The disclosures herein relate in general to computer systems, and in particular to a method and system for restoring information from backup storage media.
First and second partial files are read from first and second storage media, respectively, irrespective of a sequence in which the first and second storage media were originally written relative to one another. The first partial file forms a first portion of a complete file. The second partial file forms a second portion of the complete file. The first and second partial files are combined to extract and form the complete file, without dependence on re-reading the first and second storage media.
Accordingly, in the example of
In response to signals from the computer 104, the display device 108 displays visual images, which represent information, and the user 102 views such visual images. Moreover, the user 102 operates the input devices 106 to output information to the computer 104, and the computer 104 receives such information from the input devices 106. Also, in response to signals from the computer 104, the print device 110 prints visual images on paper, and the user 102 views such visual images.
The input devices 106 include, for example, a conventional electronic keyboard (or keypad) and a pointing device, such as a conventional electronic “mouse,” rollerball or light pen. The user 102 operates the keyboard (or keypad) to output alphanumeric text information to the computer 104, which receives such alphanumeric text information. The user 102 operates the pointing device to output cursor-control information to the computer 104, and the computer 104 receives such cursor-control information. The input devices 106 also include, for example, touch-sensitive circuitry of a liquid crystal display (“LCD”) device.
The computer 104 is coupled through a network to various other devices (not shown in
In one embodiment: (a) the computer-readable medium (or apparatus) 114 includes a backup tape storage medium (e.g., magnetic tape for storing digital information); and (b) the computer 104 (and/or such apparatus in response to signals from the computer 104) includes circuitry for writing information to, and reading information from, such backup tape(s). For clarity, in
Vast amounts of active and archived electronic information may exist on backup tape storage media. Conventional methods of restoring such information from large quantities of backup tapes are difficult to implement, cost prohibitive, or both. Restoring such information is especially difficult for companies that have multiple systems with different backup tape environments.
In a first mode of operation, the system 100 restores such information by replicating (and operating in) a native environment with which the backup tapes were originally written (“NE”), so that the system 100: (a) restores such information from the backup tapes; and (b) after restoring such information, writes such information to a target storage device (e.g., the computer-readable medium 112) for storage and further processing (e.g., analysis) by the system 100. Nevertheless, such replication of the NE is challenging if the NE becomes outdated by new technology (e.g., if the NE's hardware or software is lost or malfunctions and is difficult to repair or replace), or if key parameters of the NE become lost.
In a second mode of operation, the system 100 operates with a non-native environment (“NNE”) that is significantly different from the NE, yet the system 100 still: (a) restores such information from the backup tapes; and (b) after restoring such information, writes such information to a target storage device (e.g., the computer-readable medium 112) for storage and further processing (e.g., analysis) by the system 100. In that manner, the system 100 operates with more speed and efficiency, because it operates without replicating the NE. For example, by operating in the NNE, the system 100 restores such information from backup tapes of various NEs, in a manner that achieves more parallel processing.
For operating in the NNE, the system 100 communicates with the backup tapes' hardware and restores information from the backup tapes, according to specified protocols and formats of: (a) such hardware; and (b) other significant aspects of the NE (e.g., specified protocols and formats of the NE's software and information stored therewith). Accordingly, the system 100 is programmed to: (a) read information from the backup tapes; (b) analyze patterns within such information (e.g., sequences, byte signatures, and other identifiers); (c) in response to such analysis, identify such hardware and other significant aspects of the NE; and (d) in response to such identification, read (e.g., from a memory of the system 100) and execute the specified protocols and formats (e.g., metadata formats) for restoring information from the backup tapes.
Frequently, the backup storage media include many tapes that store large amounts of information. A particular file's information may, or may not, be stored at contiguous addresses on one or more tapes. Accordingly, a particular file's location on the tape(s) may be specified by: (a) starting, ending, or intermediate address(es) for the information; (b) potentially starting, ending, or intermediate address(es) for discontinuous portions of the information; or (c) any combination thereof.
The system 100 restores information from the backup storage media, even if: (a) the backup storage media include many tapes that store large amounts of information; and (b) any particular file's information is potentially stored at contiguous addresses on multiple ones of those tapes; and (c) a sequential order of such tapes is unknown. In either of the first or second modes of operation (as selected by the user 102), which are discussed further hereinabove, the system 100 restores information from all such tapes, according to the techniques discussed further hereinbelow in connection with
As shown in
The File 5-A is a partial file, so that it forms a portion of a File 5. However, in this example, either: (a) at least one additional portion of the File 5 is stored by at least one additional tape, which is lost or malfunctioning; or (b) the File 5-A itself has an error, so that it contains insufficient information for completing the File 5 (e.g., insufficient information for linking to another File 5-B on another tape).
As shown in
In response to reading a tape, the system 100: (a) generates and temporarily stores an image of such tape, such as the temporary tape images shown in
Moreover, in response to the temporary tape image of such tape, the system 100 identifies and temporarily stores (in partial images, or “imagettes”) partial files that exist on such tape. For instance, in the example of
After the system 100 stores all imagettes of a complete file, the system 100: (a) executes join & extract instructions (e.g., software instructions) for combining such imagettes to extract and form the complete file; and (b) writes the complete file to the target storage device, so that the target storage device stores such complete file. For instance, in the example of
As discussed hereinabove, with respect to the File 5-A, either: (a) at least one additional portion of the File 5 is stored by at least one additional tape, which is lost or malfunctioning; or (b) the File 5-A itself has an error, so that it contains insufficient information for completing the File 5 (e.g., insufficient information for linking to another File 5-B on another tape). In response to this situation, the system 100 writes the Imagette 3 (of the File 5-A) to the target storage device for storage and further processing (e.g., analysis) by the system 100 to potentially recover information from the Imagette 3.
In the example of
Similarly, in the example of
After forming the complete File 3, the system 100 writes it to the target storage device. Likewise, after forming the complete File 5, the system 100 writes it to the target storage device.
As shown in
In the example of
Similarly, in the example of
After the system 100 stores such imagettes, the system 100 executes the join & extract instructions for: (a) combining the imagette of the partial File 3-A and the imagette of the partial File 3-B to extract and form the complete File 3; (b) combining the imagette of the partial File 5-A and the imagette of the partial File 5-B to extract and form the complete File 5; and (c) combining the imagette of the partial File 8-A, the imagette of the partial File 8-B, and the imagette of the partial File 8-C to extract and form the complete File 8.
After forming the complete File 3, the system 100 writes it to the target storage device. Likewise: (a) after forming the complete File 5, the system 100 writes it to the target storage device; and (b) after forming the complete File 8, the system 100 writes it to the target storage device. The system 100 is operable to perform subsequent operations in response to such File 3, File 5 and File 8 that are stored by the target storage device.
According to the techniques of
In the illustrative embodiment, the system 100 stores the imagettes in a non-native format that is (a) different from a native format in which such imagettes were originally written to the tapes, yet (b) more efficient for subsequent operations of the system 100. In one version of the illustrative embodiment, such non-native format is substantially similar to (yet different from) the native format. In an alternative embodiment, the system 100 stores the imagettes in the native format.
Referring again to
Also, such functional descriptive material is structurally and functionally interrelated to the computer-readable medium 114.
Within such functional descriptive material, data structures define structural and functional interrelationships between such data structures and the computer-readable medium 114 (and other aspects of the computer 104 and the system 100). Such interrelationships permit the data structures' functionality to be realized. Also, within such functional descriptive material, software (also referred to as computer programs or applications) defines structural and functional interrelationships between such software and the computer-readable medium 114 (and other aspects of the computer 104 and the system 100). Such interrelationships permit the software's functionality to be realized.
For example, the computer 104 reads (or accesses, or copies) such functional descriptive material from the computer-readable medium 114 into the memory device of the computer 104, and the computer 104 performs its operations (as described elsewhere herein) in response to such material, which is stored in the memory device of the computer 104. More particularly, the computer 104 performs the operation of processing software (which is stored, encoded, recorded or embodied on a computer-readable medium) for causing the computer 104 to perform additional operations (as described elsewhere herein). Accordingly, such functional descriptive material exhibits a functional interrelationship with the way in which the computer 104 executes its processes and performs its operations.
Further, the computer-readable media of the system 100 are apparatus from which the software is accessible by the computer 104, and the software is processable by the computer 104 for causing the computer 104 to perform such additional operations. In addition to reading such functional descriptive material from the computer-readable medium 114, the computer 104 is capable of reading such functional descriptive material from (or through) a network, which is also a computer-readable medium (or apparatus) of the system 100. Moreover, the memory device of the computer 104 is itself a computer-readable medium (or apparatus) of the system 100.
Although illustrative embodiments have been shown and described, a wide range of modification, change and substitution is contemplated in the foregoing disclosure. In some instances, various features of the embodiments may be used without a corresponding use of other features.
Number | Name | Date | Kind |
---|---|---|---|
4706212 | Toma | Nov 1987 | A |
5107419 | MacPhail | Apr 1992 | A |
5278980 | Pedersen et al. | Jan 1994 | A |
5350303 | Fox et al. | Sep 1994 | A |
5535121 | Roche et al. | Jul 1996 | A |
5535381 | Kopper | Jul 1996 | A |
5617566 | Malcolm | Apr 1997 | A |
5644774 | Fukumochi et al. | Jul 1997 | A |
5687384 | Nagase | Nov 1997 | A |
5689699 | Howell et al. | Nov 1997 | A |
5717913 | Driscoll | Feb 1998 | A |
5732265 | Dewitt et al. | Mar 1998 | A |
5742807 | Masinter | Apr 1998 | A |
5778395 | Whiting et al. | Jul 1998 | A |
5813009 | Johnson et al. | Sep 1998 | A |
5813015 | Pascoe | Sep 1998 | A |
5926811 | Miller et al. | Jul 1999 | A |
5937401 | Hillegas | Aug 1999 | A |
5982370 | Kamper | Nov 1999 | A |
6006221 | Liddy et al. | Dec 1999 | A |
6023710 | Steiner et al. | Feb 2000 | A |
6047294 | Deshayes et al. | Apr 2000 | A |
6125371 | Bohannon et al. | Sep 2000 | A |
6157931 | Cane et al. | Dec 2000 | A |
6182029 | Friedman | Jan 2001 | B1 |
6189002 | Roitblat | Feb 2001 | B1 |
6199067 | Geller | Mar 2001 | B1 |
6199081 | Meyerzon et al. | Mar 2001 | B1 |
6216123 | Robertson et al. | Apr 2001 | B1 |
6226630 | Billmers | May 2001 | B1 |
6226759 | Miller et al. | May 2001 | B1 |
6240409 | Aiken | May 2001 | B1 |
6243713 | Nelson et al. | Jun 2001 | B1 |
6256633 | Dharap | Jul 2001 | B1 |
6269382 | Cabrera et al. | Jul 2001 | B1 |
6278992 | Curtis et al. | Aug 2001 | B1 |
6324548 | Sorenson | Nov 2001 | B1 |
6389403 | Dorak | May 2002 | B1 |
6393389 | Chanod et al. | May 2002 | B1 |
6408266 | Oon | Jun 2002 | B1 |
6421767 | Milillo et al. | Jul 2002 | B1 |
6453280 | Yang | Sep 2002 | B1 |
6477544 | Bolosky et al. | Nov 2002 | B1 |
6493711 | Jeffrey | Dec 2002 | B1 |
6662198 | Satyanarayanan et al. | Dec 2003 | B2 |
6708165 | Jeffrey | Mar 2004 | B2 |
6745197 | McDonald | Jun 2004 | B2 |
6751628 | Coady | Jun 2004 | B2 |
6778979 | Grefenstette et al. | Aug 2004 | B2 |
6810395 | Bharat | Oct 2004 | B1 |
6834110 | Marconcini et al. | Dec 2004 | B1 |
6859800 | Roche et al. | Feb 2005 | B1 |
6915435 | Merriam | Jul 2005 | B1 |
6928526 | Zhu et al. | Aug 2005 | B1 |
6947954 | Cohen et al. | Sep 2005 | B2 |
6952737 | Coates et al. | Oct 2005 | B1 |
6954750 | Bradford | Oct 2005 | B2 |
6996580 | Bae et al. | Feb 2006 | B2 |
7047386 | Ngai et al. | May 2006 | B1 |
7089286 | Malik | Aug 2006 | B1 |
7137065 | Huang et al. | Nov 2006 | B1 |
7146388 | Stakutis et al. | Dec 2006 | B2 |
7158970 | Chang et al. | Jan 2007 | B2 |
7174368 | Ross, Jr. | Feb 2007 | B2 |
7260568 | Zhang et al. | Aug 2007 | B2 |
7269564 | Milsted et al. | Sep 2007 | B1 |
7284191 | Grefenstette et al. | Oct 2007 | B2 |
7287025 | Wen et al. | Oct 2007 | B2 |
7313556 | Gallivan et al. | Dec 2007 | B2 |
7325041 | Hara et al. | Jan 2008 | B2 |
7458082 | Slaughter et al. | Nov 2008 | B1 |
7478113 | De Spiegeleer | Jan 2009 | B1 |
7526478 | Friedman | Apr 2009 | B2 |
7533291 | Lin | May 2009 | B2 |
7650341 | Oratovsky et al. | Jan 2010 | B1 |
7860706 | Abir | Dec 2010 | B2 |
8095516 | Margolus et al. | Jan 2012 | B2 |
20020002468 | Spagna et al. | Jan 2002 | A1 |
20020019814 | Ganesan | Feb 2002 | A1 |
20020038296 | Margolus et al. | Mar 2002 | A1 |
20020059317 | Black et al. | May 2002 | A1 |
20020107803 | Lisanke et al. | Aug 2002 | A1 |
20020107877 | Whiting et al. | Aug 2002 | A1 |
