US20160224431A1 - Accelerated data transfer using common prior data segments - Google Patents
Accelerated data transfer using common prior data segments Download PDFInfo
- Publication number
- US20160224431A1 US20160224431A1 US15/096,139 US201615096139A US2016224431A1 US 20160224431 A1 US20160224431 A1 US 20160224431A1 US 201615096139 A US201615096139 A US 201615096139A US 2016224431 A1 US2016224431 A1 US 2016224431A1
- Authority
- US
- United States
- Prior art keywords
- data
- computing system
- file
- files
- source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2358—Change logging, detection, and notification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2365—Ensuring data consistency and integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24553—Query execution of query operations
- G06F16/24562—Pointer or reference processing operations
-
- G06F17/30368—
-
- G06F17/30371—
-
- G06F17/30504—
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Computational Linguistics (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 11/525,729 filed on Sep. 22, 2006, entitled “Accelerated data transfer using common prior data segments,” which issued as U.S. Pat. No. 9,317,506 on Apr. 19, 2016, and which application is expressly incorporated herein by reference in its entirety.
- 1. The Field of the Invention
- The present invention relates to the field of data transfers. More specifically, the present invention relates to the field of transferring data using common prior data segments.
- 2. The Background of the Invention
- As networking technologies grow, including the Internet, so do their capabilities and requirements. For many years, users dialed up to access the Internet at speeds of 14.4 kilobits per second (kps), then 28.8 kps and 56.6 kps. Then ISDN lines made 128 kps a possibility. Currently cable modems and DSL provide extremely fast connections with high bandwidth to home users. Other technologies such as T1 and T3 lines provide possibly even faster connections and are usually implemented by businesses and universities. As these technologies are increasing in capabilities, so too is the size and amount of the data traveling from one networked device to another. For example, when 14.4 kps connections were prominent, a file of a few hundred kilobytes was considered quite large and took a while to download. With current broadband technologies utilizing cable modems and DSL, a file of multiple megabytes is able to be downloaded in a few minutes. Hence, technology has improved substantially, enabling larger files to be downloaded in a short amount of time. However, many data files are currently in the range of gigabytes such as movie files which could take hours to download even on fast connections and would take days with older dial-up connections. Since the Internet and other networks are being used to couple everything together lately, even toasters and refrigerators, many attempts have been made to make network connections more efficient utilizing data processing techniques.
- One technique is to compress the data before sending it over the network. However, that has its drawbacks of adding steps of compressing the data and before it is sent and uncompressing the data after it is received, simply adding time to the process in a different way. Furthermore, since many files like .mp3s are already compressed yet still quite large, compressing them again will do little if anything to improve network speed.
- Another technique is described in U.S. Patent App. No. 2004/0148306 to Moulton, et al. Moulton describes a hash file system that is based and organized upon hashes and which is able to eliminate redundant copies of aggregate blocks of data or parts of data blocks from the system. The hash file system taught by Moulton utilizes hash values for computer files or file pieces which are produced by a checksum generating program, engine or algorithm. The hash file system as taught by Moulton is able to be used as a network accelerator by sending hashes for the data instead of the data itself
- Accelerating data transfers is described herein. When a second computing system is requested to transfer a file to a first computing system, a data segment is sent to the first computing system instead of the entire file. The data segment is then compared to data stored within a data store on the first computing system. If the data segment and data within the data store match, then the file does not need to be transferred, and a pointer points to the file already located on the first computing system. If the data segment does not match any data stored in the data store, then the file is transferred from the second computing system to the first computing system. By comparing only the data segment instead of sending an entire file, data transfer is able to be greatly expedited in situations where the data is common between systems.
- In one aspect, a method of accelerating data transfer comprises storing data in a data store on a first computing system wherein the data corresponds to one or more files stored on the first computing system, transferring a data segment from a source file from a second computing system to the first computing system over a network, scanning the data store for the data segment, generating one or more pointers to the one or more corresponding files of one or more matching data segments, if the one or more matching data segments are identified in the data store and transferring a copy of the source file, if the one or more matching data segments are not identified in the data store. The data store is a database. The first computing system is a target system and the second computing system is a source system. The first computing system is a server and the second computing system is a client system. The client system is selected from the group consisting of a personal computer, a PDA, a cell phone, a laptop, a thin client, a Mac computer, an mp3 player and a gaming console. Alternatively, the first computing system is a first client system and the second computing system is a second client system. The data segment is one or more cyclic redundancy checks and the data in the data store includes cyclic redundancy checks and the data segment and the data are compared. Alternatively, the data segment is a unique database key and the data in the data store includes database keys and the data segment and the data are compared. Alternatively, the data segment is a hash and the data in the data store includes hashes and the data segment and the data are compared. The data store grows as more files are stored on the first computing system. The files stored on the first computing system are minimized by implementing the data store. One or more additional computing systems are coupled to the first computing system. The method further comprises transferring only a first section of the source file when only a second section of the source file is found within the data store. A standard operating system and file system are utilized on the first computing system and the second computing system.
- In another aspect, a system for accelerating data transfer comprises a first computing system for storing one or more files and a data store for storing data corresponding to the one or more files and a second computing system coupled to the first computing system, wherein a data segment is compared to the data within the data store on the first computing system after being received from the second computing system, further wherein a pointer to the one or more files is added on the first computing system if the data segment is found within the data store, but a copy of a source file corresponding to the data segment is transferred from the second computing system to the first computing system if the data segment is not found in the data store. The data store is a database. The first computing system is a target system and the second computing system is a source system. The first computing system is a server and the second computing system is a client system. The client system is selected from the group consisting of a personal computer, a PDA, a cell phone, a laptop, a thin client, a Mac computer, an mp3 player and a gaming console. Alternatively, the first computing system is a first client system and the second computing system is a second client system. The data segment is one or more cyclic redundancy checks and the data in the data store includes cyclic redundancy checks and the data segment and the data are compared. Alternatively, the data segment is a unique database key and the data in the data store includes database keys and the data segment and the data are compared. Alternatively, the data segment is a hash and the data in the data store includes hashes and the data segment and the data are compared. The data store grows as more files are stored on the first computing system. The files stored on the first computing system are minimized by implementing the data store. The system further comprises one or more additional computing systems coupled to the first computing system. Only a first section of the source file is transferred when only a second section of the source file is found within the data store. A standard operating system and file system are utilized on the first computing system and the second computing system. The system further comprises a network coupling the first computing system and the second computing system.
- In another aspect, a network of systems for accelerating data transfers comprises one or more source systems for transferring a data segment corresponding to a source file stored on the one or more source systems, one or more target systems coupled to the one or more source systems for storing data in a data store corresponding to one or more files and for comparing the data segment received from the one or more source systems with the data in the data store where if the data segment is found, a pointer is generated to point to a corresponding file in the one or more files on the target system instead of transferring the source file over a network. The data store is a database. The one or more target systems are one or more servers and the one or more source systems are one or more client systems. The one or more client systems are selected from the group consisting of personal computers, PDAs, cell phones, laptops, thin clients, Mac computers, mp3 players and gaining consoles. The data segment is one or more cyclic redundancy checks and the data in the data store includes cyclic redundancy checks and the data segment and the data are compared. Alternatively, the data segment is a unique database key and the data in the data store includes database keys and the data segment and the data are compared. Alternatively, the data segment is a hash and the data in the data store includes hashes and the data segment and the data are compared. The data store grows as more files are stored on the one or more target systems. The files stored on the one or more target systems are minimized by implementing the data store. Only a first section of the source file is transferred when only a second section of the source file is found within the data store. A standard operating system and file system are utilized on the one or more target systems and the one or more source systems.
- In yet another aspect, a storage system configured to receive data from a plurality of computing systems comprises one or more files, a set of information corresponding to the one or more files and a data store for storing the set of information, wherein a data segment received from a source system is compared with the set of information stored within the data store and a pointer is generated to point to a corresponding file in the one or more files if the data segment is found but if the data segment is not found within the data store, a copy of a source file corresponding to the data segment is transferred. The data store is a database. The data segment is one or more cyclic redundancy checks and the set of information in the data store includes cyclic redundancy checks and the data segment and the set of information are compared. Alternatively, the data segment is a unique database key and the set of information in the data store includes database keys and the data segment and the set of information are compared. Alternatively, the data segment is a hash and the set of information in the data store includes hashes and the data segment and the set of information are compared. The data store grows as more files are stored on the storage system. The files stored on the storage system are minimized by implementing the data store. Only a first section of the source file is transferred when only a second section of the source file is found within the data store. A standard operating system and file system are utilized on the storage system.
