for cross-system user-level management of data objects stored in one or more information management systems, and for user-level management of data storage quotas in information management systems, including data objects in secondary storage. An illustrative quota manager is associated with one or more information management systems. The quota manager comprises a quota value representing the maximum amount of data storage allowed for a given end-user's primary and secondary data in the one or more information management systems. The quota manager determines whether data associated with the end-user has exceeded the storage quota, and if so, prompts the end-user to select data for deletion, the deletion to be implemented globally, across the primary and secondary storage subsystems of the respective one or more information management systems. Meanwhile, so long as the quota is exceeded, the quota manager instructs storage managers to block backups of end-user's data. | 10-22-2015 |
20150286537 | INFORMATION MANAGEMENT BY A MEDIA AGENT IN THE ABSENCE OF COMMUNICATIONS WITH A STORAGE MANAGER - A media agent is configured to perform substantially autonomously to initiate, continue, and manage information management operations such as a backup job of a certain client's primary data, manage the operations, and generate and store resultant system-level metadata from the operations, etc. The media agent is configured to do this even when out of communication with the storage manager that manages the information management system. When communications are restored, the media agent reports the relevant metadata to the storage manager. The storage manager comprises corresponding enhancements, including specialized logic for identifying the media agent as an intelligent media agent capable of some autonomous functionality, for transmitting management parameters thereto, and for seamlessly integrating the received metadata into the storage manager's associated management infrastructure such as a management database. | 10-08-2015 |
20150286536 | INFORMATION MANAGEMENT BY A MEDIA AGENT IN THE ABSENCE OF COMMUNICATIONS WITH A STORAGE MANAGER - A media agent is configured to perform substantially autonomously to initiate, continue, and manage information management operations such as a backup job of a certain client's primary data, manage the operations, and generate and store resultant system-level metadata from the operations, etc. The media agent is configured to do this even when out of communication with the storage manager that manages the information management system. When communications are restored, the media agent reports the relevant metadata to the storage manager such that the storage manager may seamlessly integrate the information into its management information infrastructure. | 10-08-2015 |
20150268876 | EFFICIENT INFORMATION MANAGEMENT PERFORMED BY A CLIENT IN THE ABSENCE OF A STORAGE MANAGER - Systems and methods are disclosed for information management, which are performed substantially autonomously by a client in the absence of a storage manager connection, and which are also streamlined to operate efficiently when the storage manager connection is restored. The illustrative client, comprising specialized logic for operating autonomously, generates secondary copies of production data that are compatible with the information management system. The client stores the secondary copies to local fast-access primary storage technology. When connected to an appropriate media agent and to the storage manager, the client moves to efficiently offload the secondary data to a proper secondary storage subsystem. The client aggregates the locally-stored secondary copies into a consolidated data structure, which it transmits to the media agent in the form of a single job. The media agent may process the single job in accordance with governing information management policies, and reports status and metadata to the storage manager. Thus, the protected data is absorbed into the information management system completely and efficiently, with minimal drain on the processing resources of the client and the other components. | 09-24-2015 |
20150261792 | MAINTAINING A DEDUPLICATION DATABASE - An information management system can modify working copies of database entries residing in a local database of a secondary storage computing device in response to instructions to modify the database entries residing in a deduplication database. If the working copy does not already reside in the local database, a copy of the database entry, or portion thereof, from the deduplication database can be used to generate the working copy. Based on a desired policy, the working copies in the local database can be merged with the actual database entries in the deduplication database. | 09-17-2015 |
20150261776 | MANAGING DELETIONS FROM A DEDUPLICATION DATABASE - An information management system can manage the removal of data block entries in a deduplicated data store using working copies of the data block entries residing in a local data store of a secondary storage computing device. The system can use the working copies to identify data blocks for removal. Once the deduplication database is updated with the changes to the working copies (e.g., using a transaction based update scheme), the system can query the deduplication database for the database entries identified for removal. Once identified, the system can remove the database entries identified for pruning and/or the corresponding deduplication data blocks from secondary storage. | 09-17-2015 |
20150261768 | SYSTEMS AND METHODS FOR PROTECTING EMAIL DATA - Aspects of this disclosure relate to protecting email data. For example, email protection rules can instruct an email server to route an email to an email protection module. The one or more email rules can identify a group of one or more email addresses. The email protection module can receive an email from the email server that has an email address of the group as an intended receipt. The email protection module can route the email to secondary storage and store the email in secondary storage to create a secondary copy of the email. The secondary copy can be stored inline to persistent memory of secondary storage, according to certain embodiments. Access to the backup copy of the email stored to the persistent memory can be controlled, for example, based on whether a user had permission to access to the email when the email was sent. | 09-17-2015 |
20150256617 | CROSS-SYSTEM STORAGE MANAGEMENT FOR TRANSFERRING DATA ACROSS AUTONOMOUS INFORMATION MANAGEMENT SYSTEMS - Systems and methods are disclosed for cross-system storage management for transferring data across autonomous information management systems. Data may be transferred from one information management system to another information management system without interfering with or overriding each system's autonomy. For example, a secondary copy of production data (e.g., backed up data) is transferred from a first information management system that originated the data to a component of another “foreign” information management system. A first storage manager that manages the first information management system also manages the cross-system data transfer operation to a “foreign” client computing device, which remains under autonomous management as a component of the foreign information management system. | 09-10-2015 |
20150244775 | WORK FLOW MANAGEMENT FOR AN INFORMATION MANAGEMENT SYSTEM - Disclosed herein are systems and methods for managing information management operations. The system may be configured to employ a work flow queue to reduce network traffic and manage server processing resources. The system may also be configured to forecast or estimate information management operations based on estimations of throughput between computing devices scheduled to execute one or more jobs. The system may also be configured to escalate or automatically reassign notification of system alerts based on the availability of system alert recipients. Various other embodiments are also disclosed herein. | 08-27-2015 |
20150242264 | AUTOMATIC ALERT ESCALATION FOR AN INFORMATION MANAGEMENT SYSTEM - Disclosed herein are systems and methods for managing information management operations. The system may be configured to employ a work flow queue to reduce network traffic and manage server processing resources. The system may also be configured to forecast or estimate information management operations based on estimations of throughput between computing devices scheduled to execute one or more jobs. The system may also be configured to escalate or automatically reassign notification of system alerts based on the availability of system alert recipients. Various other embodiments are also disclosed herein. | 08-27-2015 |
20150242263 | DATAFLOW ALERTS FOR AN INFORMATION MANAGEMENT SYSTEM - Disclosed herein are systems and methods for managing information management operations. The system may be configured to employ a work flow queue to reduce network traffic and manage server processing resources. The system may also be configured to forecast or estimate information management operations based on estimations of throughput between computing devices scheduled to execute one or more jobs. The system may also be configured to escalate or automatically reassign notification of system alerts based on the availability of system alert recipients. Various other embodiments are also disclosed herein. | 08-27-2015 |
20150212897 | SNAPSHOT READINESS CHECKING AND REPORTING - An information management system according to certain aspects may determine whether snapshot operations will work prior to executing them. The system may check various factors or parameters relating to a snapshot storage policy to verify whether the storage policy will work at runtime without actually executing the policy. Some examples of factors can include: availability of primary storage devices for which a snapshot should be obtained, availability of secondary storage devices, license availability for snapshot software, user credentials for connecting to primary and/or second storage devices, available storage capacity, connectivity to storage devices, etc. The system may also check whether a particular system configuration is supported in connection with snapshot operations. The result of the determination can be provided in the form of a report summarizing any problems found with the snapshot storage policy. The report can include recommended courses of action or solutions for resolving any identified issues. | 07-30-2015 |
20150212896 | DATABASE APPLICATION BACKUP IN SINGLE SNAPSHOT FOR MULTIPLE APPLICATIONS - An information management system according to certain aspects may be configured to generate a snapshot of data relating to a plurality of applications. Data generated by the plurality of applications may be stored in a logical volume in primary storage. The system may include a plurality of data agents including a database data agent associated with a database application that can be configured to back up one or more log files of a database log separately from data of the database application. The system may also include a snapshot manager configured to: in response to receiving notifications from the plurality of data agents that the associated applications are in consistent states, obtain a snapshot of the logical volume; generate mapping information between a particular application of the plurality of applications and a portion of the snapshot relating to the particular application; and truncate the database log of the database application. | 07-30-2015 |
20150212895 | GENERATING MAPPING INFORMATION FOR SINGLE SNAPSHOT FOR MULTIPLE APPLICATIONS - An information management system according certain aspects may be configured to generate a snapshot of data relating to a plurality of applications. The system may include first and second data agents associated with first and second applications, respectively. The system may also include a snapshot manager configured to: in response to receiving notifications from the first and second data agents that the first and second applications are in consistent states: obtain a snapshot of the logical volume including data generated by the first and second applications; generate mapping information between the first application and a portion of the snapshot relating to the first application based at least in part on metadata obtained by the first data agent; and generate mapping information between the second application and a portion of the snapshot relating to the second application based at least in part on metadata obtained by the second data agent. | 07-30-2015 |
20150212894 | RESTORING APPLICATION DATA FROM A SINGLE SNAPSHOT FOR MULTIPLE APPLICATIONS - An information management system according to certain aspects may be configured to restore data of an application from a snapshot including data of a plurality of applications. The system may include a snapshot manager configured to: receive instructions to restore data of a first application from a snapshot in secondary storage, the snapshot comprising data of a plurality of applications stored in a logical volume in primary storage at a first time, the plurality of applications comprising the first application and executing on a client computing device at the first time, the plurality of applications being in consistent states at the first time; access mapping information that maps data of the first application in the snapshot to the first application; locate a portion of the snapshot corresponding to the data of the first application to be restored; and copy the portion of the snapshot from the secondary storage. | 07-30-2015 |
20150212893 | SINGLE SNAPSHOT FOR MULTIPLE APPLICATIONS - An information management system according to certain aspects may be configured to generate a snapshot of data relating to a plurality of applications. The system may include a plurality of data agents, wherein each data agent is associated with at least one of a plurality of applications, and data generated by the plurality of applications is stored in a logical volume in primary storage. The system may also include a snapshot manager configured to detect the plurality of applications; check with the plurality of data agents whether the associated applications are in consistent states; obtain a snapshot of the logical volume in response to receiving notifications from the plurality of data agents that the associated applications are in consistent states; and generate mapping information between a particular one of the plurality of applications and a portion of the snapshot relating to the particular one of the plurality of applications. | 07-30-2015 |
20150193229 | EFFICIENT PROPAGATION OF SOFTWARE BASED ON SNAPSHOT TECHNOLOGIES ENABLING MORE EFFICIENT INFORMAL SOFTWARE BUILDS - Systems and methods are disclosed that substantially overcome the long delays and unproductive cycle time inherent in managing an informal (friendly) build platform. The systems and methods disclosed herein ensure that an official software base residing on a production machine propagates efficiently to the machine that generates the friendly builds, and furthermore, the friendly-build machine experiences minimal unproductive cycle time between successive friendly builds. Accordingly, developers experience improved access to, and more efficient use of, the computing device that generates the friendly executables. | 07-09-2015 |
20150127995 | SYSTEMS AND METHODS FOR DIFFERENTIAL HEALTH CHECKING OF AN INFORMATION MANAGEMENT SYSTEM - Differential health-check systems and accompanying methods provide health-checking and reporting of one or more information management systems in reference to a first time period before and a second time period after a triggering event. A triggering event may be an upgrade of at least part of the information management system, or a restore operation completed in the information management system for example following a disaster, or any number of other events, etc. The health-checking and reporting may comprise a comparison of one or more performance metrics of one or more components and/or operations of the information management system during the first and second time periods. | 05-07-2015 |
20150127804 | SYSTEMS AND METHODS FOR DIFFERENTIAL HEALTH CHECKING OF AN INFORMATION MANAGEMENT SYSTEM - Differential health-check systems and accompanying methods provide health-checking and reporting of one or more information management systems in reference to a first time period before and a second time period after a triggering event. A triggering event may be an upgrade of at least part of the information management system, or a restore operation completed in the information management system for example following a disaster, or any number of other events, etc. The health-checking and reporting may comprise a comparison of one or more performance metrics of one or more components and/or operations of the information management system during the first and second time periods. | 05-07-2015 |
20150074060 | FILE MANAGER INTEGRATION WITH VIRTUALIZATION IN AN INFORMATION MANAGEMENT SYSTEM WITH AN ENHANCED STORAGE MANAGER, INCLUDING USER CONTROL AND STORAGE MANAGEMENT OF VIRTUAL MACHINES - A storage manager that interoperates with a file manager application that integrates with virtualization substantially enables end-user control and storage management of virtual machines (VMs). The storage manager may manage information management operations relative to virtual machines based on and/or in response to messages and/or instructions received from the file manager application. The storage manager may further report results to the file manager application for presentation to the user. The file manager application, which may operate as a plug-in for a legacy file manager executing on a user's client computing device, may comprise: displaying the VMs associated with the user, including their respective properties; enabling viewing/browsing of information about storage management operations for a VM such as backups and/or archiving, including files associated with the VM and searching and filtering criteria; control features that enable the user to control existing VMs, such as shut down, restart/activate/power-on, suspend, and/or re-configure, and also perform storage management of a VM and/or its associated files, such as create snapshot, back up, archive, restore VM from secondary storage, restore and overwrite VM, restore file(s)/folder(s) to user's client computing device, restore file(s)/folder(s) to a production VM in primary storage, etc.; control features that enable the user to provision additional VMs, such as create a new VM, create a clone VM, configure a VM, etc. | 03-12-2015 |
20140358944 | ASSESSING USER PERFORMANCE IN A COMMUNITY OF USERS OF DATA STORAGE RESOURCES - According to certain aspects, a method of assessing users of a data storage system can include receiving configuration information relating to a deployed configuration of a first data storage cell and including number of installed data storage hardware and/or software components, the first data storage cell comprising a plurality of client computing devices and being configured to create and store one or more secondary copies of primary data generated by the plurality of client computing devices. The method may also include receiving information relating to an incident opened by a user of the first data storage cell. The method may further include updating a performance metric associated with the user to a new value to reflect a negative impact on the performance metric resulting from the opening of the incident by the user, wherein the degree of the negative impact is based at least in part on the configuration information. | 12-04-2014 |
20140358935 | SYSTEMS AND METHODS FOR USING METADATA TO ENHANCE DATA IDENTIFICATION OPERATIONS - Systems and methods for managing electronic data are disclosed. Various data management operations can be performed based on a metabase formed from metadata. Such metadata can be identified from an index of data interactions generated by a journaling module, and obtained from their associated data objects stored in one or more storage devices. In various embodiments, such processing of the index and storing of the metadata can facilitate, for example, enhanced data management operations, enhanced data identification operations, enhanced storage operations, data classification for organizing and storing the metadata, cataloging of metadata for the stored metadata, and/or user interfaces for managing data. In various embodiments, the metabase can be configured in different ways. For example, the metabase can be stored separately from the data objects so as to allow obtaining of information about the data objects without accessing the data objects or a data structure used by a file system. | 12-04-2014 |
20140351219 | SYSTEMS AND METHODS FOR RETRIEVING DATA IN A COMPUTER NETWORK - A data retrieval system comprising a first computing device communicatively coupled to a second computing device; the first computing device having a processor that supports operation of at least one software application that is used for retrieving data; the second computing device communicatively coupled to one or more storage media; the software application having a retrieval module for retrieving data from the one or more storage media; a storage and backup map that maps to the second computing device; and a data index stored on the second computing device that indicates to the retrieval module a particular location of the data that is to be retrieved by the retrieval module. | 11-27-2014 |
20140337664 | USE OF TEMPORARY SECONDARY COPIES IN FAILOVER OPERATIONS - According to certain aspects, an information management cell can include a failover storage manager configured to: instruct a secondary copy application to perform a secondary copy operation in which primary data generated by at least one client computing device is stored as a secondary copy in a second secondary copy file format different than a first secondary copy file format; and subsequent to reestablishment of connectivity to a main storage manager, restore the secondary copy stored in the second secondary copy file format to obtain restored data that is no longer in the second secondary copy file format; and can include at least one secondary storage computing device configured to, subsequent to the restore of the secondary copy, and at the direction of the main storage manager, conduct the restored data to a secondary storage device(s) to create a secondary copy in the first secondary copy file format. | 11-13-2014 |
20140337663 | INFORMATION MANAGEMENT CELL WITH FAILOVER MANAGEMENT CAPABILITY - According to certain aspects, an information management cell with failover management capability can include secondary storage computing devices configured to conduct primary data from a primary storage device(s) to a secondary storage device(s) during secondary copy operations, at the direction of a remote storage manager, wherein a first secondary storage computing device implements a failover storage manager configured to, in the event of a loss of connectivity between the cell and the remote storage manager: access a stored storage policy; initiate a first secondary copy operation according to the storage policy in which the first secondary storage computing device is involved in the creation of a first secondary copy on the secondary storage device(s); and initiate a second secondary copy operation according to the storage policy in which a second secondary storage computing device is involved in the creation of a second secondary copy on the secondary storage device(s). | 11-13-2014 |
20140337662 | USE OF AUXILIARY DATA PROTECTION SOFTWARE IN FAILOVER OPERATIONS - According to certain aspects, an information management cell can include at least one secondary storage computing device configured to conduct primary data generated by at least one client computing device to a secondary storage device(s) as part of secondary copy operations, wherein the secondary storage computing device normally operates to conduct primary data to the secondary storage device(s) for storage as a secondary copy in a first secondary copy file format, at the direction of a main storage manager; and can include a failover storage manager configured to activate in response to loss of connectivity between the cell and the main storage manager, and instruct a secondary copy application to perform a secondary copy operation in which the primary data generated by the at least one client computing device is stored as a secondary copy in a second secondary copy file format different than the first secondary copy file format. | 11-13-2014 |
20140337285 | SYNCHRONIZATION OF LOCAL SECONDARY COPIES WITH A REMOTE STORAGE MANAGEMENT COMPONENT - According to certain aspects, an information management cell with failover management capability can include secondary storage computing devices configured to conduct primary data from a primary storage device(s) to a secondary storage device(s) during secondary copy operations, at the direction of a remote storage manager, wherein a first secondary storage computing device implements a failover storage manager configured to, in the event of a loss of connectivity between the cell and the remote storage manager: access a stored storage policy; initiate first and secondary copy operations according to the storage policy in which the first and second secondary storage computing devices are each involved in the creation of a first and second secondary copies; and subsequent to reestablishment of connectivity between the cell and the remote storage manager, transmit synchronization information associated with the secondary copy operations to the remote storage manager. | 11-13-2014 |
20140310247 | MANAGING MULTI-SOURCE RESTORE OPERATIONS IN AN INFORMATION MANAGEMENT SYSTEM - According to certain aspects, an information management system may instruct a first secondary storage computing device in a set of secondary storage computing devices to initiate a restore of a first group of a plurality of files from a first storage device associated with the first secondary storage computing device, the first group including a first file. The computing system may instruct a second secondary storage computing device in the set to initiate a restore a second group of the plurality of files from a second storage device associated with the second secondary storage computing device, the second group including the first file. The computing system can, upon receiving notification that the restore of the first file from the first storage device has completed prior to completion of the restore of the first file from the second storage device, cancel restoration of the first file from the second storage device. | 10-16-2014 |
20140310246 | MULTI-SOURCE RESTORE IN AN INFORMATION MANAGEMENT SYSTEM - According to certain aspects, an information management system may identify a set of secondary storage computing devices residing in a secondary storage subsystem, wherein each of at least two storage devices that each store a separate copy of a first file is associated with at least one of the secondary storage computing devices in the set. The system may also select a subset of the set of secondary storage computing devices based on stored selection criteria. The system can, using a first secondary storage computing device, initiate a restore operation of a first copy of the first file stored in a first storage device associated with at least the first secondary storage computing device and, using a second secondary storage computing device, initiate a restore operation of a second copy of the first file stored in a second storage device associated with at least the second secondary storage computing device. | 10-16-2014 |
20140310219 | SYSTEMS AND METHODS FOR STORAGE MODELING AND COSTING - The present invention provides systems and methods for data storage. A hierarchical storage management architecture is presented to facilitate data management. The disclosed system provides methods for evaluating the state of stored data relative to enterprise needs by using weighted parameters that may be user defined. Also disclosed are systems and methods evaluating costing and risk management associated with stored data. | 10-16-2014 |
20140281545 | MULTI-LAYER EMBEDDED ENCRYPTION - A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension. | 09-18-2014 |
20140281519 | ENCRYPTED FILE BACKUP - A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension. | 09-18-2014 |
20140281518 | MULTI-TIER FILE RESTORATION - A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension. | 09-18-2014 |
20140281517 | FILE BACKUP WITH SELECTIVE ENCRYPTION - A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension. | 09-18-2014 |
20140281516 | AUTOMATIC FILE DECRYPTION - A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension. | 09-18-2014 |
20140281515 | ENCRYPTED FILE PRESENTATION - A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension. | 09-18-2014 |
20140281514 | AUTOMATIC FILE ENCRYPTION - A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension. | 09-18-2014 |
20140279922 | DATA PROTECTION SCHEDULING, SUCH AS PROVIDING A FLEXIBLE BACKUP WINDOW IN A DATA PROTECTION SYSTEM - A data protection scheduling system provides a flexible or rolling data protection window that analyzes various criteria to determine an optimal or near optimal time for performing data protection or secondary copy operations. While prior systems may have scheduled backups at an exact time (e.g., 2:00 a.m.), the system described herein dynamically determines when to perform the backups and other data protection storage operations, such as based on network load, CPU load, expected duration of the storage operation, rate of change of user activities, frequency of use of affected computer systems, trends, and so on. | 09-18-2014 |
20140258236 | SINGLE INDEX TO QUERY MULTIPLE BACKUP FORMATS - The disclosed techniques include generation of a single index table when backing up data in a first backup format to a backup storage system that uses a second backup format. Using the single index table, a query for a data item can be answered by searching the single index table. The single index table avoids having to search through multiple index tables, each corresponding to a different backup format that may be used for backing up the searched data item. | 09-11-2014 |
20140250123 | INTERFACE SYSTEMS AND METHODS FOR ACCESSING STORED DATA - A modular data and storage management system. The system includes a time variance interface that provides for storage into a storage media of data that is received over time. The time variance interface of the modular data and storage management system provides for retrieval, from the storage media, of an indication of the data corresponding to a user specified date. The retrieved indication of the data provides a user with an option to access specific information relative to the data, such as content of files that are included in the data. | 09-04-2014 |
20140250093 | SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUALIZATION DATA - Described in detail herein is a method of copying data of one or more virtual machines being hosted by one or more non-virtual machines. The method includes receiving an indication that specifies how to perform a copy of data of one or more virtual machines hosted by one or more virtual machine hosts. The method may include determining whether the one or more virtual machines are managed by a virtual machine manager that manages or facilitates management of the virtual machines. If so, the virtual machine manager is dynamically queried to automatically determine the virtual machines that it manages or that it facilitates management of. If not, a virtual machine host is dynamically queried to automatically determine the virtual machines that it hosts. The data of each virtual machine is then copied according to the specifications of the received indication. | 09-04-2014 |
20140250088 | SYSTEMS AND METHODS FOR BYTE-LEVEL OR QUASI BYTE-LEVEL SINGLE INSTANCING - Described in detail herein are systems and methods for deduplicating data using byte-level or quasi byte-level techniques. In some embodiments, a file is divided into multiple blocks. A block includes multiple bytes. Multiple rolling hashes of the file are generated. For each byte in the file, a searchable data structure is accessed to determine if the data structure already includes an entry matching a hash of a minimum sequence length. If so, this indicates that the corresponding bytes are already stored. If one or more bytes in the file are already stored, then the one or more bytes in the file are replaced with a reference to the already stored bytes. The systems and methods described herein may be used for file systems, databases, storing backup data, or any other use case where it may be useful to reduce the amount of data being stored. | 09-04-2014 |
20140250076 | IMAGE LEVEL COPY OR RESTORE, SUCH AS IMAGE LEVEL RESTORE WITHOUT KNOWLEDGE OF DATA OBJECT METADATA - A system and method for performing an image level restore of data is described. In some examples, the system receives a request to restore a file and transmits the request to an intermediate component. The intermediate component may then retrieve a directory file from an image of a secondary copy of a data set, identify a location of the file from the directory file, and provide the location to the requestor. | 09-04-2014 |
20140244955 | SYSTEM AND METHOD FOR ALLOCATION OF ORGANIZATIONAL RESOURCES - System and methods for storing electronic data is provided, where the system comprises a storage manager component and a management module associated with the storage manager component. The management module is configured to receive information related to storage activities associated with one or more storage operation components within the storage operation system under the direction of the storage manager component. The management module is adapted to predict storage operation resource allocations based on the received information related to the storage activities. | 08-28-2014 |
20140244587 | SYSTEMS AND METHODS FOR PERFORMING STORAGE OPERATIONS IN A COMPUTER NETWORK - Methods and systems are described for performing storage operations on electronic data in a network. In response to the initiation of a storage operation and according to a first set of selection logic, a media management component is selected to manage the storage operation. In response to the initiation of a storage operation and according to a second set of selection logic, a network storage device to associate with the storage operation. The selected media management component and the selected network storage device perform the storage operation on the electronic data. | 08-28-2014 |
20140244586 | SYSTEMS AND METHODS FOR CONTINUOUS DATA REPLICATION - Systems and methods for intelligent data replication are provided, which may include the identification and use of consistency points in application data, such that one or more replication volumes may be created using an “application aware” replication process that allows the system to intelligently replicate data or other information (e.g., metadata) relating to a particular process, application or specified set of data. | 08-28-2014 |
20140236900 | SYSTEMS AND METHODS FOR PERFORMING REPLICATION COPY STORAGE OPERATIONS - A system and method are provided for performing storage operations relating to a first secondary copy of electronic data. A storage policy or storage preferences may dictate that a replication copy should be used in storage operations performed to a particular client, sub-client, data, media or other item. Based on the storage policy, when a new client, sub-client, data, media or other item is received, a media agent determines whether there is a replication copy of the item. In the absence of a replication copy, one may be created. The replication copy may be provided by a third party application, or created by the client or a storage management system component. Information regarding the replication copy and its corresponding first secondary copy may be stored in a database. To optimize use of system resources, storage operations relating to the first secondary copy may be performed using the replication copy instead of the first secondary copy. | 08-21-2014 |
20140233366 | SYSTEM AND METHOD FOR STORING REDUNDANT INFORMATION - A method and system for reducing storage requirements and speeding up storage operations by reducing the storage of redundant data includes receiving a request that identifies one or more data objects to which to apply a storage operation. For each data object, the storage system determines if the data object contains data that matches another data object to which the storage operation was previously applied. If the data objects do not match, then the storage system performs the storage operation in a usual manner. However, if the data objects do match, then the storage system may avoid performing the storage operation. | 08-21-2014 |
20140222759 | UTILIZING SNAPSHOTS FOR ACCESS TO DATABASES AND OTHER APPLICATIONS - A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly. | 08-07-2014 |
20140215640 | SYSTEM AND METHOD FOR STORAGE OPERATION ACCESS SECURITY - A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a system to inform the proper access control that should be applied to data stored outside of its original location, such as a data backup. The storage access control system may place similar access control restrictions on the backup files that existed on the original files. In this way, the backed up data is given similar protection as that of the original data. | 07-31-2014 |
20140201485 | PST FILE ARCHIVING - According to certain aspects, systems and methods for archiving and/or backing up PST files or other mail or calendar data, or the like (“off-line mail data”) are provided. Off-line mail data can be searched for in a client computer system, a copy of which may be transferred to secondary storage. Further, emails, contacts, calendar data, and/or the like (e.g., Microsoft Outlook data) contained in the transferred off-line mail data may be extracted, wherein it is determined whether copies of the data already exist backup data. Off-line mail data that already exists in backup can be deleted from the PST file. Following back-up of the off-line mail data, the backed up file may be deleted from the client system and/or the creation of future off-line mail files may be disabled. | 07-17-2014 |
20140201250 | SYSTEMS AND METHODS FOR WRITING DATA AND STORAGE SYSTEM SPECIFIC METADATA TO NETWORK ATTACHED STORAGE DEVICE - A system and method for communicating, browsing, verifying and routing data in storage operation systems using network attached storage devices is provided. In some embodiments, the system may include a management module and a media management component connected to the management server, which interoperate with network attached storage devices to provide the communicating, browsing, verifying and routing functions. | 07-17-2014 |
20140201171 | HIGH AVAILABILITY DISTRIBUTED DEDUPLICATED STORAGE SYSTEM - A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable. | 07-17-2014 |
20140201170 | HIGH AVAILABILITY DISTRIBUTED DEDUPLICATED STORAGE SYSTEM - A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable. | 07-17-2014 |
20140201162 | SYSTEMS AND METHODS TO RESTORE SELECTED FILES FROM BLOCK-LEVEL BACKUP FOR VIRTUAL MACHINES - A data storage system restores selected virtual machine files from a block-level backup without restoring blocks associated with files other than the selected virtual machine file. The system identifies the one or more blocks associated with a selected file from a file index that is created during the block-level backup of the virtual machine by accessing the file allocation tables of the underlying host system and associating the locations of the blocks with the file information from the file allocation table for the virtual files of the virtual machine. The system further restores the identified blocks without restoring blocks associated with files other than the selected file and/or file version, recreates the selected file from the restored blocks, and presents the restored file to the user. | 07-17-2014 |
20140201161 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 07-17-2014 |
20140201160 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 07-17-2014 |
20140201159 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 07-17-2014 |
20140201157 | SYSTEMS AND METHODS FOR RULE-BASED VIRTUAL MACHINE DATA PROTECTION - A data storage system backs up or protects virtual machines. For instance, the system identifies the different virtual machines executing in the system and provides a number of factors that can be used to create a backup policy. The system further creates specific rules for virtual machine backup policies using a user interface with drop down boxes of relevant criteria and Boolean operators. A preview of included virtual machines allows the rule to be refined. Particular virtual machines can be excluded during the preview. The system further dynamically updates the list of virtual machines satisfying the rules at time of backup. | 07-17-2014 |
20140201155 | PARTIAL FILE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement partial file restore, where only a portion of the secondary copy of a file is restored. Such portion may be designated by one or more application offsets for the file. The system may provide an in-chunk index that includes mapping information between the application offsets and the secondary copy offsets. Chunks may refer to logical data units in which secondary copies are stored, and the in-chunk index for a chunk may be stored in secondary storage with the chunk. Because the mapping information may not be provided at a fixed interval, the system can search through application offsets in the in-chunk index to locate the secondary copy offset corresponding to the portion application offset(s). In this manner, the system may restore the designated portion of the secondary copy in a fast and efficient manner by using the in-chunk index. | 07-17-2014 |
20140201154 | SHARING OF SECONDARY STORAGE DATA - An information management system according to certain aspects allows users to share a portion of a file (e.g., a document) stored in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The system according to certain aspects provides a native view of secondary storage data on a client computing device. The index data and/or metadata relating to secondary storage data may be stored in native application format for access via the native source application. | 07-17-2014 |
20140201153 | PARTIAL FILE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement partial file restore, where only a portion of the secondary copy of a file is restored. Such portion may be designated by one or more application offsets for the file. The system may provide an in-chunk index that includes mapping information between the application offsets and the secondary copy offsets. Chunks may refer to logical data units in which secondary copies are stored, and the in-chunk index for a chunk may be stored in secondary storage with the chunk. Because the mapping information may not be provided at a fixed interval, the system can search through application offsets in the in-chunk index to locate the secondary copy offset corresponding to the portion application offset(s). In this manner, the system may restore the designated portion of the secondary copy in a fast and efficient manner by using the in-chunk index. | 07-17-2014 |
20140201152 | SYSTEMS AND METHODS TO PROCESS BLOCK-LEVEL BACKUP FOR SELECTIVE FILE RESTORATION FOR VIRTUAL MACHINES - A data storage system protects virtual machines using block-level backup operations and restores the data at a file level. The system accesses the virtual machine file information from the file allocation table of the host system underlying the virtualization layer. A file index associates this virtual machine file information with the related protected blocks in a secondary storage device during the block-level backup. Using the file index, the system can identify the specific blocks in the secondary storage device associated with a selected restore file. As a result, file level granularity for restore operations is possible for virtual machine data protected by block-level backup operations without restoring more than the selected file blocks from the block-level backup data. | 07-17-2014 |
20140201151 | SYSTEMS AND METHODS TO SELECT FILES FOR RESTORATION FROM BLOCK-LEVEL BACKUP FOR VIRTUAL MACHINES - A data storage system receives a user instruction through a user interface to restore a specific virtual machine file from a block-level backup. The system accesses a file index which is created during the block-level backup by accessing the file allocation table of the underlying host system and associating the blocks with the file location information of the virtual machine files stored in the file allocation table. The system further creates a file level table based at least in part on the virtual machine file information stored in the file index, displays a listing of the virtual machine files from the file level table, and receives a user selected virtual machine file to restore. | 07-17-2014 |
20140201150 | SINGLE SNAPSHOT FOR MULTIPLE AGENTS - A data storage system according to certain aspects can share a single snapshot for multiple applications and/or agents. For example, the data storage system can receive snapshot commands from multiple applications and/or agents, and can group them for a single snapshot (e.g., based on time of receipt of the snapshot commands). Data associated with the multiple applications and/or agents may reside on a single LUN or volume. The data storage system can take a single snapshot of the LUN or volume, and generate metadata regarding which portion of the snapshot is related to which application. The single snapshot can be stored in one or more secondary storage devices. The single snapshot may be partitioned into portions relating to different applications and stored separately. | 07-17-2014 |
20140201144 | CRITERIA-BASED DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 07-17-2014 |
20140201142 | PARTIAL SHARING OF SECONDARY STORAGE FILES IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can allow users to share a portion of a file (e.g., a document) in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The data storage system according to certain aspects can also provide a native view of secondary storage data on a client computer. The index data and/or metadata relating to secondary storage data may be stored in native format (e.g., format of the application(s) that generated the secondary storage data) so that the secondary storage data can be displayed in a native view. The index data and/or metadata may be synchronized on the client without synchronizing the secondary storage data itself. | 07-17-2014 |
20140201140 | DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 07-17-2014 |
20140201137 | LOCATION-BASED DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 07-17-2014 |
20140196056 | VIRTUAL SERVER AGENT LOAD BALANCING - Virtual machine (VM) proliferation may be reduced through the use of Virtual Server Agents (VSAs) assigned to a group of VM hosts that may determine the availability of a VM to perform a task. Tasks may be assigned to existing VMs instead of creating a new VM to perform the task. Furthermore, a VSA coordinator may determine a grouping of VMs or VM hosts based on one or more factors associated with the VMs or the VM hosts, such as VM type or geographical location of the VM hosts. The VSA coordinator may also assign one or more VSAs to facilitate managing the group of VM hosts. In some embodiments, the VSA coordinators may facilitate load balancing of VSAs during operation, such as during a backup operation, a restore operation, or any other operation between a primary storage system and a secondary storage system. | 07-10-2014 |
20140196039 | VIRTUAL MACHINE CATEGORIZATION SYSTEM AND METHOD - Virtual machine (VM) proliferation may be reduced through the use of Virtual Server Agents (VSAs) assigned to a group of VM hosts that may determine the availability of a VM to perform a task. Tasks may be assigned to existing VMs instead of creating a new VM to perform the task. Furthermore, a VSA coordinator may determine a grouping of VMs or VM hosts based on one or more factors associated with the VMs or the VM hosts, such as VM type or geographical location of the VM hosts. The VSA coordinator may also assign one or more VSAs to facilitate managing the group of VM hosts. In some embodiments, the VSA coordinators may facilitate load balancing of VSAs during operation, such as during a backup operation, a restore operation, or any other operation between a primary storage system and a secondary storage system. | 07-10-2014 |
20140196038 | VIRTUAL MACHINE MANAGEMENT IN A DATA STORAGE SYSTEM - Virtual machine (VM) proliferation may be reduced through the use of Virtual Server Agents (VSAs) assigned to a group of VM hosts that may determine the availability of a VM to perform a task. Tasks may be assigned to existing VMs instead of creating a new VM to perform the task. Furthermore, a VSA coordinator may determine a grouping of VMs or VM hosts based on one or more factors associated with the VMs or the VM hosts, such as VM type or geographical location of the VM hosts. The VSA coordinator may also assign one or more VSAs to facilitate managing the group of VM hosts. In some embodiments, the VSA coordinators may facilitate load balancing of VSAs during operation, such as during a backup operation, a restore operation, or any other operation between a primary storage system and a secondary storage system. | 07-10-2014 |
20140195863 | SYSTEMS AND METHODS FOR REMOTE MONITORING IN A COMPUTER NETWORK - Systems and methods for providing automated problem reporting in elements used in conjunction with computer networks are disclosed. The system comprises a plurality of elements that perform data migration operations and a reporting manager or monitor agent which monitors the elements and data migration operations. Upon detection of hardware or software problems, the reporting manager or monitor agent automatically communicates with elements affected by the problem to gather selected hardware, software, and configuration information, analyzes the information to determine causes of the problem, and issues a problem report containing at least a portion of the selected information. The problem report is communicated to a remote monitor that does not possess access privileges to the elements, allowing automated, remote monitoring of the elements without compromising security of the computer network or elements. | 07-10-2014 |
