Patent application number | Description | Published |
20090013138 | Backup archive management - Apparatus, systems, and methods may operate to taking a snapshot of an origin volume in conjunction with a backup process in response to receiving a snapshot request by a snapshot service. A persistent time stamp associated with the creation time of the snapshot may be recorded on the origin volume. The persistent time stamp is accessible to the file system process associated with the origin volume in most embodiments. If access to a file is requested, the time the file was last modified may be compared with the persistent time stamp, and if the file modified time is earlier than the persistent time stamp, the file's archive bit can be reset. Otherwise, the archive bit is not reset. Additional apparatus, systems, and methods are disclosed. | 01-08-2009 |
20090043774 | TECHNIQUES FOR RETAINING SECURITY RESTRICTIONS WITH FILE VERSIONING - Techniques are presented for retaining security restrictions with file versioning. Files are versioned in such a manner that metadata including full directory paths and access restrictions are retained for each version of the file and enforced when each version is accessed. The files are versioned to hashed subdirectories for space and management efficiencies. In an embodiment, prior versions of a particular file are maintained as delta data structures while a most-recent version of that file is maintained in its full or complete data state. | 02-12-2009 |
20090055447 | TECHNIQUES FOR SNAPSHOTTING - Techniques are presented for snapshotting. Blocks associated with a storage volume are frozen from volatile access upon receipt of a snapshot request. Continued volatile access to the frozen blocks is permitted by transparently mapping each frozen block to an available block within the volume that is not associated with the snapshot. Volatile access continues on the available blocks. | 02-26-2009 |
20090144342 | TECHNIQUES FOR VERSIONING FILE SYSTEMS - Techniques are presented for versioning file systems. Files and directories are versioned in a manner that permits the versions to be mounted on a device of a user. The original security restrictions that existed with the versions when they were versioned are retained with the mount. Moreover, the user can browse and access the versions via the mount using an existing file system of the user's device. Further, names for each of the versions include detailed information that reveals the relationship of each particular version to its parent version. | 06-04-2009 |
Patent application number | Description | Published |
20090049259 | CLUSTERED SNAPSHOTS IN NETWORKS - Apparatus, systems, and methods may operate to assign a plurality of managing nodes to manage a corresponding plurality of groups of blocks forming a portion of a snapshot volume for copy-on-write execution and snapshot write execution. Further operations include coordinating the copy-on-write execution and the snapshot write execution using a write completion map accessible to the managing nodes. Additional apparatus, systems, and methods are disclosed. | 02-19-2009 |
20110191294 | TECHNIQUES FOR VERSIONING FILE SYSTEMS - Techniques are presented for versioning file systems. Files and directories are versioned in a manner that permits the versions to be mounted on a device of a user. The original security restrictions that existed with the versions when they were versioned are retained with the mount. Moreover, the user can browse and access the versions via the mount using an existing file system of the user's device. Further, names for each of the versions include detailed information that reveals the relationship of each particular version to its parent version. | 08-04-2011 |
20110191376 | TECHNIQUES FOR EXTENDING AND CONTROLLING ACCESS TO A COMMON INFORMATION MODEL (CIM) - Systems and methods for extending and controlling access to a Common Information Model (CIM) are presented. According to an embodiment, access requests for a CIM object manager (CIMOM) pass through a CIM file system (CIMFS) where each access requested is authenticated. The CIMFS maintains and manages a hidden file system representing CIM classes and a CIM class hierarchy on a volume of storage. The structure, metadata, and values for the CIM classes, CIM object, and CIM providers are maintained in a hidden directory on the volume. This information is accessible via the CIMFS to use existing file system management operations. | 08-04-2011 |
20110276600 | TECHNIQUES FOR EXTENDING AND CONTROLLING ACCESS TO A COMMON INFORMATION MODEL (CIM) - Systems and methods for extending and controlling access to a Common Information Model (CIM) are presented. According to an embodiment, access requests for a CIM object manager (CIMOM) pass through a CIM file system (CIMFS) where each access requested is authenticated. The CIMFS maintains and manages a hidden file system representing CIM classes and a CIM class hierarchy on a volume of storage. The structure, metadata, and values for the CIM classes, CIM object, and CIM providers are maintained in a hidden directory on the volume. This information is accessible via the CIMFS to use existing file system management operations. | 11-10-2011 |