Abstract:
Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files.
Abstract:
The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents.
Abstract:
A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system monitors data operations and when the data operation is a delete, the system determines whether the data identified for deletion has been protected by a backup operation. Data that has not been backed up, such as newly created data, is copied to temporary storage before deletion. When the data has been protected, the system determines whether the data has been modified after the backup operation. Data modified after the backup operation is copied to temporary storage before deletion.
Abstract:
The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period.
Abstract:
A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly.
Abstract:
A method and system for creating secondary copies of data whose contents satisfy searches within data stores is described. In some cases, the system searches for data within a data store, identifies a set of data that satisfies the search, copies the identified set of data, and transfers the copy to secondary or other storage. In some cases, the system utilizes search-based secondary copies of days during restoration processes in order to restore data similar to and/or associated with data requested to be restored.
Abstract:
The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period.
Abstract:
The data storage system according to certain aspects can allow users to share a portion of a file (e.g., a document) in secondary storage. The user may specify a portion of a secondary storage file to share and send a link to the portion to another user. The other user can access the shared portion from the link, and just the shared portion may be restored from secondary storage. The data storage system according to certain aspects can also provide a native view of secondary storage data on a client computer. The index data and/or metadata relating to secondary storage data may be stored in native format (e.g., format of the application(s) that generated the secondary storage data) so that the secondary storage data can be displayed in a native view. The index data and/or metadata may be synchronized on the client without synchronizing the secondary storage data itself.
Abstract:
A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. The system copies the data to temporary storage, normalizes the copy, and merges the normalized data from the temporary storage to a secondary storage device. For instance, the system merges the data on the secondary storage device at locations indicated by the file path saved in metadata. In another manner, the system merges changes between the previously backed up version of the data and the data identified for deletion into the previously backed up version of the data stored on the secondary storage device at the locations indicated by the file path. In a further manner, the system merges the differences between the previously backed up version of the data and the data identified for deletion at the locations indicated by the file path.
Abstract:
Described in detail herein is a method of copying data of one or more virtual machines being hosted by one or more non-virtual machines. The method includes receiving an indication that specifies how to perform a copy of data of one or more virtual machines hosted by one or more virtual machine hosts. The method may include determining whether the one or more virtual machines are managed by a virtual machine manager that manages or facilitates management of the virtual machines. If so, the virtual machine manager is dynamically queried to automatically determine the virtual machines that it manages or that it facilitates management of. If not, a virtual machine host is dynamically queried to automatically determine the virtual machines that it hosts. The data of each virtual machine is then copied according to the specifications of the received indication.