Patent classifications
G06F11/1456
METHOD FOR A CHARGING UNIT THAT BACKS UP DATA STORED ON A MOBILE DEVICE
An App executed on a mobile device will create a user profile block in the memory unit of a charging unit, and help set up charging preferences and backup preferences in the profile block, and create a backup folder to store backup files from the mobile device. The App will monitor the charging of the mobile device. According to the backup preferences, the App performs a full backup task or a differential backup task for only local files, only cloud files or both; the App sets the data transmission speed between the charging unit and the mobile device; the App performs a full scan or a quick scan on the files in the mobile device and the files in the backup folder to determine between the mobile device and the backup folder whether the files are the same; and creates quick scan index data for the first time backup files.
CHARGING APPARATUS HAVING BACKUP FUNCTION
A charging apparatus having a backup function includes a first connecting interface, a second connecting interface, a processing unit, a memory unit, and an authorizing unit. The first connecting interface is adapted to receive a power source. When the processing unit authorizes the first electronic device, the processing unit activates the backup function to back up data stored on a first electronic device connected to the second connecting interface into the memory unit. Hence, a user can use the charging apparatus to charge the first electronic device, and to back up the data stored on the first electronic device into the memory unit or to restore the data stored on the memory unit into the first electronic. The user of the first electronic device can effortlessly enjoy the data backup and restore functionality.
Non-blocking secondary reads
Described herein are embodiments of a database system. The database system receives a read command to read at least some stored data. The database system may generate a plurality of snapshots of data stored in a first data storage node of a plurality of data storage nodes. The database system may determine whether data is being written to the first data storage node. Responsive to determining that data is not being written to the first data storage node, the database system may process the read command at least in part by reading at least some data stored on the first data storage node. Responsive to determining that data is being written to the first data storage node, the database system may process the read command at least in part by reading at least some data from a snapshot of the plurality of snapshots.
RESTRICTED DATA TRANSFER
One example method includes receiving, by a first computing entity from a second computing entity, a request for data, providing, by the first computing entity, a compliance API (Application Program Interface) to the second computing entity, receiving, by the first computing entity from the second computing entity, location information and/or data compliance information, by way of the compliance API, consulting, by the first computing entity, a mapping, and determining, based on information in the mapping and the location information and/or data compliance information, whether or not the data is permitted to be transmitted by the first computing entity to the second computing entity, and either transmitting the data to the second computing entity, or not transmitting the data to the second computing entity, based on data tags, the information in the mapping and the location information and/or data compliance information.
Redundant memory for underwater instrumentation
A redundant memory for use with an instrument arranged to acquire and store data while underwater. Such an instrument comprises a main housing which contains instrument electronics that acquires and may process data received from one or more sensors, with a primary memory located within the main housing and arranged to store at least some of the acquired and/or processed data, and a secondary memory which stores a copy of the data stored in the primary memory. The instrumentation may be arranged to write data to the primary and secondary memories contemporaneously in either a burst or continuous mode, or with primary memory backed up to secondary memory periodically and/or in response to the occurrence of a triggering event. The instrument may comprise a second housing within which the secondary memory is located. The main and second housings may be contained within a common enclosure.
Cloud-based disaster recovery
Performing disaster recovery in a cloud-based storage system, including: creating, by a storage system a snapshot of a dataset; uploading, from the storage system to a cloud computing environment, the snapshot; storing, by the cloud computing environment, the snapshot; detecting, by the cloud computing environment, that the dataset is not available on the storage system; and creating, by the cloud computing environment using the snapshot that is stored within the cloud computing environment, a cloud-based storage system that includes the dataset.
Device having a function of simultaneously charging and backing up data
A device having a function of simultaneously charging and backing up data is provided. The device includes a transmission interface, a power supply circuit, a storage circuit, and a main control circuit. The transmission interface is connected to an electronic device. The power supply circuit is configured to supply power to the electronic device to charge the electronic device. The storage circuit is configured to access data of the electronic device, or to provide data stored in the storage circuit to the electronic device. The main control circuit is connected to the transmission interface, the power supply circuit and the storage circuit. The main control circuit is configured to control the power supply circuit to supply the power to the electronic device and the storage circuit to back up the data simultaneously.
Anomaly and ransomware detection
Some examples relate generally to computer architecture software for information security and, in some more particular aspects, to machine learning based on changes in snapshot metadata for anomaly and ransomware detection in a file system.
SIZE-BASED ORGANIZATION OF BACKUP FILES WITHIN AN OBJECT STORAGE FOR EFFICIENT OBJECT RE-TIERING
Described is a system (and method) for size-based organization of backup files within an object storage for efficient object re-tiering. The system may perform a specialized process to re-tier objects stored within an object storage by organizing backup files into individual or shared objects based on a backup file size. Accordingly, the system may initiate a re-tiering of objects immediately after performing an incremental backup to improve storage efficiency while at the same time retaining the ability to synthetically perform a full restore.
METHOD AND APPARATUS FOR PHASED TRANSITION OF LEGACY SYSTEMS TO A NEXT GENERATION BACKUP INFRASTRUCTURE
One example method includes [searching a legacy data backup system and identifying, in the legacy data backup system, a legacy backup asset, identifying a type of the legacy backup asset, creating a wrapper service instance that corresponds to the type of the legacy backup asset, detaching the legacy backup asset from the legacy data backup system, receiving, by the legacy backup asset, backup calls and restore calls from a new data backup system that is different from the legacy data backup system, and servicing, by the legacy backup asset the backup calls and restore calls based on a state of the legacy backup asset.