WO2000058865A1 - Automated file pruning - Google Patents

Automated file pruning Download PDF

Info

Publication number
WO2000058865A1
WO2000058865A1 PCT/IB2000/000188 IB0000188W WO0058865A1 WO 2000058865 A1 WO2000058865 A1 WO 2000058865A1 IB 0000188 W IB0000188 W IB 0000188W WO 0058865 A1 WO0058865 A1 WO 0058865A1
Authority
WO
WIPO (PCT)
Prior art keywords
lifetime
metadata
file
memory
data
Prior art date
Application number
PCT/IB2000/000188
Other languages
French (fr)
Inventor
Metin Feridun
Harry Rudin
Original Assignee
International Business Machines Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corporation filed Critical International Business Machines Corporation
Priority to JP2000608289A priority Critical patent/JP2002540530A/en
Priority to AU25671/00A priority patent/AU2567100A/en
Publication of WO2000058865A1 publication Critical patent/WO2000058865A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers

Definitions

  • the invention concerns a scheme for automated file pruning and an automated file pruning facility for use in computer systems and networks.
  • a typical computer system comprises a central processing unit, memory, peripheral devices such as data input/output devices and storage media such as floppy disks or hard disks.
  • the devices communicate with each other via a computer operating system.
  • Computer operating systems include several different operational modules.
  • One such module might be a file manager.
  • Client data stored on a storage medium is organized as a file system having an associated format, and the file manager is employed to maintain the available file systems and control access to them.
  • the file manager provides a set of system calls in the form of Application Programmer Interfaces (APIs) to allow clients access to the file system and files, to carry out operations such as file creation, deletion, opening for read or write, and so on.
  • APIs Application Programmer Interfaces
  • the file system stores, organizes and describes client data.
  • the client data is stored in files.
  • the files are arranged in each file system in a particular format.
  • Each file system maintains its organization and some sort of description information, herein referred to as metadata, in format specific structures. Examples of such formats are HFS, MS-DOS FAT, ProDOS, High Sierra, ISO 9660, NTFS, and so on.
  • the term format encompasses both physical disk format and network server access protocols.
  • the file manager To read and write data from and to the file system, the file manager must be able to recognize the format of the file system.
  • FIG. 1 is an illustration of an exemplary embodiment of the present invention.
  • element is herein used to describe an element of a database.
  • elements are: files (e.g., computer or machine readable files), partial information to be added to an existing file, an image from an image repository, for example, a multimedia object (e.g., an avi or mpeg movie).
  • databases are herein used to describe any collection, library, or repository of information, such as a file database, or an image repository. Examples of databases are a DOS or Windows file directory.
  • a database system is the system which houses the database. A database system and/or a database can be distributed.
  • An element content is herein referred to as data.
  • An element might for example comprise client data, data generated by an application program, computer code for execution by a processor, and so forth.
  • the elements are arranged in each database system in a particular format and each database system maintains its organization and some sort of description information, herein referred to as metadata, in format specific structures.
  • the metadata may contain the following exemplary information: file attributes, file name, date of creation, date of last revision, users with access permission, file size, file type (e.g., Lotus WordPro), etc.
  • the metadata can be kept in the same memory as the elements' data or they can be kept in a separate memory, e.g., a cache memory.
  • the metadata are like a card catalog that is found in the library, with the library being analogous to the database system.
  • a database system enables the user to store, manage, share and reuse information about the elements which are stored in it.
  • the repository enables the user to store more than just the elements' data.
  • the metadata stored in the database system may comprise information about the development of applications; including descriptions of data, programs and system objects. It may also include information about relationships among data, programs and system objects; as well as the semantics and use of the information.
  • the basic idea of the present scheme is to provide an automated file pruning facility which automatically removes elements (e.g. files) no longer needed from a database system.
  • elements e.g. files
  • File Generation During file generation, e.g. when creating a file or adding a file to a database, a field is added to the file's metadata (e.g. to the file descriptor). This new field, which specifies the lifetime of the file, has to be initially set at the time a new file is generated or before the file is stored in the file database.
  • File Representation or Marking When a file 21 is first created the user has to select a lifetime (step 12). This can be done by asking the user to accept a default file lifetime, to specify a specific file lifetime, or to declare the file as "permanent", as illustrated in box 16. Likewise, the user might also be prompted by the system to categorize the file 21 using a predefined categorization scheme (box 11). If the file 21 is categorized in a group of "legal documents”, the default lifetime used for all legal documents (e.g. 20 years from data of creation) is assigned to the respective file 21. If the user categorizes the file 21 into a directory with private documents, a shorter period might be assigned, just to give an example.
  • the lifetime can be defined by a user or an application program. Information concerning record retention rules might be provided to the user prior to defining the lifetime of a particular file.
  • File Disposal When the file lifetime limit is reached, the file 19 will be erased, as indicated on the right hand side of Figure 1. This could be done by code scanning file descriptions in search for files which have reached their end-of-life (step 13). This code be run automatically at a specified frequency. An optional feature could be employed that asks the user to approve the list of files to be erased.
  • the metadata are examined from time-to-time to determine whether the lifetime of an element expired such that an element can be removed from said memory if its lifetime expired. Likewise, a user can be prompted if the lifetime of an element is about to expire or after it expired but before it is deleted by the system. In this case, the user has the option to chose whether the element is to be removed from said memory, or whether to change the element's lifetime.
  • the normal class "file” can be extended (e.g., through the inheritance mechanism in object-oriented programming) to a new class.
  • This new class can be called “limited lifetime” class for example.
  • the "limited lifetime” class comprises all those files which the user would like to have automatically removed at a later date.
  • the user would be asked to accept a default lifetime or to specify a particular file lifetime. Together, the current date and the lifetime specify akill time for the file at which time it can be deleted.
  • the file is created, it is registered with the database or file manager as a "limited lifetime” type. The database or file manager will periodically scan its list of files with the type of "limited lifetime” and remove any whose kill time had expired.
  • FIG. 1 shows a schematic representation of a file system 20 with several files. It furthermore shows a sequence of steps 15 for adding a new file 21, and a process for pruning (step 13) of the file system 20. According to the present embodiment, there are three steps that are carried out if a new file 21 is needed (step 14). A lifetime has to be selected (step 12), according to the present invention. Three options (box 11, box 16, and box 17) are offered for selection of the lifetime.
  • each container has a preassigned lifetime.
  • the user wants to create a new file 21 that contains legal information, or that belongs in the legal category, he selects the respective legal container during step 12.
  • the container can be selected by clicking on it (if a graphical user interface is employed), by using hot keys, or the like. By doing so the legal container's preassigned lifetime is assigned to the new file 21.
  • a different approach for selection of the lifetime is illustrated in box 16.
  • the user may select a file, a file icon, or use an application program to create a new file 21.
  • he is presented with a dialogue to accept a default lifetime, specify a specific file lifetime, or to declare this file as permanent. This can be done by using appropriate icons, hot keys, or other well known means.
  • box 11 and 16 are well suited for systems which help the user to observe record retention rules.
  • the approach of box 1 1 is particularly well suited because the user does not need to worry about record retention rules at all. He just needs to put his newly created files in the right category. The rest is done by the system.
  • box 17 Another alternative is illustrated in box 17 where the system call to create a file 21 is extended to include the specification of the desired lifetime for the file 21. This can be done through the application programming interface (API).
  • API application programming interface
  • the actual file is created (step 10) and the lifetime is stored in the file's metadata. It is obvious that the sequence of steps can be changed. It is conceivable, for example, that a file 21 is created if needed by using an application software (e.g. a text processing software). When saving the newly created file to disk, or when adding it to the file system 20, the user may be asked to select a lifetime.
  • an application software e.g. a text processing software
  • the file system is automatically pruned. This pruning process is indicated by box 13. If during the pruning process a file 19 is discovered whose lifetime expired, then the respective file is discarded. As a optional safety net, the user might be prompted prior to this. Instead of prompting the user, all the files that are about to be deleted can be put in a waste basket. Here the files remain for a certain period of time. This gives the user an opportunity to intervene. If he does not remove the files from the waste basket, then the files are finally deleted.
  • a system in accordance with the present invention can also offer a feature which allows the user to act upon an element (e.g. a file) that is stored in a database (e.g. a file system).
  • an element e.g. a file
  • a database e.g. a file system
  • the metadata of the respective element is fetched and displayed. Then, the user can act upon the element.
  • Typical actions are: accessing, retrieving, opening, displaying, moving, or copying the element.
  • the user can also changing the element's lifetime or he can link the lifetime with the lifetime of another element.
  • the linking can be done by a drag-and-drop operation where the element is moved into a container with a desired preassigned lifetime, for example.
  • the present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited.
  • a typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
  • the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which - when loaded in a computer system - is able to carry out these methods.
  • the present invention can also be used in systems with parallel data sharing access to files residing on network attached shared disks.
  • a special viewer can be used to review the lifetime of the files in a database.
  • the viewer might offer a tool that organizes the files on a screen or within a window by their lifetime, for example.
  • the viewer can be used to act upon the files and/or their lifetimes. Let us assume that one company decides to take legal action against another company. In such a situation all the documents that are of relevance are to be produced. It is important to avoid that these documents are deleted. All relevant documents can thus be displayed by the viewer and the user can act upon them. He might for example assign a new lifetime to each such document to ensure that the are kept for another five years.

Abstract

Scheme for adding an element (21) to a database system (20) which comprises a memory with limited storage capacity. The element (21) comprises data and metadata. An individual lifetime is defined for the element (21) in the metadata, and then the data and said metadata are stored in the memory. The metadata are examined from time-to-time to determine whether the lifetime of an element expired. If this is the case the respective element (19) is automatically removed.

Description

AUTOMATED FILE PRUNING
TECHNICAL FIELD
The invention concerns a scheme for automated file pruning and an automated file pruning facility for use in computer systems and networks.
BACKGROUND OF THE INVENTION
A typical computer system comprises a central processing unit, memory, peripheral devices such as data input/output devices and storage media such as floppy disks or hard disks. The devices communicate with each other via a computer operating system. Computer operating systems include several different operational modules. One such module might be a file manager. Client data stored on a storage medium is organized as a file system having an associated format, and the file manager is employed to maintain the available file systems and control access to them. The file manager provides a set of system calls in the form of Application Programmer Interfaces (APIs) to allow clients access to the file system and files, to carry out operations such as file creation, deletion, opening for read or write, and so on.
The file system stores, organizes and describes client data. The client data is stored in files. The files are arranged in each file system in a particular format. Each file system maintains its organization and some sort of description information, herein referred to as metadata, in format specific structures. Examples of such formats are HFS, MS-DOS FAT, ProDOS, High Sierra, ISO 9660, NTFS, and so on. The term format encompasses both physical disk format and network server access protocols.
To read and write data from and to the file system, the file manager must be able to recognize the format of the file system.
It is a well known disadvantage of current file systems that as the number of files increases the handling becomes more and more difficult. Fast access or retrieval and a clear overview of the whole file system are crucial for its daily use.
Despite the growing capacity of hard disks, the memory of a computer system remains in short demand, specially in light of increasing use of applications that require larger amounts of storage, such as multimedia applications. The presence of too many files not only consumes unnecessary memory capacity but - because of the time it takes to find and access the files stored - substantially worsens system performance in terms of response time.
Each computer user has a huge variety of different kinds of files. In current file systems all these files are treated the same. If the computer system is used in a commercial environment, there are usually so-called record retention rules which define the different kinds of documents, where and how they have to be stored in memory, and - most important - how long the respective documents have to be archived. Current file systems do not support a user in adhering to such record retention rules.
Pruning facilities exist for removing files which have exceeded a common age but these are uniformly applied over the entire file system. For example, in a UNIX system, optional, periodically running software can be programmed to remove files in a list of folders (or directories) which are older than a set number of days. It is a disadvantage of such a global approach that all files are treated the same, no matter how important they are. Furthermore, systematic removal of files as described above is not a mandatory part of the operating system but a local customized option: with the increase use of unadministered personal workstations or laptops, the growth of files and the subsequent disk memory requirements can be substantial.
It is an object of the present invention to provide a scheme which makes efficient use of the limited memory resources of a computer system.
It is an object of the present invention to provide a scheme which allows archiving of files according to predefined rules, such as record retention rules, for example.
SUMMARY OF THE INVENTION
The objectives of the present invention have been accomplished by the method, computer program products, computer program elements, and system as claimed.
Advantages of the present invention are addressed in connection with the detailed description or are apparent from the description.
DESCRIPTION OF THE DRAWINGS
The invention is described in detail below with reference to the following schematic drawings. FIG. 1 is an illustration of an exemplary embodiment of the present invention.
DESCRIPTION OF PREFERRED EMBODIMENTS
In the following, the basic concept of the present invention is described. Before addressing different embodiments, the relevant terms and expressions are defined and explained.
The expression "element" is herein used to describe an element of a database. Examples of elements are: files (e.g., computer or machine readable files), partial information to be added to an existing file, an image from an image repository, for example, a multimedia object (e.g., an avi or mpeg movie).
The word "database" is herein used to describe any collection, library, or repository of information, such as a file database, or an image repository. Examples of databases are a DOS or Windows file directory. A database system is the system which houses the database. A database system and/or a database can be distributed.
An element content is herein referred to as data. An element might for example comprise client data, data generated by an application program, computer code for execution by a processor, and so forth. The elements are arranged in each database system in a particular format and each database system maintains its organization and some sort of description information, herein referred to as metadata, in format specific structures. The metadata may contain the following exemplary information: file attributes, file name, date of creation, date of last revision, users with access permission, file size, file type (e.g., Lotus WordPro), etc. The metadata can be kept in the same memory as the elements' data or they can be kept in a separate memory, e.g., a cache memory. The metadata are like a card catalog that is found in the library, with the library being analogous to the database system.
In general, a database system enables the user to store, manage, share and reuse information about the elements which are stored in it. The repository enables the user to store more than just the elements' data. For example, the metadata stored in the database system may comprise information about the development of applications; including descriptions of data, programs and system objects. It may also include information about relationships among data, programs and system objects; as well as the semantics and use of the information.
The basic idea of the present scheme is to provide an automated file pruning facility which automatically removes elements (e.g. files) no longer needed from a database system. There are three main components: one for element (file) generation, one for element (file) representation, and one for element (file) disposal. These three components are described in connection with a file database comprising files.
File Generation: During file generation, e.g. when creating a file or adding a file to a database, a field is added to the file's metadata (e.g. to the file descriptor). This new field, which specifies the lifetime of the file, has to be initially set at the time a new file is generated or before the file is stored in the file database.
When creating a file 21 (steps 14, 12, and 10 in Figure 1) or adding a file 21 to a database 20 which comprises a memory with limited storage capacity, an individual lifetime is defined in the metadata (step 12) of this element. Then, the element's data and its metadata are stored in the memory. Note that an individual lifetime is assigned to each element.
File Representation or Marking: When a file 21 is first created the user has to select a lifetime (step 12). This can be done by asking the user to accept a default file lifetime, to specify a specific file lifetime, or to declare the file as "permanent", as illustrated in box 16. Likewise, the user might also be prompted by the system to categorize the file 21 using a predefined categorization scheme (box 11). If the file 21 is categorized in a group of "legal documents", the default lifetime used for all legal documents (e.g. 20 years from data of creation) is assigned to the respective file 21. If the user categorizes the file 21 into a directory with private documents, a shorter period might be assigned, just to give an example.
Another alternative which is addressed later is illustrated in box 17 of Figure 1.
The lifetime can be defined by a user or an application program. Information concerning record retention rules might be provided to the user prior to defining the lifetime of a particular file.
File Disposal: When the file lifetime limit is reached, the file 19 will be erased, as indicated on the right hand side of Figure 1. This could be done by code scanning file descriptions in search for files which have reached their end-of-life (step 13). This code be run automatically at a specified frequency. An optional feature could be employed that asks the user to approve the list of files to be erased.
The metadata are examined from time-to-time to determine whether the lifetime of an element expired such that an element can be removed from said memory if its lifetime expired. Likewise, a user can be prompted if the lifetime of an element is about to expire or after it expired but before it is deleted by the system. In this case, the user has the option to chose whether the element is to be removed from said memory, or whether to change the element's lifetime.
Implementation: In the following a first embodiment is given. This embodiment is based on an object-oriented framework.
In a file database system using an object-oriented approach where each file is represented as an object class, the normal class "file" can be extended (e.g., through the inheritance mechanism in object-oriented programming) to a new class. This new class can be called "limited lifetime" class for example. The "limited lifetime" class comprises all those files which the user would like to have automatically removed at a later date. When a file of type "limited lifetime" is generated, the user would be asked to accept a default lifetime or to specify a particular file lifetime. Together, the current date and the lifetime specify akill time for the file at which time it can be deleted. When the file is created, it is registered with the database or file manager as a "limited lifetime" type. The database or file manager will periodically scan its list of files with the type of "limited lifetime" and remove any whose kill time had expired.
Another embodiment is described in connection with Figure 1. This Figure shows a schematic representation of a file system 20 with several files. It furthermore shows a sequence of steps 15 for adding a new file 21, and a process for pruning (step 13) of the file system 20. According to the present embodiment, there are three steps that are carried out if a new file 21 is needed (step 14). A lifetime has to be selected (step 12), according to the present invention. Three options (box 11, box 16, and box 17) are offered for selection of the lifetime.
As indicated in box 11, there is a pool of file containers (e.g. represented by icons on a display). Each container has a preassigned lifetime. There might be a legal container that has a lifetime of 20 years, a temporary container with a lifetime of 10 days, and an accounting container with a lifetime of 10 years, for example. If the user wants to create a new file 21 that contains legal information, or that belongs in the legal category, he selects the respective legal container during step 12. The container can be selected by clicking on it (if a graphical user interface is employed), by using hot keys, or the like. By doing so the legal container's preassigned lifetime is assigned to the new file 21.
A different approach for selection of the lifetime is illustrated in box 16. The user may select a file, a file icon, or use an application program to create a new file 21. In this context he is presented with a dialogue to accept a default lifetime, specify a specific file lifetime, or to declare this file as permanent. This can be done by using appropriate icons, hot keys, or other well known means.
The processes depicted in boxes 11 and 16 are well suited for systems which help the user to observe record retention rules. The approach of box 1 1 is particularly well suited because the user does not need to worry about record retention rules at all. He just needs to put his newly created files in the right category. The rest is done by the system. Another alternative is illustrated in box 17 where the system call to create a file 21 is extended to include the specification of the desired lifetime for the file 21. This can be done through the application programming interface (API).
Once the lifetime is selected, the actual file is created (step 10) and the lifetime is stored in the file's metadata. It is obvious that the sequence of steps can be changed. It is conceivable, for example, that a file 21 is created if needed by using an application software (e.g. a text processing software). When saving the newly created file to disk, or when adding it to the file system 20, the user may be asked to select a lifetime.
From time-to-time, either on a regular basis or at random intervals, the file system is automatically pruned. This pruning process is indicated by box 13. If during the pruning process a file 19 is discovered whose lifetime expired, then the respective file is discarded. As a optional safety net, the user might be prompted prior to this. Instead of prompting the user, all the files that are about to be deleted can be put in a waste basket. Here the files remain for a certain period of time. This gives the user an opportunity to intervene. If he does not remove the files from the waste basket, then the files are finally deleted.
A system in accordance with the present invention can also offer a feature which allows the user to act upon an element (e.g. a file) that is stored in a database (e.g. a file system). For this purpose the metadata of the respective element is fetched and displayed. Then, the user can act upon the element. Typical actions are: accessing, retrieving, opening, displaying, moving, or copying the element. The user can also changing the element's lifetime or he can link the lifetime with the lifetime of another element. The linking can be done by a drag-and-drop operation where the element is moved into a container with a desired preassigned lifetime, for example.
The present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which - when loaded in a computer system - is able to carry out these methods.
The present invention can also be used in systems with parallel data sharing access to files residing on network attached shared disks.
A special viewer can be used to review the lifetime of the files in a database. The viewer might offer a tool that organizes the files on a screen or within a window by their lifetime, for example. The viewer can be used to act upon the files and/or their lifetimes. Let us assume that one company decides to take legal action against another company. In such a situation all the documents that are of relevance are to be produced. It is important to avoid that these documents are deleted. All relevant documents can thus be displayed by the viewer and the user can act upon them. He might for example assign a new lifetime to each such document to ensure that the are kept for another five years.

Claims

1. Method for adding an element (21 ) to a database system (20) comprising a memory with limited storage capacity, whereby said element (21) comprises data and metadata, comprising the steps:
• defining an individual lifetime for said element (21) in said metadata,
• storing said data and said metadata in said memory.
2. The method of claim 1, whereby said metadata are examined from time-to-time to determine whether said lifetime of an element expired.
3. The method of claim 2, whereby an element (19) is removed from said memory if its lifetime expired .
4. The method of claim 2, whereby a user is prompted if said lifetime of an element is about to expire or expired.
5. The method of claim 4, whereby said user can chose whether said element is to be removed from said memory, or whether to change said element's lifetime.
6. The method of claim 1, whereby said lifetime is defined using a default setting.
7. The method of claim 6, whereby said default setting depends on the element type, or the data of said element.
8. The method of claim 1, whereby said lifetime is defined by a user or an application program.
9. The method of claim 8, whereby information concerning record retention rules is provided if said user defines said lifetime.
10. The method of claim 1, whereby said element is a file (21) and said database system is as file repository or file directory. - lO - l l. The method of claim 1, whereby said individual lifetime for said element is defined by displaying a selection of element containers, each container with a preassigned lifetime, such that the individual lifetime can be selected by selecting one of said containers.
12. Method for acting upon an element (21) comprising data and metadata kept in a database system's memory (20) with limited storage capacity whereby said metadata comprises a lifetime for said element (21), comprising the steps:
• fetching said metadata,
• displaying said lifetime for said element, and
• acting upon said element (21).
13. The method of claim 12, whereby acting upon said element refers to one of the following actions: accessing said element, retrieving said element, opening said element, displaying said element, moving said element, or copying said element.
14. The method of claim 12, whereby acting upon said element refers to one of the following actions: changing said lifetime, or linking said lifetime with the lifetime of another element.
15. The method of claim 12, whereby said element is acted upon by changing its lifetime.
16. The method of claim 15, whereby said lifetime is changed by moving said element into a container with a desired preassigned lifetime.
17. A computer program product comprising a computer readable medium, having thereon:
computer program code means, when said program is loaded, for adding a new element
(21) to a database system (20) which comprises a memory with limited storage, capacity, said database system (20) containing multiple elements which comprise data and metadata, execute procedure to
define an individual lifetime in the metadata of the new element (21), • store the data and metadata of said new element (21) in said memory.
18. A computer program element comprising :
computer program code means for adding a new element (21 ) to a database system (20) which comprises a memory with limited storage, capacity, said database system (20) containing multiple elements which comprise data and metadata, execute procedure to
• define an individual lifetime in the metadata of the new element (21),
• store the data and metadata of said new element in said memory.
19. The computer program product of claim 17, or the computer program element of claim 18, wherein said metadata are examined from time-to-time to determine whether said lifetime of an element expired.
20. The computer program product of claim 17, or the computer program element of claim 18, wherein an element is removed from said memory if its lifetime expired.
PCT/IB2000/000188 1999-03-31 2000-02-22 Automated file pruning WO2000058865A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2000608289A JP2002540530A (en) 1999-03-31 2000-02-22 Automatic file pruning
AU25671/00A AU2567100A (en) 1999-03-31 2000-02-22 Automated file pruning

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP99106610.1 1999-03-31
EP99106610 1999-03-31

Publications (1)

Publication Number Publication Date
WO2000058865A1 true WO2000058865A1 (en) 2000-10-05

Family

ID=8237899

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2000/000188 WO2000058865A1 (en) 1999-03-31 2000-02-22 Automated file pruning

Country Status (5)

Country Link
JP (1) JP2002540530A (en)
AU (1) AU2567100A (en)
HU (1) HUP0200614A2 (en)
TW (1) TW460812B (en)
WO (1) WO2000058865A1 (en)

Cited By (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2369695A (en) * 2000-11-30 2002-06-05 Indigo One Technologies Ltd Index tree structure and key composition for a database
EP1402435A2 (en) * 2001-03-08 2004-03-31 Richard M. Adler System and method for modeling and analyzing strategic business decisions
EP1442387A1 (en) * 2001-09-28 2004-08-04 Commvault Systems, Inc. System and method for archiving objects in an information store
EP1699008A1 (en) * 2005-03-04 2006-09-06 Microsoft Corporation Method and computer-readable medium for formula-based document retention
US7107416B2 (en) 2003-09-08 2006-09-12 International Business Machines Corporation Method, system, and program for implementing retention policies to archive records
US7117322B2 (en) 2003-09-08 2006-10-03 International Business Machines Corporation Method, system, and program for retention management and protection of stored objects
US7146388B2 (en) 2003-10-07 2006-12-05 International Business Machines Corporation Method, system, and program for archiving files
WO2008015198A1 (en) * 2006-08-01 2008-02-07 International Business Machines Corporation Efficient non-database file-expiration management for document retention
GB2501070A (en) * 2012-04-05 2013-10-16 Appsense Ltd Metadata defining an action to be performed by a computer system
US8782009B2 (en) * 1999-05-18 2014-07-15 Kom Networks Inc. Method and system for electronic file lifecycle management
US8849762B2 (en) 2011-03-31 2014-09-30 Commvault Systems, Inc. Restoring computing environments, such as autorecovery of file systems at certain points in time
US8930319B2 (en) 1999-07-14 2015-01-06 Commvault Systems, Inc. Modular backup and retrieval system used in conjunction with a storage area network
US9003137B2 (en) 2000-01-31 2015-04-07 Commvault Systems, Inc. Interface systems and methods for accessing stored data
US9003117B2 (en) 2003-06-25 2015-04-07 Commvault Systems, Inc. Hierarchical systems and methods for performing storage operations in a computer network
US9021198B1 (en) 2011-01-20 2015-04-28 Commvault Systems, Inc. System and method for sharing SAN storage
US9104340B2 (en) 2003-11-13 2015-08-11 Commvault Systems, Inc. Systems and methods for performing storage operations using network attached storage
US9128883B2 (en) 2008-06-19 2015-09-08 Commvault Systems, Inc Data storage resource allocation by performing abbreviated resource checks based on relative chances of failure of the data storage resources to determine whether data storage requests would fail
US20160004850A1 (en) * 2014-07-02 2016-01-07 Aswin Kumar Jayaraman Secure download from internet marketplace
US9262226B2 (en) 2008-06-19 2016-02-16 Commvault Systems, Inc. Data storage resource allocation by employing dynamic methods and blacklisting resource request pools
US9274803B2 (en) 2000-01-31 2016-03-01 Commvault Systems, Inc. Storage of application specific profiles correlating to document versions
US9286398B2 (en) 2000-01-31 2016-03-15 Commvault Systems, Inc. Systems and methods for retrieving data in a computer network
US9361243B2 (en) 1998-07-31 2016-06-07 Kom Networks Inc. Method and system for providing restricted access to a storage medium
US9444811B2 (en) 2014-10-21 2016-09-13 Commvault Systems, Inc. Using an enhanced data agent to restore backed up data across autonomous storage management systems
US9459968B2 (en) 2013-03-11 2016-10-04 Commvault Systems, Inc. Single index to query multiple backup formats
US9633216B2 (en) 2012-12-27 2017-04-25 Commvault Systems, Inc. Application of information management policies based on operation with a geographic entity
US9648100B2 (en) 2014-03-05 2017-05-09 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US9740574B2 (en) 2014-05-09 2017-08-22 Commvault Systems, Inc. Load balancing across multiple data paths
US9766825B2 (en) 2015-07-22 2017-09-19 Commvault Systems, Inc. Browse and restore for block-level backups
US9823978B2 (en) 2014-04-16 2017-11-21 Commvault Systems, Inc. User-level quota management of data objects stored in information management systems
US10157184B2 (en) 2012-03-30 2018-12-18 Commvault Systems, Inc. Data previewing before recalling large data files
US10169121B2 (en) 2014-02-27 2019-01-01 Commvault Systems, Inc. Work flow management for an information management system
US10198324B2 (en) 2008-06-18 2019-02-05 Commvault Systems, Inc. Data protection scheduling, such as providing a flexible backup window in a data protection system
US10459882B2 (en) 2008-09-05 2019-10-29 Commvault Systems, Inc. Image level copy or restore, such as image level restore without knowledge of data object metadata
US10476663B1 (en) 2017-01-09 2019-11-12 Amazon Technologies, Inc. Layered encryption of short-lived data
US10572445B2 (en) 2008-09-12 2020-02-25 Commvault Systems, Inc. Transferring or migrating portions of data objects, such as block-level data migration or chunk-based data migration
US10608813B1 (en) 2017-01-09 2020-03-31 Amazon Technologies, Inc. Layered encryption for long-lived data
US10776329B2 (en) 2017-03-28 2020-09-15 Commvault Systems, Inc. Migration of a database management system to cloud storage
US10789387B2 (en) 2018-03-13 2020-09-29 Commvault Systems, Inc. Graphical representation of an information management system
US10795927B2 (en) 2018-02-05 2020-10-06 Commvault Systems, Inc. On-demand metadata extraction of clinical image data
US10838821B2 (en) 2017-02-08 2020-11-17 Commvault Systems, Inc. Migrating content and metadata from a backup system
US10891069B2 (en) 2017-03-27 2021-01-12 Commvault Systems, Inc. Creating local copies of data stored in online data repositories
US11074140B2 (en) 2017-03-29 2021-07-27 Commvault Systems, Inc. Live browsing of granular mailbox data
US11249858B2 (en) 2014-08-06 2022-02-15 Commvault Systems, Inc. Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host
US11294768B2 (en) 2017-06-14 2022-04-05 Commvault Systems, Inc. Live browsing of backed up data residing on cloned disks
US11308034B2 (en) 2019-06-27 2022-04-19 Commvault Systems, Inc. Continuously run log backup with minimal configuration and resource usage from the source machine
US11321195B2 (en) 2017-02-27 2022-05-03 Commvault Systems, Inc. Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount
US11356254B1 (en) * 2017-01-09 2022-06-07 Amazon Technologies, Inc. Encryption using indexed data from large data pads
US11416341B2 (en) 2014-08-06 2022-08-16 Commvault Systems, Inc. Systems and methods to reduce application downtime during a restore operation using a pseudo-storage device
US11436038B2 (en) 2016-03-09 2022-09-06 Commvault Systems, Inc. Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block- level pseudo-mount)
US11573866B2 (en) 2018-12-10 2023-02-07 Commvault Systems, Inc. Evaluation and reporting of recovery readiness in a data storage management system
US11971784B2 (en) 2021-12-29 2024-04-30 Commvault Systems, Inc. Recovery Point Objective (RPO) driven backup scheduling in a data storage management system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0323025A2 (en) * 1987-12-23 1989-07-05 International Business Machines Corporation A method of assigning retention and deletion criteria to electronic documents stored in an electronic information handling system
US5689699A (en) * 1992-12-23 1997-11-18 International Business Machines Corporation Dynamic verification of authorization in retention management schemes for data processing systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0323025A2 (en) * 1987-12-23 1989-07-05 International Business Machines Corporation A method of assigning retention and deletion criteria to electronic documents stored in an electronic information handling system
US5689699A (en) * 1992-12-23 1997-11-18 International Business Machines Corporation Dynamic verification of authorization in retention management schemes for data processing systems

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Deletion Confirmation for Hierarchical/ Related Entities.", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 34, no. 8, 1 January 1992 (1992-01-01), New York, US, pages 376 - 377, XP002135154 *
ANONYMOUS: "Generic Cascade Menu to Create New Object Instances", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 37, no. 9, 1 September 1994 (1994-09-01), New York, US, pages 347 - 350, XP002135155 *
SHARICK P: "Expiration dates and retention periods. Keeping your disks clean", VAX PROFESSIONAL, JUNE 1988, USA, vol. 10, no. 3, pages 15 - 17, XP000885698, ISSN: 8750-9628 *

Cited By (109)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9881013B2 (en) 1998-07-31 2018-01-30 Kom Software Inc. Method and system for providing restricted access to a storage medium
US9361243B2 (en) 1998-07-31 2016-06-07 Kom Networks Inc. Method and system for providing restricted access to a storage medium
US20140330800A1 (en) * 1999-05-18 2014-11-06 Kom Networks Inc. Method and system for electronic file lifecycle management
US8782009B2 (en) * 1999-05-18 2014-07-15 Kom Networks Inc. Method and system for electronic file lifecycle management
US8930319B2 (en) 1999-07-14 2015-01-06 Commvault Systems, Inc. Modular backup and retrieval system used in conjunction with a storage area network
US9286398B2 (en) 2000-01-31 2016-03-15 Commvault Systems, Inc. Systems and methods for retrieving data in a computer network
US9003137B2 (en) 2000-01-31 2015-04-07 Commvault Systems, Inc. Interface systems and methods for accessing stored data
US9274803B2 (en) 2000-01-31 2016-03-01 Commvault Systems, Inc. Storage of application specific profiles correlating to document versions
GB2406678B (en) * 2000-11-30 2005-05-18 Coppereye Ltd Database
GB2369695A (en) * 2000-11-30 2002-06-05 Indigo One Technologies Ltd Index tree structure and key composition for a database
GB2406678A (en) * 2000-11-30 2005-04-06 Coppereye Ltd Index tree structure and key composition for a database
GB2369695B (en) * 2000-11-30 2005-03-16 Indigo One Technologies Ltd Database
US8224829B2 (en) 2000-11-30 2012-07-17 Bernard Consulting Limited Database
EP1402435A4 (en) * 2001-03-08 2007-04-25 Richard M Adler System and method for modeling and analyzing strategic business decisions
EP1402435A2 (en) * 2001-03-08 2004-03-31 Richard M. Adler System and method for modeling and analyzing strategic business decisions
US9164850B2 (en) 2001-09-28 2015-10-20 Commvault Systems, Inc. System and method for archiving objects in an information store
US7472142B2 (en) 2001-09-28 2008-12-30 Commvault Systems, Inc. System and method for archiving objects in an information store
EP1442387A4 (en) * 2001-09-28 2008-01-23 Commvault Systems Inc System and method for archiving objects in an information store
US8055627B2 (en) 2001-09-28 2011-11-08 Commvault Systems, Inc. System and method for archiving objects in an information store
EP1442387A1 (en) * 2001-09-28 2004-08-04 Commvault Systems, Inc. System and method for archiving objects in an information store
US9003117B2 (en) 2003-06-25 2015-04-07 Commvault Systems, Inc. Hierarchical systems and methods for performing storage operations in a computer network
US7600086B2 (en) 2003-09-08 2009-10-06 International Business Machines Corporation Method, system, and program for retention management and protection of stored objects
US8281087B2 (en) 2003-09-08 2012-10-02 Google Inc. Method, system, and program implementing retention policies to archive records
US7117322B2 (en) 2003-09-08 2006-10-03 International Business Machines Corporation Method, system, and program for retention management and protection of stored objects
US7107416B2 (en) 2003-09-08 2006-09-12 International Business Machines Corporation Method, system, and program for implementing retention policies to archive records
US7765177B2 (en) 2003-10-07 2010-07-27 International Business Machines Corporation Method, system and program for archiving files
US8041698B2 (en) 2003-10-07 2011-10-18 International Business Machines Corporation Method, system and program for archiving files
US8700576B2 (en) 2003-10-07 2014-04-15 Google Inc. Method, system, and program for archiving files
US7146388B2 (en) 2003-10-07 2006-12-05 International Business Machines Corporation Method, system, and program for archiving files
US9104340B2 (en) 2003-11-13 2015-08-11 Commvault Systems, Inc. Systems and methods for performing storage operations using network attached storage
US7801863B2 (en) 2005-03-04 2010-09-21 Microsoft Corporation Method and computer-readable medium for formula-based document retention
EP1699008A1 (en) * 2005-03-04 2006-09-06 Microsoft Corporation Method and computer-readable medium for formula-based document retention
WO2008015198A1 (en) * 2006-08-01 2008-02-07 International Business Machines Corporation Efficient non-database file-expiration management for document retention
US9984080B2 (en) 2006-08-01 2018-05-29 International Business Machines Corporation Efficient non-database file-expiration management for document retention
US10198324B2 (en) 2008-06-18 2019-02-05 Commvault Systems, Inc. Data protection scheduling, such as providing a flexible backup window in a data protection system
US11321181B2 (en) 2008-06-18 2022-05-03 Commvault Systems, Inc. Data protection scheduling, such as providing a flexible backup window in a data protection system
US10768987B2 (en) 2008-06-19 2020-09-08 Commvault Systems, Inc. Data storage resource allocation list updating for data storage operations
US10162677B2 (en) 2008-06-19 2018-12-25 Commvault Systems, Inc. Data storage resource allocation list updating for data storage operations
US9128883B2 (en) 2008-06-19 2015-09-08 Commvault Systems, Inc Data storage resource allocation by performing abbreviated resource checks based on relative chances of failure of the data storage resources to determine whether data storage requests would fail
US9823979B2 (en) 2008-06-19 2017-11-21 Commvault Systems, Inc. Updating a list of data storage requests if an abbreviated resource check determines that a request in the list would fail if attempted
US10789133B2 (en) 2008-06-19 2020-09-29 Commvault Systems, Inc. Data storage resource allocation by performing abbreviated resource checks of certain data storage resources based on relative scarcity to determine whether data storage requests would fail
US9262226B2 (en) 2008-06-19 2016-02-16 Commvault Systems, Inc. Data storage resource allocation by employing dynamic methods and blacklisting resource request pools
US9612916B2 (en) 2008-06-19 2017-04-04 Commvault Systems, Inc. Data storage resource allocation using blacklisting of data storage requests classified in the same category as a data storage request that is determined to fail if attempted
US10613942B2 (en) 2008-06-19 2020-04-07 Commvault Systems, Inc. Data storage resource allocation using blacklisting of data storage requests classified in the same category as a data storage request that is determined to fail if attempted
US9639400B2 (en) 2008-06-19 2017-05-02 Commvault Systems, Inc. Data storage resource allocation by employing dynamic methods and blacklisting resource request pools
US10459882B2 (en) 2008-09-05 2019-10-29 Commvault Systems, Inc. Image level copy or restore, such as image level restore without knowledge of data object metadata
US11392542B2 (en) 2008-09-05 2022-07-19 Commvault Systems, Inc. Image level copy or restore, such as image level restore without knowledge of data object metadata
US10572445B2 (en) 2008-09-12 2020-02-25 Commvault Systems, Inc. Transferring or migrating portions of data objects, such as block-level data migration or chunk-based data migration
US9021198B1 (en) 2011-01-20 2015-04-28 Commvault Systems, Inc. System and method for sharing SAN storage
US9578101B2 (en) 2011-01-20 2017-02-21 Commvault Systems, Inc. System and method for sharing san storage
US11228647B2 (en) 2011-01-20 2022-01-18 Commvault Systems, Inc. System and method for sharing SAN storage
US9092378B2 (en) 2011-03-31 2015-07-28 Commvault Systems, Inc. Restoring computing environments, such as autorecovery of file systems at certain points in time
US8849762B2 (en) 2011-03-31 2014-09-30 Commvault Systems, Inc. Restoring computing environments, such as autorecovery of file systems at certain points in time
US10157184B2 (en) 2012-03-30 2018-12-18 Commvault Systems, Inc. Data previewing before recalling large data files
GB2501070A (en) * 2012-04-05 2013-10-16 Appsense Ltd Metadata defining an action to be performed by a computer system
US11409765B2 (en) 2012-12-27 2022-08-09 Commvault Systems, Inc. Application of information management policies based on operation with a geographic entity
US10831778B2 (en) 2012-12-27 2020-11-10 Commvault Systems, Inc. Application of information management policies based on operation with a geographic entity
US9633216B2 (en) 2012-12-27 2017-04-25 Commvault Systems, Inc. Application of information management policies based on operation with a geographic entity
US11093336B2 (en) 2013-03-11 2021-08-17 Commvault Systems, Inc. Browsing data stored in a backup format
US9459968B2 (en) 2013-03-11 2016-10-04 Commvault Systems, Inc. Single index to query multiple backup formats
US10540235B2 (en) 2013-03-11 2020-01-21 Commvault Systems, Inc. Single index to query multiple backup formats
US10169121B2 (en) 2014-02-27 2019-01-01 Commvault Systems, Inc. Work flow management for an information management system
US10205780B2 (en) 2014-03-05 2019-02-12 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US9648100B2 (en) 2014-03-05 2017-05-09 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US11316920B2 (en) 2014-03-05 2022-04-26 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US10523752B2 (en) 2014-03-05 2019-12-31 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US10986181B2 (en) 2014-03-05 2021-04-20 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US11113154B2 (en) 2014-04-16 2021-09-07 Commvault Systems, Inc. User-level quota management of data objects stored in information management systems
US9823978B2 (en) 2014-04-16 2017-11-21 Commvault Systems, Inc. User-level quota management of data objects stored in information management systems
US10310950B2 (en) 2014-05-09 2019-06-04 Commvault Systems, Inc. Load balancing across multiple data paths
US9740574B2 (en) 2014-05-09 2017-08-22 Commvault Systems, Inc. Load balancing across multiple data paths
US10776219B2 (en) 2014-05-09 2020-09-15 Commvault Systems, Inc. Load balancing across multiple data paths
US11119868B2 (en) 2014-05-09 2021-09-14 Commvault Systems, Inc. Load balancing across multiple data paths
US11593227B2 (en) 2014-05-09 2023-02-28 Commvault Systems, Inc. Load balancing across multiple data paths
US20160004850A1 (en) * 2014-07-02 2016-01-07 Aswin Kumar Jayaraman Secure download from internet marketplace
US9665732B2 (en) * 2014-07-02 2017-05-30 Sap Se Secure Download from internet marketplace
US11249858B2 (en) 2014-08-06 2022-02-15 Commvault Systems, Inc. Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host
US11416341B2 (en) 2014-08-06 2022-08-16 Commvault Systems, Inc. Systems and methods to reduce application downtime during a restore operation using a pseudo-storage device
US9645762B2 (en) 2014-10-21 2017-05-09 Commvault Systems, Inc. Using an enhanced data agent to restore backed up data across autonomous storage management systems
US11169729B2 (en) 2014-10-21 2021-11-09 Commvault Systems, Inc. Using an enhanced data agent to restore backed up data across autonomous storage management systems
US10474388B2 (en) 2014-10-21 2019-11-12 Commvault Systems, Inc. Using an enhanced data agent to restore backed up data across autonomous storage management systems
US10073650B2 (en) 2014-10-21 2018-09-11 Commvault Systems, Inc. Using an enhanced data agent to restore backed up data across autonomous storage management systems
US9444811B2 (en) 2014-10-21 2016-09-13 Commvault Systems, Inc. Using an enhanced data agent to restore backed up data across autonomous storage management systems
US9766825B2 (en) 2015-07-22 2017-09-19 Commvault Systems, Inc. Browse and restore for block-level backups
US10168929B2 (en) 2015-07-22 2019-01-01 Commvault Systems, Inc. Browse and restore for block-level backups
US11314424B2 (en) 2015-07-22 2022-04-26 Commvault Systems, Inc. Restore for block-level backups
US11733877B2 (en) 2015-07-22 2023-08-22 Commvault Systems, Inc. Restore for block-level backups
US11436038B2 (en) 2016-03-09 2022-09-06 Commvault Systems, Inc. Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block- level pseudo-mount)
US10608813B1 (en) 2017-01-09 2020-03-31 Amazon Technologies, Inc. Layered encryption for long-lived data
US11356254B1 (en) * 2017-01-09 2022-06-07 Amazon Technologies, Inc. Encryption using indexed data from large data pads
US10476663B1 (en) 2017-01-09 2019-11-12 Amazon Technologies, Inc. Layered encryption of short-lived data
US11467914B2 (en) 2017-02-08 2022-10-11 Commvault Systems, Inc. Migrating content and metadata from a backup system
US10838821B2 (en) 2017-02-08 2020-11-17 Commvault Systems, Inc. Migrating content and metadata from a backup system
US11321195B2 (en) 2017-02-27 2022-05-03 Commvault Systems, Inc. Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount
US11656784B2 (en) 2017-03-27 2023-05-23 Commvault Systems, Inc. Creating local copies of data stored in cloud-based data repositories
US10891069B2 (en) 2017-03-27 2021-01-12 Commvault Systems, Inc. Creating local copies of data stored in online data repositories
US10776329B2 (en) 2017-03-28 2020-09-15 Commvault Systems, Inc. Migration of a database management system to cloud storage
US11520755B2 (en) 2017-03-28 2022-12-06 Commvault Systems, Inc. Migration of a database management system to cloud storage
US11650885B2 (en) 2017-03-29 2023-05-16 Commvault Systems, Inc. Live browsing of granular mailbox data
US11074140B2 (en) 2017-03-29 2021-07-27 Commvault Systems, Inc. Live browsing of granular mailbox data
US11294768B2 (en) 2017-06-14 2022-04-05 Commvault Systems, Inc. Live browsing of backed up data residing on cloned disks
US11567990B2 (en) 2018-02-05 2023-01-31 Commvault Systems, Inc. On-demand metadata extraction of clinical image data
US10795927B2 (en) 2018-02-05 2020-10-06 Commvault Systems, Inc. On-demand metadata extraction of clinical image data
US10789387B2 (en) 2018-03-13 2020-09-29 Commvault Systems, Inc. Graphical representation of an information management system
US11880487B2 (en) 2018-03-13 2024-01-23 Commvault Systems, Inc. Graphical representation of an information management system
US11573866B2 (en) 2018-12-10 2023-02-07 Commvault Systems, Inc. Evaluation and reporting of recovery readiness in a data storage management system
US11308034B2 (en) 2019-06-27 2022-04-19 Commvault Systems, Inc. Continuously run log backup with minimal configuration and resource usage from the source machine
US11829331B2 (en) 2019-06-27 2023-11-28 Commvault Systems, Inc. Continuously run log backup with minimal configuration and resource usage from the source machine
US11971784B2 (en) 2021-12-29 2024-04-30 Commvault Systems, Inc. Recovery Point Objective (RPO) driven backup scheduling in a data storage management system

Also Published As

Publication number Publication date
AU2567100A (en) 2000-10-16
JP2002540530A (en) 2002-11-26
HUP0200614A2 (en) 2002-06-29
TW460812B (en) 2001-10-21

Similar Documents

Publication Publication Date Title
WO2000058865A1 (en) Automated file pruning
US7136882B2 (en) Storage device manager
US6092090A (en) Management system for documents stored electronically
US6985950B1 (en) System for creating a space-efficient document categorizer for training and testing of automatic categorization engines
US9639529B2 (en) Method and system for searching stored data
US6665657B1 (en) Method and system for cross browsing of various multimedia data sources in a searchable repository
US8452788B2 (en) Information retrieval system, registration apparatus for indexes for information retrieval, information retrieval method and program
US20040122849A1 (en) Assignment of documents to a user domain
GB2324891A (en) Adaptive computer directory and file selection
CA2458416A1 (en) Techniques for restoring data based on contents and attributes of the data
GB2439578A (en) Virtual file system with links between data streams
JPH08506911A (en) A computer filing system that allows users to select a category for file access
CA2492971A1 (en) Systems and methods for controlling a visible results set
US20080147632A1 (en) System and Method for Providing Persistent Refined Intermediate Results Selected from Dynamic Iterative Filtering
EP1519289A1 (en) Method for maintaining information about multiple instances of an activity
US20020169940A1 (en) System and method for using memory mapping to scan a master file table
US6065011A (en) System and method for manipulating a categorized data set
EP0910828A1 (en) Access system for distributed storage
US6625614B1 (en) Implementation for efficient access of extended attribute data
JPH03202933A (en) Document search method
US20090177708A1 (en) Preservation Management of Digital Content
Dixon Providing mass data storage and retrieval services in an application-specific environment
JPH06214850A (en) File retrieving device
JPH0785079A (en) Device for managing information file
CN114627968A (en) Multi-modal omics data management system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2000 608289

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: IN/PCT/2001/00928/DE

Country of ref document: IN

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase