INTELLIGENT SCHEDULING FOR REMOTE COMPUTERS
First Claim
1. A method for scheduling data storage events in a storage network comprising a portable device communicating over a network with a server, the method comprising:
- configuring at the server, and deploying to the portable device, a data storage policy;
implementing, on the portable device, the data storage policy using an intelligent scheduling agent;
monitoring, on the portable device, at least one threshold event;
determining that the at least one threshold event has occurred;
transmitting a request to the server to implement a data storage event; and
responding, by the server, to the request and implementing the data storage event on the portable device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of protecting data on a mobile computing device using a storage network by deploying to the mobile computing device, a synchronization agent and then associating a synchronization policy with the synchronization agent. The mobile computing device is monitored for at least one threshold event. Its determined that the threshold event has occurred which causes a request to initiate a data synchronization event to be transmitted. The response to the request is synchronizing the mobile computing device with the storage network.
-
Citations
15 Claims
-
1. A method for scheduling data storage events in a storage network comprising a portable device communicating over a network with a server, the method comprising:
-
configuring at the server, and deploying to the portable device, a data storage policy; implementing, on the portable device, the data storage policy using an intelligent scheduling agent; monitoring, on the portable device, at least one threshold event; determining that the at least one threshold event has occurred; transmitting a request to the server to implement a data storage event; and responding, by the server, to the request and implementing the data storage event on the portable device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of protecting data on a mobile computing device using a storage network, the method comprising:
-
deploying to the mobile computing device, a synchronization agent; associating a synchronization policy with the synchronization agent; monitoring, on the mobile computing device, at least one threshold event; determining that the at least one threshold event has occurred; transmitting a request to initiate a data synchronization event; and responding, to the request by synchronizing the mobile computing device with the storage network. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification