Class / Patent application number | Description | Number of patent applications / Date published |
707645000 | Full backup | 56 |
20100057794 | SYSTEM FOR AUTOMATICALLY SHADOWING DATA AND FILE DIRECTORY STRUCTURES THAT ARE RECORDED ON A COMPUTER MEMORY - The Data Shadowing System comprises a memory module that is connected to the monitored computer system via an existing input/output port to store the shadowed data. The memory module includes a memory device for data storage as well as software, including a control software component that is automatically installed on the monitored computer system when the memory module is first connected to the monitored computer system, as well as associated module software for maintaining a record of the data stored on the memory device. The Data Shadowing System automatically stores the data on the memory module in a single format, while representing it in a data management database in two formats: disk sectors and files. The Data Shadowing System thereby efficiently tracks and stores the state of multiple file systems over time, while allowing for correct disk-level and file-level restoration to a point-in-time without storing redundant data. | 03-04-2010 |
20100198792 | DATA PROCESSING APPARATUS AND METHOD OF PROCESSING DATA - Data processing apparatus comprising: a chunk store having a plurality of chunk sections, each operable to store specimen data chunks, the apparatus being operable to: process an input data set into one or more input data chunks; identify a specimen data chunk in one of said chunk sections which corresponds to a first input data chunk; identify a second input data chunk not corresponding to a specimen data chunk in the chunk store; and store the second input data chunk as a specimen data chunk in proximity to the identified specimen data chunk corresponding to the first input data chunk. | 08-05-2010 |
20100274763 | METHOD AND SYSTEM FOR SYNTHETIC BACKUP AND RESTORE - A method and system for backing up and restoring data. First, a full backup is performed to create a full dataset. Thereafter, incremental or differential datasets may be created by incremental or differential backups, respectively. When a new full dataset is needed, instead of performing a full backup, a previous full dataset may be combined with subsequent incremental or differential datasets to create the new full dataset. The new full dataset may be created on a computer other than the computer which hosts the data of the previous full dataset. The new full dataset may be used for offsite storage or to quickly restore data in the event of a failure or corruption of a computer's file system. | 10-28-2010 |
20100287141 | SYSTEM AND METHOD FOR PERFORMING INTEGRATED STORAGE OPERATIONS - The present invention relates to a method for performing integrated storage operations on an information store. The present invention comprises identifying a plurality disparate types of storage operations stored in a policy option table. A first storage operation is performed according to a first set of storage criteria stored in the policy option table and a second operation, disparate from the first storage operation, is performed according to a second set of storage criteria stored in the policy option table. | 11-11-2010 |
20100299312 | Write interceptor for tracking changes to a disk image - Changes are tracked by tracking a change request which when performed by a disk driver changes a portion of disk storage. The change request is allowed to pass to the disk driver to be performed by the disk driver. Information associated with the change request is stored in an operating system's persistent storage. A differential backup is performed using the information associated with the change request stored in the operating system's persistent storage after a system, which includes the disk driver and the disk storage, has shut down and restarted. | 11-25-2010 |
20110106767 | STORAGE PERFORMANCE OPTIMIZATION - A system and method for enhancing data throughput in data warehousing environments by connecting multiple servers having local storages with designated external storage systems, such as, for example, those provided by SANs. The system and method may preserve a full reference copy of the data in a protected environment (e.g., on the external storage system) that is fully available. The system and method may enhance overall I/O potential performance and reliability for efficient and reliable system resource utilization. | 05-05-2011 |
20110125714 | Synthetic Full Backup Generation - System and method for generating a synthetic full backup. A request to perform an incremental backup may be received at a target computer. The incremental backup may be performed on the target computer in response to the request. The target computer may maintain information identifying files that are encountered in the incremental backup. The information may be configured to be used to construct a synthetic full backup. A request to perform a synthetic full backup may be received. The information may be requested. The synthetic full backup may be constructed using the information from the target computer. A synthetic full backup index may be constructed for the synthetic full backup using records from old indexes for each file in the synthetic full backup. The synthetic full backup may be transferred to a backup image. The synthetic full backup index may be stored. | 05-26-2011 |
20110153567 | RESTORE OF FULL SYSTEM BACKUP AND INCREMENTAL BACKUPS USING MULTIPLE SIMULTANEOUS DEVICE STREAMS - A technique for restoring file systems by applying full and incremental backups together while streaming them from multiple devices provides a faster system restore from a full backup where incremental backups must also be applied. A first storage device streams the full backup while at least one second storage device streams at least one incremental backup. As files are detected in the incremental backup, they are written instead of the corresponding file in the full backup. Incremental backups can be pre-merged to reduce their number to one less than a number of storage devices available to stream the backups, so that the full backup can be streamed along with the pre-merged incremental backup(s) to restore the file system. | 06-23-2011 |
20110196840 | SYSTEM AND METHOD FOR INCREMENTAL BACKUP STORAGE - A system and method for incremental backup storage. The systems and methods include one or more incremental backup servers comprising a current version store configured to store data corresponding to a most recent backup and a historical version store corresponding to a prior backup to said most recent backup. One or more incremental backup clients are configured to communicate with one or more incremental backup servers . The one or more incremental backup clients each comprise a localized data set. The incremental backup server is configured to back up the localized data set of the one or more incremental backup clients. | 08-11-2011 |
20110218966 | SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR BACKUP AND RESTORATION OF COMPUTER INFORMATION - A computer creates a full backup of a target volume by copying sectors of the target volume. Incremental backups are created by copying modified sectors that have changed since a preceding backup. Public accesses to a restore volume are prevented by modifying a volume boot record (VBR) of the restore volume to prevent file systems from recognizing the restore volume or by filtering public accesses while allowing private block accesses to the restore volume. Sector data are copied from the backup files to the restore volume while the public accesses are being prevented. The restore can begin, using previously created backup files, while the backup is still in process creating new incremental backups for the target volume. The restore volume is finalized after restoring the full or any number of incremental backups by restoring the VBR to indicate the restore volume is valid or stopping the filtering of public accesses. | 09-08-2011 |
20110302140 | FAILOVER SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS - In certain embodiments, a tiered storage system is disclosed that provides for failover protection during data backup operations. The system can provide for an index, or catalog, for identifying and enabling restoration of backup data located on a storage device. The system further maintains a set of transaction logs generated by media agent modules that identify metadata with respect to individual data chunks of a backup file on the storage device. A copy of the catalog and transaction logs can be stored at a location accessible by each of the media agent modules. In this manner, in case of a failure of one media agent module during backup, the transaction logs and existing catalog can be used by a second media agent module to resume the backup operation without requiring a restart of the backup process. | 12-08-2011 |
20120030178 | INTERFACES FOR HIGH AVAILABILITY SYSTEMS AND LOG SHIPPING - Architecture for replicating a database through log shipping. A replication service replicates data using one or more new internal application program interfaces (APIs), a replay configuration API which abstracts configuration information for each destination (or target) instance. APIs for log file management as part of the replication process are provided for opening communications for log shipping, tracking success of log shipping and closing out log shipping communications. Log shipping APIs are also provided for log truncation control. A ship control object is provided as a base class which includes an API for other components of the replication service to operate on log files when the log files are placed into a log directory. The ship control API is utilized by the replication service and for interaction with storage system log files. | 02-02-2012 |
20120036106 | Data Replication Techniques Using Incremental Checkpoints - Incremental checkpoint, for use in data replication, track the changes made to a file system after a point in time at which the incremental checkpoint is created. Data replication techniques using the incremental checkpoints may include taking a regular checkpoint of the file system and creating the first time full copy on remote node using the regular checkpoint. Changes made to the file system are then tracked in an incremental checkpoint that are stored on the remote node. The processes of taking the incremental checkpoint and storing the incremental checkpoint are iteratively performed. The first time fully copy and the incremental checkpoints may then be used for data replication, backup, continuous data protection (CDP), or the like. | 02-09-2012 |
20120089572 | AUTOMATED AND SELF-ADJUSTING DATA PROTECTION DRIVEN BY BUSINESS AND DATA ACTIVITY EVENTS - Techniques for adjusting the frequency of data backups and initiating event-driven backups in a storage system are disclosed herein. In one embodiment, a self-adjusting backup frequency, known as a “Change Rate Objective,” is defined to conduct or delay backups for one or more volumes in the storage system on the basis of an associated policy value. The Change Rate Objective may be tied to one or more business or data activity events, such as the amount and type of data changes since a last backup. The storage system may also be tailored to conduct or delay full or incremental backups on the basis of a Change Rate Objective that measures whether a full or incremental or differential backup is more appropriate. Various data or system failures, or data or business events may also be used to adjust the retention periods of continuous data protection (CDP) data and delay a rollup of CDP data. | 04-12-2012 |
20120197843 | RESTORE OF FULL SYSTEM BACKUP AND INCREMENTAL BACKUPS USING MULTIPLE SIMULTANEOUS DEVICE STREAMS - A technique for restoring file systems by applying full and incremental backups together while streaming them from multiple devices provides a faster system restore from a full backup where incremental backups must also be applied. A first storage device streams the full backup while at least one second storage device streams at least one incremental backup. As files are detected in the incremental backup, they are written instead of the corresponding file in the full backup. Incremental backups can be pre-merged to reduce their number to one less than a number of storage devices available to stream the backups, so that the full backup can be streamed along with the pre-merged incremental backup(s) to restore the file system. | 08-02-2012 |
20120209811 | Verification of Computer Backup Data - A backup method for a computer system network avoids generating hashes from data that may be inaccurate due to network errors affords verification of source data written to backup media includes reading at a network client a portion of the source data from a source storage volume and generating a hash of the source data at the client. The source data and hash are transmitted to a backup server and written to the backup media. The hash is written to the backup media is associated with the backup data corresponding to the source data from which the hash was generated. Verification of the backup data is performed by reading the backup data from the backup media, generating a hash from the backup data read, and comparing that hash with the hash originally stored on the backup media. This enables the backup data to be verified as corresponding to the original source data without the necessity of rereading the source data from the source volume, and enables faster, more accurate off-line verification subsequent to the backup process. | 08-16-2012 |
20120233124 | One view integrated project management system - Projects of any type require sophisticated management software programs. In reality, these management software programs are provided by various vendors and for different professional fields. For example, scheduling programs for construction professionals, blue print programs for drafting professionals, accounting programs for cost-control professionals. In addition, there are numerous other unofficial and official documents generated by managers of different levels for reporting or track-record-keeping purposes using popular word processing programs and spread-sheet programs. Documents generated by different software programs can only be viewed under the programs they are generated under or compatible programs. This poses a problem in that there is a lack of organized control resulting in difficulty in locating and viewing documents in a timely manner. The present invention provides an one view software program that would be able to provide an organized control and viewing of all documents regardless which software programs they are generated under. | 09-13-2012 |
20120233125 | MANAGING DATA WITH BACKUP SERVER INDEXING - Indexing functionality can be shifted to one or more backup servers in a backup system. In one implementation, a backup server can receive one or more data backups from one or more production servers. The backup server can then build or create one or more indexes at the backup server, which correspond to the contents of the one or more data backups. In one implementation, one or more management agents can also identify any appropriate components that might be needed to read the backup data at the backup server pursuant to building the one or more indexes. In either case, the one or more indexes can be used for a wide range of purposes, such as to manage data usage quotas at the one or more production servers, as well as to retrieve data from the backup server based on specific file requests. | 09-13-2012 |
20120239624 | BACKUP AND RESTORATION OF COMPUTER INFORMATION - Backup and restoration of computer information. In one example embodiment, a method includes modifying a volume boot record of a restore volume to a first state in which at least a portion of the restore volume becomes inaccessible to a standard file system, writing restore data to the inaccessible portion of the restore volume while the volume boot record is in the first state, and restoring the volume boot record to a second state in which the inaccessible portion of the restore volume becomes accessible to the standard file system. | 09-20-2012 |
20120254118 | RECOVERY OF TENANT DATA ACROSS TENANT MOVES - A history of locations of tenant data is maintained. The tenant data comprises data that is currently being used by the tenant and the corresponding backup data. When a tenant's data is changed from one location to another, a location and a time is stored within the history that may be accessed to determine a location of the tenant's data at a specified time. Different operations trigger a storing of a location/time within the history. Generally, an operation that changes a location of the tenant's data triggers the storing of the location within the history (e.g. upgrade of farm, move of tenant, adding a tenant, load balancing of the data, and the like). When tenant data is needed for an operation (e.g. restore), the history may be accessed to determine the location of the data. | 10-04-2012 |
20120259814 | SYSTEM AND METHOD FOR MONITORING COMPUTER SYSTEM RESOURCE PERFORMANCE - According to the present invention, policies are prepared for a plurality of resources residing in a computer system comprising a storage system for copying data from a copy source volume to a copy target volume, and an evaluation is carried out for an evaluation-target resource of the plurality of resources for determining whether or not to execute a predefined action based on the policy of this evaluation-target resource. A policy corresponding to a resource related to copying of the plurality of resources is determined based on a time period related to the copying. | 10-11-2012 |
20120265732 | SYSTEM AND METHOD FOR EXTENDED MEDIA RETENTION - The present invention provides systems and methods for extending media retention. Methods are provided in which a set of aging preferences are obtained. Data elements of a data set stored on storage media are evaluated against the aging preferences to determine whether each of the data elements satisfy the aging preferences. Each of the data elements that is determined to satisfy the aging preferences is aged. Aging can include freeing a portion of storage media, previously used to store a data element, for other storage usage. | 10-18-2012 |
20130080390 | BLOCK LEVEL BACKUP AND RESTORE - For block level backup, a full image level backup is created of a file system from production storage at a production server to random access storage at a backup server. A mounted image is created from the full image that exposes a block level representation of the file system of the production server for read operations in a file level format. File enumeration is performed on the mounted image for files. Block level read operations are monitored while the files are being enumerated. During monitoring, blocks that are read for the read operations are marked as meta-data blocks. Blocks that are not marked as meta-data blocks are identified as data blocks. The data blocks are migrated to sequential storage, while leaving the meta-data blocks on the random access storage, wherein the data blocks form a backup image. | 03-28-2013 |
20130080391 | BLOCK LEVEL BACKUP AND RESTORE - For block level backup, a full image level backup is created of a file system from production storage at a production server to random access storage at a backup server. A mounted image is created from the full image that exposes a block level representation of the file system of the production server for read operations in a file level format. File enumeration is performed on the mounted image for files. Block level read operations are monitored while the files are being enumerated. During monitoring, blocks that are read for the read operations are marked as meta-data blocks. Blocks that are not marked as meta-data blocks are identified as data blocks. The data blocks are migrated to sequential storage, while leaving the meta-data blocks on the random access storage, wherein the data blocks form a backup image. | 03-28-2013 |
20130226875 | METHOD FOR EXTRACTING AND STORING RECORDS OF DATA BACKUP ACTIVITY FROM A PLURALITY OF BACKUP DEVICES - A method and system for requesting, cross-referencing, extracting and storing historical records of data backup activity by using a software component that interfaces to a plurality of data backup software devices is disclosed. Through the use of a system and method in accordance with the present invention, the aforementioned database can be made self-refreshing, requiring minimal ongoing intervention subsequent to initial configuration. In addition, the aforementioned data refreshes can be manually invoked at any time. | 08-29-2013 |
20130275380 | SYSTEM AND METHOD FOR EXTENDED MEDIA RETENTION - The present invention provides systems and methods for extending media retention. Methods are provided in which a set of aging preferences are obtained. Data elements of a data set stored on storage media are evaluated against the aging preferences to determine whether each of the data elements satisfy the aging preferences. Each of the data elements that is determined to satisfy the aging preferences is aged. Aging can include freeing a portion of storage media, previously used to store a data element, for other storage usage. | 10-17-2013 |
20130304702 | CONTROLLING ENTERPRISE DATA ON MOBILE DEVICE VIA THE USE OF A TAG INDEX - A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer. | 11-14-2013 |
20130318046 | BACKUP IMAGE DUPLICATION - Various systems and methods for seeding a storage device. For example, a method involves accessing a policy that identifies a number of clients. The method then involves selecting a most recent backup image for each of the clients and copying the most recent backup images from a source storage device to a target storage device. Once a most recent backup image has been copied from the source storage device to the target storage device for each of the clients, the method switches a destination value in the policy from the source storage device to the target storage device. | 11-28-2013 |
20130325810 | CREATION AND EXPIRATION OF BACKUP OBJECTS IN BLOCK-LEVEL INCREMENTAL-FOREVER BACKUP SYSTEMS - Embodiments of the present invention provide a scalable, efficient way to backup data in a block-level incremental-forever backup system such that backup and expiration of data can be achieved at the granularity of a single backup version, without having to read or move data that is stored in backup storage. | 12-05-2013 |
20140059009 | AUTOMATED MIGRATION TO A NEW COPY SERVICES TARGET STORAGE SYSTEM TO MANAGE MULTIPLE RELATIONSHIPS SIMULTANEOUSLY WHILE MAINTAINING DISASTER RECOVERY CONSISTENCY - In one embodiment, a method for switching a storage subsystem in a disaster recovery configuration includes receiving instruction to change from an original target storage subsystem in a disaster recovery configuration including: a source storage subsystem including one or more source volumes from which data is copied in first copy services relationships, the one or more source volumes being accessible to an application, and the original target storage subsystem including one or more original target volumes to which data is copied in the first copy services relationships; selecting a new target storage subsystem to replace the original target storage subsystem, creating second copy services relationships between one or more new target volumes on the new target storage subsystem and the one or more source volumes on the source storage subsystem using multi-target functionality, and terminating the first copy services relationships after all the second copy services relationships are full duplex. | 02-27-2014 |
20140108352 | Retrieving Point-In-Time Copies of a Source Database For Creating Virtual Databases - A storage system maintains copies of a source database to allow virtual databases to be provisioned. Transaction logs received from the source database are applied to database blocks stored in the storage system to update the database blocks. The storage system checks if there are defect in the transaction logs of the source database. If a defect in transaction logs is detected, the storage system obtains a latest copy of the source database. The storage system matches database blocks of the received copy with database blocks already available in the storage system to determine whether a corresponding database block is already available in the storage system. If a received database block is different from database blocks already available at the storage system, the received database block is stored in the storage system. The database blocks may be matched using a hash value of the database blocks. | 04-17-2014 |
20140122434 | SIMPLIFIED COPY OFFLOAD - Methods and apparatuses for performing simplified copy offload operations are provided. In one exemplary embodiment, a method includes creating a persistent point-in-time image of a data set of a source storage device in response to receiving a token request for a copy offload operation from a host. Creating the persistent point-in-time image includes generating pointers to data blocks of the data set, but does not include duplicating the data blocks. The method also includes transmitting a token that is a representation of the persistent point-in-time image to the host in response to the request. | 05-01-2014 |
20140122435 | INTELLIGENT RESTORE-CONTAINER SERVICE OFFERING FOR BACKUP VALIDATION TESTING AND BUSINESS RESILIENCY - An existing data protection environment is analyzed to determine a plurality existing infrastructure containers. A popular infrastructure container is identified from the plurality of existing infrastructure containers. Responsive to determining that the popular infrastructure container does not exist within a central repository, the restore container is created within the central repository to match the popular infrastructure container. | 05-01-2014 |
20140188804 | APPLICATION OF INFORMATION MANAGEMENT POLICIES BASED ON OPERATION WITH A GEOGRAPHIC ENTITY - Techniques for providing data retention services based on a geographic region are disclosed. In one aspect, a location of a computing device is determined. A geographic entity corresponding to the location of the computing device is then determined. A data retention policy is applied to production data of the computing device based on regulations of the geographic entity. Other aspects are also disclosed. | 07-03-2014 |
20140214767 | Delta partitions for backup and restore - Systems and methods of using delta partitions for backup and restore are disclosed. An example method may include after a full backup, separating change information from static information. The method may also include concentrating the change information in a delta partition prior to a differential backup. The method may also include incrementally backing up only the delta partition during the differential backup. | 07-31-2014 |
20140214768 | REDUCING BACKUP BANDWIDTH BY REMEMBERING DOWNLOADS - Systems and methods of reducing backup bandwidth by remembering downloads to a computing device. An example method may include remembering information for a download to a computing device. The method may also include backing up the computing device to a different system. The information remembered for the download is used to provide a backup of the computing device without copying some of the downloaded data present on the computing device from the computing device. | 07-31-2014 |
20140214769 | BACKUP STORAGE SYSTEM, BACKUP STORAGE APPARATUS, AND METHOD FOR BACKING UP DATA - According to one embodiment, a data storage device generates a full backup image or an incremental backup image as a backup image depending on whether the backup is of a first generation. The generated backup image is transferred to a backup storage device. A full backup generation unit of the backup storage device executes a merge process of merging an incremental backup image with a full backup image in order of generation. A reverse incremental backup acquisition unit of the backup storage device acquires, in order of generation, a reverse incremental backup image used to restore the full backup image not subjected the merge process from the full backup image subjected to the merge process. | 07-31-2014 |
20140258237 | HANDLING RESTORES IN AN INCREMENTAL BACKUP STORAGE SYSTEM - Techniques and mechanisms are provided for storing data in a backup storage system. According to various embodiments, a first blockmap in a backup storage system may be identified. The first blockmap may correspond with a first restore point. The first blockmap may identify a first plurality of data segments. Each of the first plurality of data segments may have associated therewith a respective storage location in the backup storage system. The first blockmap may be compared with a designated storage system state to identify a subset of the first plurality of data segments that each correspond with a respective matching data segment in the designated storage system state. A second blockmap may be stored in the backup storage system. The second blockmap may correspond with a second restore point. The second blockmap may include the identified subset of the first plurality of data segments. | 09-11-2014 |
20140310245 | PARTITION LEVEL BACKUP AND RESTORE OF A MASSIVELY PARALLEL PROCESSING DATABASE - Techniques to perform an incremental backup of a large-scale distributed database, such as a massively parallel processing (MPP) database, are disclosed. In various embodiments, a set of table partitions each of which satisfies one or more criteria to be included in a current incremental backup is determined at backup time, at least in part by comparing a current table partition meta-information with corresponding meta-information from a prior backup. The table partitions in the set are included in the incremental backup, while other table partitions not in the set are not backed up. In some embodiments, certain tables are designated to be of a type such that existing records are not modified. Tables are partitioned in a manner that isolates changes, e.g., added rows, in a relative few table partitions, leaving others unchanged and therefore able to be omitted from subsequent incremental backups. | 10-16-2014 |
20150127612 | METHOD AND APPARATUS OF MANAGING APPLICATION WORKLOADS ON BACKUP AND RECOVERY SYSTEM - Featured are a method and apparatus for managing various point-in-time copies of workloads or applications using a software system called workload manager. An aspect of the invention is to receive backup images of point-in-time backup images of workload from a backup client and realize corresponding virtual resource from backup image on the cloud platform that is part of the workload manager appliance. Workload manager maintains catalog of point-in-time copies of workloads. Each item in the catalog refers resource entries on the cloud platform. When user wishes to instantiate a point-in-time copy, workload manager instantiates all the resources identified in the catalog entry. User can also restore a particular point-in-time workload to production system or migrate a particular point-in-time workload to remote application. | 05-07-2015 |
20150293817 | Secure Relational File System With Version Control, Deduplication, And Error Correction - A computer implemented method and a secure relational file system (SRFS) for storing and managing data for backup and restore are provided. The SRFS receives data, generates first metadata including file-to-sector mapping information, splits the data into fixed sized data chunks (FSDCs), generates second metadata including logical boundaries used for splitting, creates fixed sized data blocks by prepending the second metadata to the FSDCs, splits each FSDC into variable sized data chunks (VSDCs), generates third metadata including unique identifiers (UIDs) for the VSDCs, creates variable sized data blocks (VSDBs) by prepending the third metadata and the second metadata to each VSDC, identifies unique variable sized data chunks (UVSDCs) of the VSDBs using the UIDs, stores the UVSDCs in chunk files, and stores the first metadata, the second metadata extracted from the VSDBs, and storage locations of the UVSDCs with the third metadata of the UVSDCs and duplicate VSDCs in databases. | 10-15-2015 |
20150339197 | SYSTEMS AND METHODS FOR MIGRATING COMPONENTS IN A HIERARCHICAL STORAGE NETWORK - System and methods for selectively or automatically migrating resources between storage operation cells are provided. In accordance with one aspect of the invention, a management component within the storage operation system may monitor system operation and migrate components from storage operation cell to another to facilitate failover recovery, promote load balancing within the system and improve overall system performance as further described herein. Another aspect of the invention may involve performing certain predictive analyses on system operation to reveal trends and tendencies within the system. Such information may be used as the basis for potentially migrating components from one storage operation cell to another to improve system performance and reduce or eliminate resource exhaustion or congestion conditions. | 11-26-2015 |
20150339367 | Shared Application Store for a Platform-as-a-Service (PaaS) System - A processing device of a container registry receives an indication of a selection of a container provided by the container registry, the container to deploy on a computer system in a hosted environment, the hosted environment comprising software and hardware facilities to execute the plurality of containers in a cloud computing environment, wherein the container is stored in a first repository. The processing device issues a command to create a second repository comprising a copy of the first repository. In response to the command, the processing device creates the second repository and sends the second repository to deploy in the hosted environment, wherein the command causes subsequent changes to the container to be made to the second repository during the deployment in the hosted environment. | 11-26-2015 |
20150347235 | DATA BACKUP METHOD AND DEVICE - The present invention relates to a reliable method and device for backup of data from a first network to a second network. The method and device of the present invention can for example be used for a backup of voluminous data from the first to the second network via a link with a relatively small bandwidth. | 12-03-2015 |
20150363273 | CONTROL DEVICE AND METHOD FOR CONTROLLING STORAGE DEVICES - A control device includes a processor configured to copy a part of data stored in a first volume to a second volume, copy whole data stored in the first volume to a destination volume, and receive a request to read first data stored in the second volume. The processor is configured to read the first data from the second volume when the first data has been partially copied to the second volume. The processor is configured to read, when the first data has not been partially copied to the second volume, the first data from the first volume on basis of association information associating the first volume with the second volume. The processor is configured to identify, upon failing to read the first data from the first volume, the equivalent volume on basis of recovery information related to the destination volume as an equivalent volume of the first volume. | 12-17-2015 |
20150370641 | STORAGE INTEGRATED SNAPSHOT CLONING FOR DATABASE - Techniques are described herein for cloning a database. According to some embodiments, a database server receives a request to clone a source database. In response to receiving the request, the database server retrieves a set of one or more storage credentials for a set of one or more respective storage systems on which a set of files of the source database are stored. The set of storage credentials grant permission to the database server to create snapshot copies on the set of storage systems. The database server generates, for a target database using the set of storage credentials, a snapshot copy of each respective file in the set of files of the source database. The snapshot copy of the respective file points to the same set of one or more data blocks as the respective file until at least one of the data blocks is modified. | 12-24-2015 |
20160004601 | LIGHTWEIGHT DATA RECONSTRUCTION BASED ON BACKUP DATA - A information management system allows a user to search through a secondary copy of data, such as a back up, archive, or snapshot without first retrieving the secondary copy of data. Instead, the system constructs lightweight data that can be displayed to a user as a representation of the search results. Lightweight data may include metadata or other information that identifies data included in the secondary copy of data. The lightweight data may be perceived as being the secondary copy of data and allow a user to browse through search results. Once the user identifies a search result that is of interest, information in the lightweight data can be used to retrieve the secondary copy of data. Because lightweight data may have a smaller file size than the file size of the secondary copy of data, the latency of performing a search may be reduced. | 01-07-2016 |
20160026536 | RECOVERY PATH SELECTION DURING DATABASE RESTORE - A recovery path of a number of different potential recovery paths associated with a database backup can be automatically determined. Log backups for a database can be created. The log backups that are created after a full backup of the database are associated with the full backup and form a recovery path. Upon detecting restoration of a database, a new full backup can be automatically performed. Log backups subsequent to the creation of the new full backup are associated with the new full backup forming an alternative recovery path. For a restore operation, a user can select a desired full backup. Upon selection of the desired full backup, the recovery path appropriate to the selected full backup is determined by identifying the sequence of log backups associated with the selected full backup. The database restoration operation can then be performed using the selected full backup and the appropriate log backups. | 01-28-2016 |
