Patent application number | Description | Published |
20120017111 | KERNEL SWAPPING SYSTEMS AND METHODS FOR RECOVERING A NETWORK DEVICE - In certain embodiments, a method is disclosed for recovering a failed client device in a network. The method includes booting a failed one of a plurality of client devices in the network with a generic image having a generic kernel usable with each of the plurality of client devices. The method further includes downloading, using said generic kernel, from at least one backup server an abbreviated kernel uniquely associated with the failed client device, the abbreviated kernel comprising substantially less data than an original kernel of the failed client device immediately prior to failure of the failed client device, the abbreviated kernel comprising a boot kernel image and at least one device driver. The method includes swapping the abbreviated kernel with the generic kernel; restoring, using said abbreviated kernel, remaining backup data from the at least one backup server to the failed client device; and rebooting the failed client device. | 01-19-2012 |
20120254119 | RESTORING COMPUTING ENVIRONMENTS, SUCH AS AUTORECOVERY OF FILE SYSTEMS AT CERTAIN POINTS IN TIME - A method and system for restoring a computing environment from a secondary data store, and facilitating such restoration, is described. In some examples, the system copies the configuration parameters of a computing environment, such as a file system, as well as the data within the file system, and transfers the copies to secondary storage for later restoration. For example, the system may generate an xml file of the configuration parameters of the computing environment when a backup operation of the computing environment is performed, and store the xml file along with copies of the data from the computing environment in secondary storage. | 10-04-2012 |
20130227352 | LOG MONITORING - A log monitoring system uses log monitoring rules to monitor log data generated by applications executing on a client computing device. By monitoring log data, the system detects that one or more triggering events have occurred on the client computing device. In response, the log monitoring system can perform one or more appropriate remedial actions. Additionally, in response to the detected event(s), the log monitoring system can extract a select subset of relevant data from the client and transmit the subset of data to a separate repository for storage and/or processing. | 08-29-2013 |
20130238562 | DATA STORAGE SYSTEM UTILIZING PROXY DEVICE FOR STORAGE OPERATIONS - A data storage environment can include one or more virtual clients instantiated on a host proxy computing device. The virtual clients may have only indirect access to a storage device, and may access the storage device via the proxy computing device. For example, the proxy computing device receives storage operation requests from one of the virtual clients, such as a request to create, mount or revert a snapshot of virtual client data. The proxy computing device generally acts as an intermediary between the virtual clients and the storage device to carry out the snapshots or other storage operations. The proxy computing device may further receive a notification upon completion of the storage operations, and transmits relevant data to the requesting virtual client regarding the storage operation. | 09-12-2013 |
20130262385 | UNIFIED ACCESS TO PERSONAL DATA - A method and system for providing unified access to data for multiple computing devices includes a system that associates multiple computing devices with a user of an information management system, assigns information management policies to data from the multiple computing devices within the information management system, and collects multiple data objects from the multiple computers. The system may generate a preview version of each collected data object, and provide at least one preview version of a collected data object to a computing device associated with the user. The system may also generate indexing information for each collected data object and distribute the indexing information with the preview version of the data object. | 10-03-2013 |
20130262387 | UTILIZING SNAPSHOTS FOR ACCESS TO DATABASES AND OTHER APPLICATIONS - A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly. | 10-03-2013 |
20130262390 | MIGRATION OF EXISTING COMPUTING SYSTEMS TO CLOUD COMPUTING SITES OR VIRTUAL MACHINES - Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination virtual machine. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination virtual machine is determined based at least in part on the configuration of the source physical computing device. The destination virtual machine is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device. | 10-03-2013 |
20130262394 | SEARCH FILTERED FILE SYSTEM USING SECONDARY STORAGE - Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files. | 10-03-2013 |
20130262410 | DATA PREVIEWING BEFORE RECALLING LARGE DATA FILES - Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request. | 10-03-2013 |
20130262638 | MIGRATION OF AN EXISTING COMPUTING SYSTEM TO NEW HARDWARE - Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination physical computing device. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination physical computing device is determined based at least in part on the configuration of the source physical computing device. The destination physical computing device is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device. | 10-03-2013 |
20130282662 | INTEGRATED SNAPSHOT INTERFACE FOR A DATA STORAGE SYSTEM - A data storage system includes a generic snapshot interface, allowing for integration with a wide variety of snapshot-capable storage devices. The generic interface can be a programming interface (e.g., an application programming interface [API]). Using the snapshot interface, storage device vendors can integrate their particular snapshot technology with the data storage system. For instance, the data storage system can access a shared library of functions (e.g., a dynamically linked library [DLL]) provided by the vendor (or another by appropriate entity) and that complies with the specifications of the common programming interface. And by invoking the appropriate functions in the library, the data storage system implements the snapshot operation on the storage device. | 10-24-2013 |
20140025641 | SYSTEMS AND METHODS FOR DATABASE ARCHIVING - A data storage system according to certain aspects can archive database data associated with different database applications. The data storage system according to certain aspects may provide database archiving modules that include logic incorporating and/or based on the native schema and/or native commands specific to particular database applications. The database archiving modules according to certain aspects may determine the relationship between tables associated with corresponding database applications and archive selected database data based on the native schema and native commands. | 01-23-2014 |
20140046900 | GENERIC FILE LEVEL RESTORE FROM A BLOCK-LEVEL SECONDARY COPY - Systems and methods are provided which perform a file level restore by utilizing existing operating system components (e.g., file system drivers) that are natively installed on the target computing device. These components can be used to mount and/or interpret a secondary copy of the file system. For instance, the system can instantiate an interface object (e.g., a device node such as a pseudo device, device file or special file) on the target client which includes file system metadata corresponding to the backed up version of the file system. The interface provides a mechanism for the operating system to mount the secondary copy and perform file level access on the secondary copy, e.g., to restore one or more selected files. | 02-13-2014 |
20140046904 | LIGHTWEIGHT MOUNTING OF A SECONDARY COPY OF FILE SYSTEM DATA - A data storage system allows a user to search a secondary copy such as a back up, archive, or snapshot and receive an abbreviated version of the secondary copy of the file system as a result of the search. The abbreviated version of the secondary copy of the file system may include metadata such as a listing of secondary copy data that correspond with a search term or other filtering criteria provided by the user. An operating system of the user's computing device may mount the abbreviated version so that it can be displayed within a view of the file system of the computing device. Once a user selects one or more desired data objects listed in the abbreviated version, the selected actual one or more data objects are retrieved from secondary storage. | 02-13-2014 |
20140181031 | SYSTEMS AND METHODS TO CONFIRM REPLICATION DATA ACCURACY FOR DATA BACKUP IN DATA STORAGE SYSTEMS - A data storage system, according to certain aspects, automatically determines the accuracy of replication data when performing data backup operations. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. The system automatically determines the accuracy of replication data during data backup. | 06-26-2014 |
20140181032 | SYSTEMS AND METHODS TO PERFORM DATA BACKUP IN DATA STORAGE SYSTEMS - A data storage system, according to certain aspects, automatically backs up source data when the replication data is faulty. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. When permitted by the user system configuration, the system automatically backs up source data when replication has failed. | 06-26-2014 |
20140181441 | IDENTIFYING FILES FOR MULTIPLE SECONDARY COPY OPERATIONS USING DATA OBTAINED DURING BACKUP OF PRIMARY STORAGE - A data storage system can scan one or more information stores of primary storage and analyze the metadata of files stored in the one or more information stores of primary storage to identify multiple, possibly relevant, secondary copy operations that can be performed on the files. The storage system can also identify primary storage usage information of each file during the scan and use that information to generate reports regarding the usage of the primary storage. | 06-26-2014 |
20140181442 | REPORTING USING DATA OBTAINED DURING BACKUP OF PRIMARY STORAGE - A data storage system can scan one or more information stores of primary storage and analyze the metadata of files stored in the one or more information stores of primary storage to identify multiple, possibly relevant, secondary copy operations that can be performed on the files. The storage system can also identify primary storage usage information of each file during the scan and use that information to generate reports regarding the usage of the primary storage. | 06-26-2014 |
20140181443 | ARCHIVING USING DATA OBTAINED DURING BACKUP OF PRIMARY STORAGE - A data storage system can scan one or more information stores of primary storage and analyze the metadata of files stored in the one or more information stores of primary storage to identify multiple, possibly relevant, secondary copy operations that can be performed on the files. The storage system can also identify primary storage usage information of each file during the scan and use that information to generate reports regarding the usage of the primary storage. | 06-26-2014 |
20140201150 | SINGLE SNAPSHOT FOR MULTIPLE AGENTS - A data storage system according to certain aspects can share a single snapshot for multiple applications and/or agents. For example, the data storage system can receive snapshot commands from multiple applications and/or agents, and can group them for a single snapshot (e.g., based on time of receipt of the snapshot commands). Data associated with the multiple applications and/or agents may reside on a single LUN or volume. The data storage system can take a single snapshot of the LUN or volume, and generate metadata regarding which portion of the snapshot is related to which application. The single snapshot can be stored in one or more secondary storage devices. The single snapshot may be partitioned into portions relating to different applications and stored separately. | 07-17-2014 |
20140201151 | SYSTEMS AND METHODS TO SELECT FILES FOR RESTORATION FROM BLOCK-LEVEL BACKUP FOR VIRTUAL MACHINES - A data storage system receives a user instruction through a user interface to restore a specific virtual machine file from a block-level backup. The system accesses a file index which is created during the block-level backup by accessing the file allocation table of the underlying host system and associating the blocks with the file location information of the virtual machine files stored in the file allocation table. The system further creates a file level table based at least in part on the virtual machine file information stored in the file index, displays a listing of the virtual machine files from the file level table, and receives a user selected virtual machine file to restore. | 07-17-2014 |
20140201152 | SYSTEMS AND METHODS TO PROCESS BLOCK-LEVEL BACKUP FOR SELECTIVE FILE RESTORATION FOR VIRTUAL MACHINES - A data storage system protects virtual machines using block-level backup operations and restores the data at a file level. The system accesses the virtual machine file information from the file allocation table of the host system underlying the virtualization layer. A file index associates this virtual machine file information with the related protected blocks in a secondary storage device during the block-level backup. Using the file index, the system can identify the specific blocks in the secondary storage device associated with a selected restore file. As a result, file level granularity for restore operations is possible for virtual machine data protected by block-level backup operations without restoring more than the selected file blocks from the block-level backup data. | 07-17-2014 |
20140201159 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 07-17-2014 |
20140201160 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 07-17-2014 |
20140201161 | TABLE LEVEL DATABASE RESTORE IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner. | 07-17-2014 |
20140201162 | SYSTEMS AND METHODS TO RESTORE SELECTED FILES FROM BLOCK-LEVEL BACKUP FOR VIRTUAL MACHINES - A data storage system restores selected virtual machine files from a block-level backup without restoring blocks associated with files other than the selected virtual machine file. The system identifies the one or more blocks associated with a selected file from a file index that is created during the block-level backup of the virtual machine by accessing the file allocation tables of the underlying host system and associating the locations of the blocks with the file information from the file allocation table for the virtual files of the virtual machine. The system further restores the identified blocks without restoring blocks associated with files other than the selected file and/or file version, recreates the selected file from the restored blocks, and presents the restored file to the user. | 07-17-2014 |
20140222759 | UTILIZING SNAPSHOTS FOR ACCESS TO DATABASES AND OTHER APPLICATIONS - A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly. | 08-07-2014 |