WO2004025517A1 - Method and apparatus for integrating primary data storage with local and remote data protection - Google Patents

Method and apparatus for integrating primary data storage with local and remote data protection Download PDF

Info

Publication number
WO2004025517A1
WO2004025517A1 PCT/US2003/028390 US0328390W WO2004025517A1 WO 2004025517 A1 WO2004025517 A1 WO 2004025517A1 US 0328390 W US0328390 W US 0328390W WO 2004025517 A1 WO2004025517 A1 WO 2004025517A1
Authority
WO
WIPO (PCT)
Prior art keywords
files
file
repository
version
data
Prior art date
Application number
PCT/US2003/028390
Other languages
French (fr)
Inventor
David G. Therrien
James E. Pownell
Herman Robert Kenna
Adrian Vanderspek
Thomas G. Hansen
Ashok T. Ramu
Cory Lee Sawyer
Original Assignee
Exagrid Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Exagrid Systems, Inc. filed Critical Exagrid Systems, Inc.
Priority to JP2004536447A priority Critical patent/JP2005538471A/en
Priority to EP03755811A priority patent/EP1537496B1/en
Priority to AU2003273312A priority patent/AU2003273312A1/en
Priority to CA002497306A priority patent/CA2497306A1/en
Priority to DE60321927T priority patent/DE60321927D1/en
Publication of WO2004025517A1 publication Critical patent/WO2004025517A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/1658Data re-synchronization of a redundant component, or initial sync of replacement, additional or spare unit
    • G06F11/1662Data re-synchronization of a redundant component, or initial sync of replacement, additional or spare unit the resynchronized component or unit being a persistent storage device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2038Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant with a single idle spare processing component
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2053Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
    • G06F11/2094Redundant storage or storage space
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2048Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant where the redundant components share neither address space nor persistent storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/84Using snapshots, i.e. a logical point-in-time copy of the data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99943Generating database or data structure, e.g. via user interface
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99953Recoverability

Definitions

  • the present invention is associated with computer primary disk storage systems and the ongoing protection of data on that primary disk storage system from various forms of data loss or corruption. These forms of data loss include accidental user or application file deletion, virus attacks, hardware failure and/or the loss of a data center facility.
  • Tape media quality is degraded each time it is used in a tape drive due to friction between the medium surface and the tape drive head.
  • tape media that is stored in an archive facility must be maintained within tight environmental limits of temperature and humidity. These limits are likely to be exceeded as tapes are transported from a company's air-conditioned data center into archive storage trucks and then back into air conditioning of the offsite storage facility. Observe the relatively limited temperature and humidity range for magnetic tapes that are stored in an archive environment.
  • each data storage system is made up of a collection of a dozen separate data storage, data protection and data management system and software components. Such systems experience interoperability problems among components.
  • Each of the many components typically has its own management user interface that needs to be mastered by a storage administrator.
  • Standard weekly-full / daily incremental tape backup schedules today are designed around the long search times of traditional magnetic tape. During a data restore operation, a full tape is first loaded and then a number of incremental tapes must be loaded thereafter. It takes tens of minutes to search and recover the desired data item on each tape, so the standard weekly full backup model limits the number of tapes used in recovery to one full tape and at most 5 incremental tapes. If tape media latency could be eliminated from the data recovery process by leveraging the much faster seek and rotational delays of magnetic disk technology, full backups could be performed less frequently. For instance, a full backup may be taken once a month or once a quarter with incremental backups occurring daily between these full backups.
  • the present invention is associated with computer primary disk storage systems and the ongoing protection of data on that primary disk storage system from various forms of data loss or corruption.
  • One embodiment of the invention provides a data protection system.
  • the system includes a fileserver having: a filter driver; a file system in communication with the filter driver; a policy cache; and a mirror service in communication with the filter driver and with the policy cache.
  • the filter driver intercepts input/output activity initiated by client file requests and maintains a list of modified and created files since a specified snapshot (a snapshot is the capturing of a set of data from a specified set of storage at a particular point in time).
  • the file system stores client files.
  • the policy cache stores protection policies associated with each share.
  • a share is created on a fileserver as a directory or folder of storage capacity.
  • the mirror service prepares modified and created files in a share to be written to a repository as specified in the protection policy associated with the share.
  • the fileserver can further include a fileserver API coupled to the mirror service and a fileserver file transfer module in communication with the file system. At least one repository communicates with the fileserver through the fileserver API.
  • the fileserver file transfer module transfers files from the file system to at least one repository.
  • the fileserver can also include a location cache in communication with the mirror service and a location manager coupled to the location cache. The location cache indicates which repository should receive an updated version of an existing file and the location manager updates the location cache when the system writes a new file to a specific repository node.
  • the system further includes a local repository and a remote repository.
  • the local repository can include: a local repository node API adapted for communicating with the fileserver; a local repository file transfer module in communication with the fileserver file transfer module and adapted for sending or receiving files from the fileserver file transfer module; a data mover in communication with the local repository API and operative to supervise the replication of files from the fileserver to the local repository; and a protection policy component in communication with the data mover and operative to determine whether new versions of existing files should be compressed and whether older versions of existing files should be maintained.
  • the remote repository can include: a remote repository node API adapted for communicating with another repository node; a remote repository file transfer module in communication with the local file transfer module and adapted for sending and receiving files; a data mover in communication with the remote repository API and operative to supervise the replication of files from the local repository to the remote repository; and a protection policy component in communication with the data mover and operative to determine whether new versions of existing files should be compressed and whether older versions of existing files should be maintained.
  • Another embodiment of the invention provides a method for protecting data.
  • the method includes: storing a version of a first file within a share on a primary disk storage system; examining a protection policy associated with the share to determine where and how to protect files associated with the share; and replicating the version of the first file to repositories specified by the protection policy, the specified repositories including at least one local repository and at least one remote repository.
  • the version of the first file is the first version.
  • the method can further include applying reverse delta compression to successive versions of the first file as new versions are stored in the repositories. Applying reverse delta compression to successive version of the first file can include, in response to the creation of a second version of the first file: replacing the first version of the first file replicated in the local repository with a reverse delta compressed version representing the compressed difference between the first version and the second version and replicating the second version in the local repository; transmitting a difference file to the remote repository; and in the remote repository, applying the difference file to the previous version of the file to store the second version and a reverse delta compressed version representing the difference between the first version and the second version.
  • the method can further include examining a protection policy associated with the share to determine where and how to protect files associated with the share. Furthermore, the method can include determining the location of repositories and the number of replicas for each repository, and/or determining whether to purge a file from repositories after the file has been deleted from a share. As noted above, a share is created on a fileserver as a directory or folder of storage capacity.
  • FIG 1 is a diagram of a deployment of one embodiment of the present invention across three data centers.
  • FIG 2 illustrates how one embodiment of a protection policy creates a relationship between a fileserver share and associated repositories such as those shown in FIG. 1.
  • FIG 3 illustrates one embodiment of the performance of data replication according to a protection policy.
  • FIG 4 is a diagram that shows how one embodiment of the apparatus manages versions of files.
  • FIG 5 shows a first step of one embodiment for managing replication of data across multiple repositories.
  • FIG 6 shows a second step of one embodiment for managing replication and versions across multiple repositories.
  • FIG 7 shows a third step of one embodiment for managing replication and versioning across multiple repositories.
  • FIG 8 shows a screenshot of one embodiment of a user interface for the protection policy of
  • FIG 9 shows one embodiment of the apparatus and the software components that are used to protect new client data to a local repository node.
  • FIG 10 shows one embodiment of the apparatus that replicates data among repositories.
  • FIG 1 is a diagram that illustrates the present invention of an integrated primary data storage and data protection system.
  • Fileservers 4 provide primary data storage capacity to client systems 5 via standard network file system (NFS), file transfer protocol (FTP) or common Internet file system (CIFS)protocols.
  • the apparatus is designed to operate among two or more data centers 1 shown in FIG 1 as Data Centers A, B, D.
  • Two or more repositories 3 deployed across these data centers provide storage capacity and data management processing capability to deliver complete data protection for their associated fileserver primary storage systems.
  • the apparatus leverages metropolitan area network (MAN) or wide area network (WAN) internet protocol (IP) networking 2 to allow repositories to send and receive data that must be replicated from one repository to another.
  • MAN metropolitan area network
  • WAN wide area network
  • IP internet protocol
  • FIG 2 illustrates the association between a fileserver 6 and the two or more repositories 8 that may be deployed across data centers. All primary data storage activity occurs between one or more clients and one or more fileservers through a NFS, FTP, or CIFS share 7. A share is created on a fileserver as a directory or folder of storage capacity. The contents of this shared directory or folder is accessible by multiple clients across a local area network. For example, in the Microsoft Windows environment, CIFS shares appear as storage folders within LAN-connected servers under "My Network Places" of the Windows Explorer user interface. For UNIX environments, shares are accessed through mount points which define the actual fileserver and folder where data will be stored as well as a virtual folder of the local client system's f ⁇ lesystem.
  • this apparatus is both a primary data storage and data protection system
  • the administrator defines how each share of a fileserver will be protected across two or more repositories through the creation of a unique protection policy 9 for that share.
  • this protection policy defines which repositories the system will use to protect each share's data.
  • it also defines how often data protection will occur, how many replicas the system will maintain within each repository, and how the system should maintain modifications to share data.
  • each fileserver examines the protection policy for its shares and, when appropriate, the fileserver captures all recent changes to a share's files and stores and protects these files within two or more repositories.
  • FIG 3 is a diagram that illustrates how a client file is stored and protected after first being created.
  • the file is called A, and the subscript "1" denotes that is the first version of the file.
  • This file is initially stored within a share on a fileserver' s primary disk storage system by the client.
  • the protection policy 11 that was previously defined for the fileserver share in which file Ai was placed is examined.
  • File Ai is then replicated 12 to all of the protection policy's designated repositories.
  • file Ai is replicated to repository 1 and repository 8. This replication takes place on a periodic basis as defined by the backup frequency indicated in the protection policy.
  • FIG 4 is a diagram that illustrates the activity that occurs according to one embodiment when an existing file is modified by a client.
  • Ai is the first version of file A and A 2 , A 3 , ... represent successive modifications to file A.
  • the fileserver retains only the latest version of the file so that all clients requesting file A receive the most updated version. All earlier versions of file A are maintained in local and remote repositories.
  • the original file was modified 3 more times as denoted by the fileserver' s retention of file version A .
  • the subscripts the system uses to describe versioning are not visible to client applications.
  • the file that resides on the fileserver is accessed as file A. Within each designated repository, for every file that is created and then modified, a version chain 14 is created to allow the current version and all earlier versions of a file to be retained. There are many reasons why customers might need to access the current or earlier versions of a file:
  • a fileserver file may become corrupted by a virus or hardware failure.
  • the latest version can be restored from any of the repositories that maintain that file's replicas and versions.
  • FIG 5, FIG 6 and FIG 7 represent a time-sequenced set of diagrams that illustrate the activities that occur when reverse delta compression is enabled for a share through its protection policy.
  • Reverse delta-compression takes the difference between two files and compresses this difference. It retains the latest version of the file in its uncompressed form and all earlier versions in reverse delta compressed form. The latest version of a file is maintained in an uncompressed form since it is the most likely version to be requested for a recovery operation and not having to decompress the file minimizes the time to recover data.
  • the reverse delta decompression algorithm starts with the latest version of the file and decompresses backward in a chain of versions until the desired file is reached.
  • One embodiment of the present invention allows reverse delta compression to be applied to successive versions of a file as new versions are stored in repositories. • In FIG 5, a file called A has been created in a fileserver by a client. It has been stored in a local repository and, since it is the first version of a file, it is replicated to the remote repository across a MAN/WAN connection in its full, uncompressed form.
  • file A is modified, and a version chain for that file created.
  • the original Ai version that was stored in the local repository is replaced by just the reverse delta compressed difference in bytes between version A 2 and version Ai, which is represented by A ⁇ D .
  • the fileserver just retains the latest version of the file A, A 2 so that clients only have access to the latest version.
  • the much smaller difference file, (A 2 -A ⁇ ), represented by the symbol ⁇ is transmitted across the metropolitan or wide area network to a remote repository.
  • file version A 2 can be created in the remote repository 8 by applying the difference file just received, (A 2 -A ⁇ ), to the previous version of the file in that repository, Ai.
  • FIG 7 displays the final completed replication and versioning of file A across its designated repositories 17. Observe that the latest version is maintained in an uncompressed form and all earlier versions are stored in a reverse delta compressed form.
  • FIG 8 is a screenshot of one embodiment of the present invention's protection policy. There is a unique protection policy defined by a storage administrator for each share of each fileserver.
  • a storage administrator Before arriving at the protection policy screen, a storage administrator creates a share and allows it to be accessible by CEFS and/or NFS and/or FTP. Once a new share is created, the protection policy screen is displayed. Within this screen, the storage administrator can specify the following data protection parameters: • Protect this share 18 -this checkbox is normally checked indicating the data in this share should be protected by repositories. There are certain client applications that might choose to use a fileserver for primary storage, yet continue to protect data using third party backup or archiving products. If this checkbox is left unchecked, all other options in the protection policy user interface are disabled.
  • the backup frequency intervals can be selected from a list of time intervals which include: 15 minutes, 30 minutes, 1 hour, 2 hours, 3 hours, 4 hours, 6 hours, 8 hours, 12 hours and 24 hours. All backup frequency intervals are anchored to 12:00 midnight of each fileserver's local time-zone. Setting the backup frequency to 24 hours is similar to performing traditional daily incremental backups. Setting this interval to 15 minutes allows versions of files that change often during the day to be protected on 15 minute intervals. Only files that have changed since the last backup occurred are saved in repositories.
  • Version Management - Version Compression 23 the three compression options are to not compress, to reverse delta compress or to apply simple file compression to a share's files.
  • File compression refers to a variety of techniques known to those of skill in art for compressing a file so that it does not take up as much storage space as an uncompressed file.
  • Delta compression typically provides the highest compression ratio for shares whose files are regularly being modified.
  • Version Management - Version Compaction 24 -compaction provides a means of removing versions of files based on the version's age.
  • the version compaction option for a file share may be configured to maintain only one monthly version of a file after a year, one weekly version of a file that's older than 6 months and one daily version of a file that's older than 1 month. All "extra" versions can be automatically purged from repositories, which, in turn, makes more storage capacity available for new versions of files.
  • a policy component e.g., a policy cache (shown as element 34 in FIG. 9) on the fileserver causes files that are deleted from a share on the fileserver to also be purged from repositories as well. More specifically, the policy component (element 34 in FIG. 9) on the fileserver communicates with a policy component (element 44 in FIG. 9) on a repository to implement this option.
  • This option is effective with applications like third party backup, where some of the replicas and versions that are being retained by repositories are no longer needed to satisfy a that application's recovery window and may be purged from all repositories.
  • Advanced Options - Caching Level 26 this allows the storage administrator to set the approximate percentage of client data that will be cached on a fileserver. Normally, this option is set to "Optimize for Read” to allow the maximum number of most-recently accessed files to be available to client applications at the highest performance levels. All least recently used data is maintained in two or more repositories. Conversely, the caching level can be set to "Optimize for Write", which reduces the amount of cached data available to clients but provides consistently high levels of available storage capacity to write-mostly applications like third party backup. In this mode, by aggressively moving data off of a fileserver into repositories, the application sees the fileserver as a storage device with virtually infinite capacity.
  • FIG 9 and FIG 10 illustrate modules used to protect data files created by a client using a local repository and a remote repository.
  • FIG 9 displays one embodiment of the apparatus and software modules of the present invention that are associated with protecting client files to a local repository.
  • the apparatus includes a fileserver 27 and a single local repository node 28.
  • Clients access a fileserver via the client IP- based (Internet Protocol) network 29 and communicate with the fileserver using NFS, CIFS or FTP protocols. All fileservers and all repository nodes are interconnected by an internal IP-based (Internet Protocol) network 30.
  • Current client files reside on a fileserver's filesystem 32.
  • the filter driver 31 intercepts all input/output activity initiated by client file requests.
  • the fileserver software maintains a list of all modified or created files since this last snapshot occurred. Snapshot intervals can range from 15 minutes to 24 hours, based on the backup frequency 19 of the protection policy.
  • the mirror service 33 prepares all modified files in a share to be put into the repositories 21 (shown in Fig. 8) that are specified in that share's protection policy.
  • the protection policies are stored and replicated across multiple repositories, and they are cached and regularly updated within each fileserver in the protection policy cache 34. For example, if a share's protection policy has its backup frequency set to one hour, on the transition to the next hour, the mirror service 33 initiates a backup of all changed files in the last hour to a local repository 28. For all new files, any repository node of the local repository can be used to hold a replica of a file. For files that have been modified, the mirror service directs new versions of the existing file to the same repository node as prior versions of that file.
  • the mirror service queries the location cache 36 to determine which repository node should receive an updated version of an existing file.
  • This location cache is updated regularly by the location manager 35 when the fileserver writes files to specific repository nodes.
  • the fileserver communicates to each local repository via a fileserver API 37 and a repository node API 38.
  • Each repository node's data mover 39 supervises the replication of files from the fileserver to its repository node.
  • the fileserver file transfer module 40 transfers files from the fileserver filesystem to each repository node's file transfer 41 module. Once the files are replicated to specific disk drives within a repository node, its location manager 42 updates its location cache 43 with repository node location information.
  • FIG 10 illustrates one embodiment of modules that implement a process that protects data to one or more remote repositories to completely protect client data from site disaster.
  • FIG 10 displays a local repository node 46 that, from the actions described in FIG 9, holds the first replica of data.
  • FIG 10 also shows a remote repository node 47.
  • all data that is transferred between local and remote repositories may be secured by virtual private networking (VPN) 49 encryption.
  • the local repository node's replication service 50 is responsible for reviewing the protection policy 51 for all files that were just created as part of the recent fileserver backup.
  • Each repository node acts as a peer of other repository nodes.
  • each repository node manages the movement of files among all repository nodes using repository node APIs 52, 53, data movers 54, and file transfer modules 55, 56.
  • the location manager 57 of each repository node updates the location cache 58 to track where files are maintained within that repository node.
  • the version service 59 of the remote repository node manages file version compression, and compaction according to the protection policy.