20140189685 | SYSTEMS AND METHODS FOR REPURPOSING VIRTUAL MACHINES - Software, firmware, and systems repurpose existing virtual machines. After a virtual machine is created, the system stores data associated with the virtual machine to permit its later repurposing. Repurposing data includes data associated with the virtual machine when the virtual machine is in a generic state from which it may be configured for use by two or more users/applications. When the system receives a request to create a new virtual machine, rather than create a brand new virtual machine, the system repurposes an existing virtual machine. The system identifies a virtual machine to repurpose, deletes data associated with the identified virtual machine, and loads a saved copy of repurposing data. The system may then load user data or otherwise customize the database and virtual machine. | 07-03-2014 |
20140189680 | AUTOMATIC IDENTIFICATION OF STORAGE REQUIREMENTS, SUCH AS FOR USE IN SELLING DATA STORAGE MANAGEMENT SOLUTIONS - Systems and methods for demonstrating a replacement information management software for a computing system. The methods may include determining if existing information management software is installed in the computing system. The methods may include identifying computing devices of the computing system using information from the existing information management software. The methods may include simulating the replacement information management software with characteristics of the identified computing devices to enable a user to experience the replacement information management software prior to committing to installing the replacement information management software in the computing system. The methods may include automatically installing the replacement information management software. Other implementations are disclosed. | 07-03-2014 |
20140189432 | DATA RECOVERY USING A CLOUD-BASED REMOTE DATA RECOVERY CENTER - A Remote Metadata Center provides Distaster Recovery (DR) testing and metadata backup services to multiple business organizations. Metadata associated with local data backups performed at business organizations is transmitted to the Remote Metadata Center. Corresponding backup data is stored in a data storage system that is either stored locally at the business organization or at a data storage facility that is at a different location than the Remote Metadata Center and the business organization. DR testing can be staged from the Remote Data Center using the metadata received and optionally with assistance from an operator at the business organization and/or the data storage facility. | 07-03-2014 |
20140188812 | RESTORATION OF CENTRALIZED DATA STORAGE MANAGER, SUCH AS DATA STORAGE MANAGER IN A HIERARCHICAL DATA STORAGE SYSTEM - Systems and methods for restoring a database in an information management system that does not include a secondary copy of the database, are disclosed. The systems and methods may include using metadata stored in non-production storage devices to restore the database. In some implementations the methods are used to consolidate multiple information management systems. In other implementations, the systems and methods are used for reviewing content of archived storage media. Other implementations are disclosed. | 07-03-2014 |
20140188805 | BACKUP AND RESTORATION FOR A DEDUPLICATED FILE SYSTEM - The disclosed techniques that can use deduplication information on a source computer platform to improve the process of performing data backups or restoration from/to the computer platform. In one example aspect, a data backup operation can re-use some of the work already done by a source computer's deduplication system. For example, a storage operation could read a deduplication database on the source computer platform to determine the duplicativeness of a given data chunk being transferred to a backup storage system, without having to perform computations such as data chunk hashing and comparison with previously generated hashes. The technique may additionally or alternatively reuse hashes generated by the source computer during deduplication of the data file on the source computer's file system during deduplication at the external backup storage system. | 07-03-2014 |
20140188804 | APPLICATION OF INFORMATION MANAGEMENT POLICIES BASED ON OPERATION WITH A GEOGRAPHIC ENTITY - Techniques for providing data retention services based on a geographic region are disclosed. In one aspect, a location of a computing device is determined. A geographic entity corresponding to the location of the computing device is then determined. A data retention policy is applied to production data of the computing device based on regulations of the geographic entity. Other aspects are also disclosed. | 07-03-2014 |
20140181085 | DATA STORAGE SYSTEM FOR ANALYSIS OF DATA ACROSS HETEROGENEOUS INFORMATION MANAGEMENT SYSTEMS - Systems and methods for generating customized reports from data storage databases and other information management system databases. The methods include normalizing queried information from different types of information management system databases to enable system-wide report generation. Other implementations are disclosed. | 06-26-2014 |
20140181048 | FILTERED REFERENCE COPY OF SECONDARY STORAGE DATA IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can filter secondary copies of data (e.g., backups, snapshots, archives, etc.) generated by multiple client computing devices into a single, filtered, global reference copy. A reference copy may be a filtered view or representation of secondary storage data in a data storage system. A reference copy may include a data structure that includes references to a subset of secondary storage data that meets certain filtering criteria. The filtering criteria may be specified by users according to user preference. Data included in a reference copy may be stored in native format (e.g., format of the application that generated the data) and be accessible through the application associated with the data. | 06-26-2014 |
20140181047 | SYSTEMS AND METHODS TO PROTECT DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. The system copies the data to temporary storage, normalizes the copy, and merges the normalized data from the temporary storage to a secondary storage device. For instance, the system merges the data on the secondary storage device at locations indicated by the file path saved in metadata. In another manner, the system merges changes between the previously backed up version of the data and the data identified for deletion into the previously backed up version of the data stored on the secondary storage device at the locations indicated by the file path. In a further manner, the system merges the differences between the previously backed up version of the data and the data identified for deletion at the locations indicated by the file path. | 06-26-2014 |
20140181043 | COMBINED STREAM AUXILIARY COPY SYSTEM AND METHOD - A system and method for transferring data in a library storage system. The library storage system comprises a management server including a storage policy. A media agent is connected to the management server. A plurality of storage media and a data source are connected to the media agent. The data source is divided into at least a first and a second portion of data. The portions of data are transferred from the data source to a first and second primary storage medium using a first and a second data stream respectively. The media agent then causes the first and second portion of data to be transferred from the first and second storage medium to a third auxiliary storage medium using a third combined data stream. Auxiliary copying is performed in chunks and multiple streams are copied in parallel. | 06-26-2014 |
20140181037 | SYSTEMS AND METHODS TO DETECT DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system monitors data operations and when the data operation is a delete, the system determines whether the data identified for deletion has been protected by a backup operation. Data that has not been backed up, such as newly created data, is copied to temporary storage before deletion. When the data has been protected, the system determines whether the data has been modified after the backup operation. Data modified after the backup operation is copied to temporary storage before deletion. | 06-26-2014 |
20140181033 | SYSTEMS AND METHODS TO TRACK DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system copies the data to temporary storage, saves the file path in the temporary storage, and identifies the copy of the data in temporary storage for backup. In another manner, the system converts the data to a hidden file, copies the hidden file to temporary storage, saves the file path to the temporary storage, and identifies the copy of the hidden file for backup. In a further manner, the system copies the data to temporary storage when it is created, saves the file path to the temporary storage, and identifies the data in the temporary storage for backup after the delete operation is detected and the data is identified as not protected or as modified after the last backup operation. | 06-26-2014 |
20140181032 | SYSTEMS AND METHODS TO PERFORM DATA BACKUP IN DATA STORAGE SYSTEMS - A data storage system, according to certain aspects, automatically backs up source data when the replication data is faulty. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. When permitted by the user system configuration, the system automatically backs up source data when replication has failed. | 06-26-2014 |
20140181031 | SYSTEMS AND METHODS TO CONFIRM REPLICATION DATA ACCURACY FOR DATA BACKUP IN DATA STORAGE SYSTEMS - A data storage system, according to certain aspects, automatically determines the accuracy of replication data when performing data backup operations. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. The system automatically determines the accuracy of replication data during data backup. | 06-26-2014 |
20140181029 | ROLLING CACHE CONFIGURATION FOR A DATA REPLICATION SYSTEM - Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state. | 06-26-2014 |
20140181028 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA - The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents. | 06-26-2014 |
20140181022 | SYSTEMS AND METHODS FOR MANAGING REPLICATED DATABASE DATA - Systems and methods for replicating database data and generating read-only copies of the replicated data in a clean shutdown state. For example, systems can include a tracking module (e.g., a filter driver) that monitors transactions from a database application to a source storage device to generate log entries having at least one marker indicating a known good state of the application. The systems further include a computer coupled to a target storage device comprising a database and log files. The computer processes the transactions, based on the log entries, to replicate data to the target storage device; performs a first snapshot on data stored in the database and log files; replays into the database data stored in the log files; performs another snapshot on the database; and reverts the database back to a state in which the database existed at the time of the first snapshot. | 06-26-2014 |
20140180664 | SYSTEMS AND METHODS FOR PERFORMANCE MONITORING - Data storage systems monitor the performance of data storage operations on a granular level and compile the information for presenting to a user. The system measures the time of execution for individual granular stages of the storage operation and in response to the monitoring results, automatically adjust parameters to optimize performance. Further, the system performs a performance test by simulating the data storage operation, but may not actually write the data to the secondary storage medium. | 06-26-2014 |
20140172796 | SYSTEMS AND METHODS FOR MIGRATING COMPONENTS IN A HIERARCHICAL STORAGE NETWORK - System and methods for selectively or automatically migrating resources between storage operation cells are provided. In accordance with one aspect of the invention, a management component within the storage operation system may monitor system operation and migrate components from storage operation cell to another to facilitate failover recovery, promote load balancing within the system and improve overall system performance as further described herein. Another aspect of the invention may involve performing certain predictive analyses on system operation to reveal trends and tendencies within the system. Such information may be used as the basis for potentially migrating components from one storage operation cell to another to improve system performance and reduce or eliminate resource exhaustion or congestion conditions. | 06-19-2014 |
20140164327 | SYSTEMS AND METHODS FOR RESYNCHRONIZING INFORMATION - Methods and systems for synchronizing data files in a storage network between a first and a second storage device is provided. The method includes storing first data files associated with the first storage device to a storage medium, whereby the first data files include first data records. The storage medium may then be transferred to the second storage device. The first data files from the storage medium may be loaded onto the second storage device. The second data records from the first storage device may be received, and the first and second data records are compared. The first data files at the second storage device may be updated based on the comparison of the first and second data records. | 06-12-2014 |
20140115250 | PARALLEL ACCESS VIRTUAL TAPE LIBRARY AND DRIVES - A system and method described herein allows a virtual tape library (VTL) to perform multiple simultaneous or parallel read/write or access sessions with disk drives or other storage media, particularly when subject to a sequential SCSI-compliant layer or traditional limitations of VTLs. In one embodiment, a virtualizing or transaction layer can establish multiple sessions with one or more clients to concurrently satisfy the read/write requests of those clients for physical storage resources. A table or other data structure tracks or maps the sessions associated with each client and the location of data on the physical storage devices. | 04-24-2014 |
20140115118 | REALTIME STREAMING OF MULTIMEDIA CONTENT FROM SECONDARY STORAGE DEVICES - A method and system for streaming media to a client from a media server is described. In some examples, the system utilizes a virtualization layer to generate a virtual computing environment, or virtual machine, at a UPnP server, which is configured to receive requests for media, identify locations for the media within the secondary storage devices, access the media, and present the media to a client computing device associated with the media requests | 04-24-2014 |
20140114940 | METHOD AND SYSTEM FOR SEARCHING STORED DATA - A complete document management system is disclosed. Accordingly, systems and methods for managing data associated with a data storage component coupled to multiple computers over a network are disclosed. Systems and methods for managing data associated with a data storage component coupled to multiple computers over a network are further disclosed. Additionally, systems and methods for accessing documents available through a network, wherein the documents are stored on one or more data storage devices coupled to the network, are disclosed. | 04-24-2014 |
20140114922 | SYSTEM AND METHOD FOR GENERATING AND MANAGING QUICK RECOVERY VOLUMES - The invention relates to computer readable medium storing program code which when executed on a computer causes the computer to perform a method for creating a quick recovery volume of a primary data set used by a first computer in a backup storage system, which includes identifying a snapshot image of the primary data set generated by a snapshot application, creating the quick recovery volume of the primary data set from the snapshot image of the primary data set and controlling transfer of data from the first computer to an archival storage unit. In one embodiment, the invention provides a method for creating a quick recovery volume of a primary data set that includes creating a snapshot image of the primary data set and creating a quick recovery volume of the primary data set from the snapshot image of the primary data set. | 04-24-2014 |
20140108837 | POWER MANAGEMENT OF DATA PROCESSING RESOURCES, SUCH AS POWER ADAPTIVE MANAGEMENT OF DATA STORAGE OPERATIONS - A system and method for performing power conservation actions is described. In some examples, the system determines a power conservation policy based on information from the system, and implements that policy in an enterprise or in one or more buildings, such as within a data storage environment. In some examples, the system adds or modifies global filters or system performance based on information from the system. | 04-17-2014 |
20140108470 | TRANSFERRING OR MIGRATING PORTIONS OF DATA OBJECTS, SUCH AS BLOCK-LEVEL DATA MIGRATION OR CHUNK-BASED DATA MIGRATION - A system and method for migrating data objects based on portions of the data objects is described. The system may transfer portions of files, folders, and other data objects from primary storage to secondary storage based on certain criteria, such as time-based criteria, age-based criteria, and so on. An increment may be one or more blocks of a data object, or one or more chunks of a data object, or other segments that combine to form or store a data object. For example, the system identifies one or more blocks of a data object that satisfy a certain criteria, and migrates the identified blocks. The system may determine that a certain number of blocks of a file have not been modified or called by a file system in a certain time period, and migrate these blocks to secondary storage. | 04-17-2014 |
20140108355 | SYSTEM AND METHOD FOR ARCHIVING OBJECTS IN AN INFORMATION STORE - The invention relates generally to archiving data items in an information store. More particularly, the invention provides a computerized method for identifying, in a first information store, a first data item satisfying retention criteria; copying the first data item to a second information store; creating, in the first information store, a second data item containing a subset of the data of the first data item selected based on the data type of the first data item; and replacing the first data item, in the first information store, with the second data item. | 04-17-2014 |
20140108351 | DATA STORAGE SYSTEM UTILIZING PROXY DEVICE FOR STORAGE OPERATIONS - A data storage environment can include a secondary storage computing device that acts as a proxy for other secondary storage computing devices. For example, the secondary storage computing device receives a storage operation request from one or more of the other secondary storage computing devices, such as a request to create a snapshot of client data. The secondary storage computing device generally acts as an intermediary between the other secondary storage computing devices and the storage device to carry out the snapshots or other storage operations. The secondary storage computing device may further receive a notification upon completion of the storage operations, and transmit relevant data to the requesting secondary storage computing device regarding the storage operation. | 04-17-2014 |
20140101399 | CONTINUOUS DATA PROTECTION OVER INTERMITTENT CONNECTIONS, SUCH AS CONTINUOUS DATA BACKUP FOR LAPTOPS OR WIRELESS DEVICES - A portable data protection system is described for protecting, transferring or copying data using continuous data protection (CDP) over intermittent or occasional connections between a computer system or mobile device containing the data to be protected, transferred or copied, called a data source, and one or more computer systems that receive the data, called a data target. CDP can be broken down logically into two phases: 1) detecting changes to data on a data source and 2) replicating the changes to a data target. The portable data protection system uses a method that performs the first phase continuously or near continuously on the data source, and the second phase when a connection is available between the data source and the data target. | 04-10-2014 |
20140101160 | SYSTEMS AND METHODS FOR CLASSIFYING AND TRANSFERRING INFORMATION IN A STORAGE NETWORK - Systems and methods for data classification to facilitate and improve data management within an enterprise are described. The disclosed systems and methods evaluate and define data management operations based on data characteristics rather than data location, among other things. Also provided are methods for generating a data structure of metadata that describes system data and storage operations. This data structure may be consulted to determine changes in system data rather than scanning the data files themselves. | 04-10-2014 |
20140075440 | SYSTEMS AND METHODS FOR PERFORMING DATA MANAGEMENT OPERATIONS USING SNAPSHOTS - A system stores a snapshot and an associated data structure or index to storage media to create a secondary copy of a volume of data. In some cases, the associated index includes application specific data about a file system or other application that created the data to identify the location of the data. The associated index may include three entries, and may be used to facilitate the recovery of data via the snapshot. The snapshot may be used by ancillary applications to perform various functions, such as content indexing, data classification, deduplication, e-discovery, and other functions. | 03-13-2014 |
20140075001 | SYSTEM AND METHOD FOR SHARING MEDIA IN A COMPUTER NETWORK - A computerized method for sharing removable storage media in a network, the method comprising associating, in an index entry, a first piece of removable storage media in a first storage device with at least a first storage policy copy and a second storage policy copy; copying, to the first piece of removable storage media, data associated with the first storage policy copy; and copying, to the first piece of removable storage media, data associated with the second storage policy copy. | 03-13-2014 |
20140074777 | SYSTEMS AND METHODS FOR SELECTIVE DATA REPLICATION - Systems and methods for performing data replication are disclosed. Determining whether to update replicated data typically involves comparison of readily obtainable attributes of a given source file and its corresponding replicated file. Such attributes can be obtained from, for example, metadata. In certain situations, an additional assessment of the source and replicated files can be beneficial. For example, if integrity of an existing replicated file's content is maintained, one may not want to re-replicate the corresponding source file. For large source files, such a decision can provide substantial reductions in expenditures of available computing and network resources. In certain embodiments, a threshold for identifying such large files can be based on one or more operating parameters such as network type and available bandwidth. In certain embodiments, replication file's integrity can be checked by calculating and comparing checksums for the replication file and its corresponding source file. | 03-13-2014 |
20140067764 | STUBBING SYSTEMS AND METHODS IN A DATA REPLICATION ENVIRONMENT - Stubbing systems and methods are provided for intelligent data management in a replication environment, such as by reducing the space occupied by replication data on a destination system. In certain examples, stub files or like objects replace migrated, de-duplicated or otherwise copied data that has been moved from the destination system to secondary storage. Access is further provided to the replication data in a manner that is transparent to the user and/or without substantially impacting the base replication process. In order to distinguish stub files representing migrated replication data from replicated stub files, priority tags or like identifiers can be used. Thus, when accessing a stub file on the destination system, such as to modify replication data or perform a restore process, the tagged stub files can be used to recall archived data prior to performing the requested operation so that an accurate copy of the source data is generated. | 03-06-2014 |
20140053002 | SYSTEM AND METHOD FOR ENCRYPTING SECONDARY COPIES OF DATA - A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary copy is created. In some examples, the system looks to information about a data storage system, and determines when and where to encrypt data based on the information. | 02-20-2014 |
20140046904 | LIGHTWEIGHT MOUNTING OF A SECONDARY COPY OF FILE SYSTEM DATA - A data storage system allows a user to search a secondary copy such as a back up, archive, or snapshot and receive an abbreviated version of the secondary copy of the file system as a result of the search. The abbreviated version of the secondary copy of the file system may include metadata such as a listing of secondary copy data that correspond with a search term or other filtering criteria provided by the user. An operating system of the user's computing device may mount the abbreviated version so that it can be displayed within a view of the file system of the computing device. Once a user selects one or more desired data objects listed in the abbreviated version, the selected actual one or more data objects are retrieved from secondary storage. | 02-13-2014 |
20140046900 | GENERIC FILE LEVEL RESTORE FROM A BLOCK-LEVEL SECONDARY COPY - Systems and methods are provided which perform a file level restore by utilizing existing operating system components (e.g., file system drivers) that are natively installed on the target computing device. These components can be used to mount and/or interpret a secondary copy of the file system. For instance, the system can instantiate an interface object (e.g., a device node such as a pseudo device, device file or special file) on the target client which includes file system metadata corresponding to the backed up version of the file system. The interface provides a mechanism for the operating system to mount the secondary copy and perform file level access on the secondary copy, e.g., to restore one or more selected files. | 02-13-2014 |
20140040582 | BLOCK-LEVEL SINGLE INSTANCING - Described in detail herein are systems and methods for single instancing blocks of data in a data storage system. For example, the data storage system may include multiple computing devices (e.g., client computing devices) that store primary data. The data storage system may also include a secondary storage computing device, a single instance database, and one or more storage devices that store copies of the primary data (e.g., secondary copies, tertiary copies, etc.). The secondary storage computing device receives blocks of data from the computing devices and accesses the single instance database to determine whether the blocks of data are unique (meaning that no instances of the blocks of data are stored on the storage devices). If a block of data is unique, the single instance database stores it on a storage device. If not, the secondary storage computing device can avoid storing the block of data on the storage devices. | 02-06-2014 |
20140040580 | ADMINISTERING A SHARED, ON-LINE POOL OF DATA STORAGE RESOURCES FOR PERFORMING DATA STORAGE OPERATIONS - A data storage system according to certain aspects manages and administers the sharing of storage resources among clients in the shared storage pool. The shared storage pool according to certain aspects can provide readily available remote storage to clients in the pool. A share list for each client may be used to determine where data is stored within the storage pool. The share list may include clients that are known to each client, and therefore, a user may feel more at ease storing the data on the clients in the storage pool. Management and administration of the storage pool and backup and restore jobs can be performed by an entity other than the client, making backup and restore more streamlined and simple for the clients in the pool. | 02-06-2014 |
20140040579 | ADMINISTERING A SHARED, ON-LINE POOL OF DATA STORAGE RESOURCES FOR PERFORMING DATA STORAGE OPERATIONS - A data storage system according to certain aspects manages and administers the sharing of storage resources among clients in the shared storage pool. The shared storage pool according to certain aspects can provide readily available remote storage to clients in the pool. A share list for each client may be used to determine where data is stored within the storage pool. The share list may include clients that are known to each client, and therefore, a user may feel more at ease storing the data on the clients in the storage pool. Management and administration of the storage pool and backup and restore jobs can be performed by an entity other than the client, making backup and restore more streamlined and simple for the clients in the pool. | 02-06-2014 |
20140040209 | FAILOVER SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS - In certain embodiments, a tiered storage system is disclosed that provides for failover protection during data backup operations. The system can provide for an index, or catalog, for identifying and enabling restoration of backup data located on a storage device. The system further maintains a set of transaction logs generated by media agent modules that identify metadata with respect to individual data chunks of a backup file on the storage device. A copy of the catalog and transaction logs can be stored at a location accessible by each of the media agent modules. In this manner, in case of a failure of one media agent module during backup, the transaction logs and existing catalog can be used by a second media agent module to resume the backup operation without requiring a restart of the backup process. | 02-06-2014 |
20140032864 | SYSTEMS AND METHODS FOR RETAINING AND USING DATA BLOCK SIGNATURES IN DATA PROTECTION OPERATIONS - A system according to certain embodiments associates a signature value corresponding to a data block with one or more data blocks and a reference to the data block to form a signature/data word corresponding to the data block. The system further logically organizes the signature/data words into a plurality of files each comprising at least one signature/data word such that the signature values are embedded in the respective file. The system according to certain embodiments reads a previously stored signature value corresponding to a respective data block for sending from a backup storage system having at least one memory device to a secondary storage system. Based on an indication as to whether the data block is already stored on the secondary storage system, the system reads the data block from the at least one memory device for sending to the secondary storage system if the data block does not exist on the secondary storage system, wherein the signature value and not the data block is read from the at least one memory device if the data block exists on the secondary storage system. | 01-30-2014 |
20140032495 | SYSTEMS AND METHODS FOR PERFORMING DATA REPLICATION - Preparing source data to be replicated in a continuous data replication environment. Certain systems and methods populate a file name database with entries having a unique file identifier descriptor (FID), short name and a FID of the parent directory of each directory or file on a source storage device. Such information is advantageously gathered during scanning of a live file system without requiring a snapshot of the source storage device. The database can be further used to generate absolute file names associated with data operations to be replayed on a destination storage device. Based on the obtained FIDs, certain embodiments can further combine write operations to be replayed on the destination storage device and/or avoid replicating temporary files to the destination system. | 01-30-2014 |
20140025914 | SYSTEMS AND METHODS FOR PERFORMING STORAGE OPERATIONS USING NETWORK ATTACHED STORAGE - Systems and methods for performing hierarchical storage operations on electronic data in a computer network are provided. In one embodiment, the present invention may store electronic data from a network device to a network attached storage (NAS) device pursuant to certain storage criteria. The data stored on the NAS may be migrated to a secondary storage and a stub file having a pointer pointing to the secondary storage may be put at the location the data was previously stored on the NAS. The stub file may redirect the network device to the secondary storage if a read request for the data is received from the network device. | 01-23-2014 |
20140025796 | AUTOMATED GROUPING OF COMPUTING DEVICES IN A NETWORKED DATA STORAGE SYSTEM - According to certain aspects, systems and methods are provided for grouping clients together in a networked data storage environment. For instance, clients can be grouped together based on the software installed on the client or the client type. Each client group can be configured to maintain the configuration of clients within the client group. For example, one client group can be configured to ensure that a particular software suite remains up-to-date. Another client group can be configured to ensure that data within a particular directory or on a particular storage device associated with each client of the client group is backed up each night. | 01-23-2014 |
20140025641 | SYSTEMS AND METHODS FOR DATABASE ARCHIVING - A data storage system according to certain aspects can archive database data associated with different database applications. The data storage system according to certain aspects may provide database archiving modules that include logic incorporating and/or based on the native schema and/or native commands specific to particular database applications. The database archiving modules according to certain aspects may determine the relationship between tables associated with corresponding database applications and archive selected database data based on the native schema and native commands. | 01-23-2014 |
