-
公开(公告)号:US11892991B2
公开(公告)日:2024-02-06
申请号:US17571341
申请日:2022-01-07
Applicant: Commvault Systems, Inc.
Inventor: Pavan Kumar Reddy Bedadala , Marcelo dos Reis Mansano , Rajiv Kottomtharayil , Anand Vibhor , Bhavyan Bharatkumar Mehta , Mrityunjay Upadhyay
IPC: G06F11/30 , G06F16/215 , G06F16/23 , G06F11/07
CPC classification number: G06F16/215 , G06F11/0766 , G06F16/2365
Abstract: Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations, such as in deduplication pruning operations. Such anomalies can include delays in the processing of archive files to be deleted and/or delays in the generation of the list of archive files to delete. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation. Predicting low utilization periods for these and other key resources is useful for scheduling maintenance activities without interfering with ordinary deduplication pruning operations and/or other data protection jobs.
-
公开(公告)号:US11256673B2
公开(公告)日:2022-02-22
申请号:US16789232
申请日:2020-02-12
Applicant: Commvault Systems, Inc.
Inventor: Pavan Kumar Reddy Bedadala , Marcelo dos Reis Mansano , Rajiv Kottomtharayil , Anand Vibhor , Bhavyan Bharatkumar Mehta , Mrityunjay Upadhyay
IPC: G06F11/30 , G06F16/215 , G06F16/23 , G06F11/07
Abstract: Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations, such as in deduplication pruning operations. Such anomalies can include delays in the processing of archive files to be deleted and/or delays in the generation of the list of archive files to delete. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation. Predicting low utilization periods for these and other key resources is useful for scheduling maintenance activities without interfering with ordinary deduplication pruning operations and/or other data protection jobs.
-
公开(公告)号:US20220292196A1
公开(公告)日:2022-09-15
申请号:US17242656
申请日:2021-04-28
Applicant: Commvault Systems, Inc.
Inventor: Sri Karthik BHAGI , Pratima Laxman GADHAVE , Marcelo dos Reis Mansano , Mrityunjay UPADHYAY , PurnaChandra Sekhar BEDHAPUDI , Shyam Sundar Ramkumar
Abstract: An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.
-
公开(公告)号:US20220292188A1
公开(公告)日:2022-09-15
申请号:US17243188
申请日:2021-04-28
Applicant: Commvault Systems, Inc.
Inventor: Sri Karthik BHAGI , Pratima Laxman GADHAVE , Marcelo dos Reis Mansano , Mrityunjay UPADHYAY , PurnaChandra Sekhar BEDHAPUDI , Shyam Sundar Ramkumar
Abstract: An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.
-
公开(公告)号:US12026252B2
公开(公告)日:2024-07-02
申请号:US17243188
申请日:2021-04-28
Applicant: Commvault Systems, Inc.
Inventor: Sri Karthik Bhagi , Pratima Laxman Gadhave , Marcelo dos Reis Mansano , Mrityunjay Upadhyay , PurnaChandra Sekhar Bedhapudi , Shyam Sundar Ramkumar
IPC: G06F21/55 , G06F9/455 , G06F11/14 , G06F21/54 , G06F21/56 , G06F21/62 , G06F21/78 , G06N5/04 , G06N20/00
CPC classification number: G06F21/554 , G06F9/45533 , G06F11/1451 , G06F21/54 , G06F21/561 , G06F21/566 , G06F21/567 , G06F21/568 , G06F21/6218 , G06F21/78 , G06N5/04 , G06N20/00 , G06F2201/815 , G06F2221/034
Abstract: An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.
-
公开(公告)号:US11494417B2
公开(公告)日:2022-11-08
申请号:US16988457
申请日:2020-08-07
Applicant: Commvault Systems, Inc.
Abstract: An improved information management system is described herein that can use artificial intelligence to classify data files (e.g., emails, documents, audio files, video files, etc.) and/or surface in a user interface the classification assigned to the data files. For example, a lightweight training or a heavyweight training can be employed to train classifiers to classify the data files. Use of artificial intelligence to classify data files may reduce the amount of computing resources that the information management system allocates to the data file review process because an auditor may be able to quickly identify those data files that meet the desired criteria using the classification and only request access to those data files. Thus, the information management system may be able to allocate more computing resources to normal or routine tasks, ensuring that such tasks are completed and/or completed in an appropriate amount of time.
-
-
-
-
-