Abstract: Techniques to back up data are disclosed. In various embodiments, a copy of a free block map as of a first time associated with a first backup is stored in persistent data storage. Writes made subsequent to the first backup to blocks not listed as free in the copy of the free block map as of the first time are tracked in a persistently-stored change block tracking log. A free block map as of a second time and the previously-stored copy of the free block map as of the first time are used to determine which blocks listed as free in the free block map as of the first time have been written to since the first time. At least a subset of blocks determined to have been written to since the first time are including in an incremental backup.
Abstract: Opportunistic repair of fragmentation in a synthetic backup is disclosed. In various embodiments, data generated to perform processing other than fragmentation repair is received. At least a portion of the received data is used to compute a locality measure with respect to a group of segments comprising a portion of a file. A decision whether to repair fragmentation of segments comprising the group is made based at least in part on the computed locality measure.
Abstract: This disclosure relates to a method, article of manufacture, and apparatus of restoring a database allowing simultaneous full and incremental backups. In some embodiments, this includes receiving, by a server, a request for restoring as of a restore point-in-time, in response to the request, retrieving by the server a set of backup objects, sorting the set of backup objects in descending order, locating a first incremental backup in the set of backup objects based on the restore point-in-time and a first incremental backup start time associated with the first incremental backup, locating a full backup in the set of backup objects based on the first incremental backup start time, a full backup start time and a full backup end time associated with the full backup, storing the full backup and the first incremental backup in a list of restoring objects, and sending, by the server, the list of restoring objects.
Abstract: A system for storing data comprises a performance storage system for storing one or more data items. A data item of the one or more data items comprises a data file or a data block. The system further comprises a segment storage system for storing a snapshot of a stored data item of the one or more data items in the performance storage system. The taking of the snapshot of the stored data item enables recall of the stored data item as stored at a time of the snapshot. At least one newly stored segment is stored as a reference to a previously stored segment.
Abstract: A method is disclosed. A finite state machine model for a single system workflow is replicated across a plurality of distributed nodes associated with a leader election protocol. A leader is determined amongst the plurality of distributed nodes to perform a next action of the finite state machine model based at least in part on the leader election protocol. One or more nodes amongst the plurality of distributed nodes are configured to submit a timeout ticket if the next action of the finite state machine model does not appear to have been performed by the leader within a prescribed time.
Type:
Grant
Filed:
April 4, 2014
Date of Patent:
October 25, 2016
Assignee:
EMC Corporation
Inventors:
Florian Waas, Christopher J. Pedrotti, Robbert VanRenesse
Abstract: A VM management server receives a request from a backup application server to back up a first VM. The VM management server determines a first of the host systems based on the request, wherein the first host system hosts the first VM. A first request is transmitted from the VM management server to a VMM of the first host system hosting the first VM via a VM application programming interface (VM API) over a network. The first request requests the VMM to capture a VM snapshot representing a consistent state of the first VM. In response to determining that the consistent state of the VM has been captured, a second request is transmitted to a first storage system associated with the first host system to send one or more VM disk images associated with the consistent state of the first VM to a second storage system over the network.
Abstract: Protecting a first backup application is disclosed. A backup of a state of the first backup application is received. The first backup application coordinates backup of a virtual environment. A second backup application external to the virtual environment is used to store the backup. The backup may be stored in a data storage external to the virtual environment.
Type:
Grant
Filed:
June 28, 2013
Date of Patent:
October 25, 2016
Assignee:
EMC Corporation
Inventors:
Kiran K. Bachu, Mark Lonsdale, Bala Vijayakumar
Abstract: Techniques are provided for parallel compression of data chunks being written to a shared object. A client executing on a compute node or a burst buffer node in a parallel computing system stores a data chunk generated by the parallel computing system to a shared data object on a storage node by compressing the data chunk; and providing the data compressed data chunk to the storage node that stores the shared object. The client and storage node may employ Log-Structured File techniques. The compressed data chunk can be de-compressed by the client when the data chunk is read. A storage node stores a data chunk as part of a shared object by receiving a compressed version of the data chunk from a compute node; and storing the compressed version of the data chunk to the shared data object on the storage node.
Type:
Grant
Filed:
March 13, 2013
Date of Patent:
October 25, 2016
Assignees:
EMC Corporation, Los Alamos National Security, LLC
Inventors:
John M. Bent, Sorin Faibish, Gary Grider
Abstract: Methods and apparatus for computer systems having first and second memory tier having regions, physical memory having page caches that are shareable with multiple ones of the regions in the first memory tier and the regions in the second memory tier, and virtual memory having mmaps of ones of the regions in the first memory tier and ones of the regions in the second memory tier, wherein the mmaps are associated with multiple ones of the pages caches.
Type:
Grant
Filed:
June 25, 2014
Date of Patent:
October 25, 2016
Assignee:
EMC CORPORATION
Inventors:
Adrian Michaud, Roy E. Clark, Kenneth J. Taylor
Abstract: Techniques for predicting data replication performance degradation are described. According to one embodiment, a method starts with receiving periodically data replication characteristics from a source storage and a target storage, the periodically received data replication characteristics being extracted from a replication process of the source storage replicating data to the target storage. The periodically received data replication characteristics are analyzed at a replication management server communicatively coupled with the source storage and the target storage, and a predictive modeling are applied. When the possibility of degradation of replication performance reaches a predetermined threshold, a notification is sent out.
Type:
Grant
Filed:
December 20, 2012
Date of Patent:
October 25, 2016
Assignee:
EMC Corporation
Inventors:
Mark Chamness, Michael L. Federwisch, Konstantin Tyapochkin
Abstract: Techniques to detect fraud through behavioral analysis with low false positives are disclosed. In various embodiments, resource access data indicating for each resource in a set of resources respective usage data for each of one or more users of the resource is received. Hierarchical clustering analysis is performed to determine at each of two or more hierarchical levels a set of one or more clusters of users, resources, or both. A level-specific anomaly score is computed at each of said two or more hierarchical levels. The level-specific anomaly scores are aggregated across said two or more hierarchical levels to determine an aggregate anomaly score. The aggregate anomaly score to determine whether an anomaly has been detected.
Abstract: A request for a metadata object is received where the request includes an identifier. It is determined whether the metadata object is stored in a metadata cache, including by: selecting a sub-cache in the metadata cache based at least in part on the identifier and determining whether the metadata object is stored in that sub-cache. If it is determined the metadata object is not in the metadata cache, a request (in a format associated with the source) to obtain the metadata object is sent to a source with which the metadata object is associated. If the metadata object provided by the source is in a native format which is not the same as the common format, the metadata object is transformed from the native format into the common format. Access to the metadata object in the common format is provided.
Abstract: Defect remediation in a system is disclosed. A defect is mapped to one or more remediation actions, at least in part by using a processor to generate and perform a defect-based query against one or more structured remediation action records. A remediation package is generated using the processor. The remediation package may include the one or more remediation actions and data associated with the defect. The remediation package may be sent to a destination associated with the defect.
Abstract: Techniques to protect selected data in a cloud computing environment are disclosed. In various embodiments, an indication is received that a data value to be submitted, using a browser, to a remote node is to be protected. The data value is selectively encrypted. The encrypted data is provided value to the browser to be submitted to the remote node.
Type:
Grant
Filed:
July 16, 2015
Date of Patent:
October 18, 2016
Assignee:
EMC Corporation
Inventors:
Bin Wang, Lei Feng, Yandong Yao, Xiaoming Gao
Abstract: Systems and methods are described for backing up files and directories using a common backup format. The files and directories may be represented by objects within a data stream constructed using the common backup format. The data streams may be traversed and updated using a size tree such that modifications are made to individual objects within the data streams without complete traversal. This process results in efficient management of storage systems as read and write operations are not dependent on exhaustive traversal of data streams.
Abstract: A processing device is configured to identify a plurality of defensive security actions to be taken to address a persistent security threat to a system comprising information technology infrastructure, and to determine a schedule for performance of the defensive security actions based at least in part on a selected distribution derived from a game-theoretic model, such as a delayed exponential distribution or other type of modified exponential distribution. The system subject to the persistent security threat is configured to perform the defensive security actions in accordance with the schedule in order to deter the persistent security threat. The distribution may be selected so as to optimize defender benefit in the context of the game-theoretic model, where the game-theoretic model may comprise a stealthy takeover game in which attacker and defender entities can take actions at any time but cannot determine current game state without taking an action.
Type:
Grant
Filed:
February 24, 2012
Date of Patent:
October 18, 2016
Assignee:
EMC Corporation
Inventors:
Ari Juels, Marten Erik van Dijk, Alina M. Oprea, Ronald L. Rivest
Abstract: A first directional touch gesture on a display area and a second directional touch gesture on the display area are received simultaneously, wherein: the first directional touch gesture is on a left side of the display area; the second directional touch gesture is on a right side of the display area; and a first direction associated with the first directional touch gesture is identical to a second direction associated with the second directional touch gesture. Content is scaled within the display area based at least in part on the identical direction associated with the simultaneous directional touch gestures.
Abstract: Exemplary methods for providing secure multi-tenancy in a Purpose Built Backup Appliance include creating a set of tenant-units (TUs), associating file system management objects (FSMOs) and users with the TUs. The methods further include maintaining a protocol config-metadata store based on the association of the FSMOs and users with the TUs. In one embodiment, in response to a first request from a first user to access a first FSMO of a first TU, the methods include determining whether the first user is authorized to access the first FSMO based on information of the protocol config-metadata store, and in response to the protocol config-metadata store indicating the first user is authorized to access the first FSMO, allowing the first user to access the first FSMO.
Type:
Grant
Filed:
August 7, 2014
Date of Patent:
October 18, 2016
Assignee:
EMC Corporation
Inventors:
Subhasish Chakraborty, Ravi V. Chitloor, Terry G. Hahn, Hongyu Zhang
Abstract: A method is used in recovering file mapping information in file systems. Metadata of a file of a file system is evaluated. Mapping information associating the file to a file system hierarchy of the file system is missing a reference to an inode of the file. Based on the evaluation, the mapping information is updated for including the file to the file system hierarchy of the file system.
Type:
Grant
Filed:
September 30, 2013
Date of Patent:
October 18, 2016
Assignee:
EMC Corporation
Inventors:
Srinivasa Rao Vempati, Jean-Pierre Bono, Michael D. Schouten, Feng Zhang, Praveen S. Solanki
Abstract: Example embodiments of the present invention provide methods for replicating a production site snapshot to a replication site. A first example embodiment creates a snapshot of the production volume at the production site and creates a bookmark in a do metadata stream. The bookmark may be sent to the replication site and, when processed from the do metadata stream at the replication site, cause the replication site to create a snapshot of the replication volume according to the bookmark. A second example embodiment replicates to a replication site snapshot by generating a list of differences between the production site snapshot and the replication site snapshot and performs replication according to the differences. The differences may include differences between the production site volume and the production site snapshot, differences between the production site volume and the replication site volume and differences between the replication site volume and the replication site snapshot.