Generating a social graph from file metadata
First Claim
1. A method, comprising performing the following operations:
- identifying, in a computing system, an aggregate data set that includes both data used by a first user and data used by a second user;
examining file metadata associated with the data in the aggregate data set and, based on the examination of the file metadata, determining whether or not any data in the aggregate data set is shared by the first and second users;
when a determination is made that some of the data in the aggregate data set is commonly shared by the first user and the second user, deeming a connection to exist between the first user and the second user, and further determining an extent of commonality of data shared by the first user and the second user, and determination of the commonality of the data is based in part on data hashes that were created as part of a data backup process;
determining and assigning a strength value to the connection between the first user and the second user based on the extent of the commonality of the data; and
taking, or causing the taking of, an action to improve an operation of the computing system and/or a configuration of the computing system, when the strength value of the connection between the first user and the second user meets or exceeds a threshold.
7 Assignments
0 Petitions
Accused Products
Abstract
One example method includes identifying, in a computing system, an aggregate data set that includes both data used by a first user and data used by a second user, examining file metadata associated with the data in the aggregate data set and, based on the examination of the file metadata, determining whether or not any data in the aggregate data set is shared by the first and second users. When a determination is made that some data in the data set is shared by the first and second users, the method includes further determining how much of the data is shared, assigning a strength of connection between the first user and the second user based on the extent to which the first user and second user share data and, based on the strength of connection, taking an action to improve operation and/or configuration of the computing system.
1 Citation
20 Claims
-
1. A method, comprising performing the following operations:
-
identifying, in a computing system, an aggregate data set that includes both data used by a first user and data used by a second user; examining file metadata associated with the data in the aggregate data set and, based on the examination of the file metadata, determining whether or not any data in the aggregate data set is shared by the first and second users; when a determination is made that some of the data in the aggregate data set is commonly shared by the first user and the second user, deeming a connection to exist between the first user and the second user, and further determining an extent of commonality of data shared by the first user and the second user, and determination of the commonality of the data is based in part on data hashes that were created as part of a data backup process; determining and assigning a strength value to the connection between the first user and the second user based on the extent of the commonality of the data; and taking, or causing the taking of, an action to improve an operation of the computing system and/or a configuration of the computing system, when the strength value of the connection between the first user and the second user meets or exceeds a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory storage medium having stored therein computer-executable instructions which, when executed by one or more hardware processors, perform the following operations:
-
identifying, in a computing system, an aggregate data set that includes both data used by a first user and data used by a second user; examining file metadata associated with the data in the aggregate data set and, based on the examination of the file metadata, determining whether or not any data in the aggregate data set is shared by the first and second users; when a determination is made that some of the data in the aggregate data set is commonly shared by the first user and the second user, deeming a connection to exist between the first user and the second user, and further determining an extent of commonality of data shared by the first user and the second user, and determination of the commonality of the data is based in part on data hashes that were created as part of a data backup process; determining and assigning a strength value to the connection between the first user and the second user based on the extent of the commonality of the data; and taking, or causing the taking of, an action to improve an operation of the computing system and/or a configuration of the computing system, when the strength value of the connection between the first user and the second user meets or exceeds a threshold. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification