US11463264B2 - Use of data block signatures for monitoring in an information management system - Google Patents
Use of data block signatures for monitoring in an information management system Download PDFInfo
- Publication number
- US11463264B2 US11463264B2 US16/407,040 US201916407040A US11463264B2 US 11463264 B2 US11463264 B2 US 11463264B2 US 201916407040 A US201916407040 A US 201916407040A US 11463264 B2 US11463264 B2 US 11463264B2
- Authority
- US
- United States
- Prior art keywords
- data
- file
- signatures
- storage
- files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/561—Adding application-functional data or data for application control, e.g. adding metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Definitions
- Businesses recognize the commercial value of their data and seek reliable, cost-effective ways to protect the information stored on their computer networks while minimizing impact on productivity.
- a company might back up critical computing systems such as databases, file servers, web servers, virtual machines, and so on as part of a daily, weekly, or monthly maintenance schedule.
- the company may similarly protect computing systems used by its employees, such as those used by an accounting department, marketing department, engineering department, and so forth.
- companies also continue to seek innovative techniques for managing data growth, for example by migrating data to lower-cost storage over time, reducing redundant data, pruning lower priority data, etc.
- Enterprises also increasingly view their stored data as a valuable asset and look for solutions that leverage their data. For instance, data analysis capabilities, information management, improved data presentation and access features, and the like, are in increasing demand.
- Data block signatures provide an efficient way to reference larger blocks of data. Signatures can be used in data deduplication to identify and remove redundant data blocks and, e.g., replace them with references/pointers to a single stored instance of the data block.
- Embodiments described herein utilize data block signatures of deduplicated files (or other data objects) to efficiently learn information about the files.
- certain embodiments utilize file metadata and/or historical information stored in the information management system in combination with data block signatures.
- signatures and/or metadata can be used to identify potential security breaches in the information management system and to perform forensics upon identifying a potential security breach. Such forensics can be useful to provide information about how a potential security breach took place, to obtain a higher level of confidence that a potential security breach is an actual security breach, or the like.
- Such forensic techniques utilizing data block signatures, file metadata, and/or historical information stored by the system can be used to track the movement of data blocks both temporally and by location. Tracking movement of data blocks provides several benefits. For example, data tracking may be required for compliance with regulations or industry standards. In addition, data tracking may help businesses and industries reduce losses due to electronic theft and cyberattacks. Other embodiments may limit copying of certain data, such as medical records or other confidential information, when particular signatures are associated with a file.
- FIG. 1A is a block diagram illustrating an exemplary information management system.
- FIG. 1B is a detailed view of a primary storage device, a secondary storage device, and some examples of primary data and secondary copy data.
- FIG. 1C is a block diagram of an exemplary information management system including a storage manager, one or more data agents, and one or more media agents.
- FIG. 1D is a block diagram illustrating a scalable information management system.
- FIG. 1E illustrates certain secondary copy operations according to an exemplary storage policy.
- FIGS. 1F-1H are block diagrams illustrating suitable data structures that may be employed by the information management system.
- FIG. 2A illustrates a system and technique for synchronizing primary data to a destination such as a failover site using secondary copy data.
- FIG. 2B illustrates an information management system architecture incorporating use of a network file system (NFS) protocol for communicating between the primary and secondary storage subsystems.
- NFS network file system
- FIG. 2C is a block diagram of an example of a highly scalable managed data pool architecture.
- FIG. 3A logically illustrates three exemplary files. Each file is partitioned into one or more data blocks with corresponding signatures.
- FIG. 3B illustrates one example of a way of organizing the deduplicated files in an information management system.
- FIG. 4A depicts a method of using signatures to identify a relationship between files.
- FIG. 4B depicts a method of using signatures, metadata, and/or historical information to identify a relationship between files, such as to identify potential security breaches, and to perform additional forensics or other analysis.
- FIGS. 5A-5B show examples of systems configured to use data block signatures to monitor activities in an information management system.
- FIG. 6A depicts two files according to an exemplary scenario in which deduplication information and other stored information can be used to perform threat detection and forensics in an information management system.
- FIG. 6B illustrates a set of exemplary data objects for which signature information can be used to determine relationships between the data objects.
- FIG. 6C illustrates a set of exemplary data objects for which signature information and/or metadata can be used to determine relationships between the data objects.
- FIG. 1A shows one such information management system 100 (or “system 100 ”), which generally includes combinations of hardware and software configured to protect and manage data and metadata that are generated and used by computing devices in system 100 .
- System 100 may be referred to in some embodiments as a “storage management system” or a “data storage management system.”
- System 100 performs information management operations, some of which may be referred to as “storage operations” or “data storage operations,” to protect and manage the data residing in and/or managed by system 100 .
- the organization that employs system 100 may be a corporation or other business entity, non-profit organization, educational institution, household, governmental agency, or the like.
- systems and associated components described herein may be compatible with and/or provide some or all of the functionality of the systems and corresponding components described in one or more of the following U.S. patents/publications and patent applications assigned to Commvault Systems, Inc., each of which is hereby incorporated by reference in its entirety herein:
- System 100 includes computing devices and computing technologies.
- system 100 can include one or more client computing devices 102 and secondary storage computing devices 106 , as well as storage manager 140 or a host computing device for it.
- Computing devices can include, without limitation, one or more: workstations, personal computers, desktop computers, or other types of generally fixed computing systems such as mainframe computers, servers, and minicomputers.
- Other computing devices can include mobile or portable computing devices, such as one or more laptops, tablet computers, personal data assistants, mobile phones (such as smartphones), and other mobile or portable computing devices such as embedded computers, set top boxes, vehicle-mounted devices, wearable computers, etc.
- Servers can include mail servers, file servers, database servers, virtual machine servers, and web servers.
- Any given computing device comprises one or more processors (e.g., CPU and/or single-core or multi-core processors), as well as corresponding non-transitory computer memory (e.g., random-access memory (RAM)) for storing computer programs which are to be executed by the one or more processors.
- processors e.g., CPU and/or single-core or multi-core processors
- non-transitory computer memory e.g., random-access memory (RAM)
- Other computer memory for mass storage of data may be packaged/configured with the computing device (e.g., an internal hard disk) and/or may be external and accessible by the computing device (e.g., network-attached storage, a storage array, etc.).
- a computing device includes cloud computing resources, which may be implemented as virtual machines. For instance, one or more virtual machines may be provided to the organization by a third-party cloud service vendor.
- computing devices can include one or more virtual machine(s) running on a physical host computing device (or “host machine”) operated by the organization.
- host machine a physical host computing device operated by the organization.
- the organization may use one virtual machine as a database server and another virtual machine as a mail server, both virtual machines operating on the same host machine.
- a Virtual machine (“VM”) is a software implementation of a computer that does not physically exist and is instead instantiated in an operating system of a physical computer (or host machine) to enable applications to execute within the VM's environment, i.e., a VM emulates a physical computer.
- AVM includes an operating system and associated virtual resources, such as computer memory and processor(s).
- a hypervisor operates between the VM and the hardware of the physical host machine and is generally responsible for creating and running the VMs.
- the hypervisor typically stores the data of virtual disks in files on the file system of the physical host machine, called virtual machine disk files (“VMDK” in VMware lingo) or virtual hard disk image files (in Microsoft lingo).
- VMDK virtual machine disk files
- VMFS Virtual Machine File System
- a virtual machine reads data from and writes data to its virtual disk much the way that a physical machine reads data from and writes data to a physical disk. Examples of techniques for implementing information management in a cloud computing environment are described in U.S. Pat. No. 8,285,681. Examples of techniques for implementing information management in a virtualized computing environment are described in U.S. Pat. No. 8,307,177.
- Information management system 100 can also include electronic data storage devices, generally used for mass storage of data, including, e.g., primary storage devices 104 and secondary storage devices 108 .
- Storage devices can generally be of any suitable type including, without limitation, disk drives, storage arrays (e.g., storage-area network (SAN) and/or network-attached storage (NAS) technology), semiconductor memory (e.g., solid state storage devices), network attached storage (NAS) devices, tape libraries, or other magnetic, non-tape storage devices, optical media storage devices, DNA/RNA-based memory technology, combinations of the same, etc.
- storage devices form part of a distributed file system.
- storage devices are provided in a cloud storage environment (e.g., a private cloud or one operated by a third-party vendor), whether for primary data or secondary copies or both.
- system 100 can refer to generally all of the illustrated hardware and software components in FIG. 1C , or the term may refer to only a subset of the illustrated components.
- system 100 generally refers to a combination of specialized components used to protect, move, manage, manipulate, analyze, and/or process data and metadata generated by client computing devices 102 .
- system 100 in some cases does not include the underlying components that generate and/or store primary data 112 , such as the client computing devices 102 themselves, and the primary storage devices 104 .
- secondary storage devices 108 e.g., a third-party provided cloud storage environment
- “information management system” or “storage management system” may sometimes refer to one or more of the following components, which will be described in further detail below: storage manager, data agent, and media agent.
- One or more client computing devices 102 may be part of system 100 , each client computing device 102 having an operating system and at least one application 110 and one or more accompanying data agents executing thereon; and associated with one or more primary storage devices 104 storing primary data 112 .
- Client computing device(s) 102 and primary storage devices 104 may generally be referred to in some cases as primary storage subsystem 117 .
- data generation sources include one or more client computing devices 102 .
- a computing device that has a data agent 142 installed and operating on it is generally referred to as a “client computing device” 102 , and may include any type of computing device, without limitation.
- a client computing device 102 may be associated with one or more users and/or user accounts.
- a “client” is a logical component of information management system 100 , which may represent a logical grouping of one or more data agents installed on a client computing device 102 .
- Storage manager 140 recognizes a client as a component of system 100 , and in some embodiments, may automatically create a client component the first time a data agent 142 is installed on a client computing device 102 . Because data generated by executable component(s) 110 is tracked by the associated data agent 142 so that it may be properly protected in system 100 , a client may be said to generate data and to store the generated data to primary storage, such as primary storage device 104 .
- client computing device does not imply that a client computing device 102 is necessarily configured in the client/server sense relative to another computing device such as a mail server, or that a client computing device 102 cannot be a server in its own right.
- a client computing device 102 can be and/or include mail servers, file servers, database servers, virtual machine servers, and/or web servers.
- Each client computing device 102 may have application(s) 110 executing thereon which generate and manipulate the data that is to be protected from loss and managed in system 100 .
- Applications 110 generally facilitate the operations of an organization, and can include, without limitation, mail server applications (e.g., Microsoft Exchange Server), file system applications, mail client applications (e.g., Microsoft Exchange Client), database applications or database management systems (e.g., SQL, Oracle, SAP, Lotus Notes Database), word processing applications (e.g., Microsoft Word), spreadsheet applications, financial applications, presentation applications, graphics and/or video applications, browser applications, mobile applications, entertainment applications, and so on.
- Each application 110 may be accompanied by an application-specific data agent 142 , though not all data agents 142 are application-specific or associated with only application.
- a file system e.g., Microsoft Windows Explorer
- Client computing devices 102 can have at least one operating system (e.g., Microsoft Windows, Mac OS X, iOS, IBM z/OS, Linux, other Unix-based operating systems, etc.) installed thereon, which may support or host one or more file systems and other applications 110 .
- a virtual machine that executes on a host client computing device 102 may be considered an application 110 and may be accompanied by a specific data agent 142 (e.g., virtual server data agent).
- Client computing devices 102 and other components in system 100 can be connected to one another via one or more electronic communication pathways 114 .
- a first communication pathway 114 may communicatively couple client computing device 102 and secondary storage computing device 106 ;
- a second communication pathway 114 may communicatively couple storage manager 140 and client computing device 102 ;
- a third communication pathway 114 may communicatively couple storage manager 140 and secondary storage computing device 106 , etc. (see, e.g., FIG. 1A and FIG. 1C ).
- a communication pathway 114 can include one or more networks or other connection types including one or more of the following, without limitation: the Internet, a wide area network (WAN), a local area network (LAN), a Storage Area Network (SAN), a Fibre Channel (FC) connection, a Small Computer System Interface (SCSI) connection, a virtual private network (VPN), a token ring or TCP/IP based network, an intranet network, a point-to-point link, a cellular network, a wireless data transmission system, a two-way cable system, an interactive kiosk network, a satellite network, a broadband network, a baseband network, a neural network, a mesh network, an ad hoc network, other appropriate computer or telecommunications networks, combinations of the same or the like.
- WAN wide area network
- LAN local area network
- SAN Storage Area Network
- FC Fibre Channel
- SCSI Small Computer System Interface
- VPN virtual private network
- TCP/IP token ring or TCP/IP based network
- intranet network
- Communication pathways 114 in some cases may also include application programming interfaces (APIs) including, e.g., cloud service provider APIs, virtual machine management APIs, and hosted service provider APIs.
- APIs application programming interfaces
- the underlying infrastructure of communication pathways 114 may be wired and/or wireless, analog and/or digital, or any combination thereof; and the facilities used may be private, public, third-party provided, or any combination thereof, without limitation.
- a “subclient” is a logical grouping of all or part of a client's primary data 112 .
- a subclient may be defined according to how the subclient data is to be protected as a unit in system 100 .
- a subclient may be associated with a certain storage policy.
- a given client may thus comprise several subclients, each subclient associated with a different storage policy.
- some files may form a first subclient that requires compression and deduplication and is associated with a first storage policy.
- Other files of the client may form a second subclient that requires a different retention schedule as well as encryption, and may be associated with a different, second storage policy.
- the primary data may be generated by the same application 110 and may belong to one given client, portions of the data may be assigned to different subclients for distinct treatment by system 100 . More detail on subclients is given in regard to storage policies below.
- Primary data 112 is generally production data or “live” data generated by the operating system and/or applications 110 executing on client computing device 102 .
- Primary data 112 is generally stored on primary storage device(s) 104 and is organized via a file system operating on the client computing device 102 .
- client computing device(s) 102 and corresponding applications 110 may create, access, modify, write, delete, and otherwise use primary data 112 .
- Primary data 112 is generally in the native format of the source application 110 .
- Primary data 112 is an initial or first stored body of data generated by the source application 110 .
- Primary data 112 in some cases is created substantially directly from data generated by the corresponding source application 110 . It can be useful in performing certain tasks to organize primary data 112 into units of different granularities.
- primary data 112 can include files, directories, file system volumes, data blocks, extents, or any other hierarchies or organizations of data objects.
- a “data object” can refer to (i) any file that is currently addressable by a file system or that was previously addressable by the file system (e.g., an archive file), and/or to (ii) a subset of such a file (e.g., a data block, an extent, etc.).
- Primary data 112 may include structured data (e.g., database files), unstructured data (e.g., documents), and/or semi-structured data. See, e.g., FIG. 1B .
- Metadata generally includes information about data objects and/or characteristics associated with the data objects. For simplicity herein, it is to be understood that, unless expressly stated otherwise, any reference to primary data 112 generally also includes its associated metadata, but references to metadata generally do not include the primary data.
- Metadata can include, without limitation, one or more of the following: the data owner (e.g., the client or user that generates the data), the last modified time (e.g., the time of the most recent modification of the data object), a data object name (e.g., a file name), a data object size (e.g., a number of bytes of data), information about the content (e.g., an indication as to the existence of a particular search term), user-supplied tags, to/from information for email (e.g., an email sender, recipient, etc.), creation date, file type (e.g., format or application type), last accessed time, application type (e.g., type of application that generated the data object), location/network (e.g., a current, past or future location of the data object and network pathways to/from the data object), geographic location (e.g., GPS coordinates), frequency of change (e.g., a period in which the data object is modified), business unit (e.g.,
- some applications 110 and/or other components of system 100 maintain indices of metadata for data objects, e.g., metadata associated with individual email messages.
- metadata e.g., metadata associated with individual email messages.
- Primary storage devices 104 storing primary data 112 may be relatively fast and/or expensive technology (e.g., flash storage, a disk drive, a hard-disk storage array, solid state memory, etc.), typically to support high-performance live production environments. Primary data 112 may be highly changeable and/or may be intended for relatively short term retention (e.g., hours, days, or weeks). According to some embodiments, client computing device 102 can access primary data 112 stored in primary storage device 104 by making conventional file system calls via the operating system. Each client computing device 102 is generally associated with and/or in communication with one or more primary storage devices 104 storing corresponding primary data 112 .
- a client computing device 102 is said to be associated with or in communication with a particular primary storage device 104 if it is capable of one or more of: routing and/or storing data (e.g., primary data 112 ) to the primary storage device 104 , coordinating the routing and/or storing of data to the primary storage device 104 , retrieving data from the primary storage device 104 , coordinating the retrieval of data from the primary storage device 104 , and modifying and/or deleting data in the primary storage device 104 .
- a client computing device 102 may be said to access data stored in an associated storage device 104 .
- Primary storage device 104 may be dedicated or shared. In some cases, each primary storage device 104 is dedicated to an associated client computing device 102 , e.g., a local disk drive. In other cases, one or more primary storage devices 104 can be shared by multiple client computing devices 102 , e.g., via a local network, in a cloud storage implementation, etc. As one example, primary storage device 104 can be a storage array shared by a group of client computing devices 102 , such as EMC Clarion, EMC Symmetrix, EMC Celerra, Dell EqualLogic, IBM XIV, NetApp FAS, HP EVA, and HP 3PAR.
- client computing devices 102 such as EMC Clarion, EMC Symmetrix, EMC Celerra, Dell EqualLogic, IBM XIV, NetApp FAS, HP EVA, and HP 3PAR.
- System 100 may also include hosted services (not shown), which may be hosted in some cases by an entity other than the organization that employs the other components of system 100 .
- the hosted services may be provided by online service providers.
- Such service providers can provide social networking services, hosted email services, or hosted productivity applications or other hosted applications such as software-as-a-service (SaaS), platform-as-a-service (PaaS), application service providers (ASPs), cloud services, or other mechanisms for delivering functionality via a network.
- each hosted service may generate additional data and metadata, which may be managed by system 100 , e.g., as primary data 112 .
- the hosted services may be accessed using one of the applications 110 .
- a hosted mail service may be accessed via browser running on a client computing device 102 .
- Secondary data 112 stored on primary storage devices 104 may be compromised in some cases, such as when an employee deliberately or accidentally deletes or overwrites primary data 112 . Or primary storage devices 104 can be damaged, lost, or otherwise corrupted. For recovery and/or regulatory compliance purposes, it is therefore useful to generate and maintain copies of primary data 112 . Accordingly, system 100 includes one or more secondary storage computing devices 106 and one or more secondary storage devices 108 configured to create and store one or more secondary copies 116 of primary data 112 including its associated metadata. The secondary storage computing devices 106 and the secondary storage devices 108 may be referred to as secondary storage subsystem 118 .
- Secondary copies 116 can help in search and analysis efforts and meet other information management goals as well, such as: restoring data and/or metadata if an original version is lost (e.g., by deletion, corruption, or disaster); allowing point-in-time recovery; complying with regulatory data retention and electronic discovery (e-discovery) requirements; reducing utilized storage capacity in the production system and/or in secondary storage; facilitating organization and search of data; improving user access to data files across multiple computing devices and/or hosted services; and implementing data retention and pruning policies.
- restoring data and/or metadata if an original version is lost e.g., by deletion, corruption, or disaster
- e-discovery electronic discovery
- reducing utilized storage capacity in the production system and/or in secondary storage facilitating organization and search of data
- improving user access to data files across multiple computing devices and/or hosted services and implementing data retention and pruning policies.
- a secondary copy 116 can comprise a separate stored copy of data that is derived from one or more earlier-created stored copies (e.g., derived from primary data 112 or from another secondary copy 116 ).
- Secondary copies 116 can include point-in-time data, and may be intended for relatively long-term retention before some or all of the data is moved to other storage or discarded.
- a secondary copy 116 may be in a different storage device than other previously stored copies; and/or may be remote from other previously stored copies.
- Secondary copies 116 can be stored in the same storage device as primary data 112 .
- a disk array capable of performing hardware snapshots stores primary data 112 and creates and stores hardware snapshots of the primary data 112 as secondary copies 116 .
- Secondary copies 116 may be stored in relatively slow and/or lower cost storage (e.g., magnetic tape).
- a secondary copy 116 may be stored in a backup or archive format, or in some other format different from the native source application format or other format of primary data 112 .
- Secondary storage computing devices 106 may index secondary copies 116 (e.g., using a media agent 144 ), enabling users to browse and restore at a later time and further enabling the lifecycle management of the indexed data.
- a pointer or other location indicia e.g., a stub
- system 100 may create and manage multiple secondary copies 116 of a particular data object or metadata, each copy representing the state of the data object in primary data 112 at a particular point in time. Moreover, since an instance of a data object in primary data 112 may eventually be deleted from primary storage device 104 and the file system, system 100 may continue to manage point-in-time representations of that data object, even though the instance in primary data 112 no longer exists.
- the operating system and other applications 110 of client computing device(s) 102 may execute within or under the management of virtualization software (e.g., a VMM), and the primary storage device(s) 104 may comprise a virtual disk created on a physical storage device.
- System 100 may create secondary copies 116 of the files or other data objects in a virtual disk file and/or secondary copies 116 of the entire virtual disk file itself (e.g., of an entire .vmdk file).
- Secondary copies 116 are distinguishable from corresponding primary data 112 .
- secondary copies 116 can be stored in a different format from primary data 112 (e.g., backup, archive, or other non-native format). For this or other reasons, secondary copies 116 may not be directly usable by applications 110 or client computing device 102 (e.g., via standard system calls or otherwise) without modification, processing, or other intervention by system 100 which may be referred to as “restore” operations.
- Secondary copies 116 may have been processed by data agent 142 and/or media agent 144 in the course of being created (e.g., compression, deduplication, encryption, integrity markers, indexing, formatting, application-aware metadata, etc.), and thus secondary copy 116 may represent source primary data 112 without necessarily being exactly identical to the source.
- data agent 142 and/or media agent 144 e.g., compression, deduplication, encryption, integrity markers, indexing, formatting, application-aware metadata, etc.
- secondary copies 116 may be stored on a secondary storage device 108 that is inaccessible to application 110 running on client computing device 102 and/or hosted service.
- Some secondary copies 116 may be “offline copies,” in that they are not readily available (e.g., not mounted to tape or disk). Offline copies can include copies of data that system 100 can access without human intervention (e.g., tapes within an automated tape library, but not yet mounted in a drive), and copies that the system 100 can access only with some human intervention (e.g., tapes located at an offsite storage site).
- Creating secondary copies can be challenging when hundreds or thousands of client computing devices 102 continually generate large volumes of primary data 112 to be protected. Also, there can be significant overhead involved in the creation of secondary copies 116 . Moreover, specialized programmed intelligence and/or hardware capability is generally needed for accessing and interacting with secondary storage devices 108 . Client computing devices 102 may interact directly with a secondary storage device 108 to create secondary copies 116 , but in view of the factors described above, this approach can negatively impact the ability of client computing device 102 to serve/service application 110 and produce primary data 112 . Further, any given client computing device 102 may not be optimized for interaction with certain secondary storage devices 108 .
- system 100 may include one or more software and/or hardware components which generally act as intermediaries between client computing devices 102 (that generate primary data 112 ) and secondary storage devices 108 (that store secondary copies 116 ).
- these intermediate components provide other benefits. For instance, as discussed further below with respect to FIG. 1D , distributing some of the work involved in creating secondary copies 116 can enhance scalability and improve system performance.
- the intermediate components can include one or more secondary storage computing devices 106 as shown in FIG. 1A and/or one or more media agents 144 .
- Media agents are discussed further below (e.g., with respect to FIGS. 1C-1E ).
- These special-purpose components of system 100 comprise specialized programmed intelligence and/or hardware capability for writing to, reading from, instructing, communicating with, or otherwise interacting with secondary storage devices 108 .
- Secondary storage computing device(s) 106 can comprise any of the computing devices described above, without limitation. In some cases, secondary storage computing device(s) 106 also include specialized hardware componentry and/or software intelligence (e.g., specialized interfaces) for interacting with certain secondary storage device(s) 108 with which they may be specially associated.
- specialized hardware componentry and/or software intelligence e.g., specialized interfaces
- client computing device 102 may communicate the primary data 112 to be copied (or a processed version thereof generated by a data agent 142 ) to the designated secondary storage computing device 106 , via a communication pathway 114 .
- Secondary storage computing device 106 in turn may further process and convey the data or a processed version thereof to secondary storage device 108 .
- One or more secondary copies 116 may be created from existing secondary copies 116 , such as in the case of an auxiliary copy operation, described further below.
- FIG. 1B is a detailed view of some specific examples of primary data stored on primary storage device(s) 104 and secondary copy data stored on secondary storage device(s) 108 , with other components of the system removed for the purposes of illustration.
- primary storage device(s) 104 Stored on primary storage device(s) 104 are primary data 112 objects including word processing documents 119 A-B, spreadsheets 120 , presentation documents 122 , video files 124 , image files 126 , email mailboxes 128 (and corresponding email messages 129 A-C), HTML/XML or other types of markup language files 130 , databases 132 and corresponding tables or other data structures 133 A- 133 C.
- Some or all primary data 112 objects are associated with corresponding metadata (e.g., “Meta1-11”), which may include file system metadata and/or application-specific metadata.
- metadata e.g., “Meta1-11”
- Stored on the secondary storage device(s) 108 are secondary copy 116 data objects 134 A-C which may include copies of or may otherwise represent corresponding primary data 112 .
- Secondary copy data objects 134 A-C can individually represent more than one primary data object.
- secondary copy data object 134 A represents three separate primary data objects 133 C, 122 , and 129 C (represented as 133 C′, 122 ′, and 129 C′, respectively, and accompanied by corresponding metadata Meta11, Meta3, and Meta8, respectively).
- secondary storage computing devices 106 or other components in secondary storage subsystem 118 may process the data received from primary storage subsystem 117 and store a secondary copy including a transformed and/or supplemented representation of a primary data object and/or metadata that is different from the original format, e.g., in a compressed, encrypted, deduplicated, or other modified format.
- Secondary storage computing devices 106 can generate new metadata or other information based on said processing, and store the newly generated information along with the secondary copies.
- Secondary copy data object 1346 represents primary data objects 120 , 133 B, and 119 A as 120 ′, 133 B′, and 119 A′, respectively, accompanied by corresponding metadata Meta2, Meta10, and Meta1, respectively.
- secondary copy data object 134 C represents primary data objects 133 A, 1196 , and 129 A as 133 A′, 119 B′, and 129 A′, respectively, accompanied by corresponding metadata Meta9, Meta5, and Meta6, respectively.
- System 100 can incorporate a variety of different hardware and software components, which can in turn be organized with respect to one another in many different configurations, depending on the embodiment. There are critical design choices involved in specifying the functional responsibilities of the components and the role of each component in system 100 . Such design choices can impact how system 100 performs and adapts to data growth and other changing circumstances.
- FIG. 1C shows a system 100 designed according to these considerations and includes: storage manager 140 , one or more data agents 142 executing on client computing device(s) 102 and configured to process primary data 112 , and one or more media agents 144 executing on one or more secondary storage computing devices 106 for performing tasks involving secondary storage devices 108 .
- Storage manager 140 is a centralized storage and/or information manager that is configured to perform certain control functions and also to store certain critical information about system 100 —hence storage manager 140 is said to manage system 100 .
- the number of components in system 100 and the amount of data under management can be large. Managing the components and data is therefore a significant task, which can grow unpredictably as the number of components and data scale to meet the needs of the organization.
- responsibility for controlling system 100 or at least a significant portion of that responsibility, is allocated to storage manager 140 .
- Storage manager 140 can be adapted independently according to changing circumstances, without having to replace or re-design the remainder of the system.
- a computing device for hosting and/or operating as storage manager 140 can be selected to best suit the functions and networking needs of storage manager 140 .
- Storage manager 140 may be a software module or other application hosted by a suitable computing device. In some embodiments, storage manager 140 is itself a computing device that performs the functions described herein. Storage manager 140 comprises or operates in conjunction with one or more associated data structures such as a dedicated database (e.g., management database 146 ), depending on the configuration. The storage manager 140 generally initiates, performs, coordinates, and/or controls storage and other information management operations performed by system 100 , e.g., to protect and control primary data 112 and secondary copies 116 . In general, storage manager 140 is said to manage system 100 , which includes communicating with, instructing, and controlling in some circumstances components such as data agents 142 and media agents 144 , etc.
- a dedicated database e.g., management database 146
- the storage manager 140 generally initiates, performs, coordinates, and/or controls storage and other information management operations performed by system 100 , e.g., to protect and control primary data 112 and secondary copies 116 .
- storage manager 140 is said to manage system
- storage manager 140 may communicate with, instruct, and/or control some or all elements of system 100 , such as data agents 142 and media agents 144 . In this manner, storage manager 140 manages the operation of various hardware and software components in system 100 . In certain embodiments, control information originates from storage manager 140 and status as well as index reporting is transmitted to storage manager 140 by the managed components, whereas payload data and metadata are generally communicated between data agents 142 and media agents 144 (or otherwise between client computing device(s) 102 and secondary storage computing device(s) 106 ), e.g., at the direction of and under the management of storage manager 140 .
- Control information can generally include parameters and instructions for carrying out information management operations, such as, without limitation, instructions to perform a task associated with an operation, timing information specifying when to initiate a task, data path information specifying what components to communicate with or access in carrying out an operation, and the like.
- information management operations are controlled or initiated by other components of system 100 (e.g., by media agents 144 or data agents 142 ), instead of or in combination with storage manager 140 .
- storage manager 140 provides one or more of the following functions:
- Storage manager 140 may maintain an associated database 146 (or “storage manager database 146 ” or “management database 146 ”) of management-related data and information management policies 148 .
- Database 146 is stored in computer memory accessible by storage manager 140 .
- Database 146 may include a management index 150 (or “index 150 ”) or other data structure(s) that may store: logical associations between components of the system; user preferences and/or profiles (e.g., preferences regarding encryption, compression, or deduplication of primary data or secondary copies; preferences regarding the scheduling, type, or other aspects of secondary copy or other operations; mappings of particular information management users or user accounts to certain computing devices or other components, etc.; management tasks; media containerization; other useful data; and/or any combination thereof.
- management index 150 or other data structure(s) that may store: logical associations between components of the system; user preferences and/or profiles (e.g., preferences regarding encryption, compression, or deduplication of primary data or secondary copies; preferences regarding the scheduling, type, or other aspects of secondary copy or other operations;
- index 150 may use index 150 to track logical associations between media agents 144 and secondary storage devices 108 and/or movement of data to/from secondary storage devices 108 .
- index 150 may store data associating a client computing device 102 with a particular media agent 144 and/or secondary storage device 108 , as specified in an information management policy 148 .
- an information management policy 148 can include a stored data structure or other information source that specifies parameters (e.g., criteria and rules) associated with storage management or other information management operations.
- Storage manager 140 can process an information management policy 148 and/or index 150 and, based on the results, identify an information management operation to perform, identify the appropriate components in system 100 to be involved in the operation (e.g., client computing devices 102 and corresponding data agents 142 , secondary storage computing devices 106 and corresponding media agents 144 , etc.), establish connections to those components and/or between those components, and/or instruct and control those components to carry out the operation. In this manner, system 100 can translate stored information into coordinated activity among the various computing devices in system 100 .
- an information management operation to perform identify the appropriate components in system 100 to be involved in the operation (e.g., client computing devices 102 and corresponding data agents 142 , secondary storage computing devices 106 and corresponding media agents 144 , etc.), establish connections to those components and/or between those components, and/or instruct and control those components to carry out the operation.
- system 100 can translate stored information into coordinated activity among the various computing devices in system 100 .
- Management database 146 may maintain information management policies 148 and associated data, although information management policies 148 can be stored in computer memory at any appropriate location outside management database 146 .
- an information management policy 148 such as a storage policy may be stored as metadata in a media agent database 152 or in a secondary storage device 108 (e.g., as an archive copy) for use in restore or other information management operations, depending on the embodiment.
- Information management policies 148 are described further below.
- management database 146 comprises a relational database (e.g., an SQL database) for tracking metadata, such as metadata associated with secondary copy operations (e.g., what client computing devices 102 and corresponding subclient data were protected and where the secondary copies are stored and which media agent 144 performed the storage operation(s)).
- management database 146 may comprise data needed to kick off secondary copy operations (e.g., storage policies, schedule policies, etc.), status and reporting information about completed jobs (e.g., status and error reports on yesterday's backup jobs), and additional information sufficient to enable restore and disaster recovery operations (e.g., media agent associations, location indexing, content indexing, etc.).
- secondary copy operations e.g., storage policies, schedule policies, etc.
- status and reporting information about completed jobs e.g., status and error reports on yesterday's backup jobs
- additional information sufficient to enable restore and disaster recovery operations e.g., media agent associations, location indexing, content indexing, etc.
- Storage manager 140 may include a jobs agent 156 , a user interface 158 , and a management agent 154 , all of which may be implemented as interconnected software modules or application programs. These are described further below.
- Jobs agent 156 in some embodiments initiates, controls, and/or monitors the status of some or all information management operations previously performed, currently being performed, or scheduled to be performed by system 100 .
- a job is a logical grouping of information management operations such as daily storage operations scheduled for a certain set of subclients (e.g., generating incremental block-level backup copies 116 at a certain time every day for database files in a certain geographical location).
- jobs agent 156 may access information management policies 148 (e.g., in management database 146 ) to determine when, where, and how to initiate/control jobs in system 100 .
- User interface 158 may include information processing and display software, such as a graphical user interface (GUI), an application program interface (API), and/or other interactive interface(s) through which users and system processes can retrieve information about the status of information management operations or issue instructions to storage manager 140 and other components.
- GUI graphical user interface
- API application program interface
- users may issue instructions to the components in system 100 regarding performance of secondary copy and recovery operations. For example, a user may modify a schedule concerning the number of pending secondary copy operations.
- a user may employ the GUI to view the status of pending secondary copy jobs or to monitor the status of certain components in system 100 (e.g., the amount of capacity left in a storage device).
- Storage manager 140 may track information that permits it to select, designate, or otherwise identify content indices, deduplication databases, or similar databases or resources or data sets within its information management cell (or another cell) to be searched in response to certain queries. Such queries may be entered by the user by interacting with user interface 158 .
- Various embodiments of information management system 100 may be configured and/or designed to generate user interface data usable for rendering the various interactive user interfaces described.
- the user interface data may be used by system 100 and/or by another system, device, and/or software program (for example, a browser program), to render the interactive user interfaces.
- the interactive user interfaces may be displayed on, for example, electronic displays (including, for example, touch-enabled displays), consoles, etc., whether direct-connected to storage manager 140 or communicatively coupled remotely, e.g., via an internet connection.
- the present disclosure describes various embodiments of interactive and dynamic user interfaces, some of which may be generated by user interface agent 158 , and which are the result of significant technological development.
- User interfaces described herein may provide improved human-computer interactions, allowing for significant cognitive and ergonomic efficiencies and advantages over previous systems, including reduced mental workloads, improved decision-making, and the like.
- User interface 158 may operate in a single integrated view or console (not shown).
- the console may support a reporting capability for generating a variety of reports, which may be tailored to a particular aspect of information management.
- User interfaces are not exclusive to storage manager 140 and in some embodiments a user may access information locally from a computing device component of system 100 .
- a user may access information locally from a computing device component of system 100 .
- some information pertaining to installed data agents 142 and associated data streams may be available from client computing device 102 .
- some information pertaining to media agents 144 and associated data streams may be available from secondary storage computing device 106 .
- Management agent 154 can provide storage manager 140 with the ability to communicate with other components within system 100 and/or with other information management cells via network protocols and application programming interfaces (APIs) including, e.g., HTTP, HTTPS, FTP, REST, virtualization software APIs, cloud service provider APIs, and hosted service provider APIs, without limitation.
- APIs application programming interfaces
- Management agent 154 also allows multiple information management cells to communicate with one another.
- system 100 in some cases may be one information management cell in a network of multiple cells adjacent to one another or otherwise logically related, e.g., in a WAN or LAN. With this arrangement, the cells may communicate with one another through respective management agents 154 . Inter-cell communications and hierarchy is described in greater detail in e.g., U.S. Pat. No. 7,343,453.
- An “information management cell” may generally include a logical and/or physical grouping of a combination of hardware and software components associated with performing information management operations on electronic data, typically one storage manager 140 and at least one data agent 142 (executing on a client computing device 102 ) and at least one media agent 144 (executing on a secondary storage computing device 106 ).
- the components shown in FIG. 1C may together form an information management cell.
- a system 100 may be referred to as an information management cell or a storage operation cell.
- a given cell may be identified by the identity of its storage manager 140 , which is generally responsible for managing the cell.
- Multiple cells may be organized hierarchically, so that cells may inherit properties from hierarchically superior cells or be controlled by other cells in the hierarchy (automatically or otherwise).
- cells may inherit or otherwise be associated with information management policies, preferences, information management operational parameters, or other properties or characteristics according to their relative position in a hierarchy of cells.
- Cells may also be organized hierarchically according to function, geography, architectural considerations, or other factors useful or desirable in performing information management operations. For example, a first cell may represent a geographic segment of an enterprise, such as a Chicago office, and a second cell may represent a different geographic segment, such as a New York City office.
- Other cells may represent departments within a particular office, e.g., human resources, finance, engineering, etc.
- a first cell may perform one or more first types of information management operations (e.g., one or more first types of secondary copies at a certain frequency), and a second cell may perform one or more second types of information management operations (e.g., one or more second types of secondary copies at a different frequency and under different retention rules).
- first types of information management operations e.g., one or more first types of secondary copies at a certain frequency
- second cell may perform one or more second types of information management operations (e.g., one or more second types of secondary copies at a different frequency and under different retention rules).
- the hierarchical information is maintained by one or more storage managers 140 that manage the respective cells (e.g., in corresponding management database(s) 146 ).
- a variety of different applications 110 can operate on a given client computing device 102 , including operating systems, file systems, database applications, e-mail applications, and virtual machines, just to name a few. And, as part of the process of creating and restoring secondary copies 116 , the client computing device 102 may be tasked with processing and preparing the primary data 112 generated by these various applications 110 . Moreover, the nature of the processing/preparation can differ across application types, e.g., due to inherent structural, state, and formatting differences among applications 110 and/or the operating system of client computing device 102 . Each data agent 142 is therefore advantageously configured in some embodiments to assist in the performance of information management operations based on the type of data that is being protected at a client-specific and/or application-specific level.
- Data agent 142 is a component of information system 100 and is generally directed by storage manager 140 to participate in creating or restoring secondary copies 116 .
- Data agent 142 may be a software program (e.g., in the form of a set of executable binary files) that executes on the same client computing device 102 as the associated application 110 that data agent 142 is configured to protect.
- Data agent 142 is generally responsible for managing, initiating, or otherwise assisting in the performance of information management operations in reference to its associated application(s) 110 and corresponding primary data 112 which is generated/accessed by the particular application(s) 110 .
- data agent 142 may take part in copying, archiving, migrating, and/or replicating of certain primary data 112 stored in the primary storage device(s) 104 .
- Data agent 142 may receive control information from storage manager 140 , such as commands to transfer copies of data objects and/or metadata to one or more media agents 144 .
- Data agent 142 also may compress, deduplicate, and encrypt certain primary data 112 , as well as capture application-related metadata before transmitting the processed data to media agent 144 .
- Data agent 142 also may receive instructions from storage manager 140 to restore (or assist in restoring) a secondary copy 116 from secondary storage device 108 to primary storage 104 , such that the restored data may be properly accessed by application 110 in a suitable format as though it were primary data 112 .
- Each data agent 142 may be specialized for a particular application 110 .
- different individual data agents 142 may be designed to handle Microsoft Exchange data, Lotus Notes data, Microsoft Windows file system data, Microsoft Active Directory Objects data, SQL Server data, SharePoint data, Oracle database data, SAP database data, virtual machines and/or associated data, and other types of data.
- a file system data agent may handle data files and/or other file system information. If a client computing device 102 has two or more types of data 112 , a specialized data agent 142 may be used for each data type.
- the client computing device 102 may use: (1) a Microsoft Exchange Mailbox data agent 142 to back up the Exchange mailboxes; (2) a Microsoft Exchange Database data agent 142 to back up the Exchange databases; (3) a Microsoft Exchange Public Folder data agent 142 to back up the Exchange Public Folders; and (4) a Microsoft Windows File System data agent 142 to back up the file system of client computing device 102 .
- these specialized data agents 142 are treated as four separate data agents 142 even though they operate on the same client computing device 102 .
- Other examples may include archive management data agents such as a migration archiver or a compliance archiver, Quick Recovery® agents, and continuous data replication agents.
- Application-specific data agents 142 can provide improved performance as compared to generic agents. For instance, because application-specific data agents 142 may only handle data for a single software application, the design, operation, and performance of the data agent 142 can be streamlined. The data agent 142 may therefore execute faster and consume less persistent storage and/or operating memory than data agents designed to generically accommodate multiple different software applications 110 .
- Each data agent 142 may be configured to access data and/or metadata stored in the primary storage device(s) 104 associated with data agent 142 and its host client computing device 102 , and process the data appropriately. For example, during a secondary copy operation, data agent 142 may arrange or assemble the data and metadata into one or more files having a certain format (e.g., a particular backup or archive format) before transferring the file(s) to a media agent 144 or other component.
- the file(s) may include a list of files or other metadata.
- a data agent 142 may be distributed between client computing device 102 and storage manager 140 (and any other intermediate components) or may be deployed from a remote location or its functions approximated by a remote process that performs some or all of the functions of data agent 142 .
- a data agent 142 may perform some functions provided by media agent 144 .
- Other embodiments may employ one or more generic data agents 142 that can handle and process data from two or more different applications 110 , or that can handle and process multiple data types, instead of or in addition to using specialized data agents 142 .
- one generic data agent 142 may be used to back up, migrate and restore Microsoft Exchange Mailbox data and Microsoft Exchange Database data, while another generic data agent may handle Microsoft Exchange Public Folder data and Microsoft Windows File System data.
- off-loading certain responsibilities from client computing devices 102 to intermediate components such as secondary storage computing device(s) 106 and corresponding media agent(s) 144 can provide a number of benefits including improved performance of client computing device 102 , faster and more reliable information management operations, and enhanced scalability.
- media agent 144 can act as a local cache of recently-copied data and/or metadata stored to secondary storage device(s) 108 , thus improving restore capabilities and performance for the cached data.
- Media agent 144 is a component of system 100 and is generally directed by storage manager 140 in creating and restoring secondary copies 116 . Whereas storage manager 140 generally manages system 100 as a whole, media agent 144 provides a portal to certain secondary storage devices 108 , such as by having specialized features for communicating with and accessing certain associated secondary storage device 108 . Media agent 144 may be a software program (e.g., in the form of a set of executable binary files) that executes on a secondary storage computing device 106 . Media agent 144 generally manages, coordinates, and facilitates the transmission of data between a data agent 142 (executing on client computing device 102 ) and secondary storage device(s) 108 associated with media agent 144 .
- a data agent 142 executing on client computing device 102
- secondary storage device(s) 108 associated with media agent 144 .
- media agent 144 may interact with media agent 144 to gain access to data stored on associated secondary storage device(s) 108 , (e.g., to browse, read, write, modify, delete, or restore data).
- media agents 144 can generate and store information relating to characteristics of the stored data and/or metadata, or can generate and store other types of information that generally provides insight into the contents of the secondary storage devices 108 —generally referred to as indexing of the stored secondary copies 116 .
- Each media agent 144 may operate on a dedicated secondary storage computing device 106 , while in other embodiments a plurality of media agents 144 may operate on the same secondary storage computing device 106 .
- a media agent 144 may be associated with a particular secondary storage device 108 if that media agent 144 is capable of one or more of: routing and/or storing data to the particular secondary storage device 108 ; coordinating the routing and/or storing of data to the particular secondary storage device 108 ; retrieving data from the particular secondary storage device 108 ; coordinating the retrieval of data from the particular secondary storage device 108 ; and modifying and/or deleting data retrieved from the particular secondary storage device 108 .
- Media agent 144 in certain embodiments is physically separate from the associated secondary storage device 108 .
- a media agent 144 may operate on a secondary storage computing device 106 in a distinct housing, package, and/or location from the associated secondary storage device 108 .
- a media agent 144 operates on a first server computer and is in communication with a secondary storage device(s) 108 operating in a separate rack-mounted RAID-based system.
- a media agent 144 associated with a particular secondary storage device 108 may instruct secondary storage device 108 to perform an information management task. For instance, a media agent 144 may instruct a tape library to use a robotic arm or other retrieval means to load or eject a certain storage media, and to subsequently archive, migrate, or retrieve data to or from that media, e.g., for the purpose of restoring data to a client computing device 102 .
- a secondary storage device 108 may include an array of hard disk drives or solid state drives organized in a RAID configuration, and media agent 144 may forward a logical unit number (LUN) and other appropriate information to the array, which uses the received information to execute the desired secondary copy operation.
- Media agent 144 may communicate with a secondary storage device 108 via a suitable communications link, such as a SCSI or Fibre Channel link.
- Each media agent 144 may maintain an associated media agent database 152 .
- Media agent database 152 may be stored to a disk or other storage device (not shown) that is local to the secondary storage computing device 106 on which media agent 144 executes. In other cases, media agent database 152 is stored separately from the host secondary storage computing device 106 .
- Media agent database 152 can include, among other things, a media agent index 153 (see, e.g., FIG. 1C ). In some cases, media agent index 153 does not form a part of and is instead separate from media agent database 152 .
- Media agent index 153 may be a data structure associated with the particular media agent 144 that includes information about the stored data associated with the particular media agent and which may be generated in the course of performing a secondary copy operation or a restore. Index 153 provides a fast and efficient mechanism for locating/browsing secondary copies 116 or other data stored in secondary storage devices 108 without having to access secondary storage device 108 to retrieve the information from there.
- index 153 may include metadata such as a list of the data objects (e.g., files/subdirectories, database objects, mailbox objects, etc.), a logical path to the secondary copy 116 on the corresponding secondary storage device 108 , location information (e.g., offsets) indicating where the data objects are stored in the secondary storage device 108 , when the data objects were created or modified, etc.
- location information e.g., offsets
- index 153 includes metadata associated with the secondary copies 116 that is readily available for use from media agent 144 .
- some or all of the information in index 153 may instead or additionally be stored along with secondary copies 116 in secondary storage device 108 .
- a secondary storage device 108 can include sufficient information to enable a “bare metal restore,” where the operating system and/or software applications of a failed client computing device 102 or another target may be automatically restored without manually reinstalling individual software packages (including operating systems).
- index 153 may operate as a cache, it can also be referred to as an “index cache.”
- information stored in index cache 153 typically comprises data that reflects certain particulars about relatively recent secondary copy operations. After some triggering event, such as after some time elapses or index cache 153 reaches a particular size, certain portions of index cache 153 may be copied or migrated to secondary storage device 108 , e.g., on a least-recently-used basis. This information may be retrieved and uploaded back into index cache 153 or otherwise restored to media agent 144 to facilitate retrieval of data from the secondary storage device(s) 108 .
- the cached information may include format or containerization information related to archives or other files stored on storage device(s) 108 .
- media agent 144 generally acts as a coordinator or facilitator of secondary copy operations between client computing devices 102 and secondary storage devices 108 , but does not actually write the data to secondary storage device 108 .
- storage manager 140 (or media agent 144 ) may instruct a client computing device 102 and secondary storage device 108 to communicate with one another directly.
- client computing device 102 transmits data directly or via one or more intermediary components to secondary storage device 108 according to the received instructions, and vice versa.
- Media agent 144 may still receive, process, and/or maintain metadata related to the secondary copy operations, i.e., may continue to build and maintain index 153 .
- payload data can flow through media agent 144 for the purposes of populating index 153 , but not for writing to secondary storage device 108 .
- Media agent 144 and/or other components such as storage manager 140 may in some cases incorporate additional functionality, such as data classification, content indexing, deduplication, encryption, compression, and the like. Further details regarding these and other functions are described below.
- certain functions of system 100 can be distributed amongst various physical and/or logical components.
- one or more of storage manager 140 , data agents 142 , and media agents 144 may operate on computing devices that are physically separate from one another.
- This architecture can provide a number of benefits. For instance, hardware and software design choices for each distributed component can be targeted to suit its particular function.
- the secondary computing devices 106 on which media agents 144 operate can be tailored for interaction with associated secondary storage devices 108 and provide fast index cache operation, among other specific tasks.
- client computing device(s) 102 can be selected to effectively service applications 110 in order to efficiently produce and store primary data 112 .
- one or more of the individual components of information management system 100 can be distributed to multiple separate computing devices.
- database 146 may be migrated to or may otherwise reside on a specialized database server (e.g., an SQL server) separate from a server that implements the other functions of storage manager 140 .
- This distributed configuration can provide added protection because database 146 can be protected with standard database utilities (e.g., SQL log shipping or database replication) independent from other functions of storage manager 140 .
- Database 146 can be efficiently replicated to a remote site for use in the event of a disaster or other data loss at the primary site. Or database 146 can be replicated to another computing device within the same site, such as to a higher performance machine in the event that a storage manager host computing device can no longer service the needs of a growing system 100 .
- FIG. 1D shows an embodiment of information management system 100 including a plurality of client computing devices 102 and associated data agents 142 as well as a plurality of secondary storage computing devices 106 and associated media agents 144 . Additional components can be added or subtracted based on the evolving needs of system 100 . For instance, depending on where bottlenecks are identified, administrators can add additional client computing devices 102 , secondary storage computing devices 106 , and/or secondary storage devices 108 . Moreover, where multiple fungible components are available, load balancing can be implemented to dynamically address identified bottlenecks. As an example, storage manager 140 may dynamically select which media agents 144 and/or secondary storage devices 108 to use for storage operations based on a processing load analysis of media agents 144 and/or secondary storage devices 108 , respectively.
- a first media agent 144 may provide failover functionality for a second failed media agent 144 .
- media agents 144 can be dynamically selected to provide load balancing.
- Each client computing device 102 can communicate with, among other components, any of the media agents 144 , e.g., as directed by storage manager 140 .
- each media agent 144 may communicate with, among other components, any of secondary storage devices 108 , e.g., as directed by storage manager 140 .
- operations can be routed to secondary storage devices 108 in a dynamic and highly flexible manner, to provide load balancing, failover, etc.
- Further examples of scalable systems capable of dynamic storage operations, load balancing, and failover are provided in U.S. Pat. No. 7,246,207.
- certain components may reside and execute on the same computing device.
- one or more of the components shown in FIG. 1C may be implemented on the same computing device.
- a storage manager 140 , one or more data agents 142 , and/or one or more media agents 144 are all implemented on the same computing device.
- one or more data agents 142 and one or more media agents 144 are implemented on the same computing device, while storage manager 140 is implemented on a separate computing device, etc. without limitation.
- system 100 can be configured to perform a variety of information management operations, which may also be referred to in some cases as storage management operations or storage operations. These operations can generally include (i) data movement operations, (ii) processing and data manipulation operations, and (iii) analysis, reporting, and management operations.
- Data movement operations are generally storage operations that involve the copying or migration of data between different locations in system 100 .
- data movement operations can include operations in which stored data is copied, migrated, or otherwise transferred from one or more first storage devices to one or more second storage devices, such as from primary storage device(s) 104 to secondary storage device(s) 108 , from secondary storage device(s) 108 to different secondary storage device(s) 108 , from secondary storage devices 108 to primary storage devices 104 , or from primary storage device(s) 104 to different primary storage device(s) 104 , or in some cases within the same primary storage device 104 such as within a storage array.
- Data movement operations can include by way of example, backup operations, archive operations, information lifecycle management operations such as hierarchical storage management operations, replication operations (e.g., continuous data replication), snapshot operations, deduplication or single-instancing operations, auxiliary copy operations, disaster-recovery copy operations, and the like. As will be discussed, some of these operations do not necessarily create distinct copies. Nonetheless, some or all of these operations are generally referred to as “secondary copy operations” for simplicity, because they involve secondary copies. Data movement also comprises restoring secondary copies.
- a backup operation creates a copy of a version of primary data 112 at a particular point in time (e.g., one or more files or other data units). Each subsequent backup copy 116 (which is a form of secondary copy 116 ) may be maintained independently of the first.
- a backup generally involves maintaining a version of the copied primary data 112 as well as backup copies 116 .
- a backup copy in some embodiments is generally stored in a form that is different from the native format, e.g., a backup format. This contrasts to the version in primary data 112 which may instead be stored in a format native to the source application(s) 110 .
- backup copies can be stored in a format in which the data is compressed, encrypted, deduplicated, and/or otherwise modified from the original native application format.
- a backup copy may be stored in a compressed backup format that facilitates efficient long-term storage.
- Backup copies 116 can have relatively long retention periods as compared to primary data 112 , which is generally highly changeable. Backup copies 116 may be stored on media with slower retrieval times than primary storage device 104 . Some backup copies may have shorter retention periods than some other types of secondary copies 116 , such as archive copies (described below). Backups may be Stored at an Offsite Location.
- Backup operations can include full backups, differential backups, incremental backups, “synthetic full” backups, and/or creating a “reference copy.”
- a full backup (or “standard full backup”) in some embodiments is generally a complete image of the data to be protected. However, because full backup copies can consume a relatively large amount of storage, it can be useful to use a full backup copy as a baseline and only store changes relative to the full backup copy afterwards.
- a differential backup operation tracks and stores changes that occurred since the last full backup. Differential backups can grow quickly in size, but can restore relatively efficiently because a restore can be completed in some cases using only the full backup copy and the latest differential copy.
- An incremental backup operation generally tracks and stores changes since the most recent backup copy of any type, which can greatly reduce storage utilization. In some cases, however, restoring can be lengthy compared to full or differential backups because completing a restore operation may involve accessing a full backup in addition to multiple incremental backups.
- Synthetic full backups generally consolidate data without directly backing up data from the client computing device.
- a synthetic full backup is created from the most recent full backup (i.e., standard or synthetic) and subsequent incremental and/or differential backups. The resulting synthetic full backup is identical to what would have been created had the last backup for the subclient been a standard full backup.
- a synthetic full backup does not actually transfer data from primary storage to the backup media, because it operates as a backup consolidator.
- a synthetic full backup extracts the index data of each participating subclient. Using this index data and the previously backed up user data images, it builds new full backup images (e.g., bitmaps), one for each subclient. The new backup images consolidate the index and user data stored in the related incremental, differential, and previous full backups into a synthetic backup file that fully represents the subclient (e.g., via pointers) but does not comprise all its constituent data.
- volume level backup operations generally involve copying of a data volume (e.g., a logical disk or partition) as a whole.
- information management system 100 generally tracks changes to individual files and includes copies of files in the backup copy.
- block-level backups files are broken into constituent blocks, and changes are tracked at the block level.
- system 100 reassembles the blocks into files in a transparent fashion. Far less data may actually be transferred and copied to secondary storage devices 108 during a file-level copy than a volume-level copy.
- a block-level copy may transfer less data than a file-level copy, resulting in faster execution.
- restoring a relatively higher-granularity copy can result in longer restore times. For instance, when restoring a block-level copy, the process of locating and retrieving constituent blocks can sometimes take longer than restoring file-level backups.
- a reference copy may comprise copy(ies) of selected objects from backed up data, typically to help organize data by keeping contextual information from multiple sources together, and/or help retain specific data for a longer period of time, such as for legal hold needs.
- a reference copy generally maintains data integrity, and when the data is restored, it may be viewed in the same format as the source data.
- a reference copy is based on a specialized client, individual subclient and associated information management policies (e.g., storage policy, retention policy, etc.) that are administered within system 100 .
- an archive operation creates an archive copy 116 by both copying and removing source data. Or, seen another way, archive operations can involve moving some or all of the source data to the archive destination. Thus, data satisfying criteria for removal (e.g., data of a threshold age or size) may be removed from source storage.
- the source data may be primary data 112 or a secondary copy 116 , depending on the situation.
- archive copies can be stored in a format in which the data is compressed, encrypted, deduplicated, and/or otherwise modified from the format of the original application or source copy. In addition, archive copies may be retained for relatively long periods of time (e.g., years) and, in some cases are never deleted. In certain embodiments, archive copies may be made and kept for extended periods in order to meet compliance regulations.
- Archiving can also serve the purpose of freeing up space in primary storage device(s) 104 and easing the demand on computational resources on client computing device 102 . Similarly, when a secondary copy 116 is archived, the archive copy can therefore serve the purpose of freeing up space in the source secondary storage device(s) 108 . Examples of data archiving operations are provided in U.S. Pat. No. 7,107,298.
- Snapshot operations can provide a relatively lightweight, efficient mechanism for protecting data.
- a snapshot may be thought of as an “instant” image of primary data 112 at a given point in time, and may include state and/or status information relative to an application 110 that creates/manages primary data 112 .
- a snapshot may generally capture the directory structure of an object in primary data 112 such as a file or volume or other data set at a particular moment in time and may also preserve file attributes and contents.
- a snapshot in some cases is created relatively quickly, e.g., substantially instantly, using a minimum amount of file space, but may still function as a conventional file system backup.
- a “hardware snapshot” (or “hardware-based snapshot”) operation occurs where a target storage device (e.g., a primary storage device 104 or a secondary storage device 108 ) performs the snapshot operation in a self-contained fashion, substantially independently, using hardware, firmware and/or software operating on the storage device itself.
- the storage device may perform snapshot operations generally without intervention or oversight from any of the other components of the system 100 , e.g., a storage array may generate an “array-created” hardware snapshot and may also manage its storage, integrity, versioning, etc. In this manner, hardware snapshots can off-load other components of system 100 from snapshot processing.
- An array may receive a request from another component to take a snapshot and then proceed to execute the “hardware snapshot” operations autonomously, preferably reporting success to the requesting component.
- a “software snapshot” (or “software-based snapshot”) operation occurs where a component in system 100 (e.g., client computing device 102 , etc.) implements a software layer that manages the snapshot operation via interaction with the target storage device. For instance, the component executing the snapshot management software layer may derive a set of pointers and/or data that represents the snapshot. The snapshot management software layer may then transmit the same to the target storage device, along with appropriate instructions for writing the snapshot.
- a software snapshot product is Microsoft Volume Snapshot Service (VSS), which is part of the Microsoft Windows operating system.
- snapshots do not actually create another physical copy of all the data as it existed at the particular point in time, but may simply create pointers that map files and directories to specific memory locations (e.g., to specific disk blocks) where the data resides as it existed at the particular point in time.
- a snapshot copy may include a set of pointers derived from the file system or from an application.
- the snapshot may be created at the block-level, such that creation of the snapshot occurs without awareness of the file system.
- Each pointer points to a respective stored data block, so that collectively, the set of pointers reflect the storage location and state of the data object (e.g., file(s) or volume(s) or data set(s)) at the point in time when the snapshot copy was created.
- An initial snapshot may use only a small amount of disk space needed to record a mapping or other data structure representing or otherwise tracking the blocks that correspond to the current state of the file system. Additional disk space is usually required only when files and directories change later on. Furthermore, when files change, typically only the pointers which map to blocks are copied, not the blocks themselves. For example for “copy-on-write” snapshots, when a block changes in primary storage, the block is copied to secondary storage or cached in primary storage before the block is overwritten in primary storage, and the pointer to that block is changed to reflect the new location of that block. The snapshot mapping of file system data may also be updated to reflect the changed block(s) at that particular point in time.
- a snapshot includes a full physical copy of all or substantially all of the data represented by the snapshot. Further examples of snapshot operations are provided in U.S. Pat. No. 7,529,782.
- a snapshot copy in many cases can be made quickly and without significantly impacting primary computing resources because large amounts of data need not be copied or moved.
- a snapshot may exist as a virtual file system, parallel to the actual file system. Users in some cases gain read-only access to the record of files and directories of the snapshot. By electing to restore primary data 112 from a snapshot taken at a given point in time, users may also return the current file system to the state of the file system that existed when the snapshot was taken.
- Replication is another type of secondary copy operation.
- Some types of secondary copies 116 periodically capture images of primary data 112 at particular points in time (e.g., backups, archives, and snapshots). However, it can also be useful for recovery purposes to protect primary data 112 in a more continuous fashion, by replicating primary data 112 substantially as changes occur.
- a replication copy can be a mirror copy, for instance, where changes made to primary data 112 are mirrored or substantially immediately copied to another location (e.g., to secondary storage device(s) 108 ). By copying each write operation to the replication copy, two storage systems are kept synchronized or substantially synchronized so that they are virtually identical at approximately the same time. Where entire disk volumes are mirrored, however, mirroring can require significant amount of storage space and utilizes a large amount of processing resources.
- secondary copy operations are performed on replicated data that represents a recoverable state, or “known good state” of a particular application running on the source system.
- known good replication copies may be viewed as copies of primary data 112 . This feature allows the system to directly access, copy, restore, back up, or otherwise manipulate the replication copies as if they were the “live” primary data 112 . This can reduce access time, storage utilization, and impact on source applications 110 , among other benefits.
- system 100 can replicate sections of application data that represent a recoverable state rather than rote copying of blocks of data. Examples of replication operations (e.g., continuous data replication) are provided in U.S. Pat. No. 7,617,262.
- Deduplication or single-instance storage is useful to reduce the amount of non-primary data.
- some or all of the above-described secondary copy operations can involve deduplication in some fashion.
- New data is read, broken down into data portions of a selected granularity (e.g., sub-file level blocks, files, etc.), compared with corresponding portions that are already in secondary storage, and only new/changed portions are stored. Portions that already exist are represented as pointers to the already-stored data.
- a deduplicated secondary copy 116 may comprise actual data portions copied from primary data 112 and may further comprise pointers to already-stored data, which is generally more storage-efficient than a full copy.
- system 100 may calculate and/or store signatures (e.g., hashes or cryptographically unique IDs) corresponding to the individual source data portions and compare the signatures to already-stored data signatures, instead of comparing entire data portions.
- signatures e.g., hashes or cryptographically unique IDs
- deduplication operations may therefore be referred to interchangeably as “single-instancing” operations.
- deduplication operations can store more than one instance of certain data portions, yet still significantly reduce stored-data redundancy.
- deduplication portions such as data blocks can be of fixed or variable length. Using variable length blocks can enhance deduplication by responding to changes in the data stream, but can involve more complex processing.
- system 100 utilizes a technique for dynamically aligning deduplication blocks based on changing content in the data stream, as described in U.S. Pat. No. 8,364,652.
- System 100 can deduplicate in a variety of manners at a variety of locations. For instance, in some embodiments, system 100 implements “target-side” deduplication by deduplicating data at the media agent 144 after being received from data agent 142 .
- media agents 144 are generally configured to manage the deduplication process. For instance, one or more of the media agents 144 maintain a corresponding deduplication database that stores deduplication information (e.g., datablock signatures). Examples of such a configuration are provided in U.S. Pat. No. 9,020,900.
- “source-side” (or “client-side”) deduplication can also be performed, e.g., to reduce the amount of data to be transmitted by data agent 142 to media agent 144 .
- Storage manager 140 may communicate with other components within system 100 via network protocols and cloud service provider APIs to facilitate cloud-based deduplication/single instancing, as exemplified in U.S. Pat. No. 8,954,446.
- Some other deduplication/single instancing techniques are described in U.S. Pat. Pub. No. 2006/0224846 and in U.S. Pat. No. 9,098,495.
- files and other data over their lifetime move from more expensive quick-access storage to less expensive slower-access storage.
- Operations associated with moving data through various tiers of storage are sometimes referred to as information lifecycle management (ILM) operations.
- ILM information lifecycle management
- HSM hierarchical storage management
- an HSM operation may involve movement of data from primary storage devices 104 to secondary storage devices 108 , or between tiers of secondary storage devices 108 . With each tier, the storage devices may be progressively cheaper, have relatively slower access/restore times, etc. For example, movement of data between tiers may occur as data becomes less important over time.
- an HSM operation is similar to archiving in that creating an HSM copy may (though not always) involve deleting some of the source data, e.g., according to one or more criteria related to the source data.
- an HSM copy may include primary data 112 or a secondary copy 116 that exceeds a given size threshold or a given age threshold.
- HSM data that is removed or aged from the source is replaced by a logical reference pointer or stub.
- the reference pointer or stub can be stored in the primary storage device 104 or other source storage device, such as a secondary storage device 108 to replace the deleted source data and to point to or otherwise indicate the new location in (another) secondary storage device 108 .
- system 100 uses the stub to locate the data and may make recovery of the data appear transparent, even though the HSM data may be stored at a location different from other source data. In this manner, the data appears to the user (e.g., in file system browsing windows and the like) as if it still resides in the source location (e.g., in a primary storage device 104 ).
- the stub may include metadata associated with the corresponding data, so that a file system and/or application can provide some information about the data object and/or a limited-functionality version (e.g., a preview) of the data object.
- An HSM copy may be stored in a format other than the native application format (e.g., compressed, encrypted, deduplicated, and/or otherwise modified).
- copies which involve the removal of data from source storage and the maintenance of stub or other logical reference information on source storage may be referred to generally as “on-line archive copies.”
- copies which involve the removal of data from source storage without the maintenance of stub or other logical reference information on source storage may be referred to as “off-line archive copies.” Examples of HSM and ILM techniques are provided in U.S. Pat. No. 7,343,453.
- An auxiliary copy is generally a copy of an existing secondary copy 116 .
- an initial secondary copy 116 may be derived from primary data 112 or from data residing in secondary storage subsystem 118 , whereas an auxiliary copy is generated from the initial secondary copy 116 .
- Auxiliary copies provide additional standby copies of data and may reside on different secondary storage devices 108 than the initial secondary copies 116 .
- auxiliary copies can be used for recovery purposes if initial secondary copies 116 become unavailable. Exemplary auxiliary copy techniques are described in further detail in U.S. Pat. No. 8,230,195.
- System 100 may also make and retain disaster recovery copies, often as secondary, high-availability disk copies.
- System 100 may create secondary copies and store them at disaster recovery locations using auxiliary copy or replication operations, such as continuous data replication technologies.
- disaster recovery locations can be remote from the client computing devices 102 and primary storage devices 104 , remote from some or all of the secondary storage devices 108 , or both.
- Data manipulation and processing may include encryption and compression as well as integrity marking and checking, formatting for transmission, formatting for storage, etc.
- Data may be manipulated “client-side” by data agent 142 as well as “target-side” by media agent 144 in the course of creating secondary copy 116 , or conversely in the course of restoring data from secondary to primary.
- System 100 in some cases is configured to process data (e.g., files or other data objects, primary data 112 , secondary copies 116 , etc.), according to an appropriate encryption algorithm (e.g., Blowfish, Advanced Encryption Standard (AES), Triple Data Encryption Standard (3-DES), etc.) to limit access and provide data security.
- System 100 in some cases encrypts the data at the client level, such that client computing devices 102 (e.g., data agents 142 ) encrypt the data prior to transferring it to other components, e.g., before sending the data to media agents 144 during a secondary copy operation.
- client computing device 102 may maintain or have access to an encryption key or passphrase for decrypting the data upon restore.
- Encryption can also occur when media agent 144 creates auxiliary copies or archive copies. Encryption may be applied in creating a secondary copy 116 of a previously unencrypted secondary copy 116 , without limitation.
- secondary storage devices 108 can implement built-in, high performance hardware-based encryption.
- system 100 may also or alternatively compress data in the course of generating a secondary copy 116 .
- Compression encodes information such that fewer bits are needed to represent the information as compared to the original representation.
- Compression techniques are well known in the art. Compression operations may apply one or more data compression algorithms. Compression may be applied in creating a secondary copy 116 of a previously uncompressed secondary copy, e.g., when making archive copies or disaster recovery copies. The use of compression may result in metadata that specifies the nature of the compression, so that data may be uncompressed on restore if appropriate.
- Data analysis, reporting, and management operations can differ from data movement operations in that they do not necessarily involve copying, migration or other transfer of data between different locations in the system.
- data analysis operations may involve processing (e.g., offline processing) or modification of already stored primary data 112 and/or secondary copies 116 .
- data analysis operations are performed in conjunction with data movement operations.
- Some data analysis operations include content indexing operations and classification operations which can be useful in leveraging data under management to enhance search and other features.
- information management system 100 analyzes and indexes characteristics, content, and metadata associated with primary data 112 (“online content indexing”) and/or secondary copies 116 (“off-line content indexing”).
- Content indexing can identify files or other data objects based on content (e.g., user-defined keywords or phrases, other keywords/phrases that are not defined by a user, etc.), and/or metadata (e.g., email metadata such as “to,” “from,” “cc,” “bcc,” attachment name, received time, etc.).
- Content indexes may be searched and search results may be restored.
- System 100 generally organizes and catalogues the results into a content index, which may be stored within media agent database 152 , for example.
- the content index can also include the storage locations of or pointer references to indexed data in primary data 112 and/or secondary copies 116 .
- Results may also be stored elsewhere in system 100 (e.g., in primary storage device 104 or in secondary storage device 108 ).
- Such content index data provides storage manager 140 or other components with an efficient mechanism for locating primary data 112 and/or secondary copies 116 of data objects that match particular criteria, thus greatly increasing the search speed capability of system 100 .
- search criteria can be specified by a user through user interface 158 of storage manager 140 .
- system 100 analyzes data and/or metadata in secondary copies 116 to create an “off-line content index,” this operation has no significant impact on the performance of client computing devices 102 and thus does not take a toll on the production environment.
- Examples of content indexing techniques are provided in U.S. Pat. No. 8,170,995.
- One or more components can be configured to scan data and/or associated metadata for classification purposes to populate a database (or other data structure) of information, which can be referred to as a “data classification database” or a “metabase.”
- a database or other data structure
- the data classification database(s) can be organized in a variety of different ways, including centralization, logical sub-divisions, and/or physical sub-divisions.
- one or more data classification databases may be associated with different subsystems or tiers within system 100 . As an example, there may be a first metabase associated with primary storage subsystem 117 and a second metabase associated with secondary storage subsystem 118 .
- metabase(s) may be associated with individual components, e.g., client computing devices 102 and/or media agents 144 .
- a data classification database may reside as one or more data structures within management database 146 , may be otherwise associated with storage manager 140 , and/or may reside as a separate component.
- metabase(s) may be included in separate database(s) and/or on separate storage device(s) from primary data 112 and/or secondary copies 116 , such that operations related to the metabase(s) do not significantly impact performance on other components of system 100 .
- metabase(s) may be stored along with primary data 112 and/or secondary copies 116 .
- Files or other data objects can be associated with identifiers (e.g., tag entries, etc.) to facilitate searches of stored data objects.
- identifiers e.g., tag entries, etc.
- the metabase can also allow efficient, automatic identification of files or other data objects to associate with secondary copy or other information management operations.
- a metabase can dramatically improve the speed with which system 100 can search through and identify data as compared to other approaches that involve scanning an entire file system. Examples of metabases and data classification operations are provided in U.S. Pat. Nos. 7,734,669 and 7,747,579.
- Operations management can generally include monitoring and managing the health and performance of system 100 by, without limitation, performing error tracking, generating granular storage/performance metrics (e.g., job success/failure information, deduplication efficiency, etc.), generating storage modeling and costing information, and the like.
- storage manager 140 or another component in system 100 may analyze traffic patterns and suggest and/or automatically route data to minimize congestion.
- the system can generate predictions relating to storage operations or storage operation information. Such predictions, which may be based on a trending analysis, may predict various network operations or resource usage, such as network traffic levels, storage media use, use of bandwidth of communication links, use of media agent components, etc. Further examples of traffic analysis, trend analysis, prediction generation, and the like are described in U.S. Pat. No. 7,343,453.
- a master storage manager 140 may track the status of subordinate cells, such as the status of jobs, system components, system resources, and other items, by communicating with storage managers 140 (or other components) in the respective storage operation cells. Moreover, the master storage manager 140 may also track status by receiving periodic status updates from the storage managers 140 (or other components) in the respective cells regarding jobs, system components, system resources, and other items. In some embodiments, a master storage manager 140 may store status information and other information regarding its associated storage operation cells and other system information in its management database 146 and/or index 150 (or in another location).
- the master storage manager 140 or other component may also determine whether certain storage-related or other criteria are satisfied, and may perform an action or trigger event (e.g., data migration) in response to the criteria being satisfied, such as where a storage threshold is met for a particular volume, or where inadequate protection exists for certain data. For instance, data from one or more storage operation cells is used to dynamically and automatically mitigate recognized risks, and/or to advise users of risks or suggest actions to mitigate these risks.
- an action or trigger event e.g., data migration
- an information management policy may specify certain requirements (e.g., that a storage device should maintain a certain amount of free space, that secondary copies should occur at a particular interval, that data should be aged and migrated to other storage after a particular period, that data on a secondary volume should always have a certain level of availability and be restorable within a given time period, that data on a secondary volume may be mirrored or otherwise migrated to a specified number of other volumes, etc.). If a risk condition or other criterion is triggered, the system may notify the user of these conditions and may suggest (or automatically implement) a mitigation action to address the risk.
- certain requirements e.g., that a storage device should maintain a certain amount of free space, that secondary copies should occur at a particular interval, that data should be aged and migrated to other storage after a particular period, that data on a secondary volume should always have a certain level of availability and be restorable within a given time period, that data on a secondary volume may be mirrored or otherwise migrated to a specified number
- the system may indicate that data from a primary copy 112 should be migrated to a secondary storage device 108 to free up space on primary storage device 104 .
- risk factors examples include, but not limited to, risk factors, risk factors, and other triggering criteria.
- system 100 may also determine whether a metric or other indication satisfies particular storage criteria sufficient to perform an action.
- a storage policy or other definition might indicate that a storage manager 140 should initiate a particular action if a storage metric or other indication drops below or otherwise fails to satisfy specified criteria such as a threshold of data protection.
- risk factors may be quantified into certain measurable service or risk levels. For example, certain applications and associated data may be considered to be more important relative to other data and services. Financial compliance data, for example, may be of greater importance than marketing materials, etc. Network administrators may assign priority values or “weights” to certain data and/or applications corresponding to the relative importance. The level of compliance of secondary copy operations specified for these applications may also be assigned a certain value.
- the health, impact, and overall importance of a service may be determined, such as by measuring the compliance value and calculating the product of the priority value and the compliance value to determine the “service level” and comparing it to certain operational thresholds to determine whether it is acceptable. Further examples of the service level determination are provided in U.S. Pat. No. 7,343,453.
- System 100 may additionally calculate data costing and data availability associated with information management operation cells. For instance, data received from a cell may be used in conjunction with hardware-related information and other information about system elements to determine the cost of storage and/or the availability of particular data. Exemplary information generated could include how fast a particular department is using up available storage space, how long data would take to recover over a particular pathway from a particular secondary storage device, costs over time, etc. Moreover, in some embodiments, such information may be used to determine or predict the overall cost associated with the storage of certain information. The cost associated with hosting a certain application may be based, at least in part, on the type of media on which the data resides, for example. Storage devices may be assigned to a particular cost categories, for example. Further examples of costing techniques are described in U.S. Pat. No. 7,343,453.
- Report types may include: scheduling, event management, media management and data aging. Available reports may also include backup history, data aging history, auxiliary copy history, job history, library and drive, media in library, restore history, and storage policy, etc., without limitation. Such reports may be specified and created at a certain point in time as a system analysis, forecasting, or provisioning tool. Integrated reports may also be generated that illustrate storage and performance metrics, risks and storage costing information. Moreover, users may create their own reports based on specific needs.
- User interface 158 can include an option to graphically depict the various components in the system using appropriate icons. As one example, user interface 158 may provide a graphical depiction of primary storage devices 104 , secondary storage devices 108 , data agents 142 and/or media agents 144 , and their relationship to one another in system 100 .
- the operations management functionality of system 100 can facilitate planning and decision-making. For example, in some embodiments, a user may view the status of some or all jobs as well as the status of each component of information management system 100 . Users may then plan and make decisions based on this data. For instance, a user may view high-level information regarding secondary copy operations for system 100 , such as job status, component status, resource status (e.g., communication pathways, etc.), and other information. The user may also drill down or use other means to obtain more detailed information regarding a particular component, job, or the like. Further examples are provided in U.S. Pat. No. 7,343,453.
- System 100 can also be configured to perform system-wide e-discovery operations in some embodiments.
- e-discovery operations provide a unified collection and search capability for data in the system, such as data stored in secondary storage devices 108 (e.g., backups, archives, or other secondary copies 116 ).
- system 100 may construct and maintain a virtual repository for data stored in system 100 that is integrated across source applications 110 , different storage device types, etc.
- e-discovery utilizes other techniques described herein, such as data classification and/or content indexing.
- An information management policy 148 can include a data structure or other information source that specifies a set of parameters (e.g., criteria and rules) associated with secondary copy and/or other information management operations.
- a storage policy generally comprises a data structure or other information source that defines (or includes information sufficient to determine) a set of preferences or other criteria for performing information management operations.
- Storage policies can include one or more of the following: (1) what data will be associated with the storage policy, e.g., subclient; (2) a destination to which the data will be stored; (3) datapath information specifying how the data will be communicated to the destination; (4) the type of secondary copy operation to be performed; and (5) retention information specifying how long the data will be retained at the destination (see, e.g., FIG. 1E ).
- Data associated with a storage policy can be logically organized into subclients, which may represent primary data 112 and/or secondary copies 116 .
- a subclient may represent static or dynamic associations of portions of a data volume.
- Subclients may represent mutually exclusive portions. Thus, in certain embodiments, a portion of data may be given a label and the association is stored as a static entity in an index, database or other storage location.
- Subclients may also be used as an effective administrative scheme of organizing data according to data type, department within the enterprise, storage preferences, or the like. Depending on the configuration, subclients can correspond to files, folders, virtual machines, databases, etc. In one exemplary scenario, an administrator may find it preferable to separate e-mail data from financial data using two different subclients.
- a storage policy can define where data is stored by specifying a target or destination storage device (or group of storage devices). For instance, where the secondary storage device 108 includes a group of disk libraries, the storage policy may specify a particular disk library for storing the subclients associated with the policy. As another example, where the secondary storage devices 108 include one or more tape libraries, the storage policy may specify a particular tape library for storing the subclients associated with the storage policy, and may also specify a drive pool and a tape pool defining a group of tape drives and a group of tapes, respectively, for use in storing the subclient data. While information in the storage policy can be statically assigned in some cases, some or all of the information in the storage policy can also be dynamically determined based on criteria set forth in the storage policy.
- a particular destination storage device(s) or other parameter of the storage policy may be determined based on characteristics associated with the data involved in a particular secondary copy operation, device availability (e.g., availability of a secondary storage device 108 or a media agent 144 ), network status and conditions (e.g., identified bottlenecks), user credentials, and the like.
- Datapath information can also be included in the storage policy.
- the storage policy may specify network pathways and components to utilize when moving the data to the destination storage device(s).
- the storage policy specifies one or more media agents 144 for conveying data associated with the storage policy between the source and destination.
- a storage policy can also specify the type(s) of associated operations, such as backup, archive, snapshot, auxiliary copy, or the like.
- retention parameters can specify how long the resulting secondary copies 116 will be kept (e.g., a number of days, months, years, etc.), perhaps depending on organizational needs and/or compliance criteria.
- system 100 automatically applies a default configuration to client computing device 102 .
- the installation script may register the client computing device 102 with storage manager 140 , which in turn applies the default configuration to the new client computing device 102 . In this manner, data protection operations can begin substantially immediately.
- the default configuration can include a default storage policy, for example, and can specify any appropriate information sufficient to begin data protection operations. This can include a type of data protection operation, scheduling information, a target secondary storage device 108 , data path information (e.g., a particular media agent 144 ), and the like.
- Scheduling policy 148 Another type of information management policy 148 is a “scheduling policy,” which specifies when and how often to perform operations. Scheduling parameters may specify with what frequency (e.g., hourly, weekly, daily, event-based, etc.) or under what triggering conditions secondary copy or other information management operations are to take place. Scheduling policies in some cases are associated with particular components, such as a subclient, client computing device 102 , and the like.
- an audit policy (or “security policy”), which comprises preferences, rules and/or criteria that protect sensitive data in system 100 .
- an audit policy may define “sensitive objects” which are files or data objects that contain particular keywords (e.g., “confidential,” or “privileged”) and/or are associated with particular keywords (e.g., in metadata) or particular flags (e.g., in metadata identifying a document or email as personal, confidential, etc.).
- An audit policy may further specify rules for handling sensitive objects.
- an audit policy may require that a reviewer approve the transfer of any sensitive objects to a cloud storage site, and that if approval is denied for a particular sensitive object, the sensitive object should be transferred to a local primary storage device 104 instead.
- the audit policy may further specify how a secondary storage computing device 106 or other system component should notify a reviewer that a sensitive object is slated for transfer.
- provisioning policy can include preferences, priorities, rules, and/or criteria that specify how client computing devices 102 (or groups thereof) may utilize system resources, such as available storage on cloud storage and/or network bandwidth.
- a provisioning policy specifies, for example, data quotas for particular client computing devices 102 (e.g., a number of gigabytes that can be stored monthly, quarterly or annually).
- Storage manager 140 or other components may enforce the provisioning policy. For instance, media agents 144 may enforce the policy when transferring data to secondary storage devices 108 . If a client computing device 102 exceeds a quota, a budget for the client computing device 102 (or associated department) may be adjusted accordingly or an alert may trigger.
- information management policies 148 are described as separate policies, one or more of these can be generally combined into a single information management policy 148 .
- a storage policy may also include or otherwise be associated with one or more scheduling, audit, or provisioning policies or operational parameters thereof.
- storage policies are typically associated with moving and storing data, other policies may be associated with other types of information management operations. The following is a non-exhaustive list of items that information management policies 148 may specify:
- Information management policies 148 can additionally specify or depend on historical or current criteria that may be used to determine which rules to apply to a particular data object, system component, or information management operation, such as:
- FIG. 1E includes a data flow diagram depicting performance of secondary copy operations by an embodiment of information management system 100 , according to an exemplary storage policy 148 A.
- System 100 includes a storage manager 140 , a client computing device 102 having a file system data agent 142 A and an email data agent 142 B operating thereon, a primary storage device 104 , two media agents 144 A, 144 B, and two secondary storage devices 108 : a disk library 108 A and a tape library 108 B.
- primary storage device 104 includes primary data 112 A, which is associated with a logical grouping of data associated with a file system (“file system subclient”), and primary data 112 B, which is a logical grouping of data associated with email (“email subclient”).
- file system subclient file system subclient
- email subclient email subclient
- the second media agent 144 B and tape library 108 B are “off-site,” and may be remotely located from the other components in system 100 (e.g., in a different city, office building, etc.).
- off-site may refer to a magnetic tape located in remote storage, which must be manually retrieved and loaded into a tape drive to be read.
- information stored on the tape library 108 B may provide protection in the event of a disaster or other failure at the main site(s) where data is stored.
- the file system subclient 112 A in certain embodiments generally comprises information generated by the file system and/or operating system of client computing device 102 , and can include, for example, file system data (e.g., regular files, file tables, mount points, etc.), operating system data (e.g., registries, event logs, etc.), and the like.
- the e-mail subclient 112 B can include data generated by an e-mail application operating on client computing device 102 , e.g., mailbox information, folder information, emails, attachments, associated database information, and the like.
- the subclients can be logical containers, and the data included in the corresponding primary data 112 A and 112 B may or may not be stored contiguously.
- the exemplary storage policy 148 A includes backup copy preferences or rule set 160 , disaster recovery copy preferences or rule set 162 , and compliance copy preferences or rule set 164 .
- Backup copy rule set 160 specifies that it is associated with file system subclient 166 and email subclient 168 . Each of subclients 166 and 168 are associated with the particular client computing device 102 .
- Backup copy rule set 160 further specifies that the backup operation will be written to disk library 108 A and designates a particular media agent 144 A to convey the data to disk library 108 A.
- backup copy rule set 160 specifies that backup copies created according to rule set 160 are scheduled to be generated hourly and are to be retained for 30 days. In some other embodiments, scheduling information is not included in storage policy 148 A and is instead specified by a separate scheduling policy.
- Disaster recovery copy rule set 162 is associated with the same two subclients 166 and 168 . However, disaster recovery copy rule set 162 is associated with tape library 108 B, unlike backup copy rule set 160 . Moreover, disaster recovery copy rule set 162 specifies that a different media agent, namely 144 B, will convey data to tape library 108 B. Disaster recovery copies created according to rule set 162 will be retained for 60 days and will be generated daily. Disaster recovery copies generated according to disaster recovery copy rule set 162 can provide protection in the event of a disaster or other catastrophic data loss that would affect the backup copy 116 A maintained on disk library 108 A.
- Compliance copy rule set 164 is only associated with the email subclient 168 , and not the file system subclient 166 . Compliance copies generated according to compliance copy rule set 164 will therefore not include primary data 112 A from the file system subclient 166 . For instance, the organization may be under an obligation to store and maintain copies of email data for a particular period of time (e.g., 10 years) to comply with state or federal regulations, while similar regulations do not apply to file system data. Compliance copy rule set 164 is associated with the same tape library 108 B and media agent 144 B as disaster recovery copy rule set 162 , although a different storage device or media agent could be used in other embodiments. Finally, compliance copy rule set 164 specifies that the copies it governs will be generated quarterly and retained for 10 years.
- a logical grouping of secondary copy operations governed by a rule set and being initiated at a point in time may be referred to as a “secondary copy job” (and sometimes may be called a “backup job,” even though it is not necessarily limited to creating only backup copies). Secondary copy jobs may be initiated on demand as well. Steps 1 - 9 below illustrate three secondary copy jobs based on storage policy 148 A.
- storage manager 140 initiates a backup job according to the backup copy rule set 160 , which logically comprises all the secondary copy operations necessary to effectuate rules 160 in storage policy 148 A every hour, including steps 1 - 4 occurring hourly.
- a scheduling service running on storage manager 140 accesses backup copy rule set 160 or a separate scheduling policy associated with client computing device 102 and initiates a backup job on an hourly basis.
- storage manager 140 sends instructions to client computing device 102 (i.e., to both data agent 142 A and data agent 142 B) to begin the backup job.
- file system data agent 142 A and email data agent 142 B on client computing device 102 respond to instructions from storage manager 140 by accessing and processing the respective subclient primary data 112 A and 112 B involved in the backup copy operation, which can be found in primary storage device 104 .
- the data agent(s) 142 A, 142 B may format the data into a backup format or otherwise process the data suitable for a backup copy.
- client computing device 102 communicates the processed file system data (e.g., using file system data agent 142 A) and the processed email data (e.g., using email data agent 142 B) to the first media agent 144 A according to backup copy rule set 160 , as directed by storage manager 140 .
- Storage manager 140 may further keep a record in management database 146 of the association between media agent 144 A and one or more of: client computing device 102 , file system subclient 112 A, file system data agent 142 A, email subclient 112 B, email data agent 142 B, and/or backup copy 116 A.
- the target media agent 144 A receives the data-agent-processed data from client computing device 102 , and at step 4 generates and conveys backup copy 116 A to disk library 108 A to be stored as backup copy 116 A, again at the direction of storage manager 140 and according to backup copy rule set 160 .
- Media agent 144 A can also update its index 153 to include data and/or metadata related to backup copy 116 A, such as information indicating where the backup copy 116 A resides on disk library 108 A, where the email copy resides, where the file system copy resides, data and metadata for cache retrieval, etc.
- Storage manager 140 may similarly update its index 150 to include information relating to the secondary copy operation, such as information relating to the type of operation, a physical location associated with one or more copies created by the operation, the time the operation was performed, status information relating to the operation, the components involved in the operation, and the like. In some cases, storage manager 140 may update its index 150 to include some or all of the information stored in index 153 of media agent 144 A. At this point, the backup job may be considered complete. After the 30-day retention period expires, storage manager 140 instructs media agent 144 A to delete backup copy 116 A from disk library 108 A and indexes 150 and/or 153 are updated accordingly.
- step 5 storage manager 140 initiates another backup job for a disaster recovery copy according to the disaster recovery rule set 162 .
- disaster recovery copy 116 B is based on backup copy 116 A and not on primary data 112 A and 112 B.
- the specified media agent 144 B retrieves the most recent backup copy 116 A from disk library 108 A.
- disaster recovery copy 116 B is a direct, mirror copy of backup copy 116 A, and remains in the backup format.
- disaster recovery copy 116 B may be further compressed or encrypted, or may be generated in some other manner, such as by using primary data 112 A and 112 B from primary storage device 104 as sources.
- the disaster recovery copy operation is initiated once a day and disaster recovery copies 116 B are deleted after 60 days; indexes 153 and/or 150 are updated accordingly when/after each information management operation is executed and/or completed.
- the present backup job may be considered completed.
- storage manager 140 initiates another backup job according to compliance rule set 164 , which performs steps 8 - 9 quarterly to create compliance copy 116 C. For instance, storage manager 140 instructs media agent 144 B to create compliance copy 116 C on tape library 108 B, as specified in the compliance copy rule set 164 .
- compliance copy 116 C is generated using disaster recovery copy 1166 as the source. This is efficient, because disaster recovery copy resides on the same secondary storage device and thus no network resources are required to move the data.
- compliance copy 116 C is instead generated using primary data 112 B corresponding to the email subclient or using backup copy 116 A from disk library 108 A as source data.
- compliance copies 116 C are created quarterly, and are deleted after ten years, and indexes 153 and/or 150 are kept up-to-date accordingly.
- storage manager 140 may permit a user to specify aspects of storage policy 148 A.
- the storage policy can be modified to include information governance policies to define how data should be managed in order to comply with a certain regulation or business objective.
- the various policies may be stored, for example, in management database 146 .
- An information governance policy may align with one or more compliance tasks that are imposed by regulations or business requirements. Examples of information governance policies might include a Sarbanes-Oxley policy, a HIPAA policy, an electronic discovery (e-discovery) policy, and so on.
- Information governance policies allow administrators to obtain different perspectives on an organization's online and offline data, without the need for a dedicated data silo created solely for each different viewpoint.
- the data storage systems herein build an index that reflects the contents of a distributed data set that spans numerous clients and storage devices, including both primary data and secondary copies, and online and offline copies.
- An organization may apply multiple information governance policies in a top-down manner over that unified data set and indexing schema in order to view and manipulate the data set through different lenses, each of which is adapted to a particular compliance or business goal.
- An information governance policy may comprise a classification policy, which defines a taxonomy of classification terms or tags relevant to a compliance task and/or business objective.
- a classification policy may also associate a defined tag with a classification rule.
- a classification rule defines a particular combination of criteria, such as users who have created, accessed or modified a document or data object; file or application types; content or metadata keywords; clients or storage locations; dates of data creation and/or access; review status or other status within a workflow (e.g., reviewed or un-reviewed); modification times or types of modifications; and/or any other data attributes in any combination, without limitation.
- a classification rule may also be defined using other classification tags in the taxonomy.
- an e-discovery classification policy might define a classification tag “privileged” that is associated with documents or data objects that (1) were created or modified by legal department staff, or (2) were sent to or received from outside counsel via email, or (3) contain one of the following keywords: “privileged” or “attorney” or “counsel,” or other like terms. Accordingly, all these documents or data objects will be classified as “privileged.”
- An entity tag may be, for example, any content that matches a defined data mask format.
- entity tags might include, e.g., social security numbers (e.g., any numerical content matching the formatting mask XXX-XX-XXX), credit card numbers (e.g., content having a 13-16 digit string of numbers), SKU numbers, product numbers, etc.
- a user may define a classification policy by indicating criteria, parameters or descriptors of the policy via a graphical user interface, such as a form or page with fields to be filled in, pull-down menus or entries allowing one or more of several options to be selected, buttons, sliders, hypertext links or other known user interface tools for receiving user input, etc.
- a user may define certain entity tags, such as a particular product number or project ID.
- the classification policy can be implemented using cloud-based techniques.
- the storage devices may be cloud storage devices, and the storage manager 140 may execute cloud service provider API over a network to classify data stored on cloud storage devices.
- a restore operation can be initiated involving one or more of secondary copies 116 A, 116 B, and 116 C.
- a restore operation logically takes a selected secondary copy 116 , reverses the effects of the secondary copy operation that created it, and stores the restored data to primary storage where a client computing device 102 may properly access it as primary data.
- a media agent 144 and an appropriate data agent 142 e.g., executing on the client computing device 102 ) perform the tasks needed to complete a restore operation.
- data that was encrypted, compressed, and/or deduplicated in the creation of secondary copy 116 will be correspondingly rehydrated (reversing deduplication), uncompressed, and unencrypted into a format appropriate to primary data.
- Metadata stored within or associated with the secondary copy 116 may be used during the restore operation.
- restored data should be indistinguishable from other primary data 112 .
- the restored data has fully regained the native format that may make it immediately usable by application 110 .
- a user may manually initiate a restore of backup copy 116 A, e.g., by interacting with user interface 158 of storage manager 140 or with a web-based console with access to system 100 .
- Storage manager 140 may accesses data in its index 150 and/or management database 146 (and/or the respective storage policy 148 A) associated with the selected backup copy 116 A to identify the appropriate media agent 144 A and/or secondary storage device 108 A where the secondary copy resides.
- the user may be presented with a representation (e.g., stub, thumbnail, listing, etc.) and metadata about the selected secondary copy, in order to determine whether this is the appropriate copy to be restored, e.g., date that the original primary data was created.
- Storage manager 140 will then instruct media agent 144 A and an appropriate data agent 142 on the target client computing device 102 to restore secondary copy 116 A to primary storage device 104 .
- a media agent may be selected for use in the restore operation based on a load balancing algorithm, an availability based algorithm, or other criteria.
- the selected media agent e.g., 144 A, retrieves secondary copy 116 A from disk library 108 A. For instance, media agent 144 A may access its index 153 to identify a location of backup copy 116 A on disk library 108 A, or may access location information residing on disk library 108 A itself.
- a backup copy 116 A that was recently created or accessed may be cached to speed up the restore operation.
- media agent 144 A accesses a cached version of backup copy 116 A residing in index 153 , without having to access disk library 108 A for some or all of the data.
- the media agent 144 A communicates the data to the requesting client computing device 102 .
- file system data agent 142 A and email data agent 142 B may unpack (e.g., restore from a backup format to the native application format) the data in backup copy 116 A and restore the unpackaged data to primary storage device 104 .
- secondary copies 116 may be restored to the same volume or folder in primary storage device 104 from which the secondary copy was derived; to another storage location or client computing device 102 ; to shared storage, etc.
- the data may be restored so that it may be used by an application 110 of a different version/vintage from the application that created the original primary data 112 .
- secondary copies 116 can vary depending on the embodiment.
- secondary copies 116 are formatted as a series of logical data units or “chunks” (e.g., 512 MB, 1 GB, 2 GB, 4 GB, or 8 GB chunks). This can facilitate efficient communication and writing to secondary storage devices 108 , e.g., according to resource availability. For example, a single secondary copy 116 may be written on a chunk-by-chunk basis to one or more secondary storage devices 108 .
- users can select different chunk sizes, e.g., to improve throughput to tape storage devices.
- each chunk can include a header and a payload.
- the payload can include files (or other data units) or subsets thereof included in the chunk, whereas the chunk header generally includes metadata relating to the chunk, some or all of which may be derived from the payload.
- media agent 144 , storage manager 140 , or other component may divide files into chunks and generate headers for each chunk by processing the files.
- Headers can include a variety of information such as file and/or volume identifier(s), offset(s), and/or other information associated with the payload data items, a chunk sequence number, etc.
- chunk headers can also be stored to index 153 of the associated media agent(s) 144 and/or to index 150 associated with storage manager 140 . This can be useful for providing faster processing of secondary copies 116 during browsing, restores, or other operations.
- the secondary storage device 108 returns an indication of receipt, e.g., to media agent 144 and/or storage manager 140 , which may update their respective indexes 153 , 150 accordingly.
- chunks may be processed (e.g., by media agent 144 ) according to the information in the chunk header to reassemble the files.
- Data can also be communicated within system 100 in data channels that connect client computing devices 102 to secondary storage devices 108 .
- These data channels can be referred to as “data streams,” and multiple data streams can be employed to parallelize an information management operation, improving data transfer rate, among other advantages.
- Example data formatting techniques including techniques involving data streaming, chunking, and the use of other data structures in creating secondary copies are described in U.S. Pat. Nos. 7,315,923, 8,156,086, and 8,578,120.
- FIGS. 1F and 1G are diagrams of example data streams 170 and 171 , respectively, which may be employed for performing information management operations.
- data agent 142 forms data stream 170 from source data associated with a client computing device 102 (e.g., primary data 112 ).
- Data stream 170 is composed of multiple pairs of stream header 172 and stream data (or stream payload) 174 .
- Data streams 170 and 171 shown in the illustrated example are for a single-instanced storage operation, and a stream payload 174 therefore may include both single-instance (SI) data and/or non-SI data.
- a stream header 172 includes metadata about the stream payload 174 .
- This metadata may include, for example, a length of the stream payload 174 , an indication of whether the stream payload 174 is encrypted, an indication of whether the stream payload 174 is compressed, an archive file identifier (ID), an indication of whether the stream payload 174 is single instanceable, and an indication of whether the stream payload 174 is a start of a block of data.
- ID archive file identifier
- data stream 171 has the stream header 172 and stream payload 174 aligned into multiple data blocks.
- the data blocks are of size 64 KB.
- the first two stream header 172 and stream payload 174 pairs comprise a first data block of size 64 KB.
- the first stream header 172 indicates that the length of the succeeding stream payload 174 is 63 KB and that it is the start of a data block.
- the next stream header 172 indicates that the succeeding stream payload 174 has a length of 1 KB and that it is not the start of a new data block.
- Immediately following stream payload 174 is a pair comprising an identifier header 176 and identifier data 178 .
- the identifier header 176 includes an indication that the succeeding identifier data 178 includes the identifier for the immediately previous data block.
- the identifier data 178 includes the identifier that the data agent 142 generated for the data block.
- the data stream 171 also includes other stream header 172 and stream payload 174 pairs, which may be for SI data and/or non-SI data.
- FIG. 1H is a diagram illustrating data structures 180 that may be used to store blocks of SI data and non-SI data on a storage device (e.g., secondary storage device 108 ).
- data structures 180 do not form part of a native file system of the storage device.
- Data structures 180 include one or more volume folders 182 , one or more chunk folders 184 / 185 within the volume folder 182 , and multiple files within chunk folder 184 .
- Each chunk folder 184 / 185 includes a metadata file 186 / 187 , a metadata index file 188 / 189 , one or more container files 190 / 191 / 193 , and a container index file 192 / 194 .
- Metadata file 186 / 187 stores non-SI data blocks as well as links to SI data blocks stored in container files.
- Metadata index file 188 / 189 stores an index to the data in the metadata file 186 / 187 .
- Container files 190 / 191 / 193 store SI data blocks.
- Container index file 192 / 194 stores an index to container files 190 / 191 / 193 .
- container index file 192 / 194 stores an indication of whether a corresponding block in a container file 190 / 191 / 193 is referred to by a link in a metadata file 186 / 187 .
- data block B 2 in the container file 190 is referred to by a link in metadata file 187 in chunk folder 185 .
- the corresponding index entry in container index file 192 indicates that data block B 2 in container file 190 is referred to.
- data block B 1 in container file 191 is referred to by a link in metadata file 187 , and so the corresponding index entry in container index file 192 indicates that this data block is referred to.
- data structures 180 illustrated in FIG. 1H may have been created as a result of separate secondary copy operations involving two client computing devices 102 .
- a first secondary copy operation on a first client computing device 102 could result in the creation of the first chunk folder 184
- a second secondary copy operation on a second client computing device 102 could result in the creation of the second chunk folder 185 .
- Container files 190 / 191 in the first chunk folder 184 would contain the blocks of SI data of the first client computing device 102 .
- the second secondary copy operation on the data of the second client computing device 102 would result in media agent 144 storing primarily links to the data blocks of the first client computing device 102 that are already stored in the container files 190 / 191 . Accordingly, while a first secondary copy operation may result in storing nearly all of the data subject to the operation, subsequent secondary storage operations involving similar data may result in substantial data storage space savings, because links to already stored data blocks can be stored instead of additional instances of data blocks.
- a sparse file is a type of file that may include empty space (e.g., a sparse file may have real data within it, such as at the beginning of the file and/or at the end of the file, but may also have empty space in it that is not storing actual data, such as a contiguous range of bytes all having a value of zero).
- container files 190 / 191 / 193 be sparse files allows media agent 144 to free up space in container files 190 / 191 / 193 when blocks of data in container files 190 / 191 / 193 no longer need to be stored on the storage devices.
- media agent 144 creates a new container file 190 / 191 / 193 when a container file 190 / 191 / 193 either includes 100 blocks of data or when the size of the container file 190 exceeds 50 MB.
- media agent 144 creates a new container file 190 / 191 / 193 when a container file 190 / 191 / 193 satisfies other criteria (e.g., it contains from approx.
- a file on which a secondary copy operation is performed may comprise a large number of data blocks.
- a 100 MB file may comprise 400 data blocks of size 256 KB. If such a file is to be stored, its data blocks may span more than one container file, or even more than one chunk folder.
- a database file of 20 GB may comprise over 40,000 data blocks of size 512 KB. If such a database file is to be stored, its data blocks will likely span multiple container files, multiple chunk folders, and potentially multiple volume folders. Restoring such files may require accessing multiple container files, chunk folders, and/or volume folders to obtain the requisite data blocks.
- FIG. 2A illustrates a system 200 configured to address these and other issues by using backup or other secondary copy data to synchronize a source subsystem 201 (e.g., a production site) with a destination subsystem 203 (e.g., a failover site).
- a source subsystem 201 e.g., a production site
- a destination subsystem 203 e.g., a failover site
- live synchronization and/or “live synchronization replication.”
- the source client computing devices 202 a include one or more virtual machines (or “VMs”) executing on one or more corresponding VM host computers 205 A, 205 B though the source need not be virtualized.
- the destination site 203 may be at a location that is remote from the production site 201 , or may be located in the same data center, without limitation.
- One or more of the production site 201 and destination site 203 may reside at data centers at known geographic locations, or alternatively may operate “in the cloud.”
- FIG. 2A illustrates an embodiment of a data flow which may be orchestrated at the direction of one or more storage managers (not shown).
- the source data agent(s) 242 a and source media agent(s) 244 a work together to write backup or other secondary copies of the primary data generated by the source client computing devices 202 a into the source secondary storage device(s) 208 a .
- the backup/secondary copies are retrieved by the source media agent(s) 244 a from secondary storage.
- source media agent(s) 244 a communicate the backup/secondary copies across a network to the destination media agent(s) 244 b in destination subsystem 203 .
- the data can be copied from source to destination in an incremental fashion, such that only changed blocks are transmitted, and in some cases multiple incremental backups are consolidated at the source so that only the most current changed blocks are transmitted to and applied at the destination.
- An example of live synchronization of virtual machines using the “incremental forever” approach is found in U.S. Patent Application No. 62/265,339 entitled “Live Synchronization and Management of Virtual Machines across Computing and Virtualization Platforms and Using Live Synchronization to Support Disaster Recovery.”
- a deduplicated copy can be employed to further reduce network traffic from source to destination.
- the system can utilize the deduplicated copy techniques described in U.S. Pat. No. 9,239,687, entitled “Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations.”
- destination media agent(s) 244 b write the received backup/secondary copy data to the destination secondary storage device(s) 208 b .
- the synchronization is completed when the destination media agent(s) and destination data agent(s) 242 b restore the backup/secondary copy data to the destination client computing device(s) 202 b .
- the destination client computing device(s) 202 b may be kept “warm” awaiting activation in case failure is detected at the source.
- This synchronization/replication process can incorporate the techniques described in U.S. patent application Ser. No. 14/721,971, entitled “Replication Using Deduplicated Secondary Copy Data.”
- the synchronized copies can be viewed as mirror or replication copies.
- the production site 201 is not burdened with the synchronization operations. Because the destination site 203 can be maintained in a synchronized “warm” state, the downtime for switching over from the production site 201 to the destination site 203 is substantially less than with a typical restore from secondary storage.
- the production site 201 may flexibly and efficiently fail over, with minimal downtime and with relatively up-to-date data, to a destination site 203 , such as a cloud-based failover site.
- the destination site 203 can later be reverse synchronized back to the production site 201 , such as after repairs have been implemented or after the failure has passed.
- FIG. 2B illustrates an information management system 200 having an architecture that provides such advantages, and incorporates use of a standard file system protocol between primary and secondary storage subsystems 217 , 218 .
- NFS network file system
- CIFS Common Internet File System
- data agent 242 can co-reside with media agent 244 on the same server (e.g., a secondary storage computing device such as component 106 ), or in some other location in secondary storage subsystem 218 .
- server e.g., a secondary storage computing device such as component 106
- secondary storage subsystem 218 allocates an NFS network path to the client computing device 202 or to one or more target applications 210 running on client computing device 202 .
- the client computing device 202 mounts the designated NFS path and writes data to that NFS path.
- the NFS path may be obtained from NFS path data 215 stored locally at the client computing device 202 , and which may be a copy of or otherwise derived from NFS path data 219 stored in the secondary storage subsystem 218 .
- Storage manager 240 can include a pseudo-client manager 217 , which coordinates the process by, among other things, communicating information relating to client computing device 202 and application 210 (e.g., application type, client computing device identifier, etc.) to data agent 242 , obtaining appropriate NFS path data from the data agent 242 (e.g., NFS path information), and delivering such data to client computing device 202 .
- information relating to client computing device 202 and application 210 e.g., application type, client computing device identifier, etc.
- NFS path data e.g., NFS path information
- client computing device 202 reads from the designated NFS network path, and the read request is translated by data agent 242 .
- the data agent 242 then works with media agent 244 to retrieve, re-process (e.g., re-hydrate, decompress, decrypt), and forward the requested data to client computing device 202 using NFS.
- re-process e.g., re-hydrate, decompress, decrypt
- the architecture effectively decouples the client computing devices 202 from the installed components of system 200 , improving both scalability and plug-ability of system 200 .
- the secondary storage subsystem 218 in such environments can be treated simply as a read/write NFS target for primary storage subsystem 217 , without the need for information management software to be installed on client computing devices 202 .
- an enterprise implementing a cloud production computing environment can add VM client computing devices 202 without installing and configuring specialized information management software on these VMs. Rather, backups and restores are achieved transparently, where the new VMs simply write to and read from the designated NFS path.
- FIG. 2C shows a block diagram of an example of a highly scalable, managed data pool architecture useful in accommodating such data growth.
- the illustrated system 200 which may be referred to as a “web-scale” architecture according to certain embodiments, can be readily incorporated into both open compute/storage and common-cloud architectures.
- the illustrated system 200 includes a grid 245 of media agents 244 logically organized into a control tier 231 and a secondary or storage tier 233 .
- Media agents assigned to the storage tier 233 can be configured to manage a secondary storage pool 208 as a deduplication store, and be configured to receive client write and read requests from the primary storage subsystem 217 , and direct those requests to the secondary tier 233 for servicing.
- media agents CMA 1 -CMA 3 in the control tier 231 maintain and consult one or more deduplication databases 247 , which can include deduplication information (e.g., data block hashes, data block links, file containers for deduplicated files, etc.) sufficient to read deduplicated files from secondary storage pool 208 and write deduplicated files to secondary storage pool 208 .
- deduplication information e.g., data block hashes, data block links, file containers for deduplicated files, etc.
- system 200 can incorporate any of the deduplication systems and methods shown and described in U.S. Pat. No. 9,020,900, entitled “Distributed Deduplicated Storage System,” and U.S. Pat. Pub. No. 2014/0201170, entitled “High Availability Distributed Deduplicated Storage System.”
- Media agents SMA 1 -SMA 6 assigned to the secondary tier 233 receive write and read requests from media agents CMA 1 -CMA 3 in control tier 231 , and access secondary storage pool 208 to service those requests.
- Media agents CMA 1 -CMA 3 in control tier 231 can also communicate with secondary storage pool 208 , and may execute read and write requests themselves (e.g., in response to requests from other control media agents CMA 1 -CMA 3 ) in addition to issuing requests to media agents in secondary tier 233 .
- deduplication database(s) 247 can in some cases reside in storage devices in secondary storage pool 208 .
- each of the media agents 244 (e.g., CMA 1 -CMA 3 , SMA 1 -SMA 6 , etc.) in grid 245 can be allocated a corresponding dedicated partition CMA 1 PARTITION 251 A through SMAN PARTITION 251 N, respectively, in secondary storage pool 208 .
- Each partition 251 can include a first portion 253 containing data associated with (e.g., stored by) media agent 244 corresponding to the respective partition 251 .
- System 200 can also implement a desired level of replication, thereby providing redundancy in the event of a failure of a media agent 244 in grid 245 .
- each partition 251 can further include a second portion 255 storing one or more replication copies of the data associated with one or more other media agents 244 in the grid.
- System 200 can also be configured to allow for seamless addition of media agents 244 to grid 245 via automatic configuration.
- a storage manager (not shown) or other appropriate component may determine that it is appropriate to add an additional node to control tier 231 , and perform some or all of the following: (i) assess the capabilities of a newly added or otherwise available computing device as satisfying a minimum criteria to be configured as or hosting a media agent in control tier 231 ; (ii) confirm that a sufficient amount of the appropriate type of storage exists to support an additional node in control tier 231 (e.g., enough disk drive capacity exists in storage pool 208 to support an additional deduplication database 247 ); (iii) install appropriate media agent software on the computing device and configure the computing device according to a pre-determined template; (iv) establish a partition 251 in the storage pool 208 dedicated to the newly established media agent 244 ; and (v) build any appropriate data structures (e.g., an instance of deduplication database 247 ).
- FIGS. 2A, 2B, and 2C may be implemented in any combination and permutation to satisfy data storage management and information management needs at one or more locations and/or data centers.
- FIGS. 3A-6C describe various embodiments of information management systems and methods for using data block signatures to monitor activity in the system. The embodiments are sometimes described in the context of the information management systems 100 of FIGS. 1A-1E , but are compatible with any of the information management systems described herein, including the information management systems 200 of FIGS. 2A-2C .
- data block signatures provide an efficient way to reference larger blocks of data. Signatures can be used in data deduplication to identify and remove redundant data blocks and, e.g., replace them with references/pointers to a single stored instance of the data block.
- Embodiments described herein utilize data block signatures of deduplicated files (or other data objects) to efficiently learn information about the files.
- certain embodiments utilize file metadata and/or historical information stored in the information management system in combination with data block signatures.
- signatures and/or metadata can be used to identify potential security breaches in the information management system and to perform forensics upon identifying a potential security breach. Such forensics can be useful to provide information about how a potential security breach took place, to obtain a higher level of confidence that a potential security breach is an actual security breach, or the like.
- Such forensic techniques utilizing data block signatures and/or file metadata can be used to track the movement of data blocks both temporally and by location. Tracking movement of data blocks provides several benefits. For example, data tracking may be required for compliance with regulations or industry standards. In addition, data tracking may help businesses and industries reduce losses due to electronic theft and cyberattacks. Other embodiments may limit copying of certain data, such as medical records or other confidential information, when particular signatures are associated with a file.
- data objects may relate to a variety of structures, such as word processing documents, spreadsheets, presentation documents, video files, image files, email mailboxes (and corresponding email messages), HTML/XML or other types of markup language files, databases and corresponding tables or other data structures. Additionally, data objects may be associated with corresponding metadata, which may include file system metadata and/or application-specific metadata.
- a file or other data object may comprise one or more individual source data blocks.
- the information management system generates and/or stores signatures (e.g., hashes or cryptographically unique IDs) corresponding to the individual source data blocks and compares the signatures to already-stored data signatures.
- signatures e.g., hashes or cryptographically unique IDs
- data block signatures for a first file may be compared to those of one or more other files stored in the information management system.
- the first file and/or the other files can be deduplicated files.
- a block of data may be read from the source and a unique signature for the block of data generated by using a hash algorithm.
- Data blocks can also be compressed, encrypted, or both. In some embodiments, data block compression, signature generation, and encryption are performed in that order on the source or destination host.
- FIG. 3A logically illustrates three exemplary files 300 , 320 , and 340 . Each file is partitioned into one or more data blocks with corresponding signatures.
- File 300 includes data blocks 302 , 304 , 306 , 308 , 310 , 312 , 314 , and 316 .
- the respective signatures for those data blocks are signatures 360 , 362 , 364 , 366 , 368 , 370 , 372 , and 374 .
- File 320 includes data blocks 322 , 324 , 326 , 328 , 330 , 332 , 334 , and 336 .
- the respective signatures for those data blocks are signatures 360 , 362 , 364 , 366 , 368 , 370 , 376 , and 378 .
- a comparison of the signatures associated with file 300 with the signatures associated with file 320 shows that signatures 360 , 362 , 364 , 366 , 368 , and 370 are common to both files, signatures 372 and 374 are unique to file 300 , and signatures 376 and 378 are unique to file 320 .
- the matching signatures show that data blocks 302 , 304 , 306 , 308 , 310 , and 312 are the same as data blocks 322 , 324 , 326 , 328 , 330 , and 332 .
- the unique signatures 372 , 374 , 376 , and 378 show that data blocks 314 , 316 , 334 , and 336 are unique data blocks.
- files 300 and 320 have six data blocks in common, and each file has two unique data blocks.
- a comparison of the signatures associated with file 300 with the signatures associated with file 340 shows that signature 360 is common to both files, signatures 362 , 364 , 366 , 368 , 370 , 372 , and 374 are unique to file 300 , and signatures 380 , 382 , 384 , and 386 are unique to file 340 .
- the matching signatures show that data block 302 is the same as data block 342 .
- the unique signatures 364 , 366 , 368 , 370 , 372 , 374 , 380 , 382 , 384 , and 386 show that data blocks 304 , 306 , 308 , 310 , 312 , 314 , 316 , 344 , 346 , 348 and 350 are unique data blocks.
- files 300 and 320 have one data block in common, file 300 has seven unique data blocks, and file 340 has four unique data blocks.
- the comparison of signatures can be used to determine relationships between files. For example, files 300 and 320 have six data blocks in common, which corresponds to 75% of the datablocks in each file, which may suggest that the files are related (e.g., are different versions of the same file, that one of the files is derived from the other file, or that the files are derived from the same third file) or otherwise include related data. Files 300 and 340 have one data block in common, which suggests that the files may contain less related data. The comparison of signatures provides an efficient way of identifying files that contain related data.
- files are considered related if a threshold determination is satisfied.
- criteria considered for the threshold might include the combined size of the common data blocks, the number of common data blocks, the combined size of the common data blocks as a percentage of the total size of one or both of the files, or the number of common data blocks as a percentage of the total number of data blocks in one or both files.
- Example percentages may be 10%, 20%, 30%, 40%, 50%, 60%, 70%, 80%, 90%, or 100%.
- other factors may be considered, such as the file type, the order of the matching signatures, or the content of metadata such as file name or location.
- FIG. 3B illustrates one example of a way of organizing the deduplicated files in an information management system 100 .
- the information management system 100 can store a set of unique data blocks 390 , a signature table 392 , and other deduplication information 394 which can include any information useful in managing deduplicated files, such as a reference count indicating how many times a particular data block is referenced across all of the deduplicated files stored in the information management system 100 .
- the information management system 100 can further store a data structure for each file including pointers to the data blocks constituting the file.
- FIG. 3B shows partial data structures for FILE 300 and FILE 320 depicting pointers for three data blocks in each file. Some or all of the information shown in FIG.
- FIG. 3B may be stored in one or more secondary storage devices 108 or in one or more primary storage devices 104 , depending on the implementation.
- FIG. 3B shows one example of a manner in which deduplication information can be organized.
- FIGS. 3A-6C show that A variety of other implementations are possible and compatible with the systems and methods described with respect to FIGS. 3A-6C , not only for organizing deduplication data, but also for generating, processing, and managing deduplicated data, including any of the implementations described in the patent publications previously incorporated by reference herein, such as without limitation:
- FIG. 4A depicts a method 400 of using signatures to identify a relationship between files.
- the method includes partitioning a target file into blocks.
- the system 100 may partition the target file into blocks of a particular fixed or variable size (e.g., fixed or variable deduplication block length), into blocks that correspond to certain types of data, or based on other criteria.
- the system 100 may partition the target file containing emails based at least in part on boundaries of individual email documents or attachments.
- a target file containing images or other multimedia objects may be partitioned based at least in part on the boundaries of the multimedia object.
- the method includes determining signatures (e.g., hashes or cryptographically unique IDs) for the partitioned blocks. For example, steps 402 and 404 may be performed during a deduplication process in which redundant data blocks are replaced with references to other data blocks.
- signatures e.g., hashes or cryptographically unique IDs
- the method includes comparing the determined signatures for the partitioned blocks of the target file with signatures for other blocks, such as those of data blocks of one or more deduplicated files.
- the system 100 can access signatures for one or more deduplicated files from a stored deduplication signature repository in the secondary storage subsystem 118 , to compare to the signatures of the data blocks for the target file.
- the method can include comparing the data block signatures for the target file to some or all of the data block signatures of a first deduplicated file, then to some or all of the signatures for a second file, and so on until the system 100 has compared signatures for each file in a desired set of deduplicated files (e.g., tens, thousands, or millions of files) to the signatures of the target file.
- a desired set of deduplicated files e.g., tens, thousands, or millions of files
- the method can include comparing the data block signatures sequentially as they are determined, in groups of various fixed or dynamic granularities, or all in a single bulk comparison, depending on the embodiment.
- the comparison of signatures can be used to determine relationships between files. For example, if at step 406 the system 100 detects based on the comparison that the files have a threshold amount of signatures in common, the system 100 may determine that there is a likelihood that the files are copies of one another, modified versions or otherwise different versions of the same file, or otherwise related.
- the comparison of signatures provides an efficient, analytical way of identifying files that contain related data, particularly in cases where there is a security breach, such as where a user is trying to evade security measures by deceptively copying a file and making a slight change to avoid detection (e.g., changing only the title).
- threshold There are various strategies to establish a threshold. Some examples of criteria considered for the threshold might include the combined size of the common data blocks, the number of common data blocks, the combined size of the common data blocks as a percentage of the total size of one or both of the files, or the number of common data blocks as a percentage of the total number of data blocks in one or both files. Example percentages may be 10%, 20%, 30%, 40%, 50%, 60%, 70%, 80%, 90%, or 100%. In addition, other factors may be considered, such as the file type, the order of the matching signatures, or the content of metadata such as file name or location.
- the system 100 can in some embodiments dynamically determine the threshold. For example, the system 100 may select a different threshold type or threshold percentage based on the type, source, permissions, user, or any other metadata associated with one or both of the files that are being compared.
- the method includes determining an action based on the comparisons of signatures for the partitioned blocks, such as providing an alert (e.g., a graphical user interface alert, audible alert, email, text message, etc.) or logging the identified relationship.
- an alert e.g., a graphical user interface alert, audible alert, email, text message, etc.
- the system 100 upon determining that there is a potential security breach based on the comparison adjusts permissions for a user associated with one or both of the compared files. For example, if the system 100 determines that a first user may have copied a file that user did not have permissions to, the system 100 may prevent that user from accessing some or all of the computing devices or other resources in the system 100 .
- the system 100 upon determining that there is a potential security breach such as unauthorized copying by a user, performs an automated analysis/audit associated with that user. For example, the system 100 may perform the signature-based comparison on additional files associated with that user on an expedited basis, or perform other security checks on additional files or computing devices associated with that user, such as by analyzing access patterns of the user to computing devices or other resources in the system 100 .
- FIG. 4B depicts a method 420 of using signatures, metadata, and/or historical information to identify a relationship between files, such as to identify potential security breaches, and to perform additional forensics or other analysis.
- the method includes partitioning a target file into blocks, such as in the manner described with respect to step 402 of the method 400 .
- the method includes determining signatures (e.g., hashes or cryptographically unique IDs) and also metadata (e.g., filenames, permissions, storage location, file types, storage types) for the target file and/or the partitioned blocks. For example, steps 422 and 424 may be performed during a deduplication process in which redundant data blocks are replaced with references to other data blocks.
- signatures e.g., hashes or cryptographically unique IDs
- metadata e.g., filenames, permissions, storage location, file types, storage types
- the method includes comparing signatures for the blocks of the target file with those of other files in the system 100 .
- step 426 can be similar to step 406 of the method 400 of FIG. 4A .
- the comparison of signatures provides an efficient, analytical way of identifying files that contain related data, particularly in cases where there is a security breach, such as where a user is trying to evade security measures.
- the method includes detecting a potential security breach based on the signature comparison and/or metadata associated with one or more of the compared files.
- the system 100 may detect a security breach solely on determining that the files share a threshold percentage of signatures/data blocks in common.
- the system 100 uses a combination of the signature comparison and metadata to identify a potential security breach. As one example, if a target file is compared to a second file that does not have any permissions restrictions, the system 100 may not identify a security breach even if a threshold number of signatures match.
- the system 100 in some embodiments checks file permissions, user metadata, or other appropriate metadata, and decides whether or not to perform the signature comparison based on the metadata. For example, the system 100 may not perform the signature comparison for files having no permissions restrictions, or for files associated with certain low-sensitivity users, groups, or departments within an enterprise.
- the method can determine an action based on the metadata and comparisons of signatures for the partitioned blocks, such as providing an alert (e.g., a graphical user interface alert, audible alert, email, text message, etc.) or logging the identified relationship.
- an alert e.g., a graphical user interface alert, audible alert, email, text message, etc.
- the method can perform additional forensics or other analysis based on the metadata and/or historical information. This can be useful to further investigate the potential security breach, such as to obtain further confidence that the potential security breach is an actual security breach, or to learn more information about the security breach (e.g., how, where, and when it occurred).
- the system at step 430 reviews permissions for a user associated with one or both of the target file and the compared file. If the system 100 determines that a first user may have copied a file that user did not have permissions to, the system 100 determines that the potential security breach is an actual breach, or that there is an increased likelihood of an actual breach, and can log this indication and/or generate an alert or report.
- the system 100 in some implementations reviews the user metadata associated with one or both of the compared files. For instance, if the system 100 determines that the target file was a potential unauthorized copy of a compared file, the system may review user metadata to determine that the target file was created by, owned, or otherwise associated with a first user, and the compared file was created by, owned, or otherwise associated with a second user. The system 100 can then perform further analysis associated with one or both users. For example, the system 100 may analyze historical access information relating to the first user. In one embodiment, the system 100 reviews stored device access information (e.g., which device was logged in to/out of, login time, logout time) to determine which devices the first user has accessed, or to identify other suspicious or unauthorized activity.
- stored device access information e.g., which device was logged in to/out of, login time, logout time
- Such analysis of metadata and/or historical information can be useful not only in identifying and mitigating potential additional security breaches, but in determining how the identified security breach occurred.
- the system may review stored access information associated with the file and/or computing devices in the system 100 associated with the file (e.g., storing a copy or providing access to the file) to determine all of the users who have accessed the file or had access to the file.
- Time metadata may also be used in the analysis at step 430 .
- the system 100 may review the time of creation of one or both of the compared files to limit the scope of information to review in the further forensic analysis.
- the system 100 may, for example, limit a forensic review to historical information covering a particular period of time that is based on the file creation date of an unauthorized copy.
- the information management system maintains location and/or time of creation information associated with individual source data portions. This location and/or time of creation information may be maintained with the signature information or in separate databases. The location and/or time of creation information helps to determine how individual source data portions are propagated. This information, along with the groupings of signature information associated with data objects, helps to establish the relationships between the data objects.
- Some data objects may be of a sensitive nature or require tracking of any propagation.
- the signature information of the individual source data portions for such data objects may be used to determine whether particular data objects are being propagated.
- the detection of propagation of individual source data portions may trigger an action.
- the type of action may be based, for example, by association with a data object, physical location, ownership, directory, file structure, security group, permissions, or other parameters.
- An action may be based on the detection of the propagation of a single individual source data portion, a group of individual source data portions, a watch list associated with individual source data portions, or a pattern of individual source data portions.
- Machine learning may be used to determine when to trigger an action. For example, machine learning may be used to detect patterns of file propagation or file locations of interest. The analysis could look at signature matches across multiple files to detect patterns or unusual patterns of signatures.
- Relationships between files can take into consideration, for example, the number of matching signatures, the percent of matching signatures, the size of data portions corresponding to matching signatures, and the locations within the file of the data portions with matching signatures.
- the analysis can based on pre-specified settings or dynamic relationships.
- one or more client computing devices 102 may be part of a system and associated with one or more primary storage devices (not shown) storing primary data, such as the primary storage devices 104 , 204 previously shown and described. As described above, the client computing device 102 may at step 1 provide files and/or metadata for processing by data agent 142 and/or media agent 144 . In one embodiment, the files are provided as part of a backup process.
- computers store primary data in locally-attached storage such as a system disk installed in the computer's chassis.
- locally-attached storage may include USB-attached external disk(s), USB flash memory, optical disks such as CD and DVD disks, and/or other locally-attached storage technology that may be external to the chassis but are logically locally-managed storage.
- Computers may also store primary data on a local network using, for example, Network Attached Storage (NAS) and Storage Area Networks (SAN).
- NAS Network Attached Storage
- SAN Storage Area Networks
- This “local data” may be organized by the computer's operating system (e.g., Microsoft Windows, Unix, Linux, Solaris, OS X, AIX, etc.) into one or more file systems (e.g., FAT, NTFS, exFAT, ReFS, XFS, UFS, vXFS, HFS Plus, ext2, ext3, ext4, reiserFS, ReFS, jfs, etc.).
- the operating system may identify the local disks and/or disk partitions by one or more volume names according to the respective file system (e.g., “C” drive, etc.). Additional examples and details of the use of local file systems are described in U.S. Patent Application Pub. No. 2016/0004721, entitled “Replicating Local File Systems as Respective Logical Unit Numbers (LUNs) in a Storage Array, Using Block-Level Data Transfers and Enhanced Storage Managers, Data Agents, and Media Agents in an Information Management System.”
- the files provided for comparison and processing are partitioned into data blocks at step 2 .
- exemplary embodiments may include partitioning a file into blocks of a particular size, blocks that correspond to certain types of data, or other criteria may be used to partition the file.
- Signatures are then determined for the partitioned blocks at step 3 .
- the media agent 144 or other component of the information management system calculates and/or stores signatures (e.g., hashes or cryptographically unique IDs) corresponding to the individual source data blocks. This allows comparing signatures to already-stored data signatures, which can be more efficient than comparing entire data blocks or objects.
- the information management system 100 may then use the signatures to identify locations of matching individual source data blocks. For example, at step 3 the information management system 100 may determine signatures for data blocks associated with one or more files provided by the client computing device 102 .
- the media agent 144 or other component of the information management system can 100 then store the data blocks and signatures, such as in the secondary storage device 108 as one or more deduplicated secondary copies of the files.
- the information management system 100 retrieves signatures and/or metadata associated with one or more of the deduplicated secondary copies of the file(s).
- the signatures may be used at step 5 to compare the signatures of different files and identify relationships between the data blocks of those files.
- the media agent 144 compares data block signatures of a file “in-line” with the creation of the secondary copy of that file, e.g., at or around the time the secondary copy of the file is being created. In such a case, the media agent 144 compares the data block signatures for that file with data block signatures that were previously stored in the secondary storage device 108 and which correspond to one or more previously backed up files. In this manner, files are compared as they enter the secondary storage subsystem.
- the media agent 144 performs the comparison of the data blocks signatures “off-line”, e.g., not in conjunction with the secondary copy operations.
- the comparisons may be performed in the background according to a schedule. This technique reduces the impact of the deduplication signature comparison on the performance of the secondary copy operations.
- the detection of propagation of individual source data blocks may trigger an action for certain types of storage devices. For example, detection of propagation of a data object and corresponding individual source data blocks to external storage such as a USB device may trigger an action.
- the information management system can be used to identify individuals responsible for the activity.
- the information management system may access user logs that identify when particular individuals had access to the data object at one or more locations. Further, human resource records may be used to correlate activity with dates of employment and/or termination of employment.
- FIG. 5B provides an alternative embodiment where the client computing device 102 performs some or all of the partitioning functions, such as partitioning the file into data blocks and/or determining the signatures associated with those data blocks.
- the client computing device 102 can then provide the data block signatures and/or metadata to the media agent 144 or other component of the secondary storage subsystem for further analysis, as described with respect to FIG. 5A .
- FIG. 6A illustrates two files 601 , 603 .
- the first file 601 includes data blocks having corresponding signatures A, B, C, D, E.
- the file is titled “John's File”, John is the user who created the file, and the permissions for the file are set such that only John has permission to access and/or modify the file.
- the second file 603 includes data blocks having corresponding signatures A, B, C, D, E.
- the file is titled “Bob's File”, Bob is the user who created the file, and the permissions for the file are set such that only Bob has permission to access and/or modify the file.
- some or all of the first and second files 601 , 603 their constituent data blocks, corresponding data block signatures and metadata including title and permissions may be stored in the secondary storage device 108 .
- one or more computing devices in the information management system 100 such as the media agent 144 , storage manager 140 and/or other appropriate component(s) are configured to perform forensic processing on deduplicated files to identify potential security threats.
- the computing device compares the signatures in the second file 603 to the signatures of some or all of the deduplicated files stored in the secondary storage device(s) 108 .
- the computing device compares the signatures in the second file 603 to each of a set of deduplicated files to determine if the second file 603 contains a threshold of 90% of data block signatures in common with any of the files.
- the computing device determines that the second file 603 includes more than the threshold amount of data block signatures in common because 100% of the signatures in the first and second files 601 , 603 match.
- the computing device compares metadata between the two files to further assess whether there may be a potential security breach.
- the computing device reviews the permissions information associated with the first file 601 and determines that John has exclusive permissions to the first file 601 .
- the computing device then reviews the user information associated with the second file 603 and determines that Bob created the second file 603 .
- the computing device determines that a potential security breach has occurred because the first and second files 601 , 603 appear to be identical, Bob created the second file 603 , and John has exclusive permissions to the first file 601 , indicating that Bob may have created an unauthorized identical copy of the first file 601 .
- the computing device may review the titles of the first and second files 601 , 603 , in addition to or instead of reviewing the permissions and user information, in order to identify a potential security breach, or an increased likelihood of a security breach.
- the media agent 144 can take further actions such as alerting an administrator or other user in any of the manners described herein, performing further forensic analysis, logging indications of the security breach and other determinations, etc.
- the computing device reviews historical information stored by the system 100 associated with the users and associated with the first and second files 601 , 603 to perform forensic analysis.
- the computing device accesses a database stored in the primary or secondary subsystems 117 , 118 having historical information about Bob's email traffic.
- the computing device searches the information to determine whether any emails were sent directly or indirectly from John to Bob. If, for example, the computing device determines that Sue forwarded an email she received from John to Bob, the computing device can review any attachments of the email to see if they match the first file 601 . In such a way the computing device can determine with increased that a security breach occurred and/or learn valuable information about how the breach occurred.
- the computing device can alternatively or additionally review access information to perform forensic analysis.
- the computing device can store historical access information for a set of computing devices associated with the information management system.
- the computing device in one embodiment reviews access history for all computing devices John has access to or is otherwise associated with in the information management system. If Bob has also accessed any of these computing devices, the computing device may determine that there is an increased likelihood that a breach occurred, and that the breach occurred when Bob accessed the computing device in question.
- the computing device may additionally or alternatively review information indicating which computing devices maintain copies of the first file 601 , and review access information associated with those computing devices. If Bob accessed any of those computing devices, the computing device may similarly determine that there is an increased likelihood that a breach occurred, and learn additional information about how the breach occurred.
- the computing device can generate a report summarizing the results and forward the report to an administrator or other appropriate individual, or log indications of the breach detection and results of the forensic analysis.
- FIG. 6B illustrates examples of how the signature information can be used to determine relationships between data objects, which can include for example any type of file such as a structured database files, unstructured files, user files, system files, etc.
- An exemplary data object 602 initially comprises individual source data blocks that have signatures A, B, C, D, E.
- Data object 604 represents a modification of data object 602 such that the individual source data blocks have signatures F, B, C, D, E.
- Data object 606 represents a different modification of data object 602 such that there is no signature D.
- Data objects 608 and 610 represent modifications to data object 606 . In data object 608 , signature B is no longer present, and new signature G appears. In data object 610 , new signature H appears.
- These changes may be representative of file transformations such as additions, deletions, compression, encryption, or other modifications.
- data objects 602 and 604 both include signatures B, C, D, and E. That may be sufficient to satisfy a threshold criteria for a match that establishes a relationship between the two data objects, such as where the threshold criteria is that the files share at least 80% of data blocks in common.
- the presence or absence of signatures can be used to determine types of relationships, such as where a particular data object fits in the evolutionary modification tree of related data objects.
- the signatures for data object 612 like data objects 602 and 604 , includes signatures B, C, and D.
- the presence of these common signatures suggest that all three data objects may be related.
- the signatures for data objects 604 and 612 include signature F, and the matching signatures suggests the two data objects have an additional data block in common.
- the signatures for data objects 602 and 604 include signature E, while the signatures for data object 612 does not include signature E.
- signatures for data objects 602 and 604 include signatures B, C, D, and E
- the matching signatures for data object 612 only includes matching signatures B, C, and D
- data object 612 does not fall between data objects 602 and 604 in the evolutionary tree of those related data objects.
- data object 612 is likely derived from data object 604 , and would be placed below data object 604 in the evolutionary tree.
- data object 612 could be derived from data object 604 , which in turn could be derived from data object 602 , or alternatively, data object 602 could be derived from data object 604 , which in turn could be derived from data object 612 .
- Known temporal relationships may be used to further establish relationships between data objects For example, it may be known that data object 604 was derived from data object 602 . Knowing that data object 604 is derived from data object 602 leads to the conclusion that data object 612 is derived from data object 604 , rather than data object 604 being derived from data object 612 .
- signature G in data object 614 suggests that data object 614 may be related to data object 608 .
- the presence or absence of signatures A and D provide additional clues regarding the relationship of data object 608 to data object 614 .
- the presence of signature A for data objects 602 , 606 , and 608 , and the lack of that signature for data object 614 suggests that that data object 614 is a modification of data object 608 .
- signatures for individual source data blocks allows for the efficient construction of evolutionary trees of related data objects.
- This relationship information may be used for data tracking as may be required for compliance with regulations or industry standards.
- this relationship information may help businesses and industries identify the source of electronic theft and cyber attacks.
- signatures for individual source data blocks may be used to track the location and time of availability of those individual source data blocks. That information can then be used in conjunction with information about which users had access to those individual source data blocks at the relevant locations and times, to identify users associated with the individual source data blocks.
- Metadata associated with a data object can also be used to ascertain the relationship between objects.
- metadata can include, without limitation, one or more of the following: the data owner (e.g., the client or user that generates the data), the last modified time (e.g., the time of the most recent modification of the data object), a data object name (e.g., a file name), a data object size (e.g., a number of bytes of data), information about the content (e.g., an indication as to the existence of a particular search term), user-supplied tags, to/from information for email (e.g., an email sender, recipient, etc.), creation date, file type (e.g., format or application type), last accessed time, application type (e.g., type of application that generated the data object), location/network (e.g., a current, past or future location of the data object and network pathways to/from the data object), geographic location (e.g., GPS coordinates), frequency of change (e.g.
- FIG. 6C illustrates modifications to metadata associated with exemplary data object 602 .
- data objects 602 and 604 share the same filename A.
- Data objects 606 and 608 have a modified filename B.
- Data object 610 has another filename C.
- the filename metadata shows that data object 612 has the same filename (A) as data objects 602 and 604 , suggesting a relationship between all three data objects.
- the filename metadata in this instance, in conjunction with signature data, further establish relationships between data objects.
- changes to the metadata can be used to flag issues when the signature data establishes a relationship between data objects. For example, further investigation may be warranted if signature data establishes that there is a relationship between data objects 610 and 614 , but the filename has changed from filename C to filename D.
- signatures to identify matching data blocks can be used for forensics and identifying security issues. For example, if user A has access to copy of a file created by user B, but the file has a different name and user A does not have permissions to user B's copy, there may be a security concern.
- the historical data along with metadata may provide insight into how user A obtained access to the file. For example, the information management system may have information that shows user B emailed the file to user C, and that user C then emailed the file to user A. As another example, the information management system may show that user A's copy of the file appeared after user A had access to a computer that was shared with user B.
- the use of signatures to identify matching data blocks allows tracking of data propagation at the data block level.
- a new signature may be compared against a database of existing signatures for previously processed data blocks. If the signature exists, the database identifies that an existing data block is being reused. The block location may be obtained from an associated media agent and this information may be used in creating the object's index entry. If the signature does not exist, the new signature is added to the database. The associated media agent uses the location and creates the object's index entry.
- Signature comparison may be done on a media agent.
- a locally cached set of signatures on the source host may be used for the comparison. If a signature does not exist in the local cache set, it is sent to the media agent for comparison.
- Source-side signature generation may be beneficial in delayed or low bandwidth environments such as WAN or remote office backup situations.
- Media-agent side signature generation may be beneficial where the clients are in a fast network environment such as LAN or if there is a need to avoid CPU utilization on client computers. Signature generation occurring on the media-agent side reduces the CPU usage on the client computers by moving the processing to the media agent.
- a computer implemented method of using data block signatures for monitoring in an information management system comprises, with one or more computing devices in the information management system:
- the determining can comprise determining that a threshold percentage of data block signatures in the first set match corresponding data block signatures in the second set.
- the threshold amount of signatures can correspond to at least 90 percent of the total number of data blocks for the first file.
- the determining can comprises a comparison of the cumulative size of the data blocks of the first file having matching signatures with the cumulative size of all of the blocks for the first file.
- the threshold percentage may correspond to at least 50 percent of the cumulative size of all of the blocks in the first file.
- the metadata can comprises one or more of a file name, security permissions, a storage location, and a time stamp.
- the reviewing may comprise determining a type of relationship between the first file and the second file using the metadata.
- the reviewing can comprise identifying a user associated with one or more of the first file and the second file using the metadata.
- the method can further comprise providing an alert to an administrator, logging the event of the determination that at least the threshold amount of signatures match, and/or transmitting an email to an administrator notifying the administrator of a potential security breach.
- a data storage system configured to use data block signatures for monitoring.
- the system can comprise:
- the threshold amount can correspond to a threshold percentage of data block signatures in the first set matching corresponding data block signatures in the second set.
- the determination of the threshold amount may comprise a comparison of the cumulative size of the data blocks of the first file having matching signatures with the cumulative size of all of the blocks for the first file.
- the metadata can comprise one or more of a file name, security permissions, a storage location, and a time stamp.
- the review may comprise a determination of a type of relationship between the first file and the second file using the metadata.
- the review may comprise an identification of a user associated with one or more of the first file and the second file using the metadata.
- a non-transitory computer-readable medium storing instructions, that, when executed by at least one computing device comprising one or more processors and computer memory, cause the at least one computing device to perform operations comprising:
- a computer implemented method of monitoring related data in a data storage system comprising:
- a system or systems may operate according to one or more of the methods and/or computer-readable media recited in the preceding paragraphs.
- a method or methods may operate according to one or more of the systems and/or computer-readable media recited in the preceding paragraphs.
- a computer-readable medium or media, excluding transitory propagating signals may cause one or more computing devices having one or more processors and non-transitory computer-readable memory to operate according to one or more of the systems and/or methods recited in the preceding paragraphs.
- Conditional language such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
- the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense, as opposed to an exclusive or exhaustive sense, i.e., in the sense of “including, but not limited to.”
- the terms “connected,” “coupled,” or any variant thereof means any connection or coupling, either direct or indirect, between two or more elements; the coupling or connection between the elements can be physical, logical, or a combination thereof.
- the words “herein,” “above,” “below,” and words of similar import when used in this application, refer to this application as a whole and not to any particular portions of this application.
- words using the singular or plural number may also include the plural or singular number respectively.
- the word “or” in reference to a list of two or more items covers all of the following interpretations of the word: any one of the items in the list, all of the items in the list, and any combination of the items in the list.
- the term “and/or” in reference to a list of two or more items covers all of the following interpretations of the word: any one of the items in the list, all of the items in the list, and any combination of the items in the list.
- certain operations, acts, events, or functions of any of the algorithms described herein can be performed in a different sequence, can be added, merged, or left out altogether (e.g., not all are necessary for the practice of the algorithms).
- operations, acts, functions, or events can be performed concurrently, e.g., through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially.
- Systems and modules described herein may comprise software, firmware, hardware, or any combination(s) of software, firmware, or hardware suitable for the purposes described.
- Software and other modules may reside and execute on servers, workstations, personal computers, computerized tablets, PDAs, and other computing devices suitable for the purposes described herein.
- Software and other modules may be accessible via local computer memory, via a network, via a browser, or via other means suitable for the purposes described herein.
- Data structures described herein may comprise computer files, variables, programming arrays, programming structures, or any electronic information storage schemes or methods, or any combinations thereof, suitable for the purposes described herein.
- User interface elements described herein may comprise elements from graphical user interfaces, interactive voice response, command line interfaces, and other suitable interfaces.
- processing of the various components of the illustrated systems can be distributed across multiple machines, networks, and other computing resources. Two or more components of a system can be combined into fewer components.
- Various components of the illustrated systems can be implemented in one or more virtual machines, rather than in dedicated computer hardware systems and/or computing devices.
- the data repositories shown can represent physical and/or logical data storage, including, e.g., storage area networks or other distributed storage systems.
- the connections between the components shown represent possible paths of data flow, rather than actual connections between hardware. While some examples of possible connections are shown, any of the subset of the components shown can communicate with any other subset of components in various implementations.
- Embodiments are also described above with reference to flow chart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products.
- Each block of the flow chart illustrations and/or block diagrams, and combinations of blocks in the flow chart illustrations and/or block diagrams may be implemented by computer program instructions.
- Such instructions may be provided to a processor of a general purpose computer, special purpose computer, specially-equipped computer (e.g., comprising a high-performance database server, a graphics subsystem, etc.) or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor(s) of the computer or other programmable data processing apparatus, create means for implementing the acts specified in the flow chart and/or block diagram block or blocks.
- These computer program instructions may also be stored in a non-transitory computer-readable memory that can direct a computer or other programmable data processing apparatus to operate in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the acts specified in the flow chart and/or block diagram block or blocks.
- the computer program instructions may also be loaded to a computing device or other programmable data processing apparatus to cause operations to be performed on the computing device or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computing device or other programmable apparatus provide steps for implementing the acts specified in the flow chart and/or block diagram block or blocks.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Library & Information Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
-
- U.S. Pat. No. 7,035,880, entitled “Modular Backup and Retrieval System Used in Conjunction With a Storage Area Network”;
- U.S. Pat. No. 7,107,298, entitled “System And Method For Archiving Objects In An Information Store”;
- U.S. Pat. No. 7,246,207, entitled “System and Method for Dynamically Performing Storage Operations in a Computer Network”;
- U.S. Pat. No. 7,315,923, entitled “System And Method For Combining Data Streams In Pipelined Storage Operations In A Storage Network”;
- U.S. Pat. No. 7,343,453, entitled “Hierarchical Systems and Methods for Providing a Unified View of Storage Information”;
- U.S. Pat. No. 7,395,282, entitled “Hierarchical Backup and Retrieval System”;
- U.S. Pat. No. 7,529,782, entitled “System and Methods for Performing a Snapshot and for Restoring Data”;
- U.S. Pat. No. 7,617,262, entitled “System and Methods for Monitoring Application Data in a Data Replication System”;
- U.S. Pat. No. 7,734,669, entitled “Managing Copies Of Data”;
- U.S. Pat. No. 7,747,579, entitled “Metabase for Facilitating Data Classification”;
- U.S. Pat. No. 8,156,086, entitled “Systems And Methods For Stored Data Verification”;
- U.S. Pat. No. 8,170,995, entitled “Method and System for Offline Indexing of Content and Classifying Stored Data”;
- U.S. Pat. No. 8,230,195, entitled “System And Method For Performing Auxiliary Storage Operations”;
- U.S. Pat. No. 8,285,681, entitled “Data Object Store and Server for a Cloud Storage Environment, Including Data Deduplication and Data Management Across Multiple Cloud Storage Sites”;
- U.S. Pat. No. 8,307,177, entitled “Systems And Methods For Management Of Virtualization Data”;
- U.S. Pat. No. 8,364,652, entitled “Content-Aligned, Block-Based Deduplication”;
- U.S. Pat. No. 8,578,120, entitled “Block-Level Single Instancing”;
- U.S. Pat. No. 8,954,446, entitled “Client-Side Repository in a Networked Deduplicated Storage System”;
- U.S. Pat. No. 9,020,900, entitled “Distributed Deduplicated Storage System”;
- U.S. Pat. No. 9,098,495, entitled “Application-Aware and Remote Single Instance Data Management”;
- U.S. Pat. No. 9,239,687, entitled “Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations”;
- U.S. Pat. No. 10,198,451, entitled “Systems and Methods for Using Metadata to Enhance Data Identification Operations”;
- U.S. Patent Application Pub. No. 2006/0224846, entitled “System and Method to Support Single Instance Storage Operations”;
- U.S. Patent Application Pub. No. 2014/0201170, entitled “High Availability Distributed Deduplicated Storage System”;
- U.S. Patent Application Pub. No. 2016/0350391, entitled “Replication Using Deduplicated Secondary Copy Data”;
- U.S. Patent Application Pub. No. 2016/0004721, entitled “Replicating Local File Systems as Respective Logical Unit Numbers (LUNs) in a Storage Array, Using Block-Level Data Transfers and Enhanced Storage Managers, Data Agents, and Media Agents in an Information Management System”;
- U.S. Patent Application Pub. No. 2017/0168903 entitled “Live Synchronization and Management of Virtual Machines across Computing and Virtualization Platforms and Using Live Synchronization to Support Disaster Recovery”;
- U.S. Patent Application Pub. No. 2017/0193003 entitled “Redundant and Robust Distributed Deduplication Data Storage System”;
- U.S. Patent Application Pub. No. 2017/0235647 entitled “Data Protection Operations Based on Network Path Information”;
- U.S. Patent Application Pub. No. 2017/0242871, entitled “Data Restoration Operations Based on Network Path Information”;
- U.S. Patent Application Pub. No. 2017/0185488, entitled “Application-Level Live Synchronization Across Computing Platforms Including Synchronizing Co-Resident Applications To Disparate Standby Destinations And Selectively Synchronizing Some Applications And Not Others”; and
- U.S. patent application Ser. No. 16/352,606, entitled “Dynamically-Adjustable Deduplication Order of Operations”.
-
- communicating with
data agents 142 andmedia agents 144, including transmitting instructions, messages, and/or queries, as well as receiving status reports, index information, messages, and/or queries, and responding to same; - initiating execution of information management operations;
- initiating restore and recovery operations;
- managing
secondary storage devices 108 and inventory/capacity of the same; - allocating
secondary storage devices 108 for secondary copy operations; - reporting, searching, and/or classification of data in
system 100; - monitoring completion of and status reporting related to information management operations and jobs;
- tracking movement of data within
system 100; - tracking age information relating to
secondary copies 116,secondary storage devices 108, comparing the age information against retention guidelines, and initiating data pruning when appropriate; - tracking logical associations between components in
system 100; - protecting metadata associated with
system 100, e.g., inmanagement database 146; - implementing job management, schedule management, event management, alert management, reporting, job history maintenance, user security management, disaster recovery management, and/or user interfacing for system administrators and/or end users of
system 100; - sending, searching, and/or viewing of log files; and
- implementing operations management functionality.
- communicating with
-
- schedules or other timing information, e.g., specifying when and/or how often to perform information management operations;
- the type of
secondary copy 116 and/or copy format (e.g., snapshot, backup, archive, HSM, etc.); - a location or a class or quality of storage for storing secondary copies 116 (e.g., one or more particular secondary storage devices 108);
- preferences regarding whether and how to encrypt, compress, deduplicate, or otherwise modify or transform
secondary copies 116; - which system components and/or network pathways (e.g., preferred media agents 144) should be used to perform secondary storage operations;
- resource allocation among different computing devices or other system components used in performing information management operations (e.g., bandwidth allocation, available storage capacity, etc.);
- whether and how to synchronize or otherwise distribute files or other data objects across multiple computing devices or hosted services; and
- retention information specifying the length of time
primary data 112 and/orsecondary copies 116 should be retained, e.g., in a particular class or tier of storage devices, or within thesystem 100.
-
- frequency with which
primary data 112 or asecondary copy 116 of a data object or metadata has been or is predicted to be used, accessed, or modified; - time-related factors (e.g., aging information such as time since the creation or modification of a data object);
- deduplication information (e.g., hashes, data blocks, deduplication block size, deduplication efficiency or other metrics);
- an estimated or historic usage or cost associated with different components (e.g., with secondary storage devices 108);
- the identity of users,
applications 110,client computing devices 102 and/or other computing devices that created, accessed, modified, or otherwise utilizedprimary data 112 orsecondary copies 116; - a relative sensitivity (e.g., confidentiality, importance) of a data object, e.g., as determined by its content and/or metadata;
- the current or historical storage capacity of various storage devices;
- the current or historical network capacity of network pathways connecting various components within the storage operation cell;
- access control lists or other security information; and
- the content of a particular data object (e.g., its textual content) or of metadata associated with the data object.
- frequency with which
-
- U.S. Pat. No. 8,285,681, entitled “Data Object Store and Server for a Cloud Storage Environment, Including Data Deduplication and Data Management Across Multiple Cloud Storage Sites”;
- U.S. Pat. No. 8,364,652, entitled “Content-Aligned, Block-Based Deduplication”;
- U.S. Pat. No. 8,578,120, entitled “Block-Level Single Instancing”;
- U.S. Pat. No. 8,954,446, entitled “Client-Side Repository in a Networked Deduplicated Storage System”;
- U.S. Pat. No. 9,020,900, entitled “Distributed Deduplicated Storage System”;
- U.S. Pat. No. 9,098,495, entitled “Application-Aware and Remote Single Instance Data Management”;
- U.S. Pat. No. 9,239,687, entitled “Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations”;
- U.S. Patent Application Pub. No. 2006/0224846, entitled “System and Method to Support Single Instance Storage Operations”;
- U.S. Patent Application Pub. No. 2014/0201170, entitled “High Availability Distributed Deduplicated Storage System”;
- U.S. Patent Application Pub. No. 2016/0350391, entitled “Replication Using Deduplicated Secondary Copy Data”;
- U.S. Patent Application Pub. No. 2017/0193003 entitled “Redundant and Robust Distributed Deduplication Data Storage System”;
- U.S. patent application Ser. No. 16/352,606, entitled “Dynamically-Adjustable Deduplication Order of Operations”.
-
- Detection of one or more signatures associated with data portions on a removable storage device;
- Detection of one or more signatures associated with data portions from a specified location, such as a secured storage location;
- Detection of one or more signatures associated with data portions from a particular file type;
- Detection of one or more signatures associated with data portions having a specified security level;
- Detection of one or more signatures associated with data portions for a particular user;
- Detection of one or more signatures associated with data portions for a particular time frame;
- Detection of one or more signatures associated with data portions for a particular geographic region;
- Detection of one or more signatures associated with data portions for which a particular user has access;
- Detection of one or more signatures associated with data portions corresponding to particular metadata;
- Detection of one or more signatures where corresponding metadata has changed;
- Changes to permissions of a data portion associated with a signature.
-
- partitioning a first file into data blocks and generating a first set of data block signatures corresponding to the data blocks of the first file;
- accessing, from a deduplicated data store in a secondary storage subsystem of the information management system, a second set of data block signatures corresponding to a second file;
- comparing the first set of data block signatures to the second set of data block signatures;
- determining, based on said comparing, that at least a threshold amount of signatures in the first set of data block signatures match with signatures in the second set of data block signatures;
- in response to said determining, accessing metadata stored in the information management system associated with one or both of the first and second files; and
- reviewing the metadata to analyze a potential security breach associated with one or both of the first and second files.
-
- a primary storage subsystem comprising one or more client computing devices;
- a secondary storage subsystem comprising a deduplicated data store containing a set of deduplicated files and a repository of data block signatures corresponding to the deduplicated files, wherein the deduplicated files comprise secondary copies of files generated by applications executing on the client computing devices in the primary storage subsystem;
- a computing system comprising one or more computing devices configured to:
- partition a first file into data blocks and generating a first set of data block signatures corresponding to the data blocks of the first file;
- access, from the deduplicated data store, a second set of data block signatures corresponding to a second file, the second file being one of the deduplicated files;
- compare the first set of data block signatures to the second set of data block signatures;
- determine, based on the comparison, that at least a threshold amount of signatures in the first set of data block signatures match with signatures in the second set of data block signatures;
- access metadata stored in the data storage system associated with one or both of the first and second files; and
- review the metadata to analyze a potential security breach associated with one or more of the first and second files.
-
- partitioning a first file into data blocks and generating a first set of data block signatures corresponding to the data blocks of the first file;
- accessing, from a deduplicated data store in a secondary storage subsystem of the information management system, a second set of data block signatures corresponding to a second file;
- comparing the first set of data block signatures to the second set of data block signatures;
- determining, based on said comparing, that at least a threshold amount of signatures in the first set of data block signatures match with signatures in the second set of data block signatures;
- in response to said determining, accessing metadata stored in the information management system associated with one or both of the first and second files; and
- reviewing the metadata to analyze a potential security breach associated with one or both of the first and second files.
-
- at a primary device, allocating data from a data object stored on a primary storage device into one or more data portions;
- creating signatures that correspond to each of the one or more data portions;
- communicating the signatures for each of the one or more data portions to a secondary device;
- communicating metadata corresponding to the data object to the secondary device;
- determining, at the secondary device, a correspondence between one or more of the signatures for the data portions stored on the primary storage device with signatures maintained by a data management database;
- using the corresponding signatures to determine a relationship between the data object stored on the primary storage device and a data object maintained by the data management database;
- using the metadata corresponding to the data object stored on the primary storage device and the relationship between the data object stored on the primary storage device and a data object maintained by the data management database to determine a course of action.
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/407,040 US11463264B2 (en) | 2019-05-08 | 2019-05-08 | Use of data block signatures for monitoring in an information management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/407,040 US11463264B2 (en) | 2019-05-08 | 2019-05-08 | Use of data block signatures for monitoring in an information management system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20200358621A1 US20200358621A1 (en) | 2020-11-12 |
US11463264B2 true US11463264B2 (en) | 2022-10-04 |
Family
ID=73046867
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/407,040 Active 2041-01-20 US11463264B2 (en) | 2019-05-08 | 2019-05-08 | Use of data block signatures for monitoring in an information management system |
Country Status (1)
Country | Link |
---|---|
US (1) | US11463264B2 (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8578120B2 (en) | 2009-05-22 | 2013-11-05 | Commvault Systems, Inc. | Block-level single instancing |
US8930306B1 (en) | 2009-07-08 | 2015-01-06 | Commvault Systems, Inc. | Synchronized data deduplication |
WO2012045023A2 (en) | 2010-09-30 | 2012-04-05 | Commvault Systems, Inc. | Archiving data objects using secondary copies |
US9633033B2 (en) | 2013-01-11 | 2017-04-25 | Commvault Systems, Inc. | High availability distributed deduplicated storage system |
US10380072B2 (en) | 2014-03-17 | 2019-08-13 | Commvault Systems, Inc. | Managing deletions from a deduplication database |
US9575673B2 (en) | 2014-10-29 | 2017-02-21 | Commvault Systems, Inc. | Accessing a file system using tiered deduplication |
US10339106B2 (en) | 2015-04-09 | 2019-07-02 | Commvault Systems, Inc. | Highly reusable deduplication database after disaster recovery |
US11698727B2 (en) | 2018-12-14 | 2023-07-11 | Commvault Systems, Inc. | Performing secondary copy operations based on deduplication performance |
US20200327017A1 (en) | 2019-04-10 | 2020-10-15 | Commvault Systems, Inc. | Restore using deduplicated secondary copy data |
US11468385B2 (en) * | 2019-11-01 | 2022-10-11 | Mastercard International Incorporated | Systems and methods for evaluating data security of a target system |
EP3910511A1 (en) * | 2020-05-13 | 2021-11-17 | Magnet Forensics Inc. | System and method for identifying files based on hash values |
US11526506B2 (en) * | 2020-05-14 | 2022-12-13 | Code42 Software, Inc. | Related file analysis |
US11687424B2 (en) | 2020-05-28 | 2023-06-27 | Commvault Systems, Inc. | Automated media agent state management |
US12248435B2 (en) * | 2021-03-31 | 2025-03-11 | Nutanix, Inc. | File analytics systems and methods |
US12197398B2 (en) | 2021-03-31 | 2025-01-14 | Nutanix, Inc. | Virtualized file servers and methods to persistently store file system event data |
US12242455B2 (en) | 2021-03-31 | 2025-03-04 | Nutanix, Inc. | File analytics systems and methods including receiving and processing file system event data in order |
US12248434B2 (en) | 2021-03-31 | 2025-03-11 | Nutanix, Inc. | File analytics systems including examples providing metrics adjusted for application operation |
US20230091577A1 (en) * | 2021-09-20 | 2023-03-23 | International Business Machines Corporation | Heterogenous replication in a hybrid cloud database |
CN114328418B (en) * | 2021-11-30 | 2024-11-22 | 厦门市美亚柏科信息股份有限公司 | An Internet of Things permission bypass evidence collection method, terminal device and storage medium |
US12182264B2 (en) | 2022-03-11 | 2024-12-31 | Nutanix, Inc. | Malicious activity detection, validation, and remediation in virtualized file servers |
US12160426B2 (en) * | 2022-12-04 | 2024-12-03 | Asad Hasan | Human system operator identity associated audit trail of containerized network application with prevention of privilege escalation, online black-box testing, and related systems and methods |
US12111735B2 (en) * | 2022-12-12 | 2024-10-08 | Dell Products, L.P. | Data error identification prior to role reversal on a remote data replication facility |
Citations (501)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4084231A (en) | 1975-12-18 | 1978-04-11 | International Business Machines Corporation | System for facilitating the copying back of data in disc and tape units of a memory hierarchial system |
US4267568A (en) | 1975-12-03 | 1981-05-12 | System Development Corporation | Information storage and retrieval system |
US4283787A (en) | 1978-11-06 | 1981-08-11 | British Broadcasting Corporation | Cyclic redundancy data check encoding method and apparatus |
