18148095. SYSTEM AND METHOD TO AUTOMATICALLY TAG FILE SYSTEM ASSETS IN PPDM WITH THE MOST OPTIMAL BACKUP MECHANISM FOR CASES WHERE FILE SYSTEMS ARE MOUNTED ON STORAGE VOLUMES FROM A STORAGE ARRAY simplified abstract (Dell Products L.P.)
Contents
- 1 SYSTEM AND METHOD TO AUTOMATICALLY TAG FILE SYSTEM ASSETS IN PPDM WITH THE MOST OPTIMAL BACKUP MECHANISM FOR CASES WHERE FILE SYSTEMS ARE MOUNTED ON STORAGE VOLUMES FROM A STORAGE ARRAY
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SYSTEM AND METHOD TO AUTOMATICALLY TAG FILE SYSTEM ASSETS IN PPDM WITH THE MOST OPTIMAL BACKUP MECHANISM FOR CASES WHERE FILE SYSTEMS ARE MOUNTED ON STORAGE VOLUMES FROM A STORAGE ARRAY - A simplified explanation of the abstract
- 1.4 Original Abstract Submitted
SYSTEM AND METHOD TO AUTOMATICALLY TAG FILE SYSTEM ASSETS IN PPDM WITH THE MOST OPTIMAL BACKUP MECHANISM FOR CASES WHERE FILE SYSTEMS ARE MOUNTED ON STORAGE VOLUMES FROM A STORAGE ARRAY
Organization Name
Inventor(s)
Jayashree Radha of Bangalore (IN)
SYSTEM AND METHOD TO AUTOMATICALLY TAG FILE SYSTEM ASSETS IN PPDM WITH THE MOST OPTIMAL BACKUP MECHANISM FOR CASES WHERE FILE SYSTEMS ARE MOUNTED ON STORAGE VOLUMES FROM A STORAGE ARRAY - A simplified explanation of the abstract
This abstract first appeared for US patent application 18148095 titled 'SYSTEM AND METHOD TO AUTOMATICALLY TAG FILE SYSTEM ASSETS IN PPDM WITH THE MOST OPTIMAL BACKUP MECHANISM FOR CASES WHERE FILE SYSTEMS ARE MOUNTED ON STORAGE VOLUMES FROM A STORAGE ARRAY
The abstract of the patent application describes a method for protecting data assets by evaluating the configuration of a logical volume group and selecting a data protection mechanism based on the comparison with a storage array configuration.
- Simplified Explanation:
This patent application outlines a method to protect data assets by analyzing the configuration of where the data is stored and selecting an appropriate data protection mechanism based on this evaluation.
- Key Features and Innovation:
- Identification of data assets for protection - Evaluation of logical volume group configuration - Comparison with storage array configuration - Selection of data protection mechanism - Tagging data assets with selected protection mechanism - Backup using selected protection mechanism
- Potential Applications:
- Data security in storage systems - Information protection in cloud computing environments - Secure data backup processes
- Problems Solved:
- Ensuring data protection for valuable assets - Streamlining data backup procedures - Enhancing overall data security measures
- Benefits:
- Improved data asset protection - Efficient data backup processes - Enhanced data security measures
- Commercial Applications:
Title: "Enhanced Data Protection Method for Secure Storage Systems" This technology can be utilized in industries such as finance, healthcare, and technology where data security is paramount. It can also be integrated into cloud storage services to offer enhanced protection for sensitive information.
- Questions about Data Protection Method:
1. How does this method improve data security in storage systems? This method enhances data security by evaluating and selecting the most suitable protection mechanism for data assets, ensuring comprehensive protection against potential threats.
2. What are the potential implications of this technology in cloud computing environments? This technology can significantly enhance data security in cloud computing environments by providing a systematic approach to data protection and backup processes, ultimately safeguarding sensitive information stored in the cloud.
Original Abstract Submitted
One example method includes identifying a data asset for protection, evaluating a configuration of a logical volume group where the data asset is stored, comparing the configuration of the logical volume group with a configuration of a storage array, and based on an outcome of the comparing, selecting a data protection mechanism for the data asset. The data asset may then be tagged with the selected data protection mechanism, and backed up using that selected data protection mechanism.