Patent application number | Description | Published |
20080275923 | METHOD FOR THE EXPUNGEMENT OF BACKUP VERSIONS OF FILES ON SERVER TARGETS THAT ARE CONFIGURED TO BE UPDATED SEQUENTIALLY - The present invention relates to a method for expunging backup versions of files that are stored at target servers, wherein the target servers are configured to be sequentially updated. The method comprises uploading a predetermined base file to a backup target server from a backup client, uploading a plurality of delta files to the backup target server from the backup client, and determining the chronological order in which the delta riles were uploaded to the backup target server. The method further comprises determining a set of chronologically oldest delta files, downloading the set of chronologically oldest delta files to the backup client, and merging the downloaded chronologically oldest delta files into a single delta file. Yet further, the method comprises uploading the merged delta file to the target server, and deleting the determined set of chronologically oldest delta files at the target server. | 11-06-2008 |
20110016095 | Integrated Approach for Deduplicating Data in a Distributed Environment that Involves a Source and a Target - One aspect of the present invention includes a configuration of a storage management system that enables the performance of deduplication activities at both the client (source) and at the server (target) locations. The location of deduplication operations can then be optimized based on system conditions or predefined policies. In one embodiment, seamless switching of deduplication activities between the client and the server is enabled by utilizing uniform deduplication process algorithms and accessing the same deduplication index (containing information on the hashed data chunks). Additionally, any data transformations on the chunks are performed subsequent to identification of the data chunks. Accordingly, with use of this storage configuration, the storage system can find and utilize matching chunks generated with either client- or server-side deduplication. | 01-20-2011 |
20110040732 | APPROACH FOR SECURING DISTRIBUTED DEDUPLICATION SOFTWARE - The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system. | 02-17-2011 |
20110218969 | APPROACH FOR OPTIMIZING RESTORES OF DEDUPLICATED DATA - Various techniques for improving the performance of restoring deduplicated data files from a server to a client within a storage management system are disclosed. In one embodiment, a chunk index is maintained on the client that tracks the chunks remaining on the client for each data file that is stored to and restored from the storage server. When a specific file is selected for restore from the storage server to the client, the client determines if any local copies of this specific file's chunks are stored in files already existing on the client data store. The file is then reconstructed from a combination of these local copies of the file chunks and chunks retrieved from the storage server. Therefore, only chunks that are not stored or are inaccessible to the client are retrieved from the server, reducing server-side processing requirements and the bandwidth required for data restore operations. | 09-08-2011 |
20110231854 | Method and Infrastructure for Optimizing the Utilization of Computer System's Resources - The present invention optimizes the utilization of computer system resources by considering predefined performance targets of multithreaded applications using the resources. The performance and utilization information for a set of multithreaded applications is provided. Using the performance and utilization information, the invention determines overutilized resources. Using the performance information, the invention also identifies threads and corresponding applications using an overutilized resource. The priority of the identified threads using said overutilized resource is adjusted to maximise a number of applications meeting their performance targets. The adjustments of priorities are executed via a channel that provides the performance and utilization information. | 09-22-2011 |
20120158664 | RESTORING DATA OBJECTS FROM SEQUENTIAL BACKUP DEVICES - Provided are computer program product, system, and method for restoring deduplicated data objects from sequential backup devices. A server stores data objects of extents having deduplicated data in the at least one sequential backup device. The server receives from a client a request for data objects. The server determines extents stored in the at least one sequential backup device for the requested data objects. The server or client sorts the extents according to an order in which they are stored in the at least one sequential backup device to generate a sort list. The server retrieves the extents from the at least one sequential backup device according to the order in the sort list to access the extents sequentially from the sequential backup device in the order in which they were stored. The server returns the retrieved extents to the client and the client reconstructs the requested data objects from the received extents. | 06-21-2012 |