Abstract

Embodiments of this invention provide primary magnetic disk data storage capacity (4) to clients (5) while at the same time making sure that client data is replicated locally and at an offsite location to protect from all forms of data loss.

Description

METHOD AND APPARATUS FOR INTEGRATING PRIMARY DATA STORAGE WITH LOCAL AND REMOTE DATA PROTECTION
BACKGROUND OF THE INVENTION The present invention is associated with computer primary disk storage systems and the ongoing protection of data on that primary disk storage system from various forms of data loss or corruption. These forms of data loss include accidental user or application file deletion, virus attacks, hardware failure and/or the loss of a data center facility.
Primary disk storage systems must be periodically protected. While there are numerous data protection solutions available for protecting data, they suffer from the following problems:
• There are many data protection schemes that are employed in combination to fully protect data. The multiplicity of these schemes (e.g. RAID, snapshots, backup, replication) creates over-replication of primary data and increases the complexity of data recovery administration. • The deployment of data storage and data protection systems today rarely extends ' beyond a single data center. This creates isolated islands of data storage, data protection and data management. This creates an environment where some data centers have a surplus of storage capacity that they cannot effectively share with other data centers that need additional storage capacity. • Traditional data protection systems rely almost exclusively on magnetic tape because of its low cost. There are significant reliability and long-term integrity issues associated with reading data that has been recorded on magnetic tape. Tape media quality is degraded each time it is used in a tape drive due to friction between the medium surface and the tape drive head. In addition, tape media that is stored in an archive facility must be maintained within tight environmental limits of temperature and humidity. These limits are likely to be exceeded as tapes are transported from a company's air-conditioned data center into archive storage trucks and then back into air conditioning of the offsite storage facility. Observe the relatively limited temperature and humidity range for magnetic tapes that are stored in an archive environment.
Figure imgf000004_0001
• Generations of tape media and tape drive technology regularly become obsolete, making long-term archiving using magnetic tape a significant challenge. A company with hundreds or thousands of magnetic tapes that were written on older generation tape drives must maintain one or more of these older tape drives to be able to access data on these older tapes.
• New computer applications and types of digital data are causing a 60% year over year increase in demand for primary disk storage capacity. While magnetic disk technology has kept pace with the demand for providing cost-effective, high capacity primary storage systems, magnetic tape has not. In 1986, magnetic tape was approximately 35 times less expensive than magnetic disk, but that cost advantage has eroded from 35x to approximately 2x at the present time. It is expected that this cost erosion will continue into the future, eventually making magnetic tape a more costly alternative to magnetic disk storage.
• Currently, each data storage system is made up of a collection of a dozen separate data storage, data protection and data management system and software components. Such systems experience interoperability problems among components. Each of the many components typically has its own management user interface that needs to be mastered by a storage administrator.
• With the multiplicity of data protection systems and components, such as RAID, snapshots, tape backup and file and block replication, it is difficult for a storage administrator to know how best to respond in the event of actual data loss. • With today's data storage and data protection systems, one megabyte of primary storage data can generate from 10 megabytes to 50 megabytes of protected data. This over-replication of data comes from RAID redundancy drives, snapshot histories, multiple sets of weekly full backup tapes, daily incremental backup tape sets and block and file replication systems. For example, a company that retains just 3 months of weekly full backups will have replicated the data from the primary storage system about 13 times, since the data on successive weekly full backups is almost completely identical.
• Most disaster recovery systems in place today employ replication between just two specific storage subsystems. They don't provide a logical abstraction of virtual storage capacity to enable any primary storage resource to be protected by any other local or remote protection resource.
• There are many data replication products that are available today. Replication products, as they've been designed, replicate all changes between two systems. However an accidental deletion of a file from one of the systems in the replication set will cause the deletion to occur at the other replicated system(s). When this occurs, the data that was deleted must be recovered from backup tapes. Therefore, today's replication systems continue to rely on magnetic tape based backups for complete protection. • Snapshot-based data protection has become popular since it provides end-users with the ability to recover files that they have deleted in the recent past. But snapshot systems cannot function as a replacement for traditional tape backup. Snapshots depend on the current version of a filesystem to be operational in order to recover earlier snapshot versions of files. Therefore, today's snapshot-based systems continue to rely on magnetic tape based backups for complete protection.
• Standard weekly-full / daily incremental tape backup schedules today are designed around the long search times of traditional magnetic tape. During a data restore operation, a full tape is first loaded and then a number of incremental tapes must be loaded thereafter. It takes tens of minutes to search and recover the desired data item on each tape, so the standard weekly full backup model limits the number of tapes used in recovery to one full tape and at most 5 incremental tapes. If tape media latency could be eliminated from the data recovery process by leveraging the much faster seek and rotational delays of magnetic disk technology, full backups could be performed less frequently. For instance, a full backup may be taken once a month or once a quarter with incremental backups occurring daily between these full backups. When magnetic disk is used as a backup medium, the time to access and recover multiple weeks or months of incremental backup data from disk is thousands of times faster than traditional tape. Weekend full backup runs also strain networks and administrators in getting all of the primary storage data committed to magnetic tape before the weekend ends. As the amount of primary storage data grows, the time it takes to backup all of this additional primary storage grows proportionally. • The value of certain collections of data to the survivability of a company changes over time. For example, a database may start out as a non-critical application yet grow to become mission critical as more of the business depends on it for daily operation. Conversely, a database that was once critical to daily operation of the business becomes less important as it is replaced by newer systems. With current tape-based data protection schemes, it's difficult to increase or decrease the degree of protection that is applied to specific sets of primary storage data as their value to the corporation changes over time, particularly when that data that has already been protected to hundreds or thousands of backup tapes. • While magnetic tape provides good sequential access performance for today's backup software products, its access time to random data is approximately a thousand times slower than magnetic disk. This limits the use of tape to data streaming applications like backup/archiving. SUMMARY OF THE INVENTION
The present invention is associated with computer primary disk storage systems and the ongoing protection of data on that primary disk storage system from various forms of data loss or corruption. One embodiment of the invention provides a data protection system. The system includes a fileserver having: a filter driver; a file system in communication with the filter driver; a policy cache; and a mirror service in communication with the filter driver and with the policy cache.
The filter driver intercepts input/output activity initiated by client file requests and maintains a list of modified and created files since a specified snapshot (a snapshot is the capturing of a set of data from a specified set of storage at a particular point in time). The file system stores client files. The policy cache stores protection policies associated with each share. A share is created on a fileserver as a directory or folder of storage capacity. The mirror service prepares modified and created files in a share to be written to a repository as specified in the protection policy associated with the share.
The fileserver can further include a fileserver API coupled to the mirror service and a fileserver file transfer module in communication with the file system. At least one repository communicates with the fileserver through the fileserver API. The fileserver file transfer module transfers files from the file system to at least one repository. The fileserver can also include a location cache in communication with the mirror service and a location manager coupled to the location cache. The location cache indicates which repository should receive an updated version of an existing file and the location manager updates the location cache when the system writes a new file to a specific repository node.
In one embodiment, the system further includes a local repository and a remote repository. The local repository can include: a local repository node API adapted for communicating with the fileserver; a local repository file transfer module in communication with the fileserver file transfer module and adapted for sending or receiving files from the fileserver file transfer module; a data mover in communication with the local repository API and operative to supervise the replication of files from the fileserver to the local repository; and a protection policy component in communication with the data mover and operative to determine whether new versions of existing files should be compressed and whether older versions of existing files should be maintained. The remote repository can include: a remote repository node API adapted for communicating with another repository node; a remote repository file transfer module in communication with the local file transfer module and adapted for sending and receiving files; a data mover in communication with the remote repository API and operative to supervise the replication of files from the local repository to the remote repository; and a protection policy component in communication with the data mover and operative to determine whether new versions of existing files should be compressed and whether older versions of existing files should be maintained.
Another embodiment of the invention provides a method for protecting data. The method includes: storing a version of a first file within a share on a primary disk storage system; examining a protection policy associated with the share to determine where and how to protect files associated with the share; and replicating the version of the first file to repositories specified by the protection policy, the specified repositories including at least one local repository and at least one remote repository.
In one embodiment, the version of the first file is the first version. The method can further include applying reverse delta compression to successive versions of the first file as new versions are stored in the repositories. Applying reverse delta compression to successive version of the first file can include, in response to the creation of a second version of the first file: replacing the first version of the first file replicated in the local repository with a reverse delta compressed version representing the compressed difference between the first version and the second version and replicating the second version in the local repository; transmitting a difference file to the remote repository; and in the remote repository, applying the difference file to the previous version of the file to store the second version and a reverse delta compressed version representing the difference between the first version and the second version.
The method can further include examining a protection policy associated with the share to determine where and how to protect files associated with the share. Furthermore, the method can include determining the location of repositories and the number of replicas for each repository, and/or determining whether to purge a file from repositories after the file has been deleted from a share. As noted above, a share is created on a fileserver as a directory or folder of storage capacity.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG 1 is a diagram of a deployment of one embodiment of the present invention across three data centers.
FIG 2 illustrates how one embodiment of a protection policy creates a relationship between a fileserver share and associated repositories such as those shown in FIG. 1. FIG 3 illustrates one embodiment of the performance of data replication according to a protection policy.
FIG 4 is a diagram that shows how one embodiment of the apparatus manages versions of files.
FIG 5 shows a first step of one embodiment for managing replication of data across multiple repositories.
FIG 6 shows a second step of one embodiment for managing replication and versions across multiple repositories.
FIG 7 shows a third step of one embodiment for managing replication and versioning across multiple repositories. FIG 8 shows a screenshot of one embodiment of a user interface for the protection policy of
FIG. 2. FIG 9 shows one embodiment of the apparatus and the software components that are used to protect new client data to a local repository node.
FIG 10 shows one embodiment of the apparatus that replicates data among repositories.
DETAILED DESCRIPTION OF THE DRAWINGS
FIG 1 is a diagram that illustrates the present invention of an integrated primary data storage and data protection system. Fileservers 4 provide primary data storage capacity to client systems 5 via standard network file system (NFS), file transfer protocol (FTP) or common Internet file system (CIFS)protocols. The apparatus is designed to operate among two or more data centers 1 shown in FIG 1 as Data Centers A, B, D. Two or more repositories 3 deployed across these data centers provide storage capacity and data management processing capability to deliver complete data protection for their associated fileserver primary storage systems. The apparatus leverages metropolitan area network (MAN) or wide area network (WAN) internet protocol (IP) networking 2 to allow repositories to send and receive data that must be replicated from one repository to another. By having data replicated to a local repository and at least one remote repository from the originating fileserver, these repositories act as a replacement for traditional on-site and off-site tape storage systems and tape vaulting services.
FIG 2 illustrates the association between a fileserver 6 and the two or more repositories 8 that may be deployed across data centers. All primary data storage activity occurs between one or more clients and one or more fileservers through a NFS, FTP, or CIFS share 7. A share is created on a fileserver as a directory or folder of storage capacity. The contents of this shared directory or folder is accessible by multiple clients across a local area network. For example, in the Microsoft Windows environment, CIFS shares appear as storage folders within LAN-connected servers under "My Network Places" of the Windows Explorer user interface. For UNIX environments, shares are accessed through mount points which define the actual fileserver and folder where data will be stored as well as a virtual folder of the local client system's fϊlesystem. These shares allow the primary storage capacity of the fileserver to be shared and securely partitioned among multiple clients. Because this apparatus is both a primary data storage and data protection system, the administrator defines how each share of a fileserver will be protected across two or more repositories through the creation of a unique protection policy 9 for that share. In one embodiment, this protection policy defines which repositories the system will use to protect each share's data. In one embodiment it also defines how often data protection will occur, how many replicas the system will maintain within each repository, and how the system should maintain modifications to share data. On a periodic basis, each fileserver examines the protection policy for its shares and, when appropriate, the fileserver captures all recent changes to a share's files and stores and protects these files within two or more repositories. FIG 3 is a diagram that illustrates how a client file is stored and protected after first being created. In this example, the file is called A, and the subscript "1" denotes that is the first version of the file. This file is initially stored within a share on a fileserver' s primary disk storage system by the client. To determine where and how to protect file Ai the protection policy 11 that was previously defined for the fileserver share in which file Ai was placed is examined. File Ai is then replicated 12 to all of the protection policy's designated repositories. In this example, file Ai is replicated to repository 1 and repository 8. This replication takes place on a periodic basis as defined by the backup frequency indicated in the protection policy.
FIG 4 is a diagram that illustrates the activity that occurs according to one embodiment when an existing file is modified by a client. Ai is the first version of file A and A2, A3, ... represent successive modifications to file A. When file A is modified on the client system, the fileserver retains only the latest version of the file so that all clients requesting file A receive the most updated version. All earlier versions of file A are maintained in local and remote repositories. In the example in Figures 3 and 4, the original file was modified 3 more times as denoted by the fileserver' s retention of file version A . In one embodiment, the subscripts the system uses to describe versioning are not visible to client applications. The file that resides on the fileserver is accessed as file A. Within each designated repository, for every file that is created and then modified, a version chain 14 is created to allow the current version and all earlier versions of a file to be retained. There are many reasons why customers might need to access the current or earlier versions of a file:
• If the client or application accidentally deletes the latest version from the fileserver, that latest version can be restored to the fileserver using any of the replicas of the latest version that have been stored in the repositories. A deletion of a file on a fileserver does not result in a deletion of that file from its repositories since repositories are designed to mimic secure backup tapes.
• A fileserver file may become corrupted by a virus or hardware failure. In this case, the latest version can be restored from any of the repositories that maintain that file's replicas and versions.
• A client or application might require the content of an earlier version of a particular file. For example, a user might want to know when a particular change to a document was made or they may need to access an earlier version of a file for reference or modification. FIG 5, FIG 6 and FIG 7 represent a time-sequenced set of diagrams that illustrate the activities that occur when reverse delta compression is enabled for a share through its protection policy. Reverse delta-compression takes the difference between two files and compresses this difference. It retains the latest version of the file in its uncompressed form and all earlier versions in reverse delta compressed form. The latest version of a file is maintained in an uncompressed form since it is the most likely version to be requested for a recovery operation and not having to decompress the file minimizes the time to recover data. To recreate an earlier version of a file, the reverse delta decompression algorithm starts with the latest version of the file and decompresses backward in a chain of versions until the desired file is reached. One embodiment of the present invention allows reverse delta compression to be applied to successive versions of a file as new versions are stored in repositories. • In FIG 5, a file called A has been created in a fileserver by a client. It has been stored in a local repository and, since it is the first version of a file, it is replicated to the remote repository across a MAN/WAN connection in its full, uncompressed form.
• In FIG 6, file A is modified, and a version chain for that file created. The original Ai version that was stored in the local repository is replaced by just the reverse delta compressed difference in bytes between version A2 and version Ai, which is represented by AιD. The fileserver just retains the latest version of the file A, A2 so that clients only have access to the latest version. Also in FIG 6, the much smaller difference file, (A2-Aι), represented by the symbol Δ, is transmitted across the metropolitan or wide area network to a remote repository.
• In FIG 7, file version A2 can be created in the remote repository 8 by applying the difference file just received, (A2-Aι), to the previous version of the file in that repository, Ai. FIG 7 displays the final completed replication and versioning of file A across its designated repositories 17. Observe that the latest version is maintained in an uncompressed form and all earlier versions are stored in a reverse delta compressed form.
It is worth reiterating that AID represents the reverse delta compressed difference between version A2 and version Ai, while (A2-Aι) represents simply the difference between version A2 and version Ai. FIG 8 is a screenshot of one embodiment of the present invention's protection policy. There is a unique protection policy defined by a storage administrator for each share of each fileserver.
Before arriving at the protection policy screen, a storage administrator creates a share and allows it to be accessible by CEFS and/or NFS and/or FTP. Once a new share is created, the protection policy screen is displayed. Within this screen, the storage administrator can specify the following data protection parameters: • Protect this share 18 -this checkbox is normally checked indicating the data in this share should be protected by repositories. There are certain client applications that might choose to use a fileserver for primary storage, yet continue to protect data using third party backup or archiving products. If this checkbox is left unchecked, all other options in the protection policy user interface are disabled.
• Protection Management - Backup Frequency 19 - this option determines how often a fileserver share's data will be protected in the local and remote repositories. In one embodiment, the backup frequency intervals can be selected from a list of time intervals which include: 15 minutes, 30 minutes, 1 hour, 2 hours, 3 hours, 4 hours, 6 hours, 8 hours, 12 hours and 24 hours. All backup frequency intervals are anchored to 12:00 midnight of each fileserver's local time-zone. Setting the backup frequency to 24 hours is similar to performing traditional daily incremental backups. Setting this interval to 15 minutes allows versions of files that change often during the day to be protected on 15 minute intervals. Only files that have changed since the last backup occurred are saved in repositories.
• Protection Management - Number of replicas per repository. This feature allows a storage administrator to determine how many replicas 20 of data to create within each repository 21 when a share is protected. Minimally, there must be one replica stored in a repository that is local to the share's fileserver. It's possible to maintain multiple replicas within a single repository. In this case, replicas are maintained on different repository nodes of a repository to ensure continued access to a replica in the event of a single repository node failure or network failure. The location and number of replicas can be changed over time. To increase data availability for data that is increasing in criticality, more replicas per repository and additional repositories may be specified. For data that is decreasing in importance, fewer replicas may be maintained in the repositories, which makes more storage capacity available to other shares that are also using those repositories.
• Version Management - Keep Version History 22 - this checkbox should be checked for shares whose file content is regularly being updated. When checked, the specified repositories will maintain a version chain of all changes that were identified at each backup frequency interval. For shares of data that have unchanging file content, this checkbox can be unchecked.
• Version Management - Version Compression 23 — the three compression options are to not compress, to reverse delta compress or to apply simple file compression to a share's files. File compression refers to a variety of techniques known to those of skill in art for compressing a file so that it does not take up as much storage space as an uncompressed file. Delta compression typically provides the highest compression ratio for shares whose files are regularly being modified.
• Version Management - Version Compaction 24 -compaction provides a means of removing versions of files based on the version's age. For example, the version compaction option for a file share may be configured to maintain only one monthly version of a file after a year, one weekly version of a file that's older than 6 months and one daily version of a file that's older than 1 month. All "extra" versions can be automatically purged from repositories, which, in turn, makes more storage capacity available for new versions of files.
• Advanced Options - Purge on Delete 25 -when this option is checked, a policy component, e.g., a policy cache (shown as element 34 in FIG. 9) on the fileserver causes files that are deleted from a share on the fileserver to also be purged from repositories as well. More specifically, the policy component (element 34 in FIG. 9) on the fileserver communicates with a policy component (element 44 in FIG. 9) on a repository to implement this option. This option is effective with applications like third party backup, where some of the replicas and versions that are being retained by repositories are no longer needed to satisfy a that application's recovery window and may be purged from all repositories. • Advanced Options - Caching Level 26 - this allows the storage administrator to set the approximate percentage of client data that will be cached on a fileserver. Normally, this option is set to "Optimize for Read" to allow the maximum number of most-recently accessed files to be available to client applications at the highest performance levels. All least recently used data is maintained in two or more repositories. Conversely, the caching level can be set to "Optimize for Write", which reduces the amount of cached data available to clients but provides consistently high levels of available storage capacity to write-mostly applications like third party backup. In this mode, by aggressively moving data off of a fileserver into repositories, the application sees the fileserver as a storage device with virtually infinite capacity. FIG 9 and FIG 10 illustrate modules used to protect data files created by a client using a local repository and a remote repository. FIG 9 displays one embodiment of the apparatus and software modules of the present invention that are associated with protecting client files to a local repository. The apparatus includes a fileserver 27 and a single local repository node 28. Clients access a fileserver via the client IP- based (Internet Protocol) network 29 and communicate with the fileserver using NFS, CIFS or FTP protocols. All fileservers and all repository nodes are interconnected by an internal IP-based (Internet Protocol) network 30. Current client files reside on a fileserver's filesystem 32.
The filter driver 31 intercepts all input/output activity initiated by client file requests. The fileserver software maintains a list of all modified or created files since this last snapshot occurred. Snapshot intervals can range from 15 minutes to 24 hours, based on the backup frequency 19 of the protection policy. On the schedule of the backup frequency, the mirror service 33 prepares all modified files in a share to be put into the repositories 21 (shown in Fig. 8) that are specified in that share's protection policy.
The protection policies are stored and replicated across multiple repositories, and they are cached and regularly updated within each fileserver in the protection policy cache 34. For example, if a share's protection policy has its backup frequency set to one hour, on the transition to the next hour, the mirror service 33 initiates a backup of all changed files in the last hour to a local repository 28. For all new files, any repository node of the local repository can be used to hold a replica of a file. For files that have been modified, the mirror service directs new versions of the existing file to the same repository node as prior versions of that file.
The mirror service queries the location cache 36 to determine which repository node should receive an updated version of an existing file. This location cache is updated regularly by the location manager 35 when the fileserver writes files to specific repository nodes. Once the location manager identifies all destination repository nodes for each file of a share for the latest collection of updated or created files, the fileserver communicates to each local repository via a fileserver API 37 and a repository node API 38. Each repository node's data mover 39 supervises the replication of files from the fileserver to its repository node. The fileserver file transfer module 40 transfers files from the fileserver filesystem to each repository node's file transfer 41 module. Once the files are replicated to specific disk drives within a repository node, its location manager 42 updates its location cache 43 with repository node location information. For all files that arrive at a repository node that are modified versions of existing files, the share's protection policy 44 version management settings are reviewed to determine whether new versions should be compressed and whether older versions should be maintained. The version service 45 is responsible for managing all policy-based compression and decompression, and purging versions based on the "keep only one version" option of a share's protection policy. At this point in the description, client data is only replicated to a local repository. FIG 10 illustrates one embodiment of modules that implement a process that protects data to one or more remote repositories to completely protect client data from site disaster. FIG 10 displays a local repository node 46 that, from the actions described in FIG 9, holds the first replica of data. FIG 10 also shows a remote repository node 47. These are connected to each other across a metropolitan or wide-area network 48. In one embodiment, all data that is transferred between local and remote repositories may be secured by virtual private networking (VPN) 49 encryption. The local repository node's replication service 50 is responsible for reviewing the protection policy 51 for all files that were just created as part of the recent fileserver backup. Each repository node acts as a peer of other repository nodes. Based on the protection policy each repository node manages the movement of files among all repository nodes using repository node APIs 52, 53, data movers 54, and file transfer modules 55, 56. Once the data is replicated to remote repositories, the location manager 57 of each repository node updates the location cache 58 to track where files are maintained within that repository node. The version service 59 of the remote repository node manages file version compression, and compaction according to the protection policy.
Having thus described at least one illustrative embodiment of the invention, various alterations, modifications and improvements are contemplated by the invention including the following: the specific number and arrangement of fileservers and repositories can be modified; the number of repository nodes on an individual repository can be modified; and the specific presentation and components of the illustrated protection policy user interface can be modified. Such alterations, modifications and improvements are intended to be within the scope and spirit of the invention. Accordingly, the foregoing description is by way of example only and is not intended as limiting. The invention's limit is defined only in the following claims and the equivalents thereto.

Claims

What is claimed is:
1. A data protection system comprising: a fileserver having: a filter driver operative to intercept input/output activity initiated by client file requests and to maintain a list of modified and created files since a prior backup; a file system in communication with the filter driver and operative to store client files; a policy cache operative to store a protection policy associated with a set of files; a mirror service in communication with the filter driver and with the policy cache, the mirror service operative to prepare modified and created files in the set of files to be written to a repository as specified in the protection policy associated with the set of files; a fileserver API coupled to the mirror service and operative to communicate with a repository; and a fileserver file transfer module in communication with the file system and operative to transfer files from the file system to at least one repository.
2. The system of claim 1 wherein the mirror service directs new versions of an existing file to the repository to which prior versions of the file were written.
3. The system of claim 1 wherein the system further comprises: a location cache in communication with the mirror service and operative to indicate which repository should receive an updated version of an existing file; and a location manager coupled to the location cache and operative to update the location cache when the system writes a new file to a specific repository node.
4. The system of claim 3 wherein the system further comprises _ .,., . . ,m
a local repository having: a local repository node API adapted for communicating with the fileserver API; a local repository file transfer module in communication with the fileserver file transfer module and adapted for receiving files from the fileserver file transfer module; a data mover in communication with the local repository API and operative to supervise the replication of files from the fileserver to the local repository; and a protection policy component in communication with the data mover and operative to determine whether new versions of existing files should be compressed and whether older versions of existing files should be maintained.
5. The system of claim 4 wherein the system further comprises: a remote repository having: a remote repository node API adapted for communicating with the local repository API; a remote repository file transfer module in communication with the local file transfer module and adapted for receiving files from the local file transfer module; a data mover in communication with the remote repository API and operative to supervise the replication of files from the local repository to the remote repository; and a protection policy component in communication with the data mover and operative to determine whether new versions of existing files should be compressed and whether older versions of existing files should be maintained.
6. The system of claim 1 wherein the protection cache is operative to define which repositories are used, how often data protection occurs, how many replicas are maintained within each repository, and how modifications to share data are maintained.
7. A method for protecting data comprising: storing a version of a first file within a set of files on a primary disk storage system; examining a protection policy associated with the set of files to determine where and how to protect files associated with the set of files; and replicating the version of the first file to repositories specified by the protection policy, the specified repositories including at least one local repository and at least one remote repository.
8. The method of claim 7 wherein the version of the first file is the first version.
9. The method of claim 8 wherein the method further comprises: applying reverse delta compression to successive versions of the first file as new versions are stored in the repositories.
10. The method of claim 9 wherein applying reverse delta compression to successive version of the first file comprises in response to the creation of a second version of the first file: replacing the first version of the first file replicated in the local repository with a reverse delta compressed version representing the difference between the first version and the second version and replicating the second version in the local repository; transmitting a difference file to the remote repository; and in the remote repository, applying the difference file to the previous version of the file to store the second version and a reverse delta compressed version representing the difference between the first version and the second version.
11. The method of claim 7 wherein examining a protection policy associated with the share to determine where and how to protect files associated with the set of files comprises: determining the location of repositories and the number of replicas for each repository.
12. The method of claim 7 wherein examining a protection policy associated with the set of files to determine where and how to protect files associated with the set of files comprises: determining whether to purge a file from repositories after the file has been deleted from a set of files.
13. The method of claim 7 wherein examining a protection policy associated with the set of files to determine where and how to protect files associated with the set of files comprises: determining whether to keep version histories.
14. The method of claim 7 wherein examining a protection policy associated with the set of files to determine where and how to protect files associated with the set of files comprises: determining a specified backup frequency.
15. The method of claim 7 wherein examining a protection policy associated with the set of files to determine where and how to protect files associated with the set of files comprises: determining a specified type of compression.
16. The method of claim 7 wherein examining a protection policy associated with the set of files to determine where and how to protect files associated with the set of files comprises: determining a specified caching level.
17. A data protection system comprising: a fileserver having: filter driver means for intercepting input/output activity initiated by client file requests and for maintaining a list of modified and created files since a prior backup; file system means in communication with the filter driver, the file system means for storing client files; policy cache means for storing a protection policy associated with a set of files; mirror service means in communication with the filter driver means and with the policy cache means, the mirror service means for preparing modified and created files in the set of files to be written to a repository as specified in the protection policy associated with the set of files.
18. The system of claim 17 wherein the system further comprises: a fileserver API coupled to the mirror service means and operative to communicate with a repository; and a fileserver file transfer module in communication with the file system means and operative to transfer files from the file system to at least one repository.
PCT/US2003/028390 2002-09-10 2003-09-10 Method and apparatus for integrating primary data storage with local and remote data protection WO2004025517A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2004536447A JP2005538471A (en) 2002-09-10 2003-09-10 Method and apparatus for integrating primary data storage with local remote data protection
EP03755811A EP1537496B1 (en) 2002-09-10 2003-09-10 Data protection system and method
AU2003273312A AU2003273312A1 (en) 2002-09-10 2003-09-10 Method and apparatus for integrating primary data storage with local remote data protection
CA002497306A CA2497306A1 (en) 2002-09-10 2003-09-10 Method and apparatus for integrating primary data storage with local and remote data protection
DE60321927T DE60321927D1 (en) 2002-09-10 2003-09-10 DATA PROTECTION AND DEVICE

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US40968402P 2002-09-10 2002-09-10
US60/409,684 2002-09-10

Publications (1)

Publication Number Publication Date
WO2004025517A1 true WO2004025517A1 (en) 2004-03-25

Family

ID=31993990

Family Applications (4)

Application Number Title Priority Date Filing Date
PCT/US2003/028692 WO2004025498A1 (en) 2002-09-10 2003-09-10 Method and apparatus for managing data integrity of backup and disaster recovery data
PCT/US2003/028250 WO2004025404A2 (en) 2002-09-10 2003-09-10 Method and apparatus for server share migration and server recovery using hierarchical storage management
PCT/US2003/028390 WO2004025517A1 (en) 2002-09-10 2003-09-10 Method and apparatus for integrating primary data storage with local and remote data protection
PCT/US2003/028251 WO2004025470A1 (en) 2002-09-10 2003-09-10 Primary and remote data backup with nodal failover

Family Applications Before (2)

Application Number Title Priority Date Filing Date
PCT/US2003/028692 WO2004025498A1 (en) 2002-09-10 2003-09-10 Method and apparatus for managing data integrity of backup and disaster recovery data
PCT/US2003/028250 WO2004025404A2 (en) 2002-09-10 2003-09-10 Method and apparatus for server share migration and server recovery using hierarchical storage management

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/US2003/028251 WO2004025470A1 (en) 2002-09-10 2003-09-10 Primary and remote data backup with nodal failover

Country Status (8)

Country Link
US (4) US7925623B2 (en)
EP (4) EP1540478B1 (en)
JP (4) JP2005538470A (en)
AT (4) ATE400027T1 (en)
AU (4) AU2003282795A1 (en)
CA (4) CA2497306A1 (en)
DE (4) DE60328796D1 (en)
WO (4) WO2004025498A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7487386B2 (en) 2005-03-30 2009-02-03 International Business Machines Corporation Method for increasing file system availability via block replication
US9280259B2 (en) 2013-07-26 2016-03-08 Blackberry Limited System and method for manipulating an object in a three-dimensional desktop environment
US9390598B2 (en) 2013-09-11 2016-07-12 Blackberry Limited Three dimensional haptics hybrid modeling
US11308050B2 (en) * 2019-11-15 2022-04-19 Bank Of America Corporation Conversion mechanism for complex cohabitation databases

