DYNAMICALLY-ADJUSTABLE DEDUPLICATION ORDER OF OPERATIONS

    公开(公告)号:US20200293498A1

    公开(公告)日:2020-09-17

    申请号:US16352606

    申请日:2019-03-13

    Abstract: An information management system can dynamically adjust the order in which compression and deduplication operations are performed based on the type of file for which a secondary copy operation is requested. For example, the information management system can determine whether the file for which a secondary copy operation is requested is a first type of file that is text-based and/or that has data blocks that are highly compressible or a second type of file that may have data blocks that are not highly compressible. If the information management system determines that the file is of the second type, the information management system can perform a deduplication operation prior to performing a compression operation. Furthermore, the information management system can dynamically adjust the size of various deduplication blocks based on the type of file for which a secondary copy operation is requested.

    SYSTEM AND METHOD FOR SHARING SAN STORAGE
    22.
    发明申请

    公开(公告)号:US20200259899A1

    公开(公告)日:2020-08-13

    申请号:US16789848

    申请日:2020-02-13

    Abstract: According to various embodiments, systems and methods are provided that relate to shared access to Storage Area Networks (SAN) devices. In one embodiment, a Storage Area Network (SAN) host is provided, comprising: a server component: a first host bus adapter configured to be connected to a SAN client over a first SAN; a second host bus adapter configured to be connected to a SAN storage device over a second SAN; and wherein the server component is configured to manage a data block on the SAN storage device, receive a storage operation request from the SAN client through the first host bus adapter, and in response to the storage operation request, perform a storage operation on the data block, the storage operation being performed over the second SAN through the second host bus adapter.

    DEDUPLICATION REPLICATION IN A DISTRIBUTED DEDUPLICATION DATA STORAGE SYSTEM

    公开(公告)号:US20210294510A1

    公开(公告)日:2021-09-23

    申请号:US17174769

    申请日:2021-02-12

    Abstract: Systems and methods are provided herein for automatically configuring newly installed secondary storage computing devices and managing secondary storage computing devices when one or more become unavailable. For example, a storage manager can then detect the computing resources available to the newly installed secondary storage computing device, assign a role to the newly installed secondary storage computing device based on the detected computing resources, configure the newly installed secondary storage computing device with deduplication and storage policies used by the other secondary storage computing devices, re-partition secondary storage devices to allocate memory for the newly installed secondary storage computing device, and instruct other secondary storage computing devices to replicate their managed data such that the newly installed secondary storage computing device has access to the replicated data.

    EFFICIENT RECONSTRUCTION OF A DEDUPLICATION DATABASE

    公开(公告)号:US20210019236A1

    公开(公告)日:2021-01-21

    申请号:US16569559

    申请日:2019-09-12

    Abstract: If a deduplication database becomes corrupted or is lost, the deduplication database may be reconstructed by restoring an earlier backup copy of the deduplication database. The backup copy of the deduplication database, however, may not be synced with the deduplicated data blocks that are presently stored in the secondary storage subsystem. To address the possibility of data loss and improve reconstruction timing, a deduplicated storage system is provided according to certain embodiments that uses one or more mechanisms to restore the deduplication database and resync with the secondary storage by using one or more journal files that track the data blocks that have been or may have been deleted from the secondary storage since the last deduplication database backup.

    EFFICIENT DEDUPLICATION DATABASE VALIDATION
    28.
    发明申请

    公开(公告)号:US20200226030A1

    公开(公告)日:2020-07-16

    申请号:US16743879

    申请日:2020-01-15

    Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.

    RANSOMWARE DETECTION
    30.
    发明申请

    公开(公告)号:US20190108340A1

    公开(公告)日:2019-04-11

    申请号:US16129609

    申请日:2018-09-12

    Abstract: This application relates to ransomware detection. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine monitors the I/O activity in a file system. The software module records the number of times the files in the file system are modified, created, deleted, and renamed. The recorded number is compared against a threshold. If the number exceeds the threshold, the software module provides an alert to the user of the client machine that the client machine may be under a ransomware attack. In some embodiments, index data gathered as part of backup operations is utilized, either alone or in combination with the continuously monitored I/O activity data, to detect ransomware attacks.

Patent Agency Ranking