Searching and restoring of backups

Information

  • Patent Grant
  • 9454587
  • Patent Number
    9,454,587
  • Date Filed
    Monday, August 25, 2014
    10 years ago
  • Date Issued
    Tuesday, September 27, 2016
    8 years ago
Abstract
Methods, systems, and apparatus, including computer program products, for searching for and presenting backups. A first search result including a first version of an item is presented. The first version is associated with a first date range having a first start date and a first end date. User input requesting that an archive including one or more versions of the item be searched is received. A second search result including a second version of the item is presented. The second version is different from the first version. The second version is associated with a second date range having a second start date and a second end date. The second date range does not overlap with the first date range.
Description
BACKGROUND

The subject matter of this specification relates generally to storing and restoring digital data.


Modern graphical user interfaces allow a large number of graphical objects or items to be displayed on a display screen at the same time. Operating systems, e.g., Apple Mac OS®, provide user interfaces in which a number of graphical user interface windows can be displayed, overlapped, resized, moved, configured, and reformatted according to the needs of a user or a particular application. Taskbars, menus, virtual buttons, and other user interface elements provide mechanisms for accessing and activating windows even when they are hidden behind other windows.


With the sophisticated tools available, users are encouraged not only to create and save a multitude of items in their computers, but to revise or otherwise improve on them over time. For example, a user can work with a certain file and thereafter save the file's current version on a storage device. The next day, however, the user could have had second thoughts about the revisions, or could have come up with new ideas, and therefore opens the file again.


The revision process is usually straightforward if the user wants to add more material to the file or make changes to what is there. But it is typically more difficult for a user who has changed his/her mind about changes that were previously made and wants the file returned to a previous version. Application programs for word processing typically let the user “undo” previous edits of a text, at least up to a predefined number of past revisions. The undo feature also usually is configured so that the previously made revisions must be undone in reverse chronological order; that is, the user must first undo the most recently made edit, then the second-most recent one, and so on. If the user saves and closes the document and thereafter opens the document again, it might not be possible to automatically undo any previous edits.


SUMMARY

In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of presenting a first search result including a first version of an item, the first version associated with a first date range having a first start date and a first end date; receiving user input requesting that an archive including one or more versions of the item be searched; and presenting a second search result including a second version of the item, the second version different from the first version, the second version associated with a second date range having a second start date and a second end date, and where the second date range does not overlap with the first date range. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.


In general, another aspect of the subject matter described in this specification can be embodied in methods that include the actions of associating a first archival copy of an item with a first date range, the first date range having a first starting date and a first ending date; detecting that the item is unchanged with respect to the first archival copy; in response to detecting that the item has not changed, extending the first date range; detecting a modification of the item; and associating a second archival copy of the item with a second date range, the second archival copy including the modification to the item, the second date range having a second starting date and a second ending date. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.


In general, another aspect of the subject matter described in this specification can be embodied in methods that include the actions of presenting a history view including a first search result including a first version of an item, the first version associated with a first date range having a first start date and a first end date; receiving an input in the history view to identify a second version of the item; and presenting a history view including the first search result including the identified second version of the item. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.


Particular embodiments of the subject matter described in this specification can be implemented to realize one or more of the following advantages. An archival copy of a file is associated with a date range during which the corresponding file outside of the archive has not been modified. When a user browses archival copies of the file, the user can jump from one archival copy directly to another archival copy that includes changes to the file relative to the preceding archival copy.


The details of one or more embodiments of the subject matter described in this specification are set forth in the accompanying drawings and the description below. Other features, aspects, and advantages of the subject matter will become apparent from the description, the drawings, and the claims.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of an example system.



FIG. 2 is a block diagram of an example of architecture for backing up, searching, and restoring system information.



FIG. 3 is a screen shot depicting an example of a desktop user interface including a search application.



FIG. 4 is a screen shot depicting an example of a desktop user interface including a first list of options within a search application.



FIG. 5 is a screen shot depicting an example of a desktop user interface including a second list of options within a search application.



FIG. 6 is a screen shot depicting an example of a desktop user interface including several search inputs within a search application.



FIGS. 7A-7C is a screen shot depicting an example of a backup interface including search results within a search application.



FIG. 8 is a screen shot depicting an example of a backup interface including an item timeline associated with search results within a search application.



FIG. 9 is a flow chart of an example of a process for searching and restoring system information.



FIG. 10 is a flow chart of an example of a process for searching for items associated with date ranges.



FIG. 11 is a flow chart of an example of a process for associating archival copies of items with date ranges.





Like reference numbers and designations in the various drawings indicate like elements.


DETAILED DESCRIPTION


FIG. 1 is a block diagram of an example system 100. The system 110 can be used for allowing a user to search a captured version of an interface view, perhaps to initiate a restoration based on the captured version. As used herein, a view refers to an item, element, or other content, capable of being stored and/or retrieved in an interface that can be subjected to a backup operation by a backup component 117. For example, a user interface view can contain any number of icons, files, folders, application state information and/or machine state information, preferences, etc.


The system 100 includes a personal computer 102 communicatively coupled to a remote server 107 using a network interface 116 and a network 108 (e.g., local area network, wireless network, Internet, intranet, etc.). The computer 102 generally includes a processor 103, memory 105, one or more input devices 114 (e.g., keyboard, mouse, etc.) and one or more output devices 115 (e.g., a display device). A user interacts with the system 100 using the input and output devices 114, 115. The system 100 as shown includes various hardware elements. However, the system 100 can include hardware, software, and combinations of the two.


The computer 102 also includes a local storage device 106 and a graphics module 113 (e.g., a graphics card) for storing information and generating graphical objects, respectively. The local storage device 106 can be a computer-readable medium. The computer readable medium can be, for example, a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more them.


While modifications of a user interface view are described herein with respect to a personal computer 102, it should be apparent that the disclosed implementations can be incorporated in, or integrated with, any electronic device that has a user interface, including without limitation, portable and desktop computers, servers, electronics, media players, game devices, mobile phones, email devices, personal digital assistants (PDAs), embedded devices, televisions, other consumer electronic devices, etc.


Systems and methods are provided for searching stored contents that correspond to earlier versions of system information, application information, or system, application, or user interface state. The systems and methods can be stand alone or otherwise integrated into a more comprehensive application. In one implementation, an integrated system and method for modifying a user interface view is disclosed.


Though discussion is made with reference to modifying a interface view (e.g., a user interface view), those of ordinary skill will recognize that such a view can be based on various data structures, files, processes, and other aspects of information management. Thus, a modification to file structures, data and the like is also contemplated in order to achieve the modification to the user interface view. In other words, while the restoration of the user interface view from one state to another can be the most apparent change from the user's perspective, this is accomplished through the corresponding changes in the underlying system content.


One of ordinary skill in the art will recognize that the engines, methods, processes and the like that are described can themselves be an individual process or application, part of an operating system, a plug-in, an application, or the like. In one implementation, the system and methods can be implemented as one or more plug-ins that are installed and run on the personal computer 102. The plug-ins are configured to interact with an operating system (e.g., MAC OS X, WINDOWS XP, LINUX, etc.) and to perform the various functions, as described with below. A system and method for modifying a user interface view can also be implemented as one or more software applications running on the computer 102. Such a system and method can be characterized as a framework or model that can be implemented on various platforms and/or networks (e.g., client/server networks, wireless networks, standalone computers, portable electronic devices, mobile phones, etc.), and/or embedded or bundled with one or more software applications (e.g., email, media player, browser, etc.).


The computer 102 includes the backup component 117 that allows for the storage of versions of the computer's files or other items (e.g., restoring a view including a past state of a file, application, application data, parameters, settings, and the like), for example within the local storage 106 or in an external storage repository. In one implementation, the backup component 117 also allows a user to select any of the stored versions and use the selected version to initiate a restoration of that version in the computer 102.


The computer 102 also includes a search component 118 that allows for searches of the computer's files or other items, for example within the local storage 106 or an external storage repository. In one implementation, the search component 118 can interact with the backup component 117 to perform searches of stored versions of the computer's files and other items. Particularly, in one implementation, the search component 118 allows a user to select search results that have been identified in an earlier version and use the search results to initiate a restoration of that version in the computer 102.



FIG. 2 is a block diagram of an example architecture 200 for backup operations. The architecture 200 can be used to provide backup operations and restoration of backup data including application data (e.g., application files, application data, settings, parameters or the like), associated with a set of applications 228.


In one implementation, the backup component 117 provides back up and restoration capability for the system 100. Many different items or elements can be the subject of a backup operation in the system 100. For example, data elements including folders, files, items, information portions, directories, images, system or application parameters, playlists, address books, e-mails, e-mail folders, a state of an application or state of the system, preferences (e.g., user or system preferences), and the like all can be candidates for inclusion in an archive of backup data during the backup operation. Other types of data can also be included in the backup data for the system 100. In this example, the backup component 117 includes a local storage device 204 and an external storage device 232. Backup data, e.g., particular versions or views resulting from backup operations, can be stored on either or both storage devices. Any number of local and/or external storage devices can be used by the backup component 117 for storing the backup data representing one or more versions of data. In one implementation, no local storage is provided.


In some implementations, for any one element, e.g., item, file, etc., multiple versions can be backed up and stored. In some implementations, for any one element, multiple backup copies can be saved, and any one version of the item, file, element, etc. can be embodied by more than one backup copy (e.g., if the item is backed up periodically and the item remains unchanged over multiple backup intervals).


In one implementation, the backup component 117 runs as a background task on an operating system 230 that is not visible to the user. The backup component 117 can be capable of running across multiple user accounts. In another implementation, the backup component 117 runs within an application in the user space.


The backup component 117 includes an activity monitoring engine 212. In one implementation, the activity monitoring engine 212 monitors for changes within applications (e.g., application files or state) that are targeted for backup operations. A change can include the addition of new files or data (e.g., files or other data structures) or deletion of the same.


In one implementation, the activity monitoring engine 212 is capable of discerning between a substantive change (e.g. the text within a document has been modified) and a non-substantive change (e.g. the play count within an iTunes playlist has been updated, or several changes cancel each other out) through its interaction with the application programs 228. The activity monitoring engine 212 can, for example, create a list of modified elements (e.g., files) to be used when a backup operation is eventually triggered.


In one implementation, the activity monitoring engine 212 can monitor the system for periods of inactivity. The activity monitoring engine 212 can then trigger a backup operation during a period of time in which the backup operation will not cause a system slowdown for an active user.


A preference management engine 214 specifies some operating parameters of the backup component 117. In one implementation, preference management engine 214 contains user-specified and/or system default application parameters for the backup component 117. These can include settings for the details of capturing and storing the views. For example, the preference management engine 214 can determine the frequency of a backup operations, the storage location for the backup data, the types of data elements (e.g., files or other items) that are to be included in the backup operations, and the events which can trigger a backup operation (periodic or event-driven, etc.).


In one implementation, the preference management engine 214 can detect that a new storage device is being added to the system and prompt the user whether it should be included as a backup repository. Files and other items can be scheduled for a backup operation due to location (e.g. everything on the C: drive and within D:/photos), a correlation with specific applications (e.g. all pictures, music, e-mail in an inbox, an address book and system settings), or a combination of strategies. Different types of items can be scheduled to be stored on different devices or on different segments of a storage device during a backup operation. In one implementation, the backup component 117 stores the versions in a format corresponding to a file system structure.


A backup management engine 216 coordinates the collection, storage, and retrieval of data (e.g., views) performed by the backup component 117. For example, the backup management engine 216 can trigger the activity monitoring engine 212 to monitor for activities that satisfy a requirement specified in the preference management engine 214.


A change identifying engine 218 locates specific elements (e.g., monitored files or other items) to determine if the elements have changed. The change identifying engine 218 can be capable of discerning a substantive change from a non-substantive change, similar to the example described above for the activity monitoring engine 212. In one implementation, the change identifying engine 218 traverses a target set of elements (e.g., files or other items), comparing a previous version to the current version to determine whether or not a modification has occurred.


A backup capture engine 220 locates views that are to be included in the backup operation. The view (e.g., of an application, file system, etc.) can include various elements (e.g., files, state, and other application information). The backup capture engine 220 can invoke the activity monitoring engine 212 and/or the change identifying engine 218, for example, to generate a capture list identifying data to include in a next backup operation. The backup capture engine 220 can then store data associated with the listed data in one or more targeted storage repositories. For example, the backup capture engine 220 can store the changed elements in a file system hierarchy that includes references (e.g., links) to unchanged elements. The backup capture engine 220 can track multiple version of each view included in the backup repository.


The backup component 117 includes a backup restoration engine 222 to restore previous versions of views (e.g., files, data, or other items). In one implementation, the backup restoration engine 222 provides a user interface (e.g., a graphical user interface) where a user can select a view or portions of a view (e.g., elements, items, etc.) to be restored.


A backup conflict resolution engine 234 can be configured to resolve a conflict that is presented for a particular restoration. For example, the backup conflict resolution engine 234 can detect that the restoration of a particular item to a previous version thereof would result in some portion of information being lost from the current version of the item. In some implementations, the conflict resolution engine 234 can detect this condition, alert the user about it, present one or more possible actions, and receive the user's selection of how to proceed, to name a few examples.


The search component 118 can search directly within the one or more applications 228 for a current state or version of the element including particular files or other items. In addition, the search component 118 can search earlier versions of the files and other items using the backup component 117. For example, the search component 118 can provide a search interface within a backup interface that allows searches of earlier versions of the files or other items. In addition, the search component 118 can provide a search interface within a desktop user interface that allows searches of the current version of the files or other items. Alternatively, in another implementation, the search interface can be presented within the backup interface. Additionally, the search interface can be a component within a single interface, such as a portion of the backup interface and not a separate interface.


For example, the search component 118 can be used to initiate a search to find a particular item or element, such as an image file. If this search finds the sought item, and if the item meets the user's expectations, there may be no need to do any further searching. However, if the search does not find the sought item, or if the item that is found does not meet the user's expectations, the user can choose to perform a search of historical views. The user can activate the backup interface to search the historical views.


An example of such searching will now be described with reference to FIG. 9. An example process 900 for searching and restoring system information is shown. The process 900 can be performed, for example, by a system such as the system 100 or 200. For clarity of presentation, the description that follows uses the systems 100 and 200 as an example. However, another system, or combination of systems, can be used to perform the process 900.


The system receives (902) a search entry from a user. For example, a user can make a search input using the search component 118. The system searches (904) the current contents based on the search entry. For example, the search component 118 can search data managed by a particular application 228 (e.g., an application that manages the file system). In one implementation, a search application presents a search result to the user from searching the current contents (e.g., a current view). The presented search results can include one or more elements, or items, matching the search entry.


The system searches (906) a backup archive based on the search entry. For example, the search component 118 can use the backup component 117 to access and search historical data (e.g., files, system or application states, or other items). The searching (906) can be performed by default whenever the searching (904) is done. However, in some implementations, the searching (906) is performed upon user initiation. For example, the user can activate the backup component 117 to perform the searching (906).


The system presents (908) results of one or more searches. For example, the search component 118 can present results of a search of the current state of the system 100 within a desktop user interface or results of a search of one or more historical states with a backup interface, or both. For example, in one implementation, one or more history views associated with the current view are presented to the user where each history view includes search results (e.g., visual representations of the search application) based on a search of system data from stored history data e.g., an archive. The search results presented can include one or more items that were not present in the search result provided for the current contents.


In some implementations, both the current contents and the search of the backup archive can always be searched. In certain implementations, the search of the backup archive can be performed automatically upon determining that no results or a non-desired result occurs during the search of the current contents. In certain implementations, the presentation of the results from the current contents search and the backup archive search can occur in separate steps. For example, upon determining that the results of the search of the current contents are not sufficient, a user can initiate a search and presentation of the backup archive.


In some implementations, items in the backup archive are associated with respective date ranges. The date range indicates a time span when the item in the backup archive remained unchanged. For example, if an item in the current contents takes on a particular version and remains unchanged for five days, then a backup version of the item can be associated with a date range spanning the five days. For example, multiple backup operations of the item can occur during that date range. However, with each backup operation the backup component 117 determines that the item is unchanged. A snapshot of the item can be taken during each backup operation, at which time the date range can be updated. As used herein, a snapshot refers to a backup element stored in an archive that includes a backup of selected items or content as specified by the backup component 117. A snapshot can also refer to a view of the current system state with respect to a file, an item, an element, etc.


The date range can be defined by a start date and an end date that specifies when the item became the version associated with the date range and when the item was modified to become a different version. In some implementations, the start date and the end date defining the date range of an item in the backup archive can be included in metadata associated with the item. The association of a date range with an item in the backup archive is described below in relation to FIG. 11.


The date ranges associated with current and backup versions of items can be used during a search of the current system state and the backup archive. An example of searching and presenting current and backup content associated with date ranges will now be described with reference to FIG. 10. An example process 1000 for searching system information associated with date ranges is shown. The process 1000 can be performed, for example, by a system such as the system 100 or 200. For clarity of presentation, the description that follows uses the systems 100 and 200 as an example. However, another system, or combination of systems, can be used to perform the process 1000.


The system presents (1002) a version of an item. For convenience, this presented version of the item will be referred to as version X. In some implementations, the presented version X corresponds to a search result of a search performed in accordance with the process 900. For example, a search of the current state of the system and/or the backup archive can be performed and a version (which can be the current version or a version that is stored in the backup archive) of an item can be presented as a search result in a backup interface. The item can be a file, a data entry (e.g., in an address book or a calendar), or any type of data that can be stored in the system. Version X is associated with a date range defined e.g., to include a start date and an end date. The date range indicates the time span when version X was without any substantive modification (e.g., no user edits that result in a substantive change to the data of a file).


The system receives (1004) user input requesting a search of the archive (and optionally the current system state). The input can be a request to search the archive for other backup versions of the item and/or to search the current system state for the current version of the item. In some implementations, the input is a request to navigate, in a backup interface, between search results corresponding to the current system state and one or more backup versions of the item stored in the archive.


For example, if a search result corresponding to the current state is presented in the backup interface, the user can enter an input (e.g., click on a directional arrow) to navigate to a search result corresponding to a previous version in the backup interface (e.g., corresponding to backup data from an earlier backup operation). Likewise, if the search result corresponding to a backup is presented in the backup interface, the user can enter an input to navigate to a search result corresponding to the current state or to an older or newer backup.


The system searches (1006) the archive and/or the current system state. In some implementations, the search is in response to a user input requesting the search, described above in reference to block 1004. The search component 118 can search data in the current file system and use the backup component 117 to access and search data in a backup archive. The search looks for versions of the item that are different from version X. In some implementations, the search looks for versions of the item whose date ranges are outside of the date range of version X. For example, if version X is associated with a date range of Jan. 1, 2005 to Jan. 5, 2005, then the search looks for versions with date ranges that end before or on Jan. 1, 2005 or that begin on or after Jan. 5, 2005 (e.g., snapshots including the item which were taken before or after the date range).


The system presents (1008) another version of the item. For example, the search component 118 can present results of the search performed in accordance with block 1006 in a backup interface. The version that is presented is different from version X, and is associated with a date range that is outside of the date range of the version displayed in block 1002. For example, if version X, presented in the backup interface in accordance with block 1002, is the current version of the item, the version in the archive immediately preceding version X (which is not necessarily the most recent backup copy, as the current version may have been backed up into the backup archive multiple times) can be identified from the backup archive and presented. Thus, a particular version can be valid over a number of backup operations.


The user can navigate between different distinct versions of the item without having to navigate through all backups of the item. The search through the archive uses the date ranges associated with the versions to identify which backups include a distinct version of the item and which backups include the same version of the item as the preceding backup. Consequently, backup data (e.g., particular snapshots including the item) where the version is the same can be skipped when navigating the backup interface.


An example of associating versions of an item with date ranges will now be described with reference to FIG. 11. An example process 1100 for associating versions of system information with date ranges is shown. The process 1100 can be performed, for example, by a system such as the system 100 or 200. For clarity of presentation, the description that follows uses the systems 100 and 200 as an example. However, another system, or combination of systems, can be used to perform the process 1100.


The system captures and saves (1102) an archival copy of an item. For convenience, this archival copy will be referred to as archival copy A. An archival copy of the item is a backup copy of the item that is captured by the backup capture engine 220 and stored in the archive, for example. The captured and saved archival copy embodies the version of the item that is an unchanged version. In some implantations, the end date is the current date if there is no newer version of the item in the file system. Alternatively, the end date can correspond to the date in which the version was superseded by a new version of the item.


Archival copy A is associated with a date range, defined by a start date and an end date (1104). The start date and end date can be included in metadata associated with archival copy A. In some implementations, the start date of the date range is the date when the version embodied by archival copy A became the current version of the item. For example, the start date can be the date when the version of the item was created (e.g., when the item was created, when the item was modified into the version embodied by the archival copy and saved). In some implementations, the end date is a latest date at which the version embodied by archival copy A is the current version. For example, if archival copy A embodies the current version of the item, then the end date can be the date when archival copy A was captured and saved.


The system detects (1106) that the item is unchanged with respect to archival copy A. In some implementations, the item, in its current version, is compared to archival copy A by the change identifying engine 218. In some implementations, the comparison is performed when another archival copy of the item is to be captured and stored. If the item was not changed substantively since archival copy A, the lack of substantive change is detected by the change identifying engine 218.


The date range associated with archival copy A is extended (1108). In some implementations, the end date of the date range associated with archival copy A is updated to extend the date range. For example, when a new archival copy of an item is captured, and the item has not changed substantively since archival copy A, then the date range of archival copy A is extended (e.g., by changing the end date to the date and time of the new archival copy) to indicate a longer time span during which the version embodied by archival copy A embodies the current version of the item.


The system detects (1110) a modification of the item with respect to the archival copy A. In some implementations, when a new archival copy is captured and saved after the item is changed to a different version, the change identifying engine 218 identifies the change in the item to the new version. For convenience, the new archival copy, embodying a version different from the version embodied by archival copy A, will be referred to as archival copy B.


The system associates (1112) a date range defined by a start date and an end date with archival copy B. The date range associated with archival copy B is different from the date range associated with archival copy A, as archival copy A and archival copy B embody different versions of the item. In some implementations, the start date and the end date of the date range associated with archival copy B is included in metadata associated with archival copy B. The start date of the date range of archival copy B is no earlier than the end date of the date range of archival copy A; the date range during which the version embodied by archival copy B is the current version is later than the date range of the version embodied by archival copy A.



FIG. 3 is a screen shot depicting an example of a desktop user interface 300 including a search application 301. In certain implementations, the search component 118 generates the search application 301. The desktop user interface 300 (also referred to herein as “desktop”) can be a conventional user interface as can be provided by an operating system. The desktop 300 has a background, a menu bar 302, an application launch bar 304, and can include windows, icons, and other elements. The desktop 300 can have multiple applications running, any or all of which can be presented in a separate window.


The search application 301 allows a user to select one or more search controls and search parameters that specify a search for files or items to be presented in a search results area 306. Search location controls 308 allow a user to select a location, for example within the local storage device 204 or the external storage device 232, where the search will be performed, such as a server, the computer 102, a home folder, or another location. Here, a user has selected a “Home” location control 308a, as indicated at the top of the search application 301. In addition, a navigation area 310 allows a user to navigate to a location within the selected search location. A search phrase control 312 allows a user to input a search phrase to be included in the search. For example, the search application 301 can identify any titles, content, or metadata that contains the search phrase. Search application 301 is only one example search application. In other implementations, other search applications can be used.


The search application 301 allows a user to tailor the search by selecting add controls 314. Here, the search application 301 currently includes two search controls 316a-b. The search controls 316a-b each include a first search parameter 318a-b, respectively, and a second search parameter 320a-b, respectively. Examples of these search controls will be described below.


In some implementations, the backup component 117 generates a backup interface that can be used for viewing earlier versions of a view that have been included in one or more backup operation (e.g., as stored in an archive), and optionally also for restoring a selected portion of the earlier version of a view. The backup interface can be activated to backup or restore content (e.g., media) or data associated with an application or the system. In one implementation, the user can activate the backup interface from the desktop using a user-selectable backup icon 326 in the application launch bar 304. As another example, a user can activate the backup interface from the menu bar 302. The menu bar 302 can include a backup options menu in addition to the activation selection. The backup options menu can include selections allowing a user to specify data to include in particular backup operations. In other implementations, the user can choose to enter the backup interface directly from an operating system applications menu. In some implementations, the backup component can provide several icons or menus available in other locations within the desktop 300 or running applications, thereby providing several options for activating or otherwise initiating the backup interface.



FIG. 4 is a screen shot depicting an example of the desktop user interface 300 that presents a list 402 including search parameters for the search application 301. The list 402 shows the possible values for the first search parameter within a search control, in this example the search control 316a.


In this example, the list 402 includes the values “Kind,” “Last Opened,” “Last Modified,” “Created,” “Keywords,” “Color Label,” “Name,” “Contents,” “Size,” and “Other.” “Kind” allows a user to input a type of items for which to search. “Last opened,” “Last Modified,” and “Created” allow a user to input dates or time periods about which an item was last opened, modified, or created, respectively. “Keywords” allows a user to select keywords associated with items for which to search. The keywords can be located, for example, in metadata associated with items. “Color label” allows a user to select a color or colors for which to search (e.g., files labeled with a particular color label such as “red” for important files). “Name” allows a user to input the name or part of a name of an item, such as a file name or title. “Contents” allows a user to specify contents to search for, such as a phrase within a text file. “Size” allows a user to input a size or range of sizes of items for which to search. Here, the “Kind” search parameter is selected, as indicated by a dashed line 404.



FIG. 5 is a screen shot depicting an example of the desktop user interface 300 that presents a list 502 including search parameters for the search application 301. The list 502 shows the possible values for the second search parameter 320a. In this example, that search parameter is associated with the “Kind” search parameter that the user has selected. The list 502 includes “Any,” “Images,” “Text,” “PDF” (Portable Document Format), “Movies,” “Music,” “Documents,” “Presentations,” “Folders,” “Applications,” and “Other.” The search control 316a limits the search to a particular kind of item, in this case, document files. In general, the search application 301 can include any number of search controls. Here, the “Documents” search parameter is selected, as indicated by a dashed line 504. Other search parameters can also be used. Additionally, in one implementation, the search can be part of an application (e.g., part of a word processing application, messaging application, music application, etc.) instead of a particular search application.



FIG. 6 is a screen shot depicting an example of the desktop user interface 300 including several search controls within the search application 301. In addition to the search controls 316a-b the search application 301 here includes search controls 602a-g. The search controls 602a-g have first search parameters 604a-g, respectively, and the first search parameters 604a-g have associated therewith second search parameters 606a-g.


Here, the search parameter 318b indicates that the last modified time and/or date is a criterion for the search. The search parameter 320b allows a user to select a relationship to the last modified date, such as no limitation with respect to the modified date (e.g., “Any time”), modified dates within a particular time period (e.g., “Within Last”) or modified dates before, after, or on a particular date. In some implementations, a time period input control and a time units control allow a user to input a time period length and to select units for the time period, such as seconds, minutes, hours, days, months, or years.


The search parameter 604a indicates that the date and/or time that a file or item was last opened is a condition of the search. The associated search parameter 606a indicates that an item that was opened on any date satisfies the search condition in the search control 602a. Alternatively, the search parameter 606a can specify a time period or a particular date in which a file or item was last opened as a condition for the search control 602a.


The search parameter 604b indicates that the date and/or time that a file or item was created is a condition of the search. The associated search parameter 606b indicates that any date satisfies the search condition in the search control 602b. Alternatively, the search parameter 606b can specify a time period or a particular date in which a file or item was last opened as a condition for the search control 602b.


The search parameter 604c indicates that keywords associated with a file or item are a condition of the search. For example, the keywords can be contained in metadata associated with image, audio, or video files. The associated search parameter 606c allows a user to select a particular keyword from a list of keywords. The selected keyword is the search condition for the search control 602c.


