Patent application number | Description | Published |
20110302140 | FAILOVER SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS - In certain embodiments, a tiered storage system is disclosed that provides for failover protection during data backup operations. The system can provide for an index, or catalog, for identifying and enabling restoration of backup data located on a storage device. The system further maintains a set of transaction logs generated by media agent modules that identify metadata with respect to individual data chunks of a backup file on the storage device. A copy of the catalog and transaction logs can be stored at a location accessible by each of the media agent modules. In this manner, in case of a failure of one media agent module during backup, the transaction logs and existing catalog can be used by a second media agent module to resume the backup operation without requiring a restart of the backup process. | 12-08-2011 |
20120084524 | ARCHIVING DATA OBJECTS USING SECONDARY COPIES - A system for archiving data objects using secondary copies is disclosed. The system creates one or more secondary copies of primary copy data that contains multiple data objects. The system maintains a first data structure that tracks the data objects for which the system has created secondary copies and the locations of the secondary copies. To archive data objects in the primary copy data, the system identifies data objects to be archived, verifies that previously-created secondary copies of the identified data objects exist, and replaces the identified data objects with stubs. The system maintains a second data structure that both tracks the stubs and refers to the first data structure, thereby creating an association between the stubs and the locations of the secondary copies. | 04-05-2012 |
20120254115 | CREATING SECONDARY COPIES OF DATA BASED ON SEARCHES FOR CONTENT - A method and system for creating secondary copies of data whose contents satisfy searches within data stores is described. In some cases, the system searches for data within a data store, identifies a set of data that satisfies the search, copies the identified set of data, and transfers the copy to secondary or other storage. In some cases, the system utilizes search-based secondary copies of days during restoration processes in order to restore data similar to and/or associated with data requested to be restored. | 10-04-2012 |
20130061014 | SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUALIZATION DATA - Described in detail herein is a method of copying data of one or more virtual machines being hosted by one or more non-virtual machines. The method includes receiving an indication that specifies how to perform a copy of data of one or more virtual machines hosted by one or more virtual machine hosts. The method may include determining whether the one or more virtual machines are managed by a virtual machine manager that manages or facilitates management of the virtual machines. If so, the virtual machine manager is dynamically queried to automatically determine the virtual machines that it manages or that it facilitates management of. If not, a virtual machine host is dynamically queried to automatically determine the virtual machines that it hosts. The data of each virtual machine is then copied according to the specifications of the received indication. | 03-07-2013 |
20130238563 | AUTOMATED, TIERED DATA RETENTION - The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period. | 09-12-2013 |
20130238575 | AUTOMATED, TIERED DATA RETENTION - The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period. | 09-12-2013 |
20130247154 | MANAGING CONNECTIONS IN A DATA STORAGE SYSTEM - Described in detail herein are systems and methods for managing connections in a data storage system. For example, the systems and methods may be used to manage connections between two or more computing devices for purposes of performing storage operations on the data of one of the computing devices. The data storage system includes at least two computing devices. A first computing device includes an unauthorized connection data structure and a connection manager component. The connection manager component receives a connection request from a second computing device. If the second computing device is not identified on the unauthorized connection data structure, the connection manager component can request that an authentication manager authenticate the second computing device and/or determine whether the second computing device is properly authorized. If so, the connection manager component can allow the second computing device to connect to the first computing device. | 09-19-2013 |
20130262386 | SMART ARCHIVING AND DATA PREVIEWING FOR MOBILE DEVICES - Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request. | 10-03-2013 |
20130262387 | UTILIZING SNAPSHOTS FOR ACCESS TO DATABASES AND OTHER APPLICATIONS - A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly. | 10-03-2013 |
20130262394 | SEARCH FILTERED FILE SYSTEM USING SECONDARY STORAGE - Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files. | 10-03-2013 |
20130262410 | DATA PREVIEWING BEFORE RECALLING LARGE DATA FILES - Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request. | 10-03-2013 |
20140040209 | FAILOVER SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS - In certain embodiments, a tiered storage system is disclosed that provides for failover protection during data backup operations. The system can provide for an index, or catalog, for identifying and enabling restoration of backup data located on a storage device. The system further maintains a set of transaction logs generated by media agent modules that identify metadata with respect to individual data chunks of a backup file on the storage device. A copy of the catalog and transaction logs can be stored at a location accessible by each of the media agent modules. In this manner, in case of a failure of one media agent module during backup, the transaction logs and existing catalog can be used by a second media agent module to resume the backup operation without requiring a restart of the backup process. | 02-06-2014 |
20140181028 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA - The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents. | 06-26-2014 |
20140181033 | SYSTEMS AND METHODS TO TRACK DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system copies the data to temporary storage, saves the file path in the temporary storage, and identifies the copy of the data in temporary storage for backup. In another manner, the system converts the data to a hidden file, copies the hidden file to temporary storage, saves the file path to the temporary storage, and identifies the copy of the hidden file for backup. In a further manner, the system copies the data to temporary storage when it is created, saves the file path to the temporary storage, and identifies the data in the temporary storage for backup after the delete operation is detected and the data is identified as not protected or as modified after the last backup operation. | 06-26-2014 |
20140181037 | SYSTEMS AND METHODS TO DETECT DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system monitors data operations and when the data operation is a delete, the system determines whether the data identified for deletion has been protected by a backup operation. Data that has not been backed up, such as newly created data, is copied to temporary storage before deletion. When the data has been protected, the system determines whether the data has been modified after the backup operation. Data modified after the backup operation is copied to temporary storage before deletion. | 06-26-2014 |
20140181047 | SYSTEMS AND METHODS TO PROTECT DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. The system copies the data to temporary storage, normalizes the copy, and merges the normalized data from the temporary storage to a secondary storage device. For instance, the system merges the data on the secondary storage device at locations indicated by the file path saved in metadata. In another manner, the system merges changes between the previously backed up version of the data and the data identified for deletion into the previously backed up version of the data stored on the secondary storage device at the locations indicated by the file path. In a further manner, the system merges the differences between the previously backed up version of the data and the data identified for deletion at the locations indicated by the file path. | 06-26-2014 |
20140181048 | FILTERED REFERENCE COPY OF SECONDARY STORAGE DATA IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can filter secondary copies of data (e.g., backups, snapshots, archives, etc.) generated by multiple client computing devices into a single, filtered, global reference copy. A reference copy may be a filtered view or representation of secondary storage data in a data storage system. A reference copy may include a data structure that includes references to a subset of secondary storage data that meets certain filtering criteria. The filtering criteria may be specified by users according to user preference. Data included in a reference copy may be stored in native format (e.g., format of the application that generated the data) and be accessible through the application associated with the data. | 06-26-2014 |
20140181438 | FILTERED REFERENCE COPY OF SECONDARY STORAGE DATA IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can filter secondary copies of data (e.g., backups, snapshots, archives, etc.) generated by multiple client computing devices into a single, filtered, global reference copy. A reference copy may be a filtered view or representation of secondary storage data in a data storage system. A reference copy may include a data structure that includes references to a subset of secondary storage data that meets certain filtering criteria. The filtering criteria may be specified by users according to user preference. Data included in a reference copy may be stored in native format (e.g., format of the application that generated the data) and be accessible through the application associated with the data. | 06-26-2014 |
20140201142 | PARTIAL SHARING OF SECONDARY STORAGE FILES IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can allow users to share a portion of a file (e.g., a document) in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The data storage system according to certain aspects can also provide a native view of secondary storage data on a client computer. The index data and/or metadata relating to secondary storage data may be stored in native format (e.g., format of the application(s) that generated the secondary storage data) so that the secondary storage data can be displayed in a native view. The index data and/or metadata may be synchronized on the client without synchronizing the secondary storage data itself. | 07-17-2014 |
20140201154 | SHARING OF SECONDARY STORAGE DATA - An information management system according to certain aspects allows users to share a portion of a file (e.g., a document) stored in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The system according to certain aspects provides a native view of secondary storage data on a client computing device. The index data and/or metadata relating to secondary storage data may be stored in native application format for access via the native source application. | 07-17-2014 |
20140222759 | UTILIZING SNAPSHOTS FOR ACCESS TO DATABASES AND OTHER APPLICATIONS - A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly. | 08-07-2014 |