20160062844 | COMPUTER SYSTEM FOR BACKING UP DATA - It is provided a computer system, comprising a server and first and second storage systems. The first storage system stores deduplicated data sharing at least a part of data with other data, shared data shared by a plurality of pieces of the deduplicated data, and first type data representing a type of the stored data including the deduplicated data and the shared data. The deduplicated data is associated with the shared data by a pointer to the shared data, and includes differential data indicating a difference from the shared data. The server creates second type data representing a type of the data stored in the second storage system from the first type data. The second storage system stores the shared data associated with the deduplicate data at a reading position before a position at which the deduplicated data is read in sequential reading and stores the second type data. | 03-03-2016 |
20160063007 | BACKUP AND RESTORATION FOR STORAGE SYSTEM - A backup method is provided for a file system for managing hierarchical storage including one or more storage media on a computer system including one or more computers. Each of the one or more storage media includes a data part which is separated from an index and on which updated information is appended and kept. Each of a plurality of pieces of data within the file system is managed to be migrated to at least any of the one or more storage media. The backup method includes backing up metadata of the plurality of pieces of data migrated within the file system; and backing up the index of each of the one or more storage media to which the plurality of pieces of data have been migrated, substantially at the same time point as the metadata. | 03-03-2016 |
20160077923 | INTEGRATED DATABASE AND LOG BACKUP - Systems and methods of performing backup of databases and associated logs with one schedule such that a backup of both a database and its associated log can be restored or recovered to a desired point in time. A backup request associated with a backup type is received and defined by a service level agreement. The service level agreement includes a combined schedule for backing up both data stored in the database and log data associated with a database. | 03-17-2016 |
20160077927 | METHODS AND APPARATUS FOR MANAGING A LARGE-SCALE ENVIRONMENT OF COPY DATA MANAGEMENT APPLIANCES - Techniques disclosed herein provide for global management of a set of data management services being executed by at least one of one or more physical data management appliances and one or more virtual data management appliances. First instructions are transmitted to a first copy data management appliance that cause the first copy data management appliance to send first data associated with protecting a first application entity to the management server. Second instructions are transmitted to a second copy data management appliance that cause the second copy data management appliance to send second data associated with protecting a second application entity to the management server. A plurality of data management policies associated with the first copy data management appliance and the second copy data management appliance are scheduled using a third service level template, which includes a merged set of schedules for the first and second copy data management appliances. | 03-17-2016 |
20160162364 | SECONDARY STORAGE PRUNING - Systems and methods for storage pruning can enable users to delete, edit, or copy backed up data that matches a pattern. Storage pruning can enable fine-grain deletion or copying of these files from backups stored in secondary storage devices. Systems and methods can also enable editing of metadata associated with backups so that when the backups are restored or browsed, the logical edits to the metadata can then be performed physically on the data to create a custom restore or a custom view. A user may perform operations such as renaming, deleting, modifying flags, and modifying retention policies on backed up items. Although the underlying data in the backup may not change, the view of the backup data when the user browses the backup data can appear to include the user's changes. A restore of the data can cause those changes to be performed on the backup data. | 06-09-2016 |
20160162366 | A METHOD FOR A LOGGING PROCESS IN A DATA STORAGE SYSTEM - A logging process in a data storage system having a set of storage tiers, each storage tier of the set of storage tiers having different performance characteristics, wherein the set of storage tiers is divided into a plurality of subsets of storage tiers using the performance characteristics, may include initiating the logging process for creating a separate log file for each of the plurality of subsets of storage tiers for maintaining a history of data changes in the subset of storage tiers, thereby creating a plurality of log files. In response to a change in data stored in at least one storage tier of a subset of storage tiers of the plurality of subsets of storage tiers, one or more log records including information about the change may be generated and written into respective log files. | 06-09-2016 |
20160203054 | DISK GROUP BASED BACKUP | 07-14-2016 |
20160253244 | Systems And Methods For Out-Of Band Backup And Restore Of Hardware Profile Information | 09-01-2016 |