The search parameter 604d indicates that a color label associated with a file or item is a condition of the search. The associated search parameter 606d allows a user to select color labels. The color labels are the search condition for the search control 602d.


The search parameter 604e indicates that a file or item name is a condition of the search. The associated search parameter 606e indicates that the name must contain the text input by the user in search parameter 612 (e.g., “resume”). Alternatively, the search parameter 606e can indicate other name conditions, such as matching, beginning with, or ending with the text in the search parameter 612.


The search parameter 604f indicates that the contents of a file or item are a condition of the search. The associated search parameter 606f allows a user to input text for which to search within the contents of the files or items.


The search parameter 604g indicates that the size of a file or item is a condition of the search. The associated search parameter 606g indicates that sizes greater than the size input by the user in search parameter 614 and having units as selected in search parameter 616 satisfy the search condition. Alternatively, the search parameter 606g can indicate other size conditions, such as an exact size or less than a particular size.


A user can remove search controls by selecting remove controls. For example, a user can remove the search controls 602a-g by selecting remove controls 618a-g, respectively.


In general, a user can trigger the search application 301 to perform searches of the current version of files and items. A user can access earlier versions of the files and items by initiating a backup interface. For example, the user can select the backup icon 326 to initiate the backup interface. Here, the user initiates the backup interface, for example using one of the controls previously mentioned.



FIG. 7A is a screen shot depicting an example of a backup interface 700 including search results within the search application 301. In addition to the search application 301, the backup interface 700 includes a timeline 702 and function buttons. In some implementations, the timeline 702 includes snapshots representing the results of performing the current search on an earlier version of system contents that have been backed up. A snapshot refers to a backup element stored in a historical archive that includes a backup of selected items or content as specified by the backup component 117. In this particular example, the timeline 702 presents a date beneath snapshots 704a-d indicating the date of the contents on which that search was performed.


The timeline 702 can include a number of snapshots representing searches performed on current and/or earlier versions or states of the files or items that have been backed up. In one implementation, each snapshot provides a representation of the current or an earlier version of the files or items at a particular point in time that is responsive to the search. In some implementations, the timeline 702 includes a visual representation of the search results screen, such as a miniature version thereof. The timeline 702 can appear across the top portion of the backup interface 700 (as shown). Alternatively, the timeline 702 may not appear in the top portion of the backup interface 700 until a user moves their cursor to (or otherwise activates) the top portion of the interface. In an alternative implementation, in place of the timeline 702, a number of snapshots are presented in a cascading stack. The user can navigate through the stack to snapshots corresponding to particular points in time.


The backup interface 700 can also include function controls. For example, the interface 700 can include arrow buttons 706a and 706b to navigate the snapshots forward or backward. Arrow buttons 708a and 708b and an associated scroll bar 709 can allow the user to navigate to additional snapshots not shown in the current timeline window, thus there can be a large number of snapshots from which to select.


The search application 301 includes the search controls 316a-b as described above with reference to FIG. 6. Here, the search application 301 also includes a search phrase of “resume” in the search phrase control 312. The search location controls 308 include a selected “Career” folder location control 710. The navigation area 310 shows sub-folders of the selected “Career” folder. The search application 301 can present search results in the search results area 306 for a search performed using a currently selected snapshot. Here, the search results area 306 presents a list of one or more items 712 satisfying the search conditions (i.e., being in the folder “Career,” including the phrase “resume,” and being of type “Documents”). These results are represented by a currently selected snapshot 704a, as indicated by dashed line 714. The timeline 702 indicates that these search results are dated for the current time (i.e., the current version of the presented data in the file system). An item 712 can be represented by an identifier, such as a name or an icon, and/or can include a representation of the contents of the item, such as a thumbnail picture. A user can change the search by adding, removing, or modifying search controls.


A restore button 716, when selected, restores the current system state with the files or items in the presented search results. In some implementations, this exits the backup interface 700. A user can select one or more items in the search results and then select the restore button 716 to modify the current version of the item or items selected, if such a version exists, or otherwise to restore the file or item to the current state. For example, the user can select a few images to restore, thereby triggering the restore button to display a more precise message, such as “restore selection only.” Restoration of the items results in the retrieval of the item from the archive, and instantiation in the current environment. For example, a file can be retrieved from an archive folder and placed in its current folder, where it is accessible to a user; a system preference (e.g., a time zone or language setting) can be retrieved from an archive and restored as a current system preference that affects the system operation in some regard; or an address book can be restored such that contacts existing in the archived address book are returned to a current address book.


In some implementations, an information button 718 can be included in the backup interface 700. The information button 718 can provide information regarding the selected snapshot. In one implementation, selecting the information button 718 opens a panel display. The panel display provides, in one implementation, information including the date and time the snapshot was made, the location of actual contents in a snapshot, the size of the snapshot, and a comment section.


A close button 720 can be selected to exit the backup engine 700 and return the user to the desktop 300. In some implementations, the backup engine 700 can automatically close upon restoring a particular snapshot. In other implementations, the backup engine 700 can be minimized for purposes of navigating to other applications, such as an email application or a web browser.


In some implementations, the user can select an item timeline icon 722 to open a timeline view of snapshots, which can present text information about one or more snapshots and optionally facilitate navigation to any snapshot. In some implementations, the timeline view can be toggled off and on using the item timeline icon 722. Here, the user initiates the timeline view. Alternatively, in some implementations, a timeline is represented by a series of tick marks in the backup interface (e.g., presented in chronological order). A user can select a particular tick mark in order to move to a snapshot corresponding to that tick mark.


In some implementations, all snapshots that include a particular item or file are shown in the timeline, even if there are consecutive snapshots where the file remained the same version. In one implementation, once an item or file takes on a particular version and that version is captured in a snapshot, then subsequent consecutive snapshots of the same version can be omitted from the timeline 702 or otherwise de-emphasized in the timeline 702 (e.g., by graying out; by displaying in dotted lines, as illustrated by snapshot 704c in contrast to snapshots 704a, 704b, and 704d).


In some implementations, when the user selects the arrow 706a to navigate to an older snapshot, the backup interface navigates to a snapshot whose version of the file or item is different from the version in the snapshot from which the navigation is performed. Vice versa, if the user selects the arrow 706b to navigate to a newer snapshot, the backup interface navigates to a snapshot whose version of the file or item is different from the version in the snapshot from which the navigation is performed. Thus, one or more intermediate snapshots can be skipped when they include a version of the file that is the same as the version in the starting snapshot.


As an example, while the current state snapshot is highlighted, the user selects the arrow 706a while the current state snapshot 704a is currently selected, as shown in FIG. 7A. The backup interface navigates to a snapshot that is older than the currently selected snapshot and whose version of the file is different from the version in the currently selected snapshot, which is snapshot 704b. FIG. 7B shows snapshot 704b being selected, as indicated by dotted line 714. From there, if the user selects arrow 706a again, the backup interface navigates to snapshot 704d, as shown in FIG. 7C. Snapshot 704d includes a version of the file that is different from the version of the file in snapshot 704b. Snapshot 704c is skipped over in the navigation because that snapshot includes the same version as snapshot 704d.


In some implementations, whether a snapshot should be skipped over in the timeline navigation (and whether it should be omitted from the timeline, grayed out, etc.) can be based on date ranges associated with the versions of the file. For example, the version in snapshots 704d and 704c can be associated with the date range of Aug. 15, 2005 to Aug. 16, 2005; the version in snapshot 704b can be associated with the date range of Aug. 17, 2005 to Aug. 17, 2005; and the current snapshot 704a can be associated with the date range of Aug. 18, 2005 to the present date. When arrow 706a or 706b is selected from a particular snapshot, the user interface looks for snapshots having date ranges that are outside of the date range of the particular snapshot. For example, if snapshot 706c is the currently selected snapshot and the use selects arrow 706a to navigate to an older snapshot, the user interface looks for snapshots that are older than Aug. 15, 2005; these older snapshots have date ranges that are outside of the date range associated with the version in snapshots 704d and 704c.



FIG. 8 is a screen shot depicting an example of the backup interface 700 including an item timeline 802 associated with search conditions within the search application 301. The item timeline 802 indicates that, for the current search conditions, there is one result in the 56 available snapshots. That is, in this implementation, there are a total of 56 snapshots available that includes one file that matches the current search conditions. The one file can be in different versions throughout the 56 snapshots.


The item timeline 802 presents a list 804 of the resulting snapshots. The list 804 includes the date of the snapshot as well as the number of items in the snapshot that satisfy the search conditions. The item timeline 802 allows a user to see when the responsive contents were captured and how many results exist for each time or date. In other implementations, different information can be presented. For example, snapshots that include a version that is different from the version in the immediately preceding snapshot can be marked by an asterisk. A user can select a snapshot in the list 804 to navigate to that snapshot. The search application 301 then presents, in the search results area 306, a result of the search performed on the corresponding contents. In certain implementations, the item timeline 802 is transparent or semi-transparent allowing windows, applications, or the backup interface 700 to be at least partly visible through the item timeline 802.


In some implementations, the timeline 702 can show only those of the snapshot search results that are different from the current version. That is, the timeline in such an implementation can show all snapshots that match the search, except those whose corresponding earlier state is identical to the current state.


In one example, a user can search for a file in a particular drive of a computer, such as the C: drive. Upon the search not locating the file, the user can initiate the backup engine to view the contents of the drive at various times in the past. After selecting a particular snapshot representing the state of the drive at some point in the past, the results of the search are updated based on the selected snapshot. For example, the results now indicate whether the sought file is in the selected snapshot. If it is there, the user can restore the file from the snapshot search results. In an alternative implementation, when an initial search does not locate the searched for item, the backup engine can be automatically initiated (or a user prompt can be generated to initiate the backup engine). The backup engine can then present snapshots of the search results at different times.


In another example, a user may desire to restore system preference information, such as Internet security settings (e.g., the user may have discovered that the current security conditions are inadequate and wishes to return to a safer security configuration). The user searches for the security setting and then activates the backup. Previous security settings can be presented in the search results as the user selects snapshots representing backed up information for earlier settings. The user can select one or more desired security settings in a particular search result and restore them to the current security settings.


In another example, a user can restore a playlist in iTunes. The user opens the iTunes application and performs a search for a particular playlist. Upon the search results being presented, the user can determine that the current playlist identified in the search contains songs that are too modern for his or her tastes. The user can activate the backup and view the results of performing this search on the backed up contents ranging from the current and to a point of time in the past, say within the last few years. After receiving the search results from the earlier playlist versions, the user can select one of the playlists from the past and restore it to the present state of iTunes.


In the above description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding. It will be apparent, however, to one skilled in the art that implementations can be practiced without these specific details. In other instances, structures and devices are shown in block diagram form in order to avoid obscuring the disclosure.


In particular, one skilled in the art will recognize that other architectures and graphics environments can be used, and that the examples can be implemented using graphics tools and products other than those described above. In particular, the client/server approach is merely one example of an architecture for providing the functionality described herein; one skilled in the art will recognize that other, non-client/server approaches can also be used. Some portions of the detailed description are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.


It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.


An apparatus for performing the operations herein can be specially constructed for the required purposes, or it can comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program can be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD ROMs, and magnetic optical disks, read only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.


The algorithms and modules presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems can be used with programs in accordance with the teachings herein, or it can prove convenient to construct more specialized apparatuses to perform the method steps. The required structure for a variety of these systems will appear from the description. In addition, the present examples are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages can be used to implement the teachings as described herein. Furthermore, as will be apparent to one of ordinary skill in the relevant art, the modules, features, attributes, methodologies, and other aspects can be implemented as software, hardware, firmware or any combination of the three. Of course, wherever a component is implemented as software, the component can be implemented as a standalone program, as part of a larger program, as a plurality of separate programs, as a statically or dynamically linked library, as a kernel loadable module, as a device driver, and/or in every and any other way known now or in the future to those of skill in the art of computer programming. Additionally, the present description is in no way limited to implementation in any specific operating system or environment.


The subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus. The instructions can be organized into modules (or engines) in different numbers and combinations from the exemplary modules described. The computer readable medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more them. The term “data processing apparatus” encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them. A propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode information for transmission to suitable receiver apparatus.


While this specification contains many specifics, these should not be construed as limitations on the scope of what may be claimed, but rather as descriptions of features specific to particular implementations of the subject matter. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.


Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.


The subject matter of this specification has been described in terms of particular embodiments, but other embodiments can be implemented and are within the scope of the following claims. For example, the actions recited in the claims can be performed in a different order and still achieve desirable results. As one example, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In certain implementations, multitasking and parallel processing may be advantageous. Other variations are within the scope of the following claims.

Claims
  • 1. A method comprising: receiving, in a search interface associated with a search application, a search criterion from a user;determining a first search result, wherein determining the first search result comprises searching a current state of a file system based on the search criterion;determining one or more historical search results, wherein determining each historical search result comprises searching a different respective prior state of the file system based on the search criterion;presenting the first search result in the search interface, the first search result identifying a first version of an item associated with the current state of the file system;presenting one or more historical representations of the search interface, each historical representation visually depicting the search interface and a respective one of the historical search results, the historical search results identifying one or more historical versions of the item associated with respective prior states of the file system;receiving a user input selecting a particular historical representation of the search interface and corresponding historical search result;presenting the selected historical search result in the search interface.
  • 2. The method of claim 1, wherein the search interface comprises one or more graphical search control elements adapted to receive the search criterion from the user.
  • 3. The method of claim 2, wherein each historical representation further visually depicts the one or more graphical search control elements.
  • 4. The method of claim 1, wherein the one or more historical representations are presented as a cascading stack.
  • 5. The method of claim 1, wherein the one or more historical representations of the search interface are presented chronologically according a data range associated with each respective prior state of the file system.
  • 6. The method of claim 5, wherein presenting one or more historical representations of the search interface comprises indicating that a historical version of the item associated with an earlier historical representation is identical to a historical version of the item associated with a later historical representation.
  • 7. The method of claim 6, wherein indicating that the historical version of the item associated with the earlier historical representation is identical to the historical version of the item associated with the later historical representation comprises: de-emphasizing the later historical representation during presentation.
  • 8. The method of claim 1, wherein the item is a folder, a file, an information portion, a directory, an image, a set of system or application parameters, a playlist, an address book, an e-mail, an e-mail folder, a state of an application or state of a system, a set of preferences, or a combination thereof.
  • 9. The method of claim 1, wherein the each prior state of the file system corresponds to a different non-overlapping date range.
  • 10. The method of claim 1, wherein the historical version of the item is stored with metadata that indicates a date range corresponding to the respective prior state of the file system.
  • 11. A non-transitory computer readable medium storing instructions operable to cause one or more processors to perform operations comprising: receiving, in a search interface associated with a search application, a search criterion from a user;determining a first search result, wherein determining the first search result comprises searching a current state of a file system based on the search criterion;determining one or more historical search results, wherein determining each historical search result comprises searching a different respective prior state of the file system based on the search criterion;presenting the first search result in the search interface, the first search result identifying a first version of an item associated with the current state of the file system;presenting one or more historical representations of the search interface, each historical representation visually depicting the search interface and a respective one of the historical search results, the historical search results identifying one or more historical versions of the item associated with respective prior states of the file system;receiving a user input selecting a particular historical representation of the search interface and corresponding historical search result;presenting the selected historical search result in the search interface.
  • 12. The non-transitory computer readable medium of claim 11, wherein the search interface comprises one or more graphical search control elements adapted to receive the search criterion from the user.
  • 13. The non-transitory computer readable medium of claim 12, wherein each historical representation further visually depicts the one or more graphical search control elements.
  • 14. The non-transitory computer readable medium of claim 11, wherein the one or more historical representations are presented as a cascading stack.
  • 15. The non-transitory computer readable medium of claim 11, wherein the one or more historical representations of the search interface are presented chronologically according a data range associated with each respective prior state of the file system.
  • 16. The non-transitory computer readable medium of claim 15, wherein presenting one or more historical representations of the search interface comprises indicating that a historical version of the item associated with an earlier historical representation is identical to a historical version of the item associated with a later historical representation.
  • 17. The non-transitory computer readable medium of claim 16, wherein indicating that the historical version of the item associated with the earlier historical representation is identical to the historical version of the item associated with the later historical representation comprises: de-emphasizing the later historical representation during presentation.
  • 18. The non-transitory computer readable medium of claim 11, wherein the item is a folder, a file, an information portion, a directory, an image, a set of system or application parameters, a playlist, an address book, an e-mail, an e-mail folder, a state of an application or state of a system, a set of preferences, or a combination thereof.
  • 19. The non-transitory computer readable medium of claim 11, wherein the each prior state of the file system corresponds to a different non-overlapping date range.
  • 20. The non-transitory computer readable medium of claim 11, wherein the historical version of the item is stored with metadata that indicates a date range corresponding to the respective prior state of the file system.
  • 21. A system comprising: one or more processors; andnon transitory computer readable medium storing instructions operable to cause one or more processors to perform operations comprising: receiving, in a search interface associated with a search application, a search criterion from a user;determining a first search result, wherein determining the first search result comprises searching a current state of a file system based on the search criterion;determining one or more historical search results, wherein determining each historical search result comprises searching a different respective prior state of the file system based on the search criterion;presenting the first search result in the search interface, the first search result identifying a first version of an item associated with the current state of the file system;presenting one or more historical representations of the search interface, each historical representation visually depicting the search interface and a respective one of the historical search results, the historical search results identifying one or more historical versions of the item associated with respective prior states of the file system;receiving a user input selecting a particular historical representation of the search interface and corresponding historical search result;presenting the selected historical search result in the search interface.
  • 22. The system of claim 21, wherein the search interface comprises one or more graphical search control elements adapted to receive the search criterion from the user.
  • 23. The system of claim 22, wherein each historical representation further visually depicts the one or more graphical search control elements.
  • 24. The system of claim 21, wherein the one or more historical representations are presented as a cascading stack.
  • 25. The system of claim 21, wherein the one or more historical representations of the search interface are presented chronologically according a data range associated with each respective prior state of the file system.
  • 26. The system of claim 25, wherein presenting one or more historical representations of the search interface comprises indicating that a historical version of the item associated with an earlier historical representation is identical to a historical version of the item associated with a later historical representation.
  • 27. The system of claim 26, wherein indicating that the historical version of the item associated with the earlier historical representation is identical to the historical version of the item associated with the later historical representation comprises: de-emphasizing the later historical representation during presentation.
  • 28. The system of claim 21, wherein the item is a folder, a file, an information portion, a directory, an image, a set of system or application parameters, a playlist, an address book, an e-mail, an e-mail folder, a state of an application or state of a system, a set of preferences, or a combination thereof.
  • 29. The system of claim 21, wherein the each prior state of the file system corresponds to a different non-overlapping date range.
  • 30. The system of claim 21, wherein the historical version of the item is stored with metadata that indicates a date range corresponding to the respective prior state of the file system.
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S. patent application Ser. No. 11/760,588, filed on Jun. 8, 2007, the entire contents of which are hereby incorporated by reference.

US Referenced Citations (387)
Number Name Date Kind
5150407 Chan Sep 1992 A
5150473 Zulch Sep 1992 A
5163148 Walls Nov 1992 A
5276867 Kenley et al. Jan 1994 A
5349658 O'Rourke et al. Sep 1994 A
5369570 Parad Nov 1994 A
5574846 Yoshimura et al. Nov 1996 A
5659614 Bailey Aug 1997 A
5664186 Bennett et al. Sep 1997 A
5680562 Conrad et al. Oct 1997 A
5736974 Selker Apr 1998 A
5745669 Hugard et al. Apr 1998 A
5754178 Johnston et al. May 1998 A
5758359 Saxon May 1998 A
5790120 Lozares et al. Aug 1998 A
5802175 Kara Sep 1998 A
5818936 Mashayekhi Oct 1998 A
5819032 De Vries et al. Oct 1998 A
5819292 Hitz et al. Oct 1998 A
5831617 Bhukhanwala Nov 1998 A
5832526 Schuyler Nov 1998 A
5961605 Deng et al. Oct 1999 A
5987566 Vishlitzky et al. Nov 1999 A
6006227 Freeman et al. Dec 1999 A
6023506 Ote et al. Feb 2000 A
6054989 Robertson et al. Apr 2000 A
6097313 Takahashi et al. Aug 2000 A
6112318 Jouppi et al. Aug 2000 A
6121969 Jain et al. Sep 2000 A
6134660 Boneh et al. Oct 2000 A
6167532 Wisecup Dec 2000 A
6188405 Czerwinski et al. Feb 2001 B1
6269381 St. Pierre et al. Jul 2001 B1
6366988 Skiba et al. Apr 2002 B1
6396500 Qureshi et al. May 2002 B1
6397308 Ofek et al. May 2002 B1
6424626 Kidambi et al. Jul 2002 B1
6460055 Midgley et al. Oct 2002 B1
6493745 Cherian Dec 2002 B1
6553392 Mosher, Jr. et al. Apr 2003 B1
6574733 Langford Jun 2003 B1
6600501 Israel et al. Jul 2003 B1
6604118 Kleiman et al. Aug 2003 B2
6625704 Winokur Sep 2003 B2
6629129 Bookspan et al. Sep 2003 B1
6636937 Peter Oct 2003 B2
6638313 Freeman et al. Oct 2003 B1
6701454 Fischer et al. Mar 2004 B1
6711572 Zakharov et al. Mar 2004 B2
6714201 Grinstein et al. Mar 2004 B1
6714952 Dunham et al. Mar 2004 B2
6724918 Yen et al. Apr 2004 B1
6725427 Freeman et al. Apr 2004 B2
6728735 Fong Apr 2004 B1
6750890 Sugimoto Jun 2004 B1
6760723 Oshinsky et al. Jul 2004 B2
6768999 Prager et al. Jul 2004 B2
6785751 Connor Aug 2004 B1
6785786 Gold et al. Aug 2004 B1
6801229 Tinkler Oct 2004 B1
6836657 Ji et al. Dec 2004 B2
6857001 Hitz et al. Feb 2005 B2
6892211 Hitz et al. May 2005 B2
6901493 Maffezzoni May 2005 B1
6918124 Novik et al. Jul 2005 B1
6947556 Matyas et al. Sep 2005 B1
6948039 Biessener et al. Sep 2005 B2
6959368 St. Pierre et al. Oct 2005 B1
6993710 Coad et al. Jan 2006 B1
7069402 Coulter et al. Jun 2006 B2
7072916 Lewis et al. Jul 2006 B1
7099900 Bromley et al. Aug 2006 B1
7103740 Colgrove et al. Sep 2006 B1
7107527 Takahashi et al. Sep 2006 B2
7111136 Yamagami Sep 2006 B2
7133902 Saha et al. Nov 2006 B2
7134026 Horiuchi et al. Nov 2006 B2
7155486 Aoshima et al. Dec 2006 B2
7174352 Kleiman et al. Feb 2007 B2
7185028 Lechner Feb 2007 B2
7200617 Kibuse Apr 2007 B2
7213040 Stokes May 2007 B1
7222194 Kano et al. May 2007 B2
7257717 Huang Aug 2007 B2
7275075 Cannon Sep 2007 B2
7284190 Chellis et al. Oct 2007 B2
7289973 Kiessig et al. Oct 2007 B2
7318134 Oliveira et al. Jan 2008 B1
7320076 Caronni Jan 2008 B2
7386801 Horvitz et al. Jun 2008 B1
7401194 Jewell Jul 2008 B2
7418619 Uhlmann et al. Aug 2008 B1
7434164 Salesin et al. Oct 2008 B2
7434177 Ording et al. Oct 2008 B1
7440125 Maekawa et al. Oct 2008 B2
7483693 Lueng et al. Jan 2009 B2
7505762 Onyon et al. Mar 2009 B2
7518611 Boyd et al. Apr 2009 B2
7558930 Kitamura et al. Jul 2009 B2
7559016 Rakowski et al. Jul 2009 B1
7574459 Sen et al. Aug 2009 B2
7590668 Kathuria et al. Sep 2009 B2
7596586 Gokhale et al. Sep 2009 B2
7600133 Long et al. Oct 2009 B2
7620670 Tokuda et al. Nov 2009 B2
7624133 Ojalvo Nov 2009 B1
7630021 Matsuzaka et al. Dec 2009 B2
7657450 Amit et al. Feb 2010 B2
7660817 Smith et al. Feb 2010 B2
7669141 Pegg Feb 2010 B1
7676689 Shioyama et al. Mar 2010 B1
7703044 Graham Apr 2010 B2
7711771 Kirnos May 2010 B2
7716171 Kryger May 2010 B2
7734594 Wang Jun 2010 B2
7735018 Bakhash Jun 2010 B2
7739464 Coulter et al. Jun 2010 B1
7739622 DeLine et al. Jun 2010 B2
7743347 Graham et al. Jun 2010 B2
7747655 Hull et al. Jun 2010 B2
7752573 Shiba et al. Jul 2010 B2
7761456 Cram et al. Jul 2010 B1
7774718 Finke-Anlauff et al. Aug 2010 B2
7788080 Graham et al. Aug 2010 B2
7788592 Williams et al. Aug 2010 B2
7800615 MacPherson Sep 2010 B2
7809687 Cisler et al. Oct 2010 B2
7809688 Cisler et al. Oct 2010 B2
7836311 Kuriya et al. Nov 2010 B2
7853566 Cisler et al. Dec 2010 B2
7853567 Cisler et al. Dec 2010 B2
7856424 Cisler et al. Dec 2010 B2
7860839 Cisler et al. Dec 2010 B2
7882072 Axe et al. Feb 2011 B1
7890527 Nene et al. Feb 2011 B1
7899829 Malla Mar 2011 B1
7934064 Per et al. Apr 2011 B1
7953730 Bleckner May 2011 B1
7974948 Baer et al. Jul 2011 B2
7999810 Boice et al. Aug 2011 B1
8010900 Hart et al. Aug 2011 B2
8024292 Thompson et al. Sep 2011 B2
8055911 Feng et al. Nov 2011 B2
8099392 Paterson et al. Jan 2012 B2
8161410 Bray Apr 2012 B2
8166415 Cisler et al. Apr 2012 B2
8209308 Rueben et al. Jun 2012 B2
8219995 Flemming et al. Jul 2012 B2
8229897 Cannon et al. Jul 2012 B2
8234591 Dhawan et al. Jul 2012 B1
8245078 Chatterjee et al. Aug 2012 B1
8260770 Bell et al. Sep 2012 B2
8307004 Weiss et al. Nov 2012 B2
8311988 Cisler et al. Nov 2012 B2
8352702 O'Neill et al. Jan 2013 B2
8370853 Giampaolo et al. Feb 2013 B2
8375318 Masuda et al. Feb 2013 B2
8468136 Ulrich et al. Jun 2013 B2
8495024 Cisler et al. Jul 2013 B2
8504516 Weiss et al. Aug 2013 B2
8504527 Cisler et al. Aug 2013 B2
8566289 Paterson et al. Oct 2013 B2
8627195 Hayden Jan 2014 B1
8725965 Hart et al. May 2014 B2
8745523 McInerney et al. Jun 2014 B2
8775378 Cisler et al. Jul 2014 B2
8839087 Hayden Sep 2014 B1
9009115 Cisler et al. Apr 2015 B2
20010047368 Oshinsky et al. Nov 2001 A1
20010055317 Kajizaki et al. Dec 2001 A1
20020016912 Johnson Feb 2002 A1
20020023198 Kokubun et al. Feb 2002 A1
20020046220 Freeman et al. Apr 2002 A1
20020049883 Schneider et al. Apr 2002 A1
20020054158 Asami May 2002 A1
20020063737 Feig et al. May 2002 A1
20020065999 Kikuchi et al. May 2002 A1
20020075322 Rosenzweig et al. Jun 2002 A1
20020080180 Mander et al. Jun 2002 A1
20020107886 Gentner et al. Aug 2002 A1
20020112237 Kelts Aug 2002 A1
20020120648 Ball et al. Aug 2002 A1
20020156921 Dutta et al. Oct 2002 A1
20020160760 Aoyama Oct 2002 A1
20020174283 Lin Nov 2002 A1
20030014521 Elson et al. Jan 2003 A1
20030016248 Hayes Ubillos Jan 2003 A1
20030018878 Dorward et al. Jan 2003 A1
20030038831 Engelfriet Feb 2003 A1
20030050940 Robinson Mar 2003 A1
20030063128 Salmimaa et al. Apr 2003 A1
20030065687 Momiji et al. Apr 2003 A1
20030097640 Abrams et al. May 2003 A1
20030122874 Dieberger et al. Jul 2003 A1
20030126247 Strasser et al. Jul 2003 A1
20030131007 Schirmer et al. Jul 2003 A1
20030135650 Kano et al. Jul 2003 A1
20030137540 Klevenz et al. Jul 2003 A1
20030167380 Green Sep 2003 A1
20030172937 Faries et al. Sep 2003 A1
20030177149 Coombs Sep 2003 A1
20030182332 McBrearty et al. Sep 2003 A1
20030195903 Manley et al. Oct 2003 A1
20030220949 Witt et al. Nov 2003 A1
20040003351 Sommerer et al. Jan 2004 A1
20040044707 Richard Mar 2004 A1
20040066414 Czerwinski et al. Apr 2004 A1
20040073560 Edwards Apr 2004 A1
20040078641 Fleischmann Apr 2004 A1
20040088331 Therrien et al. May 2004 A1
20040117459 Fry Jun 2004 A1
20040125137 Stata et al. Jul 2004 A1
20040125150 Adcock et al. Jul 2004 A1
20040133575 Farmer et al. Jul 2004 A1
20040139396 Gelernter et al. Jul 2004 A1
20040143652 Grannan et al. Jul 2004 A1
20040153973 Horwitz Aug 2004 A1
20040163009 Goldstein et al. Aug 2004 A1
20040167942 Oshinsky et al. Aug 2004 A1
20040175000 Caronni Sep 2004 A1
20040193953 Callahan et al. Sep 2004 A1
20040199779 Huang Oct 2004 A1
20040199826 Bertram et al. Oct 2004 A1
20040210608 Lee et al. Oct 2004 A1
20040220965 Harville et al. Nov 2004 A1
20040220980 Forster Nov 2004 A1
20040222992 Calkins et al. Nov 2004 A1
20040228493 Ma Nov 2004 A1
20040230892 Horton Nov 2004 A1
20040235523 Schrire et al. Nov 2004 A1
20040236769 Smith et al. Nov 2004 A1
20040236916 Berkowitz et al. Nov 2004 A1
20040236958 Teicher et al. Nov 2004 A1
20040267700 Dumais et al. Dec 2004 A1
20050010955 Elia et al. Jan 2005 A1
20050047295 Kim et al. Mar 2005 A1
20050071390 Midgley et al. Mar 2005 A1
20050086613 McKnight et al. Apr 2005 A1
20050091596 Anthony et al. Apr 2005 A1
20050097475 Makioka et al. May 2005 A1
20050102329 Jiang et al. May 2005 A1
20050102695 Musser May 2005 A1
20050108253 Metsatahti et al. May 2005 A1
20050138013 Walker et al. Jun 2005 A1
20050138066 Finke-Anlauff et al. Jun 2005 A1
20050138081 Alshab et al. Jun 2005 A1
20050144135 Juarez et al. Jun 2005 A1
20050149577 Okada et al. Jul 2005 A1
20050165867 Barton et al. Jul 2005 A1
20050187992 Prahlad et al. Aug 2005 A1
20050204186 Rothman et al. Sep 2005 A1
20050216520 He et al. Sep 2005 A1
20050216527 Erlingsson Sep 2005 A1
20050246398 Barzilai et al. Nov 2005 A1
20050262168 Helliker et al. Nov 2005 A1
20050262377 Sim-Tang Nov 2005 A1
20060026218 Urmston Feb 2006 A1
20060036568 Moore et al. Feb 2006 A1
20060041603 Paterson et al. Feb 2006 A1
20060041823 Wolfgang et al. Feb 2006 A1
20060053332 Uhlmann Mar 2006 A1
20060064444 Van Ingen et al. Mar 2006 A1
20060064634 Dettinger et al. Mar 2006 A1
20060080521 Barr et al. Apr 2006 A1
20060085792 Traut Apr 2006 A1
20060085817 Kim et al. Apr 2006 A1
20060088167 Bade et al. Apr 2006 A1
20060101384 Sim-Tang et al. May 2006 A1
20060106893 Daniels et al. May 2006 A1
20060117022 Lucas Jun 2006 A1
20060117309 Singhal et al. Jun 2006 A1
20060129496 Chow et al. Jun 2006 A1
20060137010 Kramer et al. Jun 2006 A1
20060143250 Peterson et al. Jun 2006 A1
20060150107 Leung et al. Jul 2006 A1
20060156246 Williams et al. Jul 2006 A1
20060156259 Wagner et al. Jul 2006 A1
20060161861 Holecek et al. Jul 2006 A1
20060173848 Peterson et al. Aug 2006 A1
20060200754 Kablesh et al. Sep 2006 A1
20060206460 Gadkari Sep 2006 A1
20060218363 Palapudi Sep 2006 A1
20060224956 Storisteanu et al. Oct 2006 A1
20060235907 Kathuria et al. Oct 2006 A1
20060236406 Johnson Oct 2006 A1
20060248294 Nedved et al. Nov 2006 A1
20060253470 Friedman et al. Nov 2006 A1
20060288205 Linares Dec 2006 A1
20070015118 Nickell et al. Jan 2007 A1
20070027935 Haselton et al. Feb 2007 A1
20070030528 Quaeler et al. Feb 2007 A1
20070038884 Campbell et al. Feb 2007 A1
20070043715 Kaushik et al. Feb 2007 A1
20070043790 Kryger Feb 2007 A1
20070070066 Bakhash Mar 2007 A1
20070078910 Bopardikar Apr 2007 A1
20070088702 Fridella et al. Apr 2007 A1
20070094312 Sim-Tang Apr 2007 A1
20070106978 Felts May 2007 A1
20070130232 Therrien et al. Jun 2007 A1
20070136381 Cannon et al. Jun 2007 A1
20070136389 Bergant et al. Jun 2007 A1
20070136423 Gilmore et al. Jun 2007 A1
20070143425 Kieselbach et al. Jun 2007 A1
20070150326 Nakao et al. Jun 2007 A1
20070156772 Lechner Jul 2007 A1
20070168497 Locker et al. Jul 2007 A1
20070174580 Shulga Jul 2007 A1
20070180268 Filimon et al. Aug 2007 A1
20070185879 Roublev et al. Aug 2007 A1
20070185922 Kapoor et al. Aug 2007 A1
20070186127 Desai et al. Aug 2007 A1
20070192386 Fries et al. Aug 2007 A1
20070245238 Fugitt et al. Oct 2007 A1
20070266007 Arrouye et al. Nov 2007 A1
20070271263 Merrild Nov 2007 A1
20070271303 Menendez et al. Nov 2007 A1
20070282854 Bhogal et al. Dec 2007 A1
20070288536 Sen et al. Dec 2007 A1
20080016576 Ueda et al. Jan 2008 A1
20080022393 Waltermann et al. Jan 2008 A1
20080028007 Ishii et al. Jan 2008 A1
20080033969 Koo et al. Feb 2008 A1
20080034004 Cisler et al. Feb 2008 A1
20080034011 Cisler et al. Feb 2008 A1
20080034017 Giampaolo et al. Feb 2008 A1
20080034019 Cisler et al. Feb 2008 A1
20080046557 Cheng Feb 2008 A1
20080065663 Farlee et al. Mar 2008 A1
20080070496 Jackson Mar 2008 A1
20080071796 Ghuneim Mar 2008 A1
20080077808 Teicher et al. Mar 2008 A1
20080082578 Hogue et al. Apr 2008 A1
20080091655 Gokhale et al. Apr 2008 A1
20080126442 Cisler et al. May 2008 A1
20080133487 Gross Jun 2008 A1
20080141029 Culver Jun 2008 A1
20080162999 Schlueter et al. Jul 2008 A1
20080168184 Freedman et al. Jul 2008 A1
20080168245 De Atley et al. Jul 2008 A1
20080168391 Robbin et al. Jul 2008 A1
20080172428 Stokes Jul 2008 A1
20080172607 Baer Jul 2008 A1
20080177961 McSharry et al. Jul 2008 A1
20080208630 Fors et al. Aug 2008 A1
20080214163 Onyon et al. Sep 2008 A1
20080216011 Gould Sep 2008 A1
20080222512 Albornoz et al. Sep 2008 A1
20080229037 Bunte et al. Sep 2008 A1
20080250314 Larsen Oct 2008 A1
20080250342 Clark et al. Oct 2008 A1
20080250400 Vertes Oct 2008 A1
20080256138 Sim-Tang Oct 2008 A1
20080285754 Kezmann Nov 2008 A1
20080307017 Lyons et al. Dec 2008 A1
20080307020 Ko et al. Dec 2008 A1
20080307347 Cisler et al. Dec 2008 A1
20080310628 Fujioka et al. Dec 2008 A1
20080310633 Brown et al. Dec 2008 A1
20080313243 Poston et al. Dec 2008 A1
20090019291 Murray Jan 2009 A1
20090031401 Cudich et al. Jan 2009 A1
20090052669 Ma Feb 2009 A1
20090116641 Bokor et al. May 2009 A1
20090307333 Welingkar et al. Dec 2009 A1
20100017855 Johnson et al. Jan 2010 A1
20100063960 Lehto Mar 2010 A1
20100070844 Aymeloglu et al. Mar 2010 A1
20100169823 Audet Jul 2010 A1
20100205397 Chellam Aug 2010 A1
20100217929 Kirshenbaum et al. Aug 2010 A1
20110016089 Freedman et al. Jan 2011 A1
20110185762 Freedman et al. Jan 2011 A1
20110083098 Cisler et al. Apr 2011 A1
20110202763 Martin et al. Aug 2011 A1
20110296351 Ewing et al. Dec 2011 A1
20110302502 Hart et al. Dec 2011 A1
20120185438 Giampaolo et al. Jul 2012 A1
20120185518 Giampaolo et al. Jul 2012 A1
20120185762 Ozer et al. Jul 2012 A1
20120185767 Schlegel Jul 2012 A1
20120198383 Cisler et al. Aug 2012 A1
20120246565 Kumamoto Sep 2012 A1
20120272173 Grossman et al. Oct 2012 A1
20130066836 Weiss et al. Mar 2013 A1
20130073821 Flynn et al. Mar 2013 A1
20130212599 Giampaolo et al. Aug 2013 A1
Foreign Referenced Citations (8)
Number Date Country
629950 Dec 1997 EP
1152352 Nov 2001 EP
1582982 Oct 2005 EP
WO 0106356 Jan 2001 WO
WO 02101540 Dec 2002 WO
WO 2005045756 May 2005 WO
WO 2008019237 Feb 2008 WO
WO 2008019259 Feb 2008 WO
Non-Patent Literature Citations (40)
Entry
Office Action dated Apr. 1, 2015 from related Chinese Application No. 201310073409.1, 13 pages.
“Apple Previews Mac OS X Leopard,” Aug. 7, 2006, [Online] [Retrieved on Nov. 26, 2007] Retrieved from the Internet: URL:http://www.apple.com/pr/library/2006/aug/07leopard.html, pp. 1-2.
“Aulaclic: Unit 6. The Recycle Bin,” Nov. 2005, [Online] [Retrieved on Nov. 26, 2007] Retrieved from the Internet: URL:http://www.teacherclick.com/winxp/t—6—1.htm, pp. 1-2.
“How to Interpret Windows Installer Logs,” [Online] [Retrieved on Dec. 12, 2009] Retrieved from the Internet URL: http://blogs.technet.com/richard—macdonald/archive/2007/04/02/How-to-Interpret-Windows-Installer-Logs.aspx; published Apr. 4, 2007; 6 pages.
“MSDN Academic Alliance Developer Center, Curriculum Repository Glossary,” [Online] [Retrieved on Apr. 22, 2009] Retrieved from the Internet URL: http://www.academicresourcecenter.net/curriculum/glossary.aspx, 4 pages.
“StorageSync: Backup, Restore, & Synchronization Software User's Guide”, SimpleTech, 2003, 100 pages.
“What's New in Word 2002,” Wellesly College Information Services Computing Documentation, Jan. 2002, [Online] Retrieved on Aug. 14, 2008] Retrieved from the Internet URL: http://www.wellesley.edu/Computing/Office02/Word02/word02.html, 19 pages.
Bonwick et al., “The Zettabyte File System,” [Online] [Retrieved on Jan. 22, 2008] Retrieved from the Internet: URL:http://partneradvantage.sun.com/protected/solaris10/adoptionkit/tech/zfs/zfs—overview.pdf, 13 pages.
Bonwick, “ZFS The Last Word in File Systems,” [Online] [Retrieved on Jan. 22, 2008] Retrieved from the Internet: URL:http://opensolaris.org/os/community/zfs/docs/zfs.pdf, 34 pages.
Bott, “Windows XP Backup Made Easy,” [Online] [Retrieved on Jul. 7, 2009]; Retrieved from the Internet URL: http://www.microsoft.com/windowsxp/using/setup/learnmore/bott—03july14.mspx, 4 pages.
Charles Rubin, Mary Millhollon and Katherine Murray, “Microsoft Office Word 2003, Official Manual”, First Edition, Japan, Nikkei BP Softpress, Jul. 12, 2004, vol. 1, p. 300, 815-818.
Chen et al., “Data Redundancy and Compression Methods for a Disk-based Network Backup System”, 2004, IEEE, pp. 1-8.
Engst, “Retrospect 6.0: Powerful Backup Program Adds Panther Compatibility and Enterprise Features,” [Online] [Retrieved on Jul. 8, 2009]; Retrieved from the Internet URL: http://www.macworld.com/article/31038/2004/06/retrospect6x0.html, 8 pages.
European, Communication pursuant to Article 94(3) EPC for Application No. EP 07 813 540.7, dated Jun. 23, 2009, 2 pages.
European Extended European Search Report and Written Opinion, European Application No. 11171738.5, Aug. 29, 2011, 5 pages.
European, Communication pursuant to Article 94(3) EPC for Application No. EP 07 799 899.5, dated May 14, 2009, 2 pages.
European, Communication pursuant to Article 94(3) EPC for Application No. EP 07 799 899.5, dated Oct. 7, 2009, 4 pages.
Examination Report from European Application No. 07 813 540.7 dated Oct. 27, 2011, 5 pages.
Examination Report from European Application No. 07 813 605.8 dated Oct. 27, 2011, 5 pages.
Extended European Search Report, European Application No. 11184579.8, Nov. 17, 2011, 6 pages.
Godfrey, Michael et al., “Using Original Analysis to Detect Merging and Splitting of Source Code Entities,” IEEE Transactions on Software Engineering, vol. 31, No. 2. Feb. 2005. pp. 166-181.
Griffiths, “Leopard first looks: Time Machine,” Aug. 8, 2006 [Online] [Retrieved on Nov. 23, 2007] Retrieved from the Internet: URL:http://www.macworld.com/2006/08/firstlooks/leotimemac/index.php?pf=1, pp. 1-2.
Harder, “Microsoft Windows XP System Restore,” [Online] [Retrieved on Jul. 7, 2009] Retrieved from the Internet URL: http://msdn.microsoft.com/en-us/library/ms997627.aspx, 8 pages.
In-link files, The Open Group Base, Specifications Issue 6 [online]. IEEE Std 1003.1, 2004 Edition. [retrieved on Apr. 6, 2011]. Retrieved from the Internet:URL:http://pubs.opengroup.org/onlinepubs/009695399/utilities/In.html, 5 pages.
International Search Report and Written Opinion, PCT/US2007/074653, Aug. 14, 2008, 14 pages.
International Search Report and Written Opinion, PCT/US2007/074729, Jul. 12, 2007, 11 pages.
International Search Report and Written Opinion, PCT/US2007/074863 Apr. 21, 2009, 20 pages.
International Search Report and Written Opinion, PCT/US2007/074881, Jul. 12, 2007, 11 pages.
International Search Report and Written Opinion, PCT/US2008/065146, Oct. 31, 2008, 21 pages.
International Search Report and Written Opinion, PCT/US2008/066212, Mar. 9, 2009, 26 pages.
Microsoft Corporation, “Description of the AutoRecover Functions in Excel,” [online] Microsoft Corporation, Aug. 10, 2007, Article ID 289273; URL: http://support.microsoft.com/kb/289273/en-us.
Microsoft Technet: “Restore a previous version of a file,” Jan. 21, 2005, [Online] [Retrieved on Oct. 20, 2011] Retrieved from the Internet URL: http://technet.microsoft.com/en-us/library/cc778220(d=printer,v=WS.10).aspx , pp. 1-2. (OA May 26, 2014).
Microsoft-TechNet, “Using Encrypting File System,” Nov. 3, 2005, Microsoft, 40 pages.
Moorthy, “Linux Crontab: 15 Awesome Cron Job Examples,” TheGeekStuff.com, Jun. 11, 2009, retrieved on Dec. 23, 2013, http://www.thegeekstuff.com/2009/06/15-practical-crontab-examples/, 6 pages.
Office Action dated Feb. 29, 2012 from related Chinese Application No. 200880024710.0, 11 pages.
Posey, Brien M., “Working with the Windows Server 2003 Volume Shadow Copy Service”. Published Jun. 24, 2004. http://www.windowsnetworking.com/articles—tutorials/Windows-Server-2003-Volume-Shadow-Copy-Service.html.; 11 pages.
Shi et al., “USP: A Lightweight File System Management Framework,” 2010 Fifth IEEE International Conference on Networking, Architecture, and Storage, 2010 IEEE, pp. 250-256.
Sun Microsystems, Inc., “ZFS On-Disk Specification,” Draft: Dec. 9, 2005, [Online] [Retrieved on Jan. 22, 2008]; Retrieved from the Internet URL: http://opensolaris.org/os/community/zfs/docs/ondiskformat0822.pdf, 55 pages.
Tittel, “An EAZ Way to Restore Crippled and Inoperable Systems,” ChannelWeb, Apr. 25, 2005, [Online] [Retrieved on Aug. 13, 2008] Retrieved from the Internet URL: http://www.crn.com/white-box/161502165, 10 pages.
Wang et al., “A Secure and Efficient Desktop Backup and Recovery System”, 2007, IEEE, pp. 304-309.
Related Publications (1)
Number Date Country
20140365479 A1 Dec 2014 US
Continuations (1)
Number Date Country
Parent 11760588 Jun 2007 US
Child 14468165 US