TW460812B - Automated file pruning - Google Patents

Automated file pruning Download PDF

Info

Publication number
TW460812B
TW460812B TW088122114A TW88122114A TW460812B TW 460812 B TW460812 B TW 460812B TW 088122114 A TW088122114 A TW 088122114A TW 88122114 A TW88122114 A TW 88122114A TW 460812 B TW460812 B TW 460812B
Authority
TW
Taiwan
Prior art keywords
component
life cycle
scope
metadata
patent application
Prior art date
Application number
TW088122114A
Other languages
Chinese (zh)
Inventor
Metin Feridun
Harry Rudin
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Application granted granted Critical
Publication of TW460812B publication Critical patent/TW460812B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Scheme for adding an element (21) to a database system (20) which comprises a memory with limited storage capacity the element (21) comprises data and metadata. An individual lifetime is defined for the element (21) in the metadata, and then the data and said metadata are stored in the memory. The metadata are examined from time-to-time to determine whether the lifetime of an element expired. If this is the case the respective element (19) is automatically removed.

Description

五、發明說明G) 技術領域 ' 種自動化 本發明與用以使用在電辦系統和網路中的, 檀案刪除方法和一種自動化檔案删除設備有關 發明背景 一典型的電腦系統包含一中央處理單元、記憶體、週邊 裝;例如資料輸入/輸出裝^和儲存媒體如軟式磁碟或硬 碟。那些裝置經由—電腦作業系統彼此溝通。電腦作 ^二統包括幾個不同的操作模組,一此種模組可能是一檔 ^育理員。儲存在一儲齊媒體上的客戶資料,組織成一 ^ ,相關格式的檔案系統,且此槽案管理員被用來維護那^ 可用的檔案系統及控制對它們的存取。此檔案管理員以廡 =程式設計者介面(API s)的形式提供一組系統呼叫: 办、:|客戶對檔案系統和檔案的存取,實行例如檔案建 」除、開啟供讀取或寫入等等的運算。 ,、 /π ί ΐ系統儲存、組織和插述客戶資料。客戶資料Μ/ 在檔案中,那些檔案以一特定的格式安資枓儲存 中。每個槽幸系钵粗卢Α 在母個檔案系統 在此處稱為元資料,在格式特有的架構中=迷資訊, 例疋HFS、MS-DOS FAT、P]rQDC)s、Hi h 種格式的專巳 9 6 6 0、NTFS 等。柊 gh sierra、IS〇 器存取協定。° 匕3實體的磁碟格式和網路何服 π Ϊ ^檔案系統讀取資料和對其寫人資料,g f ^ 須此夠識?別檔案系統的格式。 ' 檔案管理貝必 目刖的檔案系統廣為人知的缺點, 棺案的數目增V. Description of the invention G) Technical field 'A kind of automation The present invention relates to a method for deleting a file and an automatic file deleting device for use in an electronic office system and a network Background of the Invention A typical computer system includes a central processing unit , Memory, peripherals; such as data input / output devices ^ and storage media such as floppy disks or hard disks. Those devices communicate with each other via a computer operating system. The computer system includes several different operating modules. One such module may be a file manager. The customer data stored on a storage media is organized into a file system of the relevant format, and the case manager is used to maintain the available file systems and control access to them. This file manager provides a set of system calls in the form of 庑 = programmer interface (API s): Office,: | Customer access to the file system and files, such as file creation, removal, opening for reading or writing Operations such as input. ,, / π ί ΐ The system stores, organizes, and interpolates customer data. Customer data M / In files, those files are stored in a specific format. Fortunately, each slot is referred to as metadata in the parent file system. In the format-specific structure = fan information, such as HFS, MS-DOS FAT, P] rQDC) s, Hi h Formats are 960, NTFS, etc.柊 gh sierra, IS〇 machine access agreement. ° D3 physical disk format and network services π Ϊ ^ The file system reads data and writes data to it. G f ^ Is this enough to understand? The format of the file system. '' Archive management Bebi Mu's well-known shortcoming of the file system increases the number of coffin cases

第4頁 Αβ Ο 8 1 2 五、發明說明(2) 加,處理變得越來越困難。整個檔案系統的快速存取或擷 取與清,楚i既觀,對它的每日使用是決定性。 、 雖然硬式磁碟的容量越來越大,電腦系統的記憶體仍然 短缺,特別是根據需要更大量儲存的應用程式,如多媒體, 應用程式的逐漸增加使用來看。太多檔案的存在不但消耗 不必要的記憶容量,而且-因為找到並存取所儲存的檔案 所花的時間-實質上使系統效率在回應時間上更差。 每個電腦使用者有極多樣的不同種類_檔案。在目前的檔 案系統中,相同對待所有這些檔案。如果電腦系統在商業 環境中使用,通常有所謂的記錄保存規則,其定義文件的 不1¾種類,其它們必須何處與如何儲存在記憶體中,和- ( 最重要的-那些各別的文件必須保存多久。目前的槽案系 統不耒後_使用者維持此種記錄保存規則。 1 Μ存在有用來移除已經超過一般壽命的檔.產刪除設備,但 是這些統一地應用在整個檔案系統。舉例來說,在UN I X系 統中,可選择_的、週期性地執行的軟體,可規劃來移除在 一資料夾(或目錄)清單中比設定的天數吏久的檔案。不論 它們有多_皇要,這是此種相同對待所有檔案的通用方式之 缺點\此外,如上述的檔案有系統的移除,不是作業系統 的一個必要部份,而是一區j或性的符合客戶需求之選擇 項:隨著未受管理的個人工作站或膝上型電腦使用之增 加,檔案的增長和隨之而來的磁碟記憶體需求可,.能是很可 觀的。 ^ 本發明的一個目的在於,择供一種使電腦系統的有限記Page 4 Αβ Ο 8 1 2 V. Description of the invention (2) The processing becomes more and more difficult. The fast access or retrieval and clearing of the entire file system, from the perspective of Chu, is decisive for its daily use. Although the capacity of hard disks is getting larger and larger, the memory of computer systems is still in short supply, especially for applications that require a larger amount of storage, such as multimedia, and the increasing use of applications. The existence of too many files not only consumes unnecessary memory capacity, but-because of the time it takes to find and access the stored files-essentially makes the system less efficient in response time. Every computer user has a huge variety of different types of files. In the current filing system, all these files are treated the same. If computer systems are used in a commercial environment, there are usually so-called record-keeping rules that define different types of files, where and how they must be stored in memory, and-(most importantly-those individual files) How long must it be kept. The current slotting system does not follow up. Users maintain such record keeping rules. 1 There are files that are used to remove files that have exceeded their normal life. Production and deletion equipment, but these are applied uniformly throughout the file system. For example, in the UN IX system, you can choose _, periodically running software, which can be planned to remove files older than a set number of days in a folder (or directory) list. Regardless of whether they have More_ Huang Yao, this is the disadvantage of this common way of treating all files in addition \ In addition, if the above files are systematically removed, it is not a necessary part of the operating system, but a zone j or the customer Demand options: As the use of unmanaged personal workstations or laptops increases, the growth of files and the accompanying disk memory requirements are available. The. ^ An object of the present invention is to make the selection for one kind of computer system with finite remember

O:\61\61896.ptd 第5頁 4€08l2 五、發明說明(3) ___ 憶體資源的使用變得有效率的方法> 本發明的一個目的在於,提供一種允許 規則’舉例來說如記錄保存規則,歸槽 照預先定義的 發明概要 备案的方法。 本發明之目的考藉由如申請專利範圍 腦程式產品、電腦程式元件、和系統完成晴的方法、電 本發明之優點結合在詳細描述中,或二 見的。 田說明中是顯而意 圖式概述 本發β明參照下列概要圖式詳細地描述。 圖1是本發明示範具體實施例的一個說 較佳具體實施例詳述·· 。 以下’描述本發明的基本觀念。在闡 之前,先定義和解釋那些有關術語和表示^同具體實施例 在此處元件”表示法用來描述資料庫 —一 的例子:幹宏r y t 1 的―個、元件。元件 在/ w i檔案(例如電腦或機器可讀的檔宰)、H 件 存在楷案之八j 、要加.入到已 之版、 P分育訊、來自影像軟體資訊庙从旦,沾 '資料例來說,W或電影)。 館、·^私Μ 同在此%用來描述資訊的任何隼成、铲彳 軟體資訊庫,例如檔案資料庫 式 ^資料庫的例子是—DQS或視窗樓案目像”資訊 臧貝枓庫的系統。一資料庫系統及/ 車糸 以疋分散的。 ^ 資料庫可 在此處元細容指的是資料。舉例來处O: \ 61 \ 61896.ptd Page 5 4 € 08l2 V. Description of the invention (3) ___ A method of using memory resources to become efficient > An object of the present invention is to provide an allowance rule 'for example Such as record keeping rules, the method of filing according to a predefined summary of the invention. The purpose of the present invention is to consider methods such as brain-programming products, computer-programming elements, and systems for completing patent applications, and the advantages of the present invention in the detailed description, or a combination thereof. In the field description, the schematic overview is described in detail with reference to the following general schematic. Fig. 1 is a detailed description of an exemplary embodiment of the present invention. The following 'describes the basic idea of the present invention. Before elaborating, first define and explain those related terms and representations. ^ Same as the specific embodiment here. The "element" notation is used to describe the database-an example: the dry macro ryt 1-a component. The component is in the / wi file ( For example, computer or machine-readable files), there are eight items in the case, to be added to the existing version, P points education, from the image software information temple, once the data example, W Or movie). Library, private information and any software used to describe the information here, such as software information database, such as file database type ^ database example is-DQS or window building project image "information Zang Bei's library system. A database system and / or carts are decentralized. ^ Database may refer to data here. For example

