Entries |
Document | Title | Date |
20100114835 | CENTRALIZED MANAGING SYSTEM AND METHOD FOR MANAGING INDUSTRIAL STORAGE DEVICES - A centralized managing system for an industrial data storage is provided. The centralized managing system includes at least one industrial apparatus outputting a first interface datum; at least one serial converting interface connected with the industrial device, and converting the first interface datum into a second interface datum; a hub device connected with the at least one serial converting interface, and receiving and transmitting the second interface datum; and at least one storage device connected with the hub device, and storing the second interface datum. | 05-06-2010 |
20100138394 | MULTIPLE CONCURRENT ACTIVE FILE SYSTEMS - A method and apparatus for operating a data storage system is disclosed. An original active file system holds incoming write transactions. Data is written at a selected time to blocks in a data storage device of the original active file system, the data written to blocks which do not hold old data of the data storage system. Pointers to data of the original active file system are written at the selected time to the data storage device, the pointers written to blocks which do not hold old data of the data storage system, the pointers and a previously saved data of the active file system forming a consistency point of the original active file system at the selected time. A new active file system is started using the consistency point of the original active file system at the selected time. | 06-03-2010 |
20100198793 | METHODS OF MULTI-SERVER APPLICATION SYNCHRONIZATION WITHOUT STOPPING I/O - A method according to one embodiment includes receiving a request to perform a backup of data associated with an application running on multiple servers; calculating a time value based on communications with the servers, the time value calculation including at least one of a latency of at least one of the communications, and a difference between a reference time clock value and a time clock value of at least one of the servers; and communicating with I/O Handlers on the servers for initiating a coordinated backup operation on the data at about a same start time. Additional systems, methods, and computer program products are also disclosed. | 08-05-2010 |
20100205152 | Managed File Backup and Restore at Remote Storage Locations Through Multi-Services Gateway at User Premises - The disclosed examples of a system for providing and managing backup and restore services of one or more endpoint devices comprise at least one gateway device at a user premises and a service management center. The gateway device has a first interface for enabling bi-directional communications with one or more of the endpoint devices associated with the gateway device, a second interface for enabling bi-directional communications for the one or more endpoint devices via a wide area network, and for enabling at least some bidirectional communications with at least one storage area external to the user premises via the wide area network. The gateway device also has a processor configured to manage backups and restores of data between the one or more of the endpoint devices and the at least one storage area. The service management center is external to the user premises and communicates with the gateway device via the wide area network, and controls access by the gateway device to the at least one storage area. | 08-12-2010 |
20100274766 | DATA MIGRATION MANAGEMENT APPARATUS AND MANAGEMENT METHOD - A data migration management apparatus continuously monitors and stores the utilization statuses of a migration-source storage area and a migration-destination storage area, and uses the information to set up a data migration. An information management unit collects information related to the storage configuration and information related to performance from respective storage apparatuses, and stores the information in a storage unit. In a case where a data migration plan is to be set, a performance information provision unit provides, to a user computer, variations in the utilization statuses during a predetermined period for each of a migration-source volume and a migration-destination array group. | 10-28-2010 |
20100274767 | BACKUP METHOD FOR STORAGE SYSTEM - The present invention provides a backup method that makes it possible to specify the recovery-enabled time of an application even in a case where a backup has been performed without staticizing the application. In response to a first instruction from a management computer, a storage system backs up a first volume to a second volume at a first time while a first host computer continues to process an application. In response to a second instruction from the management computer, a second host computer reads out the data of the second volume and acquires a second time that is the time at which the application is recovery-enabled. The management computer stores the relationship between the backup and the second time in backup catalog information. | 10-28-2010 |
20100332454 | PERFORMING DATA STORAGE OPERATIONS WITH A CLOUD ENVIRONMENT, INCLUDING CONTAINERIZED DEDUPLICATION, DATA PRUNING, AND DATA TRANSFER - Systems and methods are disclosed for performing data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, within a cloud environment. The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP. Methods are disclosed for content indexing data stored within a cloud environment to facilitate later searching, including collaborative searching. Methods are also disclosed for performing containerized deduplication to reduce the strain on a system namespace, effectuate cost savings, etc. Methods are disclosed for identifying suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy. Further, systems and methods for providing a cloud gateway and a scalable data object store within a cloud environment are disclosed, along with other features. | 12-30-2010 |
20110016091 | DE-DUPLICATION SYSTEMS AND METHODS FOR APPLICATION-SPECIFIC DATA - Content-aware systems and methods for improving de-duplication, or single instancing, in storage operations. In certain examples, backup agents on client devices parse application-specific data to identify data objects that are candidates for de-duplication. The backup agents can then insert markers or other indictors in the data that identify the location(s) of the particular data objects. Such markers can, in turn, assist a de-duplication manager to perform object-based de-duplication and increase the likelihood that like blocks within the data are identified and single instanced. In other examples, the agents can further determine if a data object of one file type can or should be single-instanced with a data object of a different file type. Such processing of data on the client side can provide for more efficient storage and back-end processing. | 01-20-2011 |
20110016092 | FEDERATED CONFIGURATION MANAGEMENT DATABASE, MANAGEMENT DATA REPOSITORY, AND BACKUP DATA MANAGEMENT SYSTEM - A federated configuration management database includes a plurality of management data repositories, and a backup destination determination unit that determines backup destination management data repositories for backing up data overlapping among the plurality of management data repositories at specific management data repositories and that notifies each of the management data repositories of the data to be backed up. | 01-20-2011 |
20110040729 | HIERARCHICAL MANAGEMENT STORAGE SYSTEM AND STORAGE SYSTEM OPERATING METHOD - The storage system eliminates inconsistency between a stub, and a file data storage location indicated by the stub. In a storage system that executes HSM using stubs, information relating to a higher tier, which is a data migration source, is recorded during data migration. The stub in the higher tier is correctly restored using the higher-tier information thus recorded. The stub is restored, and inconsistency between information in the HSM layers is resolved. | 02-17-2011 |
20110040730 | SYSTEM AND METHOD FOR BACKING UP AND RESTORING EMAIL DATA - A software and/or hardware facility for backing up and restoring email data. In some embodiments, the facility includes an input component configured to receive emails, a storage component configured to store the received emails non-hierarchically and an ftp component. The ftp component is configured to accept a connection from an ftp client and provide a hierarchical structure to the ftp client that enables access to the stored emails on an individual email basis. | 02-17-2011 |
20110047128 | Automatic Connection to an Online Service Provider from a Backup System - A software application is provided for a user to select a backed up data file and specify a task to be performed by an online service provider on the selected file. The application automatically connects to the online service provider and uploads the selected file for the online service provider to perform the task. Tasks that can be performed include printing, sharing, viewing, playing and archiving the selected file. Task preferences, user settings and user information can also be specified by the user and uploaded to the online service provider. Automatic connection to the online service provider can be via default setting, selected file type, or specified task. Alternatively, the user can designate which service provider is to perform the task. Payment for the task can be accomplished via bundled credits or by other payment mechanisms. | 02-24-2011 |
20110078120 | METHOD, SYSTEM AND DEVICES FOR COMMUNICATING BETWEEN AN INTERNET BROWSER AND AN ELECTRONIC DEVICE - A method, system and devices for communicating between an Internet browser and an electronic device are described. In accordance with one embodiment, there is provided a method for communicating between a computer and an electronic device connected to the computer through a communications protocol, the computer being in communication with network resources via a communications network, the method comprising: displaying a web page including a scripting language within an Internet browser on the computer, the Internet browser including a scripting engine for executing the scripting language; providing a scripting-language capable device controller for interfacing communications between the scripting engine and the electronic device in accordance with the communications protocol connecting the computer and electronic device; receiving by the scripting-language capable device controller of first data from the electronic device through the communications protocol; sending the first data from the scripting-language capable device controller to the scripting engine of the Internet browser; and sending the first data from the Internet browser to a network server connected to the communication network. | 03-31-2011 |
20110078121 | STORAGE SUBSYSTEM - The data up to a point of time whereat failure has occurred will be restored at high speed at a remote site without imposing any burden on a host. The first storage system on the master side processes an I/O request from the host, and as a result of I/O processing to the second storage system on the remote side, transmits the update data. The second storage system retains data received from the first storage system as update log data. The host transmits a command for settling a state of an application to the first storage system as data, and the first storage system transmits the data to the second storage system. The host and the second storage system both retain an identifier corresponding to the command, and relate the identifier to the log data. Thereby, the host designates the identifier at any given time, whereby the second storage system restores the data at any given time. | 03-31-2011 |
20110082837 | BACKUP SIMULATION FOR BACKING UP FILESYSTEMS TO A STORAGE DEVICE - Embodiments are directed to methods and apparatus that backup filesystems to a storage device. A backup simulation is used to determine a number of agents to backup the filesystems. | 04-07-2011 |
20110082838 | Computer security method and apparatus - A method of controlling a process on a computer system for backing-up files stored in a primary storage medium, to a secondary storage medium. The method comprises monitoring a file system implemented on the computer system in order to detect write operations made by the file system to said primary storage medium. Upon detection of a write operation, the integrity of a file being written is verified and/or changes in the file identified with respect to a version of the file currently stored in the primary storage medium and which is being replaced. In the event that the integrity of a file being written by the file system is compromised, and/or any identified changes in the file are suspicious, then the file is identified to the back-up process such that automatic back-up of the file is inhibited. | 04-07-2011 |
20110125715 | MANAGING COPIES OF DATA - A method in a computer system for retrieving data from one of multiple copies of the data is provided, referred to as the data management system. The data management system receives a request identifying at least one data object to be accessed. Then, the data management system queries a metabase to locate data copies that contain the identified at least one data object, wherein the data copies are created from similar source data, and wherein for each data copy the metabase contains an indication of the availability of the copy relative to other copies. Next, the data management system determines one of the located data copies to use to access the identified at least one data object, wherein the determination is made based on the indicated availability contained in the metabase for each of the located data copies. Then, the data management system accesses the identified at least one data object using the determined one of the located data copies. | 05-26-2011 |