20140250093 | SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUALIZATION DATA - Described in detail herein is a method of copying data of one or more virtual machines being hosted by one or more non-virtual machines. The method includes receiving an indication that specifies how to perform a copy of data of one or more virtual machines hosted by one or more virtual machine hosts. The method may include determining whether the one or more virtual machines are managed by a virtual machine manager that manages or facilitates management of the virtual machines. If so, the virtual machine manager is dynamically queried to automatically determine the virtual machines that it manages or that it facilitates management of. If not, a virtual machine host is dynamically queried to automatically determine the virtual machines that it hosts. The data of each virtual machine is then copied according to the specifications of the received indication. | 09-04-2014 |
20140344234 | AUTOMATED, TIERED DATA RETENTION - The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period. | 11-20-2014 |
20150074060 | FILE MANAGER INTEGRATION WITH VIRTUALIZATION IN AN INFORMATION MANAGEMENT SYSTEM WITH AN ENHANCED STORAGE MANAGER, INCLUDING USER CONTROL AND STORAGE MANAGEMENT OF VIRTUAL MACHINES - A storage manager that interoperates with a file manager application that integrates with virtualization substantially enables end-user control and storage management of virtual machines (VMs). The storage manager may manage information management operations relative to virtual machines based on and/or in response to messages and/or instructions received from the file manager application. The storage manager may further report results to the file manager application for presentation to the user. The file manager application, which may operate as a plug-in for a legacy file manager executing on a user's client computing device, may comprise: displaying the VMs associated with the user, including their respective properties; enabling viewing/browsing of information about storage management operations for a VM such as backups and/or archiving, including files associated with the VM and searching and filtering criteria; control features that enable the user to control existing VMs, such as shut down, restart/activate/power-on, suspend, and/or re-configure, and also perform storage management of a VM and/or its associated files, such as create snapshot, back up, archive, restore VM from secondary storage, restore and overwrite VM, restore file(s)/folder(s) to user's client computing device, restore file(s)/folder(s) to a production VM in primary storage, etc.; control features that enable the user to provision additional VMs, such as create a new VM, create a clone VM, configure a VM, etc. | 03-12-2015 |
20150074536 | FILE MANAGER INTEGRATION WITH VIRTUALIZATION IN AN INFORMATION MANAGEMENT SYSTEM, INCLUDING USER CONTROL AND STORAGE MANAGEMENT OF VIRTUAL MACHINES - A file manager application that integrates with virtualization substantially enables end-user control and storage management of virtual machines (VMs). The file manager application, which may operate as a plug-in for a legacy file manager executing on a user's client computing device, may comprise: displaying the VMs associated with the user, including their respective properties; enabling viewing/browsing of information about storage management operations for a VM such as backups and/or archiving, including files associated with the VM and searching and filtering criteria; control features that enable the user to control existing VMs, such as shut down, restart/activate/power-on, suspend, and/or re-configure, and also perform storage management of a VM and/or its associated files, such as create snapshot, back up, archive, restore VM from secondary storage, restore and overwrite VM, restore file(s)/folder(s) to user's client computing device, restore file(s)/folder(s) to a production VM in primary storage, etc.; control features that enable the user to provision additional VMs, such as create a new VM, create a clone VM, configure a VM, etc. | 03-12-2015 |
20150095285 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA - The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents. | 04-02-2015 |
20150134924 | ARCHIVING DATA OBJECTS USING SECONDARY COPIES - A system for archiving data objects using secondary copies is disclosed. The system creates one or more secondary copies of primary copy data that contains multiple data objects. The system maintains a first data structure that tracks the data objects for which the system has created secondary copies and the locations of the secondary copies. To archive data objects in the primary copy data, the system identifies data objects to be archived, verifies that previously-created secondary copies of the identified data objects exist, and replaces the identified data objects with stubs. The system maintains a second data structure that both tracks the stubs and refers to the first data structure, thereby creating an association between the stubs and the locations of the secondary copies. | 05-14-2015 |
20150205682 | FAILOVER SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS - In certain embodiments, a tiered storage system is disclosed that provides for failover protection during data backup operations. The system can provide for an index, or catalog, for identifying and enabling restoration of backup data located on a storage device. The system further maintains a set of transaction logs generated by media agent modules that identify metadata with respect to individual data chunks of a backup file on the storage device. A copy of the catalog and transaction logs can be stored at a location accessible by each of the media agent modules. In this manner, in case of a failure of one media agent module during backup, the transaction logs and existing catalog can be used by a second media agent module to resume the backup operation without requiring a restart of the backup process. | 07-23-2015 |
20150205817 | SMART ARCHIVING AND DATA PREVIEWING FOR MOBILE DEVICES - Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request. | 07-23-2015 |
20150254254 | SEARCH FILTERED FILE SYSTEM USING SECONDARY STORAGE, INCLUDING MULTI-DIMENSIONAL INDEXING AND SEARCHING OF ARCHIVED FILES - Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files. | 09-10-2015 |