US4417321A (en) | 1981-05-18 | 1983-11-22 | International Business Machines Corp. | Qualifying and sorting file record data |
US4641274A (en) | 1982-12-03 | 1987-02-03 | International Business Machines Corporation | Method for communicating changes made to text form a text processor to a remote host |
US4654819A (en) | 1982-12-09 | 1987-03-31 | Sequoia Systems, Inc. | Memory back-up system |
US4686620A (en) | 1984-07-26 | 1987-08-11 | American Telephone And Telegraph Company, At&T Bell Laboratories | Database backup method |
EP0259912A1 (en) | 1986-09-12 | 1988-03-16 | Hewlett-Packard Limited | File backup facility for a community of personal computers |
US4912637A (en) | 1988-04-26 | 1990-03-27 | Tandem Computers Incorporated | Version management tool |
EP0405926A2 (en) | 1989-06-30 | 1991-01-02 | Digital Equipment Corporation | Method and apparatus for managing a shadow set of storage media |
US4995035A (en) | 1988-10-31 | 1991-02-19 | International Business Machines Corporation | Centralized management in a computer network |
US5005122A (en) | 1987-09-08 | 1991-04-02 | Digital Equipment Corporation | Arrangement with cooperating management server node and network service node |
EP0467546A2 (en) | 1990-07-18 | 1992-01-22 | International Computers Limited | Distributed data processing systems |
US5093912A (en) | 1989-06-26 | 1992-03-03 | International Business Machines Corporation | Dynamic resource pool expansion and contraction in multiprocessing environments |
US5133065A (en) | 1989-07-27 | 1992-07-21 | Personal Computer Peripherals Corporation | Backup computer program for networks |
US5193154A (en) | 1987-07-10 | 1993-03-09 | Hitachi, Ltd. | Buffered peripheral system and method for backing up and retrieving data to and from backup memory device |
EP0541281A2 (en) | 1991-11-04 | 1993-05-12 | AT&T Corp. | Incremental-computer-file backup using signatures |
US5212772A (en) | 1991-02-11 | 1993-05-18 | Gigatrend Incorporated | System for storing data in backup tape device |
US5226157A (en) | 1988-03-11 | 1993-07-06 | Hitachi, Ltd. | Backup control method and system in data processing system using identifiers for controlling block data transfer |
US5239647A (en) | 1990-09-07 | 1993-08-24 | International Business Machines Corporation | Data storage hierarchy with shared storage level |
US5241668A (en) | 1992-04-20 | 1993-08-31 | International Business Machines Corporation | Method and system for automated termination and resumption in a time zero backup copy process |
US5241670A (en) | 1992-04-20 | 1993-08-31 | International Business Machines Corporation | Method and system for automated backup copy ordering in a time zero backup copy session |
US5276867A (en) | 1989-12-19 | 1994-01-04 | Epoch Systems, Inc. | Digital data storage system with improved data migration |
US5276860A (en) | 1989-12-19 | 1994-01-04 | Epoch Systems, Inc. | Digital data processor with improved backup storage |
US5287500A (en) | 1991-06-03 | 1994-02-15 | Digital Equipment Corporation | System for allocating storage spaces based upon required and optional service attributes having assigned piorities |
US5301286A (en) | 1991-01-02 | 1994-04-05 | At&T Bell Laboratories | Memory archiving indexing arrangement |
US5321816A (en) | 1989-10-10 | 1994-06-14 | Unisys Corporation | Local-remote apparatus with specialized image storage modules |
US5333315A (en) | 1991-06-27 | 1994-07-26 | Digital Equipment Corporation | System of device independent file directories using a tag between the directories and file descriptors that migrate with the files |
US5347653A (en) | 1991-06-28 | 1994-09-13 | Digital Equipment Corporation | System for reconstructing prior versions of indexes using records indicating changes between successive versions of the indexes |
US5403639A (en) | 1992-09-02 | 1995-04-04 | Storage Technology Corporation | File server having snapshot application data groups |
US5410700A (en) | 1991-09-04 | 1995-04-25 | International Business Machines Corporation | Computer system which supports asynchronous commitment of data |
WO1995013580A1 (en) | 1993-11-09 | 1995-05-18 | Arcada Software | Data backup and restore system for a computer network |
US5420996A (en) | 1990-04-27 | 1995-05-30 | Kabushiki Kaisha Toshiba | Data processing system having selective data save and address translation mechanism utilizing CPU idle period |
US5448724A (en) | 1993-07-02 | 1995-09-05 | Fujitsu Limited | Data processing system having double supervising functions |
US5454099A (en) | 1989-07-25 | 1995-09-26 | International Business Machines Corporation | CPU implemented method for backing up modified data sets in non-volatile store for recovery in the event of CPU failure |
US5491810A (en) | 1994-03-01 | 1996-02-13 | International Business Machines Corporation | Method and system for automated data storage system space allocation utilizing prioritized data set parameters |
US5495607A (en) | 1993-11-15 | 1996-02-27 | Conner Peripherals, Inc. | Network management system having virtual catalog overview of files distributively stored across network domain |
US5499367A (en) | 1991-11-15 | 1996-03-12 | Oracle Corporation | System for database integrity with multiple logs assigned to client subsets |
US5504873A (en) | 1989-11-01 | 1996-04-02 | E-Systems, Inc. | Mass data storage and retrieval system |
US5544345A (en) | 1993-11-08 | 1996-08-06 | International Business Machines Corporation | Coherence controls for store-multiple shared data coordinated by cache directory entries in a shared electronic storage |
US5544347A (en) | 1990-09-24 | 1996-08-06 | Emc Corporation | Data storage system controlled remote data mirroring with respectively maintained data indices |
US5559957A (en) | 1995-05-31 | 1996-09-24 | Lucent Technologies Inc. | File system for a data storage device having a power fail recovery mechanism for write/replace operations |
US5619644A (en) | 1995-09-18 | 1997-04-08 | International Business Machines Corporation | Software directed microcode state save for distributed storage controller |
US5625793A (en) | 1991-04-15 | 1997-04-29 | International Business Machines Corporation | Automatic cache bypass for instructions exhibiting poor cache hit ratio |
EP0774715A1 (en) | 1995-10-23 | 1997-05-21 | Stac Electronics | System for backing up files from disk volumes on multiple nodes of a computer network |
US5638509A (en) | 1994-06-10 | 1997-06-10 | Exabyte Corporation | Data storage and protection system |
US5673381A (en) | 1994-05-27 | 1997-09-30 | Cheyenne Software International Sales Corp. | System and parallel streaming and data stripping to back-up a network |
EP0809184A1 (en) | 1996-05-23 | 1997-11-26 | International Business Machines Corporation | Availability and recovery of files using copy storage pools |
US5699361A (en) | 1995-07-18 | 1997-12-16 | Industrial Technology Research Institute | Multimedia channel formulation mechanism |
US5720026A (en) | 1995-10-06 | 1998-02-17 | Mitsubishi Denki Kabushiki Kaisha | Incremental backup system |
US5729743A (en) | 1995-11-17 | 1998-03-17 | Deltatech Research, Inc. | Computer apparatus and method for merging system deltas |
US5732240A (en) | 1993-06-04 | 1998-03-24 | Digital Equipment Corporation | Real-time data cache size adjustment in a server computer |
US5751997A (en) | 1993-01-21 | 1998-05-12 | Apple Computer, Inc. | Method and apparatus for transferring archival data among an arbitrarily large number of computer devices in a networked computer environment |
US5758359A (en) | 1996-10-24 | 1998-05-26 | Digital Equipment Corporation | Method and apparatus for performing retroactive backups in a computer system |
US5761677A (en) | 1996-01-03 | 1998-06-02 | Sun Microsystems, Inc. | Computer system method and apparatus providing for various versions of a file without requiring data copy or log operations |
US5765173A (en) | 1996-01-11 | 1998-06-09 | Connected Corporation | High performance backup via selective file saving which can perform incremental backups and exclude files and uses a changed block signature list |
US5764972A (en) | 1993-02-01 | 1998-06-09 | Lsc, Inc. | Archiving file system for data servers in a distributed network environment |
US5790828A (en) | 1993-04-29 | 1998-08-04 | Southwestern Bell Technology Resources, Inc. | Disk meshing and flexible storage mapping with enhanced flexible caching |
US5813009A (en) | 1995-07-28 | 1998-09-22 | Univirtual Corp. | Computer based records management system method |
US5813017A (en) | 1994-10-24 | 1998-09-22 | International Business Machines Corporation | System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing |
US5812398A (en) | 1996-06-10 | 1998-09-22 | Sun Microsystems, Inc. | Method and system for escrowed backup of hotelled world wide web sites |
US5813008A (en) | 1996-07-12 | 1998-09-22 | Microsoft Corporation | Single instance storage of information |
US5875478A (en) | 1996-12-03 | 1999-02-23 | Emc Corporation | Computer backup using a file system, network, disk, tape and remote archiving repository media system |
US5875481A (en) | 1997-01-30 | 1999-02-23 | International Business Machines Corporation | Dynamic reconfiguration of data storage devices to balance recycle throughput |
WO1999009480A1 (en) | 1997-07-29 | 1999-02-25 | Telebackup Systems, Inc. | Method and system for nonredundant backup of identical files stored on remote computers |
US5878408A (en) | 1996-12-06 | 1999-03-02 | International Business Machines Corporation | Data management system and process |
EP0899662A1 (en) | 1997-08-29 | 1999-03-03 | Hewlett-Packard Company | Backup and restore system for a computer network |
WO1999012098A1 (en) | 1997-08-29 | 1999-03-11 | Hewlett-Packard Company | Data backup and recovery systems |
US5887134A (en) | 1997-06-30 | 1999-03-23 | Sun Microsystems | System and method for preserving message order while employing both programmed I/O and DMA operations |
US5901327A (en) | 1996-05-28 | 1999-05-04 | Emc Corporation | Bundling of write data from channel commands in a command chain for transmission over a data link between data storage systems for remote data mirroring |
US5907672A (en) | 1995-10-04 | 1999-05-25 | Stac, Inc. | System for backing up computer disk volumes with error remapping of flawed memory addresses |
US5924102A (en) | 1997-05-07 | 1999-07-13 | International Business Machines Corporation | System and method for managing critical files |
US5930831A (en) | 1995-02-23 | 1999-07-27 | Powerquest Corporation | Partition manipulation architecture supporting multiple file systems |
US5940833A (en) | 1996-07-12 | 1999-08-17 | Microsoft Corporation | Compressing sets of integers |
US5950205A (en) | 1997-09-25 | 1999-09-07 | Cisco Technology, Inc. | Data transmission over the internet using a cache memory file system |
US5956519A (en) | 1992-06-30 | 1999-09-21 | Discovision Associates | Picture end token in a system comprising a plurality of pipeline stages |
US5974563A (en) | 1995-10-16 | 1999-10-26 | Network Specialists, Inc. | Real time backup system |
US5990810A (en) | 1995-02-17 | 1999-11-23 | Williams; Ross Neil | Method for partitioning a block of data into subblocks and for storing and communcating such subblocks |
US6021415A (en) | 1997-10-29 | 2000-02-01 | International Business Machines Corporation | Storage management system with file aggregation and space reclamation within aggregated files |
US6026414A (en) | 1998-03-05 | 2000-02-15 | International Business Machines Corporation | System including a proxy client to backup files in a distributed computing environment |
EP0981090A1 (en) | 1998-08-17 | 2000-02-23 | Connected Place Limited | A method of producing a checkpoint which describes a base file and a method of generating a difference file defining differences between an updated file and a base file |
US6044437A (en) | 1997-11-12 | 2000-03-28 | Intel Corporation | Method for generating and transferring redundancy bits between levels of a cache memory hierarchy |
US6052735A (en) | 1997-10-24 | 2000-04-18 | Microsoft Corporation | Electronic mail object synchronization between a desktop computer and mobile device |
US6076148A (en) | 1997-12-26 | 2000-06-13 | Emc Corporation | Mass storage subsystem and backup arrangement for digital data processing system which permits information to be backed up while host computer(s) continue(s) operating in connection with information stored on mass storage subsystem |
US6094416A (en) | 1997-05-09 | 2000-07-25 | I/O Control Corporation | Multi-tier architecture for control network |
US6131095A (en) | 1996-12-11 | 2000-10-10 | Hewlett-Packard Company | Method of accessing a target entity over a communications network |
US6131190A (en) | 1997-12-18 | 2000-10-10 | Sidwell; Leland P. | System for modifying JCL parameters to optimize data storage allocations |
US6154787A (en) | 1998-01-21 | 2000-11-28 | Unisys Corporation | Grouping shared resources into one or more pools and automatically re-assigning shared resources from where they are not currently needed to where they are needed |
US6161111A (en) | 1998-03-31 | 2000-12-12 | Emc Corporation | System and method for performing file-handling operations in a digital data processing system using an operating system-independent file map |
US6163856A (en) | 1998-05-29 | 2000-12-19 | Sun Microsystems, Inc. | Method and apparatus for file system disaster recovery |
US6167402A (en) | 1998-04-27 | 2000-12-26 | Sun Microsystems, Inc. | High performance message store |
US6212512B1 (en) | 1999-01-06 | 2001-04-03 | Hewlett-Packard Company | Integration of a database into file management software for protecting, tracking and retrieving data |
US6260069B1 (en) | 1998-02-10 | 2001-07-10 | International Business Machines Corporation | Direct data retrieval in a distributed computing system |
US6269431B1 (en) | 1998-08-13 | 2001-07-31 | Emc Corporation | Virtual storage and block level direct access of secondary storage for recovery of backup data |
US6275953B1 (en) | 1997-09-26 | 2001-08-14 | Emc Corporation | Recovery from failure of a data processor in a network server |
US6286084B1 (en) | 1998-09-16 | 2001-09-04 | Cisco Technology, Inc. | Methods and apparatus for populating a network cache |
US6289432B1 (en) | 1998-03-25 | 2001-09-11 | International Business Machines Corporation | Sharing segments of storage by enabling the sharing of page tables |
US6301592B1 (en) | 1997-11-05 | 2001-10-09 | Hitachi, Ltd. | Method of and an apparatus for displaying version information and configuration information and a computer-readable recording medium on which a version and configuration information display program is recorded |
US6324581B1 (en) | 1999-03-03 | 2001-11-27 | Emc Corporation | File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems |
US6330570B1 (en) | 1998-03-02 | 2001-12-11 | Hewlett-Packard Company | Data backup system |
US6328766B1 (en) | 1997-01-23 | 2001-12-11 | Overland Data, Inc. | Media element library with non-overlapping subset of media elements and non-overlapping subset of media element drives accessible to first host and unaccessible to second host |
US6330642B1 (en) | 2000-06-29 | 2001-12-11 | Bull Hn Informatin Systems Inc. | Three interconnected raid disk controller data processing system architecture |
US20010052015A1 (en) | 1998-06-24 | 2001-12-13 | Chueng-Hsien Lin | Push-pull sevices for the internet |
WO2002005466A2 (en) | 2000-07-07 | 2002-01-17 | Qualcomm Incorporated | Method and apparatus for proportionately multiplexing data streams onto one data stream |
US6343324B1 (en) | 1999-09-13 | 2002-01-29 | International Business Machines Corporation | Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices |
US6353878B1 (en) | 1998-08-13 | 2002-03-05 | Emc Corporation | Remote control of backup media in a secondary storage subsystem through access to a primary storage subsystem |
US6356801B1 (en) | 2000-05-19 | 2002-03-12 | International Business Machines Corporation | High availability work queuing in an automated data storage library |
USRE37601E1 (en) | 1992-04-20 | 2002-03-19 | International Business Machines Corporation | Method and system for incremental time zero backup copying of data |
US6366988B1 (en) | 1997-07-18 | 2002-04-02 | Storactive, Inc. | Systems and methods for electronic data storage management |
US6366986B1 (en) | 1998-06-30 | 2002-04-02 | Emc Corporation | Method and apparatus for differential backup in a computer storage system |
US6374336B1 (en) | 1997-12-24 | 2002-04-16 | Avid Technology, Inc. | Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner |
US6389433B1 (en) | 1999-07-16 | 2002-05-14 | Microsoft Corporation | Method and system for automatically merging files into a single instance store |
US6389432B1 (en) | 1999-04-05 | 2002-05-14 | Auspex Systems, Inc. | Intelligent virtual volume access |
US20020062439A1 (en) | 1998-07-29 | 2002-05-23 | Lauren Ann Cotugno | Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto cd-rom |
US6397308B1 (en) | 1998-12-31 | 2002-05-28 | Emc Corporation | Apparatus and method for differential backup and restoration of data in a computer storage system |
US20020065892A1 (en) | 2000-11-30 | 2002-05-30 | Malik Dale W. | Method and apparatus for minimizing storage of common attachment files in an e-mail communications server |
US20020083055A1 (en) | 2000-09-29 | 2002-06-27 | Francois Pachet | Information item morphing system |
US6421711B1 (en) | 1998-06-29 | 2002-07-16 | Emc Corporation | Virtual ports for data transferring of a data storage system |
US6425057B1 (en) | 1998-08-27 | 2002-07-23 | Hewlett-Packard Company | Caching protocol method and system based on request frequency and relative storage duration |
US6438368B1 (en) | 2000-03-30 | 2002-08-20 | Ikadega, Inc. | Information distribution system and method |
US20020133601A1 (en) | 2001-03-16 | 2002-09-19 | Kennamer Walter J. | Failover of servers over which data is partitioned |
US20020143892A1 (en) | 2001-04-03 | 2002-10-03 | Mogul Jeffrey C. | Reduction of network retrieval latency using cache and digest |
US20020144250A1 (en) | 2001-03-28 | 2002-10-03 | Acermsoft Inc. | System and method for updating an executing application software in a module manner |
US20020169934A1 (en) | 2001-03-23 | 2002-11-14 | Oliver Krapp | Methods and systems for eliminating data redundancies |
US6487561B1 (en) | 1998-12-31 | 2002-11-26 | Emc Corporation | Apparatus and methods for copying, backing up, and restoring data using a backup segment size larger than the storage block size |
US6496850B1 (en) | 1999-08-31 | 2002-12-17 | Accenture Llp | Clean-up of orphaned server contexts |
US6519679B2 (en) | 1999-06-11 | 2003-02-11 | Dell Usa, L.P. | Policy based storage configuration |
US20030033308A1 (en) | 2001-08-03 | 2003-02-13 | Patel Sujal M. | System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system |
US6538669B1 (en) | 1999-07-15 | 2003-03-25 | Dell Products L.P. | Graphical user interface for configuration of a storage system |
US6557089B1 (en) | 2000-11-28 | 2003-04-29 | International Business Machines Corporation | Backup by ID-suppressed instant virtual copy then physical backup copy with ID reintroduced |
US6557030B1 (en) | 2000-05-31 | 2003-04-29 | Prediwave Corp. | Systems and methods for providing video-on-demand services for broadcasting systems |
US20030084076A1 (en) | 2001-10-31 | 2003-05-01 | Shihoko Sekiguchi | Method for storage management of storage resource on a storage network |
US6564228B1 (en) | 2000-01-14 | 2003-05-13 | Sun Microsystems, Inc. | Method of enabling heterogeneous platforms to utilize a universal file system in a storage area network |
US20030105716A1 (en) | 2001-12-03 | 2003-06-05 | Sutton Lorin R. | Reducing duplication of files on a network |
US20030115346A1 (en) | 2001-12-13 | 2003-06-19 | Mchenry Stephen T. | Multi-proxy network edge cache system and methods |
US20030149750A1 (en) | 2002-02-07 | 2003-08-07 | Franzenburg Alan M. | Distributed storage array |
US20030172130A1 (en) | 2002-03-06 | 2003-09-11 | Barry Fruchtman | Multi-session no query restore |
US20030174648A1 (en) | 2001-10-17 | 2003-09-18 | Mea Wang | Content delivery network by-pass system |
US6625623B1 (en) | 1999-12-16 | 2003-09-23 | Livevault Corporation | Systems and methods for backing up data files |
US20030182310A1 (en) | 2002-02-04 | 2003-09-25 | Elizabeth Charnock | Method and apparatus for sociological data mining |
US20030187917A1 (en) | 2002-03-26 | 2003-10-02 | At&T Corp. | Cache validation using smart source selection in a data network |
US20030188106A1 (en) | 2002-03-26 | 2003-10-02 | At&T Corp. | Cache validation using rejuvenation in a data network |
US6658526B2 (en) | 1997-03-12 | 2003-12-02 | Storage Technology Corporation | Network attached virtual data storage subsystem |
US6662198B2 (en) | 2001-08-30 | 2003-12-09 | Zoteca Inc. | Method and system for asynchronous transmission, backup, distribution of data and file sharing |
US6665815B1 (en) | 2000-06-22 | 2003-12-16 | Hewlett-Packard Development Company, L.P. | Physical incremental backup using snapshots |
US20040010562A1 (en) | 2002-06-26 | 2004-01-15 | Wataru Itonaga | Shared cache server |
US6704730B2 (en) | 2000-02-18 | 2004-03-09 | Avamar Technologies, Inc. | Hash file system and method for use in a commonality factoring system |
US6732125B1 (en) | 2000-09-08 | 2004-05-04 | Storage Technology Corporation | Self archiving log structured volume with intrinsic data protection |
US6757794B2 (en) | 1999-08-20 | 2004-06-29 | Microsoft Corporation | Buffering data in a hierarchical data storage environment |
US20040128442A1 (en) | 2002-09-18 | 2004-07-01 | Netezza Corporation | Disk mirror architecture for database appliance |
US6760812B1 (en) | 2000-10-05 | 2004-07-06 | International Business Machines Corporation | System and method for coordinating state between networked caches |
US6779093B1 (en) | 2002-02-15 | 2004-08-17 | Veritas Operating Corporation | Control facility for processing in-band control messages during data replication |
US6789161B1 (en) | 1998-07-06 | 2004-09-07 | Storage Technology Corporation | Method for controlling reutilization of data space in virtual tape system |
US20040181519A1 (en) | 2002-07-09 | 2004-09-16 | Mohammed Shahbaz Anwar | Method for generating multidimensional summary reports from multidimensional summary reports from multidimensional data |
US6799258B1 (en) | 2001-01-10 | 2004-09-28 | Datacore Software Corporation | Methods and apparatus for point-in-time volumes |
US6810398B2 (en) | 2000-11-06 | 2004-10-26 | Avamar Technologies, Inc. | System and method for unorchestrated determination of data sequences using sticky byte factoring to determine breakpoints in digital sequences |
US20040215746A1 (en) | 2003-04-14 | 2004-10-28 | Nbt Technology, Inc. | Transparent client-server transaction accelerator |
US20040230753A1 (en) | 2003-05-16 | 2004-11-18 | International Business Machines Corporation | Methods and apparatus for providing service differentiation in a shared storage environment |
US6823377B1 (en) | 2000-01-28 | 2004-11-23 | International Business Machines Corporation | Arrangements and methods for latency-sensitive hashing for collaborative web caching |
US20050050392A1 (en) | 2003-08-26 | 2005-03-03 | Tsunehiko Baba | Failover method in a redundant computer system with storage devices |
US6865655B1 (en) | 2002-07-30 | 2005-03-08 | Sun Microsystems, Inc. | Methods and apparatus for backing up and restoring data portions stored in client computer systems |
US20050060643A1 (en) | 2003-08-25 | 2005-03-17 | Miavia, Inc. | Document similarity detection and classification system |
US20050066118A1 (en) | 2003-09-23 | 2005-03-24 | Robert Perry | Methods and apparatus for recording write requests directed to a data store |
US20050066225A1 (en) | 2003-09-23 | 2005-03-24 | Michael Rowan | Data storage system |
US6886020B1 (en) | 2000-08-17 | 2005-04-26 | Emc Corporation | Method and apparatus for storage system metrics management and archive |
US20050108292A1 (en) | 2003-11-14 | 2005-05-19 | Burton David A. | Virtual incremental storage apparatus method and system |
US20050114450A1 (en) | 2003-10-31 | 2005-05-26 | Devos Steven R. | Single instance backup of email message attachments |
US20050117558A1 (en) | 2003-12-02 | 2005-06-02 | Deutsches Zentrum Fur Luft-Und Raumfahrt E. V. | Method for reducing data transport volume in data networks |
US6912629B1 (en) | 1999-07-28 | 2005-06-28 | Storage Technology Corporation | System and method for restoring data from secondary volume to primary volume in a data storage system |
US20050144202A1 (en) | 2003-12-19 | 2005-06-30 | Chen Raymond C. | System and method for supporting asynchronous data replication with very short update intervals |
US20050154937A1 (en) | 2003-12-02 | 2005-07-14 | Kyosuke Achiwa | Control method for storage system, storage system, and storage device |
US20050204108A1 (en) | 1998-12-31 | 2005-09-15 | Emc Corporation | Apparatus and method for copying, backing up and restoring logical objects in a computer storage system by transferring blocks out of order or in parallel backing up and restoring |
US20050216659A1 (en) | 2004-03-26 | 2005-09-29 | Hitachi, Ltd. | Storage capable of cache assignment modification |
US6952758B2 (en) | 2002-07-31 | 2005-10-04 | International Business Machines Corporation | Method and system for providing consistent data modification information to clients in a storage system |
US20050246393A1 (en) | 2000-03-03 | 2005-11-03 | Intel Corporation | Distributed storage cluster architecture |
US20050243609A1 (en) | 2004-05-03 | 2005-11-03 | Yang Ken Q | Adaptive cache engine for storage area network including systems and methods related thereto |
US20050268068A1 (en) | 1997-10-30 | 2005-12-01 | Paul Ignatius | Method and system for transferring data in a storage operation |
US20050273654A1 (en) | 2004-04-28 | 2005-12-08 | Ying Chen | Minimizing resynchronization time after backup system failures in an appliance-based business continuance architecture |
US6983351B2 (en) | 2002-04-11 | 2006-01-03 | International Business Machines Corporation | System and method to guarantee overwrite of expired data in a virtual tape server |
US20060004808A1 (en) | 2004-06-30 | 2006-01-05 | International Business Machines Corporation | System and method for performing compression/encryption on data such that the number of duplicate blocks in the transformed data is increased |
US20060005048A1 (en) | 2004-07-02 | 2006-01-05 | Hitachi Ltd. | Method and apparatus for encrypted remote copy for secure data backup and restoration |
US20060010227A1 (en) | 2004-06-01 | 2006-01-12 | Rajeev Atluri | Methods and apparatus for accessing data from a primary data storage system for secondary storage |
US20060020660A1 (en) | 2004-07-20 | 2006-01-26 | Vishwa Prasad | Proxy and cache architecture for document storage |
US20060064456A1 (en) | 2004-09-17 | 2006-03-23 | Wolfgang Kalthoff | Multistep master data cleansing in operative business processes |
US20060074957A1 (en) | 2004-09-29 | 2006-04-06 | Hitachi, Ltd. | Method of configuration management of a computer system |
US7028096B1 (en) | 1999-09-14 | 2006-04-11 | Streaming21, Inc. | Method and apparatus for caching for streaming data |
US20060089954A1 (en) | 2002-05-13 | 2006-04-27 | Anschutz Thomas A | Scalable common access back-up architecture |
US20060101096A1 (en) | 2004-10-29 | 2006-05-11 | Karl Fuerst | Associations between duplicate master data objects |
WO2006052872A2 (en) | 2004-11-05 | 2006-05-18 | Commvault Systems, Inc. | System and method to support single instance storage operations |
US20060129537A1 (en) | 2004-11-12 | 2006-06-15 | Nec Corporation | Storage management system and method and program |
US7065619B1 (en) | 2002-12-20 | 2006-06-20 | Data Domain, Inc. | Efficient data storage system |
US20060136685A1 (en) | 2004-12-17 | 2006-06-22 | Sanrad Ltd. | Method and system to maintain data consistency over an internet small computer system interface (iSCSI) network |
US7082441B1 (en) | 2000-08-17 | 2006-07-25 | Emc Corporation | Method and storage and manipulation of storage system metrics |
US20060168318A1 (en) | 2003-02-12 | 2006-07-27 | Adam Twiss | Methods and apparatus for traffic management in peer-to-peer networks |
US20060167900A1 (en) | 2005-01-18 | 2006-07-27 | Oracle International Corporation | Reducing memory used by metadata for duplicate user defined types |
US7085904B2 (en) | 2003-10-20 | 2006-08-01 | Hitachi, Ltd. | Storage system and method for backup |
US20060179261A1 (en) | 2003-04-11 | 2006-08-10 | Vijayan Rajan | Writable read-only snapshots |
US20060179405A1 (en) | 2005-02-10 | 2006-08-10 | Hui Chao | Constraining layout variations for accommodating variable content in electronic documents |
US7100089B1 (en) | 2002-09-06 | 2006-08-29 | 3Pardata, Inc. | Determining differences between snapshots |
US7103617B2 (en) | 2003-01-17 | 2006-09-05 | Tacit Networks, Inc. | Method and system for use of storage caching with a distributed file system |
US7107298B2 (en) | 2001-09-28 | 2006-09-12 | Commvault Systems, Inc. | System and method for archiving objects in an information store |
US7107395B1 (en) | 1998-12-31 | 2006-09-12 | Emc Corporation | Apparatus and methods for operating a computer storage system |
US7117246B2 (en) | 2000-02-22 | 2006-10-03 | Sendmail, Inc. | Electronic mail system with methodology providing distributed message store |
US20060277154A1 (en) | 2005-06-02 | 2006-12-07 | Lunt Tracy T | Data structure generated in accordance with a method for identifying electronic files using derivative attributes created from native file attributes |
US7155633B2 (en) | 2003-12-08 | 2006-12-26 | Solid Data Systems, Inc. | Exchange server method and system |
US7155465B2 (en) | 2003-04-18 | 2006-12-26 | Lee Howard F | Method and apparatus for automatically archiving a file system |
US20070006018A1 (en) | 2005-06-29 | 2007-01-04 | Thompson Dianne C | Creation of a single snapshot using a server job request |
US20070038714A1 (en) | 2005-06-30 | 2007-02-15 | Jorg-Stefan Sell | Method and system for journaling electronic messages |
US20070043757A1 (en) | 2005-08-17 | 2007-02-22 | Microsoft Corporation | Storage reports duplicate file detection |
US20070050526A1 (en) | 2005-08-31 | 2007-03-01 | Hitachi, Ltd. | Storage control device and separation-type storage device |
US7194454B2 (en) | 2001-03-12 | 2007-03-20 | Lucent Technologies | Method for organizing records of database search activity by topical relevance |
US20070067263A1 (en) | 2001-11-21 | 2007-03-22 | Husain Syed Mohammad A | System and Method for Providing Virtual Network Attached Storage Using Excess Distributed Storage Capacity |
US20070073814A1 (en) | 2005-09-27 | 2007-03-29 | Teamon Systems, Inc., State Of Incorporation: Delaware | Email server with proxy caching of unique identifiers |
US7225210B2 (en) | 2003-11-20 | 2007-05-29 | Overland Storage, Inc. | Block level data snapshot system and method |
US20070156966A1 (en) | 2005-12-30 | 2007-07-05 | Prabakar Sundarrajan | System and method for performing granular invalidation of cached dynamically generated objects in a data communication network |
US7243163B1 (en) | 2001-08-07 | 2007-07-10 | Good Technology, Inc. | System and method for full wireless synchronization of a data processing apparatus with a messaging system |
US20070162462A1 (en) | 2006-01-03 | 2007-07-12 | Nec Laboratories America, Inc. | Wide Area Networked File System |
US7246272B2 (en) | 2004-01-16 | 2007-07-17 | International Business Machines Corporation | Duplicate network address detection |
US20070179990A1 (en) | 2006-01-31 | 2007-08-02 | Eyal Zimran | Primary stub file retention and secondary retention coordination in a hierarchical storage system |
US20070192444A1 (en) | 2002-09-16 | 2007-08-16 | Emmanuel Ackaouy | Apparatus and method for a proxy cache |
US20070192542A1 (en) | 2006-02-16 | 2007-08-16 | Svend Frolund | Method of operating distributed storage system |
US20070192544A1 (en) | 2006-02-16 | 2007-08-16 | Svend Frolund | Method of operating replicated cache |
US20070203937A1 (en) | 2005-11-28 | 2007-08-30 | Anand Prahlad | Systems and methods for classifying and transferring information in a storage network |
US7272606B2 (en) | 2003-11-26 | 2007-09-18 | Veritas Operating Corporation | System and method for detecting and storing file content access information within a file system |
US7284030B2 (en) | 2002-09-16 | 2007-10-16 | Network Appliance, Inc. | Apparatus and method for processing data in a network |
US7287252B2 (en) | 2002-09-27 | 2007-10-23 | The United States Of America Represented By The Secretary Of The Navy | Universal client and consumer |
US20070250670A1 (en) | 2006-04-25 | 2007-10-25 | Fineberg Samuel A | Content-based, compression-enhancing routing in distributed, differential electronic-data storage systems |
US20070255758A1 (en) | 2006-04-28 | 2007-11-01 | Ling Zheng | System and method for sampling based elimination of duplicate data |
US20080005509A1 (en) | 2006-06-30 | 2008-01-03 | International Business Machines Corporation | Caching recovery information on a local system to expedite recovery |
US20080005141A1 (en) | 2006-06-29 | 2008-01-03 | Ling Zheng | System and method for retrieving and using block fingerprints for data deduplication |
US20080016131A1 (en) | 2003-08-05 | 2008-01-17 | Miklos Sandorfi | Emulated storage system |
US20080028149A1 (en) | 1998-08-14 | 2008-01-31 | Microsoft Corporation | Method and system for client-side caching |
US7343356B2 (en) | 2004-04-30 | 2008-03-11 | Commvault Systems, Inc. | Systems and methods for storage modeling and costing |
US20080091655A1 (en) | 2006-10-17 | 2008-04-17 | Gokhale Parag S | Method and system for offline indexing of content and classifying stored data |
US20080091725A1 (en) | 2006-10-13 | 2008-04-17 | Paul Jin Hwang | System and method for automatic detection of duplicate digital photos |
US20080089342A1 (en) | 2001-09-27 | 2008-04-17 | Broadcom Corporation | Apparatus and method for hardware creation of a header |
US20080098083A1 (en) | 2006-10-19 | 2008-04-24 | Oracle International Corporation | System and method for data de-duplication |
US20080098041A1 (en) | 2006-10-20 | 2008-04-24 | Lakshminarayanan Chidambaran | Server supporting a consistent client-side cache |
US20080133561A1 (en) | 2006-12-01 | 2008-06-05 | Nec Laboratories America, Inc. | Methods and systems for quick and efficient data management and/or processing |
US20080140630A1 (en) | 2006-12-11 | 2008-06-12 | Fujitsu Limited | Network control system, network control method, and computer product |
US20080159331A1 (en) | 2006-12-29 | 2008-07-03 | Riverbed Technology, Inc. | Data segmentation using shift-varying predicate function fingerprinting |
US20080229037A1 (en) | 2006-12-04 | 2008-09-18 | Alan Bunte | Systems and methods for creating copies of data, such as archive copies |
US20080244172A1 (en) | 2007-03-29 | 2008-10-02 | Yoshiki Kano | Method and apparatus for de-duplication after mirror operation |
US20080243958A1 (en) | 2006-12-22 | 2008-10-02 | Anand Prahlad | System and method for storing redundant information |
US20080243769A1 (en) | 2007-03-30 | 2008-10-02 | Symantec Corporation | System and method for exporting data directly from deduplication storage to non-deduplication storage |
US20080244204A1 (en) | 2007-03-29 | 2008-10-02 | Nick Cremelie | Replication and restoration of single-instance storage pools |
US20080244199A1 (en) | 2007-03-27 | 2008-10-02 | Yasuaki Nakamura | Computer system preventing storage of duplicate files |
US20080243953A1 (en) | 2007-03-30 | 2008-10-02 | Weibao Wu | Implementing read/write, multi-versioned file system on top of backup data |
US20080244205A1 (en) | 2007-03-30 | 2008-10-02 | Hitachi, Ltd. And Hitachi Computer Peripherals Co., Ltd. | Storage system and storage control method |
US20080250204A1 (en) | 2006-12-22 | 2008-10-09 | Srinivas Kavuri | Systems and methods of hierarchical storage management, such as global management of storage operations |
US7437388B1 (en) | 2004-12-21 | 2008-10-14 | Symantec Corporation | Protecting data for distributed applications using cooperative backup agents |
US20080256431A1 (en) | 2007-04-13 | 2008-10-16 | Arno Hornberger | Apparatus and Method for Generating a Data File or for Reading a Data File |
US20080256326A1 (en) | 2007-04-11 | 2008-10-16 | Data Domain, Inc. | Subsegmenting for efficient storage, resemblance determination, and transmission |
US20080281908A1 (en) | 2007-05-08 | 2008-11-13 | Riverbed Technology, Inc. | Hybrid segment-oriented file server and wan accelerator |
US20080294696A1 (en) | 2007-05-22 | 2008-11-27 | Yuval Frandzel | System and method for on-the-fly elimination of redundant data |
US20080313236A1 (en) | 2007-06-15 | 2008-12-18 | Bala Vijayakumar | Process for cataloging data objects backed up from a content addressed storage system |
US20080320151A1 (en) | 2002-10-30 | 2008-12-25 | Riverbed Technology, Inc. | Transaction accelerator for client-server communications systems |
US7472242B1 (en) | 2006-02-14 | 2008-12-30 | Network Appliance, Inc. | Eliminating duplicate blocks during backup writes |
US20090013129A1 (en) | 2007-07-06 | 2009-01-08 | Prostor Systems, Inc. | Commonality factoring for removable media |
US20090013258A1 (en) | 2000-09-11 | 2009-01-08 | International Business Machines Corporation | Pictorial-based user interface management of computer hardware components |
US20090043767A1 (en) | 2007-08-07 | 2009-02-12 | Ashutosh Joshi | Approach For Application-Specific Duplicate Detection |
US20090055471A1 (en) | 2007-08-21 | 2009-02-26 | Kozat Ulas C | Media streaming with online caching and peer-to-peer forwarding |
US20090055425A1 (en) | 2007-08-24 | 2009-02-26 | General Electric Company | Sequence identification and analysis |
US20090077140A1 (en) | 2007-09-17 | 2009-03-19 | Anglin Matthew J | Data Recovery in a Hierarchical Data Storage System |
US7512595B1 (en) | 2006-01-03 | 2009-03-31 | Emc Corporation | Methods and systems for utilizing configuration information |
US7516186B1 (en) | 2008-04-01 | 2009-04-07 | International Business Machines Corporation | Thread based view and archive for simple mail transfer protocol (SMTP) clients devices and methods |
US7519726B2 (en) | 2003-12-12 | 2009-04-14 | International Business Machines Corporation | Methods, apparatus and computer programs for enhanced access to resources within a network |
US7539710B1 (en) | 2008-04-11 | 2009-05-26 | International Business Machines Corporation | Method of and system for deduplicating backed up data in a client-server environment |
US20090138481A1 (en) | 2007-08-29 | 2009-05-28 | Chatley Scott P | Method and system for moving requested files from one storage location to another |
US7552358B1 (en) | 2005-04-22 | 2009-06-23 | Symantec Operating Corporation | Efficient backup and restore using metadata mapping |
US20090172139A1 (en) | 2007-12-26 | 2009-07-02 | Kai Chiu Wong | Balanced consistent hashing for distributed resource management |
US20090171888A1 (en) | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Data deduplication by separating data from meta data |
US20090182789A1 (en) | 2003-08-05 | 2009-07-16 | Sepaton, Inc. | Scalable de-duplication mechanism |
US20090183162A1 (en) | 2008-01-15 | 2009-07-16 | Microsoft Corporation | Priority Based Scheduling System for Server |
US7567188B1 (en) | 2008-04-10 | 2009-07-28 | International Business Machines Corporation | Policy based tiered data deduplication strategy |
US7568080B2 (en) | 2002-10-07 | 2009-07-28 | Commvault Systems, Inc. | Snapshot storage and management system with indexing and user interface |
US7574692B2 (en) | 2004-11-19 | 2009-08-11 | Adrian Herscu | Method for building component-software for execution in a standards-compliant programming environment |
US20090204636A1 (en) | 2008-02-11 | 2009-08-13 | Microsoft Corporation | Multimodal object de-duplication |
US20090204649A1 (en) | 2007-11-12 | 2009-08-13 | Attune Systems, Inc. | File Deduplication Using Storage Tiers |
US7577806B2 (en) | 2003-09-23 | 2009-08-18 | Symantec Operating Corporation | Systems and methods for time dependent data storage and recovery |
US20090210431A1 (en) | 2007-11-12 | 2009-08-20 | Attune Systems, Inc. | Load Sharing Cluster File Systems |
US7584338B1 (en) | 2005-09-27 | 2009-09-01 | Data Domain, Inc. | Replication of deduplicated storage system |
US20090228599A1 (en) | 2008-03-06 | 2009-09-10 | Matthew Joseph Anglin | Distinguishing data streams to enhance data storage efficiency |
US20090243846A1 (en) | 2008-03-28 | 2009-10-01 | Fujitsu Limited | Electronic apparatus system having a plurality of rack-mounted electronic apparatuses, and method for identifying electronic apparatus in electronic apparatus system |
US20090254507A1 (en) | 2008-04-02 | 2009-10-08 | Hitachi, Ltd. | Storage Controller and Duplicated Data Detection Method Using Storage Controller |
US20090268903A1 (en) | 2008-04-25 | 2009-10-29 | Netapp, Inc. | Network storage server with integrated encryption, compression and deduplication capability |
US20090271454A1 (en) | 2008-04-29 | 2009-10-29 | International Business Machines Corporation | Enhanced method and system for assuring integrity of deduplicated data |
US20090276851A1 (en) * | 2008-04-30 | 2009-11-05 | International Business Machines Corporation | Detecting malicious behavior in a series of data transmission de-duplication requests of a de-duplicated computer system |
US20090276454A1 (en) | 2008-04-30 | 2009-11-05 | International Business Machines Corporation | Performing de-duplication for at least one computer file in a computer system |
US7631194B2 (en) | 2004-09-09 | 2009-12-08 | Microsoft Corporation | Method, system, and apparatus for creating saved searches and auto discovery groups for a data protection system |
US20090307251A1 (en) | 2008-06-06 | 2009-12-10 | Steve Heller | Method for reducing redundancy between two or more datasets |
US20090319534A1 (en) | 2008-06-24 | 2009-12-24 | Parag Gokhale | Application-aware and remote single instance data management |
US20090319585A1 (en) | 2008-06-24 | 2009-12-24 | Parag Gokhale | Application-aware and remote single instance data management |
US20090327625A1 (en) | 2008-06-30 | 2009-12-31 | International Business Machines Corporation | Managing metadata for data blocks used in a deduplication system |
US20100005259A1 (en) | 2008-07-03 | 2010-01-07 | Anand Prahlad | Continuous data protection over intermittent connections, such as continuous data backup for laptops or wireless devices |
US20100011178A1 (en) | 2008-07-14 | 2010-01-14 | Vizioncore, Inc. | Systems and methods for performing backup operations of virtual machine files |
WO2010013292A1 (en) | 2008-07-31 | 2010-02-04 | 国立大学法人広島大学 | Measuring device and measuring method |
US20100031086A1 (en) | 2008-07-31 | 2010-02-04 | Andrew Charles Leppard | Repair of a corrupt data segment used by a de-duplication engine |
US20100036887A1 (en) | 2008-08-05 | 2010-02-11 | International Business Machines Corporation | Efficient transfer of deduplicated data |
US7664771B2 (en) | 2002-10-16 | 2010-02-16 | Microsoft Corporation | Optimizing defragmentation operations in a differential snapshotter |
US20100042790A1 (en) | 2008-08-12 | 2010-02-18 | Netapp, Inc. | Scalable deduplication of stored data |
US20100049926A1 (en) | 2008-08-21 | 2010-02-25 | International Business Machines Corporation | Enhancement of data mirroring to provide parallel processing of overlapping writes |
