-
公开(公告)号:US12235738B2
公开(公告)日:2025-02-25
申请号:US18174488
申请日:2023-02-24
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Jennifer M. Minarik , Brian E. Freeman
IPC: G06F11/14
Abstract: Embodiments are described for a system that automatically determines the ideal backup target to send backup data. Temporary backup targets are automatically created to handle backups for mobile data assets. A backup agent sends incremental backups to any temporary backup target (TBT), which are later consolidated with primary backup target (PBT) data. To facilitate data backup to a TBT and restore operations from data located on a PBT or TBT, a Backup Location Catalog (BLC) is created for each asset to reside on the asset. A Change Record Catalog (CRC) is created for each TBT backup per asset and each CRC resides on the asset until the associated data is consolidated back to the PBT. Assets thus have access to all backups, including the data on the TBT(s) before that data is consolidated back to the PBT.
-
22.
公开(公告)号:US12189489B2
公开(公告)日:2025-01-07
申请号:US17971167
申请日:2022-10-21
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
IPC: G06F11/14
Abstract: Embodiments automate the timely remediation of issues by matching failed operations to a script or set of scripts that is configured to fix the problem. A method detects a backup operation alert message sent from a data manager or storage system that encodes one or more attributes affected by the backup operation, wherein the attributes are weighted to reflect a percentage importance of the a corresponding script to fix the problem. A script library is scanned to identify scripts that match the alert message. A component generates a score for each script, where the score factors the relevance of the script to the backup operation based on the weighted attributes. Scores for each single script each possible combination of multiple scripts are computed and compared, and the script or script combination with the highest score is executed by the self-healing process.
-
公开(公告)号:US12153495B2
公开(公告)日:2024-11-26
申请号:US17867655
申请日:2022-07-18
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
IPC: G06F11/14
Abstract: Embodiments are described for preventing undesired data deletion on protection storage by using delete restrictions. A delete restriction component prevents data from being staged for permanent erasure, such as by preventing files from being moved to a trash folder. A well-known process (WKP), such as a backup or migration operation that is known to request data expiration, is used to validate data deletions. The WKP identifies data that is no longer to be retained. The WKP uses a well-known process expiration list (WEL) that holds hashes of the data. A bucket confirmation count indicates candidates for data deletion. Separately, Garbage Collection maintains another list of hashes that are deletion candidates. A separate process finds common hashes between the WKP and GC hashes, and then removes the data pointed to by the common hashes.
-
24.
公开(公告)号:US12130710B2
公开(公告)日:2024-10-29
申请号:US17955802
申请日:2022-09-29
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
IPC: G06F11/14 , G06F16/182
CPC classification number: G06F11/1469 , G06F16/1824 , G06F2201/805
Abstract: Embodiments automate the timely remediation of issues by matching failed operations to a script that is configured to fix the problem or problems without causing additional side effects, thus minimizing unavailability of services and loss of data. A method detects a backup operation alert message sent from a data manager or storage system that encodes one or more attributes affected by the backup operation, wherein the attributes are weighted to reflect a percentage importance of the a corresponding script to fix the problem. A script library is scanned to identify scripts that match the alert message. A component generates a score for each script, where the score factors the relevance of the script to the backup operation based on the weighted attributes, and executes the script with the highest score, as the script most likely to fix the issue causing the alert message.
-
公开(公告)号:US12007844B2
公开(公告)日:2024-06-11
申请号:US18308038
申请日:2023-04-27
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
IPC: G06F11/14
CPC classification number: G06F11/1448
Abstract: Optimizing backups for a data protection system by determining a size of a dataset to be saved in each backup operation and an available bandwidth in each transfer window of transfer windows for data transfers between a source and destination. An order of the backup operations is defined based on first ordering the backups based on decreasing dataset size and second ordering the transfer windows in order of decreasing bandwidth, and matching the backups to the transfer windows in accordance with these orderings. A dynamic window sizing process determines an initial change between the minimum and maximum bandwidth utilization over a period of time and then iteratively split and consolidate the time blocks until optimal utilization over the time period is reached.
-
26.
公开(公告)号:US11994952B2
公开(公告)日:2024-05-28
申请号:US17874868
申请日:2022-07-27
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
IPC: G06F11/14
CPC classification number: G06F11/1458 , G06F11/1453 , G06F2201/84
Abstract: Embodiments automate the timely remediation of issues by matching failed operations to a script that is configured to fix the problem or problems without causing additional side effects, thus minimizing unavailability of services/data and loss of data. A method detects a backup operation alert message sent from a data manager or storage system that encodes one or more attributes affected by the backup operation. A script library is scanned to identify scripts that match the alert message. A component generates a score for each script, where the score factors the relevance of the script to the backup operation, and executes the script with the highest score, as the script most likely to remediate the issue causing the alert message.
-
27.
公开(公告)号:US20240036987A1
公开(公告)日:2024-02-01
申请号:US17955802
申请日:2022-09-29
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
IPC: G06F11/14 , G06F16/182
CPC classification number: G06F11/1469 , G06F16/1824 , G06F2201/805
Abstract: Embodiments automate the timely remediation of issues by matching failed operations to a script that is configured to fix the problem or problems without causing additional side effects, thus minimizing unavailability of services and loss of data. A method detects a backup operation alert message sent from a data manager or storage system that encodes one or more attributes affected by the backup operation, wherein the attributes are weighted to reflect a percentage importance of the a corresponding script to fix the problem. A script library is scanned to identify scripts that match the alert message. A component generates a score for each script, where the score factors the relevance of the script to the backup operation based on the weighted attributes, and executes the script with the highest score, as the script most likely to fix the issue causing the alert message.
-
公开(公告)号:US20240020202A1
公开(公告)日:2024-01-18
申请号:US17867655
申请日:2022-07-18
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Adam Brenner , Arun Murti
IPC: G06F11/14
CPC classification number: G06F11/1453 , G06F11/1461 , G06F11/1451
Abstract: Embodiments are described for preventing undesired data deletion on protection storage by using delete restrictions. A delete restriction component prevents data from being staged for permanent erasure, such as by preventing files from being moved to a trash folder. A well-known process (WKP), such as a backup or migration operation that is known to request data expiration, is used to validate data deletions. The WKP identifies data that is no longer to be retained. The WKP uses a well-known process expiration list (WEL) that holds hashes of the data. A bucket confirmation count indicates candidates for data deletion. Separately, Garbage Collection maintains another list of hashes that are deletion candidates. A separate process finds common hashes between the WKP and GC hashes, and then removes the data pointed to by the common hashes.
-
29.
公开(公告)号:US20240020200A1
公开(公告)日:2024-01-18
申请号:US18304046
申请日:2023-04-20
Applicant: Dell Products L.P.
Inventor: Mark Malamut , Jennifer M. Minarik , Brian E. Freeman
IPC: G06F11/14
CPC classification number: G06F11/1435 , G06F11/1466 , G06F11/1464
Abstract: A system that automatically determines ideal temporary backup targets (TBTs) to store and restore backup data. For multiple TBTs, backup data is saved with location information to restore incremental backup data from these multiple targets. Hashes of each file are stored in a Merkle tree to enable data restore workflows and minimizing an amount of storage required to hold backup data. The lowest tree level comprises hashes of the backup data chunks, and higher levels contain hashes of the next lower levels. A backup target location value is added to non-data chunk hash records in the higher levels to identify where any piece of backup data is located so that restore operations can occur when the backup data is spread across multiple backup targets.
-
30.
公开(公告)号:US20230236860A1
公开(公告)日:2023-07-27
申请号:US17582322
申请日:2022-01-24
Applicant: DELL PRODUCTS L.P.
Inventor: Yasemin Ugur-Ozekinci , Mark Malamut , Jennifer Minarik , Brian E. Freeman
CPC classification number: G06F9/45558 , G06F9/45554 , G06F9/5072 , G06F2009/4557 , G06F2009/45595
Abstract: A lightweight, workload-agnostic application management agent (AMA) automatically upgrading application agents on a virtual machine (VM). The AMA is installed in the VM as part of a Gold image installation. The AMA detects a workload-type of the VM and sends the workload information to an application manager. The AMA continuously monitors the VM for any change in workload type, and any change causes the AMA to install a respective workload-specific agent (WSA) for the new workload in the VM. The AMA accesses the new WSA from the application manager though a push or pull operation. Applications are thus automatically upgraded through VM resident agents. The user needs only to update policies and load updated software to the application manager without manually upgrading the WSA agents themselves.
-
-
-
-
-
-
-
-
-