Abstract:
An information management system according to certain aspects allows users to share a portion of a file (e.g., a document) stored in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The system according to certain aspects provides a native view of secondary storage data on a client computing device. The index data and/or metadata relating to secondary storage data may be stored in native application format for access via the native source application.
Abstract:
The data storage system according to certain aspects can allow users to share a portion of a file (e.g., a document) in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The data storage system according to certain aspects can also provide a native view of secondary storage data on a client computer. The index data and/or metadata relating to secondary storage data may be stored in native format (e.g., format of the application(s) that generated the secondary storage data) so that the secondary storage data can be displayed in a native view. The index data and/or metadata may be synchronized on the client without synchronizing the secondary storage data itself.
Abstract:
According to certain aspects, systems and methods are provided for grouping clients together in a networked data storage environment. For instance, clients can be grouped together based on the software installed on the client or the client type. Each client group can be configured to maintain the configuration of clients within the client group. For example, one client group can be configured to ensure that a particular software suite remains up-to-date. Another client group can be configured to ensure that data within a particular directory or on a particular storage device associated with each client of the client group is backed up each night.
Abstract:
In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information. In general, files are initially copied from a primary client computing device to secondary storage. Thereafter, files to be synchronized are identified from the secondary storage, and copied to other client computing devices. Additionally, synchronized files may be viewed and accessed through a cloud and/or remote file access interface.
Abstract:
Disclosed herein are systems and methods for managing information management operations. The system may be configured to employ a work flow queue to reduce network traffic and manage server processing resources. The system may also be configured to forecast or estimate information management operations based on estimations of throughput between computing devices scheduled to execute one or more jobs. The system may also be configured to escalate or automatically reassign notification of system alerts based on the availability of system alert recipients. Various other embodiments are also disclosed herein.
Abstract:
Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request.
Abstract:
According to certain aspects, systems and methods are provided for grouping clients together in a networked data storage environment. For instance, clients can be grouped together based on the software installed on the client or the client type. Each client group can be configured to maintain the configuration of clients within the client group. For example, one client group can be configured to ensure that a particular software suite remains up-to-date. Another client group can be configured to ensure that data within a particular directory or on a particular storage device associated with each client of the client group is backed up each night.
Abstract:
A log monitoring system uses log monitoring rules to monitor log data generated by applications executing on a client computing device. By monitoring log data, the system detects that one or more triggering events have occurred on the client computing device. In response, the log monitoring system can perform one or more appropriate remedial actions. Additionally, in response to the detected event(s), the log monitoring system can extract a select subset of relevant data from the client and transmit the subset of data to a separate repository for storage and/or processing.
Abstract:
Distributed architecture for executing information management services using shared platform microservices, containerization techniques, and regional core services. This architecture decentralizes the traditional model by segmenting the various functions of the centralized control and information manager into modular cloud microservices. This modularization not only enhances system flexibility but also allows for a more dynamic configuration, with certain elements being deployable as containers. The resilient architecture leverages the inherent scalability and adaptability of cloud technology.
Abstract:
Techniques for providing data retention services based on a geographic region are disclosed. In one aspect, a location of a computing device is determined. A geographic entity corresponding to the location of the computing device is then determined. A data retention policy is assigned to data of the computing device based on regulations of the geographic entity. Other aspects are also disclosed.