WO2017127124A1 - Ranking backup files - Google Patents

Ranking backup files Download PDF

Info

Publication number
WO2017127124A1
WO2017127124A1 PCT/US2016/021801 US2016021801W WO2017127124A1 WO 2017127124 A1 WO2017127124 A1 WO 2017127124A1 US 2016021801 W US2016021801 W US 2016021801W WO 2017127124 A1 WO2017127124 A1 WO 2017127124A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
files
ranking
user
storage medium
Prior art date
Application number
PCT/US2016/021801
Other languages
French (fr)
Inventor
Srinivas NANGUNOORI
Rajat NAIR
Original Assignee
Hewlett Packard Enterprise Development Lp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development Lp filed Critical Hewlett Packard Enterprise Development Lp
Publication of WO2017127124A1 publication Critical patent/WO2017127124A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/006Identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques

Definitions

  • data backup is the practice of copying and archiving of computer data so it may be used to restore the backed up computer data at a later time, such as after a data loss event.
  • FIG. 1A is a block diagram of a first example computing device for ranking backup files
  • FIG. 1 B is a block diagram of a second example computing device for ranking backup files
  • FIG. 2 is a block diagram of a third example computing device for ranking backup files
  • FIG. 3 is a flowchart of an example method for ranking backup files
  • FIG. 4 is a schematic diagram of an example process of generating a ranking of files.
  • FIG. 5 is a schematic diagram of an example computer data backup system including a ranking backup files engine for generating a ranking of files.
  • Standard approaches for computer data backup involves creating a backup copy of data by a backup application. For example, copies of computer data is stored according to a data retention policy. When data loss occurs, a copy of the data is transmitted back to the user in response to a restore command. However, this can result in significant time and bandwidth cost since the backed-up data may be large and unorganized.
  • a computing device may receive metadata of a user and a set of files associated with the user.
  • the metadata may include a user identifier for the user and a file identifier for each file of the set of files.
  • the computing device may generate a ranking of files of the user based on preset conditions of the user identifier and the file identifiers. In this manner, examples herein may provide a ranking of files that dictate the order of files are restored to an endpoint device when data restore is initiated.
  • FIG. 1A depicts a first example computing device 100 for ranking backup files.
  • Computing device 100 may be, for example, a cloud server, a local area network server, a web server, a mainframe, a mobile computing device, a notebook or desktop computer, a smart TV, a point-of-sale device, a wearable device, any other suitable electronic device, or a combination of devices, such as ones connected by a cloud or internet network, that perform the functions described herein.
  • computing device 100 includes a processor 1 10 and a non-transitory machine-readable storage medium 120 encoded with instructions to rank backup files.
  • computing device 100 may include a series of engines for ranking backup files.
  • An engine as used herein may generally represent any combination of hardware and programming for implementing the functionality described below.
  • Processor 1 10 may be one or more central processing units (CPUs), semiconductor-based microprocessors, and/or other hardware devices suitable for retrieval and execution of instructions stored in machine-readable storage medium 120.
  • Processor 1 10 may fetch, decode, and execute instructions 121 , 122, and/or other instructions to implement the procedures described herein.
  • processor 1 10 may include one or more electronic circuits that include electronic components for performing the functionality of one or more of instructions 121 , and 122.
  • the program instructions 121 , 122, and/or other instructions can be part of an installation package that can be executed by processor 1 10 to implement the functionality described herein.
  • memory 120 may be a portable medium such as a CD, DVD, or flash drive or a memory maintained by a computing device from which the installation package can be downloaded and installed.
  • the program instructions may be part of an application or applications already installed on computing device 100.
  • Machine-readable storage medium 120 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable data accessible to computing device 100.
  • machine-readable storage medium 120 may be, for example, a Random Access Memory (RAM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a storage device, an optical disc, and the like.
  • Storage medium 120 may be a non-transitory storage medium, where the term "non-transitory" does not encompass transitory propagating signals.
  • Storage medium 120 may be located in computing device 100 and/or in another device in communication with computing device 100.
  • machine- readable storage medium 120 may be encoded with receive metadata instructions 121 and generate ranking of files instructions 122.
  • Receive metadata instructions 121 may, when executed by processor 1 10, receive metadata of a user and a set of files associated with the user.
  • the metadata may include a user identifier for the user and a file identifier for each file of the set of files.
  • the metadata may have data that provides information about the user and the set of files associated with the user.
  • the metadata may be received, for example, from an endpoint file restore engine, such as a file backup program of a client device.
  • the metadata may be sent between the client device and computing device 100 by various methods, such as by communication through the cloud.
  • the user identifier may be a title, label, number, symbol name, or other form of identification that identifies a unique user or a unique class of users.
  • the user identifier may indicate a position or title within an organization, such as a corporation.
  • technology users may be organized through various roles or functions that call for different priorities and accesses to particular data and files. Accordingly, varying data backup and recovery policies may be established for classes or groups of members of the organization. In some instances, particular users may have his own policy, and thus the identifier would recognize the particular user.
  • the set of files associated with the user may include various computer files for storing information of the user, which is available to a computer program.
  • the set of files may include documents, applications, metadata, and any other type of computer files.
  • the set of files may be the files of the user that is backed up to a durable storage.
  • the durable storage may allow the files to be stored so that it remains available for access when the program that created the files has finished executing.
  • the durable storage may also retain the backed up set of files in the event of failure of the user's endpoint device that created the set of files.
  • the durable storage may be a separate storage medium remotely connected by a network, such as a cloud.
  • the set of files may not be directly communicated to computing device 100. Instead, the metadata containing file identifiers for the set of files may instead be sent to computing device 100.
  • the metadata received by computing device 100 may include a file identifier for each file of the set of files.
  • each file may have one or multiple file identifiers.
  • a file identifier may be a label or some form of identification for a unique file or class of files.
