Entries |
Document | Title | Date |
20100063962 | Interactive System that, Inter Alia, Does Away with the Need for a User, to Create, Store, Organize and/or Share Files and/or Uniform Resource Locators in Folders and Sub Folders, on a Computer System, Mobile Device, or on a Networks, Blogs, Forums, Intranets, Wireless Application Protocol Portals and the Like - An interactive system that, inter alia, does away with the need for a user, to create, store, organize and/or share files and/or uniform resource locators in folders and sub folders, on a computer system, mobile device, or on a communications site comprising of one or more websites, networks, blogs, forums, intranets, wireless application protocol portals and the like. The said system allows the user to organize files and/or uniform resource locators by linking the same to records in a databank classified by well-defined classifications, and further allows the user to perform various actions on the records in the databank including but not limited to modifying records, cloning records, cross-referencing records, finding records by none or one or more find conditions, bookmarking records as well as marking records as ‘public’ or ‘private’ as well as ‘favorite’, encrypting and decrypting records for the purpose of security, and setting records as ‘templates’ to create new records. | 03-11-2010 |
20100063963 | Local Access To Internet-Processed Data Records - A system for onsite backup of internet-based data is provided. The system includes a central computer, a client computer, a communications link between the central computer and the Internet, and a communications link between the client computer and the Internet. The system also includes at least one database containing a plurality of data records accessible by the central computer, each data record containing a client identification number. Software executing on the central computer receives a data backup request, and software executing on the central computer transmits the data backup to the client computer. | 03-11-2010 |
20100070475 | DATA BACKUP SYSTEM AND METHOD THEREOF - A data backup system can analyze the data that need backups in accordance with user-defined or default backup criteria, so that the user can locate the files in need of backup without spending lots of time on finding the files. | 03-18-2010 |
20100070476 | REMOTE BACKUP AND RESTORE SYSTEM AND METHOD - A computer-based method includes determining, based at least in part on a quantity of first backup data on a source computer, a data-transfer mode for the first backup data, the data-transfer mode selected from the group consisting of network transfer of the first backup data and physical-media transfer of the first backup data and, responsive to the determining step, transferring the first backup data via the determined data-transfer mode to a server located at a remote destination from the source computer. The physical-media data-transfer mode of the first backup data includes physical transport of physical media to the server. The network-transfer data-transfer mode is accomplished via a network connection and does not include physical transport of physical media. | 03-18-2010 |
20100076933 | TECHNIQUES FOR RESOURCE LOCATION AND MIGRATION ACROSS DATA CENTERS - An exemplary system includes a front-end component to receive requests for resources in a data center and configured to associate each request with identifying information, to locate one or more resources for each request and to store, in a log file, the identifying information and information about the location of the one or more resources; one or more distributed computation and storage components to acquire log file information and configured to analyze log information to decide if one or more resources associated with one or more requests should be migrated to a data center in a different geographical location; and a location service component to receive decisions made by the one or more distributed computation and storage components and configured to inform the front-end component when a decision causes one or more resources to be migrated to a data center in a different geographical location to thereby allow the front-end component to re-direct future requests for the one or more migrated resources to the data center in the different geographical location. Various other devices, systems and methods are also described. | 03-25-2010 |
20100076934 | Storing Block-Level Tracking Information in the File System on the Same Block Device - Writes to a storage device of a protected computer system are tracked in a manner that accounts for those writes that may occur during a system reboot process when the file system is not available. During the shutdown process, write tracking data is maintained in system memory and is written into storage locations allocated to the tracking file after the file system has been dismounted so that any writes that may occur during the file system dismount can be captured. During the boot process, temporary write tracking data is maintained in system memory even before the file system is mounted so that any writes that may occur immediately after the file system mount can be captured. The temporary write tracking data is later merged with the tracking data contained in the tracking file and the merged tracking data is used to track further writes to the storage device. | 03-25-2010 |
20100082543 | SEMANTIC DATA MIGRATION - Migrating data within a storage area network is disclosed. A migration plan is created, the migration plan to move data stored in the storage area network, wherein each element of data is to be moved from a source location to a destination location according to a mapping therebetween. A virtual identifier is assigned to each mapping according to the migration plan. The migration plan is executed. Upon completion of the movement of an element of data, the virtual identifier for the mapping of that element of data is assigned to a resultant location to which that element of data is moved. Upon completion of the execution of the migration plan, the movement of the data is verified by comparing, for each element of data, the virtual identifier of the mapping and the virtual identifier of the resultant location. | 04-01-2010 |
20100082544 | Methods, Systems, and Products for Restoring Media - Methods, devices, and products restore damaged or corrupt media files. A user's media catalog is received and stored in a database of media catalogs. When restoration is desired, the user's media catalog is retrieved that describes an identity of a media file to be restored. The database of media catalogs is queried for another media catalog that describes the same identity of the media file. A communications address associated with the another media catalog is retrieved. | 04-01-2010 |
20100088279 | INFORMATION PROCESSING APPARATUS AND OPERATION METHOD THEREOF - An information processing apparatus includes a remote copying processing part | 04-08-2010 |
20100088280 | COMPUTER SYSTEM FOR HIERARCHICALLY MANAGING A JOURNAL AND METHOD THEREFOR - Provided is technology in which a first storage system includes a first logical volume and a second logical volume, the second logical volume stores therein a first differential data item representing a differential between data that was stored in the first logical volume at a first time instant and data that was stored in the first logical volume at a second time instant being later than the first time instant, a second storage system includes a third logical volume, the first storage system transmits the first differential data item to the second storage system, the second storage system stores the first differential data item into the third logical volume, the first storage system deletes the first differential data item from the second logical volume, and the computer system retains management information set for associating the first logical volume with the third logical volume storing therein the first differential data item. | 04-08-2010 |
20100094807 | Traversing data in a repeatable manner - Data is processed by receiving a list of one or more file system elements in a level of a file system or a portion thereof. The list is sorted based at least in part on whether a file system element is a file or a directory. A sorted list is obtained. The file system elements in the level are backed up according to the order of the sorted list. | 04-15-2010 |
20100100530 | Save set bundling for staging - Backing up data blocks is disclosed. An indication that a first set of one or more backed up data blocks are related at an application level to one or more other sets of one or more backed up data blocks is received. An associating data that associates the first set of backed up data blocks with the one or more other sets of backed up data blocks is stored. The associating data is used to ensure that the first set and the one or more other sets remain stored together. | 04-22-2010 |
20100106688 | COMPUTER SYSTEM STORAGE DEVICE AND DATE UPDATING METHOD - Data stored in a plurality of snapshots that can be updated is efficiently updated. | 04-29-2010 |
20100114828 | Method, system and computer-readable media for backing up information contained in a database - A system, computer-readable media and method for backup one or more databases and restoring one or more databases using incremental backups are provided. Persistent collection objects are generated in the process of performing a database backup. A collection objects may order records, e.g., objects, in relation to and within pluralities of records. These pluralities of records may be referred to, or organized as, pages or containers of pages, comprising software objects. The persistent database backup collection object may include a time and date of a generation of an incremental backup database by a distinguishable and specific database archiving process (“backup event”), an event number of an incremental backup generation, one or more database identifiers, one or more container identifiers, and/or identifiers of individual records, e.g., object identifiers. | 05-06-2010 |
20100114829 | SYSTEMS AND METHODS FOR USING METADATA TO ENHANCE DATA MANAGEMENT OPERATIONS - Systems and methods for managing electronic data are disclosed. Various data management operations can be performed based on a metabase formed from metadata. Such metadata can be identified from an index of data interactions generated by a journaling module, and obtained from their associated data objects stored in one or more storage devices. In various embodiments, such processing of the index and storing of the metadata can facilitate, for example, enhanced data management operations, enhanced data identification operations, enhanced storage operations, data classification for organizing and storing the metadata, cataloging of metadata for the stored metadata, and/or user interfaces for managing data. In various embodiments, the metabase can be configured in different ways. For example, the metabase can be stored separately from the data objects so as to allow obtaining of information about the data objects without accessing the data objects or a data structure used by a file system. | 05-06-2010 |
20100121819 | Method and Apparatus Combining Revision Based and Time Based File Data Protection - A method and apparatus for protecting file data is provided that combines or merges revision based backup with backup based on time intervals. One embodiment is directed to a method for protecting data contained in a file of a computer system, wherein the computer system is useable to create multiple successive file versions. The method comprises the steps of specifying a maximum number of file versions that can be stored collectively at first and second storage locations, and apportioning the maximum number into a first number of file versions and a second number of file versions. The method further comprises storing the most recent of the multiple file versions, up to a number equal to the first number, at the first storage location. A number of file versions respectively created before the stored most recent versions, up to a number equal to the second number, are stored at the second storage location, over a pre-specified time period and in accordance with a pre-specified strategy. | 05-13-2010 |
20100138390 | Personal information file management tool - A system and method provide management of personal information files containing personal contacts, calendars, emails, and the like. A client device is configured to store a personal information file. A personal information file management tool is configured to search a directory on a server. The personal information file management tool compares a contact in the personal information file with the directory and updates the contact in the personal information file with the information in the directory. | 06-03-2010 |
20100138391 | MANAGEMENT METHOD, MANAGEMENT PROGRAM AND MANAGEMENT APPARATUS OF DATABASE - A database management system includes a backup processing portion and a DB access processing portion. The backup processing portion operates to write data at a given time of a database stored in a storage unit out of the database after the given time as backup data. When an update request for data not written out as the backup data occurs in a data access request after the given time, the DB access processing portion writes the data at the given time out of the database as the backup data and updates the data written out of the database according to the update request. The backup processing portion and the DB access processing portion execute their processes in parallel. | 06-03-2010 |
20100145915 | STORAGE APPARATUS AND DATA RESTORING METHOD USED THEREIN - A storage apparatus includes a processor to control the apparatus according to a process including creating, in each of the management areas in response to the restore execution instruction from the host, update information that indicating whether the data in each of the management areas is updated from restore generation to be restored to the latest generation, on the basis of the backup information in each generation, extracting the data before update stored in the backup volume of the oldest generation as the data of the restore generation on the basis of the update information for the oldest generation in each of the management areas, and updating the current data stored in the same management areas as the management areas in which the data before update was stored, by the data before update extracted by the extracting process. | 06-10-2010 |
20100169279 | Data management of aggregrated devices through a television platform - An apparatus and method are disclosed. In one embodiment apparatus includes a media aggregation backup unit that can receive a request to perform a backup of a set of media files stored within media storage devices coupled to a home network. The media aggregation backup unit can send information to a remote server, coupled to the Internet that identifies the media storage devices coupled to the home network to the remote server. Also, the media aggregation backup unit can send information to the media storage devices to provide the media storage devices the identity and location of the remote server. | 07-01-2010 |
20100169280 | DISTRIBUTED NETWORK CONSTRUCTION AND STORAGE METHOD, APPARATUS AND SYSTEM - The disclosure relates to distributed network communications, and in particular, to a distributed network construction method and apparatus, a distributed data storage method and apparatus, and a distributed network system. When a node joins a distributed network, the ID of the node is determined according to the geographic location information about the node. Therefore, all the nodes in the same area belong to the same ID range, and the node IDs are allocated according to the area. Because the node IDs are determined according to the area, the local data may be stored in the node in the area according to the geographic information, inter-area data access is reduced. Therefore, the method, the apparatus, and the system provided herein reduce the data load on the backbone network, balance the data traffic and the bandwidth overhead of the entire network, and reduce the network instability. | 07-01-2010 |
20100179942 | SYSTEM AND METHOD FOR EFFICIENT TRANSFER OF APPLICATIONS AND DATA DURING DEVICE SWAP - A method for automatically registering the runtime environment and related component applications with an application gateway when transferring the applications from a first wireless device to a second wireless device is provided. Applications installed on the first wireless device are registered with an application gateway, which maintains a registration list of identification information for all registered wireless devices and applications installed thereon. A back-up is created of the applications and registration information for the runtime environment installed on the first wireless device for transfer to a second wireless device. An application container of the second wireless device determining installation and communicating to the application gateway identification information regarding the second wireless device and the restored applications. The application gateway registers the second wireless device by updating the registration list with the identification information for the second wireless device and the applications installed thereon. | 07-15-2010 |
20100185586 | MESSAGE-BASED SCALABLE DATA TRANSPORT PROTOCOL - The invention deploys a message-based data transport platform, in which a communication engine controls the delivery of server or other backup data or other large quantity data to a remote site based on message objects as fundamental units. Data sessions from one or more servers or other data sources may be buffered over established pipes for delivery to a remote data host which likewise contains messaging control. Relatively large message units may wait for communication over the channel in a queue, and be released when prior messaging is complete. Completion port or other polling or other mechanisms may indicate that connections have become open for use. In embodiments the message objects may be signed, or encrypted to safeguard against alteration or unauthorized viewing. The communication engine may rely upon TCP or other underlying transport mechanisms to effect lower level transmission. | 07-22-2010 |
