Dell products l.p. (20240345931). INTRA-BACKUP ANOMALOUS OBJECT MANAGEMENT AND POST-BACKUP EXCLUSION RULE CREATION simplified abstract

From WikiPatents
Revision as of 02:16, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

INTRA-BACKUP ANOMALOUS OBJECT MANAGEMENT AND POST-BACKUP EXCLUSION RULE CREATION

Organization Name

dell products l.p.

Inventor(s)

Aaditya Rakesh of Bathinda (IN)

Upanshu Singhal of Bangalore (IN)

Nancy Jain of Bengaluru (IN)

INTRA-BACKUP ANOMALOUS OBJECT MANAGEMENT AND POST-BACKUP EXCLUSION RULE CREATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240345931 titled 'INTRA-BACKUP ANOMALOUS OBJECT MANAGEMENT AND POST-BACKUP EXCLUSION RULE CREATION

Simplified Explanation: The patent application describes a method, computer-readable medium, and system for managing anomalous objects during backups in enterprise IT environments. Anomalous objects can cause backup failures, so the technology identifies and excludes them during the backup process.

  • Objects across assets are assessed against exclusion lists to identify anomalous objects.
  • Anomalous objects are recorded as backup metadata and used to create exclusion rules post-backup.
  • Exclusion rules adjust the backup policies associated with the assets to prevent future backup failures.

Key Features and Innovation:

  • Assessment of objects against exclusion lists during backups.
  • Recording of anomalous objects as backup metadata.
  • Creation of exclusion rules post-backup to adjust backup policies.

Potential Applications: This technology can be applied in various enterprise IT environments to improve backup processes and prevent failures caused by anomalous objects.

Problems Solved: The technology addresses backup failures caused by anomalous objects in enterprise IT environments.

Benefits:

  • Improved backup success rates.
  • Enhanced data protection.
  • Streamlined backup processes.

Commercial Applications: The technology can be utilized by IT companies offering backup solutions to improve the reliability and efficiency of their services.

Prior Art: Readers can explore prior art related to backup management systems and anomaly detection in enterprise IT environments.

Frequently Updated Research: Stay updated on research related to backup management systems, anomaly detection, and data protection in enterprise IT environments.

Questions about Backup Anomalous Object Management: 1. How does the technology identify anomalous objects during the backup process? 2. What are the potential implications of exclusion rules on backup policies in enterprise IT environments?


Original Abstract Submitted

a method, non-transitory computer readable medium, and a system for intra-backup anomalous object management and post-backup exclusion rule creation. enterprise information technology environments often include any number of assets maintaining vast quantities of data and state. any asset, in turn, may be riddled with various anomalous objects that tend to cause backup failure. embodiments described herein address backup failure due to the presence of anomalous objects by, while any number of assets undergo backup, objects across said asset(s) may be assessed against object exclusion lists, populated during a pre-backup stage, to identify any anomalous objects of said objects. once identified, the anomalous object(s) (or metadata descriptive thereof) may be recorded as backup metadata, which may be used in the post-backup creation of one or many exclusion rule(s). the exclusion rule(s) impact, and thus adjust, the backup policy/policies associated with the asset(s) on which the anomalous object(s) had been identified.