US20100049927A1 (en) | 2008-08-21 | 2010-02-25 | International Business Machines Corporation | Enhancement of data mirroring to provide parallel processing of overlapping writes |
US20100070478A1 (en) | 2008-09-15 | 2010-03-18 | International Business Machines Corporation | Retrieval and recovery of data chunks from alternate data stores in a deduplicating system |
US20100077161A1 (en) | 2008-09-24 | 2010-03-25 | Timothy John Stoakes | Identifying application metadata in a backup stream |
US20100082672A1 (en) | 2008-09-26 | 2010-04-01 | Rajiv Kottomtharayil | Systems and methods for managing single instancing data |
US20100082558A1 (en) | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | Policy-based sharing of redundant data across storage pools in a deduplicating system |
US20100088296A1 (en) | 2008-10-03 | 2010-04-08 | Netapp, Inc. | System and method for organizing data to facilitate data deduplication |
US20100094817A1 (en) | 2008-10-14 | 2010-04-15 | Israel Zvi Ben-Shaul | Storage-network de-duplication |
US7702782B1 (en) | 2006-10-18 | 2010-04-20 | Emc Corporation | Using watermarks to indicate alerts in a storage area network management console |
US20100100529A1 (en) | 2005-12-19 | 2010-04-22 | Commvault Systems, Inc. | Rolling cache configuration for a data replication system |
US20100114833A1 (en) | 2008-10-31 | 2010-05-06 | Netapp, Inc. | Remote office duplication |
US7720841B2 (en) | 2006-10-04 | 2010-05-18 | International Business Machines Corporation | Model-based self-optimizing distributed information management |
US7730113B1 (en) | 2000-03-07 | 2010-06-01 | Applied Discovery, Inc. | Network-based system and method for accessing and processing emails and other electronic legal documents that may include duplicate information |
US7734820B1 (en) | 2003-12-31 | 2010-06-08 | Symantec Operating Corporation | Adaptive caching for a distributed file sharing system |
US7734669B2 (en) | 2006-12-22 | 2010-06-08 | Commvault Systems, Inc. | Managing copies of data |
US7739235B2 (en) | 2005-04-13 | 2010-06-15 | Progress Software Corporation | Dynamic membership management in a distributed system |
US20100153511A1 (en) | 2008-12-12 | 2010-06-17 | Verizon Corporate Resources Group Llc | Duplicate mms content checking |
US7743051B1 (en) | 2006-01-23 | 2010-06-22 | Clearwell Systems, Inc. | Methods, systems, and user interface for e-mail search and retrieval |
US7747577B2 (en) | 2005-08-17 | 2010-06-29 | International Business Machines Corporation | Management of redundant objects in storage systems |
US20100169287A1 (en) | 2008-11-26 | 2010-07-01 | Commvault Systems, Inc. | Systems and methods for byte-level or quasi byte-level single instancing |
US20100180075A1 (en) | 2009-01-15 | 2010-07-15 | Mccloskey Larry | Assisted mainframe data de-duplication |
US7761425B1 (en) | 2007-03-29 | 2010-07-20 | Symantec Corporation | Low-overhead means of performing data backup |
US20100198864A1 (en) | 2007-07-02 | 2010-08-05 | Equivio Ltd. | Method for organizing large numbers of documents |
US7779032B1 (en) | 2005-07-13 | 2010-08-17 | Basis Technology Corporation | Forensic feature extraction and cross drive analysis |
US20100223495A1 (en) | 2009-02-27 | 2010-09-02 | Leppard Andrew | Minimize damage caused by corruption of de-duplicated data |
US7797279B1 (en) | 2007-12-31 | 2010-09-14 | Emc Corporation | Merging of incremental data streams with prior backed-up data |
US20100250501A1 (en) | 2009-03-26 | 2010-09-30 | International Business Machines Corporation | Storage management through adaptive deduplication |
US20100250896A1 (en) | 2009-03-30 | 2010-09-30 | Hi/Fn, Inc. | System and method for data deduplication |
US20100250549A1 (en) | 2009-03-30 | 2010-09-30 | Muller Marcus S | Storing a variable number of instances of data objects |
US20100257142A1 (en) | 2009-04-03 | 2010-10-07 | Microsoft Corporation | Differential file and system restores from peers and the cloud |
US20100257346A1 (en) | 2009-04-03 | 2010-10-07 | Microsoft Corporation | Bare metal machine recovery from the cloud |
US20100257403A1 (en) | 2009-04-03 | 2010-10-07 | Microsoft Corporation | Restoration of a system from a set of full and partial delta system snapshots across a distributed system |
US7814074B2 (en) | 2008-03-14 | 2010-10-12 | International Business Machines Corporation | Method and system for assuring integrity of deduplicated data |
US7814149B1 (en) | 2008-09-29 | 2010-10-12 | Symantec Operating Corporation | Client side data deduplication |
US7822939B1 (en) | 2007-09-25 | 2010-10-26 | Emc Corporation | Data de-duplication using thin provisioning |
US7827150B1 (en) | 2007-04-30 | 2010-11-02 | Symantec Corporation | Application aware storage appliance archiving |
US20100306283A1 (en) | 2009-01-28 | 2010-12-02 | Digitiliti, Inc. | Information object creation for a distributed computing system |
US20100306193A1 (en) * | 2009-05-28 | 2010-12-02 | Zeitera, Llc | Multi-media content identification using multi-level content signature correlation and fast similarity search |
US20100312752A1 (en) | 2009-06-08 | 2010-12-09 | Symantec Corporation | Source Classification For Performing Deduplication In A Backup Operation |
WO2010140264A1 (en) | 2009-06-04 | 2010-12-09 | Hitachi,Ltd. | Storage subsystem and its data processing method, and computer system |
US20100318759A1 (en) | 2009-06-15 | 2010-12-16 | Microsoft Corporation | Distributed rdc chunk store |
US20100332454A1 (en) | 2009-06-30 | 2010-12-30 | Anand Prahlad | Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer |
US20110010498A1 (en) | 2009-07-10 | 2011-01-13 | Matthew Russell Lay | Providing preferred seed data for seeding a data deduplicating storage system |
US20110040728A1 (en) | 2009-08-11 | 2011-02-17 | International Business Machines Corporation | Replication of deduplicated data |
US7899871B1 (en) | 2006-01-23 | 2011-03-01 | Clearwell Systems, Inc. | Methods and systems for e-mail topic classification |
US20110060940A1 (en) | 2009-06-18 | 2011-03-10 | Taylor Tracy M | N+1 failover and resynchronization of data storage appliances |
US20110072291A1 (en) | 2007-09-26 | 2011-03-24 | Hitachi, Ltd. | Power efficient data storage with data de-duplication |
US20110113016A1 (en) | 2009-11-06 | 2011-05-12 | International Business Machines Corporation | Method and Apparatus for Data Compression |
US20110113013A1 (en) | 2009-11-09 | 2011-05-12 | Computer Associates Think, Inc. | Duplicate backup data identification and consolidation |
US20110113012A1 (en) | 2009-11-06 | 2011-05-12 | International Business Machines Corporation | Operating System and File System Independent Incremental Data Backup |
US20110119741A1 (en) | 2009-11-18 | 2011-05-19 | Hotchalk Inc. | Method for Conditionally Obtaining Files From a Local Appliance |
US20110153570A1 (en) | 2009-12-18 | 2011-06-23 | Electronics And Telecommunications Research Institute | Data replication and recovery method in asymmetric clustered distributed file system |
US20110161723A1 (en) | 2009-12-28 | 2011-06-30 | Riverbed Technology, Inc. | Disaster recovery using local and cloud spanning deduplicated storage system |
US20110167221A1 (en) | 2010-01-06 | 2011-07-07 | Gururaj Pangal | System and method for efficiently creating off-site data volume back-ups |
US8041907B1 (en) | 2008-06-30 | 2011-10-18 | Symantec Operating Corporation | Method and system for efficient space management for single-instance-storage volumes |
US20110258161A1 (en) | 2010-04-14 | 2011-10-20 | International Business Machines Corporation | Optimizing Data Transmission Bandwidth Consumption Over a Wide Area Network |
US20110289281A1 (en) | 2010-05-24 | 2011-11-24 | Quantum Corporation | Policy Based Data Retrieval Performance for Deduplicated Data |
US8074043B1 (en) | 2009-01-30 | 2011-12-06 | Symantec Corporation | Method and apparatus to recover from interrupted data streams in a deduplication system |
US20110302140A1 (en) | 2010-06-04 | 2011-12-08 | Commvault Systems, Inc. | Failover systems and methods for performing backup operations |
US20110314400A1 (en) | 2010-06-21 | 2011-12-22 | Microsoft Corporation | Assisted filtering of multi-dimensional data |
US20110314070A1 (en) | 2010-06-18 | 2011-12-22 | Microsoft Corporation | Optimization of storage and transmission of data |
US8095756B1 (en) | 2009-04-28 | 2012-01-10 | Netapp, Inc. | System and method for coordinating deduplication operations and backup operations of a storage volume |
US20120011101A1 (en) | 2010-07-12 | 2012-01-12 | Computer Associates Think, Inc. | Integrating client and server deduplication systems |
US20120016839A1 (en) | 2010-07-15 | 2012-01-19 | Delphix Corp. | De-Duplication Based Backup Of File Systems |
US20120016845A1 (en) | 2010-07-16 | 2012-01-19 | Twinstrata, Inc | System and method for data deduplication for disk storage subsystems |
US8108638B2 (en) | 2009-02-06 | 2012-01-31 | International Business Machines Corporation | Backup of deduplicated data |
US8108446B1 (en) | 2008-06-27 | 2012-01-31 | Symantec Corporation | Methods and systems for managing deduplicated data using unilateral referencing |
US8136025B1 (en) | 2003-07-03 | 2012-03-13 | Google Inc. | Assigning document identification tags |
US8145614B1 (en) | 2007-12-28 | 2012-03-27 | Emc Corporation | Selection of a data path based on the likelihood that requested information is in a cache |
US20120078881A1 (en) | 2010-09-24 | 2012-03-29 | Hitachi Data Systems Corporation | System and method for aggregating query results in a fault-tolerant database management system |
WO2012044367A1 (en) | 2010-09-30 | 2012-04-05 | Commvault Systems, Inc. | Systems and methods for retaining and using data block signatures in data protection operations |
WO2012044366A1 (en) | 2010-09-30 | 2012-04-05 | Commvault Systems, Inc. | Content aligned block-based deduplication |
US20120084272A1 (en) | 2010-10-04 | 2012-04-05 | International Business Machines Corporation | File system support for inert files |
US8156086B2 (en) | 2003-11-13 | 2012-04-10 | Commvault Systems, Inc. | Systems and methods for stored data verification |
US20120089574A1 (en) | 2010-10-12 | 2012-04-12 | Quantum Corporation | Prioritizing data deduplication |
US8200923B1 (en) | 2008-12-31 | 2012-06-12 | Emc Corporation | Method and apparatus for block level data de-duplication |
US8200638B1 (en) | 2008-04-30 | 2012-06-12 | Netapp, Inc. | Individual file restore from block-level incremental backups by using client-server backup protocol |
US8199911B1 (en) | 2008-03-31 | 2012-06-12 | Symantec Operating Corporation | Secure encryption algorithm for data deduplication on untrusted storage |
US8204213B2 (en) * | 2006-03-29 | 2012-06-19 | International Business Machines Corporation | System and method for performing a similarity measure of anonymized data |
US8204862B1 (en) | 2009-10-02 | 2012-06-19 | Symantec Corporation | Systems and methods for restoring deduplicated data |
US8209334B1 (en) | 2007-12-28 | 2012-06-26 | Don Doerner | Method to direct data to a specific one of several repositories |
US20120166403A1 (en) | 2010-12-24 | 2012-06-28 | Kim Mi-Jeom | Distributed storage system having content-based deduplication function and object storing method |
US8224875B1 (en) | 2010-01-05 | 2012-07-17 | Symantec Corporation | Systems and methods for removing unreferenced data segments from deduplicated data systems |
US20120185437A1 (en) | 2008-09-16 | 2012-07-19 | Elan Pavlov | Methods and Apparatus for Distributed Data Storage |
US8230195B2 (en) | 2004-11-08 | 2012-07-24 | Commvault Systems, Inc. | System and method for performing auxiliary storage operations |
US20120215739A1 (en) | 2006-10-27 | 2012-08-23 | Purdue Pharma L.P. | Data cache techniques in support of synchronization of databases in a distributed environment |
US20120221817A1 (en) | 2007-12-31 | 2012-08-30 | Emc Corporation | Global de-duplication in shared architectures |
US8261240B2 (en) | 2008-01-15 | 2012-09-04 | Microsoft Corporation | Debugging lazily evaluated program components |
US20120233417A1 (en) | 2011-03-11 | 2012-09-13 | Microsoft Corporation | Backup and restore strategies for data deduplication |
US8280854B1 (en) | 2009-09-01 | 2012-10-02 | Symantec Corporation | Systems and methods for relocating deduplicated data within a multi-device storage system |
US8307177B2 (en) | 2008-09-05 | 2012-11-06 | Commvault Systems, Inc. | Systems and methods for management of virtualization data |
US20120303622A1 (en) | 2006-05-19 | 2012-11-29 | Dean Jeffrey A | Efficient Indexing of Documents with Similar Content |
US20130006943A1 (en) | 2011-06-30 | 2013-01-03 | International Business Machines Corporation | Hybrid data backup in a networked computing environment |
US8352422B2 (en) | 2010-03-30 | 2013-01-08 | Commvault Systems, Inc. | Data restore systems and methods in a replication environment |
US8370315B1 (en) | 2010-05-28 | 2013-02-05 | Symantec Corporation | System and method for high performance deduplication indexing |
US8375181B1 (en) | 2004-10-28 | 2013-02-12 | Symantec Operating Corporation | System and method for performing replication based on change tracking information |
US8375008B1 (en) | 2003-01-17 | 2013-02-12 | Robert Gomes | Method and system for enterprise-wide retention of digital or electronic data |
US8452739B2 (en) | 2010-03-16 | 2013-05-28 | Copiun, Inc. | Highly scalable and distributed data de-duplication |
US20130151562A1 (en) * | 2010-07-08 | 2013-06-13 | Hitachi, Ltd. | Method of calculating feature-amount of digital sequence, and apparatus for calculating feature-amount of digital sequence |
US8468320B1 (en) | 2008-06-30 | 2013-06-18 | Symantec Operating Corporation | Scalability of data deduplication through the use of a locality table |
US8479304B1 (en) | 2009-03-31 | 2013-07-02 | Symantec Corporation | Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication |
US8484162B2 (en) | 2008-06-24 | 2013-07-09 | Commvault Systems, Inc. | De-duplication systems and methods for application-specific data |
US8510573B2 (en) | 2006-12-29 | 2013-08-13 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
US20130219470A1 (en) | 2012-02-17 | 2013-08-22 | Oracle International Corporation | Systems and methods for integration of business applications with enterprise content management systems |
US20130238562A1 (en) | 2012-03-07 | 2013-09-12 | Commvault Systems, Inc. | Data storage system utilizing proxy device for storage operations |
US8549350B1 (en) | 2010-09-30 | 2013-10-01 | Emc Corporation | Multi-tier recovery |
US20130262801A1 (en) | 2011-09-30 | 2013-10-03 | Commvault Systems, Inc. | Information management of virtual machines having mapped storage devices |
US20130262396A1 (en) | 2012-03-30 | 2013-10-03 | Commvault Systems, Inc. | Data storage recovery automation |
US8572055B1 (en) | 2008-06-30 | 2013-10-29 | Symantec Operating Corporation | Method and system for efficiently handling small files in a single instance storage data store |
US8578120B2 (en) | 2009-05-22 | 2013-11-05 | Commvault Systems, Inc. | Block-level single instancing |
US8595191B2 (en) | 2009-12-31 | 2013-11-26 | Commvault Systems, Inc. | Systems and methods for performing data management operations using snapshots |
US20130332466A1 (en) * | 2012-06-08 | 2013-12-12 | International Business Machines Corporation | Linking Data Elements Based on Similarity Data Values and Semantic Annotations |
WO2013188550A1 (en) | 2012-06-13 | 2013-12-19 | Commvault Systems, Inc. | Client-side signature repository in a networked storage system |
US8621240B1 (en) | 2007-12-31 | 2013-12-31 | Emc Corporation | User-specific hash authentication |
US8631244B1 (en) * | 2011-08-11 | 2014-01-14 | Rockwell Collins, Inc. | System and method for preventing computer malware from exfiltrating data from a user computer in a network via the internet |
US20140032940A1 (en) | 2012-07-30 | 2014-01-30 | Bruno Sartirana | Distributed file system at network switch |
US20140046904A1 (en) | 2012-08-13 | 2014-02-13 | Commvault Systems, Inc | Lightweight mounting of a secondary copy of file system data |
US20140047263A1 (en) | 2012-08-08 | 2014-02-13 | Susan Coatney | Synchronous local and cross-site failover in clustered storage systems |
US8667591B1 (en) * | 2008-06-26 | 2014-03-04 | Emc Corporation | Commonality factoring remediation |
US20140115287A1 (en) | 2009-01-23 | 2014-04-24 | Infortrend Technology, Inc. | Method and apparatus for performing volume replication using unified architecture |
US8719264B2 (en) | 2011-03-31 | 2014-05-06 | Commvault Systems, Inc. | Creating secondary copies of data based on searches for content |
US8725688B2 (en) | 2008-09-05 | 2014-05-13 | Commvault Systems, Inc. | Image level copy or restore, such as image level restore without knowledge of data object metadata |
US8726242B2 (en) | 2006-07-27 | 2014-05-13 | Commvault Systems, Inc. | Systems and methods for continuous data replication |
US8745105B2 (en) | 2010-05-28 | 2014-06-03 | Commvault Systems, Inc. | Systems and methods for performing data replication |
US20140181441A1 (en) | 2012-12-21 | 2014-06-26 | Commvault Systems, Inc. | Identifying files for multiple secondary copy operations using data obtained during backup of primary storage |
US20140195749A1 (en) | 2013-01-10 | 2014-07-10 | Pure Storage, Inc. | Deduplication of Volume Regions |
US20140196037A1 (en) | 2013-01-09 | 2014-07-10 | The Research Foundation For The State University Of New York | Gang migration of virtual machines using cluster-wide deduplication |
US20140201153A1 (en) | 2013-01-11 | 2014-07-17 | Commvault Systems, Inc. | Partial file restore in a data storage system |
US20140201142A1 (en) | 2013-01-14 | 2014-07-17 | Commvault Systems, Inc. | Partial sharing of secondary storage files in a data storage system |
US20140229451A1 (en) * | 2013-02-12 | 2014-08-14 | Atlantis Computing, Inc. | Deduplication metadata access in deduplication file system |
US8825720B1 (en) | 2011-04-12 | 2014-09-02 | Emc Corporation | Scaling asynchronous reclamation of free space in de-duplicated multi-controller storage systems |
US20140258245A1 (en) | 2013-03-07 | 2014-09-11 | Jive Software, Inc. | Efficient data deduplication |
US20140281758A1 (en) | 2013-03-12 | 2014-09-18 | International Business Machines Corporation | On-site visualization of component status |
US20140283061A1 (en) * | 2013-03-15 | 2014-09-18 | Juniper Networks, Inc. | Attack detection and prevention using global device fingerprinting |
US20140289225A1 (en) | 2013-03-21 | 2014-09-25 | Nextbit Systems Inc. | Prioritizing downloading of image files |
US8849762B2 (en) | 2011-03-31 | 2014-09-30 | Commvault Systems, Inc. | Restoring computing environments, such as autorecovery of file systems at certain points in time |
US20140337664A1 (en) | 2013-05-08 | 2014-11-13 | Commvault Systems, Inc. | Use of temporary secondary copies in failover operations |
US8909980B1 (en) | 2012-06-29 | 2014-12-09 | Emc Corporation | Coordinating processing for request redirection |
US8930306B1 (en) | 2009-07-08 | 2015-01-06 | Commvault Systems, Inc. | Synchronized data deduplication |
US20150012698A1 (en) | 2013-07-08 | 2015-01-08 | Dell Products L.P. | Restoring temporal locality in global and local deduplication storage systems |
US8954446B2 (en) | 2010-12-14 | 2015-02-10 | Comm Vault Systems, Inc. | Client-side repository in a networked deduplicated storage system |
US20150088821A1 (en) | 2013-09-23 | 2015-03-26 | International Business Machines Corporation | Data migration using multi-storage volume swap |
US20150089185A1 (en) | 2013-09-23 | 2015-03-26 | International Business Machines Corporation | Managing Mirror Copies without Blocking Application I/O |
US9020900B2 (en) | 2010-12-14 | 2015-04-28 | Commvault Systems, Inc. | Distributed deduplicated storage system |
US20150134611A1 (en) | 2013-11-12 | 2015-05-14 | Red Hat, Inc. | Transferring objects between different storage devices based on timestamps |
US20150142755A1 (en) * | 2012-08-24 | 2015-05-21 | Hitachi, Ltd. | Storage apparatus and data management method |
US20150154398A1 (en) * | 2013-12-03 | 2015-06-04 | International Business Machines Corporation | Optimizing virus scanning of files using file fingerprints |
US20150161015A1 (en) | 2012-08-13 | 2015-06-11 | Commvault Systems, Inc. | Generic file level restore from a block-level secondary copy |
US9092441B1 (en) | 2012-08-08 | 2015-07-28 | Amazon Technologies, Inc. | Archival data organization and management |
US20150248466A1 (en) | 2014-03-03 | 2015-09-03 | Netapp, Inc. | Data transfer between storage systems using data fingerprints |
US9128901B1 (en) | 2011-12-30 | 2015-09-08 | Emc Corporation | Continuous protection of data and storage management configuration |
US20150269032A1 (en) | 2014-03-18 | 2015-09-24 | Netapp, Inc. | Backing up data to cloud data storage while maintaining storage efficiency |
US20150269212A1 (en) | 2014-03-18 | 2015-09-24 | Facebook, Inc. | Data logging framework |
US20150278104A1 (en) | 2014-03-26 | 2015-10-01 | Research & Business Foundation SUNGKYUNKWAN UNIVERISTY | Hybrid memory device, memory system including same and data processing method |
US20150347306A1 (en) | 2014-05-30 | 2015-12-03 | International Business Machines Corporation | Synchronizing updates of page table status indicators in a multiprocessing environment |
US20150378839A1 (en) | 2014-06-30 | 2015-12-31 | Vmware, Inc. | Recovery system and method for performing site recovery using replicated recovery-specific metadata |
US9244779B2 (en) | 2010-09-30 | 2016-01-26 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
US20160026405A1 (en) | 2005-09-30 | 2016-01-28 | Cleversafe, Inc. | Storing data in a dispersed storage network |
US20160042090A1 (en) | 2014-08-06 | 2016-02-11 | Commvault Systems, Inc. | Preserving the integrity of a snapshot on a storage device via ephemeral write operations in an information management system |
US20160041880A1 (en) | 2014-08-06 | 2016-02-11 | Commvault Systems, Inc. | Efficient application recovery in an information management system based on a pseudo-storage-device driver |
US20160070911A1 (en) * | 2013-08-19 | 2016-03-10 | Amazon Technologies, Inc. | Rapid malware inspection of mobile applications |
US9298724B1 (en) | 2013-06-14 | 2016-03-29 | Symantec Corporation | Systems and methods for preserving deduplication efforts after backup-job failures |
US9298386B2 (en) | 2013-08-23 | 2016-03-29 | Globalfoundries Inc. | System and method for improved placement of blocks in a deduplication-erasure code environment |
US9323820B1 (en) | 2011-06-30 | 2016-04-26 | Emc Corporation | Virtual datacenter redundancy |
US9336076B2 (en) | 2013-08-23 | 2016-05-10 | Globalfoundries Inc. | System and method for controlling a redundancy parity encoding amount based on deduplication indications of activity |
US20160154709A1 (en) | 2014-08-06 | 2016-06-02 | Commvault Systems, Inc. | Point-in-time backups of a production application made accessible over fibre channel and/or iscsi as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host |
US20160170657A1 (en) | 2013-05-16 | 2016-06-16 | Hewlett-Packard Development Company, L.P. | Deduplicated data storage system having distributed manifest |
US9442806B1 (en) | 2010-11-30 | 2016-09-13 | Veritas Technologies Llc | Block-level deduplication |
US20160277360A1 (en) * | 2015-03-20 | 2016-09-22 | Migrate2, LLC | Dynamic Data Exfiltration Prevention Process (DDEPP) |
US9483486B1 (en) | 2008-12-30 | 2016-11-01 | Veritas Technologies Llc | Data encryption for a segment-based single instance file storage system |
US9542554B1 (en) * | 2014-12-18 | 2017-01-10 | Palo Alto Networks, Inc. | Deduplicating malware |
US20170031768A1 (en) | 2015-07-31 | 2017-02-02 | Atlantis Computing, Inc. | Method and apparatus for reconstructing and checking the consistency of deduplication metadata of a deduplication file system |
US9575673B2 (en) | 2014-10-29 | 2017-02-21 | Commvault Systems, Inc. | Accessing a file system using tiered deduplication |
US20170090786A1 (en) | 2013-05-07 | 2017-03-30 | Axcient, Inc. | Distributed and Deduplicating Data Storage System and Methods of Use |
US9633056B2 (en) | 2014-03-17 | 2017-04-25 | Commvault Systems, Inc. | Maintaining a deduplication database |
US9633033B2 (en) | 2013-01-11 | 2017-04-25 | Commvault Systems, Inc. | High availability distributed deduplicated storage system |
US9678968B1 (en) | 2010-05-03 | 2017-06-13 | Panzura, Inc. | Deleting a file from a distributed filesystem |
US20170168903A1 (en) | 2015-12-09 | 2017-06-15 | Commvault Systems, Inc. | Live synchronization and management of virtual machines across computing and virtualization platforms and using live synchronization to support disaster recovery |
US20170185488A1 (en) | 2015-12-23 | 2017-06-29 | Commvault Systems, Inc. | Application-level live synchronization across computing platforms including synchronizing co-resident applications to disparate standby destinations and selectively synchronizing some applications and not others |
US20170235647A1 (en) | 2016-02-12 | 2017-08-17 | Commvault Systems, Inc. | Data protection operations based on network path information |
US20170242871A1 (en) | 2016-02-18 | 2017-08-24 | Commvault Systems, Inc. | Data restoration operations based on network path information |
US9753964B1 (en) * | 2017-01-19 | 2017-09-05 | Acquire Media Ventures, Inc. | Similarity clustering in linear time with error-free retrieval using signature overlap with signature size matching |
US20170262217A1 (en) | 2016-03-09 | 2017-09-14 | Commvault Systems, Inc. | Data transfer to a distributed storage environment |
US20170315876A1 (en) | 2014-09-30 | 2017-11-02 | Code 42 Software, Inc. | Shared file system predictive storage techniques |
US20170331787A1 (en) * | 2016-05-16 | 2017-11-16 | Hitachi, Ltd. | Unauthorized communication detection system and unauthorized communication detection method |
US20180077201A1 (en) * | 2016-09-15 | 2018-03-15 | Paypal, Inc. | Enhanced Security Techniques for Remote Reverse Shell Prevention |
US20180075234A1 (en) * | 2016-09-15 | 2018-03-15 | Paypal, Inc. | Techniques for Detecting Encryption |
US9990253B1 (en) | 2011-03-31 | 2018-06-05 | EMC IP Holding Company LLC | System and method for recovering file systems without a replica |
US10061663B2 (en) | 2015-12-30 | 2018-08-28 | Commvault Systems, Inc. | Rebuilding deduplication data in a distributed deduplication data storage system |
US10218740B1 (en) * | 2013-09-30 | 2019-02-26 | Fireeye, Inc. | Fuzzy hash of behavioral results |
US10339106B2 (en) | 2015-04-09 | 2019-07-02 | Commvault Systems, Inc. | Highly reusable deduplication database after disaster recovery |
US10380072B2 (en) | 2014-03-17 | 2019-08-13 | Commvault Systems, Inc. | Managing deletions from a deduplication database |
US10481825B2 (en) | 2015-05-26 | 2019-11-19 | Commvault Systems, Inc. | Replication using deduplicated secondary copy data |
US10523699B1 (en) * | 2017-06-20 | 2019-12-31 | Amazon Technologies, Inc. | Privilege escalation vulnerability detection using message digest differentiation |
US20200073959A1 (en) * | 2018-08-31 | 2020-03-05 | Mcafee, Llc | Fuzzy hash algorithms to calculate file similarity |
US10628586B1 (en) * | 2017-11-30 | 2020-04-21 | Palo Alto Networks, Inc. | Detecting malware via scanning for dynamically generated function pointers in memory |
US20200167240A1 (en) | 2018-11-27 | 2020-05-28 | Commvault Systems, Inc. | Generating backup copies through interoperability between components of a data storage management system and appliances for data storage and deduplication |
US20200167091A1 (en) | 2018-11-27 | 2020-05-28 | Commvault Systems, Inc. | Using interoperability between components of a data storage management system and appliances for data storage and deduplication to generate secondary and tertiary copies |
US20200252428A1 (en) * | 2018-12-21 | 2020-08-06 | Fireeye, Inc. | System and method for detecting cyberattacks impersonating legitimate sources |
US20200327017A1 (en) | 2019-04-10 | 2020-10-15 | Commvault Systems, Inc. | Restore using deduplicated secondary copy data |
-
2019
- 2019-05-08 US US16/407,040 patent/US11463264B2/en active Active
Patent Citations (596)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4267568A (en) | 1975-12-03 | 1981-05-12 | System Development Corporation | Information storage and retrieval system |
US4084231A (en) | 1975-12-18 | 1978-04-11 | International Business Machines Corporation | System for facilitating the copying back of data in disc and tape units of a memory hierarchial system |
US4283787A (en) | 1978-11-06 | 1981-08-11 | British Broadcasting Corporation | Cyclic redundancy data check encoding method and apparatus |
US4417321A (en) | 1981-05-18 | 1983-11-22 | International Business Machines Corp. | Qualifying and sorting file record data |
US4641274A (en) | 1982-12-03 | 1987-02-03 | International Business Machines Corporation | Method for communicating changes made to text form a text processor to a remote host |
US4654819A (en) | 1982-12-09 | 1987-03-31 | Sequoia Systems, Inc. | Memory back-up system |
US4686620A (en) | 1984-07-26 | 1987-08-11 | American Telephone And Telegraph Company, At&T Bell Laboratories | Database backup method |
EP0259912A1 (en) | 1986-09-12 | 1988-03-16 | Hewlett-Packard Limited | File backup facility for a community of personal computers |
US5193154A (en) | 1987-07-10 | 1993-03-09 | Hitachi, Ltd. | Buffered peripheral system and method for backing up and retrieving data to and from backup memory device |
US5005122A (en) | 1987-09-08 | 1991-04-02 | Digital Equipment Corporation | Arrangement with cooperating management server node and network service node |
US5226157A (en) | 1988-03-11 | 1993-07-06 | Hitachi, Ltd. | Backup control method and system in data processing system using identifiers for controlling block data transfer |
US4912637A (en) | 1988-04-26 | 1990-03-27 | Tandem Computers Incorporated | Version management tool |
US4995035A (en) | 1988-10-31 | 1991-02-19 | International Business Machines Corporation | Centralized management in a computer network |
US5093912A (en) | 1989-06-26 | 1992-03-03 | International Business Machines Corporation | Dynamic resource pool expansion and contraction in multiprocessing environments |
EP0405926A2 (en) | 1989-06-30 | 1991-01-02 | Digital Equipment Corporation | Method and apparatus for managing a shadow set of storage media |
US5454099A (en) | 1989-07-25 | 1995-09-26 | International Business Machines Corporation | CPU implemented method for backing up modified data sets in non-volatile store for recovery in the event of CPU failure |
US5133065A (en) | 1989-07-27 | 1992-07-21 | Personal Computer Peripherals Corporation | Backup computer program for networks |
US5321816A (en) | 1989-10-10 | 1994-06-14 | Unisys Corporation | Local-remote apparatus with specialized image storage modules |
US5504873A (en) | 1989-11-01 | 1996-04-02 | E-Systems, Inc. | Mass data storage and retrieval system |
US5276860A (en) | 1989-12-19 | 1994-01-04 | Epoch Systems, Inc. | Digital data processor with improved backup storage |
US5276867A (en) | 1989-12-19 | 1994-01-04 | Epoch Systems, Inc. | Digital data storage system with improved data migration |
US5420996A (en) | 1990-04-27 | 1995-05-30 | Kabushiki Kaisha Toshiba | Data processing system having selective data save and address translation mechanism utilizing CPU idle period |
EP0467546A2 (en) | 1990-07-18 | 1992-01-22 | International Computers Limited | Distributed data processing systems |
US5239647A (en) | 1990-09-07 | 1993-08-24 | International Business Machines Corporation | Data storage hierarchy with shared storage level |
US5544347A (en) | 1990-09-24 | 1996-08-06 | Emc Corporation | Data storage system controlled remote data mirroring with respectively maintained data indices |
US5301286A (en) | 1991-01-02 | 1994-04-05 | At&T Bell Laboratories | Memory archiving indexing arrangement |
US5212772A (en) | 1991-02-11 | 1993-05-18 | Gigatrend Incorporated | System for storing data in backup tape device |
US5625793A (en) | 1991-04-15 | 1997-04-29 | International Business Machines Corporation | Automatic cache bypass for instructions exhibiting poor cache hit ratio |
US5287500A (en) | 1991-06-03 | 1994-02-15 | Digital Equipment Corporation | System for allocating storage spaces based upon required and optional service attributes having assigned piorities |
US5333315A (en) | 1991-06-27 | 1994-07-26 | Digital Equipment Corporation | System of device independent file directories using a tag between the directories and file descriptors that migrate with the files |
US5347653A (en) | 1991-06-28 | 1994-09-13 | Digital Equipment Corporation | System for reconstructing prior versions of indexes using records indicating changes between successive versions of the indexes |
US5410700A (en) | 1991-09-04 | 1995-04-25 | International Business Machines Corporation | Computer system which supports asynchronous commitment of data |
EP0541281A2 (en) | 1991-11-04 | 1993-05-12 | AT&T Corp. | Incremental-computer-file backup using signatures |
US5499367A (en) | 1991-11-15 | 1996-03-12 | Oracle Corporation | System for database integrity with multiple logs assigned to client subsets |
US5241670A (en) | 1992-04-20 | 1993-08-31 | International Business Machines Corporation | Method and system for automated backup copy ordering in a time zero backup copy session |
USRE37601E1 (en) | 1992-04-20 | 2002-03-19 | International Business Machines Corporation | Method and system for incremental time zero backup copying of data |
US5241668A (en) | 1992-04-20 | 1993-08-31 | International Business Machines Corporation | Method and system for automated termination and resumption in a time zero backup copy process |
US5956519A (en) | 1992-06-30 | 1999-09-21 | Discovision Associates | Picture end token in a system comprising a plurality of pipeline stages |
US5403639A (en) | 1992-09-02 | 1995-04-04 | Storage Technology Corporation | File server having snapshot application data groups |
US5751997A (en) | 1993-01-21 | 1998-05-12 | Apple Computer, Inc. | Method and apparatus for transferring archival data among an arbitrarily large number of computer devices in a networked computer environment |
US5764972A (en) | 1993-02-01 | 1998-06-09 | Lsc, Inc. | Archiving file system for data servers in a distributed network environment |
US5790828A (en) | 1993-04-29 | 1998-08-04 | Southwestern Bell Technology Resources, Inc. | Disk meshing and flexible storage mapping with enhanced flexible caching |
US5732240A (en) | 1993-06-04 | 1998-03-24 | Digital Equipment Corporation | Real-time data cache size adjustment in a server computer |
US5448724A (en) | 1993-07-02 | 1995-09-05 | Fujitsu Limited | Data processing system having double supervising functions |
US5544345A (en) | 1993-11-08 | 1996-08-06 | International Business Machines Corporation | Coherence controls for store-multiple shared data coordinated by cache directory entries in a shared electronic storage |
WO1995013580A1 (en) | 1993-11-09 | 1995-05-18 | Arcada Software | Data backup and restore system for a computer network |
US6038379A (en) | 1993-11-09 | 2000-03-14 | Seagate Technology, Inc. | Data backup and restore system for a computer network having generic remote file system agents for providing backup and restore operations |
US5495607A (en) | 1993-11-15 | 1996-02-27 | Conner Peripherals, Inc. | Network management system having virtual catalog overview of files distributively stored across network domain |
US5491810A (en) | 1994-03-01 | 1996-02-13 | International Business Machines Corporation | Method and system for automated data storage system space allocation utilizing prioritized data set parameters |
US5673381A (en) | 1994-05-27 | 1997-09-30 | Cheyenne Software International Sales Corp. | System and parallel streaming and data stripping to back-up a network |
US5638509A (en) | 1994-06-10 | 1997-06-10 | Exabyte Corporation | Data storage and protection system |
US5813017A (en) | 1994-10-24 | 1998-09-22 | International Business Machines Corporation | System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing |
US5990810A (en) | 1995-02-17 | 1999-11-23 | Williams; Ross Neil | Method for partitioning a block of data into subblocks and for storing and communcating such subblocks |
US5930831A (en) | 1995-02-23 | 1999-07-27 | Powerquest Corporation | Partition manipulation architecture supporting multiple file systems |
US5559957A (en) | 1995-05-31 | 1996-09-24 | Lucent Technologies Inc. | File system for a data storage device having a power fail recovery mechanism for write/replace operations |
US5699361A (en) | 1995-07-18 | 1997-12-16 | Industrial Technology Research Institute | Multimedia channel formulation mechanism |
US5813009A (en) | 1995-07-28 | 1998-09-22 | Univirtual Corp. | Computer based records management system method |
US5619644A (en) | 1995-09-18 | 1997-04-08 | International Business Machines Corporation | Software directed microcode state save for distributed storage controller |
US5907672A (en) | 1995-10-04 | 1999-05-25 | Stac, Inc. | System for backing up computer disk volumes with error remapping of flawed memory addresses |
US5720026A (en) | 1995-10-06 | 1998-02-17 | Mitsubishi Denki Kabushiki Kaisha | Incremental backup system |
US5974563A (en) | 1995-10-16 | 1999-10-26 | Network Specialists, Inc. | Real time backup system |
EP0774715A1 (en) | 1995-10-23 | 1997-05-21 | Stac Electronics | System for backing up files from disk volumes on multiple nodes of a computer network |
US5778395A (en) | 1995-10-23 | 1998-07-07 | Stac, Inc. | System for backing up files from disk volumes on multiple nodes of a computer network |
US20020107877A1 (en) | 1995-10-23 | 2002-08-08 | Douglas L. Whiting | System for backing up files from disk volumes on multiple nodes of a computer network |
US5729743A (en) | 1995-11-17 | 1998-03-17 | Deltatech Research, Inc. | Computer apparatus and method for merging system deltas |
US5761677A (en) | 1996-01-03 | 1998-06-02 | Sun Microsystems, Inc. | Computer system method and apparatus providing for various versions of a file without requiring data copy or log operations |
US5765173A (en) | 1996-01-11 | 1998-06-09 | Connected Corporation | High performance backup via selective file saving which can perform incremental backups and exclude files and uses a changed block signature list |
US6148412A (en) | 1996-05-23 | 2000-11-14 | International Business Machines Corporation | Availability and recovery of files using copy storage pools |
EP0809184A1 (en) | 1996-05-23 | 1997-11-26 | International Business Machines Corporation | Availability and recovery of files using copy storage pools |
US5901327A (en) | 1996-05-28 | 1999-05-04 | Emc Corporation | Bundling of write data from channel commands in a command chain for transmission over a data link between data storage systems for remote data mirroring |
US5812398A (en) | 1996-06-10 | 1998-09-22 | Sun Microsystems, Inc. | Method and system for escrowed backup of hotelled world wide web sites |
US5940833A (en) | 1996-07-12 | 1999-08-17 | Microsoft Corporation | Compressing sets of integers |
US5813008A (en) | 1996-07-12 | 1998-09-22 | Microsoft Corporation | Single instance storage of information |
US5758359A (en) | 1996-10-24 | 1998-05-26 | Digital Equipment Corporation | Method and apparatus for performing retroactive backups in a computer system |
US5875478A (en) | 1996-12-03 | 1999-02-23 | Emc Corporation | Computer backup using a file system, network, disk, tape and remote archiving repository media system |
US5878408A (en) | 1996-12-06 | 1999-03-02 | International Business Machines Corporation | Data management system and process |
US6131095A (en) | 1996-12-11 | 2000-10-10 | Hewlett-Packard Company | Method of accessing a target entity over a communications network |
US6328766B1 (en) | 1997-01-23 | 2001-12-11 | Overland Data, Inc. | Media element library with non-overlapping subset of media elements and non-overlapping subset of media element drives accessible to first host and unaccessible to second host |
US5875481A (en) | 1997-01-30 | 1999-02-23 | International Business Machines Corporation | Dynamic reconfiguration of data storage devices to balance recycle throughput |
US6658526B2 (en) | 1997-03-12 | 2003-12-02 | Storage Technology Corporation | Network attached virtual data storage subsystem |
US5924102A (en) | 1997-05-07 | 1999-07-13 | International Business Machines Corporation | System and method for managing critical files |
US6094416A (en) | 1997-05-09 | 2000-07-25 | I/O Control Corporation | Multi-tier architecture for control network |
US5887134A (en) | 1997-06-30 | 1999-03-23 | Sun Microsystems | System and method for preserving message order while employing both programmed I/O and DMA operations |
US6366988B1 (en) | 1997-07-18 | 2002-04-02 | Storactive, Inc. | Systems and methods for electronic data storage management |
WO1999009480A1 (en) | 1997-07-29 | 1999-02-25 | Telebackup Systems, Inc. | Method and system for nonredundant backup of identical files stored on remote computers |
EP0899662A1 (en) | 1997-08-29 | 1999-03-03 | Hewlett-Packard Company | Backup and restore system for a computer network |
WO1999012098A1 (en) | 1997-08-29 | 1999-03-11 | Hewlett-Packard Company | Data backup and recovery systems |
US5950205A (en) | 1997-09-25 | 1999-09-07 | Cisco Technology, Inc. | Data transmission over the internet using a cache memory file system |
US6275953B1 (en) | 1997-09-26 | 2001-08-14 | Emc Corporation | Recovery from failure of a data processor in a network server |
US6052735A (en) | 1997-10-24 | 2000-04-18 | Microsoft Corporation | Electronic mail object synchronization between a desktop computer and mobile device |
US6021415A (en) | 1997-10-29 | 2000-02-01 | International Business Machines Corporation | Storage management system with file aggregation and space reclamation within aggregated files |
US7581077B2 (en) | 1997-10-30 | 2009-08-25 | Commvault Systems, Inc. | Method and system for transferring data in a storage operation |
US20050268068A1 (en) | 1997-10-30 | 2005-12-01 | Paul Ignatius | Method and system for transferring data in a storage operation |
US6301592B1 (en) | 1997-11-05 | 2001-10-09 | Hitachi, Ltd. | Method of and an apparatus for displaying version information and configuration information and a computer-readable recording medium on which a version and configuration information display program is recorded |
US6044437A (en) | 1997-11-12 | 2000-03-28 | Intel Corporation | Method for generating and transferring redundancy bits between levels of a cache memory hierarchy |
US6131190A (en) | 1997-12-18 | 2000-10-10 | Sidwell; Leland P. | System for modifying JCL parameters to optimize data storage allocations |
US6374336B1 (en) | 1997-12-24 | 2002-04-16 | Avid Technology, Inc. | Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner |
US6076148A (en) | 1997-12-26 | 2000-06-13 | Emc Corporation | Mass storage subsystem and backup arrangement for digital data processing system which permits information to be backed up while host computer(s) continue(s) operating in connection with information stored on mass storage subsystem |
US6154787A (en) | 1998-01-21 | 2000-11-28 | Unisys Corporation | Grouping shared resources into one or more pools and automatically re-assigning shared resources from where they are not currently needed to where they are needed |
US6260069B1 (en) | 1998-02-10 | 2001-07-10 | International Business Machines Corporation | Direct data retrieval in a distributed computing system |
US6330570B1 (en) | 1998-03-02 | 2001-12-11 | Hewlett-Packard Company | Data backup system |
US6026414A (en) | 1998-03-05 | 2000-02-15 | International Business Machines Corporation | System including a proxy client to backup files in a distributed computing environment |
US6289432B1 (en) | 1998-03-25 | 2001-09-11 | International Business Machines Corporation | Sharing segments of storage by enabling the sharing of page tables |
US6161111A (en) | 1998-03-31 | 2000-12-12 | Emc Corporation | System and method for performing file-handling operations in a digital data processing system using an operating system-independent file map |
US6167402A (en) | 1998-04-27 | 2000-12-26 | Sun Microsystems, Inc. | High performance message store |
US6163856A (en) | 1998-05-29 | 2000-12-19 | Sun Microsystems, Inc. | Method and apparatus for file system disaster recovery |
US20010052015A1 (en) | 1998-06-24 | 2001-12-13 | Chueng-Hsien Lin | Push-pull sevices for the internet |
US6421711B1 (en) | 1998-06-29 | 2002-07-16 | Emc Corporation | Virtual ports for data transferring of a data storage system |
US6366986B1 (en) | 1998-06-30 | 2002-04-02 | Emc Corporation | Method and apparatus for differential backup in a computer storage system |
US6789161B1 (en) | 1998-07-06 | 2004-09-07 | Storage Technology Corporation | Method for controlling reutilization of data space in virtual tape system |
US20020062439A1 (en) | 1998-07-29 | 2002-05-23 | Lauren Ann Cotugno | Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto cd-rom |
US6353878B1 (en) | 1998-08-13 | 2002-03-05 | Emc Corporation | Remote control of backup media in a secondary storage subsystem through access to a primary storage subsystem |
US6269431B1 (en) | 1998-08-13 | 2001-07-31 | Emc Corporation | Virtual storage and block level direct access of secondary storage for recovery of backup data |
US20080028149A1 (en) | 1998-08-14 | 2008-01-31 | Microsoft Corporation | Method and system for client-side caching |
EP0981090A1 (en) | 1998-08-17 | 2000-02-23 | Connected Place Limited | A method of producing a checkpoint which describes a base file and a method of generating a difference file defining differences between an updated file and a base file |
US6425057B1 (en) | 1998-08-27 | 2002-07-23 | Hewlett-Packard Company | Caching protocol method and system based on request frequency and relative storage duration |
US6286084B1 (en) | 1998-09-16 | 2001-09-04 | Cisco Technology, Inc. | Methods and apparatus for populating a network cache |
US6397308B1 (en) | 1998-12-31 | 2002-05-28 | Emc Corporation | Apparatus and method for differential backup and restoration of data in a computer storage system |
US7107395B1 (en) | 1998-12-31 | 2006-09-12 | Emc Corporation | Apparatus and methods for operating a computer storage system |
US20050204108A1 (en) | 1998-12-31 | 2005-09-15 | Emc Corporation | Apparatus and method for copying, backing up and restoring logical objects in a computer storage system by transferring blocks out of order or in parallel backing up and restoring |
US6487561B1 (en) | 1998-12-31 | 2002-11-26 | Emc Corporation | Apparatus and methods for copying, backing up, and restoring data using a backup segment size larger than the storage block size |
US6212512B1 (en) | 1999-01-06 | 2001-04-03 | Hewlett-Packard Company | Integration of a database into file management software for protecting, tracking and retrieving data |
US6324581B1 (en) | 1999-03-03 | 2001-11-27 | Emc Corporation | File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems |
US6389432B1 (en) | 1999-04-05 | 2002-05-14 | Auspex Systems, Inc. | Intelligent virtual volume access |
US6519679B2 (en) | 1999-06-11 | 2003-02-11 | Dell Usa, L.P. | Policy based storage configuration |
US6538669B1 (en) | 1999-07-15 | 2003-03-25 | Dell Products L.P. | Graphical user interface for configuration of a storage system |
US6389433B1 (en) | 1999-07-16 | 2002-05-14 | Microsoft Corporation | Method and system for automatically merging files into a single instance store |
US6912629B1 (en) | 1999-07-28 | 2005-06-28 | Storage Technology Corporation | System and method for restoring data from secondary volume to primary volume in a data storage system |
US6757794B2 (en) | 1999-08-20 | 2004-06-29 | Microsoft Corporation | Buffering data in a hierarchical data storage environment |
US6496850B1 (en) | 1999-08-31 | 2002-12-17 | Accenture Llp | Clean-up of orphaned server contexts |
US6343324B1 (en) | 1999-09-13 | 2002-01-29 | International Business Machines Corporation | Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices |
US7028096B1 (en) | 1999-09-14 | 2006-04-11 | Streaming21, Inc. | Method and apparatus for caching for streaming data |
US6625623B1 (en) | 1999-12-16 | 2003-09-23 | Livevault Corporation | Systems and methods for backing up data files |
US6564228B1 (en) | 2000-01-14 | 2003-05-13 | Sun Microsystems, Inc. | Method of enabling heterogeneous platforms to utilize a universal file system in a storage area network |
US6823377B1 (en) | 2000-01-28 | 2004-11-23 | International Business Machines Corporation | Arrangements and methods for latency-sensitive hashing for collaborative web caching |
US20040148306A1 (en) | 2000-02-18 | 2004-07-29 | Moulton Gregory Hagan | Hash file system and method for use in a commonality factoring system |
US6704730B2 (en) | 2000-02-18 | 2004-03-09 | Avamar Technologies, Inc. | Hash file system and method for use in a commonality factoring system |
US7117246B2 (en) | 2000-02-22 | 2006-10-03 | Sendmail, Inc. | Electronic mail system with methodology providing distributed message store |
US20050246393A1 (en) | 2000-03-03 | 2005-11-03 | Intel Corporation | Distributed storage cluster architecture |
US7730113B1 (en) | 2000-03-07 | 2010-06-01 | Applied Discovery, Inc. | Network-based system and method for accessing and processing emails and other electronic legal documents that may include duplicate information |
US6438368B1 (en) | 2000-03-30 | 2002-08-20 | Ikadega, Inc. | Information distribution system and method |
US6356801B1 (en) | 2000-05-19 | 2002-03-12 | International Business Machines Corporation | High availability work queuing in an automated data storage library |
US6557030B1 (en) | 2000-05-31 | 2003-04-29 | Prediwave Corp. | Systems and methods for providing video-on-demand services for broadcasting systems |
US7197665B2 (en) | 2000-06-22 | 2007-03-27 | Hewlett-Packard Development Company, L.P. | Physical incremental backup using snapshots |
US6665815B1 (en) | 2000-06-22 | 2003-12-16 | Hewlett-Packard Development Company, L.P. | Physical incremental backup using snapshots |
US6330642B1 (en) | 2000-06-29 | 2001-12-11 | Bull Hn Informatin Systems Inc. | Three interconnected raid disk controller data processing system architecture |
WO2002005466A2 (en) | 2000-07-07 | 2002-01-17 | Qualcomm Incorporated | Method and apparatus for proportionately multiplexing data streams onto one data stream |
US6886020B1 (en) | 2000-08-17 | 2005-04-26 | Emc Corporation | Method and apparatus for storage system metrics management and archive |
US7082441B1 (en) | 2000-08-17 | 2006-07-25 | Emc Corporation | Method and storage and manipulation of storage system metrics |
US6732125B1 (en) | 2000-09-08 | 2004-05-04 | Storage Technology Corporation | Self archiving log structured volume with intrinsic data protection |
US20090013258A1 (en) | 2000-09-11 | 2009-01-08 | International Business Machines Corporation | Pictorial-based user interface management of computer hardware components |
US20020083055A1 (en) | 2000-09-29 | 2002-06-27 | Francois Pachet | Information item morphing system |
US7130860B2 (en) | 2000-09-29 | 2006-10-31 | Sony France S.A. | Method and system for generating sequencing information representing a sequence of items selected in a database |
US6760812B1 (en) | 2000-10-05 | 2004-07-06 | International Business Machines Corporation | System and method for coordinating state between networked caches |
US6810398B2 (en) | 2000-11-06 | 2004-10-26 | Avamar Technologies, Inc. | System and method for unorchestrated determination of data sequences using sticky byte factoring to determine breakpoints in digital sequences |
US6557089B1 (en) | 2000-11-28 | 2003-04-29 | International Business Machines Corporation | Backup by ID-suppressed instant virtual copy then physical backup copy with ID reintroduced |
US20060095527A1 (en) | 2000-11-30 | 2006-05-04 | Malik Dale W | Method and apparatus for minimzing storage of common attachment files in an e-mail communications server |
US20020065892A1 (en) | 2000-11-30 | 2002-05-30 | Malik Dale W. | Method and apparatus for minimizing storage of common attachment files in an e-mail communications server |
US6799258B1 (en) | 2001-01-10 | 2004-09-28 | Datacore Software Corporation | Methods and apparatus for point-in-time volumes |
US7194454B2 (en) | 2001-03-12 | 2007-03-20 | Lucent Technologies | Method for organizing records of database search activity by topical relevance |
US20020133601A1 (en) | 2001-03-16 | 2002-09-19 | Kennamer Walter J. | Failover of servers over which data is partitioned |
US20020169934A1 (en) | 2001-03-23 | 2002-11-14 | Oliver Krapp | Methods and systems for eliminating data redundancies |
US20020144250A1 (en) | 2001-03-28 | 2002-10-03 | Acermsoft Inc. | System and method for updating an executing application software in a module manner |
US20020143892A1 (en) | 2001-04-03 | 2002-10-03 | Mogul Jeffrey C. | Reduction of network retrieval latency using cache and digest |
US20030033308A1 (en) | 2001-08-03 | 2003-02-13 | Patel Sujal M. | System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system |
US7685126B2 (en) | 2001-08-03 | 2010-03-23 | Isilon Systems, Inc. | System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system |
US7243163B1 (en) | 2001-08-07 | 2007-07-10 | Good Technology, Inc. | System and method for full wireless synchronization of a data processing apparatus with a messaging system |
US6662198B2 (en) | 2001-08-30 | 2003-12-09 | Zoteca Inc. | Method and system for asynchronous transmission, backup, distribution of data and file sharing |
US20080089342A1 (en) | 2001-09-27 | 2008-04-17 | Broadcom Corporation | Apparatus and method for hardware creation of a header |
US7107298B2 (en) | 2001-09-28 | 2006-09-12 | Commvault Systems, Inc. | System and method for archiving objects in an information store |
US20030174648A1 (en) | 2001-10-17 | 2003-09-18 | Mea Wang | Content delivery network by-pass system |
US20030084076A1 (en) | 2001-10-31 | 2003-05-01 | Shihoko Sekiguchi | Method for storage management of storage resource on a storage network |
US20070067263A1 (en) | 2001-11-21 | 2007-03-22 | Husain Syed Mohammad A | System and Method for Providing Virtual Network Attached Storage Using Excess Distributed Storage Capacity |
US20030105716A1 (en) | 2001-12-03 | 2003-06-05 | Sutton Lorin R. | Reducing duplication of files on a network |
US20030115346A1 (en) | 2001-12-13 | 2003-06-19 | Mchenry Stephen T. | Multi-proxy network edge cache system and methods |
US20030182310A1 (en) | 2002-02-04 | 2003-09-25 | Elizabeth Charnock | Method and apparatus for sociological data mining |
US7143091B2 (en) | 2002-02-04 | 2006-11-28 | Cataphorn, Inc. | Method and apparatus for sociological data mining |
US20030149750A1 (en) | 2002-02-07 | 2003-08-07 | Franzenburg Alan M. | Distributed storage array |
US6779093B1 (en) | 2002-02-15 | 2004-08-17 | Veritas Operating Corporation | Control facility for processing in-band control messages during data replication |
US20030172130A1 (en) | 2002-03-06 | 2003-09-11 | Barry Fruchtman | Multi-session no query restore |
US20030188106A1 (en) | 2002-03-26 | 2003-10-02 | At&T Corp. | Cache validation using rejuvenation in a data network |
US20030187917A1 (en) | 2002-03-26 | 2003-10-02 | At&T Corp. | Cache validation using smart source selection in a data network |
US6983351B2 (en) | 2002-04-11 | 2006-01-03 | International Business Machines Corporation | System and method to guarantee overwrite of expired data in a virtual tape server |
US20060089954A1 (en) | 2002-05-13 | 2006-04-27 | Anschutz Thomas A | Scalable common access back-up architecture |
US20040010562A1 (en) | 2002-06-26 | 2004-01-15 | Wataru Itonaga | Shared cache server |
US20040181519A1 (en) | 2002-07-09 | 2004-09-16 | Mohammed Shahbaz Anwar | Method for generating multidimensional summary reports from multidimensional summary reports from multidimensional data |
US6865655B1 (en) | 2002-07-30 | 2005-03-08 | Sun Microsystems, Inc. | Methods and apparatus for backing up and restoring data portions stored in client computer systems |
US6952758B2 (en) | 2002-07-31 | 2005-10-04 | International Business Machines Corporation | Method and system for providing consistent data modification information to clients in a storage system |
US7100089B1 (en) | 2002-09-06 | 2006-08-29 | 3Pardata, Inc. | Determining differences between snapshots |
US20070192444A1 (en) | 2002-09-16 | 2007-08-16 | Emmanuel Ackaouy | Apparatus and method for a proxy cache |
US7284030B2 (en) | 2002-09-16 | 2007-10-16 | Network Appliance, Inc. | Apparatus and method for processing data in a network |
US20040128442A1 (en) | 2002-09-18 | 2004-07-01 | Netezza Corporation | Disk mirror architecture for database appliance |
US7287252B2 (en) | 2002-09-27 | 2007-10-23 | The United States Of America Represented By The Secretary Of The Navy | Universal client and consumer |
US7568080B2 (en) | 2002-10-07 | 2009-07-28 | Commvault Systems, Inc. | Snapshot storage and management system with indexing and user interface |
US7664771B2 (en) | 2002-10-16 | 2010-02-16 | Microsoft Corporation | Optimizing defragmentation operations in a differential snapshotter |
US20080320151A1 (en) | 2002-10-30 | 2008-12-25 | Riverbed Technology, Inc. | Transaction accelerator for client-server communications systems |
US7065619B1 (en) | 2002-12-20 | 2006-06-20 | Data Domain, Inc. | Efficient data storage system |
US7103617B2 (en) | 2003-01-17 | 2006-09-05 | Tacit Networks, Inc. | Method and system for use of storage caching with a distributed file system |
US8375008B1 (en) | 2003-01-17 | 2013-02-12 | Robert Gomes | Method and system for enterprise-wide retention of digital or electronic data |
US20060168318A1 (en) | 2003-02-12 | 2006-07-27 | Adam Twiss | Methods and apparatus for traffic management in peer-to-peer networks |
US20060179261A1 (en) | 2003-04-11 | 2006-08-10 | Vijayan Rajan | Writable read-only snapshots |
US20040215746A1 (en) | 2003-04-14 | 2004-10-28 | Nbt Technology, Inc. | Transparent client-server transaction accelerator |
US7155465B2 (en) | 2003-04-18 | 2006-12-26 | Lee Howard F | Method and apparatus for automatically archiving a file system |
US20040230753A1 (en) | 2003-05-16 | 2004-11-18 | International Business Machines Corporation | Methods and apparatus for providing service differentiation in a shared storage environment |
US8136025B1 (en) | 2003-07-03 | 2012-03-13 | Google Inc. | Assigning document identification tags |
US20090182789A1 (en) | 2003-08-05 | 2009-07-16 | Sepaton, Inc. | Scalable de-duplication mechanism |
US20080016131A1 (en) | 2003-08-05 | 2008-01-17 | Miklos Sandorfi | Emulated storage system |
US20050060643A1 (en) | 2003-08-25 | 2005-03-17 | Miavia, Inc. | Document similarity detection and classification system |
US20050050392A1 (en) | 2003-08-26 | 2005-03-03 | Tsunehiko Baba | Failover method in a redundant computer system with storage devices |
US20050066118A1 (en) | 2003-09-23 | 2005-03-24 | Robert Perry | Methods and apparatus for recording write requests directed to a data store |
US7577806B2 (en) | 2003-09-23 | 2009-08-18 | Symantec Operating Corporation | Systems and methods for time dependent data storage and recovery |
US20050066225A1 (en) | 2003-09-23 | 2005-03-24 | Michael Rowan | Data storage system |
US7085904B2 (en) | 2003-10-20 | 2006-08-01 | Hitachi, Ltd. | Storage system and method for backup |
US20050114450A1 (en) | 2003-10-31 | 2005-05-26 | Devos Steven R. | Single instance backup of email message attachments |
US8156086B2 (en) | 2003-11-13 | 2012-04-10 | Commvault Systems, Inc. | Systems and methods for stored data verification |
US20050108292A1 (en) | 2003-11-14 | 2005-05-19 | Burton David A. | Virtual incremental storage apparatus method and system |
US7412583B2 (en) | 2003-11-14 | 2008-08-12 | International Business Machines Corporation | Virtual incremental storage method |
US7225210B2 (en) | 2003-11-20 | 2007-05-29 | Overland Storage, Inc. | Block level data snapshot system and method |
US7272606B2 (en) | 2003-11-26 | 2007-09-18 | Veritas Operating Corporation | System and method for detecting and storing file content access information within a file system |
US20050154937A1 (en) | 2003-12-02 | 2005-07-14 | Kyosuke Achiwa | Control method for storage system, storage system, and storage device |
US20050117558A1 (en) | 2003-12-02 | 2005-06-02 | Deutsches Zentrum Fur Luft-Und Raumfahrt E. V. | Method for reducing data transport volume in data networks |
US7155633B2 (en) | 2003-12-08 | 2006-12-26 | Solid Data Systems, Inc. | Exchange server method and system |
US7519726B2 (en) | 2003-12-12 | 2009-04-14 | International Business Machines Corporation | Methods, apparatus and computer programs for enhanced access to resources within a network |
US20050144202A1 (en) | 2003-12-19 | 2005-06-30 | Chen Raymond C. | System and method for supporting asynchronous data replication with very short update intervals |
US7734820B1 (en) | 2003-12-31 | 2010-06-08 | Symantec Operating Corporation | Adaptive caching for a distributed file sharing system |
US7246272B2 (en) | 2004-01-16 | 2007-07-17 | International Business Machines Corporation | Duplicate network address detection |
US20050216659A1 (en) | 2004-03-26 | 2005-09-29 | Hitachi, Ltd. | Storage capable of cache assignment modification |
US20050273654A1 (en) | 2004-04-28 | 2005-12-08 | Ying Chen | Minimizing resynchronization time after backup system failures in an appliance-based business continuance architecture |
US7346751B2 (en) | 2004-04-30 | 2008-03-18 | Commvault Systems, Inc. | Systems and methods for generating a storage-related metric |
US7343459B2 (en) | 2004-04-30 | 2008-03-11 | Commvault Systems, Inc. | Systems and methods for detecting & mitigating storage risks |
US7343453B2 (en) | 2004-04-30 | 2008-03-11 | Commvault Systems, Inc. | Hierarchical systems and methods for providing a unified view of storage information |
US7343356B2 (en) | 2004-04-30 | 2008-03-11 | Commvault Systems, Inc. | Systems and methods for storage modeling and costing |
US20050243609A1 (en) | 2004-05-03 | 2005-11-03 | Yang Ken Q | Adaptive cache engine for storage area network including systems and methods related thereto |
US20060010227A1 (en) | 2004-06-01 | 2006-01-12 | Rajeev Atluri | Methods and apparatus for accessing data from a primary data storage system for secondary storage |
US20060004808A1 (en) | 2004-06-30 | 2006-01-05 | International Business Machines Corporation | System and method for performing compression/encryption on data such that the number of duplicate blocks in the transformed data is increased |
US20060005048A1 (en) | 2004-07-02 | 2006-01-05 | Hitachi Ltd. | Method and apparatus for encrypted remote copy for secure data backup and restoration |
US7383462B2 (en) | 2004-07-02 | 2008-06-03 | Hitachi, Ltd. | Method and apparatus for encrypted remote copy for secure data backup and restoration |
US20060020660A1 (en) | 2004-07-20 | 2006-01-26 | Vishwa Prasad | Proxy and cache architecture for document storage |
US7631194B2 (en) | 2004-09-09 | 2009-12-08 | Microsoft Corporation | Method, system, and apparatus for creating saved searches and auto discovery groups for a data protection system |
US20060064456A1 (en) | 2004-09-17 | 2006-03-23 | Wolfgang Kalthoff | Multistep master data cleansing in operative business processes |
US20060074957A1 (en) | 2004-09-29 | 2006-04-06 | Hitachi, Ltd. | Method of configuration management of a computer system |
US8375181B1 (en) | 2004-10-28 | 2013-02-12 | Symantec Operating Corporation | System and method for performing replication based on change tracking information |
US20060101096A1 (en) | 2004-10-29 | 2006-05-11 | Karl Fuerst | Associations between duplicate master data objects |
US7472238B1 (en) | 2004-11-05 | 2008-12-30 | Commvault Systems, Inc. | Systems and methods for recovering electronic information from a storage medium |
WO2006052872A2 (en) | 2004-11-05 | 2006-05-18 | Commvault Systems, Inc. | System and method to support single instance storage operations |
US20060224846A1 (en) | 2004-11-05 | 2006-10-05 | Amarendran Arun P | System and method to support single instance storage operations |
US8230195B2 (en) | 2004-11-08 | 2012-07-24 | Commvault Systems, Inc. | System and method for performing auxiliary storage operations |
US20060129537A1 (en) | 2004-11-12 | 2006-06-15 | Nec Corporation | Storage management system and method and program |
US7574692B2 (en) | 2004-11-19 | 2009-08-11 | Adrian Herscu | Method for building component-software for execution in a standards-compliant programming environment |
US20060136685A1 (en) | 2004-12-17 | 2006-06-22 | Sanrad Ltd. | Method and system to maintain data consistency over an internet small computer system interface (iSCSI) network |
US7437388B1 (en) | 2004-12-21 | 2008-10-14 | Symantec Corporation | Protecting data for distributed applications using cooperative backup agents |
US20060167900A1 (en) | 2005-01-18 | 2006-07-27 | Oracle International Corporation | Reducing memory used by metadata for duplicate user defined types |
US20060179405A1 (en) | 2005-02-10 | 2006-08-10 | Hui Chao | Constraining layout variations for accommodating variable content in electronic documents |
US7739235B2 (en) | 2005-04-13 | 2010-06-15 | Progress Software Corporation | Dynamic membership management in a distributed system |
US7552358B1 (en) | 2005-04-22 | 2009-06-23 | Symantec Operating Corporation | Efficient backup and restore using metadata mapping |
US20060277154A1 (en) | 2005-06-02 | 2006-12-07 | Lunt Tracy T | Data structure generated in accordance with a method for identifying electronic files using derivative attributes created from native file attributes |
US20070006018A1 (en) | 2005-06-29 | 2007-01-04 | Thompson Dianne C | Creation of a single snapshot using a server job request |
US20070038714A1 (en) | 2005-06-30 | 2007-02-15 | Jorg-Stefan Sell | Method and system for journaling electronic messages |
US7779032B1 (en) | 2005-07-13 | 2010-08-17 | Basis Technology Corporation | Forensic feature extraction and cross drive analysis |
US8131669B2 (en) | 2005-08-17 | 2012-03-06 | International Business Machines Corporation | Management of redundant objects in storage systems |
US7747577B2 (en) | 2005-08-17 | 2010-06-29 | International Business Machines Corporation | Management of redundant objects in storage systems |
US20070043757A1 (en) | 2005-08-17 | 2007-02-22 | Microsoft Corporation | Storage reports duplicate file detection |
US20070050526A1 (en) | 2005-08-31 | 2007-03-01 | Hitachi, Ltd. | Storage control device and separation-type storage device |
US7584338B1 (en) | 2005-09-27 | 2009-09-01 | Data Domain, Inc. | Replication of deduplicated storage system |
US20070073814A1 (en) | 2005-09-27 | 2007-03-29 | Teamon Systems, Inc., State Of Incorporation: Delaware | Email server with proxy caching of unique identifiers |
US20160026405A1 (en) | 2005-09-30 | 2016-01-28 | Cleversafe, Inc. | Storing data in a dispersed storage network |
US20070203937A1 (en) | 2005-11-28 | 2007-08-30 | Anand Prahlad | Systems and methods for classifying and transferring information in a storage network |
US7657550B2 (en) | 2005-11-28 | 2010-02-02 | Commvault Systems, Inc. | User interfaces and methods for managing data in a metabase |
US7747579B2 (en) | 2005-11-28 | 2010-06-29 | Commvault Systems, Inc. | Metabase for facilitating data classification |
US7831795B2 (en) | 2005-11-28 | 2010-11-09 | Commvault Systems, Inc. | Systems and methods for classifying and transferring information in a storage network |
US20100100529A1 (en) | 2005-12-19 | 2010-04-22 | Commvault Systems, Inc. | Rolling cache configuration for a data replication system |
US20070156966A1 (en) | 2005-12-30 | 2007-07-05 | Prabakar Sundarrajan | System and method for performing granular invalidation of cached dynamically generated objects in a data communication network |
US20070162462A1 (en) | 2006-01-03 | 2007-07-12 | Nec Laboratories America, Inc. | Wide Area Networked File System |
US7512595B1 (en) | 2006-01-03 | 2009-03-31 | Emc Corporation | Methods and systems for utilizing configuration information |
US7743051B1 (en) | 2006-01-23 | 2010-06-22 | Clearwell Systems, Inc. | Methods, systems, and user interface for e-mail search and retrieval |
US7899871B1 (en) | 2006-01-23 | 2011-03-01 | Clearwell Systems, Inc. | Methods and systems for e-mail topic classification |
US20070179990A1 (en) | 2006-01-31 | 2007-08-02 | Eyal Zimran | Primary stub file retention and secondary retention coordination in a hierarchical storage system |
US7472242B1 (en) | 2006-02-14 | 2008-12-30 | Network Appliance, Inc. | Eliminating duplicate blocks during backup writes |
US20070192542A1 (en) | 2006-02-16 | 2007-08-16 | Svend Frolund | Method of operating distributed storage system |
US20070192544A1 (en) | 2006-02-16 | 2007-08-16 | Svend Frolund | Method of operating replicated cache |
US8204213B2 (en) * | 2006-03-29 | 2012-06-19 | International Business Machines Corporation | System and method for performing a similarity measure of anonymized data |
US20070250670A1 (en) | 2006-04-25 | 2007-10-25 | Fineberg Samuel A | Content-based, compression-enhancing routing in distributed, differential electronic-data storage systems |
US20070255758A1 (en) | 2006-04-28 | 2007-11-01 | Ling Zheng | System and method for sampling based elimination of duplicate data |
US20120303622A1 (en) | 2006-05-19 | 2012-11-29 | Dean Jeffrey A | Efficient Indexing of Documents with Similar Content |
US20080005141A1 (en) | 2006-06-29 | 2008-01-03 | Ling Zheng | System and method for retrieving and using block fingerprints for data deduplication |
US20080005509A1 (en) | 2006-06-30 | 2008-01-03 | International Business Machines Corporation | Caching recovery information on a local system to expedite recovery |
US8726242B2 (en) | 2006-07-27 | 2014-05-13 | Commvault Systems, Inc. | Systems and methods for continuous data replication |
US7720841B2 (en) | 2006-10-04 | 2010-05-18 | International Business Machines Corporation | Model-based self-optimizing distributed information management |
US20080091725A1 (en) | 2006-10-13 | 2008-04-17 | Paul Jin Hwang | System and method for automatic detection of duplicate digital photos |
US8527469B2 (en) | 2006-10-13 | 2013-09-03 | Sony Corporation | System and method for automatic detection of duplicate digital photos |
US8170995B2 (en) | 2006-10-17 | 2012-05-01 | Commvault Systems, Inc. | Method and system for offline indexing of content and classifying stored data |
US20080091655A1 (en) | 2006-10-17 | 2008-04-17 | Gokhale Parag S | Method and system for offline indexing of content and classifying stored data |
US7702782B1 (en) | 2006-10-18 | 2010-04-20 | Emc Corporation | Using watermarks to indicate alerts in a storage area network management console |
US20080098083A1 (en) | 2006-10-19 | 2008-04-24 | Oracle International Corporation | System and method for data de-duplication |
US20080098041A1 (en) | 2006-10-20 | 2008-04-24 | Lakshminarayanan Chidambaran | Server supporting a consistent client-side cache |
US20120215739A1 (en) | 2006-10-27 | 2012-08-23 | Purdue Pharma L.P. | Data cache techniques in support of synchronization of databases in a distributed environment |
US20080133561A1 (en) | 2006-12-01 | 2008-06-05 | Nec Laboratories America, Inc. | Methods and systems for quick and efficient data management and/or processing |
US20080229037A1 (en) | 2006-12-04 | 2008-09-18 | Alan Bunte | Systems and methods for creating copies of data, such as archive copies |
US20080140630A1 (en) | 2006-12-11 | 2008-06-12 | Fujitsu Limited | Network control system, network control method, and computer product |
US20080243879A1 (en) | 2006-12-22 | 2008-10-02 | Parag Gokhale | System and method for storing redundant information |
US20080243958A1 (en) | 2006-12-22 | 2008-10-02 | Anand Prahlad | System and method for storing redundant information |
US8229954B2 (en) | 2006-12-22 | 2012-07-24 | Commvault Systems, Inc. | Managing copies of data |
US20080243914A1 (en) | 2006-12-22 | 2008-10-02 | Anand Prahlad | System and method for storing redundant information |
US20080243957A1 (en) | 2006-12-22 | 2008-10-02 | Anand Prahlad | System and method for storing redundant information |
US20080250204A1 (en) | 2006-12-22 | 2008-10-09 | Srinivas Kavuri | Systems and methods of hierarchical storage management, such as global management of storage operations |
US7734669B2 (en) | 2006-12-22 | 2010-06-08 | Commvault Systems, Inc. | Managing copies of data |
US8775823B2 (en) | 2006-12-29 | 2014-07-08 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
US20080159331A1 (en) | 2006-12-29 | 2008-07-03 | Riverbed Technology, Inc. | Data segmentation using shift-varying predicate function fingerprinting |
US8510573B2 (en) | 2006-12-29 | 2013-08-13 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
US20080244199A1 (en) | 2007-03-27 | 2008-10-02 | Yasuaki Nakamura | Computer system preventing storage of duplicate files |
US7761425B1 (en) | 2007-03-29 | 2010-07-20 | Symantec Corporation | Low-overhead means of performing data backup |
US20080244204A1 (en) | 2007-03-29 | 2008-10-02 | Nick Cremelie | Replication and restoration of single-instance storage pools |
US20080244172A1 (en) | 2007-03-29 | 2008-10-02 | Yoshiki Kano | Method and apparatus for de-duplication after mirror operation |
US20080243769A1 (en) | 2007-03-30 | 2008-10-02 | Symantec Corporation | System and method for exporting data directly from deduplication storage to non-deduplication storage |
US20080244205A1 (en) | 2007-03-30 | 2008-10-02 | Hitachi, Ltd. And Hitachi Computer Peripherals Co., Ltd. | Storage system and storage control method |
US20080243953A1 (en) | 2007-03-30 | 2008-10-02 | Weibao Wu | Implementing read/write, multi-versioned file system on top of backup data |
US20080256326A1 (en) | 2007-04-11 | 2008-10-16 | Data Domain, Inc. | Subsegmenting for efficient storage, resemblance determination, and transmission |
US20080294660A1 (en) | 2007-04-11 | 2008-11-27 | Data Domain, Inc. | Cluster storage using delta compression |
US20080256431A1 (en) | 2007-04-13 | 2008-10-16 | Arno Hornberger | Apparatus and Method for Generating a Data File or for Reading a Data File |
US7827150B1 (en) | 2007-04-30 | 2010-11-02 | Symantec Corporation | Application aware storage appliance archiving |
US20080281908A1 (en) | 2007-05-08 | 2008-11-13 | Riverbed Technology, Inc. | Hybrid segment-oriented file server and wan accelerator |
US20080294696A1 (en) | 2007-05-22 | 2008-11-27 | Yuval Frandzel | System and method for on-the-fly elimination of redundant data |
US20080313236A1 (en) | 2007-06-15 | 2008-12-18 | Bala Vijayakumar | Process for cataloging data objects backed up from a content addressed storage system |
US20100198864A1 (en) | 2007-07-02 | 2010-08-05 | Equivio Ltd. | Method for organizing large numbers of documents |
US20090013129A1 (en) | 2007-07-06 | 2009-01-08 | Prostor Systems, Inc. | Commonality factoring for removable media |
US20090043767A1 (en) | 2007-08-07 | 2009-02-12 | Ashutosh Joshi | Approach For Application-Specific Duplicate Detection |
US20090055471A1 (en) | 2007-08-21 | 2009-02-26 | Kozat Ulas C | Media streaming with online caching and peer-to-peer forwarding |
US20090055425A1 (en) | 2007-08-24 | 2009-02-26 | General Electric Company | Sequence identification and analysis |
US20090138481A1 (en) | 2007-08-29 | 2009-05-28 | Chatley Scott P | Method and system for moving requested files from one storage location to another |
US20090144416A1 (en) | 2007-08-29 | 2009-06-04 | Chatley Scott P | Method and system for determining an optimally located storage node in a communications network |
US20090144422A1 (en) | 2007-08-29 | 2009-06-04 | Chatley Scott P | Global load based file allocation among a plurality of geographically distributed storage nodes |
US20090077140A1 (en) | 2007-09-17 | 2009-03-19 | Anglin Matthew J | Data Recovery in a Hierarchical Data Storage System |
US7822939B1 (en) | 2007-09-25 | 2010-10-26 | Emc Corporation | Data de-duplication using thin provisioning |
US20110072291A1 (en) | 2007-09-26 | 2011-03-24 | Hitachi, Ltd. | Power efficient data storage with data de-duplication |
US20090204649A1 (en) | 2007-11-12 | 2009-08-13 | Attune Systems, Inc. | File Deduplication Using Storage Tiers |
US20090210431A1 (en) | 2007-11-12 | 2009-08-20 | Attune Systems, Inc. | Load Sharing Cluster File Systems |
US20090172139A1 (en) | 2007-12-26 | 2009-07-02 | Kai Chiu Wong | Balanced consistent hashing for distributed resource management |
US8209334B1 (en) | 2007-12-28 | 2012-06-26 | Don Doerner | Method to direct data to a specific one of several repositories |
US8145614B1 (en) | 2007-12-28 | 2012-03-27 | Emc Corporation | Selection of a data path based on the likelihood that requested information is in a cache |
US20090171888A1 (en) | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Data deduplication by separating data from meta data |
US7962452B2 (en) | 2007-12-28 | 2011-06-14 | International Business Machines Corporation | Data deduplication by separating data from meta data |
US8621240B1 (en) | 2007-12-31 | 2013-12-31 | Emc Corporation | User-specific hash authentication |
US7797279B1 (en) | 2007-12-31 | 2010-09-14 | Emc Corporation | Merging of incremental data streams with prior backed-up data |
US20120221817A1 (en) | 2007-12-31 | 2012-08-30 | Emc Corporation | Global de-duplication in shared architectures |
US8261240B2 (en) | 2008-01-15 | 2012-09-04 | Microsoft Corporation | Debugging lazily evaluated program components |
US20090183162A1 (en) | 2008-01-15 | 2009-07-16 | Microsoft Corporation | Priority Based Scheduling System for Server |
US20090204636A1 (en) | 2008-02-11 | 2009-08-13 | Microsoft Corporation | Multimodal object de-duplication |
US20090228599A1 (en) | 2008-03-06 | 2009-09-10 | Matthew Joseph Anglin | Distinguishing data streams to enhance data storage efficiency |
US7814074B2 (en) | 2008-03-14 | 2010-10-12 | International Business Machines Corporation | Method and system for assuring integrity of deduplicated data |
US20090243846A1 (en) | 2008-03-28 | 2009-10-01 | Fujitsu Limited | Electronic apparatus system having a plurality of rack-mounted electronic apparatuses, and method for identifying electronic apparatus in electronic apparatus system |
US8199911B1 (en) | 2008-03-31 | 2012-06-12 | Symantec Operating Corporation | Secure encryption algorithm for data deduplication on untrusted storage |
US7516186B1 (en) | 2008-04-01 | 2009-04-07 | International Business Machines Corporation | Thread based view and archive for simple mail transfer protocol (SMTP) clients devices and methods |
US20090254507A1 (en) | 2008-04-02 | 2009-10-08 | Hitachi, Ltd. | Storage Controller and Duplicated Data Detection Method Using Storage Controller |
US7567188B1 (en) | 2008-04-10 | 2009-07-28 | International Business Machines Corporation | Policy based tiered data deduplication strategy |
US7539710B1 (en) | 2008-04-11 | 2009-05-26 | International Business Machines Corporation | Method of and system for deduplicating backed up data in a client-server environment |
US20090268903A1 (en) | 2008-04-25 | 2009-10-29 | Netapp, Inc. | Network storage server with integrated encryption, compression and deduplication capability |
US20090271454A1 (en) | 2008-04-29 | 2009-10-29 | International Business Machines Corporation | Enhanced method and system for assuring integrity of deduplicated data |
US8200638B1 (en) | 2008-04-30 | 2012-06-12 | Netapp, Inc. | Individual file restore from block-level incremental backups by using client-server backup protocol |
US20090276454A1 (en) | 2008-04-30 | 2009-11-05 | International Business Machines Corporation | Performing de-duplication for at least one computer file in a computer system |
US20090276851A1 (en) * | 2008-04-30 | 2009-11-05 | International Business Machines Corporation | Detecting malicious behavior in a series of data transmission de-duplication requests of a de-duplicated computer system |
US20090307251A1 (en) | 2008-06-06 | 2009-12-10 | Steve Heller | Method for reducing redundancy between two or more datasets |
US20090319585A1 (en) | 2008-06-24 | 2009-12-24 | Parag Gokhale | Application-aware and remote single instance data management |
US9098495B2 (en) | 2008-06-24 | 2015-08-04 | Commvault Systems, Inc. | Application-aware and remote single instance data management |
US11016859B2 (en) | 2008-06-24 | 2021-05-25 | Commvault Systems, Inc. | De-duplication systems and methods for application-specific data |
US9405763B2 (en) | 2008-06-24 | 2016-08-02 | Commvault Systems, Inc. | De-duplication systems and methods for application-specific data |
US20090319534A1 (en) | 2008-06-24 | 2009-12-24 | Parag Gokhale | Application-aware and remote single instance data management |
US8484162B2 (en) | 2008-06-24 | 2013-07-09 | Commvault Systems, Inc. | De-duplication systems and methods for application-specific data |
US8667591B1 (en) * | 2008-06-26 | 2014-03-04 | Emc Corporation | Commonality factoring remediation |
US8108446B1 (en) | 2008-06-27 | 2012-01-31 | Symantec Corporation | Methods and systems for managing deduplicated data using unilateral referencing |
US20090327625A1 (en) | 2008-06-30 | 2009-12-31 | International Business Machines Corporation | Managing metadata for data blocks used in a deduplication system |
US8468320B1 (en) | 2008-06-30 | 2013-06-18 | Symantec Operating Corporation | Scalability of data deduplication through the use of a locality table |
US8572055B1 (en) | 2008-06-30 | 2013-10-29 | Symantec Operating Corporation | Method and system for efficiently handling small files in a single instance storage data store |
US8041907B1 (en) | 2008-06-30 | 2011-10-18 | Symantec Operating Corporation | Method and system for efficient space management for single-instance-storage volumes |
US20100005259A1 (en) | 2008-07-03 | 2010-01-07 | Anand Prahlad | Continuous data protection over intermittent connections, such as continuous data backup for laptops or wireless devices |
US20100011178A1 (en) | 2008-07-14 | 2010-01-14 | Vizioncore, Inc. | Systems and methods for performing backup operations of virtual machine files |
US20100031086A1 (en) | 2008-07-31 | 2010-02-04 | Andrew Charles Leppard | Repair of a corrupt data segment used by a de-duplication engine |
WO2010013292A1 (en) | 2008-07-31 | 2010-02-04 | 国立大学法人広島大学 | Measuring device and measuring method |
US20100036887A1 (en) | 2008-08-05 | 2010-02-11 | International Business Machines Corporation | Efficient transfer of deduplicated data |
US20100042790A1 (en) | 2008-08-12 | 2010-02-18 | Netapp, Inc. | Scalable deduplication of stored data |
US20100049927A1 (en) | 2008-08-21 | 2010-02-25 | International Business Machines Corporation | Enhancement of data mirroring to provide parallel processing of overlapping writes |
US20100049926A1 (en) | 2008-08-21 | 2010-02-25 | International Business Machines Corporation | Enhancement of data mirroring to provide parallel processing of overlapping writes |
US20140250076A1 (en) | 2008-09-05 | 2014-09-04 | Commvault Systems, Inc. | Image level copy or restore, such as image level restore without knowledge of data object metadata |
US8307177B2 (en) | 2008-09-05 | 2012-11-06 | Commvault Systems, Inc. | Systems and methods for management of virtualization data |
US8725688B2 (en) | 2008-09-05 | 2014-05-13 | Commvault Systems, Inc. | Image level copy or restore, such as image level restore without knowledge of data object metadata |
US20100070478A1 (en) | 2008-09-15 | 2010-03-18 | International Business Machines Corporation | Retrieval and recovery of data chunks from alternate data stores in a deduplicating system |
US20120185437A1 (en) | 2008-09-16 | 2012-07-19 | Elan Pavlov | Methods and Apparatus for Distributed Data Storage |
US20100077161A1 (en) | 2008-09-24 | 2010-03-25 | Timothy John Stoakes | Identifying application metadata in a backup stream |
US9015181B2 (en) | 2008-09-26 | 2015-04-21 | Commvault Systems, Inc. | Systems and methods for managing single instancing data |
US20100082672A1 (en) | 2008-09-26 | 2010-04-01 | Rajiv Kottomtharayil | Systems and methods for managing single instancing data |
US7814149B1 (en) | 2008-09-29 | 2010-10-12 | Symantec Operating Corporation | Client side data deduplication |
US20100082558A1 (en) | 2008-10-01 | 2010-04-01 | International Business Machines Corporation | Policy-based sharing of redundant data across storage pools in a deduplicating system |
US20100088296A1 (en) | 2008-10-03 | 2010-04-08 | Netapp, Inc. | System and method for organizing data to facilitate data deduplication |
US20100094817A1 (en) | 2008-10-14 | 2010-04-15 | Israel Zvi Ben-Shaul | Storage-network de-duplication |
US20100114833A1 (en) | 2008-10-31 | 2010-05-06 | Netapp, Inc. | Remote office duplication |
US20100169287A1 (en) | 2008-11-26 | 2010-07-01 | Commvault Systems, Inc. | Systems and methods for byte-level or quasi byte-level single instancing |
US20100153511A1 (en) | 2008-12-12 | 2010-06-17 | Verizon Corporate Resources Group Llc | Duplicate mms content checking |
US9483486B1 (en) | 2008-12-30 | 2016-11-01 | Veritas Technologies Llc | Data encryption for a segment-based single instance file storage system |
US8200923B1 (en) | 2008-12-31 | 2012-06-12 | Emc Corporation | Method and apparatus for block level data de-duplication |
US20100180075A1 (en) | 2009-01-15 | 2010-07-15 | Mccloskey Larry | Assisted mainframe data de-duplication |
US20140115287A1 (en) | 2009-01-23 | 2014-04-24 | Infortrend Technology, Inc. | Method and apparatus for performing volume replication using unified architecture |
US20100306283A1 (en) | 2009-01-28 | 2010-12-02 | Digitiliti, Inc. | Information object creation for a distributed computing system |
US8074043B1 (en) | 2009-01-30 | 2011-12-06 | Symantec Corporation | Method and apparatus to recover from interrupted data streams in a deduplication system |
US8108638B2 (en) | 2009-02-06 | 2012-01-31 | International Business Machines Corporation | Backup of deduplicated data |
US20100223495A1 (en) | 2009-02-27 | 2010-09-02 | Leppard Andrew | Minimize damage caused by corruption of de-duplicated data |
US20100250501A1 (en) | 2009-03-26 | 2010-09-30 | International Business Machines Corporation | Storage management through adaptive deduplication |
US20100250896A1 (en) | 2009-03-30 | 2010-09-30 | Hi/Fn, Inc. | System and method for data deduplication |
US20100250549A1 (en) | 2009-03-30 | 2010-09-30 | Muller Marcus S | Storing a variable number of instances of data objects |
US20110276543A1 (en) | 2009-03-30 | 2011-11-10 | Exar Corporation | Virtual block device |
US8479304B1 (en) | 2009-03-31 | 2013-07-02 | Symantec Corporation | Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication |
US20100257403A1 (en) | 2009-04-03 | 2010-10-07 | Microsoft Corporation | Restoration of a system from a set of full and partial delta system snapshots across a distributed system |
US20100257346A1 (en) | 2009-04-03 | 2010-10-07 | Microsoft Corporation | Bare metal machine recovery from the cloud |
US20100257142A1 (en) | 2009-04-03 | 2010-10-07 | Microsoft Corporation | Differential file and system restores from peers and the cloud |
US8095756B1 (en) | 2009-04-28 | 2012-01-10 | Netapp, Inc. | System and method for coordinating deduplication operations and backup operations of a storage volume |
US8578120B2 (en) | 2009-05-22 | 2013-11-05 | Commvault Systems, Inc. | Block-level single instancing |
US20100306193A1 (en) * | 2009-05-28 | 2010-12-02 | Zeitera, Llc | Multi-media content identification using multi-level content signature correlation and fast similarity search |
WO2010140264A1 (en) | 2009-06-04 | 2010-12-09 | Hitachi,Ltd. | Storage subsystem and its data processing method, and computer system |
US20100312752A1 (en) | 2009-06-08 | 2010-12-09 | Symantec Corporation | Source Classification For Performing Deduplication In A Backup Operation |
US20100318759A1 (en) | 2009-06-15 | 2010-12-16 | Microsoft Corporation | Distributed rdc chunk store |
US20110060940A1 (en) | 2009-06-18 | 2011-03-10 | Taylor Tracy M | N+1 failover and resynchronization of data storage appliances |
US20130238572A1 (en) | 2009-06-30 | 2013-09-12 | Commvault Systems, Inc. | Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer |
US9171008B2 (en) | 2009-06-30 | 2015-10-27 | Commvault Systems, Inc. | Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer |
US20100332454A1 (en) | 2009-06-30 | 2010-12-30 | Anand Prahlad | Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer |
US20100332401A1 (en) | 2009-06-30 | 2010-12-30 | Anand Prahlad | Performing data storage operations with a cloud storage environment, including automatically selecting among multiple cloud storage sites |
US20190179805A1 (en) | 2009-06-30 | 2019-06-13 | Commvault Systems, Inc. | Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites |
US8285681B2 (en) | 2009-06-30 | 2012-10-09 | Commvault Systems, Inc. | Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites |
US8407190B2 (en) | 2009-06-30 | 2013-03-26 | Commvault Systems, Inc. | Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer |
US10540327B2 (en) | 2009-07-08 | 2020-01-21 | Commvault Systems, Inc. | Synchronized data deduplication |
US11288235B2 (en) | 2009-07-08 | 2022-03-29 | Commvault Systems, Inc. | Synchronized data deduplication |
US8930306B1 (en) | 2009-07-08 | 2015-01-06 | Commvault Systems, Inc. | Synchronized data deduplication |
US20110010498A1 (en) | 2009-07-10 | 2011-01-13 | Matthew Russell Lay | Providing preferred seed data for seeding a data deduplicating storage system |
US20110040728A1 (en) | 2009-08-11 | 2011-02-17 | International Business Machines Corporation | Replication of deduplicated data |
US8280854B1 (en) | 2009-09-01 | 2012-10-02 | Symantec Corporation | Systems and methods for relocating deduplicated data within a multi-device storage system |
US8204862B1 (en) | 2009-10-02 | 2012-06-19 | Symantec Corporation | Systems and methods for restoring deduplicated data |
US20110113016A1 (en) | 2009-11-06 | 2011-05-12 | International Business Machines Corporation | Method and Apparatus for Data Compression |
US20110113012A1 (en) | 2009-11-06 | 2011-05-12 | International Business Machines Corporation | Operating System and File System Independent Incremental Data Backup |
US20110113013A1 (en) | 2009-11-09 | 2011-05-12 | Computer Associates Think, Inc. | Duplicate backup data identification and consolidation |
US20110119741A1 (en) | 2009-11-18 | 2011-05-19 | Hotchalk Inc. | Method for Conditionally Obtaining Files From a Local Appliance |
US20110153570A1 (en) | 2009-12-18 | 2011-06-23 | Electronics And Telecommunications Research Institute | Data replication and recovery method in asymmetric clustered distributed file system |
US20110161723A1 (en) | 2009-12-28 | 2011-06-30 | Riverbed Technology, Inc. | Disaster recovery using local and cloud spanning deduplicated storage system |
US8595191B2 (en) | 2009-12-31 | 2013-11-26 | Commvault Systems, Inc. | Systems and methods for performing data management operations using snapshots |
US8224875B1 (en) | 2010-01-05 | 2012-07-17 | Symantec Corporation | Systems and methods for removing unreferenced data segments from deduplicated data systems |
US20110167221A1 (en) | 2010-01-06 | 2011-07-07 | Gururaj Pangal | System and method for efficiently creating off-site data volume back-ups |
US8452739B2 (en) | 2010-03-16 | 2013-05-28 | Copiun, Inc. | Highly scalable and distributed data de-duplication |
US8352422B2 (en) | 2010-03-30 | 2013-01-08 | Commvault Systems, Inc. | Data restore systems and methods in a replication environment |
US20110258161A1 (en) | 2010-04-14 | 2011-10-20 | International Business Machines Corporation | Optimizing Data Transmission Bandwidth Consumption Over a Wide Area Network |
US9678968B1 (en) | 2010-05-03 | 2017-06-13 | Panzura, Inc. | Deleting a file from a distributed filesystem |
US20110289281A1 (en) | 2010-05-24 | 2011-11-24 | Quantum Corporation | Policy Based Data Retrieval Performance for Deduplicated Data |
US8745105B2 (en) | 2010-05-28 | 2014-06-03 | Commvault Systems, Inc. | Systems and methods for performing data replication |
US8370315B1 (en) | 2010-05-28 | 2013-02-05 | Symantec Corporation | System and method for high performance deduplication indexing |
US20110302140A1 (en) | 2010-06-04 | 2011-12-08 | Commvault Systems, Inc. | Failover systems and methods for performing backup operations |
US20110314070A1 (en) | 2010-06-18 | 2011-12-22 | Microsoft Corporation | Optimization of storage and transmission of data |
US20110314400A1 (en) | 2010-06-21 | 2011-12-22 | Microsoft Corporation | Assisted filtering of multi-dimensional data |
US20130151562A1 (en) * | 2010-07-08 | 2013-06-13 | Hitachi, Ltd. | Method of calculating feature-amount of digital sequence, and apparatus for calculating feature-amount of digital sequence |
US20120011101A1 (en) | 2010-07-12 | 2012-01-12 | Computer Associates Think, Inc. | Integrating client and server deduplication systems |
US20120016839A1 (en) | 2010-07-15 | 2012-01-19 | Delphix Corp. | De-Duplication Based Backup Of File Systems |
US20120016845A1 (en) | 2010-07-16 | 2012-01-19 | Twinstrata, Inc | System and method for data deduplication for disk storage subsystems |
US20120078881A1 (en) | 2010-09-24 | 2012-03-29 | Hitachi Data Systems Corporation | System and method for aggregating query results in a fault-tolerant database management system |
US9898225B2 (en) | 2010-09-30 | 2018-02-20 | Commvault Systems, Inc. | Content aligned block-based deduplication |
US8549350B1 (en) | 2010-09-30 | 2013-10-01 | Emc Corporation | Multi-tier recovery |
US9239687B2 (en) | 2010-09-30 | 2016-01-19 | Commvault Systems, Inc. | Systems and methods for retaining and using data block signatures in data protection operations |
US9244779B2 (en) | 2010-09-30 | 2016-01-26 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
WO2012044367A1 (en) | 2010-09-30 | 2012-04-05 | Commvault Systems, Inc. | Systems and methods for retaining and using data block signatures in data protection operations |
US9619480B2 (en) | 2010-09-30 | 2017-04-11 | Commvault Systems, Inc. | Content aligned block-based deduplication |
US8364652B2 (en) | 2010-09-30 | 2013-01-29 | Commvault Systems, Inc. | Content aligned block-based deduplication |
US10126973B2 (en) | 2010-09-30 | 2018-11-13 | Commvault Systems, Inc. | Systems and methods for retaining and using data block signatures in data protection operations |
US8577851B2 (en) | 2010-09-30 | 2013-11-05 | Commvault Systems, Inc. | Content aligned block-based deduplication |
WO2012044366A1 (en) | 2010-09-30 | 2012-04-05 | Commvault Systems, Inc. | Content aligned block-based deduplication |
US9110602B2 (en) | 2010-09-30 | 2015-08-18 | Commvault Systems, Inc. | Content aligned block-based deduplication |
US8578109B2 (en) | 2010-09-30 | 2013-11-05 | Commvault Systems, Inc. | Systems and methods for retaining and using data block signatures in data protection operations |
US9639289B2 (en) | 2010-09-30 | 2017-05-02 | Commvault Systems, Inc. | Systems and methods for retaining and using data block signatures in data protection operations |
US20120084272A1 (en) | 2010-10-04 | 2012-04-05 | International Business Machines Corporation | File system support for inert files |
US20120089574A1 (en) | 2010-10-12 | 2012-04-12 | Quantum Corporation | Prioritizing data deduplication |
US9442806B1 (en) | 2010-11-30 | 2016-09-13 | Veritas Technologies Llc | Block-level deduplication |
US10740295B2 (en) | 2010-12-14 | 2020-08-11 | Commvault Systems, Inc. | Distributed deduplicated storage system |
US20200334210A1 (en) | 2010-12-14 | 2020-10-22 | Commvault Systems, Inc. | Distributed deduplicated storage system |
US9020900B2 (en) | 2010-12-14 | 2015-04-28 | Commvault Systems, Inc. | Distributed deduplicated storage system |
US9104623B2 (en) | 2010-12-14 | 2015-08-11 | Commvault Systems, Inc. | Client-side repository in a networked deduplicated storage system |
US9116850B2 (en) | 2010-12-14 | 2015-08-25 | Commvault Systems, Inc. | Client-side repository in a networked deduplicated storage system |
US10191816B2 (en) | 2010-12-14 | 2019-01-29 | Commvault Systems, Inc. | Client-side repository in a networked deduplicated storage system |
US8954446B2 (en) | 2010-12-14 | 2015-02-10 | Comm Vault Systems, Inc. | Client-side repository in a networked deduplicated storage system |
US9898478B2 (en) | 2010-12-14 | 2018-02-20 | Commvault Systems, Inc. | Distributed deduplicated storage system |
US20190227879A1 (en) | 2010-12-14 | 2019-07-25 | Commvault Systems, Inc. | Client-side repository in a networked deduplicated storage system |
US20120166403A1 (en) | 2010-12-24 | 2012-06-28 | Kim Mi-Jeom | Distributed storage system having content-based deduplication function and object storing method |
US20120233417A1 (en) | 2011-03-11 | 2012-09-13 | Microsoft Corporation | Backup and restore strategies for data deduplication |
US9990253B1 (en) | 2011-03-31 | 2018-06-05 | EMC IP Holding Company LLC | System and method for recovering file systems without a replica |
US8849762B2 (en) | 2011-03-31 | 2014-09-30 | Commvault Systems, Inc. | Restoring computing environments, such as autorecovery of file systems at certain points in time |
US8719264B2 (en) | 2011-03-31 | 2014-05-06 | Commvault Systems, Inc. | Creating secondary copies of data based on searches for content |
US8825720B1 (en) | 2011-04-12 | 2014-09-02 | Emc Corporation | Scaling asynchronous reclamation of free space in de-duplicated multi-controller storage systems |
US9323820B1 (en) | 2011-06-30 | 2016-04-26 | Emc Corporation | Virtual datacenter redundancy |
US20130006943A1 (en) | 2011-06-30 | 2013-01-03 | International Business Machines Corporation | Hybrid data backup in a networked computing environment |
US8631244B1 (en) * | 2011-08-11 | 2014-01-14 | Rockwell Collins, Inc. | System and method for preventing computer malware from exfiltrating data from a user computer in a network via the internet |
US20130262801A1 (en) | 2011-09-30 | 2013-10-03 | Commvault Systems, Inc. | Information management of virtual machines having mapped storage devices |
US9128901B1 (en) | 2011-12-30 | 2015-09-08 | Emc Corporation | Continuous protection of data and storage management configuration |
US20130219470A1 (en) | 2012-02-17 | 2013-08-22 | Oracle International Corporation | Systems and methods for integration of business applications with enterprise content management systems |
US20130238562A1 (en) | 2012-03-07 | 2013-09-12 | Commvault Systems, Inc. | Data storage system utilizing proxy device for storage operations |
US20130262396A1 (en) | 2012-03-30 | 2013-10-03 | Commvault Systems, Inc. | Data storage recovery automation |
US20130332466A1 (en) * | 2012-06-08 | 2013-12-12 | International Business Machines Corporation | Linking Data Elements Based on Similarity Data Values and Semantic Annotations |
US10176053B2 (en) | 2012-06-13 | 2019-01-08 | Commvault Systems, Inc. | Collaborative restore in a networked storage system |
US9251186B2 (en) | 2012-06-13 | 2016-02-02 | Commvault Systems, Inc. | Backup using a client-side signature repository in a networked storage system |
US10956275B2 (en) | 2012-06-13 | 2021-03-23 | Commvault Systems, Inc. | Collaborative restore in a networked storage system |
WO2013188550A1 (en) | 2012-06-13 | 2013-12-19 | Commvault Systems, Inc. | Client-side signature repository in a networked storage system |
US9858156B2 (en) | 2012-06-13 | 2018-01-02 | Commvault Systems, Inc. | Dedicated client-side signature generator in a networked storage system |
US20200104213A1 (en) | 2012-06-13 | 2020-04-02 | Commvault Systems, Inc. | Dedicated client-side signature generator in a networked storage system |
US10387269B2 (en) | 2012-06-13 | 2019-08-20 | Commvault Systems, Inc. | Dedicated client-side signature generator in a networked storage system |
US9218374B2 (en) | 2012-06-13 | 2015-12-22 | Commvault Systems, Inc. | Collaborative restore in a networked storage system |
US9218375B2 (en) | 2012-06-13 | 2015-12-22 | Commvault Systems, Inc. | Dedicated client-side signature generator in a networked storage system |
US9218376B2 (en) | 2012-06-13 | 2015-12-22 | Commvault Systems, Inc. | Intelligent data sourcing in a networked storage system |
US8909980B1 (en) | 2012-06-29 | 2014-12-09 | Emc Corporation | Coordinating processing for request redirection |
US20140032940A1 (en) | 2012-07-30 | 2014-01-30 | Bruno Sartirana | Distributed file system at network switch |
US20140047263A1 (en) | 2012-08-08 | 2014-02-13 | Susan Coatney | Synchronous local and cross-site failover in clustered storage systems |
US9092441B1 (en) | 2012-08-08 | 2015-07-28 | Amazon Technologies, Inc. | Archival data organization and management |
US20140046904A1 (en) | 2012-08-13 | 2014-02-13 | Commvault Systems, Inc | Lightweight mounting of a secondary copy of file system data |
US20150161015A1 (en) | 2012-08-13 | 2015-06-11 | Commvault Systems, Inc. | Generic file level restore from a block-level secondary copy |
US20150142755A1 (en) * | 2012-08-24 | 2015-05-21 | Hitachi, Ltd. | Storage apparatus and data management method |
US20140181441A1 (en) | 2012-12-21 | 2014-06-26 | Commvault Systems, Inc. | Identifying files for multiple secondary copy operations using data obtained during backup of primary storage |
US20140196037A1 (en) | 2013-01-09 | 2014-07-10 | The Research Foundation For The State University Of New York | Gang migration of virtual machines using cluster-wide deduplication |
US20140195749A1 (en) | 2013-01-10 | 2014-07-10 | Pure Storage, Inc. | Deduplication of Volume Regions |
US20140201153A1 (en) | 2013-01-11 | 2014-07-17 | Commvault Systems, Inc. | Partial file restore in a data storage system |
US9665591B2 (en) | 2013-01-11 | 2017-05-30 | Commvault Systems, Inc. | High availability distributed deduplicated storage system |
US20220092032A1 (en) | 2013-01-11 | 2022-03-24 | Commvault Systems, Inc. | High availability distributed deduplicated storage system |
US9633033B2 (en) | 2013-01-11 | 2017-04-25 | Commvault Systems, Inc. | High availability distributed deduplicated storage system |
US10229133B2 (en) | 2013-01-11 | 2019-03-12 | Commvault Systems, Inc. | High availability distributed deduplicated storage system |
US11157450B2 (en) | 2013-01-11 | 2021-10-26 | Commvault Systems, Inc. | High availability distributed deduplicated storage system |
US20140201142A1 (en) | 2013-01-14 | 2014-07-17 | Commvault Systems, Inc. | Partial sharing of secondary storage files in a data storage system |
US20140229451A1 (en) * | 2013-02-12 | 2014-08-14 | Atlantis Computing, Inc. | Deduplication metadata access in deduplication file system |
US20140258245A1 (en) | 2013-03-07 | 2014-09-11 | Jive Software, Inc. | Efficient data deduplication |
US20140281758A1 (en) | 2013-03-12 | 2014-09-18 | International Business Machines Corporation | On-site visualization of component status |
US20140283061A1 (en) * | 2013-03-15 | 2014-09-18 | Juniper Networks, Inc. | Attack detection and prevention using global device fingerprinting |
US20140289225A1 (en) | 2013-03-21 | 2014-09-25 | Nextbit Systems Inc. | Prioritizing downloading of image files |
US20170090786A1 (en) | 2013-05-07 | 2017-03-30 | Axcient, Inc. | Distributed and Deduplicating Data Storage System and Methods of Use |
US20140337285A1 (en) | 2013-05-08 | 2014-11-13 | Commvault Systems, Inc. | Synchronization of local secondary copies with a remote storage management component |
US20140337664A1 (en) | 2013-05-08 | 2014-11-13 | Commvault Systems, Inc. | Use of temporary secondary copies in failover operations |
US20160170657A1 (en) | 2013-05-16 | 2016-06-16 | Hewlett-Packard Development Company, L.P. | Deduplicated data storage system having distributed manifest |
US9298724B1 (en) | 2013-06-14 | 2016-03-29 | Symantec Corporation | Systems and methods for preserving deduplication efforts after backup-job failures |
US20150012698A1 (en) | 2013-07-08 | 2015-01-08 | Dell Products L.P. | Restoring temporal locality in global and local deduplication storage systems |
US20160070911A1 (en) * | 2013-08-19 | 2016-03-10 | Amazon Technologies, Inc. | Rapid malware inspection of mobile applications |
US9336076B2 (en) | 2013-08-23 | 2016-05-10 | Globalfoundries Inc. | System and method for controlling a redundancy parity encoding amount based on deduplication indications of activity |
US9298386B2 (en) | 2013-08-23 | 2016-03-29 | Globalfoundries Inc. | System and method for improved placement of blocks in a deduplication-erasure code environment |
US20150088821A1 (en) | 2013-09-23 | 2015-03-26 | International Business Machines Corporation | Data migration using multi-storage volume swap |
US20150089185A1 (en) | 2013-09-23 | 2015-03-26 | International Business Machines Corporation | Managing Mirror Copies without Blocking Application I/O |
US10218740B1 (en) * | 2013-09-30 | 2019-02-26 | Fireeye, Inc. | Fuzzy hash of behavioral results |
US20150134611A1 (en) | 2013-11-12 | 2015-05-14 | Red Hat, Inc. | Transferring objects between different storage devices based on timestamps |
US20150154398A1 (en) * | 2013-12-03 | 2015-06-04 | International Business Machines Corporation | Optimizing virus scanning of files using file fingerprints |
US20150248466A1 (en) | 2014-03-03 | 2015-09-03 | Netapp, Inc. | Data transfer between storage systems using data fingerprints |
US9633056B2 (en) | 2014-03-17 | 2017-04-25 | Commvault Systems, Inc. | Maintaining a deduplication database |
US11119984B2 (en) | 2014-03-17 | 2021-09-14 | Commvault Systems, Inc. | Managing deletions from a deduplication database |
US10445293B2 (en) | 2014-03-17 | 2019-10-15 | Commvault Systems, Inc. | Managing deletions from a deduplication database |
US11188504B2 (en) | 2014-03-17 | 2021-11-30 | Commvault Systems, Inc. | Managing deletions from a deduplication database |
US10380072B2 (en) | 2014-03-17 | 2019-08-13 | Commvault Systems, Inc. | Managing deletions from a deduplication database |
US20150269032A1 (en) | 2014-03-18 | 2015-09-24 | Netapp, Inc. | Backing up data to cloud data storage while maintaining storage efficiency |
US20150269212A1 (en) | 2014-03-18 | 2015-09-24 | Facebook, Inc. | Data logging framework |
US20150278104A1 (en) | 2014-03-26 | 2015-10-01 | Research & Business Foundation SUNGKYUNKWAN UNIVERISTY | Hybrid memory device, memory system including same and data processing method |
US20150347306A1 (en) | 2014-05-30 | 2015-12-03 | International Business Machines Corporation | Synchronizing updates of page table status indicators in a multiprocessing environment |
US20150378839A1 (en) | 2014-06-30 | 2015-12-31 | Vmware, Inc. | Recovery system and method for performing site recovery using replicated recovery-specific metadata |
US20160154709A1 (en) | 2014-08-06 | 2016-06-02 | Commvault Systems, Inc. | Point-in-time backups of a production application made accessible over fibre channel and/or iscsi as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host |
US20160041880A1 (en) | 2014-08-06 | 2016-02-11 | Commvault Systems, Inc. | Efficient application recovery in an information management system based on a pseudo-storage-device driver |
US20160042090A1 (en) | 2014-08-06 | 2016-02-11 | Commvault Systems, Inc. | Preserving the integrity of a snapshot on a storage device via ephemeral write operations in an information management system |
US20170315876A1 (en) | 2014-09-30 | 2017-11-02 | Code 42 Software, Inc. | Shared file system predictive storage techniques |
US11113246B2 (en) | 2014-10-29 | 2021-09-07 | Commvault Systems, Inc. | Accessing a file system using tiered deduplication |
US10474638B2 (en) | 2014-10-29 | 2019-11-12 | Commvault Systems, Inc. | Accessing a file system using tiered deduplication |
US9934238B2 (en) | 2014-10-29 | 2018-04-03 | Commvault Systems, Inc. | Accessing a file system using tiered deduplication |
US9575673B2 (en) | 2014-10-29 | 2017-02-21 | Commvault Systems, Inc. | Accessing a file system using tiered deduplication |
US20210349857A1 (en) | 2014-10-29 | 2021-11-11 | Commvault Systems, Inc. | Accessing a file system using tiered deduplication |
US9542554B1 (en) * | 2014-12-18 | 2017-01-10 | Palo Alto Networks, Inc. | Deduplicating malware |
US20160277360A1 (en) * | 2015-03-20 | 2016-09-22 | Migrate2, LLC | Dynamic Data Exfiltration Prevention Process (DDEPP) |
US11301420B2 (en) | 2015-04-09 | 2022-04-12 | Commvault Systems, Inc. | Highly reusable deduplication database after disaster recovery |
US10339106B2 (en) | 2015-04-09 | 2019-07-02 | Commvault Systems, Inc. | Highly reusable deduplication database after disaster recovery |
US20200104052A1 (en) | 2015-05-26 | 2020-04-02 | Commvault Systems, Inc. | Replication using deduplicated secondary copy data |
US10481824B2 (en) | 2015-05-26 | 2019-11-19 | Commvault Systems, Inc. | Replication using deduplicated secondary copy data |
US10481826B2 (en) | 2015-05-26 | 2019-11-19 | Commvault Systems, Inc. | Replication using deduplicated secondary copy data |
US10481825B2 (en) | 2015-05-26 | 2019-11-19 | Commvault Systems, Inc. | Replication using deduplicated secondary copy data |
US20170031768A1 (en) | 2015-07-31 | 2017-02-02 | Atlantis Computing, Inc. | Method and apparatus for reconstructing and checking the consistency of deduplication metadata of a deduplication file system |
US20170168903A1 (en) | 2015-12-09 | 2017-06-15 | Commvault Systems, Inc. | Live synchronization and management of virtual machines across computing and virtualization platforms and using live synchronization to support disaster recovery |
US20170185488A1 (en) | 2015-12-23 | 2017-06-29 | Commvault Systems, Inc. | Application-level live synchronization across computing platforms including synchronizing co-resident applications to disparate standby destinations and selectively synchronizing some applications and not others |
US20210294510A1 (en) | 2015-12-30 | 2021-09-23 | Commvault Systems, Inc. | Deduplication replication in a distributed deduplication data storage system |
US10255143B2 (en) | 2015-12-30 | 2019-04-09 | Commvault Systems, Inc. | Deduplication replication in a distributed deduplication data storage system |
US10310953B2 (en) | 2015-12-30 | 2019-06-04 | Commvault Systems, Inc. | System for redirecting requests after a secondary storage computing device failure |
US10592357B2 (en) | 2015-12-30 | 2020-03-17 | Commvault Systems, Inc. | Distributed file system in a distributed deduplication data storage system |
US10877856B2 (en) | 2015-12-30 | 2020-12-29 | Commvault Systems, Inc. | System for redirecting requests after a secondary storage computing device failure |
US10061663B2 (en) | 2015-12-30 | 2018-08-28 | Commvault Systems, Inc. | Rebuilding deduplication data in a distributed deduplication data storage system |
US10956286B2 (en) | 2015-12-30 | 2021-03-23 | Commvault Systems, Inc. | Deduplication replication in a distributed deduplication data storage system |
US20170235647A1 (en) | 2016-02-12 | 2017-08-17 | Commvault Systems, Inc. | Data protection operations based on network path information |
US20170242871A1 (en) | 2016-02-18 | 2017-08-24 | Commvault Systems, Inc. | Data restoration operations based on network path information |
US20170262217A1 (en) | 2016-03-09 | 2017-09-14 | Commvault Systems, Inc. | Data transfer to a distributed storage environment |
US20170331787A1 (en) * | 2016-05-16 | 2017-11-16 | Hitachi, Ltd. | Unauthorized communication detection system and unauthorized communication detection method |
US20180077201A1 (en) * | 2016-09-15 | 2018-03-15 | Paypal, Inc. | Enhanced Security Techniques for Remote Reverse Shell Prevention |
US20180075234A1 (en) * | 2016-09-15 | 2018-03-15 | Paypal, Inc. | Techniques for Detecting Encryption |
US9753964B1 (en) * | 2017-01-19 | 2017-09-05 | Acquire Media Ventures, Inc. | Similarity clustering in linear time with error-free retrieval using signature overlap with signature size matching |
US10523699B1 (en) * | 2017-06-20 | 2019-12-31 | Amazon Technologies, Inc. | Privilege escalation vulnerability detection using message digest differentiation |
US10628586B1 (en) * | 2017-11-30 | 2020-04-21 | Palo Alto Networks, Inc. | Detecting malware via scanning for dynamically generated function pointers in memory |
US20200073959A1 (en) * | 2018-08-31 | 2020-03-05 | Mcafee, Llc | Fuzzy hash algorithms to calculate file similarity |
US20200167091A1 (en) | 2018-11-27 | 2020-05-28 | Commvault Systems, Inc. | Using interoperability between components of a data storage management system and appliances for data storage and deduplication to generate secondary and tertiary copies |
US20200167240A1 (en) | 2018-11-27 | 2020-05-28 | Commvault Systems, Inc. | Generating backup copies through interoperability between components of a data storage management system and appliances for data storage and deduplication |
US20200252428A1 (en) * | 2018-12-21 | 2020-08-06 | Fireeye, Inc. | System and method for detecting cyberattacks impersonating legitimate sources |
US20210279141A1 (en) | 2019-04-10 | 2021-09-09 | Commvault Systems, Inc. | Restore using deduplicated secondary copy data |
US20200327017A1 (en) | 2019-04-10 | 2020-10-15 | Commvault Systems, Inc. | Restore using deduplicated secondary copy data |
Non-Patent Citations (101)
Title |
---|
Armstead et al., "Implementation of a Campus-Wide Distributed Mass Storage Service: The Dream vs. Reality," IEEE, 1995, pp. 190-199. |
Arneson, "Mass Storage Archiving in Network Environments," Digest of Papers, Ninth IEEE Symposium on Mass Storage Systems, Oct. 31, 1988-Nov. 3, 1988, pp. 45-50, Monterey, CA. |
Ashton, et al., "Two Decades of policy-based storage management for the IBM mainframe computer", www.research.ibm.com, 19 pages, published Apr. 10, 2003, printed Jan. 3, 2009., www.research.ibm.com, Apr. 10, 2003, p. 19. |
Attarde, et al., U.S. Appl. No. 14/216,689 Published as 2015/0261776, filed Mar. 17, 2014, Managing Deletions From a Deduplication Database. |
Attarde, et al., U.S. Appl. No. 14/216,703 Now U.S. Pat. No. 9,633,056, filed Mar. 17, 2014, Maintaining a Deduplication Database. |
Attarde, et al., U.S. Appl. No. 16/020,900 Published as 2019/0012328, filed Jun. 27, 2018, Managing Deletions From a Deduplication Database. |
Bhagwat, Extreme Binning: Scalable, Parallel Deduplication for Chunk-based File Backup. IEEE 2009, 9 pages. |
Cabrera, et al. "ADSM: A Multi-Platform, Scalable, Back-up and Archive Mass Storage System," Digest of Papers, Compcon '95, Proceedings of the 40th IEEE Computer Society International Conference, Mar. 5, 1995-Mar. 9, 1995, pp. 420-427, San Francisco, CA. |
Cohen, Edith, et al.,. "Refreshment policies for web content caches." Computer Networks 38.6 (2002): 795-808. |
Cohen, Edith, et al.,. "The Age Penalty and its Effect on Cache Performance." In USITS, pp. 73-84. 2001. |
Cohen, Edith, et al.,."Aging through cascaded caches: Performance issues in the distribution of web content." In ACM SIGCOMM Computer Communication Review, vol. 31, No. 4, pp. 41-53. ACM, 2001. |
CommVault Systems, Inc. "Continuous Data Replicator 7.0," Product Data Sheet, 2007. |
CommVault Systems, Inc., "Deduplication," http://documentation.commvault.com/commvault/release_8_0_0/books_online_1/english_US/features/single_instance/single_instance.htm, internet accessed on Jan. 26, 2009, 9 pages. |
CommVault Systems, Inc., "Deduplication—How to," http://documentation.commvault.com/commvault/release_8_0_0/books_online_1/english_US/features/single_instance/single_instance_how_to.htm, internet accessed on Jan. 26, 2009, 7 pages. |
Diligent Technologies "HyperFactor," http://www.dilligent.com/products:protecTIER-1:HyperFactor-1, Internet accessed on Dec. 5, 2008, 2 pages. |
Dubnicki, et al. "HYDRAstor: A Scalable Secondary Storage." Fast. vol. 9.2009, 74 pages. |
Eitel, "Backup and Storage Management in Distributed Heterogeneous Environments," IEEE, 1994, pp. 124-126. |
Final Office Action for Japanese Application No. 2003531581, dated Mar. 24, 2009, 6 pages. |
Gait, "The Optical File Cabinet: A Random-Access File system for Write-Once Optical Disks," IEEE Computer, vol. 21, No. 6, pp. 11-22 (1988). |
Gray (#2 of 2, pp. 604-609), Jim; Reuter Andreas, Transaction Processing Concepts and Techniques, Morgan Kaufmann Publisher, USA 1994, pp. 604-609. |
Guo et al., Building a High-performance Deduplication System, Jun. 15, 2011, retrieved from the Internet at <URL: http://dl.acm.org/citation.cfm?id=2002206>, pp. 1-14. |
Haridas et al., U.S. Appl. No. 16/201,856, filed Nov. 27, 2018, Using Interoperability Between Components of a Data Storage Management System and Appliances for Data Storage and Deduplication to Generate Secondary and Tertiary Copies. |
Haridas et al., U.S. Appl. No. 16/201,897, filed Nov. 27, 2018, Generating Backup Copies Through Interoperability Between Components of a Data Storage Management System and Appliances for Data Storage and Deduplication. |
Huff, KL, "Data Set Usage Sequence Number," IBM Technical Disclosure Bulletin, vol. 24, No. 5, Oct. 1981 New York, US, pp. 2404-2406. |
International Preliminary Report on Patentability, International Application No. PCT/US2013/045443 dated Dec. 16, 2014 11 pages. |
International Search Report and Written Opinion, International Application No. PCT/US2009/58137, dated Dec. 23, 2009, 14 pages. |
International Search Report and Written Opinion, International Application No. PCT/US2011/030804, dated Jun. 9, 2011. |
International Search Report and Written Opinion, International Application No. PCT/US2011/030814, dated Jun. 9, 2011. |
International Search Report and Written Opinion, International Application No. PCT/US2013/045443 dated Nov. 14, 2013, 16 pages. |
Jander, "Launching Storage-Area Net," Data Communications, US, McGraw Hill, NY, vol. 27, No. 4(Mar. 21, 1998), pp. 64-72. |
Kashyap, et al., "Professional Services Automation: A knowledge Management approach using LSI and Domain specific Ontologies", FLAIRS-01 Proceedings, 2001, pp. 300-302. |
Kornblum, Jesse, "Identifying Almost Identical Files Using Context Triggered Piecewise Hashing," www.sciencedirect.com, Digital Investigation 3S (2006), pp. S91-S97. |
Lortu Software Development, "Kondar Technology-Deduplication," http://www.lortu.com/en/deduplication.asp, Internet accessed on Dec. 5, 2008, 3 pages. |
Mitkar, et al., U.S. Appl. No. 14/527,678 Now U.S. Pat. No. 9,575,673, filed Oct. 29, 2014, Accessing a File System Using Tiered Deduplication. |
Mitkar, et al., U.S. Appl. No. 15/399,597 Now U.S. Pat. No. 9,934,238, filed Jan. 5, 2017, Accessing a File System Using Tiered Deduplication. |
Mitkar, et al., U.S. Appl. No. 15/899,699 Published as 2018/0189314, filed Feb. 20, 2018, Accessing a File System Using Tiered Deduplication. |
Muller, et al., U.S. Appl. No. 13/916,385 Published as 2013/0339298 Abandoned, filed Jun. 12, 2013, Collaborative Backup in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 13/916,409 Now U.S. Pat. No. 9,218,374, filed Jun. 12, 2013, Collaborative Restore in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 13/916,429 Published as 2013/0339310 Abandoned, filed Jun. 12, 2013, Restore Using a Client Side Signature Repository in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 13/916,434 Now U.S. Pat. No. 9,251,186, filed Jun. 12, 2013, Backup Using a Client-Side Signature Repository in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 13/916,458 Now U.S. Pat. No. 9,218,375, filed Jun. 12, 2013, Dedicated Client-Side Signature Generator in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 13/916,467 Now U.S. Pat. No. 9,218,376, filed Jun. 12, 2013, Intelligent Data Sourcing in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 14/956,185 Abandoned, filed Dec. 1, 2015, Collaborative Restore in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 14/956,213 Published as 2016/0188416 Abandoned, filed Dec. 1, 2015, Dedicated Client-Side Signature Generator in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 15/067,714 Now U.S. Pat. No. 9,858,156, filed Mar. 11, 2016, Dedicated Client-Side Signature Generator in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 15/067,766 Now U.S. Pat. No. 10,176,053, filed Mar. 11, 2016, Collaborative Restore in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 15/820,152 Published as 2018/0196720, filed Nov. 21, 2017, Dedicated Client-Side Signature Generator in a Networked Storage System. |
Muller, et al., U.S. Appl. No. 16/195,461, filed Nov. 19, 2018, Collaborative Restore in a Networked Storage System. |
Ngo, et al., U.S. Appl. No. 12/499,717 Now U.S. Pat. No. 8,930,306, filed Jul. 8, 2009, Synchronized Data Duplication. |
Ngo, et al., U.S. Appl. No. 14/555,322 Now Abandoned, filed Nov. 26, 2014, Synchronized Data Duplication. |
Ngo, et al., U.S. Appl. No. 15/684,812 Published as 2018/0075055, filed Aug. 23, 2017, Synchronized Data Duplication. |
Overland Storage, "Data Deduplication," http://www.overlandstorage.com/topics/data_deduplication.html, Internet accessed on Dec. 5, 2008, 2 pages. |
Prahlad, et al., U.S. Appl. No. 12/724,292 Now U.S. Pat. No. 8,484,162, filed Mar. 15, 2010, De-Duplication Systems and Methods for Application-Specific Data. |
Prahlad, et al., U.S. Appl. No. 13/931,654 Now U.S. Pat. No. 9,405,763, filed Jun. 28, 2013, De-Duplication Systems and Methods for Application-Specific Data. |
Prahlad, et al., U.S. Appl. No. 15/198,269 Now Abandoned, filed Jun. 30, 2016, De-Duplication Systems and Methods for Application-Specific Data. |
Prahlad, et al., U.S. Appl. No. 15/991,849 Published as 2019/0012237, filed May 29, 2018, De-Duplication Systems and Methods for Application-Specific Data. |
Quantum Corporation, "Data De-Duplication Background: A Technical White Paper," May 2008, 13 pages. |
Retnamma, et al., U.S. Appl. No. 13/324,792 Now U.S. Pat. No. 9,116,850, filed Dec. 13, 2011, Client-Side Repository in a Networked Deduplicated Storage System. |
Retnamma, et al., U.S. Appl. No. 13/324,817 Now U.S. Pat. No. 8,954,446, filed Dec. 13, 2011, Client-Side Repository in a Networked Deduplicated Storage System. |
Retnamma, et al., U.S. Appl. No. 13/324,884 Abandoned, filed Dec. 13, 2011, Client-Side Repository in a Networked Deduplicated Storage System. |
Rosenblum et al., "The Design and Implementation of a Log-Structure File System," Operating Systems Review SIGOPS, vol. 25, No. 5, New York, US, pp. 1-15 (May 1991). |
Vijayan, et al., U.S. Appl. No. 12/982 087 Now U.S. Pat. No. 8,572,340, filed Dec. 30, 2010, Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations. |
Vijayan, et al., U.S. Appl. No. 12/982,074 Now U.S. Pat. No. 8,364,652, filed Dec. 30, 2010, Content Aligned Block-Based Deduplication. |
Vijayan, et al., U.S. Appl. No. 12/982,086 Now U.S. Pat. No. 8,577,851, filed Dec. 30, 2010, Content Aligned Block-Based Deduplication. |
Vijayan, et al., U.S. Appl. No. 12/982,100 Now U.S. Pat. No. 8,578,109, filed Dec. 30, 2010, Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations. |
Vijayan, et al., U.S. Appl. No. 13/324,613 Now U.S. Pat. No. 9,020,900, filed Dec. 13, 2011, Distributed Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 13/324,848 Now U.S. Pat. No. 9,104,623, filed Dec. 13, 2011, Client-Side Repository in a Networked Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 13/750,105 Now U.S. Pat. No. 9,110,602, filed Jan. 25, 2013, Content Aligned Block-Based Deduplication. |
Vijayan, et al., U.S. Appl. No. 14/,673,586 Now U.S. Pat. No. 9,898,478, filed Mar. 30, 2015, Distributed Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 14/040 247 Now U.S. Pat. No. 9,239,687, filed Sep. 27, 2013, Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations. |
Vijayan, et al., U.S. Appl. No. 14/152,509 Now U.S. Pat. No. 6,633,033, filed Jan. 10, 2014, High Availability Distributed Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 14/152,549 Now U.S. Pat. No. 9,665,591, filed Jan. 10, 2014, High Availability Distributed Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 14/673,021 Now U.S. Pat. No. 10,191,816, filed Mar. 30, 2015, Client-Side Repository in a Networked Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 14/682,988 Published as 2016/0299818, filed Apr. 9, 2015, Highly Reusable Deduplication Database After Disaster Recovery. |
Vijayan, et al., U.S. Appl. No. 14/721,971 Published as 2016/0350391, filed May 26, 2015, Replication Using Deduplicated Secondary Copy Data. |
Vijayan, et al., U.S. Appl. No. 14/821,418 Now U.S. Pat. No. 9,619,480, filed Aug. 7, 2015, Content Aligned Block-Based Deduplication. |
Vijayan, et al., U.S. Appl. No. 14/967,097 Published as 2016/0196070 Abandoned, filed Dec. 11, 2015, Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations. |
Vijayan, et al., U.S. Appl. No. 15/074 109 Now U.S. Pat. No. 9,639,289, filed Mar. 18, 2016, Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations. |
Vijayan, et al., U.S. Appl. No. 15/197,434 Published as 2016/0306707, filed Jun. 29, 2016, Highly Reusable Deduplication Database After Disaster Recovery. |
Vijayan, et al., U.S. Appl. No. 15/197,435 Published as 2016/0306818, filed Jun. 29, 2016, Highly Reusable Deduplication Database After Disaster Recovery. |
Vijayan, et al., U.S. Appl. No. 15/282,445 Published as 2017/0083563, filed Sep. 30, 2016, Replication Using Deduplicated Secondary Copy Data. |
Vijayan, et al., U.S. Appl. No. 15/282,533 Published as 2017/0083558, filed Sep. 30, 2016, Replication Using Deduplicated Secondary Copy Data. |
Vijayan, et al., U.S. Appl. No. 15/282,668 Published as 2017/0090773, filed Sep. 30, 2016, Replication Using Deduplicated Secondary Copy Data. |
Vijayan, et al., U.S. Appl. No. 15/299,254 Published as 2017/0192866, filed Oct. 20, 2016, System for Redirecting Requests After a Secondary Storage Computing Device Failure. |
Vijayan, et al., U.S. Appl. No. 15/299,280 Now Pat. 10,061,663, filed Oct. 20, 2016, Rebuilding Deduplication Data in a Distributed Deduplication Data Storage System. |
Vijayan, et al., U.S. Appl. No. 15/299,281 Published as 2017/0192868, filed Oct. 20, 2016, User Interface for Identifying a Location of a Failed Secondary Storage Device. |
Vijayan, et al., U.S. Appl. No. 15/299,290 Now Pat. 10,255,143, filed Oct. 20, 2016, Deduplication Replication in a Distributed Deduplication Data Storage System. |
Vijayan, et al., U.S. Appl. No. 15/299,298 Published as 2017/0192861, filed Oct. 20, 2016, Distributed File System in a Distributed Deduplication Data Storage System. |
Vijayan, et al., U.S. Appl. No. 15/299,299 Published as 2017/0193003, filed Oct. 20, 2016, Redundant and Robust Distributed Deduplication Data Storage System. |
Vijayan, et al., U.S. Appl. No. 15/449,246 Now U.S. Pat. No. 9,898,225, filed Mar. 3, 2017, Content Aligned Block-Based Deduplication. |
Vijayan, et al., U.S. Appl. No. 15/472737 Now U.S. Pat. No. 10,126,973, filed Mar. 29, 2017, Systems and Methods for Retaining and Using Data Block Signatures in Data Protection Operations. |
Vijayan, et al., U.S. Appl. No. 15/474,730 Now U.S. Pat. No. 10,229,113, filed Mar. 30, 2017, High Availability Distributed Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 15/875,896 Published as 2019/0026305, filed Jan. 19, 2018, Distributed Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 16/224,383, filed Dec. 18, 2018, Client-Side Repository in a Networked Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 16/232,950, filed Dec. 26, 2018, Deduplication Replication in a Distributed Deduplication Data Storage System. |
Vijayan, et al., U.S. Appl. No. 16/232,956, filed Dec. 26, 2018, System for Redirecting Requests After a Secondary Storage Computing Device Failure. |
Vijayan, et al., U.S. Appl. No. 16/234,976, filed Dec. 28, 2018, High Availability Distributed Deduplicated Storage System. |
Vijayan, et al., U.S. Appl. No. 16/380,469, filed Apr. 10, 2019, Restore Using Deduplicated Secondary Copy Data. |
Wei, et al. "MAD2: A scalable high-throughput exact deduplication approach for network backup services." Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on. IEEE, 2010, 14 pages. |
Wolman et al., On the scale and performance of cooperative Web proxy caching, 1999. |
Wu, et al., Load Balancing and Hot Spot Relief for Hash Routing among a Collection of Proxy Caches, 1999. |
Also Published As
Publication number | Publication date |
---|---|
US20200358621A1 (en) | 2020-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12204929B2 (en) | Targeted snapshot based on virtual machine location | |
US11983075B2 (en) | Migrating data and metadata from a backup system | |
US11544155B2 (en) | Granular restoration of virtual machine application data | |
US11573862B2 (en) | Application aware backup of virtual machines | |
US11463264B2 (en) | Use of data block signatures for monitoring in an information management system | |
US20240152647A1 (en) | Graphical representation of an information management system | |
US20220035559A1 (en) | Managing subordinate storage operation pod cells using a global repository cell or master storage operation cell | |
US11615002B2 (en) | Dynamically allocating streams during restoration of data | |
US10891198B2 (en) | Storing data to cloud libraries in cloud native formats | |
US12253977B2 (en) | Continuously run log backup with minimal configuration and resource usage from the source machine | |
US10152251B2 (en) | Targeted backup of virtual machine | |
US20200097369A1 (en) | Data protection operations based on network path information | |
US20180285201A1 (en) | Backup operations for large databases using live synchronization | |
US11431797B2 (en) | System for managing multiple information management cells | |
US11126365B2 (en) | Skipping data backed up in prior backup operations | |
US11108858B2 (en) | Archiving mail servers via a simple mail transfer protocol (SMTP) server | |
US12259977B2 (en) | Entropy-based ransomware detection | |
US20210344755A1 (en) | Region-based distributed information management system | |
US12124338B2 (en) | Data loss vulnerability detection | |
US11327663B2 (en) | Ensuring the integrity of data storage volumes used in block-level live synchronization operations in a data storage management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: COMMVAULT SYSTEMS, INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NGO, DAVID;REEL/FRAME:049130/0172 Effective date: 20190507 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNOR:COMMVAULT SYSTEMS, INC.;REEL/FRAME:058496/0836 Effective date: 20211213 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |