VIRTUAL DATA BACKUP
First Claim
1. A computerized method of remotely backing up data associated with a plurality of storage environments, the method comprising:
- receiving, by a first computing device, a storage type associated with at least one second computing device managed by the first computing device, wherein the at least one second computing device is remotely in communication with the first computing device over a network;
configuring, by the first computing device, storage parameters based on the storage type to customize a backup process for the second computing device based on the storage type;
protecting, by the first computing device, data associated with the at least one second computing device using the storage parameters, wherein protecting data associated with the at least one second computing device further comprises;
copying, by the first computing device, at a first point in time a full copy of data associated with the at least one second computing device; and
copying, by the first computing device, changes to the data associated with the at least one second computing device at a set of points in time later than the first point in time, the set of points in time being based on an end-user policy, thereby enabling custom protection of the remote at least one second computing device by the first computing device based on the storage type associated with the at least one second computing device.
8 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed for remotely backing up data associated with a plurality of storage environments. A first computing device receives a storage type associated with a second computing device managed by the first computing device. Storage parameters are configured based on the storage type to customize a backup process for the second computing device based on the storage type. Data associated with the second computing device is protected using the storage parameters, wherein protecting data associated with the second computing device further includes copying at a first point in time a full copy of data associated with the second computing device, and copying changes to the data associated with the second computing device at a set of points in time later than the first point in time, the set of points in time being based on an end-user policy.
9 Citations
20 Claims
-
1. A computerized method of remotely backing up data associated with a plurality of storage environments, the method comprising:
-
receiving, by a first computing device, a storage type associated with at least one second computing device managed by the first computing device, wherein the at least one second computing device is remotely in communication with the first computing device over a network; configuring, by the first computing device, storage parameters based on the storage type to customize a backup process for the second computing device based on the storage type; protecting, by the first computing device, data associated with the at least one second computing device using the storage parameters, wherein protecting data associated with the at least one second computing device further comprises; copying, by the first computing device, at a first point in time a full copy of data associated with the at least one second computing device; and copying, by the first computing device, changes to the data associated with the at least one second computing device at a set of points in time later than the first point in time, the set of points in time being based on an end-user policy, thereby enabling custom protection of the remote at least one second computing device by the first computing device based on the storage type associated with the at least one second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing system for remotely backing up data associated with a plurality of storage environments, the computing system comprising:
-
a processor; and a memory coupled to the processor and including computer-readable instructions that, when executed by the processor, cause the processor to; receive a storage type associated with at least one second computing device managed by the computing system, wherein the at least one second computing device is remotely in communication with the computing system over a network; configure storage parameters based on the storage type to customize a backup process for the second computing device based on the storage type; protect data associated with the at least one second computing device using the storage parameters, wherein protecting data associated with the at least one second computing device further comprises; copying at a first point in time a full copy of data associated with the at least one second computing device; and copying changes to the data associated with the at least one second computing device at a set of points in time later than the first point in time, the set of points in time being based on an end-user policy, thereby enabling custom protection of the remote at least one second computing device by the computing system based on the storage type associated with the at least one second computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium having executable instructions operable to cause an apparatus to:
-
receive a storage type associated with at least one second computing device managed by first computing device, wherein the at least one second computing device is remotely in communication with the first computing device over a network; configure storage parameters based on the storage type to customize a backup process for the second computing device based on the storage type; protect data associated with the at least one second computing device using the storage parameters, wherein protecting data associated with the at least one second computing device further comprises; copying at a first point in time a full copy of data associated with the at least one second computing device; and copying changes to the data associated with the at least one second computing device at a set of points in time later than the first point in time, the set of points in time being based on an end-user policy, thereby enabling custom protection of the remote at least one second computing device by the first computing device based on the storage type associated with the at least one second computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification