Patent application number | Description | Published |
20080215713 | System and Method for Automatically Enforcing Change Control in Operations Performed by Operational Management Products - A system and method for enforcing change control in operations performed by operational management products (OMPs) are provided. The system and method automate the checking of a request-for-change (RFC) state by an OMP when the OMP is installed in an environment where a change management database (CMDB) has been installed and certain resources or operations have been placed under strict change control. The OMPs of the illustrative embodiments require an RFC identifier to be specified when a change operation of the OMP is invoked. The RFC identifier is used by the OMP to access a service management system so that the OMP may determine if the RFC identifier is valid, IT resources are in the correct state, and the change is scheduled to be performed at the current time. If these checks are passed, then the change operation associated with the RFC is permitted to occur. | 09-04-2008 |
20080301204 | Correlated Analysis of Wasted Space and Capacity Efficiency in Complex Storage Infrastructures - A system and method for correlated analysis of wasted space and capacity efficiency in complex storage infrastructures are provided. The system and method of the illustrative embodiments bring together wasted space data from all areas and components of the storage infrastructure into a single set of reports correlating information from these various sources in the storage infrastructure. In addition, correlated analysis of this collected information is performed with regard to wasted space. Logical storage devices of the storage infrastructure which are unused by host systems may be identified and appropriate corrective actions may be automatically taken. Moreover, automated recommendations and other automated corrective actions may be taken based upon the correlated analysis of the correlated data collected from the various components of the storage infrastructure. | 12-04-2008 |
20080301255 | Dynamically Matching Data Service Capabilities to Data Service Level Objectives - A method, system, and computer program product are provided for matching a storage dependent device to a storage subsystem. Storage requirements are identified for a storage dependent device that is coupled to a network. Additionally, a set of storage subsystems that are coupled to the network are identified. A determination is made as to whether at least one storage subsystem in the set of storage subsystems meets the storage requirements of the storage dependent device. An identified storage subsystem is formed by identifying the at least one storage subsystem that meets the storage requirements of the storage dependent device. Responsive to forming the identified storage subsystem, at least one storage subsystem is coupled to the storage dependent device, wherein the storage dependent device utilizes storage capabilities of the identified storage subsystem. | 12-04-2008 |
20090037479 | APPARATUS, SYSTEM, AND METHOD FOR ANALYZING A FILE SYSTEM - An apparatus, system, and method are disclosed for analyzing a file system. A record module records file parameters comprising a file size, a file age, a time of last access, a file type, a recovery time objective, and an initial access time service level objective for each file in the file system. A file score module calculates a file score for each file using the file parameters. A system score module calculates the file system score as the sum of the normalized file scores. A process module processes the file system if the file system score exceeds a specified threshold. | 02-05-2009 |
20090125751 | System and Method for Correlated Analysis of Data Recovery Readiness for Data Assets - A method, system, and computer program product are provided for determining the recovery readiness of a data asset. A set of metrics are identified for a current recovery operation performed for the data asset and a current recovery objective is identified for the data asset. The current recovery operation is applied to the data asset using the set of metrics. A determination is made as to whether the current recovery operation meets the recovery objective for the data asset. Responsive to a failure of the current recovery operation to meet the recovery objective, an error is presented indicating the failure and a determination is made as to whether a different recovery policy may be implemented to meet the recovery objective for the data asset. If a different recovery policy exists that meets the recovery objective for the data asset, the different recovery policy is implemented. | 05-14-2009 |
20090164716 | Adaptation of Contentious Storage Virtualization Configurations - Systems and methods for managing storage virtualization in a storage infrastructure are provided. The method comprises examining storage virtualization configurations across a data storage infrastructure having one or more data storage resources, such that configuration data associated with the storage virtualization configurations applied to the one or more data storage resources is stored in a configuration repository; analyzing the configuration data to detect storage virtualization policy inconsistencies and redundancies across the data storage infrastructure; and reporting potential problems associated with applying the storage virtualization configurations to said one or more data storage resources, in response to detecting the virtualization policy inconsistencies. | 06-25-2009 |
20090164717 | Automated Correction of Contentious Storage Virtualization Configurations - Systems and methods for managing storage virtualization in a storage infrastructure are provided. The method comprises examining storage virtualization configurations across a data storage infrastructure having one or more data storage resources, such that configuration data associated with the storage virtualization configurations applied to the one or more data storage resources is stored in a configuration repository; analyzing the configuration data to detect storage virtualization policy inconsistencies across the data storage infrastructure; reporting potential problems associated with applying the storage virtualization configurations to said one or more data storage resources; and automatically implementing recommendations for corrective action to improve storage virtualization, in response to detecting the virtualization policy inconsistencies. | 06-25-2009 |
20110055293 | Data Repository Selection Within a Storage Environment - Described is a method, system, and computer program product for selecting a data repository within a computing environment. The data repository can exist on multiple target computing systems as a logical entity called a volume or a file system. When selecting at least one data repository, a data protection system of the computing environment analyzes the incoming data from a source computing system, in conjunction with information describing the data repositories. The data repository information, or repository characteristic information, can be stored on a repository volume table (RVT) of the data protection system. By determining a weighted selection score from the analysis of all the information available to the data protection system, the data protection system can intelligently select a data repository for storing data from the source computing system. Further, by tracking repository characteristic information on a continuous or periodic basis, the data protection system can enable emulated views of data that has been stored on the data repositories of the computing environment. | 03-03-2011 |
20110138154 | Optimization of a Computing Environment in which Data Management Operations are Performed - Described are embodiments of an invention for optimizing a computing environment that performs data management operations such as encryption, deduplication and compression. The computing environment includes data components and a management system. The data components operate on data during the lifecycle of the data. The management system identifies all the data components in a data path, how the data components are interconnected, the data management operations performed at each data component, and how many data management operations of each type are performed at each data component. Further, the management system builds a data structure to represent the flow of data through the data path and analyzes the data structure in view of policy. After the analysis, the management system provides recommendations to optimize the computing environment through the reconfiguration of the data management operation configuration and reconfigures the data management operation configuration to optimize the computing environment. | 06-09-2011 |
20120078852 | Prioritization of Data Items for Backup in a Computing Environment - Described are embodiments of an invention for prioritizing data items for backup in a computing environment. The computing environment includes a plurality of clients coupled through a network to a backup system for backing up items stored locally on the client. Each client includes a continuous data protection (CDP) module that prioritizes the order of files transmitted to the backup system for storage on one or more storage devices based on policy. The CDP module builds an initial backup list and a CDP backup list. The initial backup list includes any item that meets the criteria of the initial backup profile. The CDP backup list includes items that have been modified since the initial backup process began. The data that is the most critical to a user is often the most recently modified data. Thus, the CDP module preferentially performs a backup of items on the CDP backup list. | 03-29-2012 |
20130013572 | OPTIMIZATION OF A COMPUTING ENVIRONMENT IN WHICH DATA MANAGEMENT OPERATIONS ARE PERFORMED - Described are embodiments of an invention for optimizing a computing environment that performs data management operations such as encryption, deduplication and compression. The computing environment includes data components and a management system. The data components operate on data during the lifecycle of the data. The management system identifies all the data components in a data path, how the data components are interconnected, the data management operations performed at each data component, and how many data management operations of each type are performed at each data component. Further, the management system builds a data structure to represent the flow of data through the data path and analyzes the data structure in view of policy. After the analysis, the management system provides recommendations to optimize the computing environment through the reconfiguration of the data management operation configuration and reconfigures the data management operation configuration to optimize the computing environment. | 01-10-2013 |