会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Hybrid data backup in a networked computing environment
    • 网络计算环境中的混合数据备份
    • US08775376B2
    • 2014-07-08
    • US13172930
    • 2011-06-30
    • Kavita ChavdaNagapramod S. MandagereSandeep M. UttamchandaniPin Zhou
    • Kavita ChavdaNagapramod S. MandagereSandeep M. UttamchandaniPin Zhou
    • G06F7/00G06F17/00
    • G06F11/1458G06F11/1448G06F11/1464
    • Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”. A storage solution is then determined based on the set of storage configuration parameters. In general, the storage solution identifies at least one local storage resource and at least one remote storage resource (e.g., a cloud storage resource) for backing up the portions of the set of data that are unique to the set of data. Once the storage solution has been determined, the unique portions of the set of data will be stored in accordance therewith.
    • 本发明的实施例提供了一种用于网络计算环境(例如,云计算环境)中的数据备份的混合(例如,本地和远程)方法。 在典型的实施例中,接收一组对应于要备份的数据的存储配置参数并将其存储在计算机数据结构中。 该组存储配置参数可以包括以下中的至少一个:恢复时间目标(RTO),恢复点目标(RPO)以及该组数据的期望类型的保护。 无论如何,将该组数据与先前存储的数据进行比较,以识别以下中的至少一个:与先前存储的数据具有共同性的数据集合中的部分; 以及数据集合中对数据集合唯一的部分(即,与先前存储的任何数据不共同的)。 上述处理在本文中被称为“重复数据删除”。 然后基于存储配置参数的集合来确定存储解决方案。 通常,存储解决方案识别至少一个本地存储资源和至少一个远程存储资源(例如,云存储资源),用于备份该组数据的唯一的数据组的部分。 一旦确定了存储解决方案,则将根据其存储该组数据的唯一部分。
    • 4. 发明授权
    • Data de-duplication in computer storage systems
    • 计算机存储系统中的重复数据删除
    • US08781800B2
    • 2014-07-15
    • US13286490
    • 2011-11-01
    • Kavita ChavdaEric W. Davis RozierNagapramod S. MandagereSandeep M. UttamchandaniPin Zhou
    • Kavita ChavdaEric W. Davis RozierNagapramod S. MandagereSandeep M. UttamchandaniPin Zhou
    • G06F17/10
    • G06F7/00G06F17/30159
    • Embodiments of the present invention provide an approach that utilizes discrete event simulation to quantitatively analyze the reliability of a modeled de-duplication system in a computer storage environment. In addition, the approach described herein can perform such an analysis on systems having heterogeneous data stored on heterogeneous storage systems in the presence of primary faults and their secondary effects due to de-duplication. In a typical embodiment, data de-duplication parameters and a hardware configuration are received in a computer storage medium. A data de-duplication model is then applied to a set of data and to the data de-duplication parameters, and a hardware reliability model is applied to the hardware configuration. Then a set (at least one) of discrete events is simulated based on the data de-duplication model as applied to the set of data and the data de-duplication parameters, and the hardware reliability model as applied to the hardware configuration. Based on the simulation, a set of data reliability and availability estimations/estimates can be generated (e.g., and outputted/provided).
    • 本发明的实施例提供一种利用离散事件模拟来定量分析计算机存储环境中的建模的重复数据删除系统的可靠性的方法。 另外,本文描述的方法可以在存在主异构存在的异构存储系统上的具有异构数据的系统上进行这种分析,并且由于重复数据删除而产生其次要效应。 在典型的实施例中,在计算机存储介质中接收数据重复数据删除参数和硬件配置。 然后将数据重复数据删除模型应用于一组数据和重复数据删除参数,并将硬件可靠性模型应用于硬件配置。 然后基于应用于数据集和数据重复数据删除参数的数据重复数据删除模型以及应用于硬件配置的硬件可靠性模型来模拟一组(至少一个)离散事件。 基于该仿真,可以生成(例如和输出/提供)一组数据可靠性和可用性估计/估计。
    • 8. 发明授权
    • Detecting inadvertent or malicious data corruption in storage subsystems and recovering data
    • 检测存储子系统中的无意或恶意数据损坏并恢复数据
    • US08315991B2
    • 2012-11-20
    • US12763934
    • 2010-04-20
    • Nagapramod S. MandagereMark J. SeamanSandeep M. Uttamchandani
    • Nagapramod S. MandagereMark J. SeamanSandeep M. Uttamchandani
    • G06F17/30
    • G06F11/1435G06F17/30368G06F2201/84
    • Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.
    • 本发明的实施例检测无意或恶意的数据损坏并且用于恢复数据,包括接收指定损坏的应用数据的查询; 分析事务日志以查找与数据相关的更新操作; 通过将表数据映射到文件系统内的位置并将文件系统位置映射到卷逻辑块来确定数据的存储位置; 并分析快照卷位图以确定位图是否显示存储在卷逻辑块中的表数据的更改。 反映在数据的位图中但在事务日志中没有相应条目的更改将被标记为未经授权的更改。 在从被标记的快照拍摄之前的时间起,数据的快照被识别用于在未经授权的更改之前将数据恢复到其状态。