Finding and fixing stability problems in personal computer systems
First Claim
1. A method for finding a cause of a stability problem and restoring stability in an unstable computer that is one of a plurality of computers connected to a computer network, at least one of which is designated a system administrator, said method comprising creating a plurality of file content sharing logs for files from said unstable computer and for files from said plurality of computers,wherein each of the file content sharing logs contains a list of files that are unique to the unstable computer, and wherein the file content sharing logs contain a list of files which the plurality of computers share with one another;
- if a notification of an instability in said unstable computer is received in one of the file content sharing logs from the unstable computer, then selecting a candidate file content sharing log to analyze by either choosing a post-instability file content sharing log or if no post-instability file content sharing log is available then by creating a new file content sharing log and using the new file content sharing log as the candidate file content sharing log;
analyzing said candidate file content sharing log for instability of said unstable computer;
generating an instability analysis report comprising a list of unstable files as a result of the analyzing of said candidate file content sharing log; and
performing a backup restore operation on said unstable computer in which at least one file listed in said instability analysis report is restored on said unstable computer, wherein said at least one file listed in said instability analysis report is selected from a de-duplicated backup archive.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for assisting an administrator to identify files suspected of causing instability on a personal computer comprises periodically creating file content sharing logs concurrently with archiving files of a plurality of personal computers by de-duplicating, when a notification is received regarding instability of a personal computer, then analyzing archive file content sharing log of the personal computer made immediately after receiving the notification for unique system and program files, missing files and newly installed files to generate an instability report. A missing or corrupted file can be restored back on the unstable personal computer by performing a backup restore operation on the unstable personal computer.
30 Citations
22 Claims
-
1. A method for finding a cause of a stability problem and restoring stability in an unstable computer that is one of a plurality of computers connected to a computer network, at least one of which is designated a system administrator, said method comprising creating a plurality of file content sharing logs for files from said unstable computer and for files from said plurality of computers,
wherein each of the file content sharing logs contains a list of files that are unique to the unstable computer, and wherein the file content sharing logs contain a list of files which the plurality of computers share with one another; -
if a notification of an instability in said unstable computer is received in one of the file content sharing logs from the unstable computer, then selecting a candidate file content sharing log to analyze by either choosing a post-instability file content sharing log or if no post-instability file content sharing log is available then by creating a new file content sharing log and using the new file content sharing log as the candidate file content sharing log; analyzing said candidate file content sharing log for instability of said unstable computer;
generating an instability analysis report comprising a list of unstable files as a result of the analyzing of said candidate file content sharing log; and
performing a backup restore operation on said unstable computer in which at least one file listed in said instability analysis report is restored on said unstable computer, wherein said at least one file listed in said instability analysis report is selected from a de-duplicated backup archive. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 16, 17, 18, 19, 20, 21, 22)
-
-
9. A computer program product comprising a non-transitory computer readable storage medium including a computer program, wherein the computer program when performed on a stable computer connected to a computer network causes the computer to implement a method of finding a cause of a stability problem and restoring stability in an unstable computer that is connected to the computer network;
- said computer program product including;
computer usable program code for creating a plurality of file content sharing logs for files from said unstable computer and for files from said plurality of computers, wherein each of the file content sharing logs contains a list of files that are unique to the unstable computer, and wherein the file content sharing logs contain a list of files which the plurality of computers share with one another; if a notification of an instability in said unstable computer is received in one of the file content sharing logs from the unstable computer, then selecting a candidate file content sharing log to analyze by either choosing a post-instability file content sharing log or if no post-instability file content sharing log is available then by creating a new file content sharing log and using the new file content sharing log as the candidate file content sharing log; computer usable program code for analyzing said candidate file content sharing log for instability of said unstable computer; computer usable program code for generating an instability analysis report comprising a list of unstable files as a result of the analyzing of said candidate file content sharing log; and computer usable program code for performing a backup restore operation on said unstable computer in which at least one file listed in said instability analysis report is restored on said unstable computer, wherein said at least one file listed in said instability analysis report is selected from a de-duplicated backup archive. - View Dependent Claims (10, 11, 12, 13, 14, 15)
- said computer program product including;
Specification