20110131185 | HDAG BACKUP SYSTEM WITH VARIABLE RETENTION - A storage system efficiently allocates storage space for data backup. An illustrative storage system comprises a storage and backup logic that manages data backup in the storage and converts a file to a hash-based directed acyclic graph (HDAG) so that a hierarchy of nodes of the HDAGs contain a hash of child nodes. The backup logic creates multiple HDAGs for one or more of a plurality of retention policies and represents directories by a first node containing a payload of metadata and weak references to roots of child nodes, and a second node containing references to the first node and to any HDAGs corresponding to files and/or directories governed by an active policy of the plurality of retention policies. | 06-02-2011 |
20110145199 | SYSTEM AND METHOD OF STORING BACKUP IMAGE CATALOG - A system and method for managing backup and restore operations associated with a backup system. Metadata associated with files/directories of one or more file systems associated with one or more resources may be received. A virtual catalog image associated with the metadata may be created in a virtual file system image format. Once the virtual catalog image is created, virtualization vendor specific technology may be utilized to mount the image on the backup system and search and browse operations may be performed. The virtual catalog image may contain the file/directory hierarchy without containing actual file data. | 06-16-2011 |
20110145200 | PRECEDENCE BASED STORAGE - Techniques for precedence based storage are presented. Storage for a database is organized into storage pools; collections of pools form storage classes. The storage pools within a particular class are organized in a precedence-based order so that when storage for the database is needed, the storage pools are used in the defined order of precedence. Additionally, each storage pool or storage class can be circumscribed by security limitations, quality of service limitations, and/or backup procedures. | 06-16-2011 |
20110153571 | Analyzing Server Copies Of Client Files - One embodiment of a system for analyzing client file systems in accordance with the present disclosure comprises a backup repository storing backup data of file systems of client computers remote from the backup repository. The system further comprises a backup server that analyzes the file systems of the client computers using the backup data at the backup repository and reports a problem detected in a file system of a client computer to a user of the client computer. | 06-23-2011 |
20110202504 | BACKING UP OBJECTS TO A STORAGE DEVICE - One embodiment is a method that backups up objects to a storage device. A number of objects that are concurrently backed up to the storage device is limited. | 08-18-2011 |
20110202505 | COMPUTER PROGRAM PRODUCT AND DATA BACKUP METHOD - Provided is a computer program product for backing up data, which are stored in a first storage device connected with a computer, into a second storage device connected with the computer. The computer program product includes: a computer-readable medium; and a computer program code stored on the computer-readable medium, wherein the computer program code includes: a program code for generating backup data based on at least part of the data stored in the first storage device; a program code for obtaining, as identification data, at least one of image data and sound data provided by a separate program code that is different from the computer program and is executed during the generation of the backup data; and a program code for correlating the generated backup data to the obtained identification data and storing the backup data correlated to the identification data into the second storage device. | 08-18-2011 |
20110213755 | SYSTEMS AND METHODS OF HIERARCHICAL STORAGE MANAGEMENT, SUCH AS GLOBAL MANAGEMENT OF STORAGE OPERATIONS - A system and method for setting global actions in a data storage system is described. In some examples, the system determines a policy based on information from the system, and implements that policy to the system. In some examples, the system adds or modifies global filters based on information from the system. | 09-01-2011 |
20110231368 | ERROR TRACKING METHOD AND SYSTEM - Data storage services are provided for clients for backup of data objects from the clients. A data object is sent to a first location in a first storage device. A determination is made if the data object was successfully stored at the first location, and if so, meta data corresponding with the data object is stored, wherein the meta data includes first path information on a first data path of the data object to the first location. The data object is migrated from the first location to a second location in a second storage device. A determination is made if the data object was successfully stored at the second location, and if so, second path information on a second data path of the data object is added to the second location to the meta data corresponding with the data object, to update the meta data. | 09-22-2011 |
20110238627 | ONSITE BACKUP FOR THIRD PARTY INTERNET-BASED SYSTEMS - A system for onsite backup of internet-based data is provided. The system includes a central computer, a client computer, a communications link between the central computer and the Internet, and a communications link between the client computer and the Internet. The system also includes at least one database containing a plurality of data records accessible by the central computer, each data record containing a client identification number. Software executing on the central computer receives a data backup request, and software executing on the central computer transmits the data backup to the client computer. | 09-29-2011 |
20110238628 | METHODS, SYSTEMS AND PRODUCTS FOR DATA PRESERVATION - A method implementable by an electronic system comprises identifying an event corresponding to a data set, the data set being of a type of a plurality of data-set types; identifying the type of the data set; identifying an association between the type of the data set and an entity of a plurality of entities; and instructing the entity to perform an action with respect to the data set. | 09-29-2011 |
20110289059 | ORDERING VOLUMES AND TRACKS FOR DATA TRANSFER BASED ON USAGE CHARACTERISTICS - A data transfer application implemented in a computational device receives a request to copy a plurality of storage volumes that form a consistency group. A determination is made that a first storage volume of the plurality of storage volumes is more likely to be written into than a second storage volume of the plurality of storage volumes, in response to receiving the request to copy the plurality of storage volumes. The first storage volume is copied before copying the second storage volume, in response to determining that the first storage volume is more likely to be written into than the second storage volume. | 11-24-2011 |
20110295811 | CHANGING A NUMBER OF DISK AGENTS TO BACKUP OBJECTS TO A STORAGE DEVICE - A method executes a simulation to determine backup times to backup objects to storage devices using a number of concurrent disk agents that are assigned to each of the storage devices. The number of concurrent disk agents is changed during the backup of the objects to the storage devices. | 12-01-2011 |
20110313974 | PRIORITIZED DATA BACKUP - A prioritized data backup may be performed. Source data elements may by associated with local properties such as a base priority indicator and a current priority indicator. A base priority indicator associated with a given data element may convey the importance of that data element. The source data elements may be sorted into an order based on current priority indicators associated with individual ones of the source data elements. Source data elements associated with current priority indicators greater than or equal to a priority threshold may be backed up according to the order. Additional source data elements may be backed up according to the order when time remains in a backup window. | 12-22-2011 |
20120005166 | System and method for transactional deployment of J2EE web components, enterprise java bean components, and application data over multi-tiered computer networks - Provided is a computer system and method for transactional deployment of component(s) over a multi-tier network with J2EE application server program(s) stored on a memory(ies) of the system and which are executed by a central processing unit(s) (CPUs). A J2EE application(s) can be executed by the J2EE application servers, and a J2EE application container(s) are contained within each J2EE application server. Each J2EE application container contains a J2EE application container component(s) and a Java EJB container(s) or Java web containers are contained within each J2EE application container. A J2EE component(s) are delivered to the J2EE application server over one or more tiers of the network. There are one or more logical connections to one or more databases located on the network. This defines a sphere of control managing transactional deployment of the delivered J2EE component(s) and an update of the database to keep the data consistent with the J2EE application. | 01-05-2012 |
20120005167 | Context Aware Restore Mechanism - There is described a method, apparatus and a memory storing a computer program that operates to back-up data on a computer readable memory; and responsive to receiving a restore request to select a subset of the stored back-up data for restoring to a device based on operational capabilities of the device. In various embodiments, the operational capabilities can be determined from device capability indications received from the device which are used to select individual files of the back-up data set; security hashes on individual files can be generated, and sent to the device for each file of the subset; and/or the stored backup data is from a first device and the subset is restored to a second device based on operational capabilities of the second device which differ from those of the first device (for example, language capabilities of a multi-lingual software package). | 01-05-2012 |
20120011101 | INTEGRATING CLIENT AND SERVER DEDUPLICATION SYSTEMS - According to one embodiment of the present invention, a method for integrating client and server deduplication systems may be provided. In this method, a first hash set of a previous backup session may be received from a server. The first hash set may comprise a plurality of cryptographic values generated using a plurality of data blocks of a first data set of a client. A second hash set may be generated using a plurality of data blocks of a second data set of the client. A deduplicated data set may be generated by the client according to the first hash set and the second hash set and may comprise a plurality of non-redundant data blocks of the second data set. The second hash set and the deduplicated data set may be transmitted to the server. | 01-12-2012 |
20120011102 | Information Source Agent and Computer Program Product for Distributed Data Storage and Management Using Content Signatures - Information source agent and computer program product for distributed content storage and management using content signatures that use file identicality properties are provided. An information source agent is provided that includes a an information source collection agent for computing, gathering, or transporting file data information through the use of a content signature generator and content signature comparator, an information source modification agent that modifies files located on the information source client, and an agent controller to manage the operation of the information source collection agent. | 01-12-2012 |
20120016843 | Information Source Agent Systems and Methods for Backing Up Files To a Repository Using File Identicality - A system, method, and computer program product for storing back-up files using file identicality properties are provided. A system is provided that intercepts file information from files while they are being stored to a back-up system. The files are intercepted with a file gathering interface that is in communication with one or more information source clients. The system includes an indexing engine to index file data contents of the intercepted file, a metadata engine to manage metadata concerning the intercepted file, and a triage engine to manage the file gathering interface, the indexing engine, and the metadata engine. Methods are provided for the interception of files being sent to a back-up system that take advantage of file identicality properties. | 01-19-2012 |
20120030179 | SCALABLE AND USER FRIENDLY FILE VIRTUALIZATION FOR HIERARCHICAL STORAGE - In one embodiment, a method includes storing files in at least one directory in a first storage tier on at least one random access storage medium, creating an index file which includes entries for each file stored in the directory in the first storage tier on the at least one random access storage medium, aggregating in binary large objects (BLOBs) the files stored in the directory in the first storage tier on the at least one random access storage medium, writing out the aggregated BLOBs of files to a second storage tier on at least one sequential access storage medium, adding location information for each aggregated BLOB of files written to the second storage tier on the at least one sequential access storage medium to the index file, and copying the index file to the second storage tier on the at least one sequential access storage medium. | 02-02-2012 |
20120072398 | Method and Apparatus for Creating a Self Booting Operating System Image Backup on an External USB Hard Disk Drive That is Capable of Performing a Complete Restore to an Internal System Disk - Backup applications that use externally connected hard disk drives for storing full image backups of a windows system disk or compressed image or file by file backups of a windows system disk. A system incrementally updates the images, including the system registry, and puts information on the external drive that makes it bootable. | 03-22-2012 |
20120078852 | Prioritization of Data Items for Backup in a Computing Environment - Described are embodiments of an invention for prioritizing data items for backup in a computing environment. The computing environment includes a plurality of clients coupled through a network to a backup system for backing up items stored locally on the client. Each client includes a continuous data protection (CDP) module that prioritizes the order of files transmitted to the backup system for storage on one or more storage devices based on policy. The CDP module builds an initial backup list and a CDP backup list. The initial backup list includes any item that meets the criteria of the initial backup profile. The CDP backup list includes items that have been modified since the initial backup process began. The data that is the most critical to a user is often the most recently modified data. Thus, the CDP module preferentially performs a backup of items on the CDP backup list. | 03-29-2012 |
20120084261 | CLOUD-BASED DISASTER RECOVERY OF BACKUP DATA AND METADATA - Cloud storage services can be used to facilitate secondary backup and disaster data recovery without the need for specialized backup servers at the secondary location or cloud storage service. Backup data streams are transferred to a cloud storage service. In addition to the backup data streams, backup metadata is generated for each backup data stream. The backup metadata is adapted to configure a backup server to retrieve and access data in the backup data stream. The backup metadata is also transferred to the cloud storage service. To access data from the backup data stream, a recovery backup system is connected with the cloud storage service. Backup metadata is transferred from the cloud storage service to the recovery backup system. The recovery backup system is updated with the backup metadata, which configures the recovery backup system to retrieve and access data in the backup data stream. | 04-05-2012 |
20120089574 | PRIORITIZING DATA DEDUPLICATION - An example method includes controlling a data de-duplication apparatus to arrange a de-duplication schedule based on the presence or absence of a replication indicator in an item to be de-duplicated. The method also includes selectively controlling the de-duplication schedule based on a replication priority. In one embodiment, the method includes, upon determining that a chunk of data is associated with a replication indicator, controlling the data de-duplication apparatus to schedule the chunk for de-duplication ahead of chunks not associated with a replication indicator. In one embodiment, the method also includes, upon determining that the chunk is associated with a replication priority, controlling the data de-duplication apparatus to schedule the chunk for de-duplication ahead of chunks of data not associated with a replication priority. The schedule location is based, at least in part, on the replication priority. The method also includes controlling de-duplication order based on the schedule. | 04-12-2012 |
20120101998 | UPGRADE OF HIGHLY AVAILABLE FARM SERVER GROUPS - A machine manager controls the deployment and management of machines (physical and virtual) for an online service. Multi-tier server groups are arranged in farms that each may include different configurations. For example, their may be content farms, federated services farms and SQL farms that are arranged to perform operations for the online service. When the multiple farms are upgraded, new farms are deployed and the associated content databases from the old farms are moved to the newly deployed farms. During the upgrade of the farms, requests may continue to be processed by the farms. The farms may be automatically load balanced during an upgrade. As content becomes available on the new farm, requests for the content may be automatically redirected to the new farm. | 04-26-2012 |
20120101999 | PERFORMING A BACKGROUND COPY PROCESS DURING A BACKUP OPERATION - In one embodiment, a system includes a performance monitoring facility of a database adapted for measuring performance of the database regularly, a data protection manager for controlling a backup operation of the database on a storage subsystem, logic adapted for providing an interface between the performance monitoring facility of the database and the data protection manager, logic adapted for starting the backup operation while informing the performance monitoring facility about the starting of the backup operation, logic adapted for continuously evaluating performance of the database to determine when a predefined performance criterion is violated, and logic adapted for sending information from the performance monitoring facility to the data protection manager to cause compliance with the predefined performance criterion in response to the predefined performance criterion being violated. | 04-26-2012 |
20120102000 | FILE DEDUPLICATION IN A FILE SYSTEM - Each file is assigned in advance with a WWUID which is newly assigned to a file upon the creation or update of the file and is inherited from a file to a copied file when the file is copied. In a backup apparatus, a file name reception unit receives the file name of a backup target file. A WWUID reception unit receives a WWUID corresponding to the file name. A WWUID search unit searches for the same WWUID in backup management information of a previous day stored in a backup destination. Only if the search is failed, a file operation instruction unit instructs the storing of the backup target file into the backup destination. Then, an Rcnt update instruction unit instructs the updating of the number of references made to the WWUID within the backup destination. A second management information update instruction unit then instructs the updating of backup management information of the current day. | 04-26-2012 |
20120117030 | DATABASE MIGRATION MANAGEMENT APPARATUS AND METHOD THEREOF - A database migration management apparatus includes: a data storage destination decision unit for deciding to place target data in a first database and a second database when there exists an access pattern; and a migration schedule decision unit for, when the data storage destination decision unit places the target data in the first database and the second database: distinguishing a period during which the number of write access is equal to or more than a specified number to decide a migration schedule such that the target data obtained over a period corresponding to the distinguished period is placed in the first database; and distinguishing a period during which the number of read access is equal to or more than a specified number to decide a migration schedule such that the target data obtained over a period corresponding to the distinguished period is placed in the second database. | 05-10-2012 |
20120124003 | USING VERSIONING TO BACK UP MULTIPLE VERSIONS OF A STORED OBJECT - Using a versioning feature of an authoring application to back up multiple versions of a stored object in single, version-enabled instance stored on backup media is disclosed. In some embodiments, an indication is received that a subsequent version data associated with an object an existing instance of which is stored in a backup storage location is to be backed up. A version control mechanism of an authoring application that created or updated the object as stored in a primary storage location is invoked to incorporate the subsequent version data into the existing instance of the object as stored in the backup storage location. | 05-17-2012 |
20120130955 | BACKUP AND RESTORE DATA FROM A CLOUD COMPUTING ENVIRONMENT - A system and method for backing up data computed using an application in a cloud computing environment, comprising creating the application, modifying the application to register a servlet, publishing the application to the cloud computing environment, during execution of the application, using the servlet for: detecting annotated entities in the application, finding out properties and property types of the annotated entities, generating one or more structured query language (SQL) statements to query out data to be backed up in accordance with the annotated entities, and publishing the backed up data. Modifying may comprise inserting archiving-type files into the application. An annotation processor may be added to the application may occur. A user interface displaying one or more of the SQL statements performed during the execution of the application may be generated. The user may confirm the displayed SQL statements. A library may be added to the application. | 05-24-2012 |
20120136835 | METHOD AND APPARATUS FOR REBALANCING DATA - An approach is provided for rebalancing data. A backup of at least one database associated with a server is determined. A restoration of the backup to at least one other server is determined to be caused. Routing information to route queries for information stored in the at least one database is determined to be modified to the at least one other server as part of a rebalancing process. | 05-31-2012 |
20120143827 | BACKUP AND RESTORE SYSTEM FOR A COMPUTER - A method of defining a backup state of a file system is provided. A change in an electronic file stored on a computer system is detected. If the change is detected, a backup state of the electronic file is updated using an overlay icon associated with the electronic file. The overlay icon is presented in a user interface displaying the file system of the computer system. The backup state indicates that the electronic file is selected for backup processing if the change is detected. If the backup state indicates the electronic file is selected for backup processing, a copy of the electronic file is sent to a second computer system accessible by the computer system using a network. | 06-07-2012 |
20120150810 | Backing up data objects identified by search program and corresponding to search query - A backup program running on a computing device receives a search query. The backup program transmits the search query to a search program. The backup program receives search results corresponding to the search query from the search program. The search results include a list of data objects stored on a storage device and that satisfy the search query. The backup program backs up one or more selected data objects of the list of data objects. The backup program can periodically and automatically without user interaction retransmit the search query to the search program, and receive updated search results corresponding to the search query from the search program. The updated search results include an updated list of data objects stored on the storage device that satisfy the search query. The backup program can then back up the data objects within the updated list of data objects. | 06-14-2012 |
20120185438 | LOCAL BACKUP - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data. In one aspect, a method includes receiving a user input to present a visual representation of a first prior state of a file system; generating the first visual representation of a first prior state of the file system at a first time in the past according to a first virtual file system corresponding to that first time; presenting the first visual representation, where the first virtual file system is a reduced representation of the file system at that first time; receiving a user input to present a second visual representation of a second prior state of the file system at a second time in the past according to a second virtual file system corresponding to that second time; and presenting the second visual representation. | 07-19-2012 |
20120191656 | System And Method For Common Data Service - Systems, methods, and computer program products are provided for providing data from a common data service. In one exemplary embodiment, there is provided a method for providing data from a common data service. The method may include receiving data from one or more databases in one or more systems. The method may include storing a duplicate copy of the received data as one or more documents. The method may also include receiving a request for one or more documents of the stored data. The method may further include transmitting the one or more documents of the stored data. | 07-26-2012 |
20120191657 | DATA BACKUP, STORAGE AND MANAGEMENT SYSTEM AND METHODOLOGY - Systems and methods for simultaneously providing local data backup and online data backup. A local backup device is programmed with an application, which allows a user to connect a client device to the local backup device and to an online backup service so that data backup can be done simultaneously to the local backup device and to the online backup service. | 07-26-2012 |
20120191658 | DATA PROTECTION - Presented is a method of protecting data. The method includes recognizing a newly created data file, providing at least one data protection policy for selection by a user, obtaining a user input for selecting at least one data protection policy, applying the selected data protection policy to the newly created data file, creating a backup copy of the newly created data file based on the applied data protection policy, and storing the backup copy of the newly created data file based on the applied data protection policy. | 07-26-2012 |
20120209814 | PROCESSES AND METHODS FOR CLIENT-SIDE FINGERPRINT CACHING TO IMPROVE DEDUPLICATION SYSTEM BACKUP PERFORMANCE - A system and method for caching fingerprints in a client cache is provided. A data object that comprises a set of data segments and describes a backup process is identified. Thereafter, a request referencing the data object is made to a deduplication server to request that a task identifier be added to the data object. If the deduplication server is able to successfully add the task identifier to the data object, then an active identifier is added to each data segment from the set of data segments in a cache that is within a client system. | 08-16-2012 |
20120215743 | Backup And Retention Monitoring - A system and method of monitoring retention of backups made of various systems, servers, files, etc. is provided. The system and method may include receiving retention data at a retention monitoring system. The retention data may include an actual retention period for one or more systems, servers, files, etc. and may further include determining whether the actual retention period matches a predefined retention period. If so, the data may be formatted, compiled, and displayed. If the actual retention period does not match the predefined retention period, the retention data may be identified as non-standard and then may be formatted, compiled, and/or displayed. Additional aspects of the system and method may include receiving an actual amount of storage capacity used by the backups of the systems, servers, files, etc. If the actual amount of storage capacity does not match an allotted amount of capacity, the data may be identified as non-standard. | 08-23-2012 |
20120221526 | SYSTEM AND METHOD FOR PROVIDING SERVER APPLICATION SERVICES WITH HIGH AVAILABILITY AND A MANY-TO-ONE HARDWARE CONFIGURATION - A suite of network-based services, such as the services corresponding to the server application distributed by Microsoft® SharePoint™, may be provided to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index and search functions, document-management functions, help and help search functions, and/or other functions. A plurality of computing devices functioning as servers may be backed up by a single computing device. | 08-30-2012 |
20120221527 | Multiplex Backup Using Next Relative Addressing - According to one embodiment of the present disclosure, a method for multiplex backup using next relative addresses may be provided. The method may include receiving a first chunk and a second chunk that are each associated with a first file. A next relative address may be appended to the first chunk. The next relative address may indicate a position in a storage device. The first chunk with the next relative address may be written to the storage device at a first address. The method may further include writing the second chunk to the storage device at the position indicated by the next relative address of the first chunk. | 08-30-2012 |
20120233126 | PORTABLE DEVICE AND BACKUP METHOD THEREOF - Another embodiment of the invention provides a data saving system including a portable device having a first data, a third party and a storage management server. The storage management server connects at least one backup device, wherein when the portable device wants to save the first data, the portable device transmits the first data and a save command to the third party, the storage management server monitors the third party to determine whether there is data designated to the storage management server, and if yes, the storage management server acquires and transmits the first data to the backup device. | 09-13-2012 |
20120271800 | FILE DEDUPLICATION IN A FILE SYSTEM - Each file is assigned in advance with a WWUID, newly assigned to a file upon the creation or update of the file and inherited from a file to a copied file when it is copied. In a backup apparatus, a file name reception unit receives the file name of a backup target file. A WWUID reception unit receives a WWUID corresponding to the file name. A WWUID search unit searches for the same WWUID in backup management information of a previous day stored in a backup destination. Only if the search is failed, a file operation instruction unit instructs the storing of the backup target file into the backup destination. Then, an Rcnt update instruction unit instructs the updating of the number of references made to the WWUID within the backup destination. A second management information update instruction unit then instructs updating of backup management information of the current day. | 10-25-2012 |
20120278287 | DISCOVERING CLUSTER RESOURCES TO EFFICIENTLY PERFORM CLUSTER BACKUPS AND RESTORES - A system and method for identifying properties of virtual resources to efficiently perform backups and restores of cluster data. A cluster of nodes is coupled to a data storage medium. A node receives a request for a backup or a restore of cluster data. In response to this request, the node queries a cluster subsystem and a virtual subsystem of all other cluster nodes for identification of VMs, a subset of corresponding stored data, and an identification of VMs which are highly available (HA). In response to receiving query responses, the node aggregates the results and sends them to a backup server. These to aggregated results may then be used to schedule subsequent backup and restore operations. In addition, the node may use the results to complete the current backup or restore operation. | 11-01-2012 |
20120290537 | IDENTIFYING MODIFIED CHUNKS IN A DATA SET FOR STORAGE - Provided are a computer program product, system, and method for identifying modified chunks in a data set for storage. Information is maintained on a data set of variable length chunks, including a digest of each chunk and information to locate the chunk in the data set. Modifications are received to at least one of the chunks in the data set. A determination is made of at least one range of least one of the chunks including data affected by the modifications, wherein each range identifies one chunk or sequential chunks having data affected by the modifications. The at least one chunk in each range is processed to determine at least one new chunk in each range, and for each determined new chunk, a digest of the new chunk. A determination is made as to whether at least one chunk outside of the at least one range has changed. For each determined at least one chunk outside of the at least one range that has changed, a determination is made of at least one new chunk and a new digest of the at least one new chunk. Adding to the set information the new digest information on the at least one new chunk and information to locate the new chunk in the data set. | 11-15-2012 |
20120290538 | TERMINAL DEVICE FOR DATABASE OPERATIONS - Provided in one embodiment of the present invention is a computer system including a database server and a terminal device for communicating with the database server; the said database server retaining a database; and the terminal device including: an interface for receiving data, which is stored in the database retained in the database server, via a communication network; a buffer for storing the data received by the interface in order to display the data in a window which is to be displayed on a display device; and a controller for starting saving the data, which is stored into the buffer, in a file at a time interval, with the window being displayed on the display device being as a trigger. | 11-15-2012 |
20120303587 | BACKUP INFORMATION MANAGEMENT - Information management is disclosed. A file output from an application to an operating system is intercepted before the file output arrives at the operating system. The file output is directed towards protected data. The intercepted file output is analyzed to determine whether a predetermined type of version of the protected data has been created. In the event it is determined that the predetermined type of version of the protected data has been created at least in part because the analyzed intercepted file output includes a modification to the protected data, the protected data automatically backed up, including by storing at least a portion of the file output as a backup version of the protected data. In the event it is determined that the predetermined type of version of the protected data has not been created, the protected data is not backed up. | 11-29-2012 |
20130024426 | TRANSFER OF USER DATA BETWEEN LOGICAL DATA SITES - The data transfer between data backup sites techniques include a method, a system, and/or a computer software product. In some embodiments of these techniques, the method includes determining backup data for transferring from a source data backup site to a destination data backup site based on a storage parameter, the backup data comprising data associated with a client device. The method further includes receiving a transfer parameter from the destination data backup site, the transfer parameter comprising a storage logical site available for data storage. The method further includes matching the determined backup data to the storage logical site based on a parameter selected from a group consisting of the storage parameter, and the transfer parameter. The method further includes scheduling a transfer of the determined backup data to the storage logical site based on a parameter selected from a group consisting of the storage parameter, the transfer parameter, and a schedule parameter. | 01-24-2013 |
20130036095 | DISCOVERY OF NON-STANDARD FOLDERS FOR BACKUP - The identifying folder paths for backup techniques include a method, a system, and/or a computer software product. In some embodiments of these techniques, the method includes scanning a client device for folders. The method further includes identifying one or more folder paths on a client device according to a pre-defined criteria associated with a backup policy for the client device. The method further includes consolidating the one or more folder paths into a consolidated list of folder paths. The method further includes presenting the consolidated list of one or more folder paths to a user. This Abstract is provided for the sole purpose of complying with the Abstract requirement rules. This Abstract is submitted with the explicit understanding that it will not be used to interpret or to limit the scope or the meaning of the claims. | 02-07-2013 |
20130054535 | CLIENT AND SERVER FOR INSTALLATION OF FILES EMBEDDED WITHIN A CLIENT PROFILE - Example embodiments relate to distribution of a profile from a server to a client. In example embodiments, a server enables an administrator or other user to embed a file into a profile, where the profile is a structured document including the file and a storage location for the file on the client. The server may then transmit the profile to the client, which, upon receipt of the profile, may extract the embedded file from the structured document to a storage location on the client specified in the profile. | 02-28-2013 |
20130054536 | BACKUP OF DATA ACROSS NETWORK OF DEVICES - A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available. | 02-28-2013 |
20130085999 | DISTRIBUTED COMPUTING BACKUP AND RECOVERY SYSTEM - The distributed computing backup and recovery (DCBR) system and method provide backup and recovery for distributed computing models (e.g., NoSQL). The DCBR system extends the protections from server node-level failure and introduces persistence in time so that the evolving data set may be stored and recovered to a past point in time. The DCBR system, instead of performing backup and recovery for an entire dataset, may be configured to apply to a subset of data. Instead of keeping or recovering snapshots of the entire dataset which requires the entire cluster, the DCBR system identifies the particular nodes and/or archive files where the dataset resides so that backup or recovery may be done with a much smaller number of nodes. | 04-04-2013 |
20130086000 | MANAGING BACK UP OPERATIONS FOR DATA - Backup operations for data resources can be managed as follows. At least one data resource residing on at least one data storage device is identified. An information processing system automatically determines that the at least one data resource fails to be associated with a backup policy. In response to the at least one data resource failing to be associated with a backup policy, at least one backup policy is associated with the at least one data resource. | 04-04-2013 |
20130110785 | SYSTEM AND METHOD FOR BACKING UP TEST DATA | 05-02-2013 |
20130110786 | DISTRIBUTED FILE SYSTEM AND METHOD OF SELECTING BACKUP LOCATION FOR THE SAME | 05-02-2013 |
20130151475 | Data Management System with Console Module - A data management system that is enabled such that the user can select a data source node, a repository and a data path, choose policies for each and distribute the policies to be managed by the management system. | 06-13-2013 |
20130159258 | DATA SET INDEX RECORD PRESERVATION - Portions of index information are pulled from a name directory and an attribute directory to form a new subindex data set that is stored as a separate file from the name directory and the attribute directory. The name directory and the attribute directory each being associated with partitioned data set extended (PDSE) data sets stored sequentially in members. Pursuant to an update to the PDSE data sets, a selected portion of an index record of the dataset is stored as a record in the new subindex data set and the storing includes acting on an integrated catalog facility catalog to perform operations relating to allowacation and maintenance of the new subindex data set. An oldest existing record is replaced with a recent version if a determination is made that adding the recent version exceeds a predetermined number of versions. A component of the new subindex data set is recoverable. | 06-20-2013 |
20130173555 | Reducing a Backup Time of a Backup of Data Files - A mechanism is provided for reducing the backup time of data files from a memory. Data files are pre-staged by identifying the data files in the memory to be backed up to a backup storage system, sorting the data files by size thereby forming a set of small data files and a set of large data files, and copying the set of small data files to a cache while leaving the set of large data files in a disk subsystem. The set of small data files are then backed-up from the cache and the set of large data files are backed-up from the disk subsystem to a backup storage system. Thus, the time required to backup the set of small data files from the cache is performed at a faster rate as compared to backing up the set of large data files from the disk subsystem. | 07-04-2013 |
20130179403 | MOBILE TERMINAL AND CONTROLLING METHOD THEREOF - A mobile terminal and controlling method thereof are disclosed, by which restoration and backup operations are performed for the mobile terminal. For example, the mobile terminal includes a controller performing a backup operation and a restoration operation on the mobile terminal, the controller including an application module for activating a backup restoration application and at least one or more applications; and a Linux kernel module for managing a basic hardware function of the mobile terminal, the Linux kernel module including a backup restoration service unit having an access authority for accessing a file system of each of the at least one or more applications, wherein the backup restoration application accesses the file system of each of the at least one or more applications and then performs the backup and restoration operations on data of each of the at least one or more applications. | 07-11-2013 |
20130198141 | TECHNIQUES FOR LEVERAGING REPLICATION TO PROVIDE ROLLING POINT IN TIME BACKUP WITH SIMPLIFIED RESTORATION THROUGH DISTRIBUTED TRANSACTIONAL RE-CREATION - Techniques to leverage replication to provide rolling point in time backup are described. Some embodiments are directed to techniques to provide rolling point in time backup with simplified restoration through distributed transactional re-creation. In one embodiment, for example, a technique may comprise creating a plurality of availability copies of a primary set of data; designating at least one of the plurality of availability copies as a backup copy; creating a log file that indicates changes to the primary set of data; updating the plurality of availability copies from the log file in near real time, without updating the backup copy; and restoring at least one of: the primary set of data and an availability copy using the backup copy and content resubmitted from a content contributor when an error occurs in at least one of: the primary set of data and an availability copy. Other embodiments are described and claimed. | 08-01-2013 |
20130212070 | MANAGEMENT APPARATUS AND MANAGEMENT METHOD FOR HIERARCHICAL STORAGE SYSTEM - The present invention enhances user usability by storing more files close to the user. A replication processing part | 08-15-2013 |
20130238563 | AUTOMATED, TIERED DATA RETENTION - The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period. | 09-12-2013 |
20130262392 | INFORMATION MANAGEMENT OF MOBILE DEVICE DATA - A method and system for providing information management of mobile device data provides a user interface to permit a user of an information management system to define information management policies for the mobile device, receives definitions of the information management policies from the provided interface, and sends data from the mobile device to the information management system in accordance with the information management policies. In some examples, the system sends information identifying the user and the mobile device to the information management system, and/or sends the information management policies defined from the interface to the information management system. | 10-03-2013 |
20130275382 | BALANCING DATABASE WORKLOADS THROUGH MIGRATION - A method for balancing database workloads among a plurality of database servers includes when a new server is available, selecting a set of master and slave databases to be migrated to the new server; and migrating the selected databases to result in a balanced new workload among all servers while minimizing migration cost; and during operation, if workload unbalance is detected in real time from a workload change in a certain database, iteratively selecting one database at a time to migrate to a different server to balance the workload. | 10-17-2013 |
20130290265 | Backup jobs scheduling optimization - Scheduling of backup jobs is optimized in accordance with a characteristic of the backup jobs. The characteristic of the backup jobs can take into account a number of the backup jobs that are stale. A stale backup job is a backup job in which no backed up data changed during a most recent performance of the backup job. | 10-31-2013 |
20130339307 | MANAGING SYSTEM IMAGE BACKUP - A method, system or computer usable program product for backing up a system image including receiving a request to backup a first system image on a first computer system onto a server, selecting a similar system image from a catalog of images, identifying a first set of differences between the similar system image and the first system image, and backing up the first system image by transferring the first set of differences to the server. | 12-19-2013 |
20140006355 | INFORMATION PROCESSING SYSTEM, BACKUP MANAGEMENT METHOD AND PROGRAM | 01-02-2014 |
20140019418 | PREVENTING MOBILE COMMUNICATION DEVICE DATA LOSS - A mobile communication device includes a temperature sensor configured to sense a temperature and a control unit configured to determine whether a change in the sensed temperature relative to a previously-sensed temperature corresponds to a critical time range. The control unit is also configured to store data in a data storage unit when it is determined that the change in the sensed temperature corresponds to the critical time range. | 01-16-2014 |
20140025638 | Method, system and serving node for data backup and restoration - Disclosed is a method, a system and a serving node for data backup and restoration, in which a serving node generates a backup schedule after receiving a data backup request, uploads the schedule to a cluster public storage block, each serving node sends a copy to be backed up to a target node for consolidation; a client sends a data record in a consolidated copy to the serving node through a data writing request, generates a data distribution table according to a load balancing principle, sends the request to other serving nodes according to the table to perform a write operation, the client sends the data writing request for a next data record after the write operation, until the copy is completely restored. The backup and restoration is performed in a complex cluster network accounting for performance differences among serving nodes, data consistency, data integrity and data uniform distribution. | 01-23-2014 |
20140025639 | DATA BACKUP, STORAGE AND MANAGEMENT SYSTEM AND METHODOLOGY - Systems and methods for simultaneously providing local data backup and online data backup. A local backup device is programmed with an application, which allows a user to connect a client device to the local backup device and to an online backup service so that data backup can be done simultaneously to the local backup device and to the online backup service. | 01-23-2014 |
20140025640 | DATA MINING SYSTEMS AND METHODS FOR HETEROGENEOUS DATA SOURCES - Systems and methods integrate disparate backup devices with a unified interface. In certain examples, a management console manages data from various backup devices, while retaining such data in its native format. The management console can display a hierarchical view the client devices and/or their data and can further provide utilities for processing the various data formats. A data structure including fields for storing both metadata common to the client device data and value-added metadata can be used to mine or process the data of the disparate client devices. The unified single platform and interface reduces the need for multiple data management products and/or customized data utilities for each individual client device and provides a single pane of glass view into data management operations. Integrating the various types of storage formats and media allows a user to retain existing storage infrastructures and further facilitates scaling to meet long-term management needs. | 01-23-2014 |
20140046905 | Organized Data Removal or Redirection from a Cloning Process to Enable Cloning a Larger System to a Smaller System - The present invention is a system to automatically remove sets of pre specified files or divert sets of pre specified files from the files that would normally be sent to a storage device during a backup or cloning operation. The invention is used to allow a backup of a storage device onto a smaller capacity storage device or for creating sets of backups each of which may contain different sets of files from the source storage device. The invention consists of sets of lists which drive the backup engine and provide the intelligence for determining which files are backed up, diverted to another storage device, or not transferred. | 02-13-2014 |
20140052694 | DATA BACKUP PRIORITIZATION - A method for prioritizing data backup requests includes assigning priority values to a plurality of parameters, each parameter being associated with a plurality of data backup requests. The data backup requests can be sorted according to a primary parameter based on the priority values to prioritize the data backup requests. The data backup requests can also be sorted according to a secondary parameter when at least two of the data backup requests have a same primary parameter priority value. | 02-20-2014 |
20140081920 | MEDIUM, CONTROL METHOD, AND INFORMATION PROCESSING APPARATUS - A medium stores a control program for an information processing apparatus. The control program causes the information processing apparatus to execute a procedure. The procedure includes obtaining history information on a type of an operation performed to each of a plurality of files, calculating a priority for a file among the files based on the type of the operation in the history information, and selecting a file among the files based on the priority. | 03-20-2014 |
20140101110 | HIGH AVAILABILITY EVENT LOG COLLECTION IN A NETWORKED SYSTEM - A method includes storing data received at a first server to a first file and storing data received at a second server to a second file, where the data in the two files are substantially similar. The two files are distinct, independent files. The first server provides a copy of the first file to the second server to store. The first server then stores additional data to the first file, while the second server maintains the copy of the first file unchanged. The second server may also provide a copy of the second file to the first server to store and continues to store additional data to the second file, while maintaining the copy of the second file on the first server unchanged. Event reports may then be generated using the various files, which provide high availability due to the above method and corresponding system arrangement. | 04-10-2014 |
20140101111 | BACKUP OF DATA ACROSS NETWORK OF DEVICES - A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available. | 04-10-2014 |
20140136485 | FILE MANAGEMENT SYSTEM AND FILE MANAGEMENT METHOD - [Problem] To provide a file management system and file management method that are able to perform a backup process efficiently by means of a configuration that uses a virtual file system metadatabase from a backup process side also. [Solution] The file management system is provided with a virtual drive controller ( | 05-15-2014 |
20140149358 | CONFIGURING COMPUTING DEVICES USING A TEMPLATE - According to example implementations, computing devices are configured using a template. The template specifies at least one computing device property and backup control information relating to backing up data from the computing devices to a backup system. The computing devices are reconfigured in response to modification of the template. | 05-29-2014 |
20140164335 | DATABASE IN-MEMORY PROTECTION SYSTEM - A computer-implemented process provides data protection of an in-memory database. The method may include triggering the securing of data of the in-memory database to a first savepoint; securing data of the in-memory database to the first savepoint; and backing up the data of the first savepoint on a persistent storage medium. The data of the first savepoint may be stored on a first persistent medium and the backup data of the first savepoint are stored on a second persistent storage medium. The availability of two different savepoint data on physically different storage media increases the probability of having always savepoint data ready for recovery purposes dramatically. By using different storage media, even in cases of a hardware damage savepoint data will be available. | 06-12-2014 |
20140181044 | SYSTEMS AND METHODS TO IDENTIFY UNCHARACTERIZED AND UNPROTECTED VIRTUAL MACHINES - Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system automatically identifies and categorizes unprotected virtual machines. The system further identifies those unprotected virtual machines that remain uncategorized and notifies a system administrator of the unprotected virtual machines. The system further applies a default backup policy to the uncategorized and unprotected virtual machines to provide protected virtual machines. | 06-26-2014 |
20140181045 | SYSTEMS AND METHODS TO IDENTIFY UNPROTECTED VIRTUAL MACHINES - Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system compares a list of virtual machines with a list of computing devices having a designated backup policy in the data storage system and determines which of the virtual machines are unprotected. The system further automatically categorizes the unprotected virtual machines, identifies those unprotected virtual machines that remain uncategorized, and applies a default backup policy to the uncategorized and unprotected virtual machines to provide protected virtual machines. | 06-26-2014 |
