G06F16/181

Method and system for scan-free detection of auto-committed files in a write-once-read-many storage devices
10275465 · 2019-04-30 · ·

A method and a system for detecting an occurrence of an auto-commit operation applied to files managed by a file server compliant with write-once-read-many (WORM) rules. The method includes: allocating a plurality of non-overlapping predefined time ranges starting from a newest-changed-files time range and ending at an oldest-changed-files time range, wherein the time ranges add up to an auto-commit period associated with the auto-commit operation; repeatedly updating a count of files whose file-change-time is associated respectively with one of the allocated time ranges, wherein the updating is carried out every time the predefined time range lapses; and detecting, every time the time range lapses, an occurrence of an auto-commit operation applied to at least one of the files stored on the volume within a duration of the time range since the updating, whenever the count of the files associated with the oldest-changed-files time range is non-zero.

IMMUTABLE STORAGE OF SNAPSHOT DATA IN A PUBLIC CLOUD ENVIRONMENT

A data management system may support techniques for immutable storage of snapshot data entities, which may each include data corresponding to one or more snapshots, in a cloud environment. The data management system may determine respective retention periods and respective immutability periods for the snapshot data entities. The data management system may extend the respective immutability period for a first snapshot data entity based on the respective retention period for the first snapshot data entity being greater than or equal to a threshold duration. Additionally or alternatively, the data management system may maintain (refrain from extending) the respective immutability period for a second snapshot data entity based at least in part on the respective retention period for the second snapshot data entity being less than the threshold duration.

Systems and methods for optimizing storage and retention of deduplicated secondary copies at storage platforms that are write-once read-many (WORM) enabled

A data storage management system is enhanced to accommodate, and moreover to optimize, the storing and retention of deduplicated secondary copies at write-once read-many (WORM) enabled storage platforms. Enhancements include without limitation: user interface (UI) options to enable WORM functionality for secondary storage, whether used for deduplicated or non-deduplicated secondary copies; enhancements to secondary copy (e.g., deduplication copy, backup) operations; and pruning changes. The storage manager is generally responsible for managing the creation, tracking, and deletion of secondary copies, with and without deduplication. Media agents that store secondary copies to and prune them from the WORM-enabled storage platforms also are enhanced for communicating and interoperating with both bucket-level and object-level WORM-enabled storage platforms to implement the features disclosed herein.

Message retrieval in a distributed computing network

Applications retrieve physical messages from one of either a co-located, passive messaging engine within the same datacenter as the application, or a nearest passive messaging engine from a different datacenter instead of from the active messaging engine. In that way, the active messaging engine does not deliver the physical message directly from its local storage.

Message retrieval in a distributed computing network

Applications retrieve physical messages from one of either a co-located, passive messaging engine within the same datacenter as the application, or a nearest passive messaging engine from a different datacenter instead of from the active messaging engine. In that way, the active messaging engine does not deliver the physical message directly from its local storage.

OPTIMIZING RETENTION TIMEFRAMES OF DEDUPLICATED COPIES AT STORAGE PLATFORMS THAT ARE WRITE-ONCE READ-MANY (WORM) ENABLED

A data storage management system is enhanced to accommodate, and moreover to optimize, the storing and retention of deduplicated secondary copies at write-once read-many (WORM) enabled storage platforms. Enhancements include without limitation: user interface (UI) options to enable WORM functionality for secondary storage, whether used for deduplicated or non-deduplicated secondary copies; enhancements to secondary copy (e.g., deduplication copy, backup) operations; and pruning changes. The storage manager is generally responsible for managing the creation, tracking, and deletion of secondary copies, with and without deduplication. Media agents that store secondary copies to and prune them from the WORM-enabled storage platforms also are enhanced for communicating and interoperating with both bucket-level and object-level WORM-enabled storage platforms to implement the features disclosed herein.

METHODS AND SYSTEMS RELATING TO NETWORK BASED STORAGE
20180336210 · 2018-11-22 ·

Cloud storage provides for accessible interfaces, near-instant elasticity and scalability, multi-tenancy, and metered resources within a framework of distributed resources acing to provide highly fault tolerant solutions with high data durability. However, cloud storage also has drawbacks and limitations with information uploading and how information is subsequently accessed.

OPTIMIZED MANAGEMENT OF FILE SYSTEM METADATA WITHIN SOLID STATE STORAGE DEVICES (SSDs)
20180293015 · 2018-10-11 ·

The embodiments set forth a technique for managing file nodes within a storage device. According to some embodiments, the method can include the steps of (1) receiving a transaction request that involves modifying a plurality of file nodes, (2) analyzing the plurality of file nodes against temporal transaction information to identify, among the plurality of file nodes, at least one group of file nodes that were previously modified in conjunction with at least one previously-executed transaction request, (3) modifying each file node in the at least one group of file nodes in accordance with the transaction request to establish a modified group of file nodes, (4) allocating, within the storage device, physical storage space for storing the modified group of file nodes, and (5) contiguously writing the modified group of file nodes into the allocated physical storage space.

METHOD AND SYSTEM FOR SCAN-FREE DETECTION OF AUTO-COMMITTED FILES IN A WRITE-ONCE-READ-MANY STORAGE DEVICES
20180267980 · 2018-09-20 ·

A method and a system for detecting an occurrence of an auto-commit operation applied to files managed by a file server compliant with write-once-read-many (WORM) rules. The method includes: allocating a plurality of non-overlapping predefined time ranges starting from a newest-changed-files time range and ending at an oldest-changed-files time range, wherein the time ranges add up to an auto-commit period associated with the auto-commit operation; repeatedly updating a count of files whose file-change-time is associated respectively with one of the allocated time ranges, wherein the updating is carried out every time the predefined time range lapses; and detecting, every time the time range lapses, an occurrence of an auto-commit operation applied to at least one of the files stored on the volume within a duration of the time range since the updating, whenever the count of the files associated with the oldest-changed-files time range is non-zero.

MANAGING APPENDABLE STATE OF AN IMMUTABLE FILE

Some examples described herein relate to managing appendable state of an immutable file. In an example, a request may be received to append an immutable file. A determination may be made whether the request is a first request to append immutable file. In response to determination that the request is the first request to append the immutable file, immutable file may be modified from an original state to an appendable state, wherein immutable file is appendable during the appendable state. A time period may be defined for immutable file to remain in the appendable state. A determination may be made whether immutable file is accessed during the time period. In response to determination that immutable file is not accessed during the time period, immutable file may be reverted from the appendable state to the original state upon expiration of the time period.