20120158666 | RESTORING A RESTORE SET OF FILES FROM BACKUP OBJECTS STORED IN SEQUENTIAL BACKUP DEVICES - Provided are a computer program product, system, and method for restoring a restore set of files from backup objects stored in sequential backup devices. Backup objects are stored in at least one sequential backup device. A client initiates a restore request to restore a restore set of data in a volume as of a restore point-in-time. A determination is made of backup objects stored in at least one sequential backup device including the restore set of data for the restore point-in-time, wherein the determined backup objects are determined from a set of backup objects including a full volume backup and delta backups providing data in the volume at different points-in-time, and wherein extents in different backup objects providing data for blocks in the volume at different points-in-time are not stored contiguously in the sequential backup device. A determination is made of extents stored in the at least one sequential backup device for the determined backup objects. The determined extents are sorted according to an order in which they are stored in the at least one sequential backup device to generate a sort list. The extents are retrieved from the at least one sequential backup device according to the order in the sort list to access the extents sequentially from the sequential backup device in the order in which they were stored. The retrieved extents are returned to the client and the client reconstructs the restore data set from the received extents. | 06-21-2012 |
20120215742 | DATA RETENTION USING LOGICAL OBJECTS - Various embodiments are provided for facilitation of data retention using logical objects. Following an operation creating a redundant copy of the data performed on a scheduled interval, a logical object containing a number of managed file versions, represented by a number of member objects for a recovery point, is created. The logical object is assigned a policy of a data retention policy construct associated with the recovery point. The logical object is adapted for reassignment between policies of the data retention policy construct associated with various recovery points. During the reassignment, the plurality of member objects representing the plurality of managed file versions are logically retained instead of performing a data copy operation to associate the plurality of managed file versions with another recovery point. | 08-23-2012 |
20120233131 | RESTORING DATA OBJECTS FROM SEQUENTIAL BACKUP DEVICES - Provided are computer program product, system, and method for restoring deduplicated data objects from sequential backup devices. A server stores data objects of extents having deduplicated data in the at least one sequential backup device. The server receives from a client a request for data objects. The server determines extents stored in the at least one sequential backup device for the requested data objects. The server or client sorts the extents according to an order in which they are stored in the at least one sequential backup device to generate a sort list. The server retrieves the extents from the at least one sequential backup device according to the order in the sort list to access the extents sequentially from the sequential backup device in the order in which they were stored. The server returns the retrieved extents to the client and the client reconstructs the requested data objects from the received extents. | 09-13-2012 |
20130101113 | ENCRYPTING DATA OBJECTS TO BACK-UP - Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store. | 04-25-2013 |
20130103945 | ENCRYPTING DATA OBJECTS TO BACK-UP - Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store. | 04-25-2013 |
20130144840 | OPTIMIZING RESTORES OF DEDUPLICATED DATA - For restoring deduplicated data, a method maintains a chunk index on a client computing system coupled to a client data store. The chunk index tracks chunks within files remaining on the client data store after storage of the files to a deduplicated server data store coupled to a server computing system. The method determines whether a valid entry for a first chunk exists in the chunk index. In addition, the method retrieves the first chunk from the server data store responsive to determining the valid entry for the first chunk does not exist in the chunk index. The method further retrieves the first chunk from the client data store specified in the valid entry of the chunk index responsive to determining that the valid entry exists in the chunk index and the first chunk resides in a first file at a first offset. | 06-06-2013 |
20130325810 | CREATION AND EXPIRATION OF BACKUP OBJECTS IN BLOCK-LEVEL INCREMENTAL-FOREVER BACKUP SYSTEMS - Embodiments of the present invention provide a scalable, efficient way to backup data in a block-level incremental-forever backup system such that backup and expiration of data can be achieved at the granularity of a single backup version, without having to read or move data that is stored in backup storage. | 12-05-2013 |
20130326529 | Optimizing the utilization of computer system's resources - The present invention optimizes the utilization of computer system resources by considering predefined performance targets of multithreaded applications using the resources. The performance and utilization information for a set of multithreaded applications is provided. Using the performance and utilization information, the invention determines overutilized resources. Using the performance information, the invention also identifies threads and corresponding applications using an overutilized resource. The priority of the identified threads using said overutilized resource is adjusted to maximise a number of applications meeting their performance targets. The adjustments of priorities are executed via a channel that provides the performance and utilization information. | 12-05-2013 |
20140281257 | Caching Backed-Up Data Locally Until Successful Replication - A mechanism is provided for caching backed-up data locally until successful replication of the backed-up data. Responsive to an indication to back up one or more pieces of identified data from a local storage device, a determination is made as to whether a primary storage device is available. Responsive to the primary storage device being available, the one or more pieces of identified data are backed up to the primary storage device and a local replication cache. Responsive to the backed-up data being replicated from the primary storage device to a secondary storage device, the backed-up data is removed from the local replication cache. | 09-18-2014 |