第6頁 。」能包含客 發明說明(4) 等碟;:〜用程式所產生的資料、供處理器執行的電躅碼 那些元件以一鮮μ 每個資料庫系統維護它的;二排;=料庫系统中’且 種類之說明資m,在此和:各式特有架構的某婆 示範的資訊,檔案屬性、料虚元資料可包含下列 曰期、有存取許可的使用】案=建立曰期、最後校訂 來說Lotus W〇rdPr〇)等。資二案二二二播案類型(舉例 :樣的記憶體中,或者它=資;Η 而圖ΪίΪΐ:元資料就像在圖書館中找到的卡片目錄:] ,圖曰館冼類似於資料庫系統。 再ΐ:那ϋ系統允許使用者能約描、管理、共享和 —卩二儲存在其中的有關元件的資訊。軟體資訊庫允 料庫夺π + m2 α 2 ί儲存兀件貝料。例如,儲存在資 ^ ! ί 1 ? ^ ^ ^ ^ ^ t ji. ^ ^ ^ t ^^二;秀的说明、程式和系統物件。它也可能包括在 貢料、程式和系統物件之間有關關聯性的資訊;以及此資 訊的語意和使用。 本方法基本的概念在於提供一種复動化的檔案刪除嫁 備,其自動地從一資料庫系統移除不再 稽案)。有三個主要的元件.:一個供元件(標m“一 個供元件(檔案)表示,和一個供元件(檔案)處置。這三個 兀件結舍一含有檔案的檔案資料庫說明。 檔案產生:在檔案產生期間,舉例來說在建立一檔案或Page 6. "Can contain the disc description of the invention (4) and other discs: ~ ~ using the data generated by the program, the code for the processor to execute those components with a fresh μ each database system to maintain it; two rows; = material library In the system, the description of the type of information m, and here: the information demonstrated by a woman of various unique structures, file attributes, data element data can include the following dates, use with access permission] case = establishment date Finally, the proofreading is Lotus W〇rdPr〇). The type of the case of the 22nd case of Zier 22 (for example: in the same memory, or it = Zi; Η and Figure ΪίΪ: Metadata is like a card catalog found in the library:] Database system. Second: The system allows users to trace, manage, share and—secondary information about the components stored in it. The software information library allows the library to capture π + m2 α 2 . For example, stored in the resource ^! Ί 1? ^ ^ ^ ^ ^ T ji. ^ ^ ^ T ^^ 2; show descriptions, programs and system objects. It may also be included between materials, programs and system objects Relevant information; and the meaning and use of this information. The basic concept of this method is to provide a reactivated file deletion mechanism that is automatically removed from a database system and is no longer audited.) There are three main components: one for components (marked "m", one for components (files), and one for components (files) for disposal. These three components result in a description of the archive database containing the files. The files are generated: During file generation, for example, when creating a file or

第7頁 4 60 812 五、發明說明(5) 力!·.檀案到資料庫時,一個攔位加入到此檔宰的元資料 命週期,二最。這個新的齋位,敘述此檔案的生 .,^ y. 、最初地在—新檔案產生時設定,戋在此栌孝 •被,存在檔案資料庫中之前設S。 疋1在此拉案. -檔案21到二ϋ (圖1争的苐14、1 2、和10步驟)或增加 缺後,此元侔義廷個元件的元資料中(第12步驟)。 意、ί別:::料和它的元資料被健存在記億體中。注 意各別—的生命週期指定袷每個元件。一 诚檔案表示或5主-s己.當檔案21最初建立時,使用去公須遭 擇一生命週期(第12步驟y 上 使用者必須選 定的浐牵味入、Λ 逆可藉由要求使用者接受一内 週气來完成,以指述特定的標案生命週期, 樣地,使 議(方塊⑴。如果樓類 2U例如I資料的建立2〇年)。 別㈣ -帶有私人文件的目錄之内,類到 週期。 〇可把指派一較短的 另一個稍後說明的可能選擇在圖1 命週期可由使用者或應用程式定義一。^中描述。生 者。 在疋義特疋私案的生命週期之前提供給使用 檔案處理:當到達檔案生命週期的界限時,標案19將會Page 7 4 60 812 5. Description of the invention (5) Force! When the Tan case comes to the database, a block is added to the metadata of this file. The life cycle is the second most. This new fast position describes the birth of this file., ^ Y. It was originally set when the new file was created, and here it is filial piety. It is set to S before it is stored in the archive database.疋 1 is here. -File 21 to ϋ (steps 14, 12, 2, and 10 in Figure 1) or add. After the missing part, the metadata of this element is included (step 12). Italian, English :: The material and its metadata are stored in the record body. Note the individual-life cycle designation for each component. A sincere file indicates or 5 master-s have. When the file 21 is initially created, the use of the decommissioning must be subject to an alternative life cycle (the user must choose on the twelfth step y), Λ reverse can be used on request The person accepts an internal atmosphere to complete, in order to refer to the specific bidding life cycle, the plot, the proposal (block ⑴. If the building class 2U, such as the establishment of I data 20 years). Do not ㈣-with private documents Within the catalog, class to cycle. 〇 You can assign a shorter one of the possible options described later in Figure 1. The life cycle can be defined by the user or the application. ^ Is described. Private files are provided for use before the life cycle of the case: When the limit of the file life cycle is reached, bid 19 will

460812 五、發明說明(6) 被抹去,如在圖i的右手邊所指示。這可透過在搜尋^案 二彳已經到達它們的壽命終點之檔案的描述碼完成、 1·/驟)。此碼以一所述頻率自動地執行。一個可選擇 .成♦可供用來要求使用者核可將被抹除檔案的列表。 以查元資料,以決定一元件的生命週期是否期滿, ΐί ί:個元件的生命週期期滿可從該記憶體移除。同 ί後但:it果一元件的生命週期將要期滿、或在它期滿 iiiir 刪除之前提示使用者。在此情況,使用 者有選擇性可選擇是否將元件 改變元件的生命週期。件m憶體移除,或是否要 物丄:下提出一第1體實施例。此具體實施例是以 物件導向架構為基礎。 Λ J ^ ^I每個檔案表示為一物件類別的使用物件方 盆山Γ糸、,充中軚皁的類別"檔案"能擴充(舉例來 忒,稭由物件導向程式規劃中 ^ 別。無加+ 一叩繼水機制)為一新的類 別。"有限生命週期"類別包含=命週期"類 宰產生眸、’限生命週期,'類型的-個檔 指述1定的檔案生命週期。ΐ;的命週期,或 钯,扣,+、, 目刖的日期和生命週期一 它以資料廑志械安为饰吕叫 此枯案建立時, 資料座赤Ϊ或權案!員為一"有限生命週期”型態。 或檔案管理員將定期地掃瞄它具有"有卩卩斗人、s划I, 類型的檔案J列表,並移除任何其刪除時間已、期滿〒者3γ460812 V. Description of the invention (6) is erased, as indicated on the right-hand side of Figure i. This can be done by searching for the description code of the files that have reached the end of their life (1 · / step). This code is executed automatically at a stated frequency. An optional .A list that you can use to ask users to approve erased files. The metadata is checked to determine whether the life cycle of a component has expired. The life cycle of a component can be removed from the memory. Same as but after: the life cycle of a component is about to expire, or the user is prompted before it expires. In this case, the user has the option to choose whether to change the component's life cycle. Remove the body, or do you want something: a first body embodiment is proposed next. This specific embodiment is based on an object-oriented architecture. Each file of Λ J ^ ^ I is represented as an object category. The use of the object is square, and the category of the "soap" can be extended (for example, the object-oriented program planning is different). No addition + a mechanism to follow the water) is a new category. " Limited life cycle " The category contains = life cycle " category. Zai Yimou, ‘Limited Life Cycle, 'Type-a file refers to a fixed file life cycle. ΐ; the life cycle, or palladium, deduction, + ,, the date and life cycle of the project-it is decorated with the data Zhi Zhi An Lu, when the dry case was established, the data seat was red or right case! " Limited life cycle " type. Or the file manager will periodically scan the list of files with the " Combatant, Sector I, Type J, and remove any deletions that have expired or expired. 3

第9頁 4 608 1 2 五、發明說明(7) 另一個具體實施例結合圖1 4 〜 個檔案之檔案系統20的概要表示法广圖式展示帶有數 用來增加一新檔案21的一連串步驟15、2展不檔案系統20 13步驟)。依照本具體實施例,爾除的程序(第 個步驟要實行(第! 4步驟)。依照本果/要新檔索2卜有三 週舞I第1 2步驟)。三個選擇項 必須選擇一生命 1 7 )提供作為選擇生命週期。 方塊1 6、和方塊 如方塊1 1中所指示,有—堆 欠 顯示器上由圖像所代表)。每個V體人資-Λ訊/(例如在一 的生命週期。可能有一且 貝讯庫有一預先指派 訊庫、一具有丨〇 = 卩週期之法律的軟體資 要體:r,舉例來說。丄^ f第12步驟時選取 軟 =之:檔案21庙他 透過在其上點—下(如要存汛庫。軟體資訊庫可 用熱鍵、或相# ϋ _ ®者介面)、特過使 庫之預先指派的生命週期於故’法律的軟體資訊 生命週期.的二Πΐ案21。 選擇一声崇 ^ 之不同方式在方塊16中說明。使用者可 期、#彼姓〜 呈現一對活給他來接受内定的生命週 這可i過使二2 Ϊ案生命週期、或宣告此樓案為永夂的。 完成。° 、當的圖像、熱鍵I、或其他廣為人知的方法 在方塊11和1 6描述的那些程序,相當適合幫助使用者觀 4S©8|2 五、發明說明(8) 察記錄保存規定的系統。方塊1 1的方式 用者一點也不需要擔心記錄保存規定。 立的檔案放在右邊的類別中。!其餘皆由 另一個選擇,在方塊1 7舉例說明,其 的系統呼叫,擴充為包括檔案21所需要 述。廷可透過應用程式介面(Αρι )完成, 一旦選擇了生命週期,真實的檔案建 生命週期儲存在檔案的元資料中。很明 改變。想像得到的,舉例來說,如果檔 程式軼體(例如文書處理軟體)而建立。 案到磁碟時,或當將它加沐檔4系統2〇 要求選取一生命期。 日ί常地,或者以規律的基礎或隨意之 $地:除。此刪除程序由方塊13指示。 生命週期期滿的檔案19,那麼 棄二备成可選择的安全措施,可在此之 在此那些樓案保】”=除的檔案可 如果他不從垃。這給使 被刪除。 减將那些檔案移除,那 遵照本發明的系統,也能提供允許使 庫(例如樓荦系&、 的'各別例如樓案)作 A & A m Γ的貝料破取出並顯示。 特別適合,因為使 他只需要將他新建 系統完成。 中用來建立檔案21 的生命週期之指 ) 立(第1 〇步驟),且 顯的步驟順序可以 案21因為使用應用 當儲存新建立的標 時,使用者可能^ 間隔,檔案系統自 如果在刪除程序期 各別的槽案被丟 前提示使用者。替 放在一垃圾籃中。 用者有機會介入。 麼那些檔案最後會 用者對儲4在資料 用的特性。為此目 然後 460812 ' _ 五、發明說明(9) 動、或複製元件。使用者也能變更元件的士 A, 他可將其生命週期與另一個元件的生命=期,或者 說,此聯接可透過將元件搬進一具有 】。舉例來 命週期之軟體資訊庫的拖放操作完成。 的預先指定生 =適合。硬體和軟體的==的巧”或其他 釭式的一般用途電腦系統,當龙 此疋咿有電腦 系統使它實施在此處描述的那些 亚,行時,控制電腦 腦程式產品中,芦包含所有能實施此也能嵌入電 些方法。 載入電腦系統時,能夠實施^ 本發明也能用在對網路上連接的丘 具有平行資料共用存取之系統。” 碟虽中的檔案, 特別的觀視器可用來回顧資斜 例來說,觀視器可提供一種工^庫中棺案的生命週期。舉 榮幕上…中的那些檔案。觀視=二生命週期板織 /或它們的生命週期作一用來對那些檔案及 一家公司採取法律行動、在此1 ,豕么司決定對另 文件將會產生。避免這些文件被關聯性的所有 關聯性文件可因此由觀視器顯亍,::::的。所有的有 用。舉例來說他可能分配新的 ^ f可對它們作| 以確保它們保持另一個五年 。卩過』,··°母個此種文件, 第12頁Page 9 4 608 1 2 V. Description of the invention (7) Another specific embodiment combines the schematic representation of the file system 20 with the files of Fig. 1 4 ~ showing a series of steps with a number for adding a new file 21 15, 2 show the file system 20 steps 13). According to this specific embodiment, the process of elimination (the first step is to be carried out (step! 4 steps). According to this result / requiring a new file, there are three weeks of dance I step 12). Three options must choose a life 17) Provide as a selection life cycle. Boxes 16 and, and as indicated in box 11, there are—heaps (represented by images on the display). Each V-body human resource-Λ news / (such as the life cycle of one. There may be one and the Bei Xun database has a pre-assigned information database, a software software body with a law of 丨 〇 = 卩 cycle: r, for example丄 ^ f Select soft = 12 in the 12th step: click on the file 21 at the bottom (if you want to store the flood library. The software information library can use hot keys, or relative # ϋ _ ® interface), special The library's pre-assigned life cycle is based on the 'legal software information life cycle.' Case II. 21. Different ways of choosing a Chong ^ are explained in box 16. The user can expect, # 彼 姓 ~ present a pair of live Give him the accepted life week. This can be done to make the life cycle of the 2nd case, or to declare the case as permanent. Done. °, current image, hotkey I, or other well-known methods in box 11 The procedures described in 16 and 16 are quite suitable for helping users to observe 4S © 8 | 2 V. Description of the Invention (8) Check the system of record keeping regulations. The method of box 11 does not require the user to worry about record keeping regulations at all. The files are placed in the category on the right !!! The rest are all by another Select, as an example, in box 17, the system call is expanded to include the files 21. Ting can be completed through the application program interface (Αρι). Once the life cycle is selected, the real file creation life cycle is stored in the file. Metadata. Obviously changed. Imaginable, for example, if the file program is created (such as word processing software) and created. When the file is on the disk, or when it is added to the file 4 system 20 asks to select one Lifetime. Normally, or on a regular basis or at will: Divide. This deletion procedure is indicated by box 13. The file 19 whose life cycle has expired, then discard it and prepare it as an optional security measure. In this case, those files can be protected if they are not removed. This will delete them. Minus removing those files, the system according to the invention can also provide permission to use the library (such as Buildings &, 'separate example of building case' as A & A m Γ The shell material is taken out and displayed. It is particularly suitable, because he only needs to complete his new system. The file used to create the file 21 Life week (Finger means) (step 10), and the order of the steps can be shown 21 because when using the application to store the newly created target, the user may ^ the interval, the file system will be deleted if each slot is deleted during the program. Prompt the user before throwing it. Put it in a garbage basket. The user has the opportunity to intervene. So those files will be used by the user in the end. The characteristics of the storage 4 are used for this purpose. Then 460812 '_ V. Description of the invention (9) Move or copy the component. The user can also change the taxi A of the component. He can compare its life cycle with the life of another component. Or, this connection can be done by moving the component into one. Drag and drop of the software library is complete. The pre-designated health = fit. "Hardware and software == clever" or other general-purpose computer systems, when a computer system is available to implement it in those Asian and Asian banks described here, control computer brain programming products, Contains all methods that can implement this and can also be embedded. When loaded into a computer system, it can be implemented ^ The present invention can also be used in systems that have parallel data sharing access to the mounds connected on the network. " The viewer can be used to review the data. For example, the viewer can provide a life cycle of a coffin in a warehouse. Give those files on ... Observation = Two life cycle weaves and / or one of their life cycles used to take legal action against those files and a company. Here, the company decides that another document will be produced. All related files that prevent these files from being related can thus be displayed by the viewer, ::::. All useful. For example, he might assign new ^ f to make them | to ensure that they remain for another five years. I ’ve been over, ”°° A mother of such documents, page 12

Claims (1)

460812 六、申請專利範圍 1. 一種用以增加一元件(2 1 )到一含有有限儲存容量的記 憶體之資料庫系丨統(2 0 )的方法,其中該元件(2 1 )包含資料 和元資料,包含下列步驟: •在該元資料中定義該元件(2 1 )的各別生命週期, •儲存該資料和該元資料於該記憶體中。 2 ·如申請專利範圍第1項之方法,其中經常檢查該元資 料,以決定一元件的該生命週期是否期滿。 3. 如申請專利範圍第2項之方法,其中如果一元件(1 9 ) 的生命週期期滿,即從該記憶體移除。 ' 4. 如申請專利範圍第2項之方法(,其中如果一元件的該 生命週期將要期滿或已期滿將提示一使用者。 5. 如申請專利範圍第4項之方法 <,其中該使用者可選擇 是否要從該記憶體移除該元件,或是否要改變該元件的生 命週期。 6. 如申請專利範圍第1項之方法,其中該生命週期使用 一内$設定定義。 7. 如申請專利範圍第6項之方法,其中該内定設定依元 件類型或該元件的資料而定。 8. 如申請專利範圍第1項之方法,其中該生命週期由一 使用者或一應用程式定義。 9. 如申請專利範圍第8項之方法,其中如果該使用者定 義該生命週期,則提供記錄保存規則之相關資訊。 1 0.如申請專利範圍第1項之方法,其中該元件是一檔案 (2 1 )且該資料庫系統是一檔案軟體資訊庫或檔案目錄。460812 VI. Application for Patent Scope 1. A method for adding a component (2 1) to a database system (20) containing memory with limited storage capacity, wherein the component (2 1) contains data and The metadata includes the following steps: • defining the respective life cycles of the component (2 1) in the metadata, • storing the data and the metadata in the memory. 2 · The method according to item 1 of the scope of patent application, wherein the metadata is often checked to determine whether the life cycle of a component has expired. 3. The method according to item 2 of the patent application, wherein if the life cycle of a component (19) expires, it is removed from the memory. '4. If the method of the scope of the patent application (2), (if the life cycle of a component is about to expire or has expired, a user will be prompted. 5. If the method of the scope of the patent application 4, the method < The user can choose whether to remove the component from the memory, or whether to change the life cycle of the component. 6. For the method in the first scope of the patent application, the life cycle is defined using an internal $ setting. 7 . For the method of applying for the scope of the patent No. 6, the default setting depends on the type of the component or the information of the component. 8. For the method of the scope of the patent for the No. 1, the life cycle is determined by a user or an application Definition. 9. If the method of the scope of patent application, the method of item 8, wherein if the user defines the life cycle, provide the relevant information of the record keeping rules. 1 0. If the method of scope of the patent application, the element is A file (2 1) and the database system is a file software information library or file directory. 4 6 0 8 1 2 <、申請專利範圍 如申请專利範圍第1項之方法,其中該元件的兮各別 生命週期透過顯示开灿 八丁必凡件的該各別 軟體“庫具有_ =軟體資訊庫的—個選擇定義,每個 期可藉由ϋ取該等J ^派的生命週期’則吏各別生命週 12. -種用以對Λ〒訊二中的-個來選擇。 庫系統之資料和元資有保存在具有有限儲存容量之資料 方法,其中該元己憶體(20)中之元件⑵)作用的 含下列步驟: l 3以凡件(21)的一個生命遇期,包 .取回該元資料, ' .顯示該元件的該, .對該元件(21)作用。t月’及 13. 如_請·專利範圍第 夕 指下列動作當中之_: : ^之方法,其中對該元件作用 元件、顯示該元件、蔣:取該元件、取回該元件、開啟該 如中請專利範圍第5=、或複製該元件。 指下列動作當中之—: 二疋万法,其中對該元件作用 與另-個元件的生命週期^車命週•,或將該生命週斯 15.如申請專利範圍第 件的生命週期而對其作用。、您方法,其中透過變更該元 1 6.如申請專利範圍第丨5 件到具有所需要預先指派 / ,/、中藉由移動該凡 改變該生命週期。 命週J的一軟體資訊庫之肉而 程式產品具有“丨式產’包含-電腦可讀媒體,該電腦4 6 0 8 1 2 < The method of applying for patent scope is the method of the first scope of patent application, wherein the individual life cycle of the component is displayed by the respective software of the "Kan Bada Bibi Fan" "library has _ = software A selection definition of the information database, each period can be obtained by taking the life cycle of these J ^ factions, respectively, each life cycle 12.-a kind to choose one of the two 〒 〒 news. The system's data and meta-data are stored in a data method with limited storage capacity, where the element ⑵) of the meta-memory body (20) contains the following steps: 3 A life cycle of each piece (21) Retrieve the meta data, '. Display the component's component, and apply the component (21). T' and 13. If _Please · The scope of the patent refers to one of the following actions:: ^ 之Method, in which the element acts on the element, displays the element, Jiang: take the element, retrieve the element, open the patent scope 5 =, or copy the element. Refers to one of the following actions:-Erwan Wan Method, which acts on this element and the life cycle of another element ^ 车 命 周 • , Apply this life week 15. If it applies to the life cycle of the first scope of the patent application, your method, by changing this element 1 6. If you apply for the fifth scope of the patent scope to have the required pre-assignment /, / In order to change the life cycle, the life of a software information library of the life week J and program products have "丨 produced" containing-computer-readable media, the computer 第14頁 4 608 1 2 六、申請專利範圍 電腦程式碼裝置,用來增加+新元件(2 1 )到資料庫系 統(20),其包含一具有有限儲存容量的記憶體,該資料庫 系統(2 0 )包含多重元件,其包含i料和元資,當該程式 載入時,執行程序以 •在新元件(2 1)的元資料中定義一各別生命週期, •儲存該新元件(2 1 )的資料和元資料在該記憶體中。 1 8. —種電腦程式元件,包含: 電腦程式碼裝置,用來增加一新元件(2 1)到資料庫系 統(2 0 ),其包含一具有有限儲存容量的記憶體,該資料庫 系統(2 0 )包含多重元件,其包含資料和元資料,執行程序 以 S'Page 14 4 608 1 2 VI. Patent application computer code device for adding + new component (2 1) to database system (20), which contains a memory with limited storage capacity. The database system (20) Contains multiple components, which contain data and metadata. When the program is loaded, the program is executed to define a separate life cycle in the metadata of the new component (21), and store the new component. (2 1) The data and metadata are in the memory. 1 8. — A computer program element, comprising: a computer code device for adding a new element (21) to a database system (20), which includes a memory with a limited storage capacity, the database system (2 0) Contains multiple components, which contain data and metadata, and executes the program with S ' •在新元件(2 1 )的元資料中定義一各別i命週期, •儲存該新元件的資料和元資料在該記憶體中。 1 9.如申請專利範圍第1 7項之電腦程式產品,或如申請 I 專利範圍第1 8項之電腦程式.元件,其中經常檢查該元資 料,以決定一元件的該生命週期是否期滿。 I 2 〇.如申請專利範圍第1 7項之電腦程式產品,或如申請 專利範圍第1 8項之電腦程式元件,其中如果一元件的生命 週期期滿,即從該記憶體被移除。 11 1 _画隱 I 111 1 _圓_1 III 第15頁• define an individual life cycle in the metadata of the new component (2 1), • store the data and metadata of the new component in the memory. 1 9. If the computer program product of item 17 in the scope of patent application, or the computer program of item 18 in the scope of patent application I. Components, the metadata is often checked to determine whether the life cycle of a component has expired . I 2 〇. For example, a computer program product under item 17 of the scope of patent application, or a computer program element under item 18 of the scope of patent application, wherein if the life cycle of a component expires, it is removed from the memory. 11 1 _Painting I 111 1 _Circle_1 III Page 15
TW088122114A 1999-03-31 1999-12-16 Automated file pruning TW460812B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP99106610 1999-03-31

Publications (1)

Publication Number Publication Date
TW460812B true TW460812B (en) 2001-10-21

Family

ID=8237899

Family Applications (1)

Application Number Title Priority Date Filing Date
TW088122114A TW460812B (en) 1999-03-31 1999-12-16 Automated file pruning

Country Status (5)

Country Link
JP (1) JP2002540530A (en)
AU (1) AU2567100A (en)
HU (1) HUP0200614A2 (en)
TW (1) TW460812B (en)
WO (1) WO2000058865A1 (en)

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7392234B2 (en) * 1999-05-18 2008-06-24 Kom, Inc. Method and system for electronic file lifecycle management
US9361243B2 (en) 1998-07-31 2016-06-07 Kom Networks Inc. Method and system for providing restricted access to a storage medium
US7035880B1 (en) 1999-07-14 2006-04-25 Commvault Systems, Inc. Modular backup and retrieval system used in conjunction with a storage area network
US6658436B2 (en) 2000-01-31 2003-12-02 Commvault Systems, Inc. Logical view and access to data managed by a modular data and storage management system
US7434219B2 (en) 2000-01-31 2008-10-07 Commvault Systems, Inc. Storage of application specific profiles correlating to document versions
US7003641B2 (en) 2000-01-31 2006-02-21 Commvault Systems, Inc. Logical view with granular access to exchange data managed by a modular data and storage management system
GB2406679B (en) 2000-11-30 2005-05-18 Coppereye Ltd Database
US20020169658A1 (en) * 2001-03-08 2002-11-14 Adler Richard M. System and method for modeling and analyzing strategic business decisions
JP2005505039A (en) 2001-09-28 2005-02-17 コムヴォールト・システムズ・インコーポレーテッド Apparatus and method for archiving objects in an information storage device
US7454569B2 (en) 2003-06-25 2008-11-18 Commvault Systems, Inc. Hierarchical system and method for performing storage operations in a computer network
US7146388B2 (en) 2003-10-07 2006-12-05 International Business Machines Corporation Method, system, and program for archiving files
US7117322B2 (en) 2003-09-08 2006-10-03 International Business Machines Corporation Method, system, and program for retention management and protection of stored objects
US7107416B2 (en) 2003-09-08 2006-09-12 International Business Machines Corporation Method, system, and program for implementing retention policies to archive records
WO2005050381A2 (en) 2003-11-13 2005-06-02 Commvault Systems, Inc. Systems and methods for performing storage operations using network attached storage
US7801863B2 (en) 2005-03-04 2010-09-21 Microsoft Corporation Method and computer-readable medium for formula-based document retention
US9984080B2 (en) 2006-08-01 2018-05-29 International Business Machines Corporation Efficient non-database file-expiration management for document retention
US8769048B2 (en) 2008-06-18 2014-07-01 Commvault Systems, Inc. Data protection scheduling, such as providing a flexible backup window in a data protection system
US8352954B2 (en) 2008-06-19 2013-01-08 Commvault Systems, Inc. Data storage resource allocation by employing dynamic methods and blacklisting resource request pools
US9128883B2 (en) 2008-06-19 2015-09-08 Commvault Systems, Inc Data storage resource allocation by performing abbreviated resource checks based on relative chances of failure of the data storage resources to determine whether data storage requests would fail
US8725688B2 (en) 2008-09-05 2014-05-13 Commvault Systems, Inc. Image level copy or restore, such as image level restore without knowledge of data object metadata
US20100070474A1 (en) 2008-09-12 2010-03-18 Lad Kamleshkumar K Transferring or migrating portions of data objects, such as block-level data migration or chunk-based data migration
US9021198B1 (en) 2011-01-20 2015-04-28 Commvault Systems, Inc. System and method for sharing SAN storage
US8849762B2 (en) 2011-03-31 2014-09-30 Commvault Systems, Inc. Restoring computing environments, such as autorecovery of file systems at certain points in time
US10157184B2 (en) 2012-03-30 2018-12-18 Commvault Systems, Inc. Data previewing before recalling large data files
GB2501070A (en) * 2012-04-05 2013-10-16 Appsense Ltd Metadata defining an action to be performed by a computer system
US9633216B2 (en) 2012-12-27 2017-04-25 Commvault Systems, Inc. Application of information management policies based on operation with a geographic entity
US9459968B2 (en) 2013-03-11 2016-10-04 Commvault Systems, Inc. Single index to query multiple backup formats
US10169121B2 (en) 2014-02-27 2019-01-01 Commvault Systems, Inc. Work flow management for an information management system
US9648100B2 (en) 2014-03-05 2017-05-09 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US9823978B2 (en) 2014-04-16 2017-11-21 Commvault Systems, Inc. User-level quota management of data objects stored in information management systems
US9740574B2 (en) 2014-05-09 2017-08-22 Commvault Systems, Inc. Load balancing across multiple data paths
US9665732B2 (en) * 2014-07-02 2017-05-30 Sap Se Secure Download from internet marketplace
US9852026B2 (en) 2014-08-06 2017-12-26 Commvault Systems, Inc. Efficient application recovery in an information management system based on a pseudo-storage-device driver
US11249858B2 (en) 2014-08-06 2022-02-15 Commvault Systems, Inc. Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host
US9444811B2 (en) 2014-10-21 2016-09-13 Commvault Systems, Inc. Using an enhanced data agent to restore backed up data across autonomous storage management systems
US9766825B2 (en) 2015-07-22 2017-09-19 Commvault Systems, Inc. Browse and restore for block-level backups
US10296368B2 (en) 2016-03-09 2019-05-21 Commvault Systems, Inc. Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block-level pseudo-mount)
US11356254B1 (en) * 2017-01-09 2022-06-07 Amazon Technologies, Inc. Encryption using indexed data from large data pads
US10608813B1 (en) 2017-01-09 2020-03-31 Amazon Technologies, Inc. Layered encryption for long-lived data
US10476663B1 (en) 2017-01-09 2019-11-12 Amazon Technologies, Inc. Layered encryption of short-lived data
US10838821B2 (en) 2017-02-08 2020-11-17 Commvault Systems, Inc. Migrating content and metadata from a backup system
US10740193B2 (en) 2017-02-27 2020-08-11 Commvault Systems, Inc. Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount
US10891069B2 (en) 2017-03-27 2021-01-12 Commvault Systems, Inc. Creating local copies of data stored in online data repositories
US10776329B2 (en) 2017-03-28 2020-09-15 Commvault Systems, Inc. Migration of a database management system to cloud storage
US11074140B2 (en) 2017-03-29 2021-07-27 Commvault Systems, Inc. Live browsing of granular mailbox data
US10664352B2 (en) 2017-06-14 2020-05-26 Commvault Systems, Inc. Live browsing of backed up data residing on cloned disks
US10795927B2 (en) 2018-02-05 2020-10-06 Commvault Systems, Inc. On-demand metadata extraction of clinical image data
US10761942B2 (en) 2018-03-12 2020-09-01 Commvault Systems, Inc. Recovery point objective (RPO) driven backup scheduling in a data storage management system using an enhanced data agent
US10789387B2 (en) 2018-03-13 2020-09-29 Commvault Systems, Inc. Graphical representation of an information management system
US10860443B2 (en) 2018-12-10 2020-12-08 Commvault Systems, Inc. Evaluation and reporting of recovery readiness in a data storage management system
US11308034B2 (en) 2019-06-27 2022-04-19 Commvault Systems, Inc. Continuously run log backup with minimal configuration and resource usage from the source machine

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5107419A (en) * 1987-12-23 1992-04-21 International Business Machines Corporation Method of assigning retention and deletion criteria to electronic documents stored in an interactive information handling system
US5689699A (en) * 1992-12-23 1997-11-18 International Business Machines Corporation Dynamic verification of authorization in retention management schemes for data processing systems

Also Published As

Publication number Publication date
JP2002540530A (en) 2002-11-26
AU2567100A (en) 2000-10-16
WO2000058865A1 (en) 2000-10-05
HUP0200614A2 (en) 2002-06-29

Similar Documents

Publication Publication Date Title
TW460812B (en) Automated file pruning
Dinneen et al. The ubiquitous digital file: A review of file management research
US8180737B2 (en) Content manager
US8805884B2 (en) Automatic resource ownership assignment systems and methods
CN102187359B (en) Dynamic content sorting using tags
CN102110121A (en) Method and system for processing data
CN101019115A (en) A novel media file access and storage solution for multi-workstation/multi-platform non-linear video editing systems
US7499904B2 (en) System and method for client mastered replication of local files
CN108369606A (en) The configurable access of the revision history of document
CN109739828B (en) Data processing method and device and computer readable storage medium
US20140351222A1 (en) Digital archive systems, methods and computer program products for linking linked files
EP1533733A1 (en) Active agenda
Crowder et al. File naming in digital media research: Examples from the humanities and social sciences
Cocciolo When archivists and digital asset managers collide: Tensions and ways forward
US20020169940A1 (en) System and method for using memory mapping to scan a master file table
Kupfer et al. Digitization and digital preservation of government information
JP2022122266A (en) Device and method for safe storage of media including personal data and erasing of stored personal data
JP2007193408A (en) Disk operation control method in document management system
Richter IML-inscribed nets for modeling text processing and data (base) management systems
Chapman Managing social data: is SharePoint the answer?
Hayes Information Resources: Technical Issues
Lewis et al. Developing a Data Vault
Altman Transformative effects of NDIIPP, the case of the Henry A. Murray Archive
Dollery et al. Conservation records for the archaeologists?
Shepherd et al. Are ISO 15489‐1: 2001 and ISAD (G) compatible? Part 2

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees