CROSS-PLATFORM VIRTUAL MACHINE BACKUP AND REPLICATION

    公开(公告)号:US20160132400A1

    公开(公告)日:2016-05-12

    申请号:US14537698

    申请日:2014-11-10

    Abstract: According to certain aspects, a method can include, at a first time, performing an incremental backup of first data associated with a virtual machine (VM) residing on a source client computing device from the source client computing device to one or more secondary storage devices to create a backup copy of the VM, where the VM is associated with a hypervisor of a first type; receiving an instruction to restore the first data associated with the VM from the one or more secondary storage devices; retrieving the first data from the one or more secondary storage devices; and applying the first data to second data associated with a replicated VM running on the destination client computing device, where the replicated VM is a replicated version of the VM, and where the second data corresponds to data of the VM at a time before the first time.

    SINGLE SNAPSHOT FOR MULTIPLE APPLICATIONS

    公开(公告)号:US20240378117A1

    公开(公告)日:2024-11-14

    申请号:US18749427

    申请日:2024-06-20

    Abstract: An information management system according to certain aspects may be configured to generate a snapshot of data relating to a plurality of applications. The system may include a plurality of data agents, wherein each data agent is associated with at least one of a plurality of applications, and data generated by the plurality of applications is stored in a logical volume in primary storage. The system may also include a snapshot manager configured to detect the plurality of applications; check with the plurality of data agents whether the associated applications are in consistent states; obtain a snapshot of the logical volume in response to receiving notifications from the plurality of data agents that the associated applications are in consistent states; and generate mapping information between a particular one of the plurality of applications and a portion of the snapshot relating to the particular one of the plurality of applications.

    REPLICATING FUNCTIONALITY AND DATA OF A PRIMARY COMPUTING DEVICE ONTO A VIRTUAL MACHINE

    公开(公告)号:US20240205082A1

    公开(公告)日:2024-06-20

    申请号:US18586435

    申请日:2024-02-24

    Abstract: This application describes a process where a system receives a cloning request to replicate the functionality of a primary computing device onto a virtual machine. Initially, the system generates or identifies a non-production, point-in-time copy of the primary device's data and metadata. Utilizing this copy, it assesses the primary device's current configuration and resource usage metrics. Subsequently, it identifies an appropriate hosting destination for the virtual machine, equipped with necessary hardware processors. The process further involves defining an optimal configuration for the virtual machine, which may be distinct from the original device, based on various parameters. The virtual machine is then provisioned at the chosen location according to this tailored configuration. The system ensures the virtual machine has access to the original device's data and metadata through specially provisioned virtual disks. Additionally, it implements specific information management policies on the virtual disks' data and metadata to maintain integrity and security.

    AUTOMATIC FILE ENCRYPTION
    19.
    发明申请

    公开(公告)号:US20190303606A1

    公开(公告)日:2019-10-03

    申请号:US16444355

    申请日:2019-06-18

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

Patent Agency Ranking