Abstract:
Avoiding compression of high-entropy data during creation of a backup of a source storage. In one example embodiment, a method for avoiding compression of high-entropy data during creation of a backup of a source storage may include identifying a chunk with an original size in a file in a source storage, compressing, during creation of a backup of the source storage, the chunk to generate a compressed chunk with a compressed size, determining a compression ratio for the chunk by comparing the original size to the compressed size, determining whether the compression ratio is less than the compression threshold, and, in response to determining that the compression ratio is less than the compression threshold, automatically designating the file as a high-entropy file and automatically avoiding compression, during the creation of the backup, of chunks in a second similar file in the source storage.
Abstract:
Trimming unused blocks from a versioned image backup of a source storage that is stored in a sparse storage. In one example embodiment, a method may include identifying a versioned image backup of a source storage that is stored in a sparse storage. The method may further include deleting the first version of the versioned image backup from the sparse storage during a retention process, identifying a first set of blocks, identifying a second set of blocks, determining a third set of blocks that are included in the second set of blocks but are not included in the first set of blocks, and, after the retention process, trimming the third set of blocks from the second version of the versioned image backup that is stored in the sparse storage.
Abstract:
Exposing proprietary data to a hypervisor as native hypervisor data. In one example embodiment, one or more non-transitory computer-readable media store one or more programs that are configured, when executed, to cause one or more processors to perform a method of exposing proprietary data to a hypervisor as native hypervisor data. The method may include identifying a proprietary disk file having a proprietary file format and creating a plugin file corresponding to the proprietary disk file with the plugin file having a plugin file format which is different from a native hypervisor disk file format.
Abstract:
Software revalidation. In one example embodiment, a method for software revalidation may include various steps. For example, the method may include receiving, at a machine on which a software application has been installed and activated, activation rules that have been updated since release of the software application. The method may also include periodically applying, at the machine, the updated activation rules to newly-collected machine configuration information from the machine to determine whether a product key remains valid for the newly-collected machine configuration information and, in response to determining that the product key remains valid for the newly-collected machine configuration information, revalidating, at the machine, the software application to authorize continued access to the software application.
Abstract:
Exposing a proprietary image backup to a hypervisor as a disk file that is bootable by the hypervisor. In one example embodiment, a method of exposing a proprietary image backup to a hypervisor as a disk file that is bootable by the hypervisor may include identifying the proprietary image backup having a proprietary format and storing an operating system, identifying a plugin file corresponding to the proprietary image backup, reconfiguring the operating system to cause the operating system to be bootable when using hardware emulated by the hypervisor, gathering operating system data from the proprietary image backup, reformatting the operating system data into a native format of the hypervisor, and booting the operating system in a virtual machine of the hypervisor.
Abstract:
Utilizing an incremental backup in a decremental backup system. In one example embodiment, a method for utilizing an incremental backup in a decremental backup system includes creating a base backup that includes all original allocated blocks in a source storage at a first point in time. Next, an incremental backup is created that includes allocated blocks in the source storage that were newly allocated or were changed between the first point in time and a second point in time. The changed allocated blocks in the incremental backup are identified. During a third time period, a decremental backup is created and the incremental backup is ingested into the base backup by copying, into the decremental backup, original allocated blocks from the base backup that correspond to the changed allocated blocks in the incremental backup. Lastly, the newly-allocated blocks and the changed allocated blocks from the incremental backup are added to the base backup.
Abstract:
Utilizing an incremental backup in a decremental backup system. In one example embodiment, a method for utilizing an incremental backup in a decremental backup system includes creating a base backup that includes all original allocated blocks in a source storage at a first point in time. Next, an incremental backup is created that includes allocated blocks in the source storage that were newly allocated or were changed between the first point in time and a second point in time. The changed allocated blocks in the incremental backup are identified. During a third time period, a decremental backup is created and the incremental backup is ingested into the base backup by copying, into the decremental backup, original allocated blocks from the base backup that correspond to the changed allocated blocks in the incremental backup. Lastly, the newly-allocated blocks and the changed allocated blocks from the incremental backup are added to the base backup.
Abstract:
Consolidating decremental backups in a decremental backup chain. In one example embodiment, a method for consolidating decremental backups in a decremental backup chain includes identifying a decremental backup chain that includes multiple decremental backups of a source storage and a base backup of the source storage, identifying, for consolidation, a sequential set of decremental backups in the multiple decremental backups, identifying a set of oldest blocks from the sequential set of decremental backups for unique block positions of blocks included in the sequential set of decremental backups, and creating a consolidated decremental backup that includes the set of oldest blocks.
Abstract:
Pruning free blocks out of a decremental backup chain. In one example embodiment, a method for pruning free blocks out of a decremental backup in a decremental backup chain includes identifying a decremental backup chain, and pruning free blocks out of the target decremental backup.
Abstract:
Consolidating decremental backups in a decremental backup chain. In one example embodiment, a method for consolidating decremental backups in a decremental backup chain includes identifying a decremental backup chain that includes multiple decremental backups of a source storage and a base backup of the source storage, identifying, for consolidation, a sequential set of decremental backups in the multiple decremental backups, identifying a set of oldest blocks from the sequential set of decremental backups for unique block positions of blocks included in the sequential set of decremental backups, and creating a consolidated decremental backup that includes the set of oldest blocks.