20140181046 | SYSTEMS AND METHODS TO BACKUP UNPROTECTED VIRTUAL MACHINES - Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system automatically identifies and categorizes unprotected virtual machines. The system further identifies those unprotected virtual machines that remain uncategorized, applies a default backup policy to the uncategorized and unprotected virtual machines, and backs up the virtual machines using the default backup policy. | 06-26-2014 |
20140181047 | SYSTEMS AND METHODS TO PROTECT DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. The system copies the data to temporary storage, normalizes the copy, and merges the normalized data from the temporary storage to a secondary storage device. For instance, the system merges the data on the secondary storage device at locations indicated by the file path saved in metadata. In another manner, the system merges changes between the previously backed up version of the data and the data identified for deletion into the previously backed up version of the data stored on the secondary storage device at the locations indicated by the file path. In a further manner, the system merges the differences between the previously backed up version of the data and the data identified for deletion at the locations indicated by the file path. | 06-26-2014 |
20140188808 | BACKUP USER INTERFACE - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data are disclosed. In some implementations, visual representations of files are generated for presentation in a backup user interface. The visual representations are generated from sparse file system metadata stored on the computing device, thus allowing faster navigating of the backup user interface. During a restore operation, the metadata can be used to retrieve the items from their physical storage locations. In some implementations, when the storage capacity of a backup storage device exceeds a threshold, the data for the N oldest backups are replaced with sparse file system metadata, which can be used to generate visual representations for presentation in the backup user interface. | 07-03-2014 |
20140201157 | SYSTEMS AND METHODS FOR RULE-BASED VIRTUAL MACHINE DATA PROTECTION - A data storage system backs up or protects virtual machines. For instance, the system identifies the different virtual machines executing in the system and provides a number of factors that can be used to create a backup policy. The system further creates specific rules for virtual machine backup policies using a user interface with drop down boxes of relevant criteria and Boolean operators. A preview of included virtual machines allows the rule to be refined. Particular virtual machines can be excluded during the preview. The system further dynamically updates the list of virtual machines satisfying the rules at time of backup. | 07-17-2014 |
20140222761 | Terminal Backup and Recovery Method - The invention discloses a terminal backup and recovery method. When in backup, a user interface is provided at a terminal side first, so as to provide, according to a preset display policy, different backup categories for a user to select, wherein the different backup categories comprise different backup objects. Then, according to a backup category and object selected by the user, at the terminal side, a terminal file corresponding to the backup object is backed up at a cloud server according to a preset backup policy. When in recovery, according to a recovery category and object selected by the user, a file already backed up by the terminal/user and corresponding to the backup object is determined at the cloud server, and according to a preset recovery policy, corresponding recovery is executed at the terminal side by using the backed-up file. The invention provides classified backup and recovery, and increases the speed of backup and recovery. | 08-07-2014 |
20140236901 | DATA MIGRATION MANAGEMENT - Technologies are generally described for managing data migration between databases. In some examples, a data migration management system may include a data migration management unit,configured to manage a migration of data stored in a first database to a second database, a game management unit configured to design a game for the migration of at least some of the data managed by the data migration management unit and to provide the designed game to a player, and a player management unit configured to manage participation of the player for the game designed by the game management unit. | 08-21-2014 |
20140236902 | User Data Backup Method and Apparatus - The invention discloses a user data backup method, comprising: searching a local computer of a user for an editable document; according to a search result, marking the editable document as data with backup requirement; and backing up the data with backup requirement in a storage device on a network side. Also disclosed is another user data backup method, comprising: monitoring a removable storage device connection status of a local computer of a user; if it is detected that a removable storage device is connected to the local computer, marking data in the device as data with backup requirement; and backing up the data with backup requirement in a storage device on a network side. Further disclosed is yet another user data backup method, comprising: monitoring a resource class temporary file generated in a local system; uploading the resource class temporary file to a storage device on a network side; and according to an access requirement of the local system, providing the local system with download of the uploaded resource class temporary file. | 08-21-2014 |
20140244589 | SERVER, BACKUP SYSTEM AND BACKUP METHOD - A server includes: a first data storage device that stores therein data for use in service provided by the server; a backup data storage device that stores therein backup data for data stored in a second data storage device of another server; a service provision unit that provides the service by using the data stored in the first data storage device and by using the backup data stored in the backup data storage device; an update information creation unit that creates update information representing a content of the updating of the first data storage device; an update information transmission unit that transmits the created update information to the another server; and an update information reception unit that receives update information which is transmitted from the another server, and reflects the content of updating of the second data storage device on the backup data stored in the backup data storage device. | 08-28-2014 |
20140244590 | HYBRID DATA BACKUP IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”. A storage solution is then determined based on the set of storage configuration parameters. In general, the storage solution identifies at least one local storage resource and at least one remote storage resource (e.g., a cloud storage resource) for backing up the portions of the set of data that are unique to the set of data. Once the storage solution has been determined, the unique portions of the set of data will be stored in accordance therewith. | 08-28-2014 |
20140279921 | System and Method of Deletion and Backup of Social Networking Generated contents - A system and method is provided to programmatically backup and delete social networking generated (SNG) contents of a user generated by social networking activities conducted through a social network provider (SNP) with which the user has an account. The system comprises means for setting criteria for target SNG contents to be either backed-up or deleted. The criteria include at least one timeframe criterion and content type criterion. The system further comprises execution means for programmatically downloading or deleting the target SNG contents stored in the SNP. The system further comprises means for invoking the execution means. | 09-18-2014 |
20140279922 | DATA PROTECTION SCHEDULING, SUCH AS PROVIDING A FLEXIBLE BACKUP WINDOW IN A DATA PROTECTION SYSTEM - A data protection scheduling system provides a flexible or rolling data protection window that analyzes various criteria to determine an optimal or near optimal time for performing data protection or secondary copy operations. While prior systems may have scheduled backups at an exact time (e.g., 2:00 a.m.), the system described herein dynamically determines when to perform the backups and other data protection storage operations, such as based on network load, CPU load, expected duration of the storage operation, rate of change of user activities, frequency of use of affected computer systems, trends, and so on. | 09-18-2014 |
20140289204 | EXECUTING A FILE BACKUP PROCESS - A technique to execute a backup process efficiently when an identical file is owned by multiple persons in order to decrease storage capacity and traffic volume requirements. In a backup system including a backup execution terminal, backup destination terminals, and a management server, the backup execution terminal executes a deemed backup process for deeming the file identical to the target file and owned on the backup destination terminals to be a backup duplicate of the target file, or an actual backup process for sending the target file to the management server, each of the backup destination terminals stores the backup execution terminal and the file identical to the target file in association with each other at the time of the deemed backup, and the management server stores the target file sent from the backup execution terminal at the time of the actual backup. | 09-25-2014 |
20140304232 | EMPLOYING USER-CONTEXT IN CONNECTION WITH BACKUP OR RESTORE OF DATA - The claimed subject matter relates to architectures for facilitating network-accessible or local backup or restore features in a manner that leverages event-oriented contextual information associated with one or more users of the data to be backed up or restored. In particular, a first restore-based architecture can interface with an associated second backup-based architecture that hosts or maintains a backup data store in order to retrieve a version of the data file that is desired by a user. Additionally, the first architecture can obtain a log of contextual event descriptions that can be aggregated by the second architecture or obtained independently from, e.g., a social networking service or a calendar application associated with the user. Thus, in addition to displaying time and date information associated with the desired version, the first architecture can provide the user with a social context of event from the social services feeds to aid the user in distinguishing between multiple versions of the data file. | 10-09-2014 |
20140351220 | CONFIGURATION OF ONE OR MORE COMPUTER DEVICES - An image loader resource invokes execution of a backup restoration function in a target computer device to be configured or reconfigured. The backup restoration function in the target computer device is present on the target computer device to receive a device image of data settings derived from a previously configured computer device. In furtherance of configuring the target computer device, the image loader resource retrieves a device image. According to one configuration, rather than being an actual device image obtained from a previously configured or already used computer device, the device image information is synthesized from a set of computer configuration instructions received from an administrator resource. The computer configuration instructions specify settings to be applied to the target computer device. The image loader resource communicates the synthesized device image information to the backup restoration function on the target computer device to configure the target computer device. | 11-27-2014 |
20140351221 | TRANSFER OF USER DATA BETWEEN LOGICAL DATA SITES - The present application is directed to systems and methods for transferring data between data backup sites. Backup data for transferring from a source data backup site to a destination data backup site is determined based on a storage parameter, the backup data comprising data associated with a client device. A transfer parameter is received from the destination data backup site, the transfer parameter comprising a storage logical site available for data storage. The determined backup data is matched to the storage logical site based on a parameter selected from a group consisting of the storage parameter, and the transfer parameter. A transfer of the determined backup data to the storage logical site is scheduled based on a parameter selected from a group consisting of the storage parameter, the transfer parameter, and a schedule parameter. | 11-27-2014 |
20140379660 | BACKUP LIFECYCLE MANAGEMENT - A system includes determination of a plurality of backup jobs based on a backup catalog, the backup catalog comprising a plurality of records, each of the plurality of records associated with one of the plurality of backup jobs, reception of a first instruction to delete a first backup job of the plurality of backup jobs, and, in response to the first instruction, addition of a first record associated with the first backup job to the backup catalog, wherein the first record indicates that the first instruction to delete the first backup job was received. | 12-25-2014 |
20150012496 | STORAGE DEVICE AND METHOD FOR CONTROLLING STORAGE DEVICE - A storage device includes a first storage unit, a second storage unit, and a processor. The first storage unit is configured to temporarily store therein a file. The second storage unit is configured to store therein backup data of the file stored in the first storage unit. The processor is configured to manage update states of files stored in the first storage unit and a requirement to be satisfied for backing up the files stored in the first storage unit into the second storage unit. The processor is configured to store, in the second storage unit, first backup data of a first file among the files stored in the first storage unit. An update state of the first file satisfies the requirement. | 01-08-2015 |
20150012497 | CLUSTER-WIDE UNIQUE ID FOR OBJECT ACCESS CONTROL LISTS - A redundant array of independent nodes are networked together. Each node executes an instance of an application that provides object-based storage. The nodes are grouped into systems each having multiple nodes. Objects in the systems have access control lists (ACLs) associated therewith. A method of providing a search key to each ACL in any one system comprises: selecting a region for each metadata object pertaining to the objects in the system; and generating, for each ACL associated with an object in the system, an ACL ID (identifier) as a search key which includes the region number of the region selected for the metadata object pertaining to the object, a region map level corresponding to the region selected, and a monotonically increasing counter value that is automatically incremented each time an ACL ID is generated. The ACL ID remains unique during reconfiguration via splitting/merging existing distributed portions of the database. | 01-08-2015 |
20150046402 | DATA BACKUP ACROSS PHYSICAL AND VIRTUALIZED STORAGE VOLUMES - Machines, systems and methods for backing up data, the method comprising retrieving identifying information about target data storage volumes from which target data is to be backed up; communicating the identifying information to a proxy application installed on a backup computing system utilized to backup the target data stored on the target data storage volumes, wherein the proxy application uses the identifying information to place the target data storage volumes in a first state in which write operations may not be performed to the target data storage volumes, wherein the proxy application causes snapshots to be taken of the target data storage volumes of a first type and a second type, in response to determining that the target data storage volumes are placed in the first state. | 02-12-2015 |
20150046403 | Processes and Methods For Client-Side Fingerprint Caching To Improve Deduplication System Backup Performance - A system and method for caching fingerprints in a client cache is provided. A data object that comprises a set of data segments and describes a backup process is identified. Thereafter, a request referencing the data object is made to a deduplication server to request that a task identifier be added to the data object. If the deduplication server is able to successfully add the task identifier to the data object, then an active identifier is added to each data segment from the set of data segments in a cache that is within a client system. | 02-12-2015 |
20150074061 | DATA MANAGEMENT APPARATUS AND METHOD OF ENERGY MANAGEMENT SYSTEM - A data management apparatus is provided. In the data management apparatus, a real-time database stores data collected from a power system; a power system data recording (PSDR) server reads and stores data stored in the real time database and creates policy data and a data file on the basis of the stored data and a PSDR history file storage unit backs up data processed by the PSDR server. | 03-12-2015 |
20150081641 | BACKING UP A COMPUTER APPLICATION - A method and associated systems for backing up a target computer application that comprises identifying and backing up databases and other information repositories upon which the target application depends. The target application is identified and related to a backup requirement that specifies a minimum application-backup frequency. The application's “dependencies” are automatically identified from sources that include configuration files, where each dependency identifies one or more databases or other information repositories that store information upon which the application directly or indirectly depends. If any of these databases or repositories is associated with a backup frequency less than the application's minimum backup frequency, the database or repository is flagged. Each flagged entity's backup schedule is then revised so that the flagged entity's backup frequency is equal to or greater than the application's minimum backup frequency. | 03-19-2015 |
20150112945 | OPTIMIZATION OF JOB SCHEDULING IN A COMPUTING ENVIRONMENT - Optimizing job scheduling in a data processing system includes determining a time factor associated with a report, determining one or more jobs that contribute to the report, and narrowing execution frequency of the one or more jobs based on the time factor of the report. The time factor provides information about timing details for data included in the report. The jobs are executed in a computing environment according to a time schedule. | 04-23-2015 |
20150112946 | COMPUTING DEVICE AND DATA RECOVERY METHOD FOR DISTRIBUTED FILE SYSTEM - A data recovery method includes executing a recovery program of the DFS to periodically generate backup data of the DFS. In response to received operations of a user on a client device, information in relation to the received operations is stored in a main computing device. When a master node of the DFS is running abnormally, the data recovery program is executed to restore the data of the DFS using backup data having a creation time closest to the current time. Specified operations with later creation times are determined. Information in relation to the specified operations is acquired from the stored information. According to the acquired information of the specified operations, each of the specified operations is re-executed. | 04-23-2015 |
20150120671 | METHOD OF PROVIDING BACKUP SYSTEM AND RELATED BACKUP SYSTEM - In a data backup system, multiple backup versions of each document are generated and a user interface having a search page and a browse page is provided. The search page is arranged to display the file name, the backup time and the version variation of a specific document. The browse page is arranged to display the backup name, the backup time and the version variation of a specific backup version. Searching for the specific document and the specific backup version may thus to performed efficiently. | 04-30-2015 |
20150127615 | DATA BACKUP METHOD AND SYSTEM - The present disclosure provides a data backup method, comprising: A. receiving a data type of data which is selected by a user to be backed up; B. calculating a first capacity of data having the same data type, detecting a residual user second capacity on a server side, and comparing the first capacity with the second capacity, wherein if the first capacity is greater than the second capacity, the backup process is interrupted, and if the first capacity is not greater than the second capacity, step C is performed; and C. encrypting and uploading the data to be backed up to a database on the server side for backup, and displaying a backup result after the backup is completed. With the present disclosure, important data can be directly backed up by the mobile terminal to the server side, thereby not only occupying less local storage space of the mobile terminal, but also better protecting the important data from being lost, which greatly meets users' requirements for security. | 05-07-2015 |
20150134618 | Techniques for Policy-Based Data Protection Services - Examples are disclosed for a data protection service available to a tenant having access to a shared pool of configurable computing resources that may be included in a cloud computing network. In some examples, the tenant may be able to view backups and/or recover backed up data based on the one or more policies for the data protection service. The one or more policies may be generic to an application, a system or a configuration for the tenant to access and/or utilize the shared pool of configurable computing resources. Other examples are described and claimed. | 05-14-2015 |
20150142749 | METHOD AND SYSTEM FOR A SAFE ARCHIVING OF DATA - A method for archiving a predefined portion of a table residing in a database system includes: creating a first backup copy of the portion of the table; assigning to the portion of the table an access state flag; setting the access state flag; using the access state flag for preventing modification of existing backup copies of the portion of the table and for preventing further backup operations on the portion of the table; archiving the portion of the table to a separate system; deleting the content of the portion of the table from the database system and retaining the access state flag in the database system. | 05-21-2015 |
20150142750 | DATA MANAGEMENT VIRTUALIZATION - Methods and systems for backing up data in network attached storage such that data in the network attached storage can be backed up without a backup device attached directly to the network attached storage. A series of successive copy operations are scheduled over time of at least one file system associated with at least one network attached storage server. At least one virtual disk is presented to a backup proxy for copying the at least one file system from the backup proxy to the at least one virtual disk for a first backup from the series of successive copy operations of the at least one file system. | 05-21-2015 |
20150309878 | METHOD AND COMPUTATION NODE FOR PROCESSING APPLICATION DATA - The present invention provides a method and a computation node for processing application data. The method includes: starting, by an operating system, a service process; establishing, by the operating system, a socket connection between the service process and backup software, where the service process has a root operation right, and the service process and the backup software have the same user identifier; sending, by the backup software through the socket, a processing request for application data; receiving, by the service process through the socket, the processing request for application data, where the processing request is sent by the backup software, sending the processing request for application data to corresponding application software, receiving application data returned by the corresponding application software, and sending the returned application data to the backup software through the socket. | 10-29-2015 |
20150347241 | FILE TRANSFER SYSTEM AND METHOD, POLICY SERVER, TERMINAL AND STORAGE MEDIUM - The present application discloses a file transfer system, a policy server, a terminal, and a file transfer method. The file transfer system includes a file sending terminal, a file receiving terminal, the policy server, and a file server. The file sending terminal is configured to acquire and report a unique identifier of a file to be transferred to the file receiving terminal; the policy server is configured to query, according to the unique identifier, whether the file server stores a backup file same as the file to be transferred; and when the file server stores the backup file, the policy server is further configured to indicate transfer of the backup file from the file server to the file receiving terminal. The present application enables a file receiving terminal to acquire a file to be transferred at a transfer speed corresponding to a downlink bandwidth of the file receiving terminal, so as to accelerate a process of file transfer between terminals. | 12-03-2015 |
20150363274 | STORING BACKUP DATA SEPARATE FROM CATALOG DATA - Techniques for storing backup data separate from catalog data are described in various implementations. An example method that implements the techniques may include receiving backup data that is to be backed up on a tape medium. The method may also include causing the backup data to be written to a first tape medium. The method may also include generating catalog data associated with the backup data, the catalog data including position information indicating where the backup data is stored on the first tape medium. The method may also include causing the catalog data to be written to a second tape medium that is different from the first tape medium. | 12-17-2015 |
20150363275 | TECHNIQUES FOR IMPROVING CLOUD INFRASTRUCTURE BACKUP IN A SHARED STORAGE ENVIRONMENT - A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup. | 12-17-2015 |
20150370649 | Sending a Request to a Management Service - Sending a request to a management service includes sending a request on behalf of a client to a management service that coordinates backup and recovery services in communication with a policy engine that determines backup and recovery rules and sending metadata about the request to the management service. | 12-24-2015 |
20150378837 | MULTIMEDIA FILE REPAIR METHODS AND APPARATUS - Improved methods, systems and apparatus for storing and repairing multimedia files are provided that overcome the limitations of existing multimedia file repair technologies. Backup copies of the multimedia container information associated with given multimedia content data are stored, along with the multimedia content data, on an external storage detachably coupled to a recording device. A primary copy of the multimedia container information is stored on an internal storage associated with the recording device. The recording of the primary container information and the content data is performed in real-time or nearly real-time as the content data is captured by the recording device. In the case of an abnormal event (e.g., battery failure, disconnect of storage media), container information may be selected from the primary copy or the backup copies of the container information, thereby increasing the likelihood that the container file can be successfully repaired or regenerated. | 12-31-2015 |
20160004598 | GROUPING CHUNKS OF DATA INTO A COMPRESSION REGION - Examples disclosed herein relate to grouping chunks of data into a compression region. Examples relate to a chunk container comprising a first plurality of chunks of data in a plurality of first compression regions, and include grouping a second plurality of the chunks into a second compression region, and compressing the chunks of the second compression region relative to each other. | 01-07-2016 |
20160004604 | NON-DESTRUCTIVE DATA STORAGE - Non-destructive data storage is disclosed. An information change is stored that is associated with a business object such that tracking of the information change is enabled with respect to one a transaction time and/or an effective time. The stored information change is accessed with respect to a time. | 01-07-2016 |
20160011945 | MULTI STREAM DEDUPLICATED BACKUP OF COLLABORATION SERVER DATA | 01-14-2016 |
20160012064 | DATA CONVERSION DEVICE | 01-14-2016 |
20160012067 | ARCHITECTURE FOR MANAGEMENT OF DIGITAL FILES ACROSS DISTRIBUTED NETWORK | 01-14-2016 |
20160019119 | PRIORITIZING BACKUP OF FILES - Approaches for prioritizing backup of files are described. In one example, a backup prioritizing parameter for a file shortlisted for backup is identified. Once the backup prioritizing parameter is identified, a position of the file for placing within a backup queue for backup, is subsequently determined based on the backup prioritizing parameter. | 01-21-2016 |
20160077925 | MULTI-THREADED SMART COPY - Systems and methods of utilizing multiple threads to facilitate parallel data copying to reduce an amount of time associated with backing up data. A request to copy application is received that indicates a number of available threads. A first available thread is used to select files from the application for backup. Selecting a file includes adding files to a work queue and creating backup work items associated with the work queue files. The files in the work queue are processed by a multiple threads in parallel such that an amount of time associated with backup up the application is reduced. | 03-17-2016 |
20160078080 | GUARDRAILS FOR COPY DATA STORAGE - Techniques are disclosed for preventing a user from configuring a service level agreement from creating a data management schedule that creates a set of data backups that exceeds data resource limits available for storing the set of data backups. A first amount of pool resources associated with the backup of each of the at least one application is determined according to a received schedule. A first amount of data volumes associated with the backup of each of the at least one application is determined according to the received schedule. A resource shortage warning is transmitted when the aggregate amount of pool resources exceeds an available amount of pool resources or the aggregate amount of data volume resource exceeds an available amount of data volume resource, thereby preventing a user from configuring a service level agreement that exceeds data resource limits. | 03-17-2016 |
20160098323 | INTELLIGENT PROTECTION OF OFF-LINE MAIL DATA - A system according to certain aspects improves the process of creating secondary copies of data (e.g., creating backup copies). The system can compute the score of the data (e.g., a computer file storing information) to be backed up, and determine whether the score satisfies one or more threshold criteria before backing up the data. In one example, a change in score indicates a change in the content of the data. The threshold criteria may be that the score be different from the score of the most recently backed up copy of the data. | 04-07-2016 |
20160110262 | RESTORING A FILE SYSTEM OBJECT - Techniques associated with restoring a file system object are described in various implementations. In one example, a method may include receiving a request to restore a file system object, the file system object being stored in backup data produced from a raw image backup of a file system. The method may also include determining whether the backup data is accessible from an on-premise storage system, and retrieving blocks of data associated with the file system object from the backup data without restoring the file system. The data blocks may be retrieved from the on-premise storage system if the backup data is accessible from the on-premise storage system, or from the off-premise storage system if the backup data is not accessible from on-premise storage system. The method may also include causing the file system object to be restored. | 04-21-2016 |
20160110265 | HANDLING SERVER AND CLIENT OPERATIONS UNINTERRUPTEDLY DURING PACK AND AUDIT PROCESSES - A solution for maintaining the operation of a server and allowing the transfer of data from client devices to a database without locking the database during an audit and pack process is realized that reduces the amount of time lost due to backup file storage transfer. When a file is backed up to a first storage trail through the audit process, the trail may eventually become filled to capacity. Upon the first storage trail filling to capacity, a pack process is initiated, and a backup storage trail is created to store the data during this process. Upon completion of the pack process, the data from the backup storage trail is transferred to another active storage trail. | 04-21-2016 |
20160125015 | DATABASE DATA DISTRIBUTION MANAGEMENT - The maintaining of a database that is distributed across a front database and one or more cloud databases. Rather than have the front and remote portions of the database be fixed, a data distribution manager evaluates databases segments following a data distribution policy to identify one or more database segments that are to be transferred to or from the one or more cloud databases from or to the front database. In response, the data distribution manager causes the identified database segment to be moved. Accordingly, the data that is in the front database (and the data that is stored in the cloud) may vary over time. | 05-05-2016 |
20160147611 | USING GEOGRAPHICAL LOCATION INFORMATION TO PROVISION MULTIPLE TARGET STORAGES FOR A SOURCE DEVICE - Provided are a computer program product, system, and method for using geographical location information to provision multiple target storages for a source device. A determination is made of a geographical location of the source device and a distance between the source device and each of the target storages and between each pair of target storages. A determination is further made of qualifying k-tuples of the target storages, wherein each k-tuple comprises a group of k target storages to which the source data is to be backed-up. A qualifying k-tuple has one target storage that satisfies a distance requirement with respect to the source device and a distance between any two target storages in the k-tuple satisfies the distance requirement. A selected qualifying k-tuple is indicated to use to backup the source data at the k target storages in the qualifying k-tuple. | 05-26-2016 |
20160162369 | OPPORTUNISTIC EXECUTION OF SECONDARY COPY OPERATIONS - Rather than relying on pre-defined scheduling of secondary copy operations such as backup jobs, the illustrative opportunistic approach initiates secondary copy operations based on changing operational conditions in a storage management system. An adaptive backup readiness score is based on a number of backup-readiness operational factors. An illustrative enhanced data agent which is associated with the target database application (or other executable component) may monitor the operational factors and determine the backup readiness score based on weights assigned to the respective operational factors. The enhanced data agent may evaluate recent backup jobs to determine which of the operational factors that contributed to the backup readiness score may have been most relevant. Based on the most-relevant analysis, the enhanced data agent may adapt the weights assigned to the monitored operational factors, so that the backup readiness score may be more suitable and responsive to ongoing operational conditions in the system. | 06-09-2016 |
20160162371 | SUPPORTING MULTI-TENANCY THROUGH SERVICE CATALOG - The techniques introduced here provide for efficient creation and management of secure storage and backup in a cloud storage network. The techniques include a system and method for provisioning storage for a user in a cloud storage network. Using the techniques introduced here, a management module, upon receiving a request from a user for storage in a cloud storage system, determines a primary storage system and a secondary storage system for primary storage and backup storage, respectively, that meets the requirements of a service level selected by the user. The management module then creates and configures a primary virtual server and a secondary virtual server, for the primary storage and the backup storage, respectively, and provisions storage for the user. The techniques also include non-disruptive migration of data between virtual servers in response to a service level change. | 06-09-2016 |
20160162372 | SYSTEMS AND METHODS FOR ON-LINE BACKUP AND DISASTER RECOVERY - A data recovery system includes a plurality of customer computers to be backed-up, each customer computer running a client software to communicate back-up data files; a system management platform coupled to the client software over the Internet, the system management platform receiving inputs from a web user portal to control operations of the client software and the system management platform to back up the customer computer; and two or more data storage silos, each including: a plurality of storage directors communicating with the client software; and a clustered data storage array. | 06-09-2016 |
20160170836 | SEARCHING AND INDEXING OF BACKUP DATA SETS | 06-16-2016 |
20160171079 | SYSTEMS AND METHODS FOR PROBABILISTIC DATA CLASSIFICATION | 06-16-2016 |
20160188415 | METHODS AND SYSTEMS FOR CLONE MANAGEMENT - Methods and systems for storage services is provided. An inventory view listing a plurality of application objects of an application from among a plurality of applications is provided on a display device by a management device that interfaces with a plurality of application plugins executed by one or more host computing devices that interface with the plurality of applications for managing backup, restore and clone operations involving objects that are stored on behalf of the plurality of applications by a storage system. A clone dataset object for an application object is selected from the plurality of application objects of the application. A clone lifecycle option for the clone dataset object is selected for managing lifecycle of a clone of a backup of the selected application object. | 06-30-2016 |
20160188417 | CENTRALIZED MANAGEMENT CENTER FOR MANAGING STORAGE SERVICES - Methods and systems for providing storage services in a networked environment are provided. A management device interfaces with a plurality of management layers that communicates with a plurality of application plugins executed by a plurality of computing devices. Each application plugin is associated with an application for providing storage services for stored objects managed by a storage system. A same request and response format is used by the management device to obtain information from the plurality of management layers regarding storage space used by the plurality of applications for storing the stored objects and the management device maintains storage space information as a storage resource object for virtual storage resources and physical storage resources used by the plurality of applications for storing the stored objects. | 06-30-2016 |
20160188419 | SYSTEM AND METHOD FOR SELECTIVE COMPRESSION IN A DATABASE BACKUP OPERATION - Differential or selective elective data transformation, which can include compression and/or encryption, is applied to selected data subsets, such as selected table spaces, of a database during a single database operation. In response to a received backup command, a backup utility of a database management system obtains data from a number of data subsets of a source database that are specified for inclusion in a backup image. At least one of the data subsets is specified for data transformation while subsets are not. The data from the specified data subsets is identified in the obtained data, and transformed prior to writing a single backup image to archive media. The backup image therefore contains both transformed and untransformed data. The selection of data subsets for transformation can be made automatically without requiring user specification according to predefined data characteristics including subset size, data type, compressibility, or encryption. | 06-30-2016 |
20160188421 | CENTRALIZED GRAPHICAL USER INTERFACE AND ASSOCIATED METHODS AND SYSTEMS FOR A CENTRALIZED MANAGEMENT CENTER FOR MANAGING STORAGE SERVICES IN A NETWORKED STORAGE ENVIRONMENT - Methods and systems for a networked storage environment are provided. For example, a method includes interfacing by a management device with a plurality of management layers that communicate with a plurality of application plugins executed by a plurality of computing devices, where each application plugin is associated with an application for providing storage services for stored objects managed by a storage system for the plurality of applications; for managing the plurality of computing devices, presenting selectable options for adding an application plugin for a computing device, configuring the application plugin, migrating the application plugin from one location to another and placing the computing device in a maintenance mode; and providing a summary for a plurality of storage service operations and a data protection summary. | 06-30-2016 |
20160253241 | INSTANT STREAMING OF THE LATEST VERSION OF A FILE | 09-01-2016 |
20170235641 | RUNTIME FILE SYSTEM CONSISTENCY CHECKING DURING BACKUP OPERATIONS | 08-17-2017 |
20170235651 | REDUCING INPUT/OUTPUT (I/O) OPERATIONS FOR CENTRALIZED BACKUP AND STORAGE | 08-17-2017 |