20100205149 | MOBILE ELECTRONIC APPARATUS AND DATA MANAGEMENT METHOD IN MOBILE ELECTRONIC APPARATUS - A data memory of an IC card serving as a mobile electronic apparatus stores a record file which stores record data. The data memory has a record area which stores the record data and a data saving area which stores backup data to the record data stored in the record area. When a CPU of the IC card receives a command which requests record data in the record file to be rewritten from an IC card processing apparatus through a communication control unit and an interface, the CPU stores the record data stored in the record area as backup data in the data saving area. The CPU of the IC card rewrites the record data stored in the record area after the backup data is stored in the data saving area. | 08-12-2010 |
20100211546 | System and method to backup data about devices in a network - A system to backup data about a device in a network is disclosed. In a particular embodiment, the system includes a storage system for the data about the device in a controller, a first subsystem for determining that the data should be transferred to the device, and a second subsystem for transferring the data to the device for use. | 08-19-2010 |
20100217750 | ARCHIVE APPARATUS, CONVERSION APPARATUS AND CONVERSION PROGRAM - An archive apparatus including a plurality of recording media and a processing unit for executing writing into and reading from the plurality of recording media includes an electronic data storage unit, a data format storage unit, an unusable information storage unit, and a conversion destination determining unit. The electronic data storage unit stores electronic data. The data format storage unit stores a data format of the electronic data. The unusable information storage unit stores an unusable and a usable data format as unusable information. The conversion destination determining unit detects, in the data format storage unit, the electronic data of the data format corresponding to the unusable data format, and determines a conversion destination of the unusable data format as a usable data format corresponding to the unusable data format of the unusable information. | 08-26-2010 |
20100235325 | STORING LOSSLESS TRANSFORMS OF DATA - Techniques and environments that increase the convenience, efficiency and variety of cloud services are offered to clients. User data having an original representational format is losslessly transformed to form one or more alternate renditions having various representational formats based on the lossless transforms. The renditions, which may be pre-generated, can be stored on a network server instead of the identical user data to thereby reduce redundant computation and storage costs. In some cases both the renditions and the original use data may be stored. The original user data may be reconstructed, recreated, or restored using the alternate renditions. | 09-16-2010 |
20100241613 | Co-operative locking between multiple independent owners of data space - Locking allocated data space is disclosed. An indication is received that certain previous version data is required to be retained. A map of metadata records, each associated with a journaling process write of previous version data which write includes previous version data required to be retained, is built. In some embodiments, the map associates a write time with each record in the map. A reclamation process checks to determine whether any storage proposed to be reclaimed is included in the map of record identifiers. In some embodiments, the determination is made based at least in part on the write time associated in the map with at least a first record identifier in time-sorted order. | 09-23-2010 |
20100250494 | PERIPHERAL DEVICE AND PORTABLE ELECTRONIC DEVICE - A peripheral device and a portable electronic device are disclosed. The peripheral device is capable of being connected with a data processing system, and the peripheral device includes a transmission module, a control module, and a storage module. The transmission module is capable of being connected with the data processing system. The control module is connected with the transmission module. The control module automatically executing a backup program and an encryption program to copy a target file in the data processing system to be a backup file by the transmission module and to encrypt the backup file when the transmission module is connected with the data processing system. The storage module is connected with the control module for receiving the backup file from the control module and storing the backup file. | 09-30-2010 |
20100250495 | BACKING-UP AND RESTORING FILES INCLUDING FILES REFERENCED WITH MULTIPLE FILE NAMES - Provided are a method, system, and article of manufacture for backing-up and restoring files including files referenced with multiple file names. Files to backup are determined. A determination is made from the files to backup files referenced with multiple names. An entry is created for each file to backup in a backup directory indicating file attributes and each name used to reference the file. The determined files and the backup directory are backed-up. | 09-30-2010 |
20100268688 | ONSITE BACKUP FOR THIRD PARTY INTERNET-BASED SYSTEMS - A system for onsite backup of internet-based data is provided. The system includes a central computer, a client computer, a communications link between the central computer and the Internet, and a communications link between the client computer and the Internet. The system also includes at least one database containing a plurality of data records accessible by the central computer, each data record containing a client identification number. Software executing on the central computer receives a data backup request, and software executing on the central computer transmits the data backup to the client computer. | 10-21-2010 |
20100287140 | TECHNIQUES FOR ESTABLISHING A FILE SYSTEM THAT EXPOSES A VIRTUAL FILE SYSTEM FOR BACKUP OPERATIONS - Techniques for establishing a files system that exposes a virtual file system for backup operations are presented. Changes to files of a file system are maintained separately or collected and presented as a VFS. The VFS is then used to perform backup operations. Moreover, the files identified in the VFS can be customized based on search parameters, criterion, and/or criteria supplied by a user or supplied as parameters to backup and VFS mount operations. | 11-11-2010 |
20100293141 | Method and a System for Obtaining Differential Backup - The present invention provides a method that uses differential backup which is a key feature when uploading file for back up data from a client terminal to a server terminal. At the time of backup, only the changes from the client terminal side are sent back to the server terminal which saves the bandwidth and makes the process fast. While uploading, data is sent in the form of chunks of fixed size. In case any of the chunks could not be delivered on the server terminal, the same chunk is retransmitted from the client terminal. | 11-18-2010 |
20100293142 | SYSTEM AND METHOD FOR TRANSMITTING NEEDED PORTIONS OF A DATA FILE BETWEEN NETWORKED COMPUTERS - A system and method for communicating a data file between networked computers is disclosed. The method includes the operation of requesting a data file consisting of a plurality of file blocks to be transferred from a source computing device to a destination computing device. A hash signature for each of the plurality of file blocks of the data file is sent from the source computing device to the destination computing device. It can be determined which of the file blocks of the data file are already located on the destination computing device based on the hash signature of each file block. The remaining file blocks can be transferred from the source to the destination computing device. The file can be constructed at the destination computing device from the plurality of file blocks. | 11-18-2010 |
20100293143 | INITIALIZATION OF DATABASE FOR SYNCHRONIZATION - Aspects of the subject matter described herein relate to initializing a database to be used for synchronization. In aspects, a peer in a synchronization topology creates a consistent copy of its database. Metadata associated with this copy is marked to distinguish changes made before the copy was created from changes made after the copy was created and also that the copy needs to be prepared before being used in synchronization. Any client may then download the copy and start immediately reading and modifying its downloaded copy. Before the client synchronizes its copy with other databases already in the synchronization topology, the downloaded copy is prepared for use in the topology using the markers. | 11-18-2010 |
20100293144 | USING SNAPSHOTTING AND VIRTUALIZATION TO PERFORM TASKS IN A KNOWN AND REPRODUCIBLE ENVIRONMENT - Some embodiments of using snapshotting and virtualization to perform tasks in a known and reproducible environment have been presented. In one embodiment, a pristine snapshot of a first virtual machine in a computer file system is stored in a computer-readable storage medium. The pristine snapshot represents a known environment. A processor clones the pristine snapshot to generate a copy of the pristine snapshot, and starts a second virtual machine using the copy of the pristine snapshot to reproduce the known environment for executing an operation. | 11-18-2010 |
20100293145 | Method of Selective Replication in a Storage Area Network - A method includes identifying with a server a first range of data blocks in a storage device array corresponding to data files selected for replication, the first range of data blocks being managed by a source host device; mapping the first range of data blocks to a second range of data blocks in the storage device array managed by the destination host device; copying the data blocks from the first range that contain the data files selected for replication to the corresponding data blocks in the second range; deleting files in the copied data blocks of the second range that have not been selected for replication; and condensing the second range of data blocks. | 11-18-2010 |
20100293146 | STATELESS VIRTUAL MACHINE - Some embodiments of using snapshotting and virtualization to perform tasks in a known and reproducible environment have been presented. A computing device generates a temporary snapshot of a state of a virtual machine. A session of the virtual machine is started on the computing device using the temporary snapshot. The temporary snapshot is automatically destroyed when the session is terminated, wherein any changes made to the state during the session are removed by destroying the temporary snapshot. | 11-18-2010 |
20100293147 | SYSTEM AND METHOD FOR PROVIDING AUTOMATED ELECTRONIC INFORMATION BACKUP, STORAGE AND RECOVERY - An automated electronic information backup, storage migration, and recovery system includes techniques for automatically observing all file events over a plurality of computing devices. The observed file events are mapped to the applications producing them. A relevancy of those file events are determined based on an application information repository. Business rules are produced based on this information to automatically backup all relevant file event changes and restore or migrate backed up information when necessary. | 11-18-2010 |
20100299309 | BACKUP MANAGEMENT METHOD - Restoration of all virtual machines are managed in respect of each restoration time thereof in a case where virtual machines at certain time in the past are restored under a server virtualization environment in which a plurality of virtual machines are constituted. A host computer creates a first snapshot of a first virtual machine at a first time specified by a management computer, and stores the first snapshot in a first logical volume of a storage device. Next, the storage system replicates in a second logical volume the first logical volume. In a case where the host computer creates a second snapshot of a second virtual machine at a second time that is before the first time and stores the second snapshot in the first logical volume, the management computer manages or displays the second snapshot creation time and snapshot information in association with the first snapshot creation time and snapshot information, respectively. | 11-25-2010 |
20100299310 | METHOD FOR ACCESSING DATA STORAGE UNIT - In a method for accessing a data storage unit, an access instruction for the data storage unit is received from a client side, and a step is performed to determine if the data storage unit has been shut down. When the access instruction is issued for browsing the data storage unit which has been shut down, archive information on the storage unit is obtained from a database, and the file directory information is delivered to the client side, so that the client side may browse the data storage unit based on the file directory information. | 11-25-2010 |
20100299311 | METHOD AND SYSTEM FOR ASSURING INTEGRITY OF DEDUPLICATED DATA - The present invention provides for a system and method for assuring integrity of deduplicated data objects stored within a storage system. A data object is copied to secondary storage media, and a digital signature such as a checksum is generated of the data object. Then, deduplication is performed upon the data object and the data object is split into chunks. The chunks are combined when the data object is subsequently accessed, and a signature is generated for the reassembled data object. The reassembled data object is provided if the newly generated signature is identical to the originally generated signature, and otherwise a backup copy of the data object is provided from secondary storage media. | 11-25-2010 |
20100306173 | HANDLING TEMPORARY FILES OF A VIRTUAL MACHINE - A method and system for handling temporary data of a virtual machine are described. In one embodiment, virtual machines are hosted by a server and accessed by remote clients over a network. The server assigns first storage and second storage to each virtual machine, where the first storage is designated for temporary data of a respective virtual machine and the second storage is designated for persistent data of a respective virtual machine. The server monitors events pertaining to the virtual machine. Upon detecting a predefined event pertaining to one of the virtual machines, the server causes at least a subset of the temporary data to be removed from the first storage of this virtual machine. | 12-02-2010 |
20100306174 | METHOD AND APPARATUS FOR BLOCK BASED VOLUME BACKUP - Embodiments of the invention provide methods and apparatuses for block based storage subsystem to have backup ability to a file based storage service such as HTTP or cloud storage service. In one embodiment, a storage system is coupled via a network to a storage service which has one or more file servers. The storage system comprises a processor; a memory; a volume-based snapshot control module configured to create a snapshot volume of data at a certain time, the snapshot volume being a block-based volume which is divided into a plurality of portions; and a copy control module configured to read each portion of the snapshot volume and send said each portion as file data to the storage service via the network, and to generate mapping information between an address of said each portion in the storage system and a file identifier of the file data of said each portion in the storage service. | 12-02-2010 |
20100325090 | ELECTRONIC DEVICE FOR FACILITATING FILE COPYING - An electronic device includes two directories, one of which stores an image file. The electronic device also includes a window generating unit and a multi-touch screen. The window generating unit generates a window on the multi-touch screen. The window display the image file as an image and two representations for accessing the two directories correspondingly. The electronic device also includes a detecting unit and a copying unit. The detecting unit detects an operation by a user on the multi-touch screen and recognizes if the operation is a copy command based upon a database thereof and the locations of the image and the representations. If yes, the copying unit copies the image file from one of the directories to the other. | 12-23-2010 |
20100332452 | System and method for providing long-term storage for data - A system for storing files comprises a processor and a memory. The processor is configured to break a file into one or more segments; store the one or more segments in a first storage unit; and add metadata to the first storage unit so that the file can be accessed independent of a second storage unit, wherein a single namespace enables access for files stored in the first storage unit and the second storage unit. The memory is coupled to the processor and configured to provide the processor with instructions | 12-30-2010 |
20100332453 | DATA MINING SYSTEMS AND METHODS FOR HETEROGENEOUS DATA SOURCES - Systems and methods integrate disparate backup devices with a unified interface. In certain examples, a management console manages data from various backup devices, while retaining such data in its native format. The management console can display a hierarchical view the client devices and/or their data and can further provide utilities for processing the various data formats. A data structure including fields for storing both metadata common to the client device data and value-added metadata can be used to mine or process the data of the disparate client devices. The unified single platform and interface reduces the need for multiple data management products and/or customized data utilities for each individual client device and provides a single pane of glass view into data management operations. Integrating the various types of storage formats and media allows a user to retain existing storage infrastructures and further facilitates scaling to meet long-term management needs. | 12-30-2010 |
20110016089 | RESTORING DATA TO A MOBILE DEVICE - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for backing up and restoring data to a mobile device. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving data from a mobile device to be included in a backup, the data including data associated with one or more mobile device applications; storing the data in a backup archive; generating a backup mapping file for each of the mobile device applications, each backup mapping file identifying each file in the backup associated with the respective application; and using the backup mapping files to restore the corresponding applications to the mobile device. | 01-20-2011 |
20110022568 | Data management method and apparatus of portable terminal - A data management method and apparatus of a portable terminal improves memory utilization efficiency using a data move/copy function which allows moving or copying the user data preserved in the non-volatile memory region of the memory of a portable terminal. A data management method for a portable terminal includes selecting at least one user data item in response to a selection request. An extended region for backup of the user data item is checked in response to a backup request. Transfer data corresponding to the user data item is created. The transfer data is stored in the extended region as a backup of the user data item. | 01-27-2011 |
20110035358 | OPTIMIZED COPY OF VIRTUAL MACHINE STORAGE FILES - A facility is described for optimizing the copying of virtual machine storage files. In various embodiments, the facility refrains from copying portions of the virtual machine storage file that do not contain any meaningful data for the purposes of the guest file system within the virtual machine storage file. In some embodiments, the facility refrains from copying portions of the file that are in use by the guest file system, but are of no practical value. | 02-10-2011 |
20110035359 | Database Backup and Restore with Integrated Index Reorganization - According to an embodiment of the present invention, a method for reorganizing a source index tree of a database table resulting in a target index tree of the database table is provided. A backup process reads source leaf pages of the source index tree in a logical order defined by a sequence of index keys. The logical order can be different from a physical order of the source leaf pages defined by a sequence of respective storage locations. The backup process constructs target leaf pages of the target index tree maintaining the logical order. A restore process constructs target non-leaf pages of the target index tree based on the distribution of the index keys among the constructed leaf pages and stores the target leaf and non-leaf pages. | 02-10-2011 |
20110035360 | Tools and techniques for original digital files - The present invention provides tools and techniques for distinguishing a file from any or all copies of the file that may exist. One method ascertains ( | 02-10-2011 |
20110055160 | COMPUTER READABLE MEDIUM, INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING APPARATUS - A computer readable medium storing a program causing a computer to execute an information process, the information process includes: first outputting at least one piece of element information of management target information from a first record unit to a second record unit, the first and the second record units recording the management target information containing a plurality of pieces of element information; deleting, from the first record unit, at least one piece of element information which is output to the second record unit; determining, upon acceptance of a request for processing the management target information recorded in the first record unit from a user, whether or not element information which is necessary for execution of the processing is recorded in the first record unit; and executing the processing if the element information which is necessary for execution of the processing is recorded in the first record unit. | 03-03-2011 |
20110066597 | Method and System for Performing Live Migration of Persistent Data of a Virtual Machine - Persistent data of virtual machines are migrated between and across data stores using a method that provides for a bounded disk size, low performance overhead, arbitrarily low downtimes, atomic switch-over, and ability to build optimizations based around block level heuristics. The method includes the steps of copying the persistent data at the source data store to the destination data store, updating a bitmap data structure during the copying step to indicate which blocks of the persistent data have been modified during the copying step, identifying the blocks that have been modified during the copying step using the bitmap data structure, and copying the identified blocks to the destination data store. The method may further include the step of determining that the number of the identified blocks is below a predetermined threshold and suspending the virtual machine prior to the second copying step. | 03-17-2011 |
20110071982 | Offline Restructuring of DEDB Databases - An IMS DEDB database restructure operation creates an empty offline DEDB having the desired structure. The offline database is populated with data from a source (online) database while keeping the source database online (i.e., available for access and update operations). Updates to the source database made during this process are selectively processed in parallel with the offline DEDB load operation. When the contents of the offline database is substantially the same as the source or online database, the source database is taken offline, final updates to the offline database are applied whereafter the offline database is brought online, thereby replacing the source database. It is significant to note that updates occurring to the source or online DEDB are applied to the offline DEDB. | 03-24-2011 |
20110078116 | METHOD FOR CONTROLLING THE DISTRIBUTION OF DATA BLOCKS AND APPARATUS FOR THE SAME - Methods of and apparatuses for controlling the distribution of data block in a peer-to-peer network and adjusting the distribution of data block in an user equipment end are provided. The system disclosed herein is able to calculate and evaluate the usage of the stream data block based on the present distribution of the data block. The backup of the data block is able to be adjusted, such as increasing the number of backups or deleting the files or backups based on the usage of the files, so that the system resource is able to be optimized. This method can provide high concurrent and efficient customer service capability and highly improve the usability and reliability of the stream media data. | 03-31-2011 |
20110078117 | BACKUP CONTROL APPARATUS AND METHOD ELIMINATING DUPLICATION OF INFORMATION RESOURCES - A backup control apparatus which references duplication management information which includes first stored location information indicating the stored location of first information resource and second stored location information indicating the stored location of a second information resource which duplicates the first information resource, and identifies, from among a plurality of information resources belonging to a backup region. The first information resource stored in the location indicated by the first stored location information, and a second information resource stored in the location indicated by the second stored location information corresponding to the first stored location information. The backup control apparatus replaces the identified second information resource with linked information indicating a link to the identified first information resource, and backs up the backup region in which the second information resource is replaced with the linked information. | 03-31-2011 |
20110082834 | Storage control device to backup data stored in virtual volume - A storage control device uses write management information that manages locations of the occurrence of writing in one or more first storage devices in order to specify one or more locations where writing has occurred, and backs up one or more data elements stored in one or more specified locations to a second storage device. In order to perform a restore operation, write management information at the time of a backup is stored, and data elements stored in the second storage device are restored to one or more locations specified from the write management information at that time of backup, or to one or more new locations specified from new write management information indicating one or more new locations corresponding to the one or more locations. | 04-07-2011 |
20110087634 | CONVERTING BACKUP COPIES OF OBJECTS CREATED USING A FIRST BACKUP PROGRAM TO BACKUP COPIES CREATED USING A SECOND BACKUP PROGRAM - Provided are a method, system, and article of manufacture for converting backup copies of objects created using a first backup program to backup copies created using a second backup program. A plurality of backup copies of versions of an object are created using a first backup program, wherein the object has an object name. The first backup program is used to restore at least one of the backup copies to a restored version of the object having a name different from the object name. A second backup program is used to create a backup copy of each restored version of the object. A name of a designated object is assigned to each backup copy created using the second backup program. Metadata of each backup copy created using the second backup program is updated with metadata for the designated object. | 04-14-2011 |
20110099149 | ADAPTIVE LOGGING APPARATUS AND METHOD - An adaptive logging apparatus and method are provided. Using the adaptive logging apparatus and method, it is possible to accumulatively store the size of log records generated according to a data update request, and selectively perform algorithms for Recovery and Isolation Exploiting Semantics (ARIES) logging and shadow paging logging, according to the size of the stored log records. | 04-28-2011 |
20110099150 | Method for a cloning process to enable cloning a larger System drive to a smaller system - System and method for automatically discarding sets of pre specified files or divert sets of pre specified files from the files that would normally be sent to a storage device during a backup or cloning operation as the backup device becomes full. The embodiments are used to allow a backup of a storage device onto a smaller capacity storage device with as many files as possible. The embodiments uses one or more lists of files to discard which are used to filter files as the target drive become full. | 04-28-2011 |
20110106765 | BACKUP DEVICE AND CONTROL DEVICE FOR BACK UP - A backup device which backs up data in a predetermined medium includes a first data acquisition element that acquires backup data, a second data acquisition element that acquires recorded data which has been already recorded in the predetermined medium, and a backup processing element that judges whether the backup data matches with the recorded data, records the backup data and reference data for referring to the backup data in the predetermined medium when the backup processing element judges that the backup data does not match with the recorded data, and records reference data of which reference destination is set to the recorded data which matches with the backup data in the predetermined medium when the backup processing element judges that the backup data matches with the recorded data. | 05-05-2011 |
20110106766 | REMOTE COPY SYSTEM - Provided is a remote copy system capable of guaranteeing the time ordering of data to be handled by a remote site even when the tasks at the remote site are operated across a plurality of storages or a plurality of volume groups. A consistency group consisting of a secondary journal volume and a replica is associated with a journal group consisting of a primary data volume, a primary journal volume, a secondary journal volume, and a secondary data volume. Upon backing up a secondary data volume and forming a replica, the host system issues a backup time reservation command to a storage apparatus, and the storage apparatus creates a replica by comparing the time stamp added to the journal data and the backup reservation time. | 05-05-2011 |
20110145196 | SYSTEM AND METHOD FOR PROVIDING A BACKUP/RESTORE INTERFACE FOR THIRD PARTY HSM CLIENTS - Performing a backup of a stub object located on a file system managed by a hierarchical storage manager configured to migrate data objects from the file system to a migration storage pool. The stub object includes information for recalling a migrated data object and is configured to determine whether a backup copy of the migrated data object is stored in a backup storage pool if the backup is performed in an incremental backup operation. The backup further includes directing the hierarchical storage manager to recall the migrated data object to the file system if the backup copy of the migrated data object is not stored in the backup storage pool or if the backup is performed in a selective backup operation. The backup additionally includes storing a backup copy of the migrated data object in the backup storage pool if the migrated data object is recalled. | 06-16-2011 |
20110161296 | APPLYING A POLICY CRITERIA TO FILES IN A BACKUP IMAGE - Provided are a method, system, and article of manufacture for applying a policy criteria to files in a backup image. A backup image of files in a file system is maintained. A policy is applied to the files in the backup image to determine files satisfying a policy criteria. A list is prepared indicating the determined files. The determined files in the file system are accessed and a deferred operation indicated in the applied policy is applied to the accessed files in the file system. | 06-30-2011 |
20110173158 | SEARCHING AND RETRIEVING FILES IN COMPUTER NETWORKS - The specification and drawings present a new method, apparatus and software related product (e.g., computer readable medium) presented for: reading all multi-application files stored in network devices (i.e., in servers, workstations, archives, backup repositories, etc.) comprised in a computer network or reading selected multi-application files comprising one or more predefined features and stored in said network devices using a generic application programming interface (GAPI), followed by creating and/or updating (e.g., periodically) meta-data for the files read by using the GAPI, and/or followed by retrieving requested files out of the multi-application files using the meta-data for the requested files (if the meta-data is created and properly updated). | 07-14-2011 |
20110173159 | DATA MOVER DISCOVERY OF OBJECT EXTENT - Performing data backup for a client includes receiving, at a host other than the client, volume information including data indicating a physical data storage location of at least a part of a volume comprising one or more stored objects associated with the client; and determining at the host, based at least in part on the volume information, a stored object information for a stored object included in the volume, the stored object information including data associated with a physical data storage location of the stored object. | 07-14-2011 |
20110178986 | SYSTEMS AND METHODS FOR CLASSIFYING AND TRANSFERRING INFORMATION IN A STORAGE NETWORK - Systems and methods for data classification to facilitate and improve data management within an enterprise are described. The disclosed systems and methods evaluate and define data management operations based on data characteristics rather than data location, among other things. Also provided are methods for generating a data structure of metadata that describes system data and storage operations. This data structure may be consulted to determine changes in system data rather than scanning the data files themselves. | 07-21-2011 |
20110191298 | STORAGE SYSTEM AND ITS FILE MANAGEMENT METHOD - Even if the version of the OS and DB is changed, occurrence of inconsistency in the correspondence relationship between the original version meta information and the new version real data is prevented. When a node managing a plurality of files is to return the version of the OS and DB of a plurality of files from the new version to the original version, the node deletes meta information A | 08-04-2011 |
20110213753 | Systems and Methods for Managing Application Availability - A computer-implemented method for managing application availability. The method may include identifying an application running on a first cluster node of a failover cluster and copying configuration data of the application to a storage location accessible by a second cluster node of the failover cluster. The method may also include detecting failure of the first cluster node, restoring the configuration data to the second cluster node, and executing the application on the second cluster node in accordance with the configuration data. Various other methods, systems, and computer-readable media are also disclosed herein. | 09-01-2011 |
20110218965 | SYSTEM FOR REMOTELY ERASING DATA, METHOD, SERVER, AND MOBILE DEVICE THEREOF, AND COMPUTER PROGRAM PRODUCT - A system for remotely erasing data, a method, a server, and a mobile device thereof, and a computer program product are provided. The method is adapted for the mobile device having an internal storage unit and an external storage unit, wherein a user account of a service website is set up for the mobile device. In the method, a relationship between the user account and the mobile device is recorded in the server. The server receives a data erasing request corresponding to the user account through the service website, and sends a remote control command to the mobile device corresponding to the user account. Then, the mobile device erases data stored in the external storage unit thereof according to the remote control command. | 09-08-2011 |
20110231366 | REMOTE DATA MIRRORING SYSTEM - A method for data protection includes accepting data for storage from one or more data sources ( | 09-22-2011 |
20110238625 | INFORMATION PROCESSING SYSTEM AND METHOD OF ACQUIRING BACKUP IN AN INFORMATION PROCESSING SYSTEM - Provided is an information processing system including a plurality of nodes | 09-29-2011 |
20110246424 | AUTOMATED RELOCATION OF IN-USE MULTI-SITE PROTECTED DATA STORAGE - Methods of providing access to data are presented. The method includes providing a storage grid which includes a source chain of storage nodes and a target chain of storage nodes, the source chain including a primary source node and a secondary source node which operates as a data minor of the primary source node, and the target chain including a primary target node and a secondary target node which operates as a data mirror of the primary target node. The method also includes initially storing data on the source chain, the primary source node of the source chain maintaining a primary source copy of the data, and the secondary source node of the source chain maintaining a secondary source copy of the data. The method further includes relocating the data from the source chain to the target chain, the primary target node of the target chain maintaining a primary target copy of the data, and the secondary target node of the target chain maintaining a secondary target copy of the data, access to the data being continuously provided from the storage grid to an external device before, during, and after relocation of the data from the source chain to the target chain. | 10-06-2011 |
20110246425 | Managing Data Backup of an In-Memory Database in a Database Management System - System, method, computer program product embodiments and combinations and sub-combinations thereof for backing up an in-memory database. In an embodiment, a backup server is provided to perform backup operations of a database on behalf of a database server. A determination is made as to whether the database is an in-memory database. Database server connections are utilized during data accesses for the backup operations when the database is an in-memory database. | 10-06-2011 |
20110258161 | Optimizing Data Transmission Bandwidth Consumption Over a Wide Area Network - An exemplary embodiment includes partitioning a data message to be communicated from a first data site to a second data site into data chunks; generating a data chunk identifier for each data chunk; determining whether the data chunks are stored at the second data site; when at least one data chunk is not stored at the second data site, adding the data chunk identifier for each data chunk not stored at the second data site to a data structure at the first data site; sending a transformed data message from the first date site to the second data site; wherein, when at least one data chunk is already stored at the second data site, rather than including that data chunk, the transformed data message instead includes at least one tuple to enable the data message to be reconstructed at the second data site without sending the previously stored data chunk, the transformed data message also includes each data chunk not stored at the second data site. | 10-20-2011 |
20110282839 | METHODS AND SYSTEMS FOR BACKING UP A SEARCH INDEX IN A MULTI-TENANT DATABASE ENVIRONMENT - An index to be backed up in a multitenant environment is identified. The multitenant environment includes data for multiple client entities, each identified by a tenant identifier (ID) having one of one or more users associated with the tenant ID. Users of each of multiple client identities can only access data identified by a tenant ID associated with the respective client entity. The multitenant environment is a hosted database provided by an entity separate from the client entities, and provides on-demand database service to the client entities. A staged copy of the index to be backed up is created. The staged copy of the index is segmented. The segments are uploaded to a pre-selected location. | 11-17-2011 |
20110289057 | SYSTEMS AND METHODS TO DETERMINE SECURITY HOLES OF A BACKUP IMAGE - A system and method provide for backing up and restoring using patch level data for operating system and application files. Patch level data for the files in the backup image may be displayed along with current patch level data. Further, files in a backup image may be replaced based on current patch level data indicating a patched version of the file in the backup image is available. Further, upon a restore, if a patched file is available for a corresponding file in a backup image, the patched file may be retrieved from a patch source and used in place of the file that would have been restored from the backup image. | 11-24-2011 |
20110295808 | HALDB OLR Variant Linear Statistics - A method for providing database reorganization statistics across timestamp recoveries, includes: appending statistical data for a database reorganization associated with a timestamp to a statistics file; determining that the database reorganization has resumed after a suspension; obtaining a resume timestamp; retrieving statistical data within the statistics file corresponding to the resume timestamp; and appending statistical data for the resumed database reorganization to the retrieved statistical data. Further raw statistical data for the resumed database reorganization are appended to the retrieved raw statistical data. When a unit of reorganization has committed or the resumed database reorganization has terminated, a statistics record including the retrieved raw statistical data and the further raw statistical data associated with another timestamp is created, and the statistics record is appended to the statistics file. | 12-01-2011 |
20110295809 | COMPUTER SYSTEM AND RESTORATION METHOD - A computer system and restoration method that can facilitate restoration work is suggested. | 12-01-2011 |
20110302137 | Systems and methods for improving storage efficiency in an information handling system - Systems and methods for improving storage efficiency in an information handling system are provided. In some embodiments, an information handling system including an increased storage efficiency is provided. The information handling system may include a processor associated with a first storage resource and a plurality of second storage resources, where the first storage resource is more reliable than the plurality of second storage resources. The processor may be configured to determine a weight of a file portion, determine a number of copies of the file portion to be stored based at least on the determined weight, and store a copy of the file portion on the first storage resource if the determined number of copies of the file portion is greater than a predetermined storage threshold. | 12-08-2011 |
20110302138 | NETWORK AWARE STORAGE DEVICE - In one embodiment a network attached storage device comprises at least one input/output port, at least one storage media, and a network caching module to receive, in the network attached storage device, a backup request from a computing device communicatively coupled to the network attached storage device, wherein the backup request identifies at least a first file, determine, in the network attached storage device, whether the at least a first file associated with the backup request resides on a storage media in the network attached storage device; and in response to a determination that the at least a first file associated with the backup request resides on a storage media in the network attached storage device executes the backup request against the at least a first file associated with the backup request which reside on a storage media in the network attached storage device, and initiates a remote backup operation to a remote network-based storage device coupled to the network attached storage device. | 12-08-2011 |
20120030175 | SYSTEM FOR OFFLOADING DATA ANALYIS OVERHEAD FROM A PRIMARY SITE TO A REMOTE SITE - A method for reducing the data analysis overhead on a production system is disclosed herein. In one embodiment, such a method includes replicating production data from a primary site to a remote site. A control data set containing information for directing analysis of the production data is generated at the primary site and replicated to the remote site. At the remote site, the method includes analyzing the production data as directed by the control data set by making use of time on a CPU located at the remote site. Analysis may involve executing a diagnostic routine and/or generating a log file documenting the results of the analysis. A corresponding apparatus, system, and computer program product are also disclosed and claimed herein. | 02-02-2012 |
20120030176 | ONLINE BACKUP SYSTEM WITH GLOBAL TWO STAGED DEDUPLICATION WITHOUT USING AN INDEXING DATABASE - An encryption for a distributed global online backup system with global two-stage deduplication in the absence of an indexing database where data blocks are encrypted using their SHA-1 signatures as encryption keys. | 02-02-2012 |
20120030177 | HIERARCHICAL SYSTEMS AND METHODS FOR PERFORMING DATA STORAGE OPERATIONS - The invention is a hierarchical backup system. The interconnected network computing devices are put into groups of backup cells. A backup cell has a manager software agent responsible maintaining and initiating a backup regime for the network computing devices in the backup cell. The backups are directed to backup devices within the backup cell. Several backup cells can be defined. A manager software agent for a particular cell may be placed into contact with the manager software agent of another cell, by which information about the cells may be passed back and forth. Additionally, one of the software agents may be given administrative control over another software agent with which it is in communication. | 02-02-2012 |
20120047109 | DATA STRUCTURE PRODUCTION METHOD AND BACKUP DEVICE - There is provided a data structure production method for producing a multilevel directory structure in a backup device. The multilevel directory structure includes target data having at least one of video data and audio data. The data structure production method includes producing a first directory that establishes a first directory hierarchy, producing at least one second directory that establishes a second directory hierarchy lower than the first directory hierarchy wherein the target data is stored in the at least one second directory, and storing the at least one second directory in the first directory provided the first directory is less than or equal to a predetermined size. | 02-23-2012 |
20120047110 | System and Method for Automatic Data Defragmentation When Restoring a Disk - A method is described to restore backed-up data to a data source such that the data are automatically defragmented. Defragmentation is accomplished during the restore operation by identifying data blocks belonging to discrete data files and copying those data blocks to the target data source such that all data blocks for any given file are written to contiguous sectors on the target data source. | 02-23-2012 |
20120072394 | DETERMINING DATABASE RECORD CONTENT CHANGES - Database backup system identifies and extracts any changed database record using only two copies of the database from two different points in time. A first copy of the database is generated at a first time. Copies of log files including changes to the database since the first time are generated at a second time. The copy of the log files is applied to the database copy, and any changed blocks of the first copy of the database are identified. The changed blocks and a second copy of the database are used to identify changes to any record of the database between the first and second time. An archived database is generated and updated over time by archiving only data of any record that subsequently changes. Restoration of the database to a state corresponding to any point in time uses only the archived database and data of changed data records. | 03-22-2012 |
20120078843 | ENHANCING DATA STORE BACKUP TIMES - Provided are techniques for selecting a first group of indexes to form a current generation of indexes, selecting indexes from the first group biased to indexes with higher fitness values from the current generation of indexes, forming sub-groups of indexes using the selected indexes, determining fitness values of each of the sub-groups based on the fitness value of each of the indexes, selecting a subset of the sub-groups; and placing the indexes in the selected sub-groups into a new generation of indexes. | 03-29-2012 |
20120078844 | SYSTEM AND METHOD FOR DISTRIBUTED PROCESSING OF FILE VOLUME - A file processing system includes a system targeting unit to target a distributed file system, a chunk generator to generate a chunk including file blocks and to generate copies of the chunk to be stored in the distributed file system, a data storage medium to store the chunk, and a chunk operation requesting unit to request storage of the generated chunk copies in the distributed file system. A distributed file system includes a first data server and a second data server. Each data server includes a chunk storage unit to store a chunk copy received from a file processing system, and a chunk operation performing unit to generate an identical copy of the stored chunk copy that is undamaged to replace a damaged chunk copy. | 03-29-2012 |
20120078845 | METHOD AND SYSTEM FOR DIRECTORY MANAGEMENT - System and method for extracting, retrieving and managing data in a computer or network of computers through an enhancement of the power of the directory management system and email management system by enabling users to superimpose a hierarchy of descriptors on top of the system, to share, import and export the hierarchy of descriptors between computers with controlled access for data objects. The method and system is defined particularly for selecting individual references from search engine results and saving them along with descriptors. The method and system automatically generate reports of work done in the computer or network of computers, including creation, modification, copying, moving and deletion of files and folders. The method and system reduces the clutter of information while ensuring that the system is automatically backed up in different modes and with complete flexibility to back up. | 03-29-2012 |
20120101994 | TECHNIQUES FOR AUTOMATICALLY PROVISIONING A DATABASE OVER A WIDE AREA NETWORK - Techniques for provisioning databases for users on a wide area network such as the Internet include a first party managing one or more database systems. Second parties subscribe to database services supported by the managed database systems. The first party provides, over a network, to database applications of the second parties, access to database services to which the second parties are subscribed. The database systems may use database appliances hosting both database process(es), and non-database process(es) tailored to the needs of the database process(es). A user is therefore able to obtain database resources from an Internet Database Service Provider (IDSP) without incurring the full costs of database administrator(s), dedicated database equipment facilit(ies), or even dedicated database device(s), depending on usage. Meanwhile, the IDSP incurs minimum staffing loads because of self-service tools. Costing model and automatic billing are also described. | 04-26-2012 |
20120109894 | BACKUP OF DEDUPLICATED DATA - Computer program product to back up deduplicated data to data storage media, the deduplicated data comprising a plurality of data blocks referenced for deduplication. In one embodiment, the existence of multiple references to each of the data blocks is determined; and at least two copies of at least each data block having multiple references thereto is stored, each to a separate data storage media. In another embodiment, the references to each of the data blocks is determined; the total of multiple references is compared to a percentage threshold; and multiple copies are stored for all the data blocks where the percentage threshold is exceeded. | 05-03-2012 |
20120117028 | LOAD BALANCING BACKUP JOBS IN A VIRTUALIZED STORAGE SYSTEM HAVING A PLURALITY OF PHYSICAL NODES - Systems and methods of load balancing backup jobs in a virtualized storage system having a plurality of physical nodes are disclosed. An example of a method includes receiving a backup job from a client for data on a plurality of virtualized storage nodes presented to the client as a single object. The method also includes identifying at least one property of the backup job. The method also includes directing incoming data for the backup job to a particular one of the plurality of virtualized storage nodes, selection of the particular one of the plurality of virtualized storage nodes based on the at least one property of the backup job. | 05-10-2012 |
20120130954 | METHOD AND SYSTEM FOR GENERATING COLLABORATIVE CONTENT - A method and system are provided for a plurality of users to concurrently edit at least one digital file to achieve a predetermined goal. Each method iteration comprises the steps of: creating a copy of the at least one digital file for each user; enabling at least one user to create at least one altered digital file by making a change to the copy of the at least one digital file, wherein the magnitude of the change is within predetermined limits; creating a voting set containing a plurality of digital files, the plurality of digital files including at least one altered digital file or at least one unaltered digital file; enabling at least one user to cast a vote in relation to the digital files in the voting set; repeating the steps of creating a voting set and enabling at least one user to cast a vote until at least one of the digital files in one of the voting sets receives a number of votes above a predetermined voting threshold; and including in the next iteration the at least one digital file which received a number of votes above a predetermined voting threshold. | 05-24-2012 |
20120136831 | SYSTEM AND METHOD FOR MINIMIZING DATA RECOVERY WINDOW - A computer-based system includes a backup server, a production server, a recovery agent that executes on the production server, a database on the production server, a backup database on the backup server, and a meta data file on the backup server. The meta data file includes file names, a file directory, and file attributes. The system is configured to copy the metadata file from the backup server to a production server. When the copying of the metadata file from the backup server to the production server is complete, and before or during a time period in which backup data is copied from the backup server to the production server, the system is configured to receive a request from the production server to restore a file from the backup server with a higher priority than other files on the backup server. | 05-31-2012 |
20120136832 | INCREMENTAL RESTORE OF DATA BETWEEN STORAGE SYSTEMS HAVING DISSIMILAR STORAGE OPERATING SYSTEMS ASSOCIATED THEREWITH - A method includes quiescing a file system of source storage system through a backup engine associated with the source storage system and a destination storage system and capturing, at the source storage system, a point-in-time image of the file system thereof through the backup engine. The method also includes sharing the captured point-in-time image of the file system of the source storage system with the destination storage system to enable the storage systems to have a common base data and negotiating between the storage systems for the common base data. Further, the method includes applying, to the common base data at the source storage system, a differential change corresponding to a difference between the common base data and a point-in-time image of the file system of the source storage system backed up at the destination storage system. | 05-31-2012 |
20120143823 | Database Redistribution Utilizing Virtual Partitions - In some embodiments, a partitioned database is stored in a plurality of logical or physical partitions on at least a logical or physical first data storage node, and a subset of a first partition among the plurality of logical partitions is configured as a virtual partition. An input indicating an allocation of a second physical data storage node to store the partitioned database is received. A second partition is configured on the second data storage node. In response to the input, the partitioned database is redistributed over the first and second data storage nodes by moving data within the virtual partition on the first partition to the second partition. | 06-07-2012 |
20120150805 | Efficient Backup and Restore of a Cluster Aware Virtual Input/Output Server (VIOS) Within a VIOS Cluster - In a Virtual Input/Output (I/O) Server (VIOS) partition within a data processing system that comprises cluster-aware VIOSes, a method includes: performing, via a backup/restore utility of a cluster aware (CA) operating system (OS) executing on a processor resource of the first VIOS partition, a backup operation on the first VIOS partition, which creates a first configuration backup file having configuration information about the hardware, logical and virtual devices of the VIOS partition; storing the configuration backup file within local storage; and responsive to receipt of a VIOS restore command: retrieving the configuration backup file from the local storage; and restoring the configuration of the hardware, logical and virtual devices of the first VIOS to a state that existed at a time at which the backup operation creating the configuration backup file was performed. | 06-14-2012 |
20120158660 | METHOD AND SYSTEM FOR DEDUPLICATING DATA - Methods, computer systems, and computer program products for deduplicating data in a computing environment are provided. A sequence of data is received. The sequence of data is formatted for back-up such that an order of the sequence of data is different than the order of an input sequence of the data. The sequence of data is stored in the same order as the input sequence of the data. | 06-21-2012 |
20120173489 | ATTRIBUTE SELECTABLE FILE OPERATION - Embodiments of the present invention provide a method, system and computer program product for attribute based file operation implementation selection. In an embodiment of the invention, a method for providing selectable implementations of a file operation is provided. The method includes receiving a directive to perform a file operation on a particular file stored in fixed storage of a computer and identifying an attribute of the particular file. An implementation of the file operation can be selected amongst different implementations of the file operation that maps to the identified attribute. Thereafter, the selected implementation of the file operation can be invoked to perform the file operation upon the particular file. | 07-05-2012 |
20120185436 | SYSTEMS AND METHODS FOR IED DESIGN TEMPLATES - Disclosed herein are a variety of systems and methods that may be utilized to facilitate the configuration of intelligent electronic devices using design templates. A design template may be configured to make available to the user only particular inputs that might need to be modified for a specific application of the intelligent electronic device. Use of templates, as disclosed herein, may simplify the task of configuring an intelligent electronic device. Data entered by the user may be utilized to generate a plurality of intelligent electronic device settings. According to various embodiments, the data entered by a user may be stored on the intelligent electronic device in an archive file. The archive file may also include other design information that a user may desire to store on the intelligent electronic device. | 07-19-2012 |
20120191655 | Method for Backing up Terminal Data and System Thereof - A method and a system for backing up terminal data are disclosed. The scheme is used for solving technical problems that existing ways for backing up terminal data have a low duplicating efficiency and resources are wasted seriously. The scheme creates a terminal index table to maintain data information in a terminal device; when the terminal device newly creates or modifies data contents, information of the index items in the terminal index table and corresponding data contents are sent to a network server; the network server also creates a server index table corresponding to the terminal index table, and the network server stores or deletes data contents of the terminal device according to information such as types and numbers of index items. The scheme can back up terminal data rapidly and simplifies the check procedure, thereby saving memory resources of the terminal device and improving backup efficiency. | 07-26-2012 |
20120203741 | ENHANCING DATA STORE BACKUP TIMES - Provided are techniques for selecting a first group of indexes to form a current generation of indexes, selecting indexes from the first group biased to indexes with higher fitness values from the current generation of indexes, forming sub-groups of indexes using the selected indexes, determining fitness values of each of the sub-groups based on the fitness value of each of the indexes, selecting a subset of the sub-groups; and placing the indexes in the selected sub-groups into a new generation of indexes. | 08-09-2012 |
20120221523 | Database Backup and Restore with Integrated Index Reorganization - According to an embodiment of the present invention, a method for reorganizing a source index tree of a database table resulting in a target index tree of the database table is provided. A backup process reads source leaf pages of the source index tree in a logical order defined by a sequence of index keys. The logical order can be different from a physical order of the source leaf pages defined by a sequence of respective storage locations. The backup process constructs target leaf pages of the target index tree maintaining the logical order. A restore process constructs target non-leaf pages of the target index tree based on the distribution of the index keys among the constructed leaf pages and stores the target leaf and non-leaf pages. | 08-30-2012 |
20120221524 | STORAGE OF DATA WITH COMPOSITE HASHES IN BACKUP SYSTEMS - In one example, a method may include performance of a hash function on a digital sequence so as to generate a hash value that corresponds to the digital sequence. Next, the digital sequence may be broken into data pieces, and each data piece hashed to produce a corresponding hash value for each data piece. Then, a recipe may be produced that includes instructions which, when executed, may generate the digital sequence from the data pieces referenced by their corresponding hash values included in the recipe. Among other things, the hash values may enable reutilization of redundant data sequences by serving as pointers to the data pieces that the hash values respectively represent. | 08-30-2012 |
20120226663 | PRECONFIGURED MEDIA FILE UPLOADING AND SHARING - A client application may be utilized to enter a user's media storage settings, to store media files locally, and to upload the media files to a cloud-based platform. The cloud-based platform may facilitate storage of the uploaded media files in accordance with an appropriate one of the media storage settings, and further facilitate sharing at least a portion of the uploaded media files to a social media network in accordance with an appropriate one of the media storage settings. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 09-06-2012 |
20120239623 | AUTOMATIC BACKUP OF DESKTOP ITEMS - A method and system for automatic backup of desktop items is described. | 09-20-2012 |
20120254115 | CREATING SECONDARY COPIES OF DATA BASED ON SEARCHES FOR CONTENT - A method and system for creating secondary copies of data whose contents satisfy searches within data stores is described. In some cases, the system searches for data within a data store, identifies a set of data that satisfies the search, copies the identified set of data, and transfers the copy to secondary or other storage. In some cases, the system utilizes search-based secondary copies of days during restoration processes in order to restore data similar to and/or associated with data requested to be restored. | 10-04-2012 |
20120254116 | Distributed File System - A distributed file system for devices is described. In an embodiment, each data element stored on one of the devices has an associated location and availability attribute. The location attribute is stored co-located with the data element. The availability attribute and a copy of the location attribute are stored by a metadata service. When a client on a device needs to access a data element, it sends a request to the metadata service to find the location of the data element. If the data element is available, this information is provided to the client and this may involve waking a dormant device which holds the data element. Where the data element is not available, read only access may be granted to a cached copy of the data element. Where replication is used and one of the devices holding a replica is unavailable, the system may use write off-loading. | 10-04-2012 |
20120254117 | Reducing a Backup Time of a Backup of Data Files - A mechanism is provided for reducing the backup time of data files from a memory. Data files are pre-staged by identifying the data files in the memory to be backed up to a backup storage system, sorting the data files by size thereby forming a set of small data files and a set of large data files, and copying the set of small data files to a cache while leaving the set of large data files in a disk subsystem. The set of small data files are then backed-up from the cache and the set of large data files are backed-up from the disk subsystem to a backup storage system. Thus, the time required to backup the set of small data files from the cache is performed at a faster rate as compared to backing up the set of large data files from the disk subsystem. | 10-04-2012 |
20120303583 | SEAMLESS APPLICATION BACKUP AND RECOVERY USING METADATA - Technologies are generally described for systems and methods effective to provide a seamless backup and recovery of applications using metadata. In an example, metadata can be defined to map data associated with an application and provide the relationship of the data to the application. From the metadata, a backup system can create a capsule containing application data, and a payload containing application related data. The capsule can contain not just the application data, but also configuration information, and access parameters. The capsule and payload can be associated together and saved by the backup system. In another example, to recover an application, a capsule and a payload can be retrieved, and using the metadata, the capsule can be unpacked to reinstall the application to the same state it was in when backed up, and the application related data can be restored from the payload. | 11-29-2012 |
20120303584 | TECHNIQUES FOR AUTOMATICALLY PROVISIONING A DATABASE OVER A WIDE AREA NETWORK - Techniques for provisioning databases for users on a wide area network such as the Internet include a first party managing one or more database systems. Second parties subscribe to database services supported by the managed database systems. The first party provides, over a network, to database applications of the second parties, access to database services to which the second parties are subscribed. The database systems may use database appliances hosting both database process(es), and non-database process(es) tailored to the needs of the database process(es). A user is therefore able to obtain database resources from an Internet Database Service Provider (IDSP) without incurring the full costs of database administrator(s), dedicated database equipment facilit(ies), or even dedicated database device(s), depending on usage. Meanwhile, the IDSP incurs minimum staffing loads because of self-service tools. Costing model and automatic billing are also described. | 11-29-2012 |
20120323852 | DATABASE REDISTRIBUTION UTILIZING VIRTUAL PARTITIONS - In some embodiments, a partitioned database is stored in a plurality of logical or physical partitions on at least a logical or physical first data storage node, and a subset of a first partition among the plurality of logical partitions is configured as a virtual partition. An input indicating an allocation of a second physical data storage node to store the partitioned database is received. A second partition is configured on the second data storage node. In response to the input, the partitioned database is redistributed over the first and second data storage nodes by moving data within the virtual partition on the first partition to the second partition. | 12-20-2012 |
20130013564 | METHODS AND APPARATUS FOR TIME-BASED DYNAMICALLY ADJUSTED JOURNALING - A data center for data backup and replication, including a pool of multiple storage units for storing a journal of I/O write commands issued at respective times, wherein the journal spans a history window of a pre-specified time length, and a journal manager for dynamically allocating more storage units for storing the journal as the journal size increases, and for dynamically releasing storage units as the journal size decreases. | 01-10-2013 |
20130013565 | TECHNIQUES FOR ESTABLISHING A FILE SYSTEM THAT EXPOSES A VIRTUAL FILE SYSTEM FOR BACKUP OPERATIONS - Techniques for establishing a files system that exposes a virtual file system for backup operations are presented. Changes to files of a file system are maintained separately or collected and presented as a VFS. The VFS is then used to perform backup operations. Moreover, the files identified in the VFS can be customized based on search parameters, criterion, and/or criteria supplied by a user or supplied as parameters to backup and VFS mount operations. | 01-10-2013 |
20130024423 | ADAPTIVE RETENTION FOR BACKUP DATA - Aspects of the subject matter described herein relate to adaptive retention for backup data. In aspects, space may be needed on a backup storage in order to store additional backup data. In response, an indication that space is needed provided to a retention manager. The retention manager attempts to prune data on the backup storage to free up space on the backup storage. Before deleting a version on the backup storage, the retention manager determines whether deletion conditions are met. The retention manager may apply one or more retention policies in its efforts to free space. The retention manager may manage and free the space such that versions of files already stored are preserved for the longest possible time. | 01-24-2013 |
20130024424 | DATA OBJECT STORE AND SERVER FOR A CLOUD STORAGE ENVIRONMENT, INCLUDING DATA DEDUPLICATION AND DATA MANAGEMENT ACROSS MULTIPLE CLOUD STORAGE SITES - Data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, are performed within a cloud environment. The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP. Methods are disclosed for content indexing data stored within a cloud environment to facilitate later searching, including collaborative searching. Methods are also disclosed for performing containerized deduplication to reduce the strain on a system namespace, effectuate cost savings, etc. Methods are disclosed for identifying suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy. Further, systems and methods for providing a cloud gateway and a scalable data object store within a cloud environment are disclosed, along with other features. | 01-24-2013 |
20130031057 | Minimal Identity Recovery System and Method - Methods and systems for storing, providing, and obtaining recovery data. The recovery data is normally used on a mobile device which is no longer available to a user who would otherwise need to perform crucial functions like operating a vehicle, identification, or financial transactions on the mobile device. Recovery data is provided on a medium which enables the user to perform crucial functions at least for a limited duration. | 01-31-2013 |
20130036094 | METHOD FOR DETERMINING A SUPPORTED CONNECTIVITY BETWEEN APPLICATIONS - A computer-implemented system and method that analyzes metadata of the first application to identify a first data object and one or more first fields of the first data object, the first data object and the first fields being part of the metadata of the first application, identifies one or more second applications having a second data object with one or more second fields, and determines, for at least one of the second applications, a supported connectivity with the first application and whether the supported connectivity is a point-to-point connectivity or a connectivity through a central design time repository. | 02-07-2013 |
20130046733 | STORAGE APPARATUS AND DUPLICATE DATA DETECTION METHOD - An optimum chunk cutout method is selected according to the type of content. | 02-21-2013 |
20130046734 | CONSISTENT BACKUP OF ELECTRONIC INFORMATION - Systems and methods are provided for performing backup operations while a user is using a device. In one implementation, a method is provided. A backup operation of data including a plurality of related items is initiated. Modifications to one or more items of the plurality of related items are monitored for during the backup operation. The backup operation is completed. If a modification occurred to one or more items, a second backup operation is performed for the modified items. | 02-21-2013 |
20130054531 | DATABASE CLONING - A database management system (DBMS) maintains a clone database in a clone space without storing an entire copy of the database and without requiring a snapshot function from an underlying storage device. This DBMS may receive a database command to access a data block of the clone database, and may determine whether the data block is stored in the clone space. If the data block is not stored in the local clone space, the DBMS may receive the data block from a backup copy of the database. If the database command comprises a write operation, the DBMS may perform the write operation to update the data block, and may store the updated data block in the clone space. Also, if the database command comprises a read operation, the DBMS may perform the read operation on the data block received from the backup copy of the database. | 02-28-2013 |
20130060738 | DISTRIBUTED NETWORK CONTROL SYSTEM WITH A DISTRIBUTED HASH TABLE - A network control system that includes several controllers for managing several switching elements and a distributed hash table (DHT) formed across the controllers for storing data regarding the switching elements that is accessible by the controllers. Each hash table serves as a DHT instance. In some embodiments, the DHT instances of all controller instances collectively store one set of records that is indexed based on hashed indices for quick access. These records are distributed across the different controller instances to minimize the size of the records within each instance and to allow for the size of the DHT to be increased by adding other DHT instances. According to this scheme, each DHT record is not stored in each controller instance. In fact, in some embodiments, each DHT record is stored in at most one controller instance. | 03-07-2013 |
20130066835 | TECHNIQUES FOR EFFICIENT FILE OPERATIONS - Various technologies described herein pertain to performing a file operation on an inputted file on a computer system. File data retained at a first location in a data store and a first file name retained at a second location in the data store can be provided. The inputted file can include the file data. Moreover, the first file name is a hard link to the file data. Further, a file operation command related to the file data can be received during installation or removal of the inputted file. Accordingly, a second file name retained at a third location in the data store can be created in response to the file operation command. The second file name is created while the file data is immutably maintained at the first location in the data store. Further, the second file name is a hard link to the file data. | 03-14-2013 |
20130085995 | MANAGING BACK UP OPERATIONS FOR DATA - Backup operations for data resources can be managed as follows. At least one data resource residing on at least one data storage device is identified. An information processing system automatically determines that the at least one data resource fails to be associated with a backup policy. In response to the at least one data resource failing to be associated with a backup policy, at least one backup policy is associated with the at least one data resource. | 04-04-2013 |
20130097119 | Method for Analyzing Performance Data for a Database - Computer implemented software uses multi-dimension analysis to identify performance issues, locate the root cause(s) of performance problems, and may also serve other purposes such as workload management, capacity planning In especially preferred embodiments, there can be three, four or even more dimensions being analyzed. Useful dimensions are contemplated to include database call, execution path, process status, target, and application that generates database calls. In the specific world of Oracle databases, the database call is a SQL statement, the execute path is a SQL plan, the process status is an event, the target is a database object or a database file, and the application that generates database calls is a session, or user, or service, or module, or machine. Primary and secondary attributes of dimensions can be used to facilitate analysis. GUIs can advantageously present data in matrix format that facilitates dimension picking. | 04-18-2013 |
20130103645 | Method and Device for Inputting Data in Multimedia Service Database on Embedded Device - The present invention discloses a method and a device for inputting data in a multimedia service database on an embedded device. The method includes: when multimedia file scanning is performed, storing generated directory information of a multimedia file in a random access memory database (RAM-DB), and performing a RAM-DB to backup database (BAK-DB) data backup operation in a scanning process; and if an interruption occurs in the scanning process, and when the scanning continues after the scanning interruption ends, copying data in the BAK-DB to the RAM-DB, and continuing to scan, according to existing data in the RAM-DB, a multimedia file that is not scanned. In the present invention, two database files RAM-DB and BAK-DB are configured in a multimedia service system. | 04-25-2013 |
20130110782 | OPORTUNISTIC DATABASE DUPLEX OPERATIONS | 05-02-2013 |
20130124479 | Method And Apparatus For In The Middle Primary Backup Replication - The backup-in-the-middle primary-backup configuration is created by placing a backup-in-the-middle forwarder in the routing path between the primary and the environment. The backup-in-the-middle forwarder intercepts output messages along with required state information sent by the primary to the environment. The backup-in-the-middle forwarder backs up the primary by updating its state information and forwards the output packets to the environment. | 05-16-2013 |
20130144839 | METHOD AND APPARATUS FOR USE IN DATA TRANSFER - Apparatus for use in transferring data to or from a plurality of storage media, comprises means for identifying a most recently written to data storage media of said plurality of data storage media. | 06-06-2013 |
20130144840 | OPTIMIZING RESTORES OF DEDUPLICATED DATA - For restoring deduplicated data, a method maintains a chunk index on a client computing system coupled to a client data store. The chunk index tracks chunks within files remaining on the client data store after storage of the files to a deduplicated server data store coupled to a server computing system. The method determines whether a valid entry for a first chunk exists in the chunk index. In addition, the method retrieves the first chunk from the server data store responsive to determining the valid entry for the first chunk does not exist in the chunk index. The method further retrieves the first chunk from the client data store specified in the valid entry of the chunk index responsive to determining that the valid entry exists in the chunk index and the first chunk resides in a first file at a first offset. | 06-06-2013 |
20130159255 | STORAGE SYSTEM AND METHOD FOR CONTROLLING STORAGE SYSTEM - Provided is a storage system providing a data storage area to an external apparatus. The storage system includes at least a first information processing apparatus including a first logical storage area forming the data storage area and a first data processing part performing processing of reducing the storage capacity used by a backup target data in the first logical storage area, and a second information processing apparatus communicatively coupled to the first information processing apparatus and including a second logical storage area forming the data storage area, and a second data processing part performing processing of reducing the storage capacity used by the backup target data in the second logical storage area. The first information processing apparatus further includes an evaluation index allocation processing part determining which one of the first and second data processing parts to use to process the backup target data according to an evaluation index prescribed as a data format of the backup target data, and a backup processing part, when performing backup processing of the backup target data, refers to the association relationship between the data format of the backup target data and any of the first and second data processing parts determined by the evaluation index allocation processing part, and causes the first or second data processing part is associated with the data format of the backup target data, to process the backup target data. | 06-20-2013 |
20130166510 | Deduplication of Encrypted Data - A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently. | 06-27-2013 |
20130173553 | Distributed Scalable Deduplicated Data Backup System - A distributed, cloud-based storage system provides a reliable, deduplicated, scalable and high performance backup service to heterogeneous clients that connect to it via a communications network. The distributed cloud-based storage system guarantees consistent and reliable data storage while using structured storage that lacks ACID compliance. Consistency and reliability are guaranteed using a system that includes: 1) back references from shared objects to referring objects, 2) safe orders of operation for object deletion and creation, 3) and simultaneous access to shared resources through sub-resources. | 07-04-2013 |
20130173554 | COMPUTER PRODUCT, BACKUP CONTROL METHOD, AND BACKUP CONTROL DEVICE - A computer-readable recording medium stores a program that causes a computer to execute a backup control process that includes transmitting to a controlled device, a backup command to back up target data stored in the controlled device having a backup unit that backs up data while associating the data with identification information of duplicated data that is a copy of the data, and a transmission request to transmit duplicated data of the target data; and storing the duplicated data to a storage unit while associating the duplicated data with the identification information concerning the duplicated data upon receiving the duplicated data and the identification information concerning the duplicated data as a result of transmitting the backup command and the transmission request. | 07-04-2013 |
20130179402 | Defining and Detecting Bundle Information in Databases - An approach is provided to registering a database at a database manager in a manner that defines software bundles. Registering the database involves receiving database metadata that corresponds to the database which is stored in a metadata data store that is maintained by the database manager. A software product associated with the registered database is processed by receiving software product metadata corresponding to the software product and this software product metadata is also stored in the metadata data store maintained by the database manager. | 07-11-2013 |
20130185259 | SYSTEM AND METHOD FOR SCALABLE REFERENCE MANAGEMENT IN A DEDUPLICATION BASED STORAGE SYSTEM - A system and method for managing a resource reclamation reference list at a coarse level. A storage device is configured to store a plurality of storage objects in a plurality of storage containers, each of said storage containers being configured to store a plurality of said storage objects. A storage container reference list is maintained, wherein for each of the storage containers the storage container reference list identifies which files of a plurality of files reference a storage object within a given storage container. In response to detecting deletion of a given file that references an object within a particular storage container of the storage containers, a server is configured to update the storage container reference list by removing from the storage container reference list an identification of the given file. A reference list associating segment objects with files that reference those segment objects may not be updated response to the deletion. | 07-18-2013 |
20130191341 | METHODS AND APPARATUS FOR RESTORING A USER-SELECTED SUBSET OF APPLICATION DATA - In some embodiments, an apparatus includes a backup module configured to receive, from a compute device, a copy of user data associated with a user and generated at the compute device. The backup module is configured to store the copy of user data in a storage device. The backup module is configured to provide a user interface for the user to access the copy of user data. The backup module is configured to receive, from a user device associated with the user, an indication of a subset of the copy of user data. The backup module is configured to, in response to the indication, retrieve the subset of the copy of user data from the storage device and send the subset of the copy of user data to the compute device such that the subset of the copy of user data is restored at the compute device. | 07-25-2013 |
20130226873 | STORAGE SYSTEM AND METHOD FOR CONTROLLING STORAGE SYSTEM - Provided is a storage system which provides a data storage area to an external apparatus. The storage system includes at least a first information apparatus including a first logical storage area constituting the data storage area, and a first data processing part for performing a processing for reducing a storage capacity of the first logical storage area used by backup target data, and a second information apparatus including a second logical storage area constituting the data storage area, and a second data processing part for performing a processing for reducing a storage capacity of the second logical storage area used by backup target data. The second information apparatus is communicatively coupled with the first information apparatus. | 08-29-2013 |
20130226874 | ITEM LEVEL RECOVERY - A backup and restore system may present recovered backup data as local resources and in a read and write manner so that the recovered backup data may be accessed using an application that created the data. In some embodiments, the recovered data may be read only data, but a differencing virtual hard disk (VHD), Common Internet File System protocol, or differencing driver may be used to present a read/write version of the data. Additionally, the data may be presented using iSCSI or other technologies to present the data as local data, even though the data may be remotely located. The backup and restore system may additionally use VHD differencing technologies to create multiple backups. | 08-29-2013 |
20130232116 | CALCULATING DEDUPLICATION DIGESTS FOR A SYNTHETIC BACKUP BY A DEDUPLICATION STORAGE SYSTEM - Input backup data is deduplicated with data of a synthetic backup previously constructed by a deduplication storage. A synthetic backup is constructed by processing metadata instructions provided by a backup application. Deduplication digests are calculated based on the data of the synthetic backup and the deduplication digests are stored in a digests index. When new backup data is processed, deduplication digests of the new data are calculated and searched in the digests index. Matching digests of previously constructed synthetic backups are located in the digests index. Each of the located matching digest references stored data are included in the synthetic backup, and the stored data is similar to the input backup data. Data matches are found in the input data and data in the synthetic backup. | 09-05-2013 |
20130238560 | REAL TIME BACKUP SYSTEM FOR COMPUTER USERS - This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user's actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant the remote server generates and downloads the same files that are downloaded on the local user computer devices. For example, if a person begins to download a program, the server may also download the same program on a remote backup server. This way, if the user loses this program, it can be retrieved automatically through a provided server on the Internet. If user's files are backed up by regular backup periodically, relevant data that were stored by real time backup servers can be eliminated. | 09-12-2013 |
20130262388 | DATABASE BACKUP TO HIGHEST-USED PAGE - Database backup performance may be improved by copying only used portions of a database file. When the database file includes allocated but un-used pages, the unused pages are not replicated during a database backup. By replicating only the allocated and used pages in the database, the backup time may be decreased and the amount of storage required in the second file may be decreased. | 10-03-2013 |
20130275377 | MAINTAINING MULTIPLE COPY VERSIONS OF COMPONENT VALUES IN A SYSTEM - Provided are a computer program product, system, and method for maintaining multiple copy versions of component values in a system. A database includes entries for components in a system, wherein there is one entry for each of a plurality of component values associated with a component, wherein each entry indicates a range of copy versions for which the component value applies. A copy operation is performed at a current time to create a current copy version. A determination is made as to whether the component values for the components at the current time have changed since a previous copy version. The previous copy version is maintained in the database and immediately precedes the current copy version. For each component value that has changed, the entry for the component having the open indicator as the end copy version is updated to indicate the previous copy version as the end copy version. | 10-17-2013 |
20130275378 | METHOD AND SYSTEM FOR PERFORMING LIVE MIGRATION OF PERSISTENT DATA OF A VIRTUAL MACHINE - A disclosed method includes distinguishing static and dynamic persistent data, copying the static persistent data at the source data store to the destination data store on a basis of frequencies of updates, copying the dynamic persistent data to the destination data store, updating a bitmap data structure during the copying of the dynamic persistent data to indicate which blocks of the dynamic persistent data have been modified during the copying step, identifying the blocks that have been modified during the copying step using the bitmap data structure, and iteratively copying the identified blocks to the destination data store. The method may further include determining when the number of the identified blocks is below a predetermined threshold and suspending the virtual machine prior to the next copying step. | 10-17-2013 |
20130282660 | Method and Apparatus for Automatically Backing Up Data - The present invention discloses a method and an apparatus for automatically backing up data, relates to the field of communications technologies, and is used to solve a problem that a mobile phone is damaged due to falling down of the mobile phone, and consequently data of a user is lost. The method provided in the present invention includes: detecting whether a terminal is falling down; and if it is detected that the terminal is falling down, triggering a data backup operation and backing up data that needs to be backed up in the terminal. The present invention is applicable to the field of communications technologies, and is used to back up data of a user. | 10-24-2013 |
20130290261 | File System Based Exchange Between Disk-Based Network Attached Storage and Tape - Example apparatus and methods concern a file system based interface between a disk-based network attached storage device and a linear tape open (LTO) linear tape file system tape. One example method may include controlling a device (e.g., backup server) to read a file from the NAS device using a shared file system (e.g., NFS, CIFS) and controlling the device to write the file to the LTO tape device using the LTFS. Since the NAS device and the LTO device may have different information or metadata requirements, and since the shared file system and the LTFS may have different information or metadata requirements, the method may include controlling the device to remove from the file information specific to the NAS and the shared file system. Additionally, the method may include controlling the device to add to the file information specific to the LTFS or the LTO device. | 10-31-2013 |
20130311429 | METHOD FOR CONTROLLING BACKUP AND RESTORATION, AND STORAGE SYSTEM USING THE SAME - According to the prior art virtual file backup method, backup is performed without saving a file configuration information, so that the backup file cannot be restored as a virtual file during restoration, and the usage capacity of the disk is increased. According to the present invention, an actual data managed by a virtual file, an actual data managed by one or more element files and a configuration information of the virtual file are respectively stored during backup, wherein during restoration, the virtual file is restored based on the configuration information of the virtual file. | 11-21-2013 |
20130311430 | COMPUTER, DATA STORAGE METHOD, AND INFORMATION PROCESSING SYSTEM - A computer includes a memory that stores a program and received data; and a processor that executes an operation by executing the program stored in the memory, the operation including storing the received data into a first database having a first data structure in which reading is performed in a random access manner and writing is performed in a sequential access manner, when the received data is received from a second apparatus is as same as data stored in a first apparatus which has a failure, and copying the received data stored in the first database to a second database having a second data structure in which reading is performed in a sequential access manner and writing is performed in a random access manner. | 11-21-2013 |
20130325808 | PRESERVING PAST STATES OF FILE SYSTEM NODES - A selective tuple versioning is used on a files system for preserving past states of file system nodes by adding a bitmap to a row for a node within a file system table for preserving the past state of the node in a file system. | 12-05-2013 |
20130325809 | METHOD FOR CONTENTS BACKUP AND AN ELECTRONIC DEVICE THEREOF - A method of operating an electronic device includes selecting contents to be backed up on the basis of a usage pattern of the contents, generating backup data of the contents, and transmitting the backup data to a backup server. A priority is assigned for determining whether to a backup of the contents should occur on the basis of the usage pattern of the contents. A backup target is selected according to at least one of the per-contents usage frequency and the priority. | 12-05-2013 |
20130339298 | COLLABORATIVE BACKUP IN A NETWORKED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side signature repository that includes information representative of a set of data blocks stored in primary storage. During copy or backup operations, the system can use the client-side signature repository to identify data blocks located in primary storage that are new or that have changed. The system can also use the client-side signature repository to identify multiple locations within primary storage where different instances of the data blocks are located. Accordingly, during a copy or backup operation of one client computing device, the system can source a data block that is to be copied to secondary storage from another client computing device that includes a second instance of the data block. | 12-19-2013 |
20130339299 | BACKUP USING A CLIENT-SIDE SIGNATURE REPOSITORY IN A NETWORKED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side signature repository that includes information representative of a set of data blocks stored in primary storage. During copy or backup operations, the system can use the client-side signature repository to identify data blocks located in primary storage that are new or that have changed. The system can also use the client-side signature repository to identify multiple locations within primary storage where different instances of the data blocks are located. | 12-19-2013 |
20130339300 | DEDICATED CLIENT-SIDE SIGNATURE GENERATOR IN A NETWORKED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side signature repository that includes information representative of a set of data blocks stored in primary storage. During storage operations of a client, the system can generate signatures corresponding to data blocks that are being stored in primary storage. The system can store the generated signatures in the client-side signature repository along with information regarding the location of the corresponding data block within primary storage. As additional instances of the data block are stored in primary storage, the system can store the location of the additional instances in the client-side signature repository. | 12-19-2013 |
20140019414 | RESTORE SOFTWARE WITH AGGREGATED VIEW OF SITE COLLECTIONS - A system and method for restoring site collections stored in different content databases of a web application are disclosed. A restoration GUI may be displayed. Displaying the restoration GUI may include determining a plurality of databases used for the web application. For each respective database of the plurality of databases, one or more site collections stored in the database may be determined. Displaying the graphical user interface may further comprise displaying an aggregated view of the site collections stored in each database of the plurality of databases. The aggregated view may enable each site collection to be selected for restoration. | 01-16-2014 |
20140025636 | SYSTEMS AND METHODS FOR PROVIDING METADATA ENHANCED FILENAMES - Described are computer-based methods and apparatuses, including computer program products, for metadata enhanced filenames. A filename is received, the filename including a first set of characters that represents a name for the electronic file, and a second set of additional characters. The filename is parsed to identify the second set of additional characters. Metadata associated with the electronic file is determined based on the second set of additional characters without downloading additional data of the electronic file. The electronic file is processed based on the determined metadata. | 01-23-2014 |
20140040206 | PIPELINED DATA REPLICATION FOR DISASTER RECOVERY - Pipelined data replication for disaster recovery is disclosed. An example pipelined data replication method for disaster recovery disclosed herein comprises sending replicated first data from a primary processing environment to a secondary processing environment for backup by the secondary processing environment, the replicated first data being a replica of first data in the primary processing environment, processing the first data in the primary processing environment prior to the backup of the replicated first data by the secondary processing environment being confirmed, and preventing a result of the processing of the first data from being released by the primary processing environment until the backup of the replicated first data by the secondary processing environment is confirmed. | 02-06-2014 |
20140040207 | Method for a cloning process to enable cloning a larger System drive to a smaller system - System and method for automatically discarding sets of pre specified files or divert sets of pre specified files from the files that would normally be sent to a storage device during a backup or cloning operation as the backup device becomes full. The embodiments are used to allow a backup of a storage device onto a smaller capacity storage device with as many files as possible. The embodiments uses one or more lists of files to discard which are used to filter files as the target drive become full. | 02-06-2014 |
20140046901 | DATA REPLICATION AMONG STORAGE SYSTEMS (As Amended) - A first storage system stores information relating to the updating of data stored in that system as a journal. More specifically, the journal is composed of a copy of data that was used for updating and update information such as a write command used during updating. Furthermore, the second storage system acquires the journal via a communication line between the first storage system and the second storage system. The second storage system holds a duplicate of the data held by the first storage system and updates the data corresponding to the data of the first storage system in the data update order of the first storage system by using the journal. | 02-13-2014 |
20140046902 | Method for a cloning process to enable cloning a larger System drive to a smaller system - System and method for automatically discarding sets of pre specified files or divert sets of pre specified files from the files that would normally be sent to a storage device during a backup or cloning operation as the backup device becomes full. The embodiments are used to allow a backup of a storage device onto a smaller capacity storage device with as many files as possible. The embodiments uses one or more lists of files to discard which are used to filter files as the target drive become full. | 02-13-2014 |
20140074789 | MULTI-TIER RECOVERY - A method, article of manufacture, and apparatus for restoring data. In some embodiments, this includes backing up data in a first form with a backup application, updating the backup application, and using the updated backup application to restore the backed up data in a second form. In some embodiments, the first form includes a backup image. In some embodiments, the second form is individual files. | 03-13-2014 |
20140095439 | OPTIMIZING DATA BLOCK SIZE FOR DEDUPLICATION - Provided herein is technology relating to data deduplication and particularly, but not exclusively, to methods and systems for determining an efficiently optimal size of data blocks to use for backing up a data source. Also provided herein are systems for identifying duplicate data in data backup applications. | 04-03-2014 |
20140122432 | SYSTEM AND METHOD FOR PROVIDING AUTHENTICATED BACKUP FOR MOVIES, MUSIC AND BOOKS - A process for securing a backup digital copy of DVDs, music and books a person owns. The process may require the owner cut out the UPC and/or bar code, mail the UPC in and then receive a username and pass-code to download a backup digital copy of their DVD, music and/or book or the owner my receive a backup on portable digital media. Furthermore, proof of ownership may be authenticated not only cutting out the UPC/bar code but also taking a high resolution picture of the actual disk or media with verification markings made by the owner so that the reviewer can see if the ownership is authentic. A picture of the original receipt may also be used to verify ownership. The process may provide ease of getting the back-up copies of the media and it may prevent the customer from paying twice for the same media. | 05-01-2014 |
20140122433 | STORAGE DEVICE AND DATA BACKUP METHOD - According to one embodiment, a storage device is applied to a distributed database. The storage device includes a communication module and a backup module. The a backup module is configured to make backup of partitioning information and data stored for the distributed database in the storage device, when the communication module receives a command to make a backup of the distributed data base. The partitioning information indicates locations of partitions created by separating a storage area of the distributed database. | 05-01-2014 |
20140181031 | SYSTEMS AND METHODS TO CONFIRM REPLICATION DATA ACCURACY FOR DATA BACKUP IN DATA STORAGE SYSTEMS - A data storage system, according to certain aspects, automatically determines the accuracy of replication data when performing data backup operations. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. The system automatically determines the accuracy of replication data during data backup. | 06-26-2014 |
20140181032 | SYSTEMS AND METHODS TO PERFORM DATA BACKUP IN DATA STORAGE SYSTEMS - A data storage system, according to certain aspects, automatically backs up source data when the replication data is faulty. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. When permitted by the user system configuration, the system automatically backs up source data when replication has failed. | 06-26-2014 |
20140214766 | STORAGE SYSTEM AND CONTROL DEVICE - A storage system includes a backup source storage, a backup destination storage, and a control device. The backup destination storage includes a first processor. The control device includes a second processor. The second processor is configured to acquire change history information on a history of changing data stored in the backup source storage. The second processor is configured to transfer the acquired change history information and differential data corresponding to the change history information to the backup destination storage. The first processor is configured to create, on basis of the change history information, a change list that indicates locations at which the data stored in the backup source storage is changed. | 07-31-2014 |
20140244587 | SYSTEMS AND METHODS FOR PERFORMING STORAGE OPERATIONS IN A COMPUTER NETWORK - Methods and systems are described for performing storage operations on electronic data in a network. In response to the initiation of a storage operation and according to a first set of selection logic, a media management component is selected to manage the storage operation. In response to the initiation of a storage operation and according to a second set of selection logic, a network storage device to associate with the storage operation. The selected media management component and the selected network storage device perform the storage operation on the electronic data. | 08-28-2014 |
20140250077 | DEDUPLICATION VAULT STORAGE SEEDING - Deduplication vault storage seeding. In one example embodiment, a method of seeding a deduplication vault storage includes seeding a vault storage with common blocks and storing, in the vault storage, each unique block from a source storage at a point in time that is not already duplicated in the vault storage. | 09-04-2014 |
20140279911 | Data storage and retrieval mediation system and methods for using same - Through use of a mediator, one can translate and efficiently store data. The meditator may link one or more hosts to one or more storage devices. Optionally, the meditator may convert data and decode data. Through the use of meditator, one can realize certain economies because fewer units within recording media will be used. Additionally, in some embodiments, the mediator will also allow increased protection against unauthorized access and additionally or alternatively allow for efficient backing-up of data. | 09-18-2014 |
20140279912 | CLIENT OBJECT REPLICATION BETWEEN A FIRST BACKUP SERVER AND A SECOND BACKUP SERVER - Provided are a computer program product, system, and method for client object replication between a first backup server and a second backup server. Objects are backed-up from a client to a first backup server. The first backup server generates metadata on the objects from the client and transmits the metadata to a second backup server, wherein the objects backed-up at the first backup server are not copied to the second backup server. A determination is made that the first backup server is unavailable after transmitting the metadata. The metadata at the second backup server is used to determine modifications to the objects at the client since the metadata was last generated in response to determining that the first backup server is unavailable. The client backs-up the determined modifications to the objects to the second backup server to backup. | 09-18-2014 |
20140279913 | FILE SYSTEM REPLICATION - A data backup system for data and metadata is stored in a file storage system. Data in the file system is stored in a remote low priority data storage system, such as a remote tape storage system, power-managed array of secondary storage disks (MAID), or other lower cost secondary data storage system. Metadata for the file system is stored in a remote higher priority system, such as a remote disk storage system. As such, the data and metadata for a file storage system maintained at a primary location is backed-up in different types of storage systems at a remote location. By storing the data and metadata in different types of storage, the data can be backed up at less cost. In case of a disaster at the primary storage location, a user accessing data from a local server may be switched to access the data and the metadata from the remote server. | 09-18-2014 |
20140279914 | Data Migration in a Database Management System - An approach is provided to copy records between tables in a relational database. In the approach, a Structured Query Language (SQL) table COPY statement is received with the COPY statement identifying a source table and a target table. Table column names are retrieved from a metadata that corresponds to the source table. The retrieved table column names are used to generate an SQL statement that includes an INSERT INTO clause pertaining to the target table and a SELECT clause pertaining to the source table, wherein the INSERT INTO clause includes a set of target column names and wherein the SELECT clause includes a set of corresponding source column names | 09-18-2014 |
20140297593 | TEMPLATE-BASED REMOTE/LOCAL FILE SELECTION TECHNIQUES FOR MODULAR BACKUP AND MIGRATION - File selection techniques that can handle overlapping module contexts provide flexible and reversible backup, restore, migration, deployment and synchronization operations. Both remote (administrative) control and local (user) control of the file selection are provided. Application and configuration specific templates are provided to a user from the remote administrator for further customization by selecting or de-selecting configurations, applications and/or individual files or configuration entries. The templates may be controlled geographically by the IP address or identity associated with the user. A user's interaction with the customization is saved and the order of changes is maintained, so that when the templates are updated, the user's customizations can be re-applied. The administrator may override user settings based on rules, which may also be geographically determined. The file selection may also be altered based on media type and location, e.g., local backup vs. server backup. | 10-02-2014 |
20140317058 | WIRELESS STORAGE DEVICE AND SYSTEM HAVING CAPABILITY OF AUTONOMOUS BACKUP - Disclosure is to a wireless storage device capable of performing an autonomous backup. The device adopts a wireless communication technology to render a variety of access services for a wireless terminal device. For example, the storage device provides an external backup service to the connected terminal device. The device performs data packets routing for the terminal device to a network. The storage device is able to process video signals from the terminal device and broadcast video onto a display. In one embodiment, in addition to the built-in storage medium, various interfaces are disposed onto the wireless storage device to connect with many types of external storage devices. When the wireless terminal device issues a backup instruction, the wireless storage device performs backup between the medium. In particular, the backup procedure is autonomously operated in the device without occupying bandwidth between the devices as transferring the data. | 10-23-2014 |
20140324780 | DATABASE COPY TO MASS STORAGE - Databases may be copied to a shadow database on amass storage device. The structure of the files containing the database, such as blocking information and a dump history, may be copied in whole to the mass storage device. The method may include creating a shadow database on a mass storage device, populating the shadow database with data from a production database, idling an application accessing the production database to create an idle point in the production database, and updating the shadow database to the production database. | 10-30-2014 |
20140324781 | INPUT/OUTPUT (I/O) PROCEDURE FOR DATABASE BACKUP TO MASS STORAGE - Databases may be backed up on a mass storage device. Storing the database backup on mass storage, rather than tape drive, allows operations, such as from a database manager, with large input/output to improve performance. A method of backing up a database to a mass storage device may include receiving, at a database manager, a call from a backup utility to copy data from a source file to a destination file, performing, at the database manager, a plurality of input/output requests, in response to the call, to copy data from the source file to the destination file, and returning, to the backup utility, status information regarding completion of the call Placing the database backup on mass storage can further enable use of that backup as a shadow or alternate database. | 10-30-2014 |
20140330785 | HIGHLY AVAILABLE SEARCH INDEX WITH STORAGE NODE ADDITION AND REMOVAL - A redundant array of independent nodes are networked together. Each node executes an instance of an application that provides object-based storage. The nodes are grouped into systems each having multiple nodes. A search index is provided in each system for locating objects within the system. A method of managing the search index comprises splitting the search index into shards to be divided among a plurality of regions ( | 11-06-2014 |
20140351218 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR BACKING UP DATA - System, method and program product for backing up a plurality of data files from a first server to a second server via a network. A determination is made that more than one compressed data file at the second server, downloaded by the first server, is waiting to be decompressed. A determination is made whether an amount of available processor resource in the second server exceeds a predetermined threshold. If the amount of available processor resource in the second server exceeds the predetermined threshold, a plurality of data decompression programs are invoked in the second server to decompress the plurality of compressed data files substantially concurrently, and data updates in the decompressed data files are applied to corresponding files in the second server. | 11-27-2014 |
20140379659 | N TO M HOST SYSTEM COPY - A system includes obtaining of a backup of the source database system comprising N hosts and a first plurality of servers, where N is an integer greater than one, access of a target database system comprising M hosts, where M is an integer less than N, configuration of the target database system to include the first plurality of servers, and performance of a database recovery of the target database system using the backup of the source database system. | 12-25-2014 |
20150012495 | DATA OBJECT STORE AND SERVER FOR A CLOUD STORAGE ENVIRONMENT, INCLUDING DATA DEDUPLICATION AND DATA MANAGEMENT ACROSS MULTIPLE CLOUD STORAGE SITES - Data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, are performed within a cloud environment. The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP. Methods are disclosed for content indexing data stored within a cloud environment to facilitate later searching, including collaborative searching. Methods are also disclosed for performing containerized deduplication to reduce the strain on a system namespace, effectuate cost savings, etc. Methods are disclosed for identifying suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy. Further, systems and methods for providing a cloud gateway and a scalable data object store within a cloud environment are disclosed, along with other features. | 01-08-2015 |
20150058294 | ADDING COOPERATIVE FILE COLORING IN A SIMILARITY BASED DEDUPLICATION SYSTEM - For adding cooperative file coloring in a similarity based deduplication system using a processor device in a computing environment. Input streams of backup application are parsed and the data segments are marked with file coloring that represents a source file of the backup application for comparing the data segments to determine if the data segments are identical during a similarity check operation. | 02-26-2015 |
20150074056 | EXTENSIBLE CUSTOMIZATION MIGRATION VIA PLUGGABLE INTERFACE - A pluggable migration framework can interface with a plurality of repositories that store metadata related to one or more applications. A user can customize the applications to suit the user's business requirements. The user can develop and test the customized applications in a source environment, and the customized features can be stored as metadata in one or more of the plurality of repositories. When the customized application is ready to be used by others, it can be migrated to a target environment. The pluggable migration framework can include an orchestrator that enables the user to export metadata from the plurality of repositories in the source environment, and import the metadata to a plurality of repositories in the target environment, without requiring the user to re-implement the custom features. | 03-12-2015 |
20150081638 | Video Storage System - A video storage system includes a CVR manager including a software program of management run therein, at least two IP cameras connected to the CVR manager via the Internet; and at least two CVR units connected to the CVR manager via the Internet. The CVR manager assigns each of the CVR units to store a file of video data produced by a corresponding one of the IP cameras. Thus, the CVR manager distributes the video data produced by the cameras to the CVR units. Hence, the video storage system is inexpensive and highly expansible. | 03-19-2015 |
20150142744 | SYSTEMS AND METHODS FOR MEDIA FILE MANAGEMENT - Systems, apparatus, methods, articles of manufacture, and interfaces for electronic media file (e.g., e-book) management are provided. Data descriptive of electronic media files (e.g., e-books, video, and/or audio files) may be searched, scanned, looked-up, and/or otherwise acquired. Such data may be utilized to determine an authenticity and/or availability of a particular media file. Digital Rights Management (DRM) and/or other related files and/or information may be analyzed, for example, to determine a likelihood or probability that a particular media file is (i) available and/or accessible and/or (ii) authentic. The likelihood of a media file being available and/or authentic may be utilized to select and/or provide content to a user such as one or more advertisements, rewards and/or promotions (e.g., from a third-party). | 05-21-2015 |
20150149412 | TECHNIQUES FOR COMPUTER SYSTEM RECOVERY - Techniques for computer system recovery which remotely restore a default partition to a recent state even when an operating system is functioning abnormally. In an example embodiment, a service center computer establishes a first network connection to a monitored computer system. The service center computer configures the monitored computer system to boot from a bootable image file in the monitored computer system and reboots the monitored computer system into an alternate operating system environment of the bootable image file. The service center computer establishes a second network connection to the monitored computer system to restore a recent backup image of the default partition from a diagnostic partition to a default partition. The service center computer establishes a third network connection to the monitored computer system and reboots the monitored computer system to the default partition. | 05-28-2015 |
20150301897 | METHOD AND SYSTEM FOR MANAGING SECURE ELEMENT - A method and system for safely backing up secure information of an SE in a terminal to a secure server, and then safely restoring the backed-up secure information to the SE of the terminal or another terminal is provided. The method for managing the SE includes: identifying secure information; generating backup data; transmitting the backup data to a secure server; and restoring the backup data to the SE or another SE. The identifying the secure information includes, in response to a backup command on the secure information of the SE, identifying the secure information stored in the SE. The generating the backup data includes generating backup data using at least part of the identified secure information. The transmitting the backup data to the secure server include setting a secure channel between the secure server and the SE, and transmitting the backup data from the SE to the secure server through the secure channel and storing the backup data. The restoring the backup data to the SE or another SE includes, in response to a restoration command on the secure information, restoring the backup data. | 10-22-2015 |
20150331758 | METHODS AND SYSTEMS OF CLOUD-BASED DISASTER RECOVERY - In one embodiment, a computer-implemented method includes the step of communicatively coupling with an application-server local area network (LAN). The physical servers are discovered in the application-server LAN. The applications running in one or more physical servers in the application-server LAN are discovered. The application data and the application metadata are captured. The application data and the application metadata are parsed. The unique data blocks of the application data and the application metadata are identified. The unique data blocks are uploaded to a cloud-computing platform. It is determined that the one or more physical servers running the application data and the application metadata is no longer available in the application-server LAN. A cloud-based appliance in the cloud-computing platform is placed in an operational state. An application associated with the application data and the application metadata is identified. | 11-19-2015 |
20150331759 | APPARATUS, SYSTEM AND METHOD FOR TEMPORARY COPY POLICY - A method according to one embodiment includes copying data incoming to and/or generated at a production site to a copy cluster at a remote copy site, thereby creating a redundant copy of the data at the copy cluster. When the copy cluster becomes unavailable, data incoming to and/or generated at the production site is copied to a backup reserve site after the copy cluster becomes unavailable. Additional systems, methods, and computer programs products are also presented. | 11-19-2015 |
20150378828 | TEST DATA MANAGEMENT - A method for managing test data includes receiving a request indicative of a testing application from a requesting user and identifying a plurality of test data in a source database matching the request. Further, the method includes determining a reserved status of the plurality of test data, and, when the reserved status indicates that the plurality of test data is not reserved by the user other than the requesting user, reserving the plurality of test data for the requesting user. Still further, the method includes transferring a copy of the plurality of test data to a test database, wherein a testing application executes based on the copy of the plurality of test data stored in the test database. | 12-31-2015 |
20160042046 | DISTRIBUTED DATA STORE - Systems and methods are disclosed for backing up a computer with a distributed meta data store by splitting meta data from file data; storing the meta data for each file in a separate file; mapping the file data and meta data to an arbitrary file system; and reconstructing files for the arbitrary file system. | 02-11-2016 |
20160055152 | METHOD FOR UPDATE PROCESSING, AND APPARATUS - A method includes: upon receipt of a request of update processing for a first record including a numerical data item in a database, generating, by a processor, a second record by duplicating the first record while a value corresponding to an update content of the update processing is set to the numerical data item, the update processing being processing of updating the value of the numerical data item according to the update content; and executing the update processing for the second record in response to the request. | 02-25-2016 |
20160062671 | RESTORING DATA - Restoring a data processing system. Files on one or more storage devices of a data processing system are backed up to magnetic tape recording media. Metadata associated with the backed up files is recorded, including magnetic tape identification and tape location for each backed up file. Files on the one or more storage devices are identified that meet a selection policy for files required for rapid restoration of the data processing system. An index list is generated of the identified files and their associated magnetic tape metadata. The index list is sorted by magnetic tape identification and magnetic tape location. In response to a request to restore the data processing system, the identified files on the sorted index list are restored in magnetic tape identification and magnetic tape location sort order. Operation of the restored data processing system is then begun in accordance with the restored files. | 03-03-2016 |
20160062841 | DATABASE AND DATA ACCESSING METHOD THEREOF - A database and a data accessing method thereof are provided. The database includes a memory, a CPU, a data storage element and a data cache element. The memory is configured to store a kernel program. The CPU is coupled to the memory and configured to execute the kernel program. The data storage element and the data cache element are coupled to the CPU. When receiving a data read command or a data write command from an application, the kernel program determines whether the data storage element is set for accelerated data accessing. If yes, the kernel program guides the data read command to read a copy file from the data cache element or writes a file of the data write command into the data storage element and the data cache element. The copy file is corresponding to a target file in the data storage element. | 03-03-2016 |
20160062847 | INSTALLING APPLICATIONS VIA RESTORATION OF A FALSE BACKUP - Method of and system for bulk installing on a first digital electronic device, from a second digital electronic device in communication with first digital electronic device, a plurality of applications not already installed on first digital electronic device, comprising: receiving by second digital electronic device instruction to bulk install plurality of applications on first digital electronic device; creating by second digital electronic device a false backup archive containing plurality of applications, false backup archive having sufficient attributes of a true backup archive creatable by a backup operation in respect of first digital electronic device to be compatible with a restoration operation corresponding to backup operation, restoration operation executable to transfer contents of false backup archive to a non-transitory computer-readable storage medium of first digital electronic device; and causing by second digital electronic device execution of restoration operation, resulting in bulk installation of plurality of applications on first digital electronic device. | 03-03-2016 |
20160139998 | System, Method and Computer Program Product for Contact Information Backup and Recovery - A method for contact information backup and recovery comprising receiving, by a contact information backup and recovery system, subscriber information, storing the subscriber information in a contacts data store, receiving, by the contact information backup and recovery system, contacts information associated with the subscriber information, storing the contacts information in the contacts data store, wherein the contacts information is stored in relation to the subscriber information, receiving, by the contact information backup and recovery system, a contacts recovery request, and performing, by the contact information backup and recovery system, a contacts recovery operation, comprising acquiring target contact information from the stored contacts information in the contacts data store, performing a telephonic communication using the target contact information, and sending the stored contacts information to a remote storage device. | 05-19-2016 |
20160162362 | COMPUTER SYSTEM BACKUP PERFORMANCE OPTIMIZATION THROUGH PERFORMANCE ANALYTICS - Embodiments in accordance with the present invention disclose a method, computer program product, and system for optimizing performance of a computer backup solution that includes at least two data movers. The automated method includes measuring data mover performance during operation of a backup cycle, and optimizing the performance of data movers by increasing or decreasing the number of threads operating concurrently in the data movers. The method further includes computation of performance rankings of the data movers and shifting workload among the data movers in accordance with their respective performance rankings, such that the computer backup solution converges toward an optimized configuration. | 06-09-2016 |
20160188416 | DEDICATED CLIENT-SIDE SIGNATURE GENERATOR IN A NETWORKED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side signature repository that includes information representative of a set of data blocks stored in primary storage. During storage operations of a client, the system can generate signatures corresponding to data blocks that are being stored in primary storage. The system can store the generated signatures in the client-side signature repository along with information regarding the location of the corresponding data block within primary storage. As additional instances of the data block are stored in primary storage, the system can store the location of the additional instances in the client-side signature repository. | 06-30-2016 |
20160188420 | METHODS AND APPARATUS FOR MULTI-PHASE RESTORE - Methods and apparatus to identify at least a first portion and a second portion of resources to restore to a device are described. The first portion of the resources may be restored atomically to the device before the second portion of the resources. The device may not respond to at least one user input during the restoration of the first portion of the resources. If the restoring of the first portion is successful, the second portion of the resources may be restored. The device may respond to the user input during the restoring of the second portion of the resources. | 06-30-2016 |
20190146881 | DATA STORAGE AND RETRIEVAL MEDIATION SYSTEM AND METHODS FOR USING SAME | 05-16-2019 |