Patent classifications
G06F16/119
Data labeling awareness for backup systems
Embodiments for a method performing data migration such as backups and restores in a network by identifying characteristics of data in a data saveset to separate the data into defined types based on respective characteristics, assigning a data label to each defined type, defining migration rules for each data label, discovering assigned labels during a migration operation; and applying respective migration rules to labeled data in the data saveset. The migration rules can dictate storage location, access rights, replication periods, retention periods, and similar parameters.
Data migration in a distributive file system
A plurality of computing devices are communicatively coupled to each other via a network, and each of the plurality of computing devices is operably coupled to one or more of a plurality of storage devices. A plurality of failure resilient address spaces are distributed across the plurality of storage devices such that each of the plurality of failure resilient address spaces spans a plurality of the storage devices. The plurality of computing devices maintains metadata that maps each failure resilient address space to one of the plurality of computing devices. The metadata is grouped into buckets. Each bucket is stored in the backend of a computing device. Data may be migrated from an external file system to the plurality of storage devices using inode stubs to represent directories and files of the external file system. As the contents of the external file system are copied, the inode stubs are replaced with real inodes.
ELECTRONIC FILE MIGRATION SYSTEM AND METHODS OF RESTORING COPIED DATA BETWEEN STORAGE SYSTEMS
An electronic file migration system has a processor. A memory is coupled to the processor, the memory storing program instructions that when executed by the processor, causes the processor to: copy a plurality of files from a source storage device to a destination storage device, wherein a first set of files are copies of files themselves and a second set of files are copied as symbolic links to the second set of files.
Automated syncing of data between security domains
Described herein are systems, methods, and non-transitory computer readable media for automating the transfer/syncing of datasets or other artifacts from one security domain (e.g., a low security side environment) to another security domain (e.g., a high security side environment) in a seamless manner that complies with requirements of a data transfer mechanism used to transfer data between the two security domains while ensuring data integrity and consistency between the two security domains.
Systems and methods for intelligent digital item discovery and machine learning-informed handling of digital items and digital item governance
Systems and methods of computing classifications for and migrating digital content that includes accessing a digital content corpus within a source data storage system; in response to accessing the digital content corpus, for each distinct item of digital content of the plurality of distinct items of digital content: computing, via one or more digital content machine learning classification models, a content classification inference; identifying automated digital content handling tasks of a plurality of distinct digital content handling tasks based on the content classification inference; executing the automated content handling tasks identified for each distinct item of digital content, wherein executing the automated content handling tasks includes: designating a storage location within a target data storage system based on the in-migration content classification inference; and migrating a respective item of digital content from the source data storage system to the designated storage location within the target data storage system.
Data validation for data record migrations
Methods, systems, and devices for data validation are described. A user may store a set of data records on a source database and backup the set of data records at a target database through a data migration. A migration and validation server may initiate the data migration. After the data migration is complete, the migration and validation server may perform a validation process that includes comparing a calculated hash value from the source database and the target database that is based on unique identifiers and timestamps for each data record in the set of data records migrated from the source database to the target database. The migration and validation server may determine if the data migration was successful (e.g., the data was transferred correctly) if the hash value calculated for the data records at the target database equals the hash value calculated for the data records at the source database.
Integrated hierarchical storage management
File access statistics associated with a content file are maintained by a file tier agent of a secondary storage system. The content file is accessible via a primary storage system. A target storage tier corresponding to the file access statistics associated with the content file is determined according to one or more policies. At least a portion of data of the content file is migrated to the determined storage tier while accessibility of the content file via the primary storage system is maintained.
Data migration to a cloud computing system
A cloud-based migration system exposes a source-independent application programming interface for receiving data to be migrated. The data is uploaded and stored as a single entity in a cloud-based storage system. A migration system then accesses the migration package and begins migrating the data to its destination, from the cloud-based storage system.
Device to device migration in a unified endpoint management system
Described herein are example methods and systems for enrolling a user device with an unified endpoint management system (“UEMS”) directly from another user device. The examples describe a first user device that is already enrolled with the UEMS and a second user device that is seeking to be enrolled. The two user devices can establish a direct connection with each other. The second user device can be authenticated by a user inputting the same migration password or pin at both user device. The first user device can generate and send a migration data file to the second user device. The migration data file can include settings, policies, software packages, and files managed by the UEMS. The second user device can copy settings, policies, and files, and install the applications from the migration data file. The second user device can notify an UEMS server of the device migration.
Method and system for migrating data clusters using heterogeneous data cluster infrastructures
Techniques described herein relate to a method for managing data protection services for data clusters. The method includes identifying, by a data protection manager, a migration event associated with a first data cluster; in response to identifying the migration event: identifying a second data cluster capable of hosting the first data cluster using data cluster topology information and data cluster component inventory information associated with the first data cluster; generating a dependency map associated with the second data cluster based on the first data cluster; identifying a migration sequence based on the dependency map; initiating data cluster components of the second data cluster to perform migration of the first data cluster; and migrating the first data cluster to the second data cluster.