CUSTOMIZED DEPLOYMENT IN INFORMATION MANAGEMENT SYSTEMS

    公开(公告)号:US20190339957A1

    公开(公告)日:2019-11-07

    申请号:US16517338

    申请日:2019-07-19

    Abstract: According to certain aspects, an information management system may be configured to: receive system information relating to one or more data storage requirements associated with a first user; access an electronic database containing deployment configuration rules usable in determining information management cell configurations; generate a recommended deployment configuration for an information management cell associated with the first user based at least in part on the system information and the deployment configuration rules; receive computing infrastructure information relating to computer hardware components within the information management cell that are available for use in implementing the recommended deployment configuration; and generate an installation script for the information management cell based at least in part on the recommended deployment configuration and the computing infrastructure information.

    SYSTEMS AND METHODS FOR REPURPOSING VIRTUAL MACHINES

    公开(公告)号:US20210216352A1

    公开(公告)日:2021-07-15

    申请号:US17178064

    申请日:2021-02-17

    Abstract: Software, firmware, and systems repurpose existing virtual machines. After a virtual machine is created, the system stores data associated with the virtual machine to permit its later repurposing. Repurposing data includes data associated with the virtual machine when the virtual machine is in a generic state from which it may be configured for use by two or more users/applications. When the system receives a request to create a new virtual machine, rather than create a brand new virtual machine, the system repurposes an existing virtual machine. The system identifies a virtual machine to repurpose, deletes data associated with the identified virtual machine, and loads a saved copy of repurposing data. The system may then load user data or otherwise customize the database and virtual machine.

    DIFFERENTIAL HEALTH CHECKING OF AN INFORMATION MANAGEMENT SYSTEM

    公开(公告)号:US20210209074A1

    公开(公告)日:2021-07-08

    申请号:US17197582

    申请日:2021-03-10

    Abstract: Differential health-check systems and accompanying methods provide health-checking and reporting of one or more information management systems in reference to a first time period before and a second time period after a triggering event. A triggering event may be an upgrade of at least part of the information management system, or a restore operation completed in the information management system for example following a disaster, or any number of other events, etc. The health-checking and reporting may comprise a comparison of one or more performance metrics of one or more components and/or operations of the information management system during the first and second time periods.

    STORING METADATA AT A CLOUD-BASED CENTER, AND RECOVERING BACKUP DATA STORED REMOTELY FROM THE CLOUD-BASED CENTER

    公开(公告)号:US20210342227A1

    公开(公告)日:2021-11-04

    申请号:US17377897

    申请日:2021-07-16

    Abstract: A Remote Metadata Center provides Distaster Recovery (DR) testing and metadata backup services to multiple business organizations. Metadata associated with local data backups performed at business organizations is transmitetd to the Remote Metadata Center. Corresponding backup data is storeged in a data storage system that is either stored locally at the business organization or at a data storage facility that is at a different location than the Remote Metadata Center and the business organization. DR testing can be staged from the Remote Data Center using the metadata receievd and optionally with assistance from an operator at the business organization and/or the data storage facility.

    CUSTOMIZED DEPLOYMENT IN INFORMATION MANAGEMENT SYSTEMS

    公开(公告)号:US20170207971A1

    公开(公告)日:2017-07-20

    申请号:US15474219

    申请日:2017-03-30

    Abstract: According to certain aspects, an information management system may be configured to: receive system information relating to one or more data storage requirements associated with a first user; access an electronic database containing deployment configuration rules usable in determining information management cell configurations; generate a recommended deployment configuration for an information management cell associated with the first user based at least in part on the system information and the deployment configuration rules; receive computing infrastructure information relating to computer hardware components within the information management cell that are available for use in implementing the recommended deployment configuration; and generate an installation script for the information management cell based at least in part on the recommended deployment configuration and the computing infrastructure information.

    CUSTOMIZED DEPLOYMENT IN INFORMATION MANAGEMENT SYSTEMS
    6.
    发明申请
    CUSTOMIZED DEPLOYMENT IN INFORMATION MANAGEMENT SYSTEMS 有权
    信息管理系统中的自定义部署

    公开(公告)号:US20160036667A1

    公开(公告)日:2016-02-04

    申请号:US14469370

    申请日:2014-08-26

    Abstract: According to certain aspects, an information management system may be configured to: receive system information relating to one or more data storage requirements associated with a first user; access an electronic database containing deployment configuration rules usable in determining information management cell configurations; generate a recommended deployment configuration for an information management cell associated with the first user based at least in part on the system information and the deployment configuration rules; receive computing infrastructure information relating to computer hardware components within the information management cell that are available for use in implementing the recommended deployment configuration; and generate an installation script for the information management cell based at least in part on the recommended deployment configuration and the computing infrastructure information.

    Abstract translation: 根据某些方面,信息管理系统可以被配置为:接收与第一用户相关联的一个或多个数据存储需求相关的系统信息; 访问包含可用于确定信息管理单元配置的部署配置规则的电子数据库; 至少部分地基于系统信息和部署配置规则,为与第一用户相关联的信息管理单元生成推荐的部署配置; 接收与信息管理单元内可用于实现推荐部署配置的计算机硬件组件有关的计算基础架构信息; 并且至少部分地基于推荐的部署配置和计算基础设施信息来生成用于信息管理单元的安装脚本。

    DIFFERENTIAL HEALTH CHECKING OF AN INFORMATION MANAGEMENT SYSTEM

    公开(公告)号:US20200026693A1

    公开(公告)日:2020-01-23

    申请号:US16530847

    申请日:2019-08-02

    Abstract: Differential health-check systems and accompanying methods provide health-checking and reporting of one or more information management systems in reference to a first time period before and a second time period after a triggering event. A triggering event may be an upgrade of at least part of the information management system, or a restore operation completed in the information management system for example following a disaster, or any number of other events, etc. The health-checking and reporting may comprise a comparison of one or more performance metrics of one or more components and/or operations of the information management system during the first and second time periods.

    CLOUD-BASED SECURE OPERATION OF A RECOVERY STORAGE MANAGER

    公开(公告)号:US20250147925A1

    公开(公告)日:2025-05-08

    申请号:US18515343

    申请日:2023-11-21

    Abstract: A secure data storage management “recovery system” operates in a cloud computing environment that is apart from a source system and source data being protected. A “recovery manager” in the cloud computing environment is responsible for restoring secondary copies that were generated by the source system. The recovery manager gains knowledge (metadata) about the secondary copies by restoring, for its own use, a management database of, and backed up by, the source system. The recovery manager initiates out-of-place restores of the secondary copies to “recovery clients” in the recovery cloud. The recovery system restores, to the recovery cloud, secondary copies from any cloud platform and/or from non-cloud data centers, including secondary copies stored locally, off-cloud by the source system. The recovery manager comprises new features that enforce its isolation from the source system and they act to protect the integrity of the secondary copies generated by the source system.

Patent Agency Ranking