Abstract:
A method for backing up data in a computer system from a plurality of primary data sources to a secondary data source is provided. The method comprises copying data sections from the plurality of primary data sources to the secondary data source and providing a data pointer on the secondary data source. The data pointer indicates a starting point of each transfer from the plurality of primary data sources and where that starting point is on the secondary data source. This data pointer information provides the minimum information necessary to map a location from the primary data source(s) to its location on the secondary data source.
Abstract:
A method for backing up data in a computer system from at least one primary data source to a secondary data source is provided. The method includes performing a full image backup on a plurality of data blocks stored by the primary data source(s). An incremental backup can then be initiated at a predetermined interval. During this incremental backup, the modification time of each file/folder at the predetermined interval can be compared to a defined time. If the modification time is earlier than the defined time, then the data blocks of that file/folder can be excluded from the incremental backup. If the modification time is later than the defined time, then the data blocks of that file/folder can be included in the incremental backup. This method can be used to provide an efficient disaster recovery using a network.
Abstract:
A method for backing up data in a computer system from a plurality of primary data sources to a secondary data source is provided. The method comprises copying data sections from the plurality of primary data sources to the secondary data source and providing a data pointer on the secondary data source. The data pointer indicates a starting point of each transfer from the plurality of primary data sources and where that starting point is on the secondary data source. This data pointer information provides the minimum information necessary to map a location from the primary data source(s) to its location on the secondary data source.
Abstract:
A method of providing a fast path message transfer agent is provided. The method includes receiving bytes of a message over a network connection and determining whether the number-of bytes exceeds a predetermined threshold. If the number of bytes is less than a predetermined threshold, then the message is written only to memory. However, if the number of bytes exceeds the predetermined threshold, then some of the bytes (e.g. up to the predetermined threshold) are written to memory, wherein the remainder of the bytes are stored onto the non-volatile storage. If the message was received successfully-by each destination, then the message is removed from the memory/non-volatile storage. If not, all failed destinations are identified and the message (with associated failed destinations) is stored on the non-volatile storage for later sending.
Abstract:
A method of providing a fast path message transfer agent is provided. The method includes receiving bytes of a message over a network connection and determining whether the number-of bytes exceeds a predetermined threshold. If the number of bytes is less than a predetermined threshold, then the message is written only to memory. However, if the number of bytes exceeds the predetermined threshold, then some of the bytes e.g. up to the predetermined threshold are written to memory, wherein the remainder of the bytes are stored onto the non-volatile storage. If the message was received successfully-by each destination, then the message is removed from the memory/non-volatile storage. If not, all failed destinations are identified and the message with associated failed destinations is stored on the non-volatile storage for later sending.
Abstract:
A message system for communication of messages over a network where the messages include meta data and content data. An authentication unit authenticates users for messages from the network and a storage server unit that stores the messages. The storage server unit includes a plurality of protocol server units for processing the messages according to protocols used for the messages over the network, includes a meta-data storage unit for storing the meta data of messages, includes a content-data storage unit for string the content data of messages, and includes a manager unit for common control of the meta-data storage unit and the content-data storage unit. The manager unit includes a common addressing unit for common management of the addresses of messages at locations in the storage server unit for messages of the plurality of protocol server units and a common access control unit for controlling accesses to the locations in the storage server unit by the plurality of protocol server units.
Abstract:
A method for backing up data in a computer system from a plurality of primary data sources to a secondary data source is provided. The method comprises copying data sections from the plurality of primary data sources to the secondary data source and providing a data pointer on the secondary data source. The data pointer indicates a starting point of each transfer from the plurality of primary data sources and where that starting point is on the secondary data source. This data pointer information provides the minimum information necessary to map a location from the primary data source(s) to its location on the secondary data source.
Abstract:
The data from a plurality of primary data sources, such as disk drives or disk arrays, are interleaved and captured in a secondary data source, such as a tape drive, during a backup operation. The interleaving of data allows the overlap of read/write operations performed by the plurality of primary data sources, thereby optimizing the performance of the backup as well as the restore.
Abstract:
A method for backing up data in a computer system from at least one primary data source to a secondary data source is provided. The method includes performing a full image backup on a plurality of data blocks stored by the primary data sources. An incremental backup can then be initiated at a predetermined interval. During this incremental backup, the modification time of each file/folder at the predetermined interval can be compared to a defined time. If the modification time is earlier than the defined time, then the data blocks of that file/folder can be excluded from the incremental backup. If the modification time is later than the defined time, then the data blocks of that file/folder can be included in the incremental backup. This method can be used to provide an efficient disaster recovery using a network.