Abstract:
A method for integrating data deduplication with block level incremental data backup is described. In one embodiment, the method includes accessing from memory at least one modified data block of a file, wherein the file is partitioned into a plurality of deduplication segments, identifying at least one deduplication segment that corresponds with the at least one modified data block, computing using at least one processor a signature for each deduplication segment of the at least one corresponding deduplication segment and comparing using at least one processor each signature that is associated with the at least one corresponding deduplication segment with signature information that is associated with backup data to identify at least one duplicate data block within the backup data and the at least one modified data block.
Abstract:
A method and apparatus for utilizing a file change log is described. In one example, the access of a file is initially detected. The identifier of the entity accessing the file is recorded. Similarly, an indicia of identifying at least one portion of the file that was accessed by the entity is recorded. The file change log is then updated to reflect the identifier and the indicia.
Abstract:
An embodiment of the invention provides an apparatus and method for a policy-based storage appliance virtualization that identifies the storage space based on a desired storage management operation type. One example of a storage management operation type is the allocation of storage space from a storage appliance(s) to a host(s). The requested storage space amount to be allocated to a host is first specified in a management console. The management console checks one or more policies and compares the policies with the requested storage space amount and identity of the host, so that the management console identifies the storage space(s) that are available for allocation from a storage appliance(s) to the host. The management console may generate a candidate virtualized storage pool identification that identifies the storage space(s) that are available for allocation from the storage appliance(s) to the host. The server administrator then selects the storage space(s) to be allocated to the host. The policies may also be used as constraints to other storage management operation types besides the above-mentioned storage allocation to hosts.
Abstract:
A system and method for automatically reorganizing files to avoid the problem of file fragmentation. At an appropriate time, such as when an I/O request to write to a file is received, the file may be marked as possibly being in need of reorganization. The system may later determine that the file was marked for possible reorganization and may examine the file to determine whether the file is actually in need of reorganization, i.e., whether the file is fragmented. If so, then the file may be automatically reorganized to eliminate the fragmentation. In another embodiment, files may first be checked to determine whether they are actually in need of reorganization before being marked. The method may benefit a computer system by automatically detecting and reorganizing fragmented files on an individual file basis.
Abstract:
A system and method for indexing user data on storage systems is provided. A client of the storage system executes a novel client side agent that is configured to detect changes to data stored by the client on the storage system. In response to detecting that data has been modified, the agent examines modified data containers and parses the modified data to identify new and/or modified index terms or the creation/deletion of data containers. Once the data has been parsed by the agent to identify new/modified index terms, the parsed data is transmitted from the agent to a management module executing on a management server. The management module receives the parsed data and updates a search database using the received parsed data.
Abstract:
Disclosed herein are a method and a system for data management. An administrator can configure data access permissions for each user to each file and file folders the user is attributed to. Further, when a user requests data access the system checks whether the user has permission to access that particular file/file folder. If the user is found to have permission to access that particular file/file folder, the system allows the user to access the file/file folder user with permitted read and edit settings. If the user is found to have no access to the requested file/file folder, then the system denies access to the user.
Abstract:
Disclosed herein are a method and a system for discrete data containerization for Information Rights Management. The system identifies based on a user request, data to be containerized. Further, the system receives at least one rule based on the data and attributes, which is to be used for containerizing the data. Further, using the rule, the system containerizes the data, wherein the data is containerized at individual data level.
Abstract:
A system and method for indexing user data on storage systems is provided. A client of the storage system executes a novel client side agent that is configured to detect changes to data stored by the client on the storage system. In response to detecting that data has been modified, the agent examines modified data containers and parses the modified data to identify new and/or modified index terms or the creation/deletion of data containers. Once the data has been parsed by the agent to identify new/modified index terms, the parsed data is transmitted from the agent to a management module executing on a management server. The management module receives the parsed data and updates a search database using the received parsed data.
Abstract:
An embodiment of the invention provides an apparatus and method for a policy-based storage appliance virtualization that identifies the storage space based on a desired storage management operation type. One example of a storage management operation type is the allocation of storage space from a storage appliance(s) to a host(s). The requested storage space amount to be allocated to a host is first specified in a management console. The management console checks one or more policies and compares the policies with the requested storage space amount and identity of the host, so that the management console identifies the storage space(s) that are available for allocation from a storage appliance(s) to the host. The management console may generate a candidate virtualized storage pool identification that identifies the storage space(s) that are available for allocation from the storage appliance(s) to the host. The server administrator then selects the storage space(s) to be allocated to the host. The policies may also be used as constraints to other storage management operation types besides the above-mentioned storage allocation to hosts.
Abstract:
A management server maintains a set of metadata describing a storage structure of a storage server. In response to a change of the storage structure, the management server automatically updates the set of metadata. The management server also manages information indicating what portion of the set of metadata is cached locally at a storage management client application. If that portion of the set of metadata is updated in response to the change of the storage structure, the management server sends information to update the metadata cached locally at the storage management client application so that the cached metadata is consistent with the set of metadata at the management server. By caching data at the storage management client application and at the network storage management server, the present invention advantageously avoids sending unnecessary requests to the storage server, thereby reducing network latency.