Patent application number | Description | Published |
20080281881 | RECONCILIATION OF LOCAL AND REMOTE BACKUP DATA - Provided are a system, an article of manufacture, and a computer program product, wherein a first set of backup data is stored in a first computational device and a second set of backup data is stored in a second computational device. Metadata corresponding to the first set of backup data is maintained in the second computational device. The first set of backup data is reconciled with the second set of backup data based on the metadata. | 11-13-2008 |
20090063430 | ARTICLE OF MANUFACTURE AND SYSTEM FOR MERGING METADATA ON FILES IN A BACKUP STORAGE - Provided are a system and article of manufacture for merging metadata on files in a backup storage. A query is received for information on files from a file system for a client node. A determination is made of metadata for files in a backup storage for the client node stored external to backup sets. At least one backup set in the backup storage for the client node is processed to determine metadata for files included in at least one backup set. The determined metadata for files in the backup storage and for files included in at least one backup set is merged to form merged metadata. The query is executed against the merged metadata to determine files whose metadata satisfies the query. Results including information from the merged metadata on the determined files are returned. | 03-05-2009 |
20090119354 | METHOD, SYSTEM, AND PROGRAM IMPLEMENTING RETENTION POLICIES TO ARCHIVE RECORDS - Provided are a method, system, and program for receiving a request to remove a record. A determination is made as to whether a state associated with the record includes at least one hold state and whether the state associated with the record includes at least a retention period that has not expired. The request to remove the record is denied in response to determining that the state associated with the record includes at least one of at least one hold state and one retention period that has not expired. | 05-07-2009 |
20100263030 | METHOD FOR ESTABLISHING AN AGENCY RELATIONSHIP TO PERFORM DELEGATED COMPUTING TASKS - A method is disclosed for establishing an agency relationship to perform delegated computing tasks. The method provides for initiation of the agency relationship, establishment of credentials to perform a delegated computing task, and performance of the delegated computing task. Benefits of establishing an agency relationship in a computing environment include improved security, efficiency, and reliability in performing delegated computing tasks. | 10-14-2010 |
20100306178 | SEPARATING FILE DATA STREAMS TO ENHANCE PROGRESSIVE INCREMENTAL PROCESSING - Systems, methods, and computer products for separating file data streams for improved progressive incremental processing are provided. The method comprises identifying data in a file, prior to transmission of the data in a data stream to a second system, such that the second system can distinguish first data from second data in the file. The method further comprises processing the first and second data to determine whether the first or second data has changed, and transmitting the first data to the second system in response to determining the first data has changed, so that the first data is stored in a data storage medium in association with third and fourth data previously stored without replacing the third data and fourth data, wherein the third and fourth data comprise older versions of the first and second data, respectively. | 12-02-2010 |
20120041927 | PERFORMING SCHEDULED BACKUPS OF A BACKUP NODE ASSOCIATED WITH A PLURALITY OF AGENT NODES - Provided are a system and article of manufacture for performing scheduled backups of a backup node associated with a plurality of agent nodes. Backup data sets on at least one machine in a network are associated with a backup node and a plurality of agent nodes in the network are associated with the backup node. The agent nodes are associated with machines in the network capable of backing up the backup data sets associated with the backup node. A schedule indicating a scheduled backup to backup scheduled data sets associated with the backup node is processed. At least one of the agent nodes is contacted to request the at least one agent node to perform the scheduled backup and backup the scheduled data sets, wherein the at least one contacted agent node performs the scheduled backup to backup the scheduled backup sets. | 02-16-2012 |
Patent application number | Description | Published |
20090216727 | Viewer User Interface - Systems and methods for displaying media and associated information are disclosed. A hybrid user interface may include aspects of push and pull interfaces. In some embodiments, media may be characterized by parameters and values for the parameters. Parameters and values may be associated with a user's interests, and a user may identify media by searching for media using one or more preferred values of parameters of interest. In some cases, media are presented to a user. Presented media may share values for parameters associated with the user's interests. Certain embodiments deliver (e.g., play) items of media content. | 08-27-2009 |
20110291969 | Apparatus and Method for Right/Left Hand Orientation of a Dual Panel Electronic Device - An electronic device includes a processor, a first touch screen displaying a page for reading and a second touch screen displaying a pad for writing. An object transition module is executed by the processor. The object transition module includes executable instructions to detect a rotational input applied to the pad. The pad is rotated in accordance with the rotational input, while the original orientation of the page is maintained. | 12-01-2011 |
20110296344 | Apparatus and Method for Digital Content Navigation - An electronic device includes a processor, a memory for storing digital content and a display. The processor forms a content navigation bar for the digital content. The content navigation bar is rendered on the display and includes a first section marker corresponding to a first section of the digital content. A set of page markers corresponds to pages within the first section of the digital content. The set of page markers includes a boundary page marker. A second section marker is adjacent to the boundary page marker. | 12-01-2011 |
20120254308 | Apparatus and Method for Augmenting Digital Educational Content with Social Learning Tools - A non-transitory computer readable storage medium includes executable instructions to display electronic content, associate a subset of the electronic content with a comment from a user and submit the subset of the electronic content and the comment to a forum accessible by a plurality of users. | 10-04-2012 |
Patent application number | Description | Published |
20090198711 | USER-TARGETED ADVERTISING - Structured data sets including one or more attributes are identified, each structured data set associated with, for example, a particular user. Values corresponding the at least one of the one or more attributes in each structured data set are identified. A condition established by a content provider, for instance, an advertiser, is compared to the identified values to determine if the condition is satisfied. When the condition is satisfied, one or more content items are identified to the users associated with the structured data sets containing identified values satisfying the condition. | 08-06-2009 |
20100070350 | DYNAMIC PRICING FOR CONTENT PRESENTATIONS - A request for content is received. First content is selected for the request. The first content is selected from among multiple content items based on information in the request, a characteristic of how the first content is to be presented, and a stored pricing threshold value selected based on the characteristic. The characteristic of how the first content is to be presented includes an amount of available space that is occupied by the first content when the first content is presented. The selected first content is provided for presentation by a publisher that provides second content. | 03-18-2010 |
20120123856 | DYNAMIC PRICING FOR CONTENT PRESENTATIONS - A request for content is received. First content is selected for the request. The first content is selected from among multiple content items based on information in the request, a characteristic of how the first content is to be presented, and a stored pricing threshold value selected based on the characteristic. The characteristic of how the first content is to be presented includes an amount of available space that is occupied by the first content when the first content is presented. The selected first content is provided for presentation by a publisher that provides second content. | 05-17-2012 |
20130013646 | USER-TARGETED ADVERTISING - Structured data sets including one or more attributes are identified, each structured data set associated with, for example, a particular user. Values corresponding the at least one of the one or more attributes in each structured data set are identified. A condition established by a content provider, for instance, an advertiser, is compared to the identified values to determine if the condition is satisfied. When the condition is satisfied, one or more content items are identified to the users associated with the structured data sets containing identified values satisfying the condition. | 01-10-2013 |
Patent application number | Description | Published |
20080243526 | CUSTODIAN BASED CONTENT IDENTIFICATION - A custodian profile, e.g., a user profile, associated with a first content item, e.g., an associated web page in a social network, can be identified as a first content item. The first content item can be utilized to identify one or more second content items, e.g., advertisements, that are displayed when the first content item is presented, e.g., viewed by another user of the social network. | 10-02-2008 |
20080243607 | RELATED ENTITY CONTENT IDENTIFICATION - An entity relationship defining an entity, e.g., a friendship relation in a social network, user groups, etc., can be identified and entity content based on the entity relationship, e.g., user profile data of user accounts, group memberships, etc., can be processed to identify entity topics. One or more content items, e.g., advertisements, can be identified based on the entity topics. | 10-02-2008 |
20080243780 | OPEN PROFILE CONTENT IDENTIFICATION - Open profile data in a user profile, e.g., free-form fields in a user profile, are processed to identify interests and preferences of the user. The interests and preferences are utilized to identify categories associated with the user profile, and content items, e.g., advertisements, can be identified based on the categories. | 10-02-2008 |
20100174726 | Open Profile Content Identification - Open profile data in a user profile, e.g., free-form fields in a user profile, are processed to identify interests and preferences of the user. The interests and preferences are utilized to identify categories associated with the user profile, and content items, e.g., advertisements, can be identified based on the categories. | 07-08-2010 |