摘要:
IT organizations are challenged with maintaining data application and availability while satisfying service level agreements and compliance requirements. Unprecedented data growth is straining IT resources requiring greater investments, while capital and operational expenses are under scrutiny. Given this tension, IT organizations are seeking efficiency and optimization to regain control and meet business SLAs. Example embodiments of the present invention provide a method, an apparatus, and a computer program product for performing automated data protection with information technology (IT) infrastructure visibility. The method comprises receiving input regarding a desired state of a data protection environment for an IT infrastructure and creating a data protection environment according to the desired state of the data protection environment.
摘要:
Currently, administrators configure replication manually according to a data protection policy. Typically, such data protection policies are provided via a script or a similar input to provision storage devices. However, such manual configuration is subject to administrator error. For example, an administrator may not provision storage devices accurately according to a desired data protection policy. Further, this process is subject not only to human mistake, but also the administrative overhead required to manually provision the storage devices. Example embodiments of the present invention eliminate administration and reliability issues arising out of manual replication service configuration, thereby minimizing administrative costs and improving the user experience of handling data protection. Example embodiments of the present invention provide a method, an apparatus and a computer-program product for creating a policy-based replication service. The method includes receiving a policy and creating a replication service according to the policy.
摘要:
A method and apparatus for method for transferring files between a primary storage system and a backup and restore system is described. The system generates collapsed extents which are used to specify data to be backed up to a backup and restore system. The backup and restore system backs up data based on the collapsed extents but records all extents included in the collapsed extents to enable the system to facilitate restoration of the data at a later point in time.
摘要:
A method of attribute based resource allocation is presented. A resource such as a pool of storage has certain properties or attributes associated with portions of the pool. When a request for storage is needed, the requester provides a selection expression which comprises properties and logical operators. From the selection expression a determination is made to allocate portions of the storage pool which meet the requirements of the selection expression.
摘要:
A method of attribute based resource allocation is presented. A resource such as a pool of storage has certain properties or attributes associated with portions of the pool. When a request for storage is needed, the requester provides a selection expression which includes properties and logical operators. From the selection expression a determination is made to allocate portions of the storage pool which meet the requirements of the selection expression.
摘要:
A method and apparatus for method for transferring files between a primary storage system and a backup and restore system is described. The system generates collapsed extents which are used to specify data to be backed up to a backup and restore system. The backup and restore system backs up data based on the collapsed extents but records all extents included in the collapsed extents to enable the system to facilitate restoration of the data at a later point in time.