-
公开(公告)号:US11556427B1
公开(公告)日:2023-01-17
申请号:US17507000
申请日:2021-10-21
Applicant: Dell Products L.P.
Inventor: Adam Brenner , Mark Malamut , Arun Murti
IPC: G06F11/14
Abstract: Embodiments for optimizing multiple backup operations for a data protection system, by determining a size of a dataset to be saved in each backup operation and an available bandwidth in each transfer window of a plurality of transfer windows for transfer data between a source and destination; then determining an order of the backup operations based on first ordering the backups based on decreasing dataset size and second ordering the transfer windows in order of decreasing bandwidth, and matching the backups to the transfer windows in accordance with the first ordering and second ordering. The optimum time represents a time to initiate the backup operation that results in a shortest data transfer time over all of the transfer windows from as compared to other possible transfer windows in a defined backup period.
-
公开(公告)号:US12292800B2
公开(公告)日:2025-05-06
申请号:US18304046
申请日:2023-04-20
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Jennifer M. Minarik , Brian E. Freeman
IPC: G06F11/14
Abstract: A system that automatically determines ideal temporary backup targets (TBTs) to store and restore backup data. For multiple TBTs, backup data is saved with location information to restore incremental backup data from these multiple targets. Hashes of each file are stored in a Merkle tree to enable data restore workflows and minimizing an amount of storage required to hold backup data. The lowest tree level comprises hashes of the backup data chunks, and higher levels contain hashes of the next lower levels. A backup target location value is added to non-data chunk hash records in the higher levels to identify where any piece of backup data is located so that restore operations can occur when the backup data is spread across multiple backup targets.
-
13.
公开(公告)号:US12106120B2
公开(公告)日:2024-10-01
申请号:US18075773
申请日:2022-12-06
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
CPC classification number: G06F9/44505 , G06F11/0793
Abstract: Embodiments help timely remediation of issues in a data protection system by automatically evaluating scripts configured to address the issues. The system has a bounded list of possible attributes that are deemed important by system administrators. Each attribute is assigned a System Impact Score (SIS) along a defined scale. A self-healing processing component monitors the state of each attribute over time. The scripts are evaluated through repeated execution and use of the attribute monitoring to determine which attributes are affected by a script. Weights are assigned to each attribute affected by a script to aid in the selection of scripts most likely to remediate an actionable issue. Regularly performing script evaluation and attribute weighting allows for updating of scripts with an accurate list of attributes to overcome problems associated with manual updates.
-
公开(公告)号:US11880281B1
公开(公告)日:2024-01-23
申请号:US17863048
申请日:2022-07-12
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Jennifer M. Minarik , Brian E. Freeman
CPC classification number: G06F11/1464 , G06F9/45558 , G06F11/1448 , G06F11/1466 , G06F2009/45579
Abstract: Embodiments are described for a system that automatically determines the ideal backup target for the backup agent to send its backup data. The system will automatically create and destroy temporary backup targets in order to handle the current backup traffic and provide the optimal throughput based on speed of the backup agent and reliability of the storage target. The backup agent is able to send incremental backups to any temporary backup target, which are later consolidated on the storage target after the agent has disconnected from the system. The final storage target may be an original primary storage target for the data asset or one of the temporary storage targets.
-
15.
公开(公告)号:US20240020207A1
公开(公告)日:2024-01-18
申请号:US18174488
申请日:2023-02-24
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Jennifer M. Minarik , Brian E. Freeman
IPC: G06F11/14
CPC classification number: G06F11/1469 , G06F11/1451 , G06F11/1453 , G06F2201/84
Abstract: Embodiments are described for a system that automatically determines the ideal backup target to send backup data. Temporary backup targets are automatically created to handle backups for mobile data assets. A backup agent sends incremental backups to any temporary backup target (TBT), which are later consolidated with primary backup target (PBT) data. To facilitate data backup to a TBT and restore operations from data located on a PBT or TBT, a Backup Location Catalog (BLC) is created for each asset to reside on the asset. A Change Record Catalog (CRC) is created for each TBT backup per asset and each CRC resides on the asset until the associated data is consolidated back to the PBT. Assets thus have access to all backups, including the data on the TBT(s) before that data is consolidated back to the PBT.
-
公开(公告)号:US20240020204A1
公开(公告)日:2024-01-18
申请号:US17863048
申请日:2022-07-12
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Jennifer M. Minarik , Brian E. Freeman
CPC classification number: G06F11/1464 , G06F11/1466 , G06F11/1448 , G06F9/45558 , G06F2009/45579
Abstract: Embodiments are described for a system that automatically determines the ideal backup target for the backup agent to send its backup data. The system will automatically create and destroy temporary backup targets in order to handle the current backup traffic and provide the optimal throughput based on speed of the backup agent and reliability of the storage target. The backup agent is able to send incremental backups to any temporary backup target, which are later consolidated on the storage target after the agent has disconnected from the system. The final storage target may be an original primary storage target for the data asset or one of the temporary storage targets.
-
17.
公开(公告)号:US11748205B2
公开(公告)日:2023-09-05
申请号:US17721681
申请日:2022-04-15
Applicant: Dell Products L.P.
Inventor: Adam Brenner , Arun Murti , Mark Malamut
IPC: G06F11/14
CPC classification number: G06F11/1461 , G06F2201/84
Abstract: Optimizing multiple backup operations for multiple sources by discovering shared data routes between sources and targets for backup operations performed in a certain time period. Backups using shared routes use a Best Time Algorithm that determines a size of a dataset to be saved an available bandwidth in each transfer window of the time period, and then determines an order of the backup operations based on first ordering the backups based on decreasing dataset size and second ordering the transfer windows in order of decreasing bandwidth, and matching the backups to the transfer windows in accordance with the first ordering and second ordering. The optimum time represents a time to initiate each backup of the multiple backups that results in a shortest data transfer time over the entire time period.
-
公开(公告)号:US12155684B2
公开(公告)日:2024-11-26
申请号:US18303307
申请日:2023-04-19
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Jennifer M. Minarik , Kevin D. Cheng , Brian E. Freeman
IPC: H04L9/40
Abstract: Embodiments for generating user customized alert notifications for application operations and activities based on monitored performance metrics. Key performance indicators for the application and user behavior are defined, and a monitor process collects behavior statistics of the application for each user with respect to data assets for each of the key performance indicators. Anomaly detection policies are provided to define anomalous behavior of the users with respect to data assets of the computer network. An anomaly detection process detects anomalous user behavior and an alert notification is sent to administrative or security personnel upon each detected instance of abnormal user behavior. The alert notification rules are defined by the user based on operation severity, asset type, operation, and defined metrics to tailor and minimize the number of alerts sent to the user.
-
公开(公告)号:US20230262081A1
公开(公告)日:2023-08-17
申请号:US18303307
申请日:2023-04-19
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Jennifer M. Minarik , Kevin D. Cheng , Brian E. Freeman
IPC: H04L9/40
CPC classification number: H04L63/1425
Abstract: Embodiments for generating user customized alert notifications for application operations and activities based on monitored performance metrics. Key performance indicators for the application and user behavior are defined, and a monitor process collects behavior statistics of the application for each user with respect to data assets for each of the key performance indicators. Anomaly detection policies are provided to define anomalous behavior of the users with respect to data assets of the computer network. An anomaly detection process detects anomalous user behavior and an alert notification is sent to administrative or security personnel upon each detected instance of abnormal user behavior. The alert notification rules are defined by the user based on operation severity, asset type, operation, and defined metrics to tailor and minimize the number of alerts sent to the user.
-
公开(公告)号:US20230259428A1
公开(公告)日:2023-08-17
申请号:US18308038
申请日:2023-04-27
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
IPC: G06F11/14
CPC classification number: G06F11/1448
Abstract: Optimizing backups for a data protection system by determining a size of a dataset to be saved in each backup operation and an available bandwidth in each transfer window of transfer windows for data transfers between a source and destination. An order of the backup operations is defined based on first ordering the backups based on decreasing dataset size and second ordering the transfer windows in order of decreasing bandwidth, and matching the backups to the transfer windows in accordance with these orderings. A dynamic window sizing process determines an initial change between the minimum and maximum bandwidth utilization over a period of time and then iteratively split and consolidate the time blocks until optimal utilization over the time period is reached.
-
-
-
-
-
-
-
-
-