20020116402 | Luke | Aug 2002 | A1 |
20020120925 | Logan | Aug 2002 | A1 |
20020138376 | Hinkle | Sep 2002 | A1 |
20020140960 | Ishikawa | Oct 2002 | A1 |
20020143737 | Seki et al. | Oct 2002 | A1 |
20020143871 | Meyer et al. | Oct 2002 | A1 |
20020147733 | Gold et al. | Oct 2002 | A1 |
20020161745 | Call | Oct 2002 | A1 |
20020178176 | Sekiguchi et al. | Nov 2002 | A1 |
20020193986 | Schirris | Dec 2002 | A1 |
20020194324 | Guha | Dec 2002 | A1 |
20030028889 | McCoskey et al. | Feb 2003 | A1 |
20030069803 | Pollitt | Apr 2003 | A1 |
20030069877 | Grefenstette et al. | Apr 2003 | A1 |
20030093790 | Logan et al. | May 2003 | A1 |
20030105718 | Hurtado et al. | Jun 2003 | A1 |
20030110130 | Pelletier | Jun 2003 | A1 |
20030126247 | Strasser et al. | Jul 2003 | A1 |
20030126362 | Camble et al. | Jul 2003 | A1 |
20030135464 | Mourad et al. | Jul 2003 | A1 |
20030145209 | Eagle et al. | Jul 2003 | A1 |
20030182304 | Summerlin et al. | Sep 2003 | A1 |
20030233455 | Leber et al. | Dec 2003 | A1 |
20040003132 | Stanley et al. | Jan 2004 | A1 |
20040034550 | Menschik et al. | Feb 2004 | A1 |
20040034632 | Carmel et al. | Feb 2004 | A1 |
20040054630 | Ginter et al. | Mar 2004 | A1 |
20040064447 | Simske et al. | Apr 2004 | A1 |
20040064537 | Anderson et al. | Apr 2004 | A1 |
20040068604 | Le et al. | Apr 2004 | A1 |
20040083211 | Bradford | Apr 2004 | A1 |
20040143609 | Gardner et al. | Jul 2004 | A1 |
20040158559 | Poltorak | Aug 2004 | A1 |
20040168058 | Margolus | Aug 2004 | A1 |
20040186827 | Anick et al. | Sep 2004 | A1 |
20040193695 | Salo et al. | Sep 2004 | A1 |
20040205448 | Grefenstette et al. | Oct 2004 | A1 |
20050076293 | Beresnevichiene | Apr 2005 | A1 |
20050097081 | Sellen et al. | May 2005 | A1 |
20050097092 | Annau et al. | May 2005 | A1 |
20050114282 | Todhunter | May 2005 | A1 |
20050114370 | Lewak et al. | May 2005 | A1 |
20050144157 | Moody et al. | Jun 2005 | A1 |
20050160481 | Todd et al. | Jul 2005 | A1 |
20050223067 | Buchheit et al. | Oct 2005 | A1 |
20050234843 | Beckius et al. | Oct 2005 | A1 |
20050283473 | Rousso et al. | Dec 2005 | A1 |
20060026220 | Margolus | Feb 2006 | A1 |
20060122998 | Bar-Yossef et al. | Jun 2006 | A1 |
20060167679 | Tsai et al. | Jul 2006 | A1 |
20060167842 | Watson | Jul 2006 | A1 |
20060173824 | Bensky et al. | Aug 2006 | A1 |
20060230035 | Bailey et al. | Oct 2006 | A1 |
20060265209 | Bradford | Nov 2006 | A1 |
20060271526 | Charnock et al. | Nov 2006 | A1 |
20070011154 | Musgrove et al. | Jan 2007 | A1 |
20070022134 | Zhou et al. | Jan 2007 | A1 |
20070030528 | Quaeler et al. | Feb 2007 | A1 |
20070033177 | Friedman | Feb 2007 | A1 |
20070033183 | Friedman | Feb 2007 | A1 |
20070033410 | Eagle et al. | Feb 2007 | A1 |
20070038616 | Guha | Feb 2007 | A1 |
20070050339 | Kasperski et al. | Mar 2007 | A1 |
20070050351 | Kasperski et al. | Mar 2007 | A1 |
20070061335 | Ramer et al. | Mar 2007 | A1 |
20070088687 | Bromm et al. | Apr 2007 | A1 |
20070192284 | Finley et al. | Aug 2007 | A1 |
20070198470 | Freedman et al. | Aug 2007 | A1 |
20070233692 | Lisa et al. | Oct 2007 | A1 |
20070245108 | Yasaki et al. | Oct 2007 | A1 |
20070253643 | Nagarajan | Nov 2007 | A1 |
20070255686 | Kemp et al. | Nov 2007 | A1 |
20070266009 | Williams | Nov 2007 | A1 |
20070282811 | Musgrove | Dec 2007 | A1 |
20070282826 | Hoeber et al. | Dec 2007 | A1 |
20070288445 | Kraftsow | Dec 2007 | A1 |
20070288450 | Datta et al. | Dec 2007 | A1 |
20080005651 | Grefenstette et al. | Jan 2008 | A1 |
20080059187 | Roitblat et al. | Mar 2008 | A1 |
20080059512 | Roitblat et al. | Mar 2008 | A1 |
20080077570 | Tang et al. | Mar 2008 | A1 |
20080097975 | Guay et al. | Apr 2008 | A1 |
20080104032 | Sarkar | May 2008 | A1 |
20080133570 | Allen et al. | Jun 2008 | A1 |
20080147644 | Aridor et al. | Jun 2008 | A1 |
20080155192 | Iitsuka | Jun 2008 | A1 |
20080162498 | Omoigui | Jul 2008 | A1 |
20080189273 | Kraftsow et al. | Aug 2008 | A1 |
20080195601 | Ntoulas et al. | Aug 2008 | A1 |
20080235202 | Wang et al. | Sep 2008 | A1 |
20080288474 | Chin et al. | Nov 2008 | A1 |
20090024612 | Tang et al. | Jan 2009 | A1 |
20090182737 | Melman | Jul 2009 | A1 |
20090182789 | Sandorfi et al. | Jul 2009 | A1 |
20090287685 | Charnock et al. | Nov 2009 | A1 |
20090313248 | Balachandran et al. | Dec 2009 | A1 |
20090327625 | Jaquette et al. | Dec 2009 | A1 |
Number | Date | Country |
---|---|---|
1967972 | Sep 2008 | EP |
2003303194 | Oct 2003 | JP |
2004213237 | Jul 2004 | JP |
WO 03019412 | Mar 2003 | WO |
WO 2008080140 | Jul 2008 | WO |
Entry |
---|
Amati, G. et al.; “Probabilistic Models of Information Retreival Based on Measuring the Divergence from Randomness”; ACM Transactions on Information Systems, vol. 20, No. 4. Oct. 2002. |
Attar et al., “Local Feedback in Full-Text Retrieval Systems”, Journal of the ACM (JACM), vol. 24, Issue 3 (Jul. 1977), pp. 397-417, ISSN:0004-5411. |
Cai et al., “Automatic Query Expansion Based on Directed Divergence”, Proceedings of the International Conference on Information Technology: Coding and Computing, p. 8, 2002, ISBN:0-7695-1506-1. |
Cohen, E. et al.; “Processing Top k Queries from Samples”; ACM. |
Conlon, S., “Automatic Web Searching and Categorizing Using Query Expansion and Focusing”, (Mississippi University.), 6p, Jan. 2003. |
Crestani, F. et al.; “Is This Document Relevant? . . . Probably”: A Survey of Probabilistic Models in Information Retrieval; ACM Computing Surveys vol. 30, No. 4, Dec. 1998. |
E. M. Voorhees, “Query expansion using lexical-semantic relations”, Annual ACM Conference on Research and Development in Information Retrieval, Proceedings of the 17th annual international ACM SIGIR conference on Research and development in information retrieval, 1994, Dublin, Ireland, Aug. 1994, pp. 61-69, ISBN:0-387-1988-X. |
Gauch et al., “A Corpus Analysis Approach for Automatic Query Expansion and Its Extension to Multiple Databases” ACM Transactions on Information Systems, vol. 17, No. 3, Jul. 1999, pp. 250-269. |
Gehler, P. et al.; “The Rate Adapting Poisson Model for Information Retrieval and Object Recognition”; Proceedings of the 23rd International Conference on Machine Learning, 2006. |
http://www.googleguide.com/tools.html <retrieved on Jul. 8, 2009>. |
http://www.lexisnexis.com/toolbar/help/using.htm#HighlightAndClick <retrieved on Jul. 8, 2009>. |
Ilyas, I. et al.; “Adaptive Rank-Aware Query Optimization in Relational Databases”; ACM Transactions on Database Systems; vol. 31. No. 4, Dec. 2006. |
Luk, R. et al.; “A Comparison of Chinese Document Indexing Strategies and Retrieval Models”; ACM Transactions on Asian Language Information Processing, vol. 1, No. 3, Sep. 2002. |
Margulis, E.; “Modelling Documents with Multiple Poisson Distributions”; Information Processing & Management vol. 29, No. 2, 1993. |
Margulis, E.; “N-Poisson Document Modelling”; SIGIR '92. |
Mei, Q. et al.; “A Study of Poisson Query Generation Model for Information Retrieval”; SIGIR '07 Proceedings, Session 12: Formal Models. |
Mitra et al., “Improving Automatic Query Expansion”, Annual ACM Conference on Research and Development in Information Retrieval, Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval, Melbourne, Australia, pp. 206-214, Year of Publication: 1998, ISBN:1-58113-015-5. |
Ozmutlu, H. et al.; “Analysis of large data logs: an application of Poisson sampling on excite web queries”; Information Processing and Management, vol. 38, 2002. |
Robertson, S. et al.; “Some Simple Effective Approximations to the 2-Poisson Model for Probabilistic Weighted Retreival”; Centre for Interactive Systems Research, London. |
Roelleke, T.; “A Frequency-based and a Poisson-based Definition of the Probability of Being Informative”; SIGIR '03. |
Tao, Y. et al.; “Indexing Multi-Dimensional Uncertain Data with Arbitrary Probability Density Functions”; Proceedings of the 31st VLDB Conference, Norway 2005. |
Volkmer et al., “Exploring Automatic Query Refinement for Text-Based Video Retrieval”, IEEE International Conference on Multimedia and Expo, Jul. 9-12, 2006, pp. 765-768, Toronto, Ont., ISBN: 1-4244-0366-7. |
Xu et al., “Query expansion using local and global document analysis,” in Proc. of ACM-SIGIR 1996, Zurich, Switzerland, Aug. 18-22, 1996, pp. 4-11. |
Yan, T. et al.; “The SIFT Information Dissemination System”; ACM Transactions on Database Systems, vol. 24, No. 4, Dec. 1999. |
Zakariah, R. et al.; “Detecting Junk Mails by Implementing Statistical Theory”; IEEE Proceedings of the 20th International Conference on Advanced Information Networking and Applications, 2006. |
Roitblat, Herbert L. (2004), “Electronic Data Are Increasingly Important to Successful Litigation”, Trends in Electronic Data. |
Roitblat, Herbert L. (2005), “Document Retrieval”, DolphinSearch, Inc. |
“The Sedona Principles: Best Practices Recommendations & Principles for Addressing Electronic Document Production,” The Sedona Conference Working Group Series, Jul. 2005 Version. |
Meng, W., et al., “Building Efficient and Effective Metasearch Engines,” ACM Computing Surveys, ACM, New York, NY, US, US, vol. 34, No. 1, Mar. 1, 2002, pp. 48-89. |
Comparing IBM Tivoli Storage Manager and VERITAS NetBackup in Real-World Environments. A summary by IBM of the whitepaper and benchmark written by Progressive Strategies, Nov. 8, 2002. |
Beyond Backup Toward Storage Management by M. Kaczmarski, T. Jiang and D.A. Pease. IBM Systems Journal, vol. 42, pp. 322-337, Nov. 2, 2003. |
PCT Search Report and Written Opinion dated Jun. 18, 2008, PCT/US07/13483. |
PCT Search Report and Written Opinion dated May 8, 2009, PCT/US2009/032990. |
Mosher, Sue, “Outlook Tips and Techniques,” Windows IT Pro, Feb. 12, 2001. |
International Search Report and Written Opinion from PCT/US2010/060899 dated Mar. 3, 2011. |
International Search Report and Written Opinion from PCT/US2010/059775 dated Mar. 16, 2011. |
International Search Report and Written Opinion from PCT/US11/22472 dated Mar. 30, 2011. |
International Search Report and Written Opinion from PCT/US11/26924 dated Apr. 29, 2011. |