20140025640 | DATA MINING SYSTEMS AND METHODS FOR HETEROGENEOUS DATA SOURCES - Systems and methods integrate disparate backup devices with a unified interface. In certain examples, a management console manages data from various backup devices, while retaining such data in its native format. The management console can display a hierarchical view the client devices and/or their data and can further provide utilities for processing the various data formats. A data structure including fields for storing both metadata common to the client device data and value-added metadata can be used to mine or process the data of the disparate client devices. The unified single platform and interface reduces the need for multiple data management products and/or customized data utilities for each individual client device and provides a single pane of glass view into data management operations. Integrating the various types of storage formats and media allows a user to retain existing storage infrastructures and further facilitates scaling to meet long-term management needs. | 01-23-2014 |
20140019647 | SYSTEMS AND METHODS OF MEDIA MANAGEMENT, SUCH AS MANAGEMENT OF MEDIA TO AND FROM A MEDIA STORAGE LIBRARY, INCLUDING REMOVABLE MEDIA - A system and method for determining media to be exported out of a media library is described. In some examples, the system determines a media component to be exported, determines the media component is in the media library for a specific process, and exports the media component after the process is completed. | 01-16-2014 |
20140012994 | SYSTEMS AND METHODS FOR GRANULAR RESOURCE MANAGEMENT IN A STORAGE NETWORK - In accordance with some aspects of the present invention, systems and methods are provided for dynamically and/or automatically selecting and/or modifying data path definitions that are used in performing storage operations on data. Alternate data paths may be specified or selected that use some or all resources that communicate with a particular destination to improve system reliability and performance. The system may also dynamically monitor and choose data path definitions to optimize system performance, conserve storage media and promote balanced load distribution. | 01-09-2014 |
20140007109 | STORAGE OF APPLICATION SPECIFIC PROFILES CORRELATING TO DOCUMENT VERSIONS | 01-02-2014 |
20130346373 | COLLABORATIVE RESTORE IN A NETWORKED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side signature repository that includes information representative of a set of data blocks stored in primary storage. During restore operations, the system can use the client-side signature repository to identify data blocks located in primary storage. The system can also use the client-side signature repository to identify multiple locations within primary storage where instances of some of the data blocks to be restored are located. Accordingly, during a restore operation of one client computing device, the system can source a data block to be restored to the client computing device from another client computing device that is in primary storage. | 12-26-2013 |
20130332685 | EXTERNAL STORAGE MANAGER FOR A DATA STORAGE CELL - A storage management solution according to certain embodiments is provided which decouples certain aspects of the storage manager from the data storage cell. The data storage system according to certain aspects can provide one or more external storage managers that manage data protection and administer the operation of data storage cells. According to certain aspects, usage of the decoupled storage manager can be allocated amongst multiple data storage cells, such as by data storage cells of multiple companies, sub-units of a company, or both. | 12-12-2013 |
20130332505 | INTELLIGENT SCHEDULING FOR REMOTE COMPUTERS - A method of protecting data on a mobile computing device using a storage network by deploying to the mobile computing device, a synchronization agent and then associating a synchronization policy with the synchronization agent. The mobile computing device is monitored for at least one threshold event. Its determined that the threshold event has occurred which causes a request to initiate a data synchronization event to be transmitted. The response to the request is synchronizing the mobile computing device with the storage network. | 12-12-2013 |
20130332412 | AUTO SUMMARIZATION OF CONTENT - A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file. | 12-12-2013 |
20130326178 | HIERARCHICAL SYSTEMS AND METHODS FOR PERFORMING DATA STORAGE OPERATIONS - The invention is a hierarchical backup system. The interconnected network computing devices are put into groups of backup cells. A backup cell has a manager software agent responsible maintaining and initiating a backup regime for the network computing devices in the backup cell. The backups are directed to backup devices within the backup cell. Several backup cells can be defined. A manager software agent for a particular cell may be placed into contact with the manager software agent of another cell, by which information about the cells may be passed back and forth. Additionally, one of the software agents may be given administrative control over another software agent with which it is in communication. | 12-05-2013 |
20130326159 | SHARED LIBRARY IN A DATA STORAGE SYSTEM - The library server according to certain aspects can manage the use of tape drives according to the data requirements of different storage operation cells. The library server according to certain aspects can also facilitate automatic management of tape media in a tape library by allocating the tapes and slots to different cells. For instance, the library server can manage the positioning and placement of the tapes into appropriate slots within the tape library. | 12-05-2013 |
20130311785 | SYSTEM AND METHOD FOR PROVIDING ENCRYPTION IN STORAGE OPERATIONS IN A STORAGE NETWORK, SUCH AS FOR USE BY APPLICATION SERVICE PROVIDERS THAT PROVIDE DATA STORAGE SERVICES - In accordance with embodiments of the invention, a method is provided for performing a storage operation in a pipeline storage system in which one or more data streams containing data to be stored are written into data chunks. The method includes generating an encryption key associated with a first archive file to be stored when encryption is requested for the storage operation, encrypting the archive data from the data stream using the encryption key to create an encrypted data chunk when a data stream containing the archive file is processed in the pipeline storage system, storing the encrypted data chunk on a storage medium, and storing the encryption key in a manner accessible during a restore operation of the encrypted data chunk. | 11-21-2013 |
20130282662 | INTEGRATED SNAPSHOT INTERFACE FOR A DATA STORAGE SYSTEM - A data storage system includes a generic snapshot interface, allowing for integration with a wide variety of snapshot-capable storage devices. The generic interface can be a programming interface (e.g., an application programming interface [API]). Using the snapshot interface, storage device vendors can integrate their particular snapshot technology with the data storage system. For instance, the data storage system can access a shared library of functions (e.g., a dynamically linked library [DLL]) provided by the vendor (or another by appropriate entity) and that complies with the specifications of the common programming interface. And by invoking the appropriate functions in the library, the data storage system implements the snapshot operation on the storage device. | 10-24-2013 |
20130263289 | INFORMATION MANAGEMENT OF DATA ASSOCIATED WITH MULTIPLE CLOUD SERVICES - A method and system for providing information management of data from hosted services receives information management policies for a hosted account of a hosted service, requests data associated with the hosted account from the hosted service, receives data associated with the hosted account from the hosted service, and provides a preview version of the received data to a computing device. In some examples, the system indexes the received data to associate the received data with a user of an information management system, and/or provides index information related to the received data to the computing device. | 10-03-2013 |
20130262801 | INFORMATION MANAGEMENT OF VIRTUAL MACHINES HAVING MAPPED STORAGE DEVICES - Software, firmware, and systems are described herein that create and use a non-production copy of a virtual machine for reverting or restoring the virtual machine. The virtual machine is associated with an external storage device via a logical mapping. A snapshot is taken of a virtual disk associated with the virtual machine to create a snapshot copy of the virtual disk. A snapshot is taken of at least a portion of the mapped external storage device to create a snapshot copy of the mapped external storage device. The snapshot copy of the virtual disk is associated with the snapshot copy of the mapped external storage device. The snapshot copies can then be used to either revert or restore the virtual machine. | 10-03-2013 |
20130262638 | MIGRATION OF AN EXISTING COMPUTING SYSTEM TO NEW HARDWARE - Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination physical computing device. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination physical computing device is determined based at least in part on the configuration of the source physical computing device. The destination physical computing device is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device. | 10-03-2013 |
20130262615 | SHARED NETWORK-AVAILABLE STORAGE THAT PERMITS CONCURRENT DATA ACCESS - Techniques for providing shared access to, e.g., a small computer system interface (SCSI) storage device in a computer network include providing an operational mode on SCSI interfaces with a first media agent and a second media agent such that, in response to inquiry messages on the SCSI interfaces, the SCSI storage device appears as a SCSI target device to the first media agent and the second media agent and mapping data operations between the first media agent and the SCSI storage device and the second media agent and the SCSI storage device to logically unique channel numbers for the first media agent and the second media agent to perform data storage operations over their respective SCSI interfaces by concurrently sharing the SCSI storage device. | 10-03-2013 |
20130262410 | DATA PREVIEWING BEFORE RECALLING LARGE DATA FILES - Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request. | 10-03-2013 |
20130262396 | DATA STORAGE RECOVERY AUTOMATION - According to certain aspects, systems and methods are provided for automating recovery of a networked data storage environment. For instance, a system can generate a data recovery package configured to automatically carry out a process for recovering a data storage environment and/or associated data. The content of the particular workflow depends on the data storage environment, and can be defined by a user. | 10-03-2013 |
20130262394 | SEARCH FILTERED FILE SYSTEM USING SECONDARY STORAGE - Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files. | 10-03-2013 |
20130262392 | INFORMATION MANAGEMENT OF MOBILE DEVICE DATA - A method and system for providing information management of mobile device data provides a user interface to permit a user of an information management system to define information management policies for the mobile device, receives definitions of the information management policies from the provided interface, and sends data from the mobile device to the information management system in accordance with the information management policies. In some examples, the system sends information identifying the user and the mobile device to the information management system, and/or sends the information management policies defined from the interface to the information management system. | 10-03-2013 |
20130262390 | MIGRATION OF EXISTING COMPUTING SYSTEMS TO CLOUD COMPUTING SITES OR VIRTUAL MACHINES - Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination virtual machine. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination virtual machine is determined based at least in part on the configuration of the source physical computing device. The destination virtual machine is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device. | 10-03-2013 |
20130262387 | UTILIZING SNAPSHOTS FOR ACCESS TO DATABASES AND OTHER APPLICATIONS - A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly. | 10-03-2013 |
20130262386 | SMART ARCHIVING AND DATA PREVIEWING FOR MOBILE DEVICES - Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request. | 10-03-2013 |
20130262385 | UNIFIED ACCESS TO PERSONAL DATA - A method and system for providing unified access to data for multiple computing devices includes a system that associates multiple computing devices with a user of an information management system, assigns information management policies to data from the multiple computing devices within the information management system, and collects multiple data objects from the multiple computers. The system may generate a preview version of each collected data object, and provide at least one preview version of a collected data object to a computing device associated with the user. The system may also generate indexing information for each collected data object and distribute the indexing information with the preview version of the data object. | 10-03-2013 |
20130254503 | HIERARCHICAL SYSTEMS AND METHODS FOR PERFORMING STORAGE OPERATIONS IN A COMPUTER NETWORK - A system for performing storage operations using hierarchically configured storage operation cells. The system includes a first storage manager component and a first storage operation cell. The first storage operation cell has a second storage manager component directed to performing storage operations in the first storage operation cell. Moreover, the first storage manager component is programmed to instruct the second storage manager regarding performance of storage operations in the first storage operation cell. | 09-26-2013 |
20130254402 | AUTOMATION OF DATA STORAGE ACTIVITIES - A system receives data storage workflow activities that include computer-executable instructions for carrying out data storage workflow in a network data storage system. Once the workflow is received, the system deploys the workflow to one or more workflow engines that can execute the various data storage activities related to the workflow. Prior to executing a data storage activity, the system can determine which workflow engine to use based on an allocation scheme. | 09-26-2013 |
20130254236 | SYSTEM AND METHOD FOR STORAGE OPERATION ACCESS SECURITY - A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a system to inform the proper access control that should be applied to data stored outside of its original location, such as a data backup. The storage access control system may place similar access control restrictions on the backup files that existed on the original files. In this way, the backed up data is given similar protection as that of the original data. | 09-26-2013 |
20130254166 | SYSTEMS AND METHODS FOR PERFORMING REPLICATION COPY STORAGE OPERATIONS - A system and method are provided for performing storage operations relating to a first secondary copy of electronic data. A storage policy or storage preferences may dictate that a replication copy should be used in storage operations performed to a particular client, sub-client, data, media or other item. Based on the storage policy, when a new client, sub-client, data, media or other item is received, a media agent determines whether there is a replication copy of the item. In the absence of a replication copy, one may be created. The replication copy may be provided by a third party application, or created by the client or a storage management system component. Information regarding the replication copy and its corresponding first secondary copy may be stored in a database. To optimize use of system resources, storage operations relating to the first secondary copy may be performed using the replication copy instead of the first secondary copy. | 09-26-2013 |
20130253977 | AUTOMATION OF DATA STORAGE ACTIVITIES - A system allows user to design data storage system workflows by selecting on a user interface various data objects associated with data storage system related activities. The activities include computer-executable instructions and can be predefined or determined by the user. Once the workflow is created, the workflow is deployed to one or more workflow engines that can execute the various data storage activities related to the workflow. Prior to executing a data storage activity, the system can determine which workflow engine to use based on an allocation scheme. | 09-26-2013 |
20130247154 | MANAGING CONNECTIONS IN A DATA STORAGE SYSTEM - Described in detail herein are systems and methods for managing connections in a data storage system. For example, the systems and methods may be used to manage connections between two or more computing devices for purposes of performing storage operations on the data of one of the computing devices. The data storage system includes at least two computing devices. A first computing device includes an unauthorized connection data structure and a connection manager component. The connection manager component receives a connection request from a second computing device. If the second computing device is not identified on the unauthorized connection data structure, the connection manager component can request that an authentication manager authenticate the second computing device and/or determine whether the second computing device is properly authorized. If so, the connection manager component can allow the second computing device to connect to the first computing device. | 09-19-2013 |
20130246485 | ASYNCHRONOUS METHODS OF DATA CLASSIFICATION USING CHANGE JOURNALS AND OTHER DATA STRUCTURES - Aspects of the present invention are generally concerned with systems and methods for generating a database of metadata that describes system data and storage operations. The database of metadata may be referred to herein as a “metabase.” For example, to generate a metabase, a data agent may traverse a file system to obtain certain characteristics of data managed by the file system while substantially simultaneously detecting and recording change notifications. These actions may be performed even if the actions of the data agent are interrupted one or more times during the traversal of the file system. The data agent may process the characteristics and change notifications to generate and update a metabase. Once formed, the metabase may be consulted to determine changes in system data rather than determining the changes by scanning the data files themselves. | 09-19-2013 |
20130246361 | SYSTEM AND METHOD FOR GENERATING AND MANAGING QUICK RECOVERY VOLUMES - The invention relates to computer readable medium storing program code which when executed on a computer causes the computer to perform a method for creating a quick recovery volume of a primary data set used by a first computer in a backup storage system, which includes identifying a snapshot image of the primary data set generated by a snapshot application, creating the quick recovery volume of the primary data set from the snapshot image of the primary data set and controlling transfer of data from the first computer to an archival storage unit. In one embodiment, the invention provides a method for creating a quick recovery volume of a primary data set that includes creating a snapshot image of the primary data set and creating a quick recovery volume of the primary data set from the snapshot image of the primary data set. | 09-19-2013 |
20130246360 | SYSTEMS AND METHODS FOR ANALYZING SNAPSHOTS - This application describes techniques for creating a second snapshot of a first snapshot of a set of data, modifying the first snapshot, and reverting the modifications to the first snapshot. For example, portions of one or more transaction logs may be played into a database to put the database in a particular state a particular point in time. The second snapshot may then be used to revert to a prior state of the database such that additional transaction logs may be played into the database. These techniques enable the ability to put the database into multiple states as the database existed at multiple points in time. Therefore, data can be recovered from the database as the data existed at different points in time. Moreover, individual data objects in the database can be accessed and analyzed as the individual data objects existed at different points in time. | 09-19-2013 |
20130238872 | SNAPSHOT STORAGE AND MANAGEMENT SYSTEM WITH INDEXING AND USER INTERFACE - A system and method of managing stored data in a storage management system. The storage management system includes a storage manager, a media agent connected to the storage manager, and a primary volume connected to the media agent. Multiple snapshots are taken of the primary volume. The snapshots are indexed by associating respective information with the snapshot. The indexed snapshots are copied to a recovery volume. In this way, browsing features are enabled for the user. The user may view the snapshots in a hierarchical format, and may even view snapshot data in association with the corresponding application. The resultant recovery volume may be used to replace a primary volume. | 09-12-2013 |
20130238575 | AUTOMATED, TIERED DATA RETENTION - The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period. | 09-12-2013 |
20130238572 | PERFORMING DATA STORAGE OPERATIONS WITH A CLOUD ENVIRONMENT, INCLUDING CONTAINERIZED DEDUPLICATION, DATA PRUNING, AND DATA TRANSFER - Various systems and methods may be used for performing data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, within a cloud environment. The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP. Methods for content indexing data stored within a cloud environment may facilitate later searching, including collaborative searching. Methods for performing containerized deduplication may reduce the strain on a system namespace, effectuate cost savings, etc. Methods may identify suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy. Further, the systems and methods may be used for providing a cloud gateway and a scalable data object store within a cloud environment. | 09-12-2013 |
20130238563 | AUTOMATED, TIERED DATA RETENTION - The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period. | 09-12-2013 |
20130238562 | DATA STORAGE SYSTEM UTILIZING PROXY DEVICE FOR STORAGE OPERATIONS - A data storage environment can include one or more virtual clients instantiated on a host proxy computing device. The virtual clients may have only indirect access to a storage device, and may access the storage device via the proxy computing device. For example, the proxy computing device receives storage operation requests from one of the virtual clients, such as a request to create, mount or revert a snapshot of virtual client data. The proxy computing device generally acts as an intermediary between the virtual clients and the storage device to carry out the snapshots or other storage operations. The proxy computing device may further receive a notification upon completion of the storage operations, and transmits relevant data to the requesting virtual client regarding the storage operation. | 09-12-2013 |
20130232309 | CONTENT ALIGNED BLOCK-BASED DEDUPLICATION - A content alignment system according to certain embodiments aligns a sliding window at the beginning of a data segment. The content alignment system performs a block alignment function on the data within the sliding window. A deduplication block is established if the output of the block alignment function meets a predetermined criteria. At least part of a gap is established if the output of the block alignment function does not meet the predetermined criteria. The predetermined criteria is changed if a threshold number of outputs fail to meet the predetermined criteria. | 09-05-2013 |
20130227352 | LOG MONITORING - A log monitoring system uses log monitoring rules to monitor log data generated by applications executing on a client computing device. By monitoring log data, the system detects that one or more triggering events have occurred on the client computing device. In response, the log monitoring system can perform one or more appropriate remedial actions. Additionally, in response to the detected event(s), the log monitoring system can extract a select subset of relevant data from the client and transmit the subset of data to a separate repository for storage and/or processing. | 08-29-2013 |
20130227239 | METHODS AND SYSTEM OF POOLING STORAGE DEVICES - A system and method are provided for pooling storage devices in a virtual library for performing a storage operation. A storage management device determines a storage characteristic of a plurality of storage devices with respect to performing a storage operation. Based on a storage characteristic relating to performing the storage operation, the storage management device associates at least two storage devices in a virtual library. The storage management device may continuously monitor the virtual library and detect a change in storage characteristics of the storage devices. When changes in storage characteristics are detected, the storage management device may change associations of the storage device in the virtual library. | 08-29-2013 |
20130226883 | SYSTEMS AND METHODS FOR BYTE-LEVEL OR QUASI BYTE-LEVEL SINGLE INSTANCING - Described in detail herein are systems and methods for deduplicating data using byte-level or quasi byte-level techniques. In some embodiments, a file is divided into multiple blocks. A block includes multiple bytes. Multiple rolling hashes of the file are generated. For each byte in the file, a searchable data structure is accessed to determine if the data structure already includes an entry matching a hash of a minimum sequence length. If so, this indicates that the corresponding bytes are already stored. If one or more bytes in the file are already stored, then the one or more bytes in the file are replaced with a reference to the already stored bytes. The systems and methods described herein may be used for file systems, databases, storing backup data, or any other use case where it may be useful to reduce the amount of data being stored. | 08-29-2013 |
20130218842 | STORING A VARIABLE NUMBER OF INSTANCES OF DATA OBJECTS - Described are systems and methods for storing a variable number of instances of data objects (e.g., 1, 2, 3, or up to N−1 instances, where N is the number of instances of the data object included in primary data) in secondary storage across a data storage network. In some examples, a system for storing a variable number of instances of data objects includes, one or more computing devices storing a set of data objects and multiple storage devices distinct from the one or more computing devices. Each of the multiple storage devices is configured to store at least a single instance of a data object. The system also includes a database configured to store information associated with the data objects. This information includes substantially unique identifiers for the data objects and, for each of the data objects, a number of instances of the data object stored on the multiple storage devices. | 08-22-2013 |
20130218629 | SYSTEM AND METHOD FOR AUTOMATING CUSTOMER-VALIDATED STATEMENT OF WORK FOR A DATA STORAGE ENVIRONMENT - Computer systems and methods are disclosed for improving professional services delivery, such as services in a data management environment. In certain examples, computer systems comprise portals for transmitting and receiving information from parties involved in the performance and receipt of professional services. For instance, a first portal can receive data (e.g., from sales personnel) descriptive of a customer's product environment. A manager module populates a record with the data, and a second portal provides the customer with access to the record for review, correction and/or validation prior to the generation of a Statement of Work or other like project description. The second portal can also request additional information from the customer regarding the product environment. The manager module compares the data received through the first portal with the customer-entered information to identify and/or address discrepancies between the sets of data and customize the generation of the Statement of Work. | 08-22-2013 |
20130205165 | SYSTEMS AND METHODS FOR PERFORMING STORAGE OPERATIONS IN A COMPUTER NETWORK - Methods and systems are described for performing storage operations on electronic data in a network. In response to the initiation of a storage operation and according to a first set of selection logic, a media management component is selected to manage the storage operation. In response to the initiation of a storage operation and according to a second set of selection logic, a network storage device to associate with the storage operation. The selected media management component and the selected network storage device perform the storage operation on the electronic data. | 08-08-2013 |
20130204844 | COMBINED STREAM AUXILIARY COPY SYSTEM AND METHOD - A system and method for transferring data in a library storage system. The library storage system comprises a management server including a storage policy. A media agent is connected to the management server. A plurality of storage media and a data source are connected to the media agent. The data source is divided into at least a first and a second portion of data. The portions of data are transferred from the data source to a first and second primary storage medium using a first and a second data stream respectively. The media agent then causes the first and second portion of data to be transferred from the first and second storage medium to a third auxiliary storage medium using a third combined data stream. Auxiliary copying is performed in chunks and multiple streams are copied in parallel. | 08-08-2013 |
20130185377 | PIPELINE SYSTEMS AND METHOD FOR TRANSFERRING DATA IN A NETWORK ENVIRONMENT - A communications system having a data transfer pipeline apparatus for transferring data in a sequence of N stages from an origination device to a destination device. The apparatus comprises dedicated memory having buffers dedicated for carrying data and a master control for registering and controlling processes associated with the apparatus for participation in the N stage data transfer sequence. The processes include a first stage process for initiating the data transfer and a last Nth stage process for completing data transfer. The first stage process allocates a buffer from a predetermined number of buffers available within the memory for collection, processing, and sending of the data from the origination device to a next stage process. The Nth stage process receives a buffer allocated to the first stage process from the (N−1)th stage and to free the buffer upon processing completion to permit reallocation of the buffer. | 07-18-2013 |
20130179405 | SYSTEMS AND METHODS FOR CREATING COPIES OF DATA, SUCH AS ARCHIVE COPIES - A system and method of creating archive copies of data sets is described. In some examples, the system creates an archive copy from an original data set. In some examples, the system creates an archive copy when creating a recovery copy for a data set. In some examples, the system creates a copy without redundant data, and then encrypts the data set. | 07-11-2013 |
20130173536 | DISTRIBUTED INDEXING SYSTEM FOR DATA STORAGE - A distributed indexing system spreads out the load on an index of stored data in a data storage system. Rather than maintain a single index, the distributed indexing system maintains an index in each media agent of a federated data storage system and a master index that points to the index in each media agent. In some embodiments, the distributed indexing system includes an index server (or group of servers) that handles indexing requests and forwards the requests to the appropriate distributed systems. Thus, the distributed indexing system, among other things, increases the availability and fault tolerance of a data storage index. | 07-04-2013 |
20130159652 | CONTINUOUS DATA PROTECTION OVER INTERMITTENT CONNECTIONS, SUCH AS CONTINUOUS DATA BACKUP FOR LAPTOPS OR WIRELESS DEVICES - A portable data protection system is described for protecting, transferring or copying data using continuous data protection (CDP) over intermittent or occasional connections between a computer system or mobile device containing the data to be protected, transferred or copied, called a data source, and one or more computer systems that receive the data, called a data target. CDP can be broken down logically into two phases: 1) detecting changes to data on a data source and 2) replicating the changes to a data target. The portable data protection system uses a method that performs the first phase continuously or near continuously on the data source, and the second phase when a connection is available between the data source and the data target. | 06-20-2013 |
20130151640 | METHOD AND SYSTEM FOR LEVERAGING IDENTIFIED CHANGES TO A MAIL SERVER - A method and system for identifying changes to a data set, such as data within a mailbox, and performing actions based on the identified changes is discussed. In some examples, the system receives an indication of a change to a mailbox, creates a change journal entry for the change, and identifies data to be copied via the change journal entry. In some examples, the system leverages the change journal to associate messages with changes to a mailbox. | 06-13-2013 |
20130145376 | DATA STORAGE RESOURCE ALLOCATION BY EMPLOYING DYNAMIC METHODS AND BLACKLISTING RESOURCE REQUEST POOLS - A resource allocation system begins with an ordered plan for matching requests to resources that is sorted by priority. The resource allocation system optimizes the plan by determining those requests in the plan that will fail if performed. The resource allocation system removes or defers the determined requests. In addition, when a request that is performed fails, the resource allocation system may remove requests that require similar resources from the plan. Moreover, when resources are released by a request, the resource allocation system may place the resources in a temporary holding area until the resource allocation returns to the top of the ordered plan so that lower priority requests that are lower in the plan do not take resources that are needed by waiting higher priority requests higher in the plan. | 06-06-2013 |