  • the file identifiers in coordination with the user identifier, may be used to intelligently rank the files as described herein. Specifically, as mentioned above, varying data backup and recovery policies may be established for classes or groups of members of the organization. The file identifiers may allow the specific policies to be established for the set of files.
  • a file identifier may include a file path, file size, file activity, file content, preconfigured policy, application specific data, or any combination thereof. For example, files located on specific paths, such as files on a desktop, may be ranked higher than files in other locations, such as a program files folder. Smaller size files may be ranked higher. Certain file types may be ranked higher than others. For example, documents and other working files may be placed above media files. Furthermore, files which have a high number of revisions in the user device in a particular time frame, such as a recent time period, may be ranked higher.
  • files may be analyzed for certain file content, such as personal identifiable information, keywords, and tags.
  • Personal identifiable information may be any data that could potentially identify a specific individual. Keywords may include such terms as "confidential" or "priority” that may indicate importance of certain files.
  • Tags may be associated with files and used to prioritize the files. These examples of file contents may be used to distinguish files for ranking as described herein.
  • ranking may be influenced by preconfigured policy or rules of the files.
  • a user such as an administrator, may define a policy regarding which files should be considered higher priority.
  • certain application specific files may be ranked above other files.
  • an email address book may be ranked high for metadata having certain user identifiers.
  • a ranking policy for a salesperson may have a contact book at a very high ranking.
  • Generate ranking of files instructions 122 may, when executed by processor 1 10, generate a ranking of files of the user based on present conditions of the user identifier and the file identifiers.
  • the ranking of files may be a relative order of the set of files which may guide the orderly restoration of the files.
  • the ranking of files may dictate restoration of the set of files to a user in an order or process as indicated by the ranking. Further details of the restoration of the files is described in relation to FIG. 1 B and FIG. 2.
  • the ranking of files may be generated based on preset conditions of the user identifier and the file identifiers.
  • the present conditions may in essence be a ranking policy for particular users and particular files.
  • the preset conditions may be determined by an administrator and may be based on the user identifiers and file identifiers as previously described herein.
  • FIG. 4 depicts an example process 400 of generating a ranking of files 430.
  • a ranking backup files engine 420 may receive metadata 410.
  • ranking backup files engine 420 may be a combination of hardware and software executed by a computing device, such as computing device 100.
  • Metadata 410 may contain a user identifier 41 1 and file identifiers 412A-C for file A, file B, and file C.
  • the metadata 410 is not limited by any organization or structure. Metadata 410 may be received from a user device.
  • the ranking backup files engine 420 may receive the metadata 410 and generate ranking of files 430.
  • Ranking backup files engine 420 may perform the functionalities described in instructions 121 and 122 of computing device 100. For example, ranking backup files engine 420 may generate ranking 430 based on preset conditions of the user identifier 41 1 and the file identifiers 412A-C.
  • FIG. 1 B depicts a second example computing device 150 for ranking backup files.
  • computing device 150 may include the processor 1 10 and non-transitory machine-readable storage medium 120 encoded with instructions 121 and 122 to rank backup files, as well as additional instructions 123 and 124. Details for the operations of instructions 121 and 122 are described above in relation to FIG. 1A.
  • send ranking instructions 123 may, when executed by processor 1 10, send the ranking to an endpoint file restore engine.
  • the endpoint file restore engine may be, for example, a file backup program of a client device.
  • the ranking may be sent between computing device 150 and the client device by various methods, such as by communication through the cloud. As described herein below, the endpoint file restore engine may then initiate backup file restore of the set of files to the client device according to the ranking.
  • store ranking instructions 124 may, when executed by processor 1 10, store the ranking generated by generate ranking of files instructions 122 in a database that collects and stores rankings for a plurality of users.
  • the database may be hosted on a non-transitory storage medium.
  • the database may be part of computing device 150 or it may be a separate storage medium remotely connected by a network, such as a cloud.
  • FIG. 2 depicts a third example computing device 200 for ranking backup files.
  • Computing device 200 may be, for example, any suitable electronic device, or a combination of devices, such as ones connected by a cloud or internet network, that perform the functions described.
  • computing device 200 may be a client device or an intermediate device between the client device and other devices.
  • computing device 200 includes a processor 210 and a non-transitory machine-readable storage medium 220 encoded with instructions to rank backup files.
  • computing device 200 may include a series of engines for ranking backup files.
  • An engine as used herein may generally represent any combination of hardware and programming for implementing the functionality described below.
  • Processor 210 may perform the functionality of one or more of instructions 221 , 222, and 223.
  • the program instructions 221 , 222, 223, and/or other instructions can be part of an installation package that can be executed by processor 210 to implement the functionality described herein.
  • Machine-readable storage medium 220 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable data accessible to computing device 200. Storage medium 220 may be located in computing device 200 and/or in another device in communication with computing device 200. As described in detail below, machine- readable storage medium 220 may be encoded with receive file restore prompt instructions 221 , retrieve ranking of files instructions 222, and initiate file restore instructions 223.
  • Receive file restore prompt instructions 221 when executed by processor 210, may receive a file restore prompt of a user.
  • a file restore prompt may be a computer instruction to communicate to computing device 200 to begin a file restore procedure.
  • a file restore prompt may originate, for example, from an endpoint device of a user. For example, a user may lose his data due to an event such as a computer crash.
  • the user may initiate a file backup program on a device.
  • the file backup program may send the file restore prompt to computing device 200. It should be noted that in some examples, computing device 200 is the client device, and the file backup program is hosted on the same device.
  • retrieve ranking of files instructions 222 may retrieve a ranking of files of the user from a database.
  • Database may include rankings generated such as by example computing devices 100 and 150 of FIG. 1A and FIG. 1 B, respectively.
  • the ranking of files may be based on preset conditions of a user identifier of the user and file identifier for each file in a set of files associated with the user.