-
FIG. 1 illustrates a graphical representation of a configuration of an embodiment of the present invention. -
FIG. 2 illustrates an exemplary graphical representation of files and directories stored in a target system in an embodiment of the present invention. -
FIG. 3 illustrates a graphical representation of a network of systems configured in the present invention. -
FIG. 4 illustrates a flowchart of an embodiment of the present invention. - A system for and method of accelerating data transfers over a network is described herein. In the past, data was transferred with a minimal check to determine if the data is already located on the destination system. Essentially, a check was made whether a file with the same file name is located in the location of the desired destination. For example, if a user was copying movie.avi from his personal computer to a folder entitled “comedy” on a backup server used for people to store their movies, the server only checks if movie.avi exists in the “comedy” folder. However, there are a number of problems with this. The main one is that the file movie.avi could already be located on the server just in a different folder. It would be a waste of network resources to copy the entire movie.avi file, considering a typical movie file is a few hundred megabytes or possibly gigabytes. Using the present invention, only a data segment is sent from the user's computer to the server, and then the server searches its system and locates the preexisting movie.avi and simply generates a pointer to it. Thus, only a very small amount of data is sent over the network instead of a huge movie file, and each file is only stored a single time on the storage system.
-
FIG. 1 illustrates a graphical representation of a configuration of an embodiment of the present invention. Asource computing system 100 is coupled to atarget computing system 120 through anetwork 110. Both thesource computing system 100 and thetarget computing system 120 are able to be any computing system with the ability to transfer data to another system. Such computing systems include but are not limited to, personal computers, laptops, servers, thin clients, cell phones, PDAs, Mac computers, mp3 players and gaming consoles. Thenetwork 110 is able to be a Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), the Internet, or any other type of network. Although the configuration inFIG. 1 shows the two systems coupled through thenetwork 110, it is possible for thesource computing system 100 and thetarget computing system 120 to be directly coupled to each other. Within thesource computing system 100 are standard computing elements including ahard drive 102 wherefiles 104 are stored on asource file system 106. In some embodiments, thehard drive 102 is not a standard hard disk drive but another type of storage system including, but not limited to, a compact disc, a DVD, an optical drive, a network drive or a Redundant Array of Inexpensive Disks (RAID). When a user desires to transfer a file, asource file 104′ is selected by the user. For example, a file named, movie.avi, is selected to be transferred. However, unlike past implementations of transferring data, the process does not begin by transferring the entire source file 104′. - After the source file 104′ is selected to be transferred, a
data segment 112 of the source file 104′ is sent across thenetwork 110. In an embodiment, thedata segment 112 is a section of the source file 104′. Using the movie.avi example, only a section of the file is sent over the network. In other embodiments, thedata segment 112 is a different representation of the data such as a hash or a sliding Cyclic Redundancy Check (CRC) of the source file 104′. In other embodiments, other similar implementations are used where a representation of the source file 104′ is sent over thenetwork 110 instead of the entire file. Additionally, representations of parts of the source file 104′ are able to be sent. - The
target computing system 120 similarly has standard computing components including ahard drive 122. In some embodiments, thehard drive 122 is not a standard hard disk drive but another type of storage system as described above. Within thehard drive 122 is a standard operating system such as Microsoft.R™ Windows XP and astandard file system 128 such as New Technology File System (NTFS) where one ormore files 124 are stored. In alternate embodiments, the file system is a non-standard file system. Thefile system 128 also contains adata store 126. Thefile system 128 utilizes typical structures such as directories or folders to store thefiles 124. Thedata store 126 is an implementation that is able to storedata 126′ in an organized manner so that it is searchable. In some embodiments, thedata store 126 is a database. Thedata 126′ stored within thedata store 126 corresponds to thefiles 124 stored in thefile system 128. For example, since amovie.avi file 124′ is stored within thehard drive 122, thedata store 126 containsdata 126′ corresponding to movie.avi. Thedata 126′ within thedata store 126 depends on the embodiment implemented wherein some embodiments store segments of files, hashes, CRCs, unique database keys and/or other similar implementations of data representation. - The
data segment 112 sent from thesource computing system 100 is received by thetarget computing system 120. Thetarget computing system 120 then searches within thedata store 126 for a matching data segment. Continuing with the movie.avi example, a matching section of the movie.avi file is searched for within thedata store 126. Since thedata store 126 contains themovie.avi data 126′, a match is found. Hence, the system knows that the movie.avi file already exists on thetarget computing system 120. Thetarget computing system 120, then sends astatus 114 or some form of response to thesource computing system 100 indicating that the file is already located at thetarget computing system 120. In the situation where the source file 104′ is already located at thetarget computing system 120, thesource computing system 100 does not need to send any more data, and thetarget computing system 120 adds a pointer or indicates in some way where the data is located, so that the user copying the data is able to retrieve it later on. If the source file 104′ is not located on thetarget computing system 120, then thestatus 114 sent back indicates as such. At that point, acopy 116 of the source file 104′ is sent from thesource computing system 100 to thetarget computing system 120. Once the new file is received on thetarget computing system 120, it is stored with the rest of thefiles 124 and a representation is stored within thedata store 126, so that in the future when a user wants to copy that same file, thetarget computing system 120 will know that it is there and is able to expedite the data transfer by not having to actually transfer the entire file. -
FIG. 2 illustrates an exemplary graphical representation of files and directories stored in a target system in an embodiment of the present invention. Within the example, two users' directories are shown, Brian and Paul. Within each user's storage area, there are four directories: documents, pictures, music and movies, each for storing files related to their respective category. Files that include just the file name withinFIG. 2 signify that they are the only file containing that data on the system. For example, Brian's Documents directory contains resume.doc and report.doc which, as expected, are specific to his personal information, so there are no copies of that information found elsewhere on the system. This also means that when Brian transferred these files to the target computing system from his source computing system, the entire files were copied. However, there are types of data where duplicates are commonly found such as music and movies. These common files are the ones that are able to improve network data transfers by not actually copying the entire file and instead linking to the appropriate file already located on the target computing system. Files with a box around them with an arrow pointing outward such as DMB1.mp3, DMB2.mp3 and DMB3.mp3 within Brian's Music directory indicate that those files are actually pointers or links to another file on the system. Here, in Paul's Music directory, he also has DMB1.mp3, DMB2.mp3 and DMB3.mp3 amongst other music files. Paul copied his files before Brian, so his copying included transferring all of the file contents over the network. However, when Brian initiated his transfer, the system found Paul's copies using the methods described herein and instead of transferring the entire files, generated a pointer to Paul's files which are denoted by a box with an arrow pointing inward since they are being linked to. Furthermore, from the user's perspective, the files appear the same, even though there are no actual files with music data stored within Brian's Music directory on the system. The process continues as the users transfer files to the system, and when a file is copied determines whose directory includes the actual data and whose directory includes a pointer to data elsewhere on the system. As shown inFIG. 2 , Brian copied Spider-Man.avi and then some time later, Paul did as well. Since Brian made his transfer first, the actual data is stored in his directory. - In some embodiments, the data is not stored in a user's directory, but is stored centrally so that everyone has pointers to the data. This alleviates the issue of one user deleting the file while the other user still wants it to remain. For example if Paul deletes Crash.avi, since the actual movie content is stored in his directory, Brian's pointer would point to nothing if the file is removed from Paul's directory. Using a central storage system where each user points to the central storage, the actual data would not be deleted, just Paul's link to the data, and Brian's link would remain intact. Another embodiment still stores the files in the individual locations, but also keeps track of whom is pointing to the files as well. Therefore, if the user with the actual content deletes it, the file is transferred to another user whose link is pointing to the data. The pointers pointing to the file are reconfigured to point to the data's new location. By transferring the data to another user before the actual data is deleted, this safeguards that the actual data is not lost when other users still want the file.
- The above example is not meant to limit the present invention in any way. Although only two users are described, any number of users are able to store data on a system. Furthermore, the number of directories and the directory names are variable as well. The file types are not restricted to those described in the example either; any file types are able to be used. Also, when the files are linked, the filenames do not have to be the same. Comparisons performed by the methods described herein focus on the content of the data not the filenames. Hence, if a filename is Spider-Man.avi on a target and the source filename is Spiderman.avi, but they have the same content, the system is able to recognize they are the same file. The converse is true as well, that just because two files have the same filename, does not mean they have the same content, so links will not incorrectly point to the wrong data as they will not have the same content.
- By implementing the present invention, not only are data transfers accelerated, but storage requirements are reduced as well. Using the example in
FIG. 2 , there are three music files and two movie files that would have been contained as two separate copies in conventional systems. Assuming the music files are 5 MB and the movie files are 1 GB, that is over 2 GB of data being stored in duplicate. Furthermore, since data on network systems are typically backed up, 4 GB of space is being wasted. Using the present invention, where a few bytes are used to point to the data, over 4 GB of space is saved. Furthermore, since this example only shows two users with a small number of files, the space savings on a large system with thousands of users could be extremely large. -
FIG. 3 illustrates a graphical representation of a network of systems configured in the present invention. As described above, the present invention includes one or more source computing systems and one or more target computing systems. The source computing system is where the data to be transferred is located, and the target computing system is where the data will be stored after the transfer. AlthoughFIG. 1 illustrates one source computing system and one target computing system, a network ofsystems 300 is able to include any number of source and target computing systems.FIG. 3 illustrates the computing systems coupled by anetwork 302. The computing systems include, but are not limited to, aserver 304, apersonal computer 306, aPDA 308, acell phone 310, alaptop 312, athin client 314, aMac computer 316, anmp3 player 318 and agaming console 320. Generally, the target computing systems are servers and the source computing systems are personal computers, PDAs, cell phones, laptops, thin clients, Mac computers, mp3 players and gaming consoles. However, any of the systems are able to be either the source or the target. - As an example, a typical configuration for use at a business includes one or
more servers 304 as the target systems where users are able to back up their data. The employees then utilize one or morepersonal computers 306,PDAs 308,cell phones 310 andlaptops 312 as the sources for the data. As data is backed up onto theserver 304, the accelerated data transfer described herein is utilized. Fewer servers are required because the inefficiencies of duplicated data are resolved. Furthermore, there is less traffic on the network because transfers are much more efficient. Hence, in this setting it is reasonable to have the server be the target computing system and the other systems be the source computing systems. - It is possible though to have the roles of the systems switched or modified. For example, in a home network, a user is able to couple his cell phone, PDA, gaming system and personal computer together where the personal computer is the target system and his cell phone, PDA and gaming system are the source systems.
-
FIG. 4 illustrates a flowchart of an embodiment of the present invention. In thestep 400, data is stored in a data store on a first computing system also referred to as a target computing system. Additionally, files corresponding to the data stored in the data store are also stored on the first computing system. In thestep 402, a data segment is transferred from a second computing system or a source computing system to the first computing system. Generally a user selects a file to be transferred from the second computing system to the first computing system, and the data segment is a part of the file, a hash of the file and/or a CRC of the file. In the step 404, the data segment transferred is compared with the data in the data store. Comparing includes scanning the data store for the data segment and then identifying matching data in the data store. In thestep 406, if a match is found then a pointer is generated to point to the corresponding file or files in thestep 408. However, if a match is not found in thestep 406, then a copy of the source file is transferred from the second computing system to the first computing system. - Although the present invention has been described where a data segment is compared to data, and then a link is generated to point to the entire file corresponding with the data, sections of files are able to be matched as well where the entire file is not the same. For example, sometimes additional data is included at the beginning or end of a music or movie file making the file slightly different from one that has very similar contents. Or, for example, one person has a fifteen second clip of a five minute long video, so the fifteen second clip is contained within the file of the long video. Such sections of data are able to be compared and matched by the present invention using a section of the file or a CRC or hash of a section of the file. In those instances, instead of transferring the entire file across the network because there is some offset or slight difference between the data, the present invention copies the data from the file residing on the target system. The sections of the file that are not already existing on the target system are transferred over the network, and the file is combined to generate the file initially intended to be transferred. In another embodiment, a master file is stored on the target system where the master file contains more data than a smaller file which only contains a portion of the master file. A pointer then points to the correct sections of the master file to represent the smaller file.
- To utilize the present invention a user selects a file or files on a source computing system to be transferred over a network to a target computing system. In some embodiments, a user is not required to initiate the data transfer and the transfer is automated. The target computing system performs the necessary search to determine if any common data is already located on the target computing system. If there is common data, then the file is not transferred or only a portion of the file that is not common is transferred, and a pointer points to the common data. When a user views the data on the target computing system, the appearance is no different whether the file was transferred or is pointed to by a pointer. Furthermore, the present invention is able to be utilized without a specially modified file system.
- In operation, users experience accelerated data transfers, but otherwise do not have to modify their ways of transferring data. After a user initiates the data transfer, the target computing system receives a data segment representing the file on the source computing system. The target computing system then compares the data segment with data stored within a data store by scanning the data store for a match. If a match is found, then the source file is not actually transferred over the network, and a pointer is generated on the target computing system. If the target computing system does not locate matching data, then the source file is transferred over the network. By expediting transfers of common data, network efficiency increases greatly in addition to storage requirements being reduced.
- The present invention has been described in terms of specific embodiments incorporating details to facilitate the understanding of principles of construction and operation of the invention. Such reference herein to specific embodiments and details thereof is not intended to limit the scope of the claims appended hereto. It will be readily apparent to one skilled in the art that other various modifications may be made in the embodiment chosen for illustration without departing from the spirit and scope of the invention as defined by the claims.
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/096,139 US20160224431A1 (en) | 2006-09-22 | 2016-04-11 | Accelerated data transfer using common prior data segments |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/525,729 US9317506B2 (en) | 2006-09-22 | 2006-09-22 | Accelerated data transfer using common prior data segments |
US15/096,139 US20160224431A1 (en) | 2006-09-22 | 2016-04-11 | Accelerated data transfer using common prior data segments |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/525,729 Continuation US9317506B2 (en) | 2006-09-22 | 2006-09-22 | Accelerated data transfer using common prior data segments |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160224431A1 true US20160224431A1 (en) | 2016-08-04 |
Family
ID=39226315
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/525,729 Active 2028-04-04 US9317506B2 (en) | 2006-09-22 | 2006-09-22 | Accelerated data transfer using common prior data segments |
US15/096,139 Abandoned US20160224431A1 (en) | 2006-09-22 | 2016-04-11 | Accelerated data transfer using common prior data segments |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/525,729 Active 2028-04-04 US9317506B2 (en) | 2006-09-22 | 2006-09-22 | Accelerated data transfer using common prior data segments |
Country Status (2)
Country | Link |
---|---|
US (2) | US9317506B2 (en) |
WO (1) | WO2008039386A2 (en) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8812613B2 (en) * | 2004-06-03 | 2014-08-19 | Maxsp Corporation | Virtual application manager |
US9357031B2 (en) | 2004-06-03 | 2016-05-31 | Microsoft Technology Licensing, Llc | Applications as a service |
US7908339B2 (en) * | 2004-06-03 | 2011-03-15 | Maxsp Corporation | Transaction based virtual file system optimized for high-latency network connections |
US7664834B2 (en) * | 2004-07-09 | 2010-02-16 | Maxsp Corporation | Distributed operating system management |
US8234238B2 (en) * | 2005-03-04 | 2012-07-31 | Maxsp Corporation | Computer hardware and software diagnostic and report system |
US8589323B2 (en) | 2005-03-04 | 2013-11-19 | Maxsp Corporation | Computer hardware and software diagnostic and report system incorporating an expert system and agents |
US7624086B2 (en) * | 2005-03-04 | 2009-11-24 | Maxsp Corporation | Pre-install compliance system |
US7512584B2 (en) | 2005-03-04 | 2009-03-31 | Maxsp Corporation | Computer hardware and software diagnostic and report system |
US8898319B2 (en) | 2006-05-24 | 2014-11-25 | Maxsp Corporation | Applications and services as a bundle |
US8811396B2 (en) | 2006-05-24 | 2014-08-19 | Maxsp Corporation | System for and method of securing a network utilizing credentials |
US9317506B2 (en) * | 2006-09-22 | 2016-04-19 | Microsoft Technology Licensing, Llc | Accelerated data transfer using common prior data segments |
US7840514B2 (en) * | 2006-09-22 | 2010-11-23 | Maxsp Corporation | Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure network connection |
US20080077622A1 (en) * | 2006-09-22 | 2008-03-27 | Keith Robert O | Method of and apparatus for managing data utilizing configurable policies and schedules |
US7844686B1 (en) | 2006-12-21 | 2010-11-30 | Maxsp Corporation | Warm standby appliance |
US8423821B1 (en) | 2006-12-21 | 2013-04-16 | Maxsp Corporation | Virtual recovery server |
US9521186B2 (en) | 2007-09-13 | 2016-12-13 | International Business Machines Corporation | Method and system for file transfer over a messaging infrastructure |
US8645515B2 (en) | 2007-10-26 | 2014-02-04 | Maxsp Corporation | Environment manager |
US8307239B1 (en) | 2007-10-26 | 2012-11-06 | Maxsp Corporation | Disaster recovery appliance |
US8175418B1 (en) | 2007-10-26 | 2012-05-08 | Maxsp Corporation | Method of and system for enhanced data storage |
US8751561B2 (en) * | 2008-04-08 | 2014-06-10 | Roderick B. Wideman | Methods and systems for improved throughput performance in a distributed data de-duplication environment |
US8656253B2 (en) * | 2011-06-06 | 2014-02-18 | Cleversafe, Inc. | Storing portions of data in a dispersed storage network |
US8943315B1 (en) | 2011-06-08 | 2015-01-27 | Google Inc. | System and method for controlling the upload of data already accessible to a server |
GB2494437A (en) * | 2011-09-08 | 2013-03-13 | Hogarth Worldwide Ltd | The handling and management of media files |
CN103699575A (en) * | 2013-11-29 | 2014-04-02 | 北京中科模识科技有限公司 | Large-scale catalogue template migrating method based on key features and large-scale catalogue template migrating system based on key features |
US20180352287A1 (en) * | 2017-06-02 | 2018-12-06 | Apple Inc. | Persistent ID for Offline Access to Streamed Media |
US11403260B2 (en) * | 2017-07-18 | 2022-08-02 | Vmware, Inc. | Hash-based data transfer in distributed deduplication storage systems |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5479654A (en) * | 1990-04-26 | 1995-12-26 | Squibb Data Systems, Inc. | Apparatus and method for reconstructing a file from a difference signature and an original file |
US5649196A (en) * | 1993-07-01 | 1997-07-15 | Legent Corporation | System and method for distributed storage management on networked computer systems using binary object identifiers |
US6212525B1 (en) * | 1997-03-07 | 2001-04-03 | Apple Computer, Inc. | Hash-based system and method with primary and secondary hash functions for rapidly identifying the existence and location of an item in a file |
US20020049764A1 (en) * | 1997-09-11 | 2002-04-25 | Puma Technology, Inc., Delaware Corporation | Distributed synchronization of databases |
US20040133634A1 (en) * | 2000-11-02 | 2004-07-08 | Stanley Luke | Switching system |
US20050108538A1 (en) * | 2002-02-01 | 2005-05-19 | Howard Daniel G. | Systems and methods for media authentication |
US20060200736A1 (en) * | 2005-03-02 | 2006-09-07 | Arvato Mobile Gmbh | Method of transmitting digital content of a content supplier to the user of an online content transmission system |
US20070239905A1 (en) * | 2006-03-09 | 2007-10-11 | Banerjee Dwip N | Method and apparatus for efficient determination of memory copy versus registration in direct access environments |
US20080005141A1 (en) * | 2006-06-29 | 2008-01-03 | Ling Zheng | System and method for retrieving and using block fingerprints for data deduplication |
US20080077630A1 (en) * | 2006-09-22 | 2008-03-27 | Keith Robert O | Accelerated data transfer using common prior data segments |
Family Cites Families (238)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4866635A (en) | 1987-10-19 | 1989-09-12 | Carnegie Group Inc. | Domain independent shell for building a diagnostic expert system |
US5204897A (en) | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
US5602990A (en) | 1993-07-23 | 1997-02-11 | Pyramid Technology Corporation | Computer system diagnostic testing using hardware abstraction |
JP3553993B2 (en) | 1993-08-30 | 2004-08-11 | キヤノン株式会社 | Program use contract management method and program execution device |
US5835911A (en) | 1994-02-08 | 1998-11-10 | Fujitsu Limited | Software distribution and maintenance system and method |
US5659743A (en) | 1994-12-05 | 1997-08-19 | Legent Corporation | Method and apparatus for a pattern based spaced management system |
US5675723A (en) | 1995-05-19 | 1997-10-07 | Compaq Computer Corporation | Multi-server fault tolerance using in-band signalling |
US5897635A (en) | 1995-06-07 | 1999-04-27 | International Business Machines Corp. | Single access to common user/application information |
US5802364A (en) | 1996-04-15 | 1998-09-01 | Sun Microsystems, Inc. | Metadevice driver rename/exchange technique for a computer system incorporating a plurality of independent device drivers |
US6049671A (en) | 1996-04-18 | 2000-04-11 | Microsoft Corporation | Method for identifying and obtaining computer software from a network computer |
US5787409A (en) | 1996-05-17 | 1998-07-28 | International Business Machines Corporation | Dynamic monitoring architecture |
US6067582A (en) | 1996-08-13 | 2000-05-23 | Angel Secure Networks, Inc. | System for installing information related to a software application to a remote computer over a network |
US6757729B1 (en) | 1996-10-07 | 2004-06-29 | International Business Machines Corporation | Virtual environment manager for network computers |
US5950010A (en) | 1996-11-25 | 1999-09-07 | J.D. Edwards World Source Co. | System and method for customized application package building and installation |
US6185574B1 (en) | 1996-11-27 | 2001-02-06 | 1Vision, Inc. | Multiple display file directory and file navigation system for a personal computer |
US6012152A (en) | 1996-11-27 | 2000-01-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Software fault management system |
US7587323B2 (en) | 2001-12-14 | 2009-09-08 | At&T Intellectual Property I, L.P. | System and method for developing tailored content |
US5933647A (en) | 1997-01-24 | 1999-08-03 | Cognet Corporation | System and method for software distribution and desktop management in a computer network environment |
US6029196A (en) | 1997-06-18 | 2000-02-22 | Netscape Communications Corporation | Automatic client configuration system |
US6144959A (en) | 1997-08-18 | 2000-11-07 | Novell, Inc. | System and method for managing user accounts in a communication network |
DE19736434C3 (en) | 1997-08-21 | 2002-08-22 | Nokia Mobile Phones Ltd | Methods and devices for recognizing the position of data packets lying in a serial data reception stream |
US6189101B1 (en) | 1997-10-24 | 2001-02-13 | Richard G. Dusenbury, Jr. | Secure network architecture method and apparatus |
US6170065B1 (en) | 1997-11-14 | 2001-01-02 | E-Parcel, Llc | Automatic system for dynamic diagnosis and repair of computer configurations |
EP1036455A1 (en) | 1997-12-04 | 2000-09-20 | BRITISH TELECOMMUNICATIONS public limited company | Communications network |
US5974547A (en) | 1998-03-20 | 1999-10-26 | 3Com Corporation | Technique for reliable network booting of an operating system to a client computer |
US6339826B2 (en) | 1998-05-05 | 2002-01-15 | International Business Machines Corp. | Client-server system for maintaining a user desktop consistent with server application user access permissions |
WO1999060504A1 (en) | 1998-05-15 | 1999-11-25 | Unicast Communications Corporation | A technique for implementing browser-initiated network-distributed advertising and for interstitially displaying an advertisement |
US6735625B1 (en) | 1998-05-29 | 2004-05-11 | Cisco Technology, Inc. | System and method for automatically determining whether a product is compatible with a physical device in a network |
US6366986B1 (en) | 1998-06-30 | 2002-04-02 | Emc Corporation | Method and apparatus for differential backup in a computer storage system |
US20020138640A1 (en) | 1998-07-22 | 2002-09-26 | Uri Raz | Apparatus and method for improving the delivery of software applications and associated data in web-based systems |
US6301612B1 (en) | 1998-08-12 | 2001-10-09 | Microsoft Corporation | Establishing one computer as a replacement for another computer |
US6209089B1 (en) | 1998-08-12 | 2001-03-27 | Microsoft Corporation | Correcting for changed client machine hardware using a server-based operating system |
US6314428B1 (en) | 1998-08-26 | 2001-11-06 | International Business Machines Corporation | Method and apparatus for application management in computer networks |
US6366296B1 (en) | 1998-09-11 | 2002-04-02 | Xerox Corporation | Media browser using multimodal analysis |
US6839759B2 (en) | 1998-10-30 | 2005-01-04 | Science Applications International Corp. | Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information |
US6553375B1 (en) | 1998-11-25 | 2003-04-22 | International Business Machines Corporation | Method and apparatus for server based handheld application and database management |
US6477531B1 (en) | 1998-12-18 | 2002-11-05 | Motive Communications, Inc. | Technical support chain automation with guided self-help capability using active content |
US6459499B1 (en) | 1998-12-22 | 2002-10-01 | Canon Kabushiki Kaisha | Push technology for network scanner |
US6654801B2 (en) | 1999-01-04 | 2003-11-25 | Cisco Technology, Inc. | Remote system administration and seamless service integration of a data communication network management system |
US6633782B1 (en) | 1999-02-22 | 2003-10-14 | Fisher-Rosemount Systems, Inc. | Diagnostic expert in a process control system |
US6356915B1 (en) | 1999-02-22 | 2002-03-12 | Starbase Corp. | Installable file system having virtual file system drive, virtual device driver, and virtual disks |
KR100382851B1 (en) | 1999-03-31 | 2003-05-09 | 인터내셔널 비지네스 머신즈 코포레이션 | A method and apparatus for managing client computers in a distributed data processing system |
US6378035B1 (en) | 1999-04-06 | 2002-04-23 | Microsoft Corporation | Streaming information appliance with buffer read and write synchronization |
US6421777B1 (en) | 1999-04-26 | 2002-07-16 | International Business Machines Corporation | Method and apparatus for managing boot images in a distributed data processing system |
US6536037B1 (en) | 1999-05-27 | 2003-03-18 | Accenture Llp | Identification of redundancies and omissions among components of a web based architecture |
US6721713B1 (en) | 1999-05-27 | 2004-04-13 | Andersen Consulting Llp | Business alliance identification in a web architecture framework |
US6473794B1 (en) | 1999-05-27 | 2002-10-29 | Accenture Llp | System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework |
US8033913B2 (en) | 1999-06-03 | 2011-10-11 | Igt | Gaming machine update and mass storage management |
US6463530B1 (en) | 1999-06-10 | 2002-10-08 | International Business Machines Corporation | Method and apparatus for remotely booting a client computer from a network by emulating remote boot chips |
US6578142B1 (en) | 1999-06-18 | 2003-06-10 | Phoenix Technologies, Ltd. | Method and apparatus for automatically installing and configuring software on a computer |
US6880108B1 (en) | 1999-07-29 | 2005-04-12 | International Business Machines Corporation | Risk assessment methodology for AIX-based computer systems |
US6349137B1 (en) | 1999-08-05 | 2002-02-19 | Rockwell Electronic Commerce Corp. | Apparatus and method for providing support software for an agent workstation of an automatic call distributor |
US6282711B1 (en) | 1999-08-10 | 2001-08-28 | Hewlett-Packard Company | Method for more efficiently installing software components from a remote server source |
US6490677B1 (en) | 1999-09-16 | 2002-12-03 | International Business Machines Corporation | Method and system for automatically configuring the boot process of a computer having multiple bootstrap programs within a network computer system |
JP3330569B2 (en) | 1999-09-28 | 2002-09-30 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Computer control method, computer, and recording medium |
US6556950B1 (en) | 1999-09-30 | 2003-04-29 | Rockwell Automation Technologies, Inc. | Diagnostic method and apparatus for use with enterprise control |
US6751658B1 (en) | 1999-10-18 | 2004-06-15 | Apple Computer, Inc. | Providing a reliable operating system for clients of a net-booted environment |
US6959235B1 (en) | 1999-10-28 | 2005-10-25 | General Electric Company | Diagnosis and repair system and method |
US7003560B1 (en) | 1999-11-03 | 2006-02-21 | Accenture Llp | Data warehouse computing system |
US6449658B1 (en) | 1999-11-18 | 2002-09-10 | Quikcat.Com, Inc. | Method and apparatus for accelerating data through communication networks |
US6606744B1 (en) | 1999-11-22 | 2003-08-12 | Accenture, Llp | Providing collaborative installation management in a network-based supply chain environment |
US6625651B1 (en) | 1999-11-30 | 2003-09-23 | Accenture Llp | On-line transaction control during activation of local telecommunication service |
US6854009B1 (en) | 1999-12-22 | 2005-02-08 | Tacit Networks, Inc. | Networked computer system |
US6728530B1 (en) | 1999-12-28 | 2004-04-27 | Nokia Corporation | Calendar-display apparatus, and associated method, for a mobile terminal |
FR2805108B1 (en) | 2000-02-10 | 2002-04-05 | Bull Cp8 | METHOD FOR REGISTERING A USER ON A DIRECTORY SERVER OF AN INTERNET TYPE NETWORK AND / OR LOCATING A USER ON THIS NETWORK, AND CHIP CARD FOR IMPLEMENTING THE METHOD |
US6885481B1 (en) | 2000-02-11 | 2005-04-26 | Hewlett-Packard Development Company, L.P. | System and method for automatically assigning a filename to a scanned document |
US6704730B2 (en) | 2000-02-18 | 2004-03-09 | Avamar Technologies, Inc. | Hash file system and method for use in a commonality factoring system |
AU2001243443A1 (en) | 2000-03-09 | 2001-09-17 | The Web Access, Inc. | Method and apparatus for performing a research task by interchangeably utilizinga multitude of search methodologies |
US7627694B2 (en) | 2000-03-16 | 2009-12-01 | Silicon Graphics, Inc. | Maintaining process group membership for node clusters in high availability computing systems |
US6625754B1 (en) | 2000-03-16 | 2003-09-23 | International Business Machines Corporation | Automatic recovery of a corrupted boot image in a data processing system |
US7032011B2 (en) | 2000-03-29 | 2006-04-18 | Symantec Corporation | Server based extraction, transfer, storage and processing of remote settings, files and data |
US20020013827A1 (en) | 2000-05-18 | 2002-01-31 | Edstrom Claes G.R. | Personal service environment management apparatus and methods |
US6976066B1 (en) | 2000-05-22 | 2005-12-13 | Microsoft Corporation | Network and method for implementing network platform services for a computing device |
US6654797B1 (en) | 2000-05-25 | 2003-11-25 | International Business Machines Corporation | Apparatus and a methods for server configuration using a removable storage device |
US6816882B1 (en) | 2000-05-31 | 2004-11-09 | International Business Machines Corporation | System and method for automatically negotiating license agreements and installing arbitrary user-specified applications on application service providers |
JP2002056176A (en) | 2000-06-01 | 2002-02-20 | Asgent Inc | Method and device for structuring security policy and method and device for supporting security policy structuring |
US7219304B1 (en) | 2000-06-19 | 2007-05-15 | International Business Machines Corporation | System and method for developing and administering web applications and services from a workflow, enterprise, and mail-enabled web application server and platform |
US6915343B1 (en) | 2000-06-22 | 2005-07-05 | International Business Machines Corporation | System and method of running diagnostic testing programs on a diagnostic adapter card and analyzing the results for diagnosing hardware and software problems on a network computer |
US6941351B2 (en) | 2000-07-11 | 2005-09-06 | Microsoft Corporation | Application program caching |
US6985967B1 (en) | 2000-07-20 | 2006-01-10 | Rlx Technologies, Inc. | Web server network system and method |
US6816462B1 (en) | 2000-08-02 | 2004-11-09 | International Business Machines Corporation | System and method to determine connectivity of a VPN secure tunnel |
US6886020B1 (en) | 2000-08-17 | 2005-04-26 | Emc Corporation | Method and apparatus for storage system metrics management and archive |
US6697852B1 (en) | 2000-08-17 | 2004-02-24 | Siung Ryu | Oneclick installation for client-server application package |
US6871210B1 (en) | 2000-09-05 | 2005-03-22 | International Business Machines Corporation | Automatic allocation of least loaded boot server to PXE client on a network VIA DHCP server |
US6799248B2 (en) | 2000-09-11 | 2004-09-28 | Emc Corporation | Cache management system for a network data node having a cache memory manager for selectively using different cache management methods |
US7178166B1 (en) | 2000-09-19 | 2007-02-13 | Internet Security Systems, Inc. | Vulnerability assessment and authentication of a computer by a local scanner |
US6757894B2 (en) | 2000-09-26 | 2004-06-29 | Appstream, Inc. | Preprocessed applications suitable for network streaming applications and method for producing same |
US7401125B1 (en) | 2000-10-10 | 2008-07-15 | Ricoh Corporation | System, computer program product and method for managing documents |
US20040180721A1 (en) | 2000-12-21 | 2004-09-16 | Igt | Gaming terminal data repository and information distribution system |
US7260597B1 (en) | 2000-11-02 | 2007-08-21 | Sony Corporation | Remote manual, maintenance, and diagnostic services for networked electronic devices |
US20020083183A1 (en) | 2000-11-06 | 2002-06-27 | Sanjay Pujare | Conventionally coded application conversion system for streamed delivery and execution |
US6959320B2 (en) | 2000-11-06 | 2005-10-25 | Endeavors Technology, Inc. | Client-side performance optimization system for streamed applications |
US6918113B2 (en) | 2000-11-06 | 2005-07-12 | Endeavors Technology, Inc. | Client installation and execution system for streamed applications |
US20040236843A1 (en) | 2001-11-15 | 2004-11-25 | Robert Wing | Online diagnosing of computer hardware and software |
WO2002044892A2 (en) | 2000-11-28 | 2002-06-06 | 4Thpass Inc. | Method and system for maintaining and distributing wireless applications |
US6920615B1 (en) | 2000-11-29 | 2005-07-19 | Verizon Corporate Services Group Inc. | Method and system for service-enablement gateway and its service portal |
CA2327159C (en) | 2000-11-30 | 2008-10-07 | Ibm Canada Limited-Ibm Canada Limitee | System and method for dynamically displaying html form elements |
US7024471B2 (en) | 2000-12-12 | 2006-04-04 | International Business Machines Corporation | Mechanism to dynamically update a windows system with user specific application enablement support from a heterogeneous server environment |
US6898286B2 (en) | 2000-12-19 | 2005-05-24 | International Business Machines Corporation | Method and system verifying product licenses using hardware and product identifications |
US7003663B2 (en) | 2000-12-22 | 2006-02-21 | Gemplus | Distribution of deployment information for remote applications |
US20020087625A1 (en) | 2001-01-04 | 2002-07-04 | Kim Toll | Sharing user profiles between processor-based systems |
JP2002358245A (en) | 2001-06-01 | 2002-12-13 | Toshiba It Solution Corp | Backup system, backup method, program for backup, backup service providing system |
US20020094868A1 (en) | 2001-01-16 | 2002-07-18 | Alma Tuck | Methods for interactive internet advertising, apparatuses and systems including same |
US6718464B2 (en) | 2001-01-23 | 2004-04-06 | International Business Machines Corporation | Method and system for customizing a client computer system configuration for a current user using BIOS settings downloaded from a server |
US6704886B1 (en) | 2001-01-25 | 2004-03-09 | Emc Corporation | Data backup system having independent data restore execution |
US7136912B2 (en) | 2001-02-08 | 2006-11-14 | Solid Information Technology Oy | Method and system for data management |
US7298734B2 (en) | 2001-03-05 | 2007-11-20 | Qwest Communications International, Inc. | Method and system communication system message processing based on classification criteria |
US8244864B1 (en) | 2001-03-20 | 2012-08-14 | Microsoft Corporation | Transparent migration of TCP based connections within a network load balancing system |
US7363374B2 (en) | 2001-04-27 | 2008-04-22 | International Business Machines Corporation | Method and system for fault-tolerant remote boot in the presence of boot server overload/failure with self-throttling boot servers |
US20030078960A1 (en) | 2001-04-30 | 2003-04-24 | Murren Brian T. | Architecture and process for creating software applications for multiple domains |
GB0112781D0 (en) | 2001-05-25 | 2001-07-18 | Global Continuity Plc | Method for rapid recovery from a network file server failure |
US20020188941A1 (en) | 2001-06-12 | 2002-12-12 | International Business Machines Corporation | Efficient installation of software packages |
US7320011B2 (en) | 2001-06-15 | 2008-01-15 | Nokia Corporation | Selecting data for synchronization and for software configuration |
US8126959B2 (en) | 2001-06-28 | 2012-02-28 | International Business Machines Corporation | Method and system for dynamic redistribution of remote computer boot service in a network containing multiple boot servers |
JP2003025698A (en) | 2001-07-13 | 2003-01-29 | Fujitsu Ltd | Electronic unit, and method for judging compatibility of version between the electronic unit and other unit |
US20060240806A1 (en) | 2001-07-18 | 2006-10-26 | Saban Demirbasa | Data security device |
US20030033379A1 (en) | 2001-07-20 | 2003-02-13 | Lemur Networks | Intelligent central directory for soft configuration of IP services |
US7058698B2 (en) | 2001-08-13 | 2006-06-06 | Sun Microsystems, Inc. | Client aware extensible markup language content retrieval and integration in a wireless portal system |
US6978398B2 (en) | 2001-08-15 | 2005-12-20 | International Business Machines Corporation | Method and system for proactively reducing the outage time of a computer system |
US20030037328A1 (en) | 2001-08-15 | 2003-02-20 | International Business Machines Corporation | Extending installation suites to include topology of suite's run-time environment |
US7197550B2 (en) | 2001-08-23 | 2007-03-27 | The Directv Group, Inc. | Automated configuration of a virtual private network |
US7111055B2 (en) | 2001-08-30 | 2006-09-19 | Sun Microsystems, Inc. | Method and apparatus to facilitate automated software installation on remote computers over a network |
US7035944B2 (en) | 2001-09-19 | 2006-04-25 | International Business Machines Corporation | Programmatic management of software resources in a content framework environment |
CA2404602C (en) | 2001-09-21 | 2009-07-14 | Corel Corporation | Web services gateway |
US7237122B2 (en) | 2001-10-19 | 2007-06-26 | Mcafee, Inc. | Method and apparatus to facilitate software installation using embedded user credentials |
US20030140052A1 (en) | 2001-12-18 | 2003-07-24 | Shawn Thomas | Method and system for asset transition quality control |
US8126722B2 (en) | 2001-12-20 | 2012-02-28 | Verizon Business Global Llc | Application infrastructure platform (AIP) |
US20030126242A1 (en) | 2001-12-28 | 2003-07-03 | Chang Albert H. | Network boot system and method using remotely-stored, client-specific boot images created from shared, base snapshot image |
US7287053B2 (en) | 2002-01-15 | 2007-10-23 | International Business Machines Corporation | Ad hoc data sharing in virtual team rooms |
US20040025018A1 (en) | 2002-01-23 | 2004-02-05 | Haas Zygmunt J. | Secure end-to-end communication in mobile ad hoc networks |
US6954930B2 (en) | 2002-02-19 | 2005-10-11 | International Business Machines Corporation | Remote validation of installation input data |
TW541452B (en) | 2002-02-26 | 2003-07-11 | Via Tech Inc | Remote boot-up system and method for multiple terminal equipments |
US7571467B1 (en) | 2002-02-26 | 2009-08-04 | Microsoft Corporation | System and method to package security credentials for later use |
US7175078B2 (en) | 2002-03-13 | 2007-02-13 | Msystems Ltd. | Personal portable storage medium |
US7143307B1 (en) | 2002-03-15 | 2006-11-28 | Network Appliance, Inc. | Remote disaster recovery and data migration using virtual appliance migration |
US7305704B2 (en) | 2002-03-16 | 2007-12-04 | Trustedflow Systems, Inc. | Management of trusted flow system |
US7305671B2 (en) | 2002-03-22 | 2007-12-04 | Sun Microsystems, Inc. | Conversion of an object model to a source file generation model |
JP4061941B2 (en) | 2002-03-27 | 2008-03-19 | セイコーエプソン株式会社 | Service provision support system, bundle management terminal, terminal program, bundle data structure, service provision support method, and bundle generation method |
US6820180B2 (en) | 2002-04-04 | 2004-11-16 | International Business Machines Corporation | Apparatus and method of cascading backup logical volume mirrors |
US20030191730A1 (en) | 2002-04-05 | 2003-10-09 | Compaq Information Technologies Group, L.P. | Unobtrusive rule-based computer usage enhancement system |
US7200779B1 (en) | 2002-04-26 | 2007-04-03 | Advanced Micro Devices, Inc. | Fault notification based on a severity level |
US20030204562A1 (en) | 2002-04-29 | 2003-10-30 | Gwan-Hwan Hwang | System and process for roaming thin clients in a wide area network with transparent working environment |
US7725560B2 (en) | 2002-05-01 | 2010-05-25 | Bea Systems Inc. | Web service-enabled portlet wizard |
US7886031B1 (en) | 2002-06-04 | 2011-02-08 | Symantec Operating Corporation | SAN configuration utility |
US20030233493A1 (en) | 2002-06-15 | 2003-12-18 | Boldon John L. | Firmware installation methods and apparatus |
US7426560B2 (en) | 2002-06-27 | 2008-09-16 | Intel Corporation | Method and system for managing quality of service in a network |
JP4054616B2 (en) | 2002-06-27 | 2008-02-27 | 株式会社日立製作所 | Logical computer system, logical computer system configuration control method, and logical computer system configuration control program |
US20040010716A1 (en) | 2002-07-11 | 2004-01-15 | International Business Machines Corporation | Apparatus and method for monitoring the health of systems management software components in an enterprise |
US7210143B2 (en) | 2002-07-17 | 2007-04-24 | International Business Machines Corporation | Deployment of applications in a multitier compute infrastructure |
US7430616B2 (en) | 2002-09-16 | 2008-09-30 | Clearcube Technology, Inc. | System and method for reducing user-application interactions to archivable form |
US7194445B2 (en) | 2002-09-20 | 2007-03-20 | Lenovo (Singapore) Pte. Ltd. | Adaptive problem determination and recovery in a computer system |
US7107349B2 (en) | 2002-09-30 | 2006-09-12 | Danger, Inc. | System and method for disabling and providing a notification for a data processing device |
CA2406569C (en) | 2002-10-04 | 2011-03-22 | Ibm Canada Limited-Ibm Canada Limitee | Method and apparatus for enabling associated portlets of a web portal to collaborate for synchronized content display |
US20040093492A1 (en) | 2002-11-13 | 2004-05-13 | Olivier Daude | Virtual private network management with certificates |
US7386889B2 (en) | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
US7870241B2 (en) | 2002-11-27 | 2011-01-11 | International Business Machines Corporation | Automated power control policies based on application-specific redundancy characteristics |
US8332464B2 (en) | 2002-12-13 | 2012-12-11 | Anxebusiness Corp. | System and method for remote network access |
US7165087B1 (en) | 2002-12-17 | 2007-01-16 | Hewlett-Packard Development Company, L.P. | System and method for installing and configuring computing agents |
US7353533B2 (en) | 2002-12-18 | 2008-04-01 | Novell, Inc. | Administration of protection of data accessible by a mobile device |
US7912902B2 (en) | 2003-02-13 | 2011-03-22 | Telcordia Licensing Company, Llc | Application service peering and aggregation |
WO2004075598A1 (en) | 2003-02-18 | 2004-09-02 | Roamware, Inc. | Providing multiple msisdn numbers in a mobile device with a single imsi |
US8245032B2 (en) | 2003-03-27 | 2012-08-14 | Avaya Inc. | Method to authenticate packet payloads |
WO2004097566A2 (en) | 2003-04-24 | 2004-11-11 | Secureinfo Corporation | Automated electronic software distribution and management method and system |
US7146563B2 (en) | 2003-05-29 | 2006-12-05 | International Business Machines Corporation | Maintaining screen and form state in portlets |
US7287186B2 (en) | 2003-06-02 | 2007-10-23 | Surgient Inc. | Shared nothing virtual cluster |
WO2005001646A2 (en) | 2003-06-25 | 2005-01-06 | Arkivio, Inc. | Techniques for performing policy automated operations |
US20050060281A1 (en) | 2003-07-31 | 2005-03-17 | Tim Bucher | Rule-based content management system |
US7831693B2 (en) | 2003-08-18 | 2010-11-09 | Oracle America, Inc. | Structured methodology and design patterns for web services |
US7093089B2 (en) | 2003-08-18 | 2006-08-15 | Hewlett-Packard Development Company, Lp. | Systems and methods for storing data on computer systems |
US7546373B2 (en) | 2003-11-14 | 2009-06-09 | Microsoft Corporation | Secure dynamic credential distribution over a network |
US20050108593A1 (en) | 2003-11-14 | 2005-05-19 | Dell Products L.P. | Cluster failover from physical node to virtual node |
US7620667B2 (en) | 2003-11-17 | 2009-11-17 | Microsoft Corporation | Transfer of user profiles using portable storage devices |
US7337311B2 (en) | 2003-11-18 | 2008-02-26 | Giga-Byte Technology Co., Ltd. | Method for controlling upgrade of firmware |
US20050144218A1 (en) | 2003-11-25 | 2005-06-30 | Heintz Timothy J. | Extendible software platform for the construction and deployment of intelligent agents |
US20050149729A1 (en) | 2003-12-24 | 2005-07-07 | Zimmer Vincent J. | Method to support XML-based security and key management services in a pre-boot execution environment |
US7383463B2 (en) | 2004-02-04 | 2008-06-03 | Emc Corporation | Internet protocol based disaster recovery of a server |
US7392046B2 (en) | 2004-02-10 | 2008-06-24 | Microsoft Corporation | Method and apparatus for automatic diagnosis and resolution of wireless network malfunctions |
WO2005078606A2 (en) | 2004-02-11 | 2005-08-25 | Storage Technology Corporation | Clustered hierarchical file services |
US7444633B2 (en) | 2004-03-05 | 2008-10-28 | International Business Machines Corporation | Federating legacy/remote content into a central network console |
US20050216524A1 (en) | 2004-03-23 | 2005-09-29 | Integrated Data Corporation | Smart and selective synchronization between databases in a document management system |
US20050216902A1 (en) | 2004-03-23 | 2005-09-29 | General Motors Corporation | Method and system for vehicle software configuration update management |
US7703142B1 (en) | 2004-05-06 | 2010-04-20 | Sprint Communications Company L.P. | Software license authorization system |
GB0410150D0 (en) | 2004-05-07 | 2004-06-09 | Ibm | Methods,apparatus and computer programs for recovery from failures in a computing environment |
US7523341B2 (en) | 2004-05-13 | 2009-04-21 | International Business Machines Corporation | Methods, apparatus and computer programs for recovery from failures in a computing environment |
US8156489B2 (en) | 2004-05-21 | 2012-04-10 | Computer Associates Think, Inc. | Distributed installation configuration system and method |
US8868858B2 (en) | 2006-05-19 | 2014-10-21 | Inmage Systems, Inc. | Method and apparatus of continuous data backup and access using virtual machines |
US8812613B2 (en) | 2004-06-03 | 2014-08-19 | Maxsp Corporation | Virtual application manager |
US7330997B1 (en) | 2004-06-03 | 2008-02-12 | Gary Odom | Selective reciprocal backup |
US20050273486A1 (en) | 2004-06-03 | 2005-12-08 | Keith Robert O Jr | Virtual distributed file system |
US7908339B2 (en) | 2004-06-03 | 2011-03-15 | Maxsp Corporation | Transaction based virtual file system optimized for high-latency network connections |
US20050283606A1 (en) | 2004-06-22 | 2005-12-22 | Williams Mitchell A | Selecting a boot image |
JP2006011888A (en) | 2004-06-28 | 2006-01-12 | Hitachi Ltd | Remote management system |
US7698487B2 (en) | 2004-06-30 | 2010-04-13 | Intel Corporation | Share resources and increase reliability in a server environment |
US7886345B2 (en) | 2004-07-02 | 2011-02-08 | Emc Corporation | Password-protection module |
US7664834B2 (en) | 2004-07-09 | 2010-02-16 | Maxsp Corporation | Distributed operating system management |
US7669240B2 (en) | 2004-07-22 | 2010-02-23 | International Business Machines Corporation | Apparatus, method and program to detect and control deleterious code (virus) in computer network |
US20060059384A1 (en) | 2004-08-16 | 2006-03-16 | Fabrice Helliker | Full backup from incremental /differential backups |
US8046440B2 (en) | 2004-08-19 | 2011-10-25 | International Business Machines Corporation | Managing resources through user-facing web services aggregated in portals |
JP4437432B2 (en) | 2004-09-30 | 2010-03-24 | 株式会社日立製作所 | Computer system |
US7401192B2 (en) | 2004-10-04 | 2008-07-15 | International Business Machines Corporation | Method of replicating a file using a base, delta, and reference file |
US20060095705A1 (en) | 2004-10-30 | 2006-05-04 | James Wichelman | Systems and methods for data storage management |
US20060106896A1 (en) | 2004-11-12 | 2006-05-18 | International Business Machines Corporation | System and method for creating list of backup files based upon program properties |
US7797698B2 (en) | 2004-11-17 | 2010-09-14 | International Business Machines Corporation | Method and apparatus for dynamic middleware assembly |
US20060129459A1 (en) | 2004-11-22 | 2006-06-15 | Mendelsohn Mark P | Method and system for the secure distribution of software via a communications network |
GB2420672B (en) | 2004-11-22 | 2007-04-18 | Motorola Inc | Method and apparatus for accessing a service |
US20060143709A1 (en) | 2004-12-27 | 2006-06-29 | Raytheon Company | Network intrusion prevention |
US7412595B2 (en) | 2004-12-30 | 2008-08-12 | Intel Corporation | Customization of electronic devices via pre-boot space |
US7778976B2 (en) | 2005-02-07 | 2010-08-17 | Mimosa, Inc. | Multi-dimensional surrogates for data management |
US8161318B2 (en) | 2005-02-07 | 2012-04-17 | Mimosa Systems, Inc. | Enterprise service availability through identity preservation |
US8234238B2 (en) | 2005-03-04 | 2012-07-31 | Maxsp Corporation | Computer hardware and software diagnostic and report system |
US7624086B2 (en) | 2005-03-04 | 2009-11-24 | Maxsp Corporation | Pre-install compliance system |
US7512584B2 (en) | 2005-03-04 | 2009-03-31 | Maxsp Corporation | Computer hardware and software diagnostic and report system |
US8738760B2 (en) | 2005-04-14 | 2014-05-27 | Verizon Business Global Llc | Method and system for providing automated data retrieval in support of fault isolation in a managed services network |
EP1872522B1 (en) | 2005-04-18 | 2012-12-05 | Research In Motion Limited | System and method for enabling asynchronous push-based applications on a wireless device |
US7480822B1 (en) | 2005-07-13 | 2009-01-20 | Symantec Corporation | Recovery and operation of captured running states from multiple computing systems on a single computing system |
US7933987B2 (en) | 2005-09-30 | 2011-04-26 | Lockheed Martin Corporation | Application of virtual servers to high availability and disaster recovery solutions |
US7788303B2 (en) | 2005-10-21 | 2010-08-31 | Isilon Systems, Inc. | Systems and methods for distributed system scanning |
JP4544146B2 (en) | 2005-11-29 | 2010-09-15 | 株式会社日立製作所 | Disaster recovery method |
US8010701B2 (en) | 2005-12-19 | 2011-08-30 | Vmware, Inc. | Method and system for providing virtualized application workspaces |
JP4839841B2 (en) | 2006-01-04 | 2011-12-21 | 株式会社日立製作所 | How to restart snapshot |
US20070185936A1 (en) | 2006-02-07 | 2007-08-09 | Derk David G | Managing deletions in backup sets |
US9754265B2 (en) | 2006-05-01 | 2017-09-05 | At&T Intellectual Property I, L.P. | Systems and methods to automatically activate distribution channels provided by business partners |
US7860825B2 (en) | 2006-05-08 | 2010-12-28 | Palm, Inc. | Method for synchronizing software application and user data for asynchronous client-server and peer to peer computer networks |
US8811396B2 (en) | 2006-05-24 | 2014-08-19 | Maxsp Corporation | System for and method of securing a network utilizing credentials |
US7487383B2 (en) | 2006-06-29 | 2009-02-03 | Dssdr, Llc | Data transfer and recovery process |
US20080034019A1 (en) | 2006-08-04 | 2008-02-07 | Pavel Cisler | System for multi-device electronic backup |
JP2008077288A (en) | 2006-09-20 | 2008-04-03 | Hitachi Ltd | Data backup method and computer system |
US7840514B2 (en) | 2006-09-22 | 2010-11-23 | Maxsp Corporation | Secure virtual private network utilizing a diagnostics policy and diagnostics engine to establish a secure network connection |
US20080077622A1 (en) | 2006-09-22 | 2008-03-27 | Keith Robert O | Method of and apparatus for managing data utilizing configurable policies and schedules |
US7934121B2 (en) | 2006-11-21 | 2011-04-26 | Microsoft Corporation | Transparent replacement of a system processor |
US7844686B1 (en) | 2006-12-21 | 2010-11-30 | Maxsp Corporation | Warm standby appliance |
US8423821B1 (en) | 2006-12-21 | 2013-04-16 | Maxsp Corporation | Virtual recovery server |
US7873805B2 (en) | 2007-02-23 | 2011-01-18 | Lewis, Rice & Fingersh, L.C. | Data recovery systems and methods |
US20080313632A1 (en) | 2007-06-13 | 2008-12-18 | Apurva Kumar | Methods, devices, and products for providing access to system-administration functions of a computer or related resources |
US8175418B1 (en) | 2007-10-26 | 2012-05-08 | Maxsp Corporation | Method of and system for enhanced data storage |
US8307239B1 (en) | 2007-10-26 | 2012-11-06 | Maxsp Corporation | Disaster recovery appliance |
US8131991B2 (en) | 2009-02-10 | 2012-03-06 | Sony Corporation | System and method for configuring plural software profiles |
US8825767B2 (en) | 2010-10-05 | 2014-09-02 | Sivapathalingham Sivavakeesar | Scalable secure wireless interaction enabling methods, system and framework |
-
2006
- 2006-09-22 US US11/525,729 patent/US9317506B2/en active Active
-
2007
- 2007-09-21 WO PCT/US2007/020521 patent/WO2008039386A2/en active Application Filing
-
2016
- 2016-04-11 US US15/096,139 patent/US20160224431A1/en not_active Abandoned
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5479654A (en) * | 1990-04-26 | 1995-12-26 | Squibb Data Systems, Inc. | Apparatus and method for reconstructing a file from a difference signature and an original file |
US5649196A (en) * | 1993-07-01 | 1997-07-15 | Legent Corporation | System and method for distributed storage management on networked computer systems using binary object identifiers |
US6212525B1 (en) * | 1997-03-07 | 2001-04-03 | Apple Computer, Inc. | Hash-based system and method with primary and secondary hash functions for rapidly identifying the existence and location of an item in a file |
US20020049764A1 (en) * | 1997-09-11 | 2002-04-25 | Puma Technology, Inc., Delaware Corporation | Distributed synchronization of databases |
US20040133634A1 (en) * | 2000-11-02 | 2004-07-08 | Stanley Luke | Switching system |
US20050108538A1 (en) * | 2002-02-01 | 2005-05-19 | Howard Daniel G. | Systems and methods for media authentication |
US20060200736A1 (en) * | 2005-03-02 | 2006-09-07 | Arvato Mobile Gmbh | Method of transmitting digital content of a content supplier to the user of an online content transmission system |
US20070239905A1 (en) * | 2006-03-09 | 2007-10-11 | Banerjee Dwip N | Method and apparatus for efficient determination of memory copy versus registration in direct access environments |
US20080005141A1 (en) * | 2006-06-29 | 2008-01-03 | Ling Zheng | System and method for retrieving and using block fingerprints for data deduplication |
US20080077630A1 (en) * | 2006-09-22 | 2008-03-27 | Keith Robert O | Accelerated data transfer using common prior data segments |
Also Published As
Publication number | Publication date |
---|---|
WO2008039386A2 (en) | 2008-04-03 |
US9317506B2 (en) | 2016-04-19 |
WO2008039386A3 (en) | 2008-09-04 |
US20080077630A1 (en) | 2008-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9317506B2 (en) | Accelerated data transfer using common prior data segments | |
US9967298B2 (en) | Appending to files via server-side chunking and manifest manipulation | |
US7640363B2 (en) | Applications for remote differential compression | |
US9183213B2 (en) | Indirection objects in a cloud storage system | |
US9323758B1 (en) | Efficient migration of replicated files from a file server having a file de-duplication facility | |
US10430443B2 (en) | Method for data maintenance | |
US8341117B2 (en) | Method, system, and program for personal data management using content-based replication | |
US8843454B2 (en) | Elimination of duplicate objects in storage clusters | |
US8412685B2 (en) | Method and system for managing data | |
US20060089954A1 (en) | Scalable common access back-up architecture | |
EP1325409B1 (en) | A shared file system having a token-ring style protocol for managing meta-data | |
JP2006338680A (en) | Content addressable information encapsulation, representation and transfer | |
US7584196B2 (en) | Systems and methods for remote storage of electronic data | |
WO2010033962A1 (en) | Log structured content addressable deduplicating storage | |
US9367575B1 (en) | System and method for managing deduplication between applications using dissimilar fingerprint types | |
Yu et al. | Granary: A sharing oriented distributed storage system | |
US8463871B1 (en) | Method and system for data backup with capacity and traffic optimization | |
JP2002318716A (en) | System and method for delivery, server computer and client computer | |
Jung et al. | Minimizing Metadata Size for File Synchronization Using Variable-Length Chunking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NEW CHECKERBOARD CATTLE AND COMPUTER CORPORATION, Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:GOODRICH, JOHN B.;REEL/FRAME:038258/0817 Effective date: 20150624 Owner name: MAXSP CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KEITH, JR., ROBERT O.;REEL/FRAME:038258/0666 Effective date: 20061110 Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MAXSP CORPORATION;REEL/FRAME:038258/0866 Effective date: 20150624 Owner name: GOODRICH, JOHN B., CALIFORNIA Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:MAXSP CORPORATION;REEL/FRAME:038258/0797 Effective date: 20150624 Owner name: MAXSP CORPORATION, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:NEW CHECKERBOARD CATTLE AND COMPUTER CORPORATION;REEL/FRAME:038422/0786 Effective date: 20080922 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |