Abstract:
A method of analysing productivity in relation to a data storage system, includes monitoring one or more files stored in the data storage system. The method further includes generating a change list of updated files and evaluating an extent of the changes made to each file in the change list over a predetermined period of time. The method further includes outputting a metric based on the extent of changes made as an indicator of productivity. The method enables accurate and holistic analysis of productivity of an organization or enterprise with granularity of a single user, teams, groups, or projects, and thus, provides concrete recommendations for self-evaluation.
Abstract:
An apparatus for dynamically scheduling a digital storage backup comprises at least one processor adapted to determine at least one backup parameter for a backup of a plurality of data blocks of a monitored non transitory storage. Determining the at least one backup parameter comprises: computing a storage classification for the plurality of data blocks according to a compliance of an amount of changes to a content of the plurality of data blocks with one or more threshold values, and determining the at least one backup parameter according to the classification.
Abstract:
A management server for managing the storage of files in one or more storage servers, comprises a catalog configured to store a first list of the files stored in one or more monitored servers amongst the storage servers. The first list comprises recording, for each listed file, an identifier, one or more storage locations, and a content information related to the content of the listed file. The management server further comprises a change detection module, a storage location selection, a scanning module, and a marking module. The management server is configured to detect a change on a given file, and select in the first list one storage location where a change has been detected for the given file. The management server performs effective antivirus scans which do not scan a duplicate file multiple times as in the conventional approach.
Abstract:
An advanced deduplication method, particularly with additional deduplication tier and a global server for deduplicating multiple storage servers are disclosed. The global server is configured to maintain information regarding a set of hash values, each hash value being associated with a data chunk of data stored in the global server and/or the storage servers. The global server is configured to receive, from one or more of the storage servers, a request to modify the information with respect to one or more hash values. The global server is further configured to accumulate and sort metadata related to the one or more requests, particularly the metadata comprises, for each request, a hash value indicated by the request and an indication of the storage server that sent the request. When the accumulated metadata reaches a determined size, the global server is configured to modify the information with respect to the one or more hash values, based on the accumulated metadata.
Abstract:
The present disclosure relates to the technical field of data decryption, particularly provides an automatic lineage-based decryption method after a ransomware attack. In this disclosure, a device for ransomware decryption is disclosed, and the device is configured to obtain a first backup image of user data at a first time point, T1, and a second backup image of the user data at a second time point, T2, wherein T2 is later than T1. The device is further configured to detect whether one or more files of the user data were encrypted by a ransomware between the time point T1 and the time point T2. Further, the device is configured to decrypt one or more files determined encrypted by the ransomware, using the first backup image and the second backup image.
Abstract:
Provided is a computer-implemented method of backup and restore in a network data storage system (200, 310). The method includes generating, at a predefined time interval, a series of one or more virtual snapshots including, for each item in the network data storage system: (i) a strong hash of the item data, and (ii) one or more metadata elements related to the item. The method includes, in response to a request to restore a particular item: (i) searching the series of virtual snapshots for all available sources of the particular item, (ii) identifying the best source for the particular item, and (iii) recovering item data for the particular item from the identified best source.
Abstract:
The present disclosure provides a device for generating a honeypot for attracting ransomware, a device for using a honeypot for attracting ransomware, and a device for optimizing a honeypot for attracting and decrypting ransomware and corresponding methods. The device is configured to: obtain a first backup image of a user system at a first time point; create a first backup system based on the first backup image; run one or more ransomware kits on the first backup system; identify a first set of data structures in the first backup system that are attacked within a determined time period by the one or more ransomware kits; identify a first set of properties of the first set of data structures; and generate the honeypot based on the first set of properties.
Abstract:
The present invention is directed to a device and method, both arranged to support execution of a booting process. A requested data block processing unit of the device is configured to generate, during the booting process, a requested data block set, wherein each entry of the requested data block set comprises information on a data block, requested from a storage during the booting process. A pre-fetching unit of the device is configured, during the booting process, to pre-fetch, for each entry of a data block set, from the storage a data block, information on which is stored in the entry of the data block set, wherein each entry of the requested data block set comprises information on a data block, requested from the storage during a previously executed booting process. Further, the present invention relates to a correspondingly arranged computer program 10 product and to a correspondingly arranged computer-readable medium.
Abstract:
A method for storing data in computer storage is disclosed. The method comprises storing data in computer storage, storing erasure code for the data in computer storage, storing a copy of the data in computer storage, and identifying the computer storage storing the erasure code for the data as available for storage of further data in result of the storing a copy of the data in computer storage. Storing erasure code for the data may advantageously allow recovery of the data in the event of corruption of the data. However, the erasure code disadvantageously consumes memory space. Identifying the memory storing the erasure code as available for storage of further data following storage of a copy of the data advantageously frees memory space for storage of further data.
Abstract:
An advanced deduplication method, particularly with additional deduplication tier is disclosed. In specific, the disclosure proposes a global server for deduplicating multiple storage servers. The global server is configured to maintain information regarding a set of hash values, each hash value being associated with a data chunk of data stored in the global server and/or the storage servers, and notify a first range of the hash values to the storage servers. The global server is further configured to receive, from one or more of the storage servers, a request to modify the information with respect to one or more hash values falling into the first range of the hash values. The global server is further configured to modify the information with respect to the one or more hash values falling into the first range of the hash values, based on the request received from the one or more storage servers. The disclosure further proposes a storage server for deduplicating at a global server.