Patent application number | Description | Published |
20120017075 | REGISTRY KEY FEDERATION SYSTEMS AND METHODS - According to certain aspects, a method is disclosed for registry key management in a network. The method includes detecting registry keys stored in a registry of a plurality of client computing devices and storing on a remote database a copy of the registry keys. The remote database is in communication with each of the client computing devices. The method further includes tracking with a management module running on the client computing devices modifications made to the registry of the first client device. In addition, the method includes modifying the copy of the registry keys on the remote database to reflect the modifications to the registry of the first client computing device; detecting a rebuild operation of the first client computing device; and automatically reinstalling registry keys on the first client computing device based on the copy of the registry keys stored on the remote database. | 01-19-2012 |
20130145376 | DATA STORAGE RESOURCE ALLOCATION BY EMPLOYING DYNAMIC METHODS AND BLACKLISTING RESOURCE REQUEST POOLS - A resource allocation system begins with an ordered plan for matching requests to resources that is sorted by priority. The resource allocation system optimizes the plan by determining those requests in the plan that will fail if performed. The resource allocation system removes or defers the determined requests. In addition, when a request that is performed fails, the resource allocation system may remove requests that require similar resources from the plan. Moreover, when resources are released by a request, the resource allocation system may place the resources in a temporary holding area until the resource allocation returns to the top of the ordered plan so that lower priority requests that are lower in the plan do not take resources that are needed by waiting higher priority requests higher in the plan. | 06-06-2013 |
20130227352 | LOG MONITORING - A log monitoring system uses log monitoring rules to monitor log data generated by applications executing on a client computing device. By monitoring log data, the system detects that one or more triggering events have occurred on the client computing device. In response, the log monitoring system can perform one or more appropriate remedial actions. Additionally, in response to the detected event(s), the log monitoring system can extract a select subset of relevant data from the client and transmit the subset of data to a separate repository for storage and/or processing. | 08-29-2013 |
20130253977 | AUTOMATION OF DATA STORAGE ACTIVITIES - A system allows user to design data storage system workflows by selecting on a user interface various data objects associated with data storage system related activities. The activities include computer-executable instructions and can be predefined or determined by the user. Once the workflow is created, the workflow is deployed to one or more workflow engines that can execute the various data storage activities related to the workflow. Prior to executing a data storage activity, the system can determine which workflow engine to use based on an allocation scheme. | 09-26-2013 |
20130254402 | AUTOMATION OF DATA STORAGE ACTIVITIES - A system receives data storage workflow activities that include computer-executable instructions for carrying out data storage workflow in a network data storage system. Once the workflow is received, the system deploys the workflow to one or more workflow engines that can execute the various data storage activities related to the workflow. Prior to executing a data storage activity, the system can determine which workflow engine to use based on an allocation scheme. | 09-26-2013 |
20130262392 | INFORMATION MANAGEMENT OF MOBILE DEVICE DATA - A method and system for providing information management of mobile device data provides a user interface to permit a user of an information management system to define information management policies for the mobile device, receives definitions of the information management policies from the provided interface, and sends data from the mobile device to the information management system in accordance with the information management policies. In some examples, the system sends information identifying the user and the mobile device to the information management system, and/or sends the information management policies defined from the interface to the information management system. | 10-03-2013 |
20130290948 | REGISTRY KEY FEDERATION SYSTEMS AND METHODS - According to certain aspects, a method is disclosed for registry key management in a network. The method includes detecting registry keys stored in a registry of a plurality of client computing devices and storing on a remote database a copy of the registry keys. The remote database is in communication with each of the client computing devices. The method further includes tracking with a management module running on the client computing devices modifications made to the registry of the first client device. In addition, the method includes modifying the copy of the registry keys on the remote database to reflect the modifications to the registry of the first client computing device; detecting a rebuild operation of the first client computing device; and automatically reinstalling registry keys on the first client computing device based on the copy of the registry keys stored on the remote database. | 10-31-2013 |
20130332505 | INTELLIGENT SCHEDULING FOR REMOTE COMPUTERS - A method of protecting data on a mobile computing device using a storage network by deploying to the mobile computing device, a synchronization agent and then associating a synchronization policy with the synchronization agent. The mobile computing device is monitored for at least one threshold event. Its determined that the threshold event has occurred which causes a request to initiate a data synchronization event to be transmitted. The response to the request is synchronizing the mobile computing device with the storage network. | 12-12-2013 |
20140025796 | AUTOMATED GROUPING OF COMPUTING DEVICES IN A NETWORKED DATA STORAGE SYSTEM - According to certain aspects, systems and methods are provided for grouping clients together in a networked data storage environment. For instance, clients can be grouped together based on the software installed on the client or the client type. Each client group can be configured to maintain the configuration of clients within the client group. For example, one client group can be configured to ensure that a particular software suite remains up-to-date. Another client group can be configured to ensure that data within a particular directory or on a particular storage device associated with each client of the client group is backed up each night. | 01-23-2014 |
20140201137 | LOCATION-BASED DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 07-17-2014 |
20140201140 | DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 07-17-2014 |
20140201141 | REQUEST-BASED DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 07-17-2014 |
20140201142 | PARTIAL SHARING OF SECONDARY STORAGE FILES IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can allow users to share a portion of a file (e.g., a document) in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The data storage system according to certain aspects can also provide a native view of secondary storage data on a client computer. The index data and/or metadata relating to secondary storage data may be stored in native format (e.g., format of the application(s) that generated the secondary storage data) so that the secondary storage data can be displayed in a native view. The index data and/or metadata may be synchronized on the client without synchronizing the secondary storage data itself. | 07-17-2014 |
20140201144 | CRITERIA-BASED DATA SYNCHRONIZATION MANAGEMENT - In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface. | 07-17-2014 |
20140201154 | SHARING OF SECONDARY STORAGE DATA - An information management system according to certain aspects allows users to share a portion of a file (e.g., a document) stored in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The system according to certain aspects provides a native view of secondary storage data on a client computing device. The index data and/or metadata relating to secondary storage data may be stored in native application format for access via the native source application. | 07-17-2014 |
20140337285 | SYNCHRONIZATION OF LOCAL SECONDARY COPIES WITH A REMOTE STORAGE MANAGEMENT COMPONENT - According to certain aspects, an information management cell with failover management capability can include secondary storage computing devices configured to conduct primary data from a primary storage device(s) to a secondary storage device(s) during secondary copy operations, at the direction of a remote storage manager, wherein a first secondary storage computing device implements a failover storage manager configured to, in the event of a loss of connectivity between the cell and the remote storage manager: access a stored storage policy; initiate first and secondary copy operations according to the storage policy in which the first and second secondary storage computing devices are each involved in the creation of a first and second secondary copies; and subsequent to reestablishment of connectivity between the cell and the remote storage manager, transmit synchronization information associated with the secondary copy operations to the remote storage manager. | 11-13-2014 |
20140337662 | USE OF AUXILIARY DATA PROTECTION SOFTWARE IN FAILOVER OPERATIONS - According to certain aspects, an information management cell can include at least one secondary storage computing device configured to conduct primary data generated by at least one client computing device to a secondary storage device(s) as part of secondary copy operations, wherein the secondary storage computing device normally operates to conduct primary data to the secondary storage device(s) for storage as a secondary copy in a first secondary copy file format, at the direction of a main storage manager; and can include a failover storage manager configured to activate in response to loss of connectivity between the cell and the main storage manager, and instruct a secondary copy application to perform a secondary copy operation in which the primary data generated by the at least one client computing device is stored as a secondary copy in a second secondary copy file format different than the first secondary copy file format. | 11-13-2014 |
20140337663 | INFORMATION MANAGEMENT CELL WITH FAILOVER MANAGEMENT CAPABILITY - According to certain aspects, an information management cell with failover management capability can include secondary storage computing devices configured to conduct primary data from a primary storage device(s) to a secondary storage device(s) during secondary copy operations, at the direction of a remote storage manager, wherein a first secondary storage computing device implements a failover storage manager configured to, in the event of a loss of connectivity between the cell and the remote storage manager: access a stored storage policy; initiate a first secondary copy operation according to the storage policy in which the first secondary storage computing device is involved in the creation of a first secondary copy on the secondary storage device(s); and initiate a second secondary copy operation according to the storage policy in which a second secondary storage computing device is involved in the creation of a second secondary copy on the secondary storage device(s). | 11-13-2014 |
20140337664 | USE OF TEMPORARY SECONDARY COPIES IN FAILOVER OPERATIONS - According to certain aspects, an information management cell can include a failover storage manager configured to: instruct a secondary copy application to perform a secondary copy operation in which primary data generated by at least one client computing device is stored as a secondary copy in a second secondary copy file format different than a first secondary copy file format; and subsequent to reestablishment of connectivity to a main storage manager, restore the secondary copy stored in the second secondary copy file format to obtain restored data that is no longer in the second secondary copy file format; and can include at least one secondary storage computing device configured to, subsequent to the restore of the secondary copy, and at the direction of the main storage manager, conduct the restored data to a secondary storage device(s) to create a secondary copy in the first secondary copy file format. | 11-13-2014 |
20150089211 | SYSTEM AND METHOD FOR CLIENT POLICY ASSIGNMENT IN A DATA STORAGE SYSTEM - A system and method for property assignment in a data storage system is presented. A data storage system defines a client configuration profile comprising a set of storage operation properties, wherein the storage operation properties regulate criteria for performing storage operations by the data agent on client devices that are associated with the client configuration profile. A storage management system associates a first client device to the client configuration profile; and communicates the set of properties of the client configuration profile to property tables of corresponding objects in the first client device. | 03-26-2015 |