Abstract:
An information management system according to certain aspects can implement application archiving. The system may archive one or more applications on computing devices to make more storage space available on these devices. The system can determine which applications on client computing device to archive based on various factors. Some examples of factors can include frequency of use, application type, amount of application data and/or storage, user and/or device location, etc. The data to be archived can include one or more executable file(s), metadata, actual data, etc. After an application is archived, the system can generate a placeholder for the application; a placeholder can include information for restoring the archived application.
Abstract:
A system according to certain aspects improves the process of restoring database objects and converting those objects into another database file format. According to certain aspects, a database file is backed up in a block-level fashion. Instead of restoring the entire backup file, the information management system may restore a particular database object from a backup database file that is stored as multiple blocks or other granular units. Then, the information management system can extract the desired data from the restored block(s). By using block-level mapping and storage techniques described herein, the system can restore a database object in a backup database file without restoring the entire backup database file, thereby speeding up restore operations and reducing consumption of storage and processing resources. In addition, the information management system can convert the blocks, using a staging memory, to another database file format as desired.
Abstract:
Aspects of this disclosure relate to protecting email data. For example, email protection rules can instruct an email server to route an email to an email protection module. The one or more email rules can identify a group of one or more email addresses. The email protection module can receive an email from the email server that has an email address of the group as an intended receipt. The email protection module can route the email to secondary storage and store the email in secondary storage to create a secondary copy of the email. The secondary copy can be stored inline to persistent memory of secondary storage, according to certain embodiments. Access to the backup copy of the email stored to the persistent memory can be controlled, for example, based on whether a user had permission to access to the email when the email was sent.
Abstract:
According to certain aspects, an information management system can include a client computing device residing in a primary storage subsystem configured to: identify a first application to archive to one or more secondary storage devices residing in a secondary storage subsystem, the first application being one of a plurality of applications installed on the client computing device; identify first data associated with the first application, the first data stored in the one or more primary storage devices associated with the client computing device; forward an executable instance of the first application and the first data to a first secondary storage computing device to copy the executable instance of the first application and the first data to the one or more secondary storage devices; and delete the first application from the one or more primary storage devices.
Abstract:
According to certain aspects, a system may include a computing device configured to: intercept a request from a database application to read a portion of a database file, where a secondary copy of the database file resides on a secondary storage device(s) and is organized as a plurality of first blocks, wherein the request includes a database file offset(s) corresponding to the requested portion; and map the database file offset(s) to a subset of the first blocks that correspond to requested database object(s). The system may include a secondary storage controller computer(s) configured to: access a table that maps the plurality of first blocks to storage locations on the secondary storage device(s); using the table, locate and retrieve the subset of the first blocks on the secondary storage device(s); and forward the retrieved first blocks for storage in a primary storage device(s).
Abstract:
Systems and methods for storage pruning can enable users to delete, edit, or copy backed up data that matches a pattern. Storage pruning can enable fine-grain deletion or copying of these files from backups stored in secondary storage devices. Systems and methods can also enable editing of metadata associated with backups so that when the backups are restored or browsed, the logical edits to the metadata can then be performed physically on the data to create a custom restore or a custom view. A user may perform operations such as renaming, deleting, modifying flags, and modifying retention policies on backed up items. Although the underlying data in the backup may not change, the view of the backup data when the user browses the backup data can appear to include the user's changes. A restore of the data can cause those changes to be performed on the backup data.
Abstract:
A system according to certain aspects improves the process of creating secondary copies of data (e.g., creating backup copies). The system can compute the score of the data (e.g., a computer file storing information) to be backed up, and determine whether the score satisfies one or more threshold criteria before backing up the data. In one example, a change in score indicates a change in the content of the data. The threshold criteria may be that the score be different from the score of the most recently backed up copy of the data.
Abstract:
An information management system according certain aspects for archiving file system content may include a third-party application archiving data agent configured to: access third-party application archiving rules for archiving data to one or more secondary storage devices, wherein the third-party application archiving rules are defined by a third-party application to archive files associated with the third-party application; access third-party metadata associated with a plurality of files in a file system, wherein the plurality of files is associated with the third-party application and the third-party metadata is defined by the third-party application; determine whether to archive one or more files of the plurality of files based at least in part on the third-party application archiving rules and the third-party metadata; and in response to determining that a first file of the plurality of files should be archived, archive the first file to the one or more secondary storage devices.
Abstract:
A system according to certain aspects improves the process of creating secondary copies of data (e.g., creating backup copies). The system can compute the score of the data (e.g., a computer file storing information) to be backed up, and determine whether the score satisfies one or more threshold criteria before backing up the data. In one example, a change in score indicates a change in the content of the data. The threshold criteria may be that the score be different from the score of the most recently backed up copy of the data.
Abstract:
A system according to certain aspects may include a client computing device including: a database application configured to output a database file in a primary storage device(s), the database application outputting the database file as a series of application-level blocks; and a data agent configured to divide the database file into a plurality of first blocks having a first granularity larger than a second granularity of the application-level blocks such that each of the first blocks spans a plurality of the application-level blocks. The system may include a secondary storage controller computer(s) configured to: in response to instructions to create a secondary copy of the database file: copy the plurality of first blocks to a secondary storage device(s) to create a secondary copy of the database file; and create a table that provides a mapping between the copied plurality of first blocks and corresponding locations on the secondary storage device(s).