Families Citing this family (408)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6418478B1 (en) 1997-10-30 2002-07-09 Commvault Systems, Inc. Pipelined high speed data transfer mechanism
US7581077B2 (en) 1997-10-30 2009-08-25 Commvault Systems, Inc. Method and system for transferring data in a storage operation
US7035880B1 (en) 1999-07-14 2006-04-25 Commvault Systems, Inc. Modular backup and retrieval system used in conjunction with a storage area network
US7395282B1 (en) 1999-07-15 2008-07-01 Commvault Systems, Inc. Hierarchical backup and retrieval system
US7389311B1 (en) 1999-07-15 2008-06-17 Commvault Systems, Inc. Modular backup and retrieval system
US6658436B2 (en) 2000-01-31 2003-12-02 Commvault Systems, Inc. Logical view and access to data managed by a modular data and storage management system
US7155481B2 (en) 2000-01-31 2006-12-26 Commvault Systems, Inc. Email attachment management in a computer system
US7003641B2 (en) 2000-01-31 2006-02-21 Commvault Systems, Inc. Logical view with granular access to exchange data managed by a modular data and storage management system
US8346733B2 (en) 2006-12-22 2013-01-01 Commvault Systems, Inc. Systems and methods of media management, such as management of media to and from a media storage library
US7603518B2 (en) 2005-12-19 2009-10-13 Commvault Systems, Inc. System and method for improved media identification in a storage device
US20040049520A1 (en) * 2002-09-05 2004-03-11 Heather Bowers System, method, and apparatus for sharing revision control databases
AU2003270482A1 (en) 2002-09-09 2004-03-29 Commvault Systems, Inc. Dynamic storage device pooling in a computer system
US7925623B2 (en) * 2002-09-10 2011-04-12 Exagrid Systems, Inc. Method and apparatus for integrating primary data storage with local and remote data protection
GB2409553B (en) 2002-09-16 2007-04-04 Commvault Systems Inc System and method for optimizing storage operations
JP3972801B2 (en) * 2002-11-11 2007-09-05 株式会社日立製作所 Backup method in hierarchical backup system
US7024584B2 (en) * 2003-01-09 2006-04-04 International Business Machines Corporation Method, system, and article of manufacture for maintaining data integrity
US20040181707A1 (en) * 2003-03-11 2004-09-16 Hitachi, Ltd. Method and apparatus for seamless management for disaster recovery
US7716061B2 (en) * 2003-03-27 2010-05-11 International Business Machines Corporation Method and apparatus for obtaining status information in a grid
EP1625526B1 (en) 2003-04-03 2012-10-03 Commvault Systems, Inc. System and method for dynamically performing storage operations in a computer network
WO2004090789A2 (en) 2003-04-03 2004-10-21 Commvault Systems, Inc. System and method for extended media retention
US7747586B2 (en) * 2003-04-23 2010-06-29 International Business Machines Corporation Apparatus and method to map and copy computer files
US6973654B1 (en) * 2003-05-27 2005-12-06 Microsoft Corporation Systems and methods for the repartitioning of data
US7467168B2 (en) * 2003-06-18 2008-12-16 International Business Machines Corporation Method for mirroring data at storage locations
US7454569B2 (en) 2003-06-25 2008-11-18 Commvault Systems, Inc. Hierarchical system and method for performing storage operations in a computer network
JP2005018510A (en) * 2003-06-27 2005-01-20 Hitachi Ltd Data center system and its control method
US7568034B1 (en) * 2003-07-03 2009-07-28 Google Inc. System and method for data distribution
US8136025B1 (en) 2003-07-03 2012-03-13 Google Inc. Assigning document identification tags
US7032126B2 (en) * 2003-07-08 2006-04-18 Softek Storage Solutions Corporation Method and apparatus for creating a storage pool by dynamically mapping replication schema to provisioned storage volumes
US20050010529A1 (en) * 2003-07-08 2005-01-13 Zalewski Stephen H. Method and apparatus for building a complete data protection scheme
US7734690B2 (en) * 2003-09-05 2010-06-08 Microsoft Corporation Method and apparatus for providing attributes of a collaboration system in an operating system folder-based file system
US7509589B2 (en) * 2003-09-30 2009-03-24 Hewlett-Packard Development Company, L.P. Storage domain GUI
US8060619B1 (en) * 2003-11-07 2011-11-15 Symantec Operating Corporation Direct connections to a plurality of storage object replicas in a computer network
GB2425198B (en) 2003-11-13 2008-04-09 Commvault Systems Inc System and method for performing a snapshot
GB2425199B (en) 2003-11-13 2007-08-15 Commvault Systems Inc System and method for combining data streams in pipelined storage operations in a storage network
WO2005050381A2 (en) 2003-11-13 2005-06-02 Commvault Systems, Inc. Systems and methods for performing storage operations using network attached storage
US7734750B2 (en) * 2003-12-19 2010-06-08 International Business Machines Corporation Real-time feedback for policies for computing system management
US7921082B2 (en) * 2004-01-23 2011-04-05 Lsi Corporation File recovery under linux operating system
US8370247B2 (en) * 2004-02-13 2013-02-05 Omx Technology Ab Multi site solution for securities trading
US7395352B1 (en) * 2004-03-12 2008-07-01 Netapp, Inc. Managing data replication relationships
US7325019B2 (en) * 2004-03-12 2008-01-29 Network Appliance, Inc. Managing data replication policies
JP2005284407A (en) * 2004-03-26 2005-10-13 Nec Corp Virtual data sharing system
US7539706B1 (en) * 2004-03-30 2009-05-26 Emc Corporation Methods and apparatus for collecting and processing file system data
JP2005292865A (en) * 2004-03-31 2005-10-20 Hitachi Ltd Storage system and backup method for storage system
US7197520B1 (en) * 2004-04-14 2007-03-27 Veritas Operating Corporation Two-tier backup mechanism
US20060047855A1 (en) 2004-05-13 2006-03-02 Microsoft Corporation Efficient chunking algorithm
WO2005101510A2 (en) * 2004-04-16 2005-10-27 The University Of Toledo Light-assisted electrochemical shunt passivation for photovoltaic devices
FR2873219A1 (en) * 2004-07-15 2006-01-20 Skyrecon Systems Sa SAVING METHOD DISTRIBUTED TO CLIENT POSTS IN A COMPUTER NETWORK
US7765243B2 (en) * 2004-07-26 2010-07-27 Sandisk Il Ltd. Unified local-remote logical volume
CN100363903C (en) * 2004-08-11 2008-01-23 威盛电子股份有限公司 Hard disc array verifying method and relative device
US7769709B2 (en) * 2004-09-09 2010-08-03 Microsoft Corporation Method, system, and apparatus for creating an archive routine for protecting data in a data protection system
US7567974B2 (en) * 2004-09-09 2009-07-28 Microsoft Corporation Method, system, and apparatus for configuring a data protection system
US7865470B2 (en) * 2004-09-09 2011-01-04 Microsoft Corporation Method, system, and apparatus for translating logical information representative of physical data in a data protection system
US8145601B2 (en) 2004-09-09 2012-03-27 Microsoft Corporation Method, system, and apparatus for providing resilient data transfer in a data protection system
US7756833B2 (en) * 2004-09-22 2010-07-13 Microsoft Corporation Method and system for synthetic backup and restore
US7613787B2 (en) * 2004-09-24 2009-11-03 Microsoft Corporation Efficient algorithm for finding candidate objects for remote differential compression
US20060080362A1 (en) * 2004-10-12 2006-04-13 Lefthand Networks, Inc. Data Synchronization Over a Computer Network
US7809914B2 (en) 2004-11-05 2010-10-05 Commvault Systems, Inc. Methods and system of pooling storage devices
WO2006053050A2 (en) 2004-11-08 2006-05-18 Commvault Systems, Inc. System and method for performing auxiliary storage operations
US7778984B2 (en) * 2004-11-19 2010-08-17 Microsoft Corporation System and method for a distributed object store
US9063898B1 (en) * 2004-11-23 2015-06-23 Hewlett-Packard Development Company, L.P. Method of restoring backup data
US20060168084A1 (en) * 2004-11-29 2006-07-27 Leonid Kogan Method and apparatus for rendering load balancing and failover
US20060123210A1 (en) * 2004-12-06 2006-06-08 St. Bernard Software, Inc. Method for logically consistent backup of open computer files
US8346843B2 (en) * 2004-12-10 2013-01-01 Google Inc. System and method for scalable data distribution
US7844691B2 (en) * 2004-12-30 2010-11-30 Xstor Systems, Inc. Scalable distributed storage and delivery
WO2006074869A1 (en) * 2005-01-11 2006-07-20 Rudolf Bayer Data storage system and method for operation thereof
US7730038B1 (en) * 2005-02-10 2010-06-01 Oracle America, Inc. Efficient resource balancing through indirection
US20060206507A1 (en) * 2005-02-16 2006-09-14 Dahbour Ziyad M Hierarchal data management
US7818608B2 (en) * 2005-02-18 2010-10-19 Microsoft Corporation System and method for using a file system to automatically backup a file as a generational file
US7627614B2 (en) * 2005-03-03 2009-12-01 Oracle International Corporation Lost write detection and repair
US20060212744A1 (en) * 2005-03-15 2006-09-21 International Business Machines Corporation Methods, systems, and storage medium for data recovery
US20060218435A1 (en) * 2005-03-24 2006-09-28 Microsoft Corporation Method and system for a consumer oriented backup
US7814057B2 (en) * 2005-04-05 2010-10-12 Microsoft Corporation Page recovery using volume snapshots and logs
JP4600127B2 (en) * 2005-04-06 2010-12-15 株式会社日立製作所 Storage backup service system and storage backup service method
US7404051B2 (en) * 2005-04-18 2008-07-22 Hitachi, Ltd. Method for replicating snapshot volumes between storage systems
US20060271579A1 (en) * 2005-05-10 2006-11-30 Arun Batish Storage usage analysis
US7801859B1 (en) * 2005-05-25 2010-09-21 Emc Corporation Tracking filesystem backups
US8335768B1 (en) 2005-05-25 2012-12-18 Emc Corporation Selecting data in backup data sets for grooming and transferring
JP4630734B2 (en) * 2005-05-31 2011-02-09 株式会社東芝 Logical volume management device, logical volume management method and program
US7613747B1 (en) * 2005-06-08 2009-11-03 Sprint Communications Company L.P. Tiered database storage and replication
JP4784854B2 (en) * 2005-06-13 2011-10-05 独立行政法人産業技術総合研究所 Data management apparatus and method
US8225410B2 (en) 2005-07-08 2012-07-17 At&T Intellectual Property I, L. P. Methods, systems, and devices for securing content
US7536426B2 (en) * 2005-07-29 2009-05-19 Microsoft Corporation Hybrid object placement in a distributed storage system
US7403949B2 (en) 2005-08-17 2008-07-22 International Business Machines Corporation Elimination of redundant objects in storage systems
US7747577B2 (en) * 2005-08-17 2010-06-29 International Business Machines Corporation Management of redundant objects in storage systems
US7610291B2 (en) * 2005-08-17 2009-10-27 International Business Machines Corporation Logical grouping and management of redundant objects in storage systems
US7426618B2 (en) * 2005-09-06 2008-09-16 Dot Hill Systems Corp. Snapshot restore method and apparatus
JP2007080147A (en) * 2005-09-16 2007-03-29 Sony Corp Reading apparatus and method, information processing apparatus and method, and program
JP2007080148A (en) * 2005-09-16 2007-03-29 Sony Corp Display control apparatus and method and program
US7603376B1 (en) * 2005-09-22 2009-10-13 Emc Corporation File and folder scanning method and apparatus
US7523378B2 (en) * 2005-09-23 2009-04-21 Intel Corporation Techniques to determine integrity of information
US8712959B1 (en) * 2005-09-28 2014-04-29 Oracle America, Inc. Collaborative data redundancy for configuration tracking systems
US20070078809A1 (en) * 2005-09-30 2007-04-05 Rockwell Automation Technologies, Inc. Robust data availability system having decentralized storage and multiple access paths
US8688780B2 (en) * 2005-09-30 2014-04-01 Rockwell Automation Technologies, Inc. Peer-to-peer exchange of data resources in a control system
US8839125B2 (en) * 2005-10-26 2014-09-16 Hewlett-Packard Development Company, L.P. Alternate power up inventory methods for storage apparatus
US8458295B1 (en) * 2005-11-14 2013-06-04 Sprint Communications Company L.P. Web content distribution devices to stage network device software
US20070130232A1 (en) * 2005-11-22 2007-06-07 Therrien David G Method and apparatus for efficiently storing and managing historical versions and replicas of computer data files
CN1859379B (en) * 2005-12-07 2011-02-09 华为技术有限公司 Method and system for managing expandable mark language file
US7606844B2 (en) 2005-12-19 2009-10-20 Commvault Systems, Inc. System and method for performing replication copy storage operations
CA2632935C (en) 2005-12-19 2014-02-04 Commvault Systems, Inc. Systems and methods for performing data replication
US8661216B2 (en) 2005-12-19 2014-02-25 Commvault Systems, Inc. Systems and methods for migrating components in a hierarchical storage network
US7636743B2 (en) 2005-12-19 2009-12-22 Commvault Systems, Inc. Pathname translation in a data replication system
US7617262B2 (en) 2005-12-19 2009-11-10 Commvault Systems, Inc. Systems and methods for monitoring application data in a data replication system
US7651593B2 (en) 2005-12-19 2010-01-26 Commvault Systems, Inc. Systems and methods for performing data replication
US7962709B2 (en) 2005-12-19 2011-06-14 Commvault Systems, Inc. Network redirector systems and methods for performing data replication
US8458422B1 (en) 2005-12-22 2013-06-04 Oracle America, Inc. Policy based creation of export sets and backup media
US8355938B2 (en) 2006-01-05 2013-01-15 Wells Fargo Bank, N.A. Capacity management index system and method
JP2007193424A (en) * 2006-01-17 2007-08-02 Konica Minolta Business Technologies Inc Image processor, backup program and backup method
EP1982261A2 (en) * 2006-02-06 2008-10-22 FilesX, Inc. Long term backup on disk
US8990153B2 (en) * 2006-02-07 2015-03-24 Dot Hill Systems Corporation Pull data replication model
US20070226224A1 (en) * 2006-03-08 2007-09-27 Omneon Video Networks Data storage system
US7941404B2 (en) * 2006-03-08 2011-05-10 International Business Machines Corporation Coordinated federated backup of a distributed application environment
US20070220029A1 (en) * 2006-03-17 2007-09-20 Novell, Inc. System and method for hierarchical storage management using shadow volumes
US7783850B2 (en) * 2006-03-28 2010-08-24 Dot Hill Systems Corporation Method and apparatus for master volume access during volume copy
US20070239803A1 (en) * 2006-03-28 2007-10-11 Yasuyuki Mimatsu Remote mirroring method between tiered storage systems
US20070244996A1 (en) * 2006-04-14 2007-10-18 Sonasoft Corp., A California Corporation Web enabled exchange server standby solution using mailbox level replication
US8025650B2 (en) * 2006-06-12 2011-09-27 Wound Care Technologies, Inc. Negative pressure wound treatment device, and methods
US20070299891A1 (en) * 2006-06-26 2007-12-27 Bellsouth Intellectual Property Corporation Data back-up utility
JP5082310B2 (en) 2006-07-10 2012-11-28 日本電気株式会社 Data migration apparatus and program
JP4749266B2 (en) * 2006-07-27 2011-08-17 株式会社日立製作所 Backup control apparatus and method without duplication of information resources
US8726242B2 (en) 2006-07-27 2014-05-13 Commvault Systems, Inc. Systems and methods for continuous data replication
US8370853B2 (en) 2006-08-04 2013-02-05 Apple Inc. Event notification management
US7853566B2 (en) * 2006-08-04 2010-12-14 Apple Inc. Navigation of electronic backups
US7853567B2 (en) 2006-08-04 2010-12-14 Apple Inc. Conflict resolution in recovery of electronic data
US8311988B2 (en) 2006-08-04 2012-11-13 Apple Inc. Consistent back up of electronic information
US7860839B2 (en) * 2006-08-04 2010-12-28 Apple Inc. Application-based backup-restore of electronic information
US7809688B2 (en) * 2006-08-04 2010-10-05 Apple Inc. Managing backup of content
US7809687B2 (en) 2006-08-04 2010-10-05 Apple Inc. Searching a backup archive
US9009115B2 (en) * 2006-08-04 2015-04-14 Apple Inc. Restoring electronic information
US7856424B2 (en) * 2006-08-04 2010-12-21 Apple Inc. User interface for backup management
US8166415B2 (en) 2006-08-04 2012-04-24 Apple Inc. User interface for backup management
US20080046483A1 (en) * 2006-08-16 2008-02-21 Lehr Douglas L Method and system for selecting the timing of data backups based on dynamic factors
US7769843B2 (en) * 2006-09-22 2010-08-03 Hy Performix, Inc. Apparatus and method for capacity planning for data center server consolidation and workload reassignment
US7539783B2 (en) 2006-09-22 2009-05-26 Commvault Systems, Inc. Systems and methods of media management, such as management of media to and from a media storage library, including removable media
JP3963932B1 (en) * 2006-09-28 2007-08-22 システムインテグレート株式会社 Information leakage monitoring and management system for information processing equipment
US7593973B2 (en) * 2006-11-15 2009-09-22 Dot Hill Systems Corp. Method and apparatus for transferring snapshot data
US8190561B1 (en) * 2006-12-06 2012-05-29 At&T Mobility Ii Llc LDAP replication priority queuing mechanism
US20080140802A1 (en) * 2006-12-08 2008-06-12 Microsoft Corporation Offsite centralized data center providing client functionality
US8135135B2 (en) * 2006-12-08 2012-03-13 Microsoft Corporation Secure data protection during disasters
US8312323B2 (en) 2006-12-22 2012-11-13 Commvault Systems, Inc. Systems and methods for remote monitoring in a computer network and reporting a failed migration operation without accessing the data being moved
US7831566B2 (en) 2006-12-22 2010-11-09 Commvault Systems, Inc. Systems and methods of hierarchical storage management, such as global management of storage operations
US8719809B2 (en) 2006-12-22 2014-05-06 Commvault Systems, Inc. Point in time rollback and un-installation of software
US8751467B2 (en) * 2007-01-18 2014-06-10 Dot Hill Systems Corporation Method and apparatus for quickly accessing backing store metadata
US7831565B2 (en) * 2007-01-18 2010-11-09 Dot Hill Systems Corporation Deletion of rollback snapshot partition
WO2008095237A1 (en) * 2007-02-05 2008-08-14 Moonwalk Universal Pty Ltd Data management system
US7650368B2 (en) * 2007-02-07 2010-01-19 At&T Intellectual Property I, L.P. Methods, systems, and products for restoring electronic media
US7885928B2 (en) * 2007-03-08 2011-02-08 Xerox Corporation Decentralized adaptive management of distributed resource replicas in a peer-to-peer network based on QoS
US8290808B2 (en) 2007-03-09 2012-10-16 Commvault Systems, Inc. System and method for automating customer-validated statement of work for a data storage environment
JP2008234264A (en) * 2007-03-20 2008-10-02 Nec Software Chubu Ltd Load balancing device for file server, program for load balancing, and load balancing method
US7716183B2 (en) * 2007-04-11 2010-05-11 Dot Hill Systems Corporation Snapshot preserved data cloning
US7975115B2 (en) * 2007-04-11 2011-07-05 Dot Hill Systems Corporation Method and apparatus for separating snapshot preserved and write data
US7720819B2 (en) * 2007-04-12 2010-05-18 International Business Machines Corporation Method and apparatus combining revision based and time based file data protection
US7783603B2 (en) * 2007-05-10 2010-08-24 Dot Hill Systems Corporation Backing store re-initialization method and apparatus
US8001345B2 (en) * 2007-05-10 2011-08-16 Dot Hill Systems Corporation Automatic triggering of backing store re-initialization
US8745523B2 (en) 2007-06-08 2014-06-03 Apple Inc. Deletion in electronic backups
US8010900B2 (en) 2007-06-08 2011-08-30 Apple Inc. User interface for electronic backup
WO2008154448A2 (en) 2007-06-08 2008-12-18 Apple Inc. Application-based backup-restore of electronic information
US8429425B2 (en) 2007-06-08 2013-04-23 Apple Inc. Electronic backup and restoration of encrypted data
US8099392B2 (en) 2007-06-08 2012-01-17 Apple Inc. Electronic backup of applications
US8468136B2 (en) 2007-06-08 2013-06-18 Apple Inc. Efficient data backup
US20080307017A1 (en) 2007-06-08 2008-12-11 Apple Inc. Searching and Restoring of Backups
US8725965B2 (en) 2007-06-08 2014-05-13 Apple Inc. System setup for electronic backup
US8307004B2 (en) 2007-06-08 2012-11-06 Apple Inc. Manipulating electronic backups
US7849354B2 (en) 2007-06-12 2010-12-07 Microsoft Corporation Gracefully degradable versioned storage systems
US8204858B2 (en) 2007-06-25 2012-06-19 Dot Hill Systems Corporation Snapshot reset method and apparatus
US8706976B2 (en) 2007-08-30 2014-04-22 Commvault Systems, Inc. Parallel access virtual tape library and drives
US8170994B2 (en) * 2007-09-28 2012-05-01 Symantec Corporation Techniques for virtual archiving
US8121117B1 (en) 2007-10-01 2012-02-21 F5 Networks, Inc. Application layer network traffic prioritization
AT504798B1 (en) * 2007-10-24 2008-08-15 Data Noah Gmbh METHOD AND DEVICE FOR SELF-CREATING BACKUP COPIES
US9143561B2 (en) 2007-11-09 2015-09-22 Topia Technology, Inc. Architecture for management of digital files across distributed network
US8126852B1 (en) 2007-12-07 2012-02-28 Emc Corporation Merged collections
US8140599B1 (en) * 2007-12-07 2012-03-20 Emc Corporation Garbage collection for merged collections
US20090150461A1 (en) * 2007-12-07 2009-06-11 Brocade Communications Systems, Inc. Simplified snapshots in a distributed file system
US20090150477A1 (en) * 2007-12-07 2009-06-11 Brocade Communications Systems, Inc. Distributed file system optimization using native server functions
US7913116B2 (en) * 2008-02-27 2011-03-22 Red Hat, Inc. Systems and methods for incremental restore
US8135838B2 (en) * 2008-04-08 2012-03-13 Geminare Incorporated System and method for providing data and application continuity in a computer system
US9329744B2 (en) 2008-05-12 2016-05-03 Adobe Systems Incorporated Segmented scroll bar
US8996621B2 (en) 2008-05-12 2015-03-31 Adobe Systems Incorporated Asynchronous comment updates
US9176943B2 (en) 2008-05-12 2015-11-03 Adobe Systems Incorporated Comment presentation in electronic documents
US7949633B1 (en) 2008-05-12 2011-05-24 Adobe Systems Incorporated Shared edit access of electronic content
US10055392B2 (en) * 2008-05-12 2018-08-21 Adobe Systems Incorporated History-based archive management
US7945595B1 (en) 2008-05-12 2011-05-17 Adobe Systems Incorporated System and method for generating an item list in electronic content
US9418054B2 (en) 2008-05-12 2016-08-16 Adobe Systems Incorporated Document comment management
US7958397B2 (en) * 2008-06-20 2011-06-07 Lsi Corporation System for automatically configuring a storage array
JP5467625B2 (en) * 2008-07-30 2014-04-09 インターナショナル・ビジネス・マシーンズ・コーポレーション Production-substitution system including a production system that processes transactions and a substitution system that is a backup system of the production system
US7904420B2 (en) * 2008-08-26 2011-03-08 Raytheon Company Identification and verification of common cluster files residing on nodes in a cluster
US20100070466A1 (en) 2008-09-15 2010-03-18 Anand Prahlad Data transfer techniques within data storage devices, such as network attached storage performing data migration
SE533007C2 (en) * 2008-10-24 2010-06-08 Ilt Productions Ab Distributed data storage
US20100111105A1 (en) * 2008-10-30 2010-05-06 Ken Hamilton Data center and data center design
WO2010064328A1 (en) * 2008-12-03 2010-06-10 Hitachi, Ltd. Information processing system and method of acquiring backup in an information processing system
US9495382B2 (en) 2008-12-10 2016-11-15 Commvault Systems, Inc. Systems and methods for performing discrete data replication
US8204859B2 (en) 2008-12-10 2012-06-19 Commvault Systems, Inc. Systems and methods for managing replicated database data
CA2690506C (en) * 2009-01-20 2016-05-10 Parata Systems, Llc Methods, systems, and apparatus for determining and automatically programming network addresses for devices operating in a network
US8566362B2 (en) 2009-01-23 2013-10-22 Nasuni Corporation Method and system for versioned file system using structured data representations
US8140791B1 (en) * 2009-02-24 2012-03-20 Symantec Corporation Techniques for backing up distributed data
US8307154B2 (en) * 2009-03-03 2012-11-06 Kove Corporation System and method for performing rapid data snapshots
US8291036B2 (en) * 2009-03-16 2012-10-16 Microsoft Corporation Datacenter synchronization
US20100257403A1 (en) * 2009-04-03 2010-10-07 Microsoft Corporation Restoration of a system from a set of full and partial delta system snapshots across a distributed system
US8805953B2 (en) * 2009-04-03 2014-08-12 Microsoft Corporation Differential file and system restores from peers and the cloud
US8560639B2 (en) * 2009-04-24 2013-10-15 Microsoft Corporation Dynamic placement of replica data
US8935366B2 (en) * 2009-04-24 2015-01-13 Microsoft Corporation Hybrid distributed and cloud backup architecture
US8769055B2 (en) * 2009-04-24 2014-07-01 Microsoft Corporation Distributed backup and versioning
US8769049B2 (en) * 2009-04-24 2014-07-01 Microsoft Corporation Intelligent tiers of backup data
US9213697B1 (en) * 2009-05-20 2015-12-15 Acronis International Gmbh System and method for restoration of MS exchange server mail
US8250040B2 (en) * 2009-06-15 2012-08-21 Microsoft Corporation Storage or removal actions based on priority
US9325802B2 (en) * 2009-07-16 2016-04-26 Microsoft Technology Licensing, Llc Hierarchical scale unit values for storing instances of data among nodes of a distributed store
US8458287B2 (en) * 2009-07-31 2013-06-04 Microsoft Corporation Erasure coded storage aggregation in data centers
US9239762B1 (en) * 2009-08-11 2016-01-19 Symantec Corporation Method and apparatus for virtualizing file system placeholders at a computer
US8874628B1 (en) * 2009-10-15 2014-10-28 Symantec Corporation Systems and methods for projecting hierarchical storage management functions
US9369524B2 (en) * 2009-10-26 2016-06-14 Netapp, Inc. Simplified and unified management for network-attached storage
WO2011055412A1 (en) * 2009-11-06 2011-05-12 Hitachi, Ltd. File management sub-system and file migration control method in hierarchical file system
US10721269B1 (en) 2009-11-06 2020-07-21 F5 Networks, Inc. Methods and system for returning requests with javascript for clients before passing a request to a server
US8806056B1 (en) 2009-11-20 2014-08-12 F5 Networks, Inc. Method for optimizing remote file saves in a failsafe way
CN102088361B (en) * 2009-12-02 2015-04-15 华为数字技术(成都)有限公司 Data backup equipment, method and system
US20110167045A1 (en) * 2010-01-05 2011-07-07 Hitachi, Ltd. Storage system and its file management method
US8285692B2 (en) * 2010-01-15 2012-10-09 Oracle America, Inc. Method and system for attribute encapsulated data resolution and transcoding
WO2011108030A1 (en) 2010-03-05 2011-09-09 Hitachi, Ltd. Computer system and recording medium using a virtual file system in a hierarchical storage management
US8478258B2 (en) 2010-03-05 2013-07-02 Intel Corporation Techniques to reduce false detection of control channel messages in a wireless network
US20120191658A1 (en) * 2010-03-10 2012-07-26 Gopakumar Ambat Data protection
US20110231698A1 (en) * 2010-03-22 2011-09-22 Zlati Andrei C Block based vss technology in workload migration and disaster recovery in computing system environment
US8504517B2 (en) 2010-03-29 2013-08-06 Commvault Systems, Inc. Systems and methods for selective data replication
US8725698B2 (en) 2010-03-30 2014-05-13 Commvault Systems, Inc. Stub file prioritization in a data replication system
US8504515B2 (en) 2010-03-30 2013-08-06 Commvault Systems, Inc. Stubbing systems and methods in a data replication environment
US8352422B2 (en) 2010-03-30 2013-01-08 Commvault Systems, Inc. Data restore systems and methods in a replication environment
US8412899B2 (en) * 2010-04-01 2013-04-02 Autonomy, Inc. Real time backup storage node assignment
CN101833486B (en) * 2010-04-07 2014-08-20 浪潮电子信息产业股份有限公司 Method for designing remote backup and recovery system
EP2712149B1 (en) 2010-04-23 2019-10-30 Compuverde AB Distributed data storage
US8707296B2 (en) 2010-04-27 2014-04-22 Apple Inc. Dynamic retrieval of installation packages when installing software
GB201008888D0 (en) * 2010-05-27 2010-07-14 Qinetiq Ltd Network security
US8589347B2 (en) 2010-05-28 2013-11-19 Commvault Systems, Inc. Systems and methods for performing data replication
US20110302265A1 (en) * 2010-06-03 2011-12-08 Microsoft Corporation Leader arbitration for provisioning services
US8484569B2 (en) * 2010-06-30 2013-07-09 International Business Machines Corporation Saving and restoring collaborative applications in context
US9503375B1 (en) 2010-06-30 2016-11-22 F5 Networks, Inc. Methods for managing traffic in a multi-service environment and devices thereof
US9420049B1 (en) 2010-06-30 2016-08-16 F5 Networks, Inc. Client side human user indicator
US9047348B2 (en) * 2010-07-22 2015-06-02 Google Inc. Event correlation in cloud computing
US8799231B2 (en) 2010-08-30 2014-08-05 Nasuni Corporation Versioned file system with fast restore
WO2012035588A1 (en) * 2010-09-17 2012-03-22 Hitachi, Ltd. Method for managing information processing system and data management computer system
US8700571B2 (en) * 2010-09-24 2014-04-15 Hitachi Data Systems Corporation System and method for optimizing protection levels when replicating data in an object storage system
US9244779B2 (en) 2010-09-30 2016-01-26 Commvault Systems, Inc. Data recovery operations, such as recovery from modified network data management protocol data
EP2628100A4 (en) 2010-10-12 2016-12-21 Nasuni Corp Versioned file system with sharing
US9762578B2 (en) 2010-10-25 2017-09-12 Schneider Electric It Corporation Methods and systems for establishing secure authenticated bidirectional server communication using automated credential reservation
US10642849B2 (en) * 2010-10-25 2020-05-05 Schneider Electric It Corporation Methods and systems for providing improved access to data and measurements in a management system
US9824091B2 (en) 2010-12-03 2017-11-21 Microsoft Technology Licensing, Llc File system backup using change journal
US8627025B2 (en) 2010-12-21 2014-01-07 Microsoft Corporation Protecting data during different connectivity states
US8620894B2 (en) 2010-12-21 2013-12-31 Microsoft Corporation Searching files
US8660991B2 (en) * 2011-01-11 2014-02-25 Bridgewater Systems Corp. Systems and methods for management of subscriber databases within mobile communications networks
US8984029B2 (en) 2011-01-14 2015-03-17 Apple Inc. File system management
US8943026B2 (en) 2011-01-14 2015-01-27 Apple Inc. Visual representation of a local backup
US9021198B1 (en) 2011-01-20 2015-04-28 Commvault Systems, Inc. System and method for sharing SAN storage
JP5636998B2 (en) * 2011-02-15 2014-12-10 富士通株式会社 Processing program, processing method, and processing apparatus
US20120215904A1 (en) * 2011-02-22 2012-08-23 Bank Of America Corporation Backup System Monitor
US8473459B2 (en) * 2011-02-28 2013-06-25 International Business Machines Corporation Workload learning in data replication environments
US9721033B2 (en) 2011-02-28 2017-08-01 Micro Focus Software Inc. Social networking content management
US20120254118A1 (en) 2011-03-31 2012-10-04 Microsoft Corporation Recovery of tenant data across tenant moves
JP5445503B2 (en) * 2011-03-31 2014-03-19 ブラザー工業株式会社 Information communication system and information communication method
US8879431B2 (en) 2011-05-16 2014-11-04 F5 Networks, Inc. Method for load balancing of requests' processing of diameter servers
US8938638B2 (en) 2011-06-06 2015-01-20 Microsoft Corporation Recovery service location for a service
US10585766B2 (en) 2011-06-06 2020-03-10 Microsoft Technology Licensing, Llc Automatic configuration of a recovery service
US8396836B1 (en) * 2011-06-30 2013-03-12 F5 Networks, Inc. System for mitigating file virtualization storage import latency
US8589363B2 (en) * 2011-07-19 2013-11-19 Exagrid Systems, Inc. Systems and methods for managing delta version chains
US9229818B2 (en) 2011-07-20 2016-01-05 Microsoft Technology Licensing, Llc Adaptive retention for backup data
US8769138B2 (en) 2011-09-02 2014-07-01 Compuverde Ab Method for data retrieval from a distributed data storage system
US8997124B2 (en) 2011-09-02 2015-03-31 Compuverde Ab Method for updating data in a distributed data storage system
US9626378B2 (en) 2011-09-02 2017-04-18 Compuverde Ab Method for handling requests in a storage system and a storage node for a storage system
US9021053B2 (en) 2011-09-02 2015-04-28 Compuverde Ab Method and device for writing data to a data storage system comprising a plurality of data storage nodes
US8645978B2 (en) 2011-09-02 2014-02-04 Compuverde Ab Method for data maintenance
US8650365B2 (en) 2011-09-02 2014-02-11 Compuverde Ab Method and device for maintaining data in a data storage system comprising a plurality of data storage nodes
EP2728484A4 (en) * 2011-10-28 2015-06-03 Hitachi Ltd Storage system and object management method
US8495026B1 (en) * 2011-10-31 2013-07-23 Symantec Corporation Systems and methods for migrating archived files
US8595243B1 (en) * 2011-10-31 2013-11-26 Symantec Corporation Systems and methods for deduplicating archived data
GB2496377B (en) * 2011-11-02 2014-07-30 Ibm Message reconciliation during disaster recovery
WO2013102506A2 (en) 2012-01-02 2013-07-11 International Business Machines Corporation Method and system for backup and recovery
US10230566B1 (en) 2012-02-17 2019-03-12 F5 Networks, Inc. Methods for dynamically constructing a service principal name and devices thereof
US9020912B1 (en) 2012-02-20 2015-04-28 F5 Networks, Inc. Methods for accessing data in a compressed file system and devices thereof
US9244843B1 (en) 2012-02-20 2016-01-26 F5 Networks, Inc. Methods for improving flow cache bandwidth utilization and devices thereof
US9128862B2 (en) * 2012-02-23 2015-09-08 International Business Machines Corporation Efficient checksums for shared nothing clustered filesystems
KR101373461B1 (en) * 2012-02-24 2014-03-11 주식회사 팬택 Terminal and method for using cloud sevices
US9471578B2 (en) 2012-03-07 2016-10-18 Commvault Systems, Inc. Data storage system utilizing proxy device for storage operations
US9298715B2 (en) 2012-03-07 2016-03-29 Commvault Systems, Inc. Data storage system utilizing proxy device for storage operations