20130139006 | SYSTEMS AND METHODS OF MEDIA MANAGEMENT, SUCH AS MANAGEMENT OF MEDIA TO AND FROM A MEDIA STORAGE LIBRARY - A system and method for determining media to be exported out of a media library is described. In some examples, the system determines a media component to be exported, determines the media component is in the media library for a specific process, and exports the media component after the process is completed. | 05-30-2013 |
20130124734 | SYSTEM AND METHOD FOR ALLOCATION OF ORGANIZATIONAL RESOURCES - System and methods for storing electronic data is provided, where the system comprises a storage manager component and a management module associated with the storage manager component. The management module is configured to receive information related to storage activities associated with one or more storage operation components within the storage operation system under the direction of the storage manager component. The management module is adapted to predict storage operation resource allocations based on the received information related to the storage activities. | 05-16-2013 |
20130117222 | SYSTEMS AND METHODS OF MEDIA MANAGEMENT, SUCH AS MANAGEMENT OF MEDIA TO AND FROM A MEDIA STORAGE LIBRARY - A system and method for determining media to be exported out of a media library is described. In some examples, the system determines a media component to be exported, determines the media component is in the media library for a specific process, and exports the media component after the process is completed. | 05-09-2013 |
20130066874 | SYSTEMS AND METHODS FOR PROBABILISTIC DATA CLASSIFICATION - A system for performing data classification operations. In one embodiment, the system comprises a file system configured to store a plurality of computer files and a scanning agent configured to traverse the file system and compile data regarding the attributes and content of the plurality of computer files. The system also comprises an index configured to store the data regarding attributes and content of the plurality of computer files and a file classifier configured to analyze the data regarding the attributes and content of the plurality of computer files and to classify the plurality of computer files into one or more categories based on the data regarding the attributes and content of the plurality of computer files. | 03-14-2013 |
20130061014 | SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUALIZATION DATA - Described in detail herein is a method of copying data of one or more virtual machines being hosted by one or more non-virtual machines. The method includes receiving an indication that specifies how to perform a copy of data of one or more virtual machines hosted by one or more virtual machine hosts. The method may include determining whether the one or more virtual machines are managed by a virtual machine manager that manages or facilitates management of the virtual machines. If so, the virtual machine manager is dynamically queried to automatically determine the virtual machines that it manages or that it facilitates management of. If not, a virtual machine host is dynamically queried to automatically determine the virtual machines that it hosts. The data of each virtual machine is then copied according to the specifications of the received indication. | 03-07-2013 |
20130024436 | SYSTEMS AND METHODS FOR DATA MIGRATION IN A CLUSTERED FILE SYSTEM - Systems and methods for providing more efficient handling of I/O requests for clustered file system data subject to data migration or the like. For instance, exemplary systems can more quickly determine if certain files on primary storage represent actual file data or stub data for recalling file data from secondary storage. Certain embodiments utilize a driver cache on each cluster node to maintain a record of recently accessed files that represent regular files (as opposed to stubs). A dual-locking process, using both strict locking and relaxed locking, maintains consistency between driver caches on different nodes and the data of the underlying clustered file system, while providing improved access to the data by the different nodes. Moreover, a signaling process can be used, such as with zero-length files, for alerting drivers on different nodes that data migration is to be performed and/or that the driver caches should be flushed. | 01-24-2013 |
20130024424 | DATA OBJECT STORE AND SERVER FOR A CLOUD STORAGE ENVIRONMENT, INCLUDING DATA DEDUPLICATION AND DATA MANAGEMENT ACROSS MULTIPLE CLOUD STORAGE SITES - Data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, are performed within a cloud environment. The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP. Methods are disclosed for content indexing data stored within a cloud environment to facilitate later searching, including collaborative searching. Methods are also disclosed for performing containerized deduplication to reduce the strain on a system namespace, effectuate cost savings, etc. Methods are disclosed for identifying suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy. Further, systems and methods for providing a cloud gateway and a scalable data object store within a cloud environment are disclosed, along with other features. | 01-24-2013 |
20130019068 | SYSTEMS AND METHODS FOR SHARING MEDIA IN A COMPUTER NETWORK - A computerized method for sharing removable storage media in a network, the method comprising associating, in an index entry, a first piece of removable storage media in a first storage device with at least a first storage policy copy and a second storage policy copy; copying, to the first piece of removable storage media, data associated with the first storage policy copy; and copying, to the first piece of removable storage media, data associated with the second storage policy copy. | 01-17-2013 |
20130013967 | SYSTEMS AND METHODS FOR REMOTE MONITORING IN A COMPUTER NETWORK - Systems and methods for providing automated problem reporting in elements used in conjunction with computer networks are disclosed. The system comprises a plurality of elements that perform data migration operations and a reporting manager or monitor agent which monitors the elements and data migration operations. Upon detection of hardware or software problems, the reporting manager or monitor agent automatically communicates with elements affected by the problem to gather selected hardware, software, and configuration information, analyzes the information to determine causes of the problem, and issues a problem report containing at least a portion of the selected information. The problem report is communicated to a remote monitor that does not possess access privileges to the elements, allowing automated, remote monitoring of the elements without compromising security of the computer network or elements. | 01-10-2013 |
20130013883 | SYSTEMS AND METHODS FOR PERFORMING MULTI-PATH STORAGE OPERATIONS - Systems and methods for allocating transmission resources within a computer network are provided. In some embodiments of the invention, communication links may be assigned based on predefined preferences or system configuration to facilitate the transfer of data from one point in the network to another. In other embodiments, system operation may be monitored and communication paths be assigned dynamically based on this information to improve system operation and provide improved failover response, load balancing and to promote robust data access via alternative routes. | 01-10-2013 |
20130013609 | SYSTEMS AND METHODS FOR CLASSIFYING AND TRANSFERRING INFORMATION IN A STORAGE NETWORK - Systems and methods for data classification to facilitate and improve data management within an enterprise are described. The disclosed systems and methods evaluate and define data management operations based on data characteristics rather than data location, among other things. Also provided are methods for generating a data structure of metadata that describes system data and storage operations. This data structure may be consulted to determine changes in system data rather than scanning the data files themselves. | 01-10-2013 |
20130013563 | SYSTEM AND METHOD FOR PERFORMING INTEGRATED STORAGE OPERATIONS - The present invention relates to a method for performing integrated storage operations on an information store. The present invention comprises identifying a plurality disparate types of storage operations stored in a policy option table. A first storage operation is performed according to a first set of storage criteria stored in the policy option table and a second operation, disparate from the first storage operation, is performed according to a second set of storage criteria stored in the policy option table. | 01-10-2013 |
20130007402 | SYSTEMS AND METHODS FOR STORAGE MODELING AND COSTING - The present invention provides systems and methods for data storage. A hierarchical storage management architecture is presented to facilitate data management. The disclosed system provides methods for evaluating the state of stored data relative to enterprise needs by using weighted parameters that may be user defined. Also disclosed are systems and methods evaluating costing and risk management associated with stored data. | 01-03-2013 |
20130007391 | MODULAR BACKUP AND RETRIEVAL SYSTEM USED IN CONJUNCTION WITH A STORAGE AREA NETWORK - A modular computer storage system and method is provided for managing and directing data archiving functions, which is scalable and comprehends various storage media as well as diverse operating systems on a plurality of client devices. A client component is associated with one or more client devices for generating archival request. A file processor directs one or more storage devices, through one or more media components, which control the actual physical level backup on various storage devices. Each media component creates a library indexing system for locating stored data. A management component coordinates the archival functions between the various client components and the file processor, including setting scheduling policies, aging policies, index pruning policies, drive cleaning policies, configuration information, and keeping track of running and waiting jobs. | 01-03-2013 |
20130007002 | SYSTEMS AND METHODS FOR USING METADATA TO ENHANCE DATA IDENTIFICATION OPERATIONS - Systems and methods for managing electronic data are disclosed. Various data management operations can be performed based on a metabase formed from metadata. Such metadata can be identified from an index of data interactions generated by a journaling module, and obtained from their associated data objects stored in one or more storage devices. In various embodiments, such processing of the index and storing of the metadata can facilitate, for example, enhanced data management operations, enhanced data identification operations, enhanced storage operations, data classification for organizing and storing the metadata, cataloging of metadata for the stored metadata, and/or user interfaces for managing data. In various embodiments, the metabase can be configured in different ways. For example, the metabase can be stored separately from the data objects so as to allow obtaining of information about the data objects without accessing the data objects or a data structure used by a file system. | 01-03-2013 |
20130006946 | SYSTEM AND METHOD FOR STORING REDUNDANT INFORMATION - A method and system for reducing storage requirements and speeding up storage operations by reducing the storage of redundant data includes receiving a request that identifies one or more data objects to which to apply a storage operation. For each data object, the storage system determines if the data object contains data that matches another data object to which the storage operation was previously applied. If the data objects do not match, then the storage system performs the storage operation in a usual manner. However, if the data objects do match, then the storage system may avoid performing the storage operation. | 01-03-2013 |
20130006945 | DATA MINING SYSTEMS AND METHODS FOR HETEROGENEOUS DATA SOURCES - Systems and methods integrate disparate backup devices with a unified interface. In certain examples, a management console manages data from various backup devices, while retaining such data in its native format. The management console can display a hierarchical view the client devices and/or their data and can further provide utilities for processing the various data formats. A data structure including fields for storing both metadata common to the client device data and value-added metadata can be used to mine or process the data of the disparate client devices. The unified single platform and interface reduces the need for multiple data management products and/or customized data utilities for each individual client device and provides a single pane of glass view into data management operations. Integrating the various types of storage formats and media allows a user to retain existing storage infrastructures and further facilitates scaling to meet long-term management needs. | 01-03-2013 |
20130006944 | SYSTEMS AND METHODS FOR PERFORMING STORAGE OPERATIONS USING NETWORK ATTACHED STORAGE - Systems and methods for performing hierarchical storage operations on electronic data in a computer network are provided. In one embodiment, the present invention may store electronic data from a network device to a network attached storage (NAS) device pursuant to certain storage criteria. The data stored on the NAS may be migrated to a secondary storage and a stub file having a pointer pointing to the secondary storage may be put at the location the data was previously stored on the NAS. The stub file may redirect the network device to the secondary storage if a read request for the data is received from the network device. | 01-03-2013 |
20130006942 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA - The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents. | 01-03-2013 |
20130006938 | SYSTEMS AND METHODS FOR PERFORMING DATA REPLICATION - Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state. | 01-03-2013 |
20130006927 | STORED DATA REVERIFICATION MANAGEMENT SYSTEM AND METHOD - A system and method are provided for verifying data copies and reverifying the copies over the life span of media according to a verification policy. Characteristics of media and use of media are tracked to provide metrics which may be used to dynamically reevaluate and reassign verification policies to optimize media usage. Copies that fail verification operations may be repaired by repeating a storage operation for recent copies or by substituting a close temporal copy of the failed copy. | 01-03-2013 |
20130006926 | ROLLING CACHE CONFIGURATION FOR A DATA REPLICATION SYSTEM - Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state. | 01-03-2013 |
20130006700 | SYSTEM AND METHOD FOR AUTOMATING CUSTOMER-VALIDATED STATEMENT OF WORK FOR A DATA STORAGE ENVIRONMENT - Computer systems and methods are disclosed for improving professional services delivery, such as services in a data management environment. In certain examples, computer systems comprise portals for transmitting and receiving information from parties involved in the performance and receipt of professional services. For instance, a first portal can receive data (e.g., from sales personnel) descriptive of a customer's product environment. A manager module populates a record with the data, and a second portal provides the customer with access to the record for review, correction and/or validation prior to the generation of a Statement of Work or other like project description. The second portal can also request additional information from the customer regarding the product environment. The manager module compares the data received through the first portal with the customer-entered information to identify and/or address discrepancies between the sets of data and customize the generation of the Statement of Work. | 01-03-2013 |
20120331071 | EMAIL ATTACHMENT MANAGEMENT IN A COMPUTER SYSTEM - An e-mail management system that includes an e-mail browser having a time variance interface that provides for storage into a storage media of e-mail messages that have been received over time. The time variance interface of the e-mail browser also provides for retrieval, from the storage media, of the e-mail messages corresponding to a user specified date. The retrieved e-mail messages each include an indication of the presence of an accompanying attachment(s) in the e-mail message. An affirmative indication provides the user with an option of retrieving content of the attachment(s) from the storage media such that the content of the attachment(s) is retrieved by the e-mail browser only when specifically requested by the user. | 12-27-2012 |