  • Initiate file restore instructions 223 may, when executed by processor 210, initiate file restore from a backup file store based on the ranking of files retrieved by the execution of retrieve ranking of files instructions 222.
  • the execution of initiate file restore instructions 223 may cause the files of the set of files to be sent from the backup file store to the client device, which as explained previously may be computing device 200 or another device in communication with computing device 200.
  • the backup file store may include the set of files.
  • the set of files may have been previously backed up from the client device to the backup file store.
  • the backup file store may be a non-transitory storage medium.
  • the backup file store may be a separate storage medium remotely connected by a network, such as a cloud.
  • file restore may include retrieving, from the backup file store, files of the set of files in an order dictated by the ranking. Such an order may facilitate an efficient file restore procedure where highly ranked files, as determined by the ranking of files, may be restored first. This may allow for a shorter recovery time before a particular user may access files deemed important for the particular user.
  • a subset of the set of files is retrieved in the order dictated by the ranking, wherein the subset is determined by a network policy.
  • a network policy may be a status, rule, or instruction that influences the file restore process.
  • the network policy may be established to control network traffic.
  • file restore may delayed or deprioritized in favor of other network activity. Accordingly, a subset of the set of the files, such as the most highly-ranked files, may be retrieved.
  • a network policy may be dictated by a state of a network
  • precious network resources may be reserved for other network activity outside of backup file restore.
  • FIG. 3 depicts an example method 300 for ranking backup files. Although execution of method 300 is described below with reference to the examples illustrated in FIG. 1A, 1 B, and 2, other suitable devices for execution of this method should be apparent. Furthermore, the operation of FIG. 3 is illustrated by FIG. 5, which depicts an example computer data backup system 500 including a ranking backup files engine 510 for generating a ranking of files.
  • the components of system 500 may be parts of a computing device, or be a part of a network, such as cloud, system.
  • Method 300 may be implemented in the form of executable instructions stored on a machine-readable storage medium and/or in the form of electronic circuitry.
  • ranking backup files engine 510 may receive metadata of a user and of a set of files associated with the user.
  • the metadata may originate from endpoint device 520, which may have an endpoint device memory 521 and an endpoint file restore engine 525.
  • Endpoint device 520 may be an endpoint client device, such as a computer, mobile device, or any other computing device that may have data to be backed up.
  • the metadata may be sent between endpoint device 520 and ranking backup files engine 510 by various methods, such as by communication through the cloud.
  • the metadata may have data that provides information about the user and the set of files associated with the user.
  • the user identifier may be a title, label, number, symbol name, or other form of identification that identifies a unique user or a unique class of users.
  • the set of files associated with the user may include various computer files for storing information of the user, which is available to a computer program.
  • the set of files may include documents, applications, metadata, and any other type of computer files.
  • the set of files may be the files of the user that is backed up to a backup file storage 530.
  • the durable storage 530 may retain the backed up set of files in the event of failure of the user's endpoint device, such as endpoint device 520 that created the set of files.
  • the metadata of the user and of the set of files is communicated to the ranking backup files engine 510 in response to the set of files being backed up in storage 530.
  • the metadata received by ranking backup files engine 510 may also include a file identifier for each file of the set of files.
  • each file may have one or multiple file identifiers.
  • a file identifier may be a label or some form of identification for a unique file or class of files.
  • the file identifiers in coordination with the user identifier, may be used to intelligently rank the files as described herein.
  • a file identifier may be a file path, file size, file activity, file content, preconfigured policy, application specific data, or any combination thereof.
  • ranking backup files engine 510 may generate a ranking of files based preset conditions of the user identifier and file identifiers.
  • the ranking of files may be a relative order of the set of files which may guide the orderly restoration of the files as described herein with operation 360.
  • the present conditions may in essence be a ranking policy for particular users and particular files.
  • the preset conditions may be determined by an administrator and may be based on the user identifiers and file identifiers as previously described herein.
  • the ranking may be stored in a database 515 that collects and stores rankings for a plurality of users.
  • the database 515 may be hosted on a non-transitory storage medium.
  • Database 515 may be part of ranking backup files engine 510 or it may be a separate storage medium remotely connected by a network, such as a cloud.
  • endpoint file restore engine 525 may receive a ranking retrieval prompt, which may communicate to storage 530 to begin a file restore procedure.
  • a file restore prompt may originate, for example, from a data loss event of the user. For example, a user may lose his data due to an event such as a computer crash. The user may initiate a file backup program on device 520.
  • the ranking may be sent from database 515 to endpoint file restore engine 525.
  • endpoint file restore engine 525 may, in an operation 360, initiate file restore from backup file storage 530 based on the ranking.
  • endpoint file restore engine 525 may cause the files of the set of files to be sent from the backup file store 530 to the client device, which as explained previously may be computing device 520 or another device in communication with computing device 520.
  • the files may be sent to a new device, which may a new user device due to failure of the original client device.
  • endpoint file restore engine 525 may cause retrieving, from the backup file store, files of the set of files in an order dictated by the ranking. Such an order may facilitate an efficient file restore procedure where highly ranked files, as determined by the ranking of files, may be restored first. This may allow for a shorter recovery time before a particular user may access files deemed important for the particular user.
  • the foregoing disclosure describes a number of example embodiments for generating recommended inputs for changing an outcome of a predictive model.
  • the disclosed examples may include systems, devices, computer-readable storage media, and methods for generating recommended inputs.
  • certain examples are described with reference to the components illustrated in FIGS. 1 -5.
  • the functionality of the illustrated components may overlap, however, and may be present in a fewer or greater number of elements and components. All or part of the functionality of illustrated elements may co-exist or be distributed among several geographically dispersed locations.
  • the disclosed examples may be implemented in various environments and are not limited to the illustrated implementations.

Abstract

Example embodiments relate to intelligently ranking backup files to dictate orderly restoration of the backup files. An example computing device disclosed herein receives metadata of a user and a set of files associated with the user. The metadata includes a user identifier for the user and a file identifier for each file of the set of files. The example computing device generates a ranking of files of the user based on preset conditions of the user identifier and the file identifiers.

Description

RANKING BACKUP FILES
BACKGROUND
[0001 ] In information technology, data backup is the practice of copying and archiving of computer data so it may be used to restore the backed up computer data at a later time, such as after a data loss event.
BRIEF DESCRIPTION OF THE DRAWINGS
[0002] The following detailed description references the drawings, wherein:
[0003] FIG. 1A is a block diagram of a first example computing device for ranking backup files;
[0004] FIG. 1 B is a block diagram of a second example computing device for ranking backup files;
[0005] FIG. 2 is a block diagram of a third example computing device for ranking backup files;
[0006] FIG. 3 is a flowchart of an example method for ranking backup files;
[0007] FIG. 4 is a schematic diagram of an example process of generating a ranking of files; and
[0008] FIG. 5 is a schematic diagram of an example computer data backup system including a ranking backup files engine for generating a ranking of files.
DETAILED DESCRIPTION
[0009] The amount of data that is generated, stored, calculated, and transmitted through computers and computing networks have explosively grown with the rapid expansion in the use of computers to host business applications, websites, cloud, etc. As more data is communicated, data protection has also increased in importance. An important issue in securely processing bulk data is the efficient and secure processor of backing up computer data. Computer backups generally have two distinct purposes. The primary purpose is to recover data after its loss, such as by data deletion or corruption. A second purpose is to recover data from earlier time.
[0010] Standard approaches for computer data backup involves creating a backup copy of data by a backup application. For example, copies of computer data is stored according to a data retention policy. When data loss occurs, a copy of the data is transmitted back to the user in response to a restore command. However, this can result in significant time and bandwidth cost since the backed-up data may be large and unorganized.
[001 1 ] Examples disclosed herein address these technical challenges by providing for intelligently ranking backup files to dictate orderly restoration of the backup files. For example, a computing device may receive metadata of a user and a set of files associated with the user. The metadata may include a user identifier for the user and a file identifier for each file of the set of files. The computing device may generate a ranking of files of the user based on preset conditions of the user identifier and the file identifiers. In this manner, examples herein may provide a ranking of files that dictate the order of files are restored to an endpoint device when data restore is initiated.
[0012] Referring now to the drawings, FIG. 1A depicts a first example computing device 100 for ranking backup files. Computing device 100 may be, for example, a cloud server, a local area network server, a web server, a mainframe, a mobile computing device, a notebook or desktop computer, a smart TV, a point-of-sale device, a wearable device, any other suitable electronic device, or a combination of devices, such as ones connected by a cloud or internet network, that perform the functions described herein. In the example shown in FIG. 1A, computing device 100 includes a processor 1 10 and a non-transitory machine-readable storage medium 120 encoded with instructions to rank backup files.
[0013] Alternatively or in addition in some examples, computing device 100 may include a series of engines for ranking backup files. An engine as used herein may generally represent any combination of hardware and programming for implementing the functionality described below.
[0014] Processor 1 10 may be one or more central processing units (CPUs), semiconductor-based microprocessors, and/or other hardware devices suitable for retrieval and execution of instructions stored in machine-readable storage medium 120. Processor 1 10 may fetch, decode, and execute instructions 121 , 122, and/or other instructions to implement the procedures described herein. As an alternative or in addition to retrieving and executing instructions, processor 1 10 may include one or more electronic circuits that include electronic components for performing the functionality of one or more of instructions 121 , and 122.
[0015] In one example, the program instructions 121 , 122, and/or other instructions can be part of an installation package that can be executed by processor 1 10 to implement the functionality described herein. In this case, memory 120 may be a portable medium such as a CD, DVD, or flash drive or a memory maintained by a computing device from which the installation package can be downloaded and installed. In another example, the program instructions may be part of an application or applications already installed on computing device 100.
[0016] Machine-readable storage medium 120 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable data accessible to computing device 100. Thus, machine-readable storage medium 120 may be, for example, a Random Access Memory (RAM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a storage device, an optical disc, and the like. Storage medium 120 may be a non-transitory storage medium, where the term "non-transitory" does not encompass transitory propagating signals. Storage medium 120 may be located in computing device 100 and/or in another device in communication with computing device 100. As described in detail below, machine- readable storage medium 120 may be encoded with receive metadata instructions 121 and generate ranking of files instructions 122. [0017] Receive metadata instructions 121 may, when executed by processor 1 10, receive metadata of a user and a set of files associated with the user. The metadata may include a user identifier for the user and a file identifier for each file of the set of files. The metadata may have data that provides information about the user and the set of files associated with the user. The metadata may be received, for example, from an endpoint file restore engine, such as a file backup program of a client device. The metadata may be sent between the client device and computing device 100 by various methods, such as by communication through the cloud.
[0018] The user identifier may be a title, label, number, symbol name, or other form of identification that identifies a unique user or a unique class of users. For example, the user identifier may indicate a position or title within an organization, such as a corporation. In such organizations, technology users may be organized through various roles or functions that call for different priorities and accesses to particular data and files. Accordingly, varying data backup and recovery policies may be established for classes or groups of members of the organization. In some instances, particular users may have his own policy, and thus the identifier would recognize the particular user.
[0019] The set of files associated with the user may include various computer files for storing information of the user, which is available to a computer program. The set of files may include documents, applications, metadata, and any other type of computer files. The set of files may be the files of the user that is backed up to a durable storage. The durable storage may allow the files to be stored so that it remains available for access when the program that created the files has finished executing. The durable storage may also retain the backed up set of files in the event of failure of the user's endpoint device that created the set of files. In some examples, the durable storage may be a separate storage medium remotely connected by a network, such as a cloud. In some examples, the set of files may not be directly communicated to computing device 100. Instead, the metadata containing file identifiers for the set of files may instead be sent to computing device 100.
[0020] The metadata received by computing device 100 may include a file identifier for each file of the set of files. In some examples, each file may have one or multiple file identifiers. A file identifier may be a label or some form of identification for a unique file or class of files. The file identifiers, in coordination with the user identifier, may be used to intelligently rank the files as described herein. Specifically, as mentioned above, varying data backup and recovery policies may be established for classes or groups of members of the organization. The file identifiers may allow the specific policies to be established for the set of files.
[0021 ] In some examples, a file identifier may include a file path, file size, file activity, file content, preconfigured policy, application specific data, or any combination thereof. For example, files located on specific paths, such as files on a desktop, may be ranked higher than files in other locations, such as a program files folder. Smaller size files may be ranked higher. Certain file types may be ranked higher than others. For example, documents and other working files may be placed above media files. Furthermore, files which have a high number of revisions in the user device in a particular time frame, such as a recent time period, may be ranked higher.
[0022] In some examples, files may be analyzed for certain file content, such as personal identifiable information, keywords, and tags. Personal identifiable information may be any data that could potentially identify a specific individual. Keywords may include such terms as "confidential" or "priority" that may indicate importance of certain files. Tags may be associated with files and used to prioritize the files. These examples of file contents may be used to distinguish files for ranking as described herein.
[0023] Furthermore, ranking may be influenced by preconfigured policy or rules of the files. For example, a user, such as an administrator, may define a policy regarding which files should be considered higher priority. In another example, certain application specific files may be ranked above other files. For example, an email address book may be ranked high for metadata having certain user identifiers. For example, a ranking policy for a salesperson may have a contact book at a very high ranking.
[0024] Generate ranking of files instructions 122 may, when executed by processor 1 10, generate a ranking of files of the user based on present conditions of the user identifier and the file identifiers. The ranking of files may be a relative order of the set of files which may guide the orderly restoration of the files. For example, the ranking of files may dictate restoration of the set of files to a user in an order or process as indicated by the ranking. Further details of the restoration of the files is described in relation to FIG. 1 B and FIG. 2. [0025] The ranking of files may be generated based on preset conditions of the user identifier and the file identifiers. The present conditions may in essence be a ranking policy for particular users and particular files. For example, the preset conditions may be determined by an administrator and may be based on the user identifiers and file identifiers as previously described herein.
[0026] The operation of FIG. 1A is illustrated by FIG. 4, which depicts an example process 400 of generating a ranking of files 430. In the example illustrated, a ranking backup files engine 420 may receive metadata 410. As an example, ranking backup files engine 420 may be a combination of hardware and software executed by a computing device, such as computing device 100.
[0027] Metadata 410 may contain a user identifier 41 1 and file identifiers 412A-C for file A, file B, and file C. The metadata 410 is not limited by any organization or structure. Metadata 410 may be received from a user device.
[0028] The ranking backup files engine 420 may receive the metadata 410 and generate ranking of files 430. Ranking backup files engine 420 may perform the functionalities described in instructions 121 and 122 of computing device 100. For example, ranking backup files engine 420 may generate ranking 430 based on preset conditions of the user identifier 41 1 and the file identifiers 412A-C.
[0029] FIG. 1 B depicts a second example computing device 150 for ranking backup files. In the example shown in FIG. 1 B, computing device 150 may include the processor 1 10 and non-transitory machine-readable storage medium 120 encoded with instructions 121 and 122 to rank backup files, as well as additional instructions 123 and 124. Details for the operations of instructions 121 and 122 are described above in relation to FIG. 1A.
[0030] In response to the generation of the ranking of files, send ranking instructions 123 may, when executed by processor 1 10, send the ranking to an endpoint file restore engine. The endpoint file restore engine may be, for example, a file backup program of a client device. The ranking may be sent between computing device 150 and the client device by various methods, such as by communication through the cloud. As described herein below, the endpoint file restore engine may then initiate backup file restore of the set of files to the client device according to the ranking. [0031 ] Furthermore, store ranking instructions 124 may, when executed by processor 1 10, store the ranking generated by generate ranking of files instructions 122 in a database that collects and stores rankings for a plurality of users. The database may be hosted on a non-transitory storage medium. The database may be part of computing device 150 or it may be a separate storage medium remotely connected by a network, such as a cloud.
[0032] FIG. 2 depicts a third example computing device 200 for ranking backup files. Computing device 200 may be, for example, any suitable electronic device, or a combination of devices, such as ones connected by a cloud or internet network, that perform the functions described. In some examples, computing device 200 may be a client device or an intermediate device between the client device and other devices. In the example shown in FIG. 2, computing device 200 includes a processor 210 and a non-transitory machine-readable storage medium 220 encoded with instructions to rank backup files.
[0033] Alternatively or in addition in some examples, computing device 200 may include a series of engines for ranking backup files. An engine as used herein may generally represent any combination of hardware and programming for implementing the functionality described below.
[0034] Processor 210 may perform the functionality of one or more of instructions 221 , 222, and 223. In an example, the program instructions 221 , 222, 223, and/or other instructions can be part of an installation package that can be executed by processor 210 to implement the functionality described herein. Machine-readable storage medium 220 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable data accessible to computing device 200. Storage medium 220 may be located in computing device 200 and/or in another device in communication with computing device 200. As described in detail below, machine- readable storage medium 220 may be encoded with receive file restore prompt instructions 221 , retrieve ranking of files instructions 222, and initiate file restore instructions 223.
[0035] Receive file restore prompt instructions 221 , when executed by processor 210, may receive a file restore prompt of a user. A file restore prompt may be a computer instruction to communicate to computing device 200 to begin a file restore procedure. A file restore prompt may originate, for example, from an endpoint device of a user. For example, a user may lose his data due to an event such as a computer crash. The user may initiate a file backup program on a device. The file backup program may send the file restore prompt to computing device 200. It should be noted that in some examples, computing device 200 is the client device, and the file backup program is hosted on the same device.
[0036] In response to receiving the file restore prompt by file restore prompt instructions 221 , retrieve ranking of files instructions 222 may retrieve a ranking of files of the user from a database. Database may include rankings generated such as by example computing devices 100 and 150 of FIG. 1A and FIG. 1 B, respectively. The ranking of files may be based on preset conditions of a user identifier of the user and file identifier for each file in a set of files associated with the user.
[0037] Initiate file restore instructions 223 may, when executed by processor 210, initiate file restore from a backup file store based on the ranking of files retrieved by the execution of retrieve ranking of files instructions 222. The execution of initiate file restore instructions 223 may cause the files of the set of files to be sent from the backup file store to the client device, which as explained previously may be computing device 200 or another device in communication with computing device 200.
[0038] The backup file store may include the set of files. The set of files may have been previously backed up from the client device to the backup file store. The backup file store may be a non-transitory storage medium. The backup file store may be a separate storage medium remotely connected by a network, such as a cloud.
[0039] In some examples, file restore may include retrieving, from the backup file store, files of the set of files in an order dictated by the ranking. Such an order may facilitate an efficient file restore procedure where highly ranked files, as determined by the ranking of files, may be restored first. This may allow for a shorter recovery time before a particular user may access files deemed important for the particular user.
[0040] Furthermore, in some examples, a subset of the set of files is retrieved in the order dictated by the ranking, wherein the subset is determined by a network policy. A network policy, as used herein, may be a status, rule, or instruction that influences the file restore process. For example, the network policy may be established to control network traffic. In a heavy-traffic and/or low-bandwidth network, file restore may delayed or deprioritized in favor of other network activity. Accordingly, a subset of the set of the files, such as the most highly-ranked files, may be retrieved.
[0041 ] For example, a network policy may be dictated by a state of a network For example, in a metered connection network, such as a cellular network connection, precious network resources may be reserved for other network activity outside of backup file restore.
[0042] FIG. 3 depicts an example method 300 for ranking backup files. Although execution of method 300 is described below with reference to the examples illustrated in FIG. 1A, 1 B, and 2, other suitable devices for execution of this method should be apparent. Furthermore, the operation of FIG. 3 is illustrated by FIG. 5, which depicts an example computer data backup system 500 including a ranking backup files engine 510 for generating a ranking of files. The components of system 500 may be parts of a computing device, or be a part of a network, such as cloud, system. Method 300 may be implemented in the form of executable instructions stored on a machine-readable storage medium and/or in the form of electronic circuitry.
[0043] In an operation 310, ranking backup files engine 510 may receive metadata of a user and of a set of files associated with the user. The metadata may originate from endpoint device 520, which may have an endpoint device memory 521 and an endpoint file restore engine 525. Endpoint device 520 may be an endpoint client device, such as a computer, mobile device, or any other computing device that may have data to be backed up. The metadata may be sent between endpoint device 520 and ranking backup files engine 510 by various methods, such as by communication through the cloud.
[0044] As described herein, the metadata may have data that provides information about the user and the set of files associated with the user. The user identifier may be a title, label, number, symbol name, or other form of identification that identifies a unique user or a unique class of users.
[0045] The set of files associated with the user may include various computer files for storing information of the user, which is available to a computer program. The set of files may include documents, applications, metadata, and any other type of computer files. The set of files may be the files of the user that is backed up to a backup file storage 530. The durable storage 530 may retain the backed up set of files in the event of failure of the user's endpoint device, such as endpoint device 520 that created the set of files. In some examples, the metadata of the user and of the set of files is communicated to the ranking backup files engine 510 in response to the set of files being backed up in storage 530.
[0046] The metadata received by ranking backup files engine 510 may also include a file identifier for each file of the set of files. In some examples, each file may have one or multiple file identifiers. A file identifier may be a label or some form of identification for a unique file or class of files. The file identifiers, in coordination with the user identifier, may be used to intelligently rank the files as described herein. For example, a file identifier may be a file path, file size, file activity, file content, preconfigured policy, application specific data, or any combination thereof.
[0047] In an operation 320, ranking backup files engine 510 may generate a ranking of files based preset conditions of the user identifier and file identifiers. The ranking of files may be a relative order of the set of files which may guide the orderly restoration of the files as described herein with operation 360. The present conditions may in essence be a ranking policy for particular users and particular files. For example, the preset conditions may be determined by an administrator and may be based on the user identifiers and file identifiers as previously described herein.
[0048] In an operation 330, the ranking may be stored in a database 515 that collects and stores rankings for a plurality of users. The database 515 may be hosted on a non-transitory storage medium. Database 515 may be part of ranking backup files engine 510 or it may be a separate storage medium remotely connected by a network, such as a cloud.
[0049] In an operation 340, endpoint file restore engine 525 may receive a ranking retrieval prompt, which may communicate to storage 530 to begin a file restore procedure. A file restore prompt may originate, for example, from a data loss event of the user. For example, a user may lose his data due to an event such as a computer crash. The user may initiate a file backup program on device 520.
[0050] In an operation 350, the ranking may be sent from database 515 to endpoint file restore engine 525. In response to receiving the ranking from database 515, endpoint file restore engine 525 may, in an operation 360, initiate file restore from backup file storage 530 based on the ranking. [0051 ] For example, endpoint file restore engine 525 may cause the files of the set of files to be sent from the backup file store 530 to the client device, which as explained previously may be computing device 520 or another device in communication with computing device 520. In other examples, the files may be sent to a new device, which may a new user device due to failure of the original client device.
[0052] In some examples, endpoint file restore engine 525 may cause retrieving, from the backup file store, files of the set of files in an order dictated by the ranking. Such an order may facilitate an efficient file restore procedure where highly ranked files, as determined by the ranking of files, may be restored first. This may allow for a shorter recovery time before a particular user may access files deemed important for the particular user.
[0053] The foregoing disclosure describes a number of example embodiments for generating recommended inputs for changing an outcome of a predictive model. The disclosed examples may include systems, devices, computer-readable storage media, and methods for generating recommended inputs. For purposes of explanation, certain examples are described with reference to the components illustrated in FIGS. 1 -5. The functionality of the illustrated components may overlap, however, and may be present in a fewer or greater number of elements and components. All or part of the functionality of illustrated elements may co-exist or be distributed among several geographically dispersed locations. Moreover, the disclosed examples may be implemented in various environments and are not limited to the illustrated implementations.
[0054] Further, the sequence of operations described in connection with FIGS. 1 -5 are examples and are not intended to be limiting. Additional or fewer operations or combinations of operations may be used or may vary without departing from the scope of the disclosed examples. Furthermore, implementations consistent with the disclosed examples need not perform the sequence of operations in any particular order. Thus, the present disclosure merely sets forth possible examples of implementations, and many variations and modifications may be made to the described examples. All such modifications and variations are intended to be included within the scope of this disclosure and protected by the following claims. [0055] It should further be noted that, as used in this application and the appended claims, the singular forms "a," "an," and "the" include plural elements unless the context clearly dictates otherwise.

Claims

CLAIMS What is claimed is:
1 . A non-transitory machine-readable storage medium encoded with instructions executable by a processor of a computing device, the non-transitory storage medium comprising instructions to:
receive metadata of a user and a set of files associated with the user, wherein the metadata comprises a user identifier for the user and a file identifier for each file of the set of files;
generate a ranking of files of the user based on preset conditions of the user identifier and the file identifiers.
2. The non-transitory machine-readable storage medium of claim 1 , further comprising instructions to send the ranking to an endpoint file restore engine.
3. The non-transitory machine-readable storage medium of claim 1 , wherein the metadata comprises at least one of the following file identifiers for each file of the set of files: file path, file size, file type, file activity, file content, preconfigured policy, and application specific data.
4. The non-transitory machine-readable storage medium of claim 3, wherein the file content comprises at least one of personal identifiable information, keywords, and tags.
5. The non-transitory machine-readable storage medium of claim 1 , further comprising instructions to store the ranking in a database comprising rankings for a plurality of users.
6. A non-transitory machine-readable storage medium encoded with instructions executable by a processor of a computing device, the non-transitory storage medium comprising instructions to:
receive a file restore prompt of a user;
in response to receiving the file restore prompt, retrieve a ranking of files of the user from a database, wherein the ranking of files is based on preset conditions of a user identifier of the user and a file identifier for each file in a set of files associated with the user;
initiate file restore from a backup file store based on the ranking, wherein the backup file store comprises the set of files.
7. The non-transitory machine-readable storage medium of claim 6, wherein the ranking of files is based on at least one of the following file identifiers for each file of the set of files: file path, file size, file type, file activity, file content, preconfigured policy, and application specific data.
8. The non-transitory machine-readable storage medium of claim 7, wherein the file content comprises at least one of personal identifiable information, keywords, and tags.
9. The non-transitory machine-readable storage medium of claim 6, wherein the file restore comprises retrieving, from the backup file store, files of the set of files in an order dictated by the ranking.
10. The non-transitory machine-readable storage medium of claim 9, wherein a subset of the set of files is retrieved in the order dictated by the ranking, wherein the subset is determined by a network policy.
1 1 . A method for restoring backup files, comprising:
receiving metadata of a user and a set of files associated with the user, wherein the metadata comprises a user identifier for the user and a file identifier for each file of the set of files;
generating a ranking of files of the user based on preset conditions of the user identifier and the file identifiers;
receiving a ranking retrieval prompt of a user; and
in response to receiving the ranking retrieval prompt, sending the ranking to an endpoint file restore engine.
12. The method of claim 1 1 , further comprising storing the ranking in a database comprising rankings for a plurality of users, wherein the ranking is sent from the database to the endpoint file restore engine in response to receiving the ranking retrieval prompt.
13. The method of claim 1 1 , further comprising causing the endpoint file restore engine to initiate file restore from a backup file store based on the ranking, wherein the backup file store comprises the set of files.
14. The method of claim 1 1 , wherein the metadata comprises at least one of the following file identifiers for each file of the set of files: file path, file size, file type, file activity, file content, preconfigured policy, and application specific data.
15. The method of claim 14, wherein the file content comprises at least one of personal identifiable information, keywords, and tags.
PCT/US2016/021801 2016-01-22 2016-03-10 Ranking backup files WO2017127124A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN201641002420 2016-01-22
IN201641002420 2016-01-22

Publications (1)

Publication Number Publication Date
WO2017127124A1 true WO2017127124A1 (en) 2017-07-27

Family

ID=59362512

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2016/021801 WO2017127124A1 (en) 2016-01-22 2016-03-10 Ranking backup files

Country Status (1)

Country Link
WO (1) WO2017127124A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189610A (en) * 2018-08-16 2019-01-11 郑州云海信息技术有限公司 The processing method of monitoring server data under a kind of linux
WO2024078391A1 (en) * 2022-10-13 2024-04-18 华为技术有限公司 File sorting method and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046313A1 (en) * 2001-08-31 2003-03-06 Arkivio, Inc. Techniques for restoring data based on contents and attributes of the data
US8127095B1 (en) * 2003-12-31 2012-02-28 Symantec Operating Corporation Restore mechanism for a multi-class file system
US20120084261A1 (en) * 2009-12-28 2012-04-05 Riverbed Technology, Inc. Cloud-based disaster recovery of backup data and metadata
US20120310896A1 (en) * 2011-06-03 2012-12-06 Apple Inc. Methods and apparatus for multi-phase restore
US20130159768A1 (en) * 2011-08-03 2013-06-20 Invizion Pty Ltd System and method for restoring data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046313A1 (en) * 2001-08-31 2003-03-06 Arkivio, Inc. Techniques for restoring data based on contents and attributes of the data
US8127095B1 (en) * 2003-12-31 2012-02-28 Symantec Operating Corporation Restore mechanism for a multi-class file system
US20120084261A1 (en) * 2009-12-28 2012-04-05 Riverbed Technology, Inc. Cloud-based disaster recovery of backup data and metadata
US20120310896A1 (en) * 2011-06-03 2012-12-06 Apple Inc. Methods and apparatus for multi-phase restore
US20130159768A1 (en) * 2011-08-03 2013-06-20 Invizion Pty Ltd System and method for restoring data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189610A (en) * 2018-08-16 2019-01-11 郑州云海信息技术有限公司 The processing method of monitoring server data under a kind of linux
CN109189610B (en) * 2018-08-16 2021-10-29 郑州云海信息技术有限公司 Method for processing server monitoring data under linux
WO2024078391A1 (en) * 2022-10-13 2024-04-18 华为技术有限公司 File sorting method and electronic device

Similar Documents

Publication Publication Date Title
US11099956B1 (en) Snapshot-based disaster recovery orchestration of virtual machine failover and failback operations
US11100064B2 (en) Automated log-based remediation of an information management system
KR101960993B1 (en) Efficient application-aware disaster recovery
US9727491B2 (en) Token-based encryption determination process
US10922184B2 (en) Data access during data recovery
US8990164B1 (en) Systems and methods for performing incremental backups
US9275060B1 (en) Method and system for using high availability attributes to define data protection plans
EP3356941B1 (en) Systems and methods for restoring data from opaque data backup streams
US11403187B2 (en) Prioritized backup segmenting
US9298561B1 (en) Systems and methods for prioritizing restoration speed with deduplicated backups
US8438420B1 (en) Post access data preservation
US20160180479A1 (en) Systems and methods for expanding relevant search results in electronic discovery
US10191817B2 (en) Systems and methods for backing up large distributed scale-out data systems
US11294770B2 (en) Dynamic prioritized recovery
US9037821B1 (en) Systems and methods for replicating snapshots across backup domains
WO2017127124A1 (en) Ranking backup files
WO2014133502A1 (en) Sending a request to a management service
US11507595B1 (en) Agent-less replication management
US10445191B1 (en) Integration of restore service with data protection system
WO2016018449A1 (en) Policy-based data protection
WO2016119910A1 (en) Creating backup

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16886759

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16886759

Country of ref document: EP

Kind code of ref document: A1