WO2013137878A1 (en) * 2012-03-15 2013-09-19 Hewlett-Packard Development Company, L.P. Accessing and replicating backup data objects
WO2013136339A1 (en) 2012-03-15 2013-09-19 Hewlett-Packard Development Company, L.P. Regulating replication operation
WO2013148096A1 (en) 2012-03-30 2013-10-03 Commvault Systems, Inc. Informaton management of mobile device data
US9628438B2 (en) 2012-04-06 2017-04-18 Exablox Consistent ring namespaces facilitating data storage and organization in network infrastructures
US9342537B2 (en) 2012-04-23 2016-05-17 Commvault Systems, Inc. Integrated snapshot interface for a data storage system
EP2853074B1 (en) 2012-04-27 2021-03-24 F5 Networks, Inc Methods for optimizing service of content requests and devices thereof
US10552385B2 (en) * 2012-05-20 2020-02-04 Microsoft Technology Licensing, Llc System and methods for implementing a server-based hierarchical mass storage system
US9298733B1 (en) * 2012-06-28 2016-03-29 Emc Corporation Storing files in a parallel computing system based on user or application specification
US10033837B1 (en) 2012-09-29 2018-07-24 F5 Networks, Inc. System and method for utilizing a data reducing module for dictionary compression of encoded data
US9578090B1 (en) 2012-11-07 2017-02-21 F5 Networks, Inc. Methods for provisioning application delivery service and devices thereof
US10379988B2 (en) 2012-12-21 2019-08-13 Commvault Systems, Inc. Systems and methods for performance monitoring
US20140181441A1 (en) * 2012-12-21 2014-06-26 Commvault Systems, Inc. Identifying files for multiple secondary copy operations using data obtained during backup of primary storage
US20140181042A1 (en) * 2012-12-26 2014-06-26 Kabushiki Kaisha Toshiba Information processor, distributed database system, and backup method
US9069799B2 (en) 2012-12-27 2015-06-30 Commvault Systems, Inc. Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system
US9262435B2 (en) 2013-01-11 2016-02-16 Commvault Systems, Inc. Location-based data synchronization management
US9886346B2 (en) 2013-01-11 2018-02-06 Commvault Systems, Inc. Single snapshot for multiple agents
US9002798B1 (en) * 2013-02-11 2015-04-07 Symantec Corporation Systems and methods for remedying corrupt backup images of host devices
US10375155B1 (en) 2013-02-19 2019-08-06 F5 Networks, Inc. System and method for achieving hardware acceleration for asymmetric flow connections
US9497614B1 (en) 2013-02-28 2016-11-15 F5 Networks, Inc. National traffic steering device for a better control of a specific wireless/LTE network
US8874527B2 (en) 2013-03-01 2014-10-28 Storagecraft Technology Corporation Local seeding of a restore storage for restoring a backup from a remote deduplication vault storage
US8738577B1 (en) 2013-03-01 2014-05-27 Storagecraft Technology Corporation Change tracking for multiphase deduplication
US8732135B1 (en) 2013-03-01 2014-05-20 Storagecraft Technology Corporation Restoring a backup from a deduplication vault storage
US8682870B1 (en) 2013-03-01 2014-03-25 Storagecraft Technology Corporation Defragmentation during multiphase deduplication
US20140250078A1 (en) * 2013-03-01 2014-09-04 Storagecraft Technology Corporation Multiphase deduplication
US10152500B2 (en) 2013-03-14 2018-12-11 Oracle International Corporation Read mostly instances
US9600365B2 (en) 2013-04-16 2017-03-21 Microsoft Technology Licensing, Llc Local erasure codes for data storage
US9552382B2 (en) 2013-04-23 2017-01-24 Exablox Corporation Reference counter integrity checking
FR3005363B1 (en) * 2013-05-02 2015-05-01 Bull Sas METHOD AND DEVICE FOR BACKING UP DATA IN COMPUTER INFRASTRUCTURE PROVIDING ACTIVITY RECOVERY FUNCTIONS
WO2014185918A1 (en) 2013-05-16 2014-11-20 Hewlett-Packard Development Company, L.P. Selecting a store for deduplicated data
US10496490B2 (en) 2013-05-16 2019-12-03 Hewlett Packard Enterprise Development Lp Selecting a store for deduplicated data
WO2014199197A1 (en) * 2013-06-11 2014-12-18 Yin Sheng Zhang A method, system and product for securely storing data files at a remote location by splitting and reassembling said files
JP2016526717A (en) 2013-06-12 2016-09-05 エグザブロックス・コーポレーション Hybrid garbage collection
EP3011428A4 (en) 2013-06-19 2017-02-22 Exablox Corporation Data scrubbing in cluster-based storage systems
US9110847B2 (en) * 2013-06-24 2015-08-18 Sap Se N to M host system copy
US9934242B2 (en) * 2013-07-10 2018-04-03 Exablox Corporation Replication of data between mirrored data sites
JP2015043142A (en) * 2013-08-26 2015-03-05 株式会社東芝 Distributed backup system
GB2518452A (en) * 2013-09-24 2015-03-25 Ibm Method for file recovery and client server system
US10248556B2 (en) 2013-10-16 2019-04-02 Exablox Corporation Forward-only paged data storage management where virtual cursor moves in only one direction from header of a session to data field of the session
US9767178B2 (en) 2013-10-30 2017-09-19 Oracle International Corporation Multi-instance redo apply
US10187317B1 (en) 2013-11-15 2019-01-22 F5 Networks, Inc. Methods for traffic rate control and devices thereof
US20150169609A1 (en) * 2013-12-06 2015-06-18 Zaius, Inc. System and method for load balancing in a data storage system
US9985829B2 (en) 2013-12-12 2018-05-29 Exablox Corporation Management and provisioning of cloud connected devices
US9753812B2 (en) 2014-01-24 2017-09-05 Commvault Systems, Inc. Generating mapping information for single snapshot for multiple applications
US9632874B2 (en) 2014-01-24 2017-04-25 Commvault Systems, Inc. Database application backup in single snapshot for multiple applications
US9495251B2 (en) 2014-01-24 2016-11-15 Commvault Systems, Inc. Snapshot readiness checking and reporting
US9639426B2 (en) 2014-01-24 2017-05-02 Commvault Systems, Inc. Single snapshot for multiple applications
US8751454B1 (en) 2014-01-28 2014-06-10 Storagecraft Technology Corporation Virtual defragmentation in a deduplication vault
US9830324B2 (en) 2014-02-04 2017-11-28 Exablox Corporation Content based organization of file systems
US9886490B1 (en) * 2014-03-17 2018-02-06 Numerify, Inc. Common extract store
USD857035S1 (en) 2014-04-11 2019-08-20 Johnson Controls Technology Company Display screen or portion thereof with graphical user interface
USD788785S1 (en) 2014-04-11 2017-06-06 Johnson Controls Technology Company Display having a graphical user interface
US9672165B1 (en) * 2014-05-21 2017-06-06 Veritas Technologies Llc Data management tier coupling primary storage and secondary storage
US10425480B2 (en) * 2014-06-26 2019-09-24 Hitachi Vantara Corporation Service plan tiering, protection, and rehydration strategies
US9547563B2 (en) * 2014-06-30 2017-01-17 Vmware, Inc. Recovery system and method for performing site recovery using replicated recovery-specific metadata
US20160011944A1 (en) * 2014-07-10 2016-01-14 International Business Machines Corporation Storage and recovery of data objects
US11838851B1 (en) 2014-07-15 2023-12-05 F5, Inc. Methods for managing L7 traffic classification and devices thereof
JP5991699B2 (en) * 2014-08-08 2016-09-14 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Information processing apparatus, information processing system, backup method, and program
US10042716B2 (en) 2014-09-03 2018-08-07 Commvault Systems, Inc. Consolidated processing of storage-array commands using a forwarder media agent in conjunction with a snapshot-control media agent
US9774672B2 (en) 2014-09-03 2017-09-26 Commvault Systems, Inc. Consolidated processing of storage-array commands by a snapshot-control media agent
US9558078B2 (en) 2014-10-28 2017-01-31 Microsoft Technology Licensing, Llc Point in time database restore from storage snapshots
US10303556B1 (en) * 2014-10-29 2019-05-28 Veritas Technologies Llc Modifiable volume snapshots
US9648105B2 (en) 2014-11-14 2017-05-09 Commvault Systems, Inc. Unified snapshot storage management, using an enhanced storage manager and enhanced media agents
US9448731B2 (en) 2014-11-14 2016-09-20 Commvault Systems, Inc. Unified snapshot storage management
US10002058B1 (en) * 2014-11-26 2018-06-19 Intuit Inc. Method and system for providing disaster recovery services using elastic virtual computing resources
US10311153B2 (en) 2014-11-28 2019-06-04 Nasuni Corporation Versioned file system with global lock
US10182013B1 (en) 2014-12-01 2019-01-15 F5 Networks, Inc. Methods for managing progressive image delivery and devices thereof
WO2016100545A1 (en) * 2014-12-16 2016-06-23 Noderprime, Inc. Computer servers for datacenter managment
US9892153B2 (en) 2014-12-19 2018-02-13 Oracle International Corporation Detecting lost writes
US9898213B2 (en) 2015-01-23 2018-02-20 Commvault Systems, Inc. Scalable auxiliary copy processing using media agent resources
US9904481B2 (en) 2015-01-23 2018-02-27 Commvault Systems, Inc. Scalable auxiliary copy processing in a storage management system using media agent resources
US11895138B1 (en) 2015-02-02 2024-02-06 F5, Inc. Methods for improving web scanner accuracy and devices thereof
US9928144B2 (en) 2015-03-30 2018-03-27 Commvault Systems, Inc. Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage
US10834065B1 (en) 2015-03-31 2020-11-10 F5 Networks, Inc. Methods for SSL protected NTLM re-authentication and devices thereof
US10505818B1 (en) 2015-05-05 2019-12-10 F5 Networks. Inc. Methods for analyzing and load balancing based on server health and devices thereof
US11350254B1 (en) 2015-05-05 2022-05-31 F5, Inc. Methods for enforcing compliance policies and devices thereof
US9606854B2 (en) * 2015-08-13 2017-03-28 At&T Intellectual Property I, L.P. Insider attack resistant system and method for cloud services integrity checking
US10474654B2 (en) 2015-08-26 2019-11-12 Storagecraft Technology Corporation Structural data transfer over a network
US10101913B2 (en) 2015-09-02 2018-10-16 Commvault Systems, Inc. Migrating data to disk without interrupting running backup operations
US10452680B1 (en) 2015-09-25 2019-10-22 Amazon Technologies, Inc. Catch-up replication with log peer
US9733869B1 (en) 2015-09-25 2017-08-15 Amazon Technologies, Inc. Provisioning a slave for data storage using metadata with updated references
US9753813B1 (en) 2015-09-25 2017-09-05 Amazon Technologies, Inc. Data replication snapshots for persistent storage using operation numbers
WO2017070480A1 (en) * 2015-10-22 2017-04-27 SoftNAS, LLC Synchronization storage solution after an offline event
US10747752B2 (en) 2015-10-23 2020-08-18 Oracle International Corporation Space management for transactional consistency of in-memory objects on a standby database
US11657037B2 (en) 2015-10-23 2023-05-23 Oracle International Corporation Query execution against an in-memory standby database
US11757946B1 (en) 2015-12-22 2023-09-12 F5, Inc. Methods for analyzing network traffic and enforcing network policies and devices thereof
US10102084B1 (en) * 2015-12-23 2018-10-16 Github, Inc. Decoupled maintenance and repository synchronization error detection
US10289693B2 (en) * 2015-12-30 2019-05-14 Dropbox, Inc. Techniques for providing user interface enhancements for online content management system version histories
US10404698B1 (en) 2016-01-15 2019-09-03 F5 Networks, Inc. Methods for adaptive organization of web application access points in webtops and devices thereof
US11178150B1 (en) 2016-01-20 2021-11-16 F5 Networks, Inc. Methods for enforcing access control list based on managed application and devices thereof
US10503753B2 (en) 2016-03-10 2019-12-10 Commvault Systems, Inc. Snapshot replication operations based on incremental block change tracking
US10482062B1 (en) * 2016-03-30 2019-11-19 Amazon Technologies, Inc. Independent evictions from datastore accelerator fleet nodes
US9846553B2 (en) 2016-05-04 2017-12-19 Exablox Corporation Organization and management of key-value stores
US10713284B2 (en) * 2016-07-06 2020-07-14 Sap Se Platform-based data segregation
US10698771B2 (en) 2016-09-15 2020-06-30 Oracle International Corporation Zero-data-loss with asynchronous redo shipping to a standby database
US10412198B1 (en) 2016-10-27 2019-09-10 F5 Networks, Inc. Methods for improved transmission control protocol (TCP) performance visibility and devices thereof
US10891291B2 (en) 2016-10-31 2021-01-12 Oracle International Corporation Facilitating operations on pluggable databases using separate logical timestamp services
US11063758B1 (en) 2016-11-01 2021-07-13 F5 Networks, Inc. Methods for facilitating cipher selection and devices thereof
US10505792B1 (en) 2016-11-02 2019-12-10 F5 Networks, Inc. Methods for facilitating network traffic analytics and devices thereof
US11475006B2 (en) 2016-12-02 2022-10-18 Oracle International Corporation Query and change propagation scheduling for heterogeneous database systems
JP2018092404A (en) * 2016-12-05 2018-06-14 富士ゼロックス株式会社 File management device and program
US10812266B1 (en) 2017-03-17 2020-10-20 F5 Networks, Inc. Methods for managing security tokens based on security violations and devices thereof
US11010261B2 (en) 2017-03-31 2021-05-18 Commvault Systems, Inc. Dynamically allocating streams during restoration of data
US11343237B1 (en) 2017-05-12 2022-05-24 F5, Inc. Methods for managing a federated identity environment using security and access control data and devices thereof
US11122042B1 (en) 2017-05-12 2021-09-14 F5 Networks, Inc. Methods for dynamically managing user access control and devices thereof
US10691722B2 (en) 2017-05-31 2020-06-23 Oracle International Corporation Consistent query execution for big data analytics in a hybrid database
CN108984335B (en) * 2017-06-02 2022-04-29 伊姆西Ip控股有限责任公司 Method and system for backing up and restoring data
US10635632B2 (en) 2017-08-29 2020-04-28 Cohesity, Inc. Snapshot archive management
US10719484B2 (en) * 2017-09-07 2020-07-21 Cohesity, Inc. Remotely mounted file system with stubs
US11874805B2 (en) 2017-09-07 2024-01-16 Cohesity, Inc. Remotely mounted file system with stubs
US11321192B2 (en) 2017-09-07 2022-05-03 Cohesity, Inc. Restoration of specified content from an archive
US10742735B2 (en) 2017-12-12 2020-08-11 Commvault Systems, Inc. Enhanced network attached storage (NAS) services interfacing to cloud storage
US11223689B1 (en) 2018-01-05 2022-01-11 F5 Networks, Inc. Methods for multipath transmission control protocol (MPTCP) based session migration and devices thereof
US10740022B2 (en) 2018-02-14 2020-08-11 Commvault Systems, Inc. Block-level live browsing and private writable backup copies using an ISCSI server
US10846183B2 (en) * 2018-06-11 2020-11-24 Dell Products, L.P. Method and apparatus for ensuring data integrity in a storage cluster with the use of NVDIMM
US10564897B1 (en) * 2018-07-30 2020-02-18 EMC IP Holding Company LLC Method and system for creating virtual snapshots using input/output (I/O) interception
CN109032849B (en) * 2018-08-30 2021-03-23 百度在线网络技术(北京)有限公司 Hot backup system, hot backup method and computer equipment
JP7020384B2 (en) * 2018-11-29 2022-02-16 日本電信電話株式会社 Application operation control device, application operation control method, and application operation control program
US11042318B2 (en) 2019-07-29 2021-06-22 Commvault Systems, Inc. Block-level data replication
US11308043B2 (en) * 2019-11-13 2022-04-19 Salesforce.Com, Inc. Distributed database replication
US11507622B2 (en) 2020-03-25 2022-11-22 The Toronto-Dominion Bank System and method for automatically managing storage resources of a big data platform
US11487703B2 (en) 2020-06-10 2022-11-01 Wandisco Inc. Methods, devices and systems for migrating an active filesystem
US11249892B2 (en) * 2020-07-01 2022-02-15 The Airgap Inc. Methods and systems for backup management
US11487701B2 (en) 2020-09-24 2022-11-01 Cohesity, Inc. Incremental access requests for portions of files from a cloud archival storage tier
US11340998B1 (en) * 2020-12-31 2022-05-24 Verified Backups LLC Systems and methods for providing backup storage and verifying the integrity of backup files
JP1697161S (en) * 2021-02-26 2021-10-18
US20220398217A1 (en) * 2021-06-10 2022-12-15 EMC IP Holding Company, LLC System and Method for Snapshot Rule Time Zone Value
US11593223B1 (en) 2021-09-02 2023-02-28 Commvault Systems, Inc. Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants
WO2023146532A1 (en) * 2022-01-28 2023-08-03 Jpmorgan Chase Bank, N.A. Method and system for managing bi-temporal data
US11899686B2 (en) 2022-01-28 2024-02-13 Jpmorgan Chase Bank, N.A. Method and system for managing bi-temporal data
US11809285B2 (en) 2022-02-09 2023-11-07 Commvault Systems, Inc. Protecting a management database of a data storage management system to meet a recovery point objective (RPO)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5852713A (en) * 1994-10-19 1998-12-22 Shannon; John P. Computer data file backup system
US6088694A (en) * 1998-03-31 2000-07-11 International Business Machines Corporation Continuous availability and efficient backup for externally referenced objects
US6393516B2 (en) * 1998-12-23 2002-05-21 At&T Corporation System and method for storage media group parity protection

Family Cites Families (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4843633A (en) * 1986-02-18 1989-06-27 Motorola, Inc. Interface method and apparatus for a cellular system site controller
US5276867A (en) * 1989-12-19 1994-01-04 Epoch Systems, Inc. Digital data storage system with improved data migration
US5307481A (en) * 1990-02-28 1994-04-26 Hitachi, Ltd. Highly reliable online system
US5155845A (en) * 1990-06-15 1992-10-13 Storage Technology Corporation Data storage system for providing redundant copies of data on different disk drives
US5544347A (en) * 1990-09-24 1996-08-06 Emc Corporation Data storage system controlled remote data mirroring with respectively maintained data indices
US5633999A (en) * 1990-11-07 1997-05-27 Nonstop Networks Limited Workstation-implemented data storage re-routing for server fault-tolerance on computer networks
US5347653A (en) 1991-06-28 1994-09-13 Digital Equipment Corporation System for reconstructing prior versions of indexes using records indicating changes between successive versions of the indexes
US5857112A (en) * 1992-09-09 1999-01-05 Hashemi; Ebrahim System for achieving enhanced performance and data availability in a unified redundant array of disk drives by using user defined partitioning and level of redundancy
WO1994018634A1 (en) * 1993-02-01 1994-08-18 Lsc, Inc. Archiving file system for data servers in a distributed network environment
US5991753A (en) * 1993-06-16 1999-11-23 Lachman Technology, Inc. Method and system for computer file management, including file migration, special handling, and associating extended attributes with files
CA2178213C (en) * 1993-12-10 2005-06-28 Peter Bryan Malcolm Incremental backup system
US5537585A (en) * 1994-02-25 1996-07-16 Avail Systems Corporation Data storage management for network interconnected processors
US5574906A (en) 1994-10-24 1996-11-12 International Business Machines Corporation System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing
US5659614A (en) 1994-11-28 1997-08-19 Bailey, Iii; John E. Method and system for creating and storing a backup copy of file data stored on a computer
US5564037A (en) * 1995-03-29 1996-10-08 Cheyenne Software International Sales Corp. Real time data migration system and method employing sparse files
GB9506501D0 (en) * 1995-03-30 1995-05-17 Int Computers Ltd Incremental disk backup
US5561037A (en) * 1995-04-26 1996-10-01 Eastman Kodak Company Photographic elements containing magenta dye forming couplers and fade reducing compounds
US5757669A (en) * 1995-05-31 1998-05-26 Netscape Communications Corporation Method and apparatus for workgroup information replication
US5799141A (en) * 1995-06-09 1998-08-25 Qualix Group, Inc. Real-time data protection system and method
US5592432A (en) * 1995-09-05 1997-01-07 Emc Corp Cache management system using time stamping for replacement queue
US5778395A (en) * 1995-10-23 1998-07-07 Stac, Inc. System for backing up files from disk volumes on multiple nodes of a computer network
US6366930B1 (en) * 1996-04-12 2002-04-02 Computer Associates Think, Inc. Intelligent data inventory & asset management systems method and apparatus
KR970076238A (en) * 1996-05-23 1997-12-12 포만 제프리 엘 Servers, methods and program products thereof for creating and managing multiple copies of client data files
US5919247A (en) * 1996-07-24 1999-07-06 Marimba, Inc. Method for the distribution of code and data updates
US5893919A (en) * 1996-09-27 1999-04-13 Storage Computer Corporation Apparatus and method for storing data with selectable data protection using mirroring and selectable parity inhibition
FR2754926B1 (en) * 1996-10-23 1998-11-20 Schlumberger Ind Sa METHOD FOR MANAGING DATA INTEGRITY FAULTS IN A REWRITE MEMORY
US5966730A (en) * 1996-10-30 1999-10-12 Dantz Development Corporation Backup system for computer network incorporating opportunistic backup by prioritizing least recently backed up computer or computer storage medium
JP3133004B2 (en) * 1996-11-21 2001-02-05 株式会社日立製作所 Disk array device and control method therefor
JP3409983B2 (en) * 1996-11-29 2003-05-26 富士通株式会社 Communications system
US5960169A (en) * 1997-02-27 1999-09-28 International Business Machines Corporation Transformational raid for hierarchical storage management system
US6073209A (en) * 1997-03-31 2000-06-06 Ark Research Corporation Data storage controller providing multiple hosts with access to multiple storage subsystems
EP0899662A1 (en) * 1997-08-29 1999-03-03 Hewlett-Packard Company Backup and restore system for a computer network
US6587217B1 (en) * 1997-09-15 2003-07-01 International Business Machines Corporation Method for organizing files in a library in a network printing system
US5974574A (en) 1997-09-30 1999-10-26 Tandem Computers Incorporated Method of comparing replicated databases using checksum information
US6516356B1 (en) * 1997-09-30 2003-02-04 International Business Machines Corporation Application interface to a media server and a method of implementing the same
US6704838B2 (en) 1997-10-08 2004-03-09 Seagate Technology Llc Hybrid data storage and reconstruction system and method for a data storage device
DE19882831T1 (en) * 1997-11-17 2001-03-22 Seagate Technology Method and dedicated frame buffers for receiving frames
JPH11164128A (en) * 1997-11-28 1999-06-18 Olympus Optical Co Ltd Device for forming still image with sound code image
US6023709A (en) * 1997-12-15 2000-02-08 International Business Machines Corporation Automated file error classification and correction in a hierarchical storage management system
US6202070B1 (en) * 1997-12-31 2001-03-13 Compaq Computer Corporation Computer manufacturing system architecture with enhanced software distribution functions
AU3304699A (en) * 1998-02-20 1999-09-06 Storm Systems Llc File system performance enhancement
US6304882B1 (en) * 1998-05-05 2001-10-16 Informix Software, Inc. Data replication system and method
US6163856A (en) 1998-05-29 2000-12-19 Sun Microsystems, Inc. Method and apparatus for file system disaster recovery
US6330572B1 (en) * 1998-07-15 2001-12-11 Imation Corp. Hierarchical data storage management
US6272649B1 (en) * 1998-09-28 2001-08-07 Apple Computer, Inc. Method and system for ensuring cache file integrity
US6453339B1 (en) * 1999-01-20 2002-09-17 Computer Associates Think, Inc. System and method of presenting channelized data
US6446175B1 (en) * 1999-07-28 2002-09-03 Storage Technology Corporation Storing and retrieving data on tape backup system located at remote storage system site
US6490666B1 (en) * 1999-08-20 2002-12-03 Microsoft Corporation Buffering data in a hierarchical data storage environment
US6460054B1 (en) * 1999-12-16 2002-10-01 Adaptec, Inc. System and method for data storage archive bit update after snapshot backup
US6560615B1 (en) * 1999-12-17 2003-05-06 Novell, Inc. Method and apparatus for implementing a highly efficient, robust modified files list (MFL) for a storage system volume
US6615219B1 (en) * 1999-12-29 2003-09-02 Unisys Corporation Database management system and method for databases having large objects
GB0002019D0 (en) * 2000-01-29 2000-03-22 Ibm Data migration tool
US6643795B1 (en) * 2000-03-30 2003-11-04 Hewlett-Packard Development Company, L.P. Controller-based bi-directional remote copy system with storage site failover capability
US6658048B1 (en) * 2000-04-07 2003-12-02 Nokia Mobile Phones, Ltd. Global positioning system code phase detector with multipath compensation and method for reducing multipath components associated with a received signal
US20020055972A1 (en) * 2000-05-08 2002-05-09 Weinman Joseph Bernard Dynamic content distribution and data continuity architecture
US6990606B2 (en) * 2000-07-28 2006-01-24 International Business Machines Corporation Cascading failover of a data management application for shared disk file systems in loosely coupled node clusters
GB2365556B (en) * 2000-08-04 2005-04-27 Hewlett Packard Co Gateway device for remote file server services
US7272613B2 (en) 2000-10-26 2007-09-18 Intel Corporation Method and system for managing distributed content and related metadata
ATE361500T1 (en) * 2000-12-15 2007-05-15 Ibm METHOD AND SYSTEM FOR SCALABLE, HIGH-PERFORMANCE HIERARCHICAL STORAGE MANAGEMENT
US6839721B2 (en) * 2001-01-12 2005-01-04 Hewlett-Packard Development Company, L.P. Integration of a database into file management software for protecting, tracking, and retrieving data
US6920447B2 (en) * 2001-02-15 2005-07-19 Microsoft Corporation Concurrent data recall in a hierarchical storage environment using plural queues
US6950833B2 (en) * 2001-06-05 2005-09-27 Silicon Graphics, Inc. Clustered filesystem
US20030023933A1 (en) * 2001-07-27 2003-01-30 Sun Microsystems, Inc. End-to-end disk data checksumming
US7092977B2 (en) * 2001-08-31 2006-08-15 Arkivio, Inc. Techniques for storing data based upon storage policies
US20040054656A1 (en) * 2001-08-31 2004-03-18 Arkivio, Inc. Techniques for balancing capacity utilization in a storage environment
US20030182328A1 (en) * 2001-10-29 2003-09-25 Jules Paquette Apparatus and method for sharing data between multiple, remote sites of a data network
US6904547B2 (en) * 2002-01-04 2005-06-07 Sun Microsystems, Inc Method and apparatus for facilitating validation of data retrieved from disk
US6948089B2 (en) * 2002-01-10 2005-09-20 Hitachi, Ltd. Apparatus and method for multiple generation remote backup and fast restore
US20040049513A1 (en) * 2002-08-30 2004-03-11 Arkivio, Inc. Techniques for moving stub files without recalling data
US20040083202A1 (en) * 2002-08-30 2004-04-29 Arkivio, Inc. Techniques to control recalls in storage management applications
US7925623B2 (en) * 2002-09-10 2011-04-12 Exagrid Systems, Inc. Method and apparatus for integrating primary data storage with local and remote data protection
US6778395B1 (en) * 2003-02-07 2004-08-17 Hon Hai Precision Ind. Co., Ltd. Heat sink clip
WO2004109663A2 (en) * 2003-05-30 2004-12-16 Arkivio, Inc. Techniques for facilitating backup and restore of migrated files

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5852713A (en) * 1994-10-19 1998-12-22 Shannon; John P. Computer data file backup system
US6088694A (en) * 1998-03-31 2000-07-11 International Business Machines Corporation Continuous availability and efficient backup for externally referenced objects
US6393516B2 (en) * 1998-12-23 2002-05-21 At&T Corporation System and method for storage media group parity protection

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7487386B2 (en) 2005-03-30 2009-02-03 International Business Machines Corporation Method for increasing file system availability via block replication
US9280259B2 (en) 2013-07-26 2016-03-08 Blackberry Limited System and method for manipulating an object in a three-dimensional desktop environment
US9390598B2 (en) 2013-09-11 2016-07-12 Blackberry Limited Three dimensional haptics hybrid modeling
US9704358B2 (en) 2013-09-11 2017-07-11 Blackberry Limited Three dimensional haptics hybrid modeling
US11308050B2 (en) * 2019-11-15 2022-04-19 Bank Of America Corporation Conversion mechanism for complex cohabitation databases

Also Published As

Publication number Publication date
US7925623B2 (en) 2011-04-12
DE60328796D1 (en) 2009-09-24
EP1537496A1 (en) 2005-06-08
US7246140B2 (en) 2007-07-17
JP2005538469A (en) 2005-12-15
ATE400026T1 (en) 2008-07-15
WO2004025498A1 (en) 2004-03-25
EP1537496A4 (en) 2006-11-02
CA2497825A1 (en) 2004-03-25
AU2003273312A1 (en) 2004-04-30
EP1540478A4 (en) 2007-05-02
EP1540478A1 (en) 2005-06-15
EP1540510B1 (en) 2009-08-12
CA2497625A1 (en) 2004-03-25
DE60321927D1 (en) 2008-08-14
ATE439636T1 (en) 2009-08-15
EP1540510A1 (en) 2005-06-15
AU2003278779A1 (en) 2004-04-30
WO2004025404A9 (en) 2004-09-30
WO2004025470A1 (en) 2004-03-25
EP1540510A4 (en) 2006-11-08
EP1540441B1 (en) 2008-07-02
WO2004025404A2 (en) 2004-03-25
ATE429678T1 (en) 2009-05-15
DE60321930D1 (en) 2008-08-14
ATE400027T1 (en) 2008-07-15
US7246275B2 (en) 2007-07-17
US20040088331A1 (en) 2004-05-06
WO2004025404A3 (en) 2004-06-24
DE60327329D1 (en) 2009-06-04
CA2497305A1 (en) 2004-03-25
US20040093555A1 (en) 2004-05-13
CA2497306A1 (en) 2004-03-25
AU2003268572A1 (en) 2004-04-30
US20040093361A1 (en) 2004-05-13
AU2003282795A1 (en) 2004-04-30
US20040088382A1 (en) 2004-05-06
US7593966B2 (en) 2009-09-22
EP1540441A2 (en) 2005-06-15
EP1540478B1 (en) 2009-04-22
EP1537496B1 (en) 2008-07-02
JP2005538470A (en) 2005-12-15
JP2005538471A (en) 2005-12-15
EP1540441A4 (en) 2006-11-02
JP2005538467A (en) 2005-12-15

Similar Documents

Publication Publication Date Title
US7925623B2 (en) Method and apparatus for integrating primary data storage with local and remote data protection
EP1796002A2 (en) Method and apparatus for efficiently storing and managing historical versions and replicas of computer data files
US7069401B1 (en) Management of frozen images
US6871271B2 (en) Incrementally restoring a mass storage device to a prior state
JP4807992B2 (en) Synthetic backup and restore methods and systems
US7490207B2 (en) System and method for performing auxillary storage operations
US7827366B1 (en) Method and system for providing continuous and long-term data protection for a dataset in a storage system
US10140188B2 (en) Snapshot management
EP1349089A2 (en) System and method for managing a plurality of snapshots of a file system
CA2632935A1 (en) Systems and methods for performing data replication

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2003755811

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2497306

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2003273312

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 2004536447

Country of ref document: JP

WWP Wipo information: published in national office

Ref document number: 2003755811

Country of ref document: EP