Jeremy Dean Swift - Plymouth MN, US Stephan Kurt Gipp - Inver Grove Heights MN, US Adonijah Park - Forest Lake MN, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 15/16
US Classification:
709232, 709233, 709240, 709241, 370389, 370432
Abstract:
A method and apparatus for routing a data stream through a plurality of data movers independent of a network interface type is provided. In one embodiment, the method for routing the data stream to a destination with indifference to network interface type includes segregating the data stream into a plurality of data blocks at an application layer, wherein the plurality of data blocks are to be routed to a destination through the plurality of data movers and coordinating data path selection for communicating the plurality of data blocks to the plurality of data movers over a plurality of data paths.
Backup System Including A Privately Accessible Primary Backup Server And A Publicly Accessible Alternate Backup Server
A system and method for backing up data from a client computer system are described. The system may include the client computer system, a primary backup server computer system, and an alternate backup server computer system. The primary backup server computer system may be privately accessible to the client computer system via a virtual private network (VPN). The alternate backup server computer system may be accessible to the client computer system via a public or open network such as the Internet. The client computer system may be configured to backup a first set of data to the alternate backup server computer system at a particular time via the Internet in response to determining that the client computer system is not connected to the VPN at the particular time.
Controlling Resource Allocation For Backup Operations
Stephan Gipp - Inver Grove Heights MN, US Jeremy Swift - Plymouth MN, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 17/30
US Classification:
707654
Abstract:
Various embodiments of a computer system and methods are disclosed. In one embodiment, a computer system includes a backup application coupled to interconnected storage resources. The backup application creates a database of storage resources, wherein each database entry corresponds to one or more storage resources and is associated with one or more user-defined attributes describing the suitability of the associated resources for a backup operation. The backup application creates and stores a configuration of storage resources for a backup operation. Each storage resource is selected based on a value of an associated attribute. The storage resources may include logical unit numbers (LUNs), mount points providing access to LUNs, and hosts having physical access or network access through other hosts to mount points. An attribute specifies that the associated storage resources are either required or preferred for a backup operation. The database and configuration are created at backup application run time.
Backup System Including A Primary Backup Server Accessible Via A Vpn And An Alternate Backup Server Accessible Via The Internet
A system and method for backing up data from a client computer system are described. The system may include the client computer system, a primary backup server computer system, and an alternate backup server computer system. The primary backup server computer system may be privately accessible to the client computer system via a virtual private network (VPN). The alternate backup server computer system may be accessible to the client computer system via a public or open network such as the Internet. The client computer system may be configured to backup a first set of data to the alternate backup server computer system at a particular time via the Internet in response to determining that the client computer system is not connected to the VPN at the particular time.
Techniques For Processing Backup Data For Identifying And Handling Content
Techniques for processing backup data for identifying and handling content are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for analyzing data for backup comprising analyzing data to identify target data, identifying target data, and handling the identified target data according to one or more pre-determined conditions.
Jeremy Howard Wartnick - Minnetonka MN, US Jeremy Dean Swift - Plymouth MN, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 15/173
US Classification:
709226
Abstract:
Techniques for network bandwidth management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for network bandwidth management comprising determining, using at least one computer processor, a throughput measurement for a first network client of a plurality of network clients, determining if throughput for the first network client is adequate for a first task based at least on the throughput measurement, in the event throughput is not adequate, negotiating for a different amount of network bandwidth, wherein the negotiation comprises sending a first task priority for the first network client and the throughput measurement to at least one second network client of the plurality of network clients, and receiving an allocation of network bandwidth based on a comparison of the first task priority with at least one second task priority for the at least one second network client.
System And Method For Netbackup Data Decryption In A High Latency Low Bandwidth Environment
Thomas G. Clifford - Edina MN, US Jeremy D. Swift - Plymouth MN, US
International Classification:
H04L 9/00
US Classification:
713150
Abstract:
A system and method for efficient transfer of encrypted data over a low-bandwidth network. A backup server and a client computer are coupled to one another via a first network. The backup server is coupled to a remote data storage via another network, such as the Internet, also referred to as a cloud. The backup server encrypts received data for backup from the client computer. Cryptography segment and sub-segment sizes may be chosen that are aligned on a byte boundary with one another and with selected backup segment and sub-segment sizes used by backup software on the remote data storage. A selected cryptography algorithm has a property of allowing a given protected sub-segment with the cryptography sub-segment size to be decrypted by initially decrypting an immediate prior protected sub-segment that has the same cryptography sub-segment size. Therefore, the size of data transmitted via the cloud may be smaller than the cryptography segment size.
Source Reference Replication In A Data Storage Subsystem
A method of data replication from a first data storage device to a second data storage device. According to the method, prior to replicating data from the first data storage device to the second data storage device, metadata relating to data to be replicated may be transmitted to the second data storage device, the metadata including information about the data to be replicated and a path identifier identifying a path through which the second data storage device can remotely access the data at the first data storage device until the data to be replicated is copied to the second data storage device.
Symantec Apr 2005 - Feb 2011
Senior Principal Software Engineer
Dell Compellent Apr 2005 - Feb 2011
Distinguished Engineer, Chief Architect
Dell Technologies Apr 2005 - Feb 2011
Distinguished Engineer and Chief Architect
Cassatt Corporation Mar 2003 - Mar 2005
Software Engineer
Storagetek Feb 1998 - Feb 2003
Software Engineer
Education:
University of Northwestern - St. Paul 2014 - 2015
Masters, Master of Divinity, Theological Studies
Minnesota State University Moorhead 1992 - 1997
Bachelors, Bachelor of Science, Computer Science
Century High School (Bismarck, North Dakota)
University of Northwestern
Masters, Master of Arts, Theological Studies
Minnesota State University
Skills:
Storage Cloud Computing Distributed Systems Storage Virtualization Unix Software Engineering Linux Deduplication Storage Area Networks Software Development Fibre Channel Storage Area Network Enterprise Storage Data Loss Protection Enterprise Software Embedded Software Project Management Project Planning Team Leadership Cross Functional Team Leadership