-
公开(公告)号:US12105595B2
公开(公告)日:2024-10-01
申请号:US17955125
申请日:2022-09-28
申请人: Dell Products L.P.
IPC分类号: G06F16/00 , G06F11/14 , G06F16/11 , G06F16/16 , G06F16/174 , G06F16/176
CPC分类号: G06F11/1453 , G06F16/119 , G06F16/125 , G06F16/162 , G06F16/1748 , G06F16/1774 , G06F2201/84
摘要: Embodiments for providing file immutability for cloud storage data in a deduplicating filesystem and using a new filesystem that is spawned to receive redirected live data, after which the old filesystem is expired. Data objects are stored in the cloud by defining a protection duration from a first date to a fixed future date, and applying a retention lock to one or more data objects stored in cloud storage during the protection duration, the retention lock preventing unauthorized deletion, modification or movement of the data. A renew threshold date is defined within the protection duration, and a new filesystem is spawned on this date. All new data is redirected to the new filesystem and locked for the protection duration, and the first file system is destroyed.
-
公开(公告)号:US20240256393A1
公开(公告)日:2024-08-01
申请号:US18162381
申请日:2023-01-31
申请人: Dell Products L.P.
发明人: Salil Dangi , Nitin Madan
IPC分类号: G06F11/14 , G06F16/11 , G06F16/176
CPC分类号: G06F11/1464 , G06F16/125 , G06F16/1774 , G06F2201/84
摘要: One example method includes accessing a point-in-time copy including retention locked backups that were stored on a backup storage server at a time the point-in-time copy was generated. The method further includes accessing a current namespace including retention locked backups that are currently stored on the backup storage server. Each retention locked backup includes data backup files. The method also includes determining a first set of retention locked backups that are included in the point-in-time copy, but are not included in the current namespace. The method finally includes copying the first set of retention locked backups from the point-in-time copy into the current namespace without removing any of the retention locked backups already in the current namespace.
-
公开(公告)号:US11994957B1
公开(公告)日:2024-05-28
申请号:US18194006
申请日:2023-03-31
申请人: Dell Products L.P.
发明人: Donna Barry Lewis , Nitin Madan , Bhimsen Bhanjois
IPC分类号: G06F16/00 , G06F11/14 , G06F11/34 , G06F16/174 , H03M7/30
CPC分类号: G06F11/1469 , G06F11/1453 , G06F11/3423 , G06F16/1748 , H03M7/3091
摘要: Improving the performance of read operations in a restore path of an inline deduplication system utilizing a DDBOOST interface by providing an adaptive compression component for use with DDBOOST applications. The system utilizes a built-in compression mode for transferring read data if there is a sufficient available CPU resources in both the server and client to respectively compress and decompress the read data without destabilizing the system. CPU usage on both the client and the server is tracked to generate predicted respective CPU usage. These respective predictions are compared to defined maximum threshold usage values. If the predicted values do not exceed the thresholds, compression is used, otherwise the data is transmitted over the network as non-compressed data.
-
公开(公告)号:US11829708B1
公开(公告)日:2023-11-28
申请号:US18309363
申请日:2023-04-28
申请人: Dell Products L.P.
发明人: Salil Dangi , Nitin Madan
IPC分类号: G06F40/134 , G06F16/11
CPC分类号: G06F40/134 , G06F16/128
摘要: A system creates a snapshot of a part of copy management content which is displayed by a user interface, and which is selected by a user of the system as context for a subsequent message from the user. The system creates a hyperlink in the message to the snapshot which depicts the part of the copy management content. The system stores user entries for a tag that identifies at least one intended recipient of the message, a time when the message is made available for the intended recipient(s), and text for the message. The system sends the message at the time to the intended recipient(s) via an internal communication channel of the system. In response to the recipient of the message selecting the message's hyperlink to the snapshot, the system outputs the context for the message to the recipient's user interface, which enables the recipient to respond to the message.
-
5.
公开(公告)号:US20230195581A1
公开(公告)日:2023-06-22
申请号:US17558398
申请日:2021-12-21
申请人: Dell Products L.P.
发明人: Nitin Madan , Donna Barry Lewis , Kedar Godbole
IPC分类号: G06F11/14 , G06F16/174 , G06F9/54 , G06F16/172
CPC分类号: G06F11/1469 , G06F16/1748 , G06F9/541 , G06F16/172 , G06F2201/805
摘要: Embodiments of file restores in a Data Domain (DD) file system implementing a DD Bandwidth Optimized Open Storage Technology (DDBoost) library that translates application read and write request to DDBoost application program interfaces (APIs). A prefetch queue processor creates an intent to read the file. The application passes the file handle of the file, and the destination handle where the data must be read into. As the queue is processed, the prefetch for the request (handle/offset/length) is passed to the file server. The filesystem processes the request to open the file to load into memory. As the read request for the same file reaches the filesystem the file data is read from memory for writing to the destination handle. An extended DDBoost API expression is defined to pass the current path and destination path to the application.
-
公开(公告)号:US20240362141A1
公开(公告)日:2024-10-31
申请号:US18495135
申请日:2023-10-26
申请人: Dell Products L.P.
发明人: Salil Dangi , Nitin Madan
CPC分类号: G06F11/327 , G06F11/1458
摘要: System audits messages, communicated internally in copy management system, about copy management jobs, and learns about relationships between message requests for user actions on copy management jobs and subsequent failures of copy management jobs. System creates snapshot of copy management content displayed by user interface and selected by user as context for user's message, and creates message's link to snapshot. System stores user entries that identify message's intended recipient(s), time of availability, and text. If message requests user action on copy management job, and relationship between unanswered requests for user to perform action on copy management job and subsequent failures of copy management job satisfies relationship threshold, then machine learning system sends message via copy management system's internal communication channel to system-selected administrator, who selects message's hyperlink to snapshot. System responds by outputting context for message to system-selected administrator's user interface, which enables system-selected administrator to respond to message.
-
公开(公告)号:US12117907B2
公开(公告)日:2024-10-15
申请号:US17733550
申请日:2022-04-29
申请人: Dell Products L.P.
发明人: Nitin Madan , Bhimsen Bhanjois , Kalyan C. Gunda , Srisailendra Yallapragada , Alok Katiyar , Salil Dangi , Sanjay Vedanthan
IPC分类号: G06F16/182 , G06F11/14
CPC分类号: G06F11/1464 , G06F11/1451 , G06F11/1469 , G06F16/184 , G06F2201/80
摘要: Methods of cloning data backup across namespaces are disclosed. In response to receiving a file replication request, one or more source files are cloned from a first namespace to a second namespace, as one or more destination files. A first attribute indicating that the source file(s) have been cloned to the second namespace as the destination file(s) is created. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where synthetic information of the destination synthetic file points to the source file(s) as one or more base file. A second attribute indicating that the source synthetic file has been cloned to the second namespace as the destination synthetic file is created. Based on the first and second attributes, the synthetic information of the destination synthetic file is updated or propagated to use the destination file(s) as one or more base files on the second namespace.
-
公开(公告)号:US12105594B2
公开(公告)日:2024-10-01
申请号:US17841960
申请日:2022-06-16
申请人: Dell Products L.P.
发明人: Nitin Madan , Bhimsen Bhanjois , Kalyan C. Gunda
CPC分类号: G06F11/1453 , G06F11/1451 , G06F16/14
摘要: Embodiments for processing fastcopy overwrite backup workloads (FCOW) as virtual synthetic backups, by detecting whether or not a backup workload comprises an FCOW workload in which a base file is fastcopied to a target file, wherein portions of the base file are overwritten through overwrites by new data in the target file by a deduplication backup process. For FCOW workloads, the process creates a file recipe by trapping seek offsets and write byte lengths for the overwrites, and writing extent information comprising offset differences to a recipe table of the file recipe, and the file recipe facilitates file processing optimizations including differencing, replication, and tiering.
-
公开(公告)号:US12001410B2
公开(公告)日:2024-06-04
申请号:US17684751
申请日:2022-03-02
申请人: Dell Products L.P.
IPC分类号: G06F16/215
CPC分类号: G06F16/215
摘要: This disclosure provides system, methods, and media for identifying inadvertent compression or encryption in data streams from a client that land on a deduplication storage system. When one or more such abnormalities are detected, an alert message is generated to alert the administrator of the deduplication storage system so that corrective actions can be taken to prevent undesired consequences. According to an exemplary method, machine learning techniques are used to plot and smoothen global compression ratios and local compression ratios of historical backups from a client over a period of time. Then, a second derivative of each data point on the smoothened curves is taken and compared with a predetermined threshold to detect whether that the slope of the data point exceeds a threshold. A data point whose slope exceeds the threshold can be determined to be a data point corresponding to a backup that includes compression and/encryption.
-
公开(公告)号:US20240111752A1
公开(公告)日:2024-04-04
申请号:US17936983
申请日:2022-09-30
申请人: Dell Products L.P.
CPC分类号: G06F16/2365 , G06F11/1451 , G06F2201/84
摘要: Corruption detection in backups is disclosed. Backups that are received into a backup environment are stored in corresponding lineages. A detection engine is configured to perform corruption detection operations on the most recent backups in each of the lineages based on a sample frequency. Corruption detection operations may also be performed randomly and based on unexpected or unusual changes in backup metadata.
-
-
-
-
-
-
-
-
-