User interface for electronic backup

Information

  • Patent Grant
  • 10891020
  • Patent Number
    10,891,020
  • Date Filed
    Thursday, April 28, 2016
    8 years ago
  • Date Issued
    Tuesday, January 12, 2021
    3 years ago
Abstract
Systems and methods are provided for storing and restoring digital data. A method includes receiving, a first user input requesting that a backup interface be displayed, displaying the backup interface, the backup interface including a display area for presenting at least a first visual representation of an earlier version of a current view and a visual representation of the current view, the earlier version including a first element, receiving, while the backup interface is displayed, a second user input requesting that the current view be modified according to the earlier version, at least with regard to the first element, animating the modification of the first element as moving from the visual representation of the earlier version to the visual representation of the current view, and modifying, in response to the second user input, the current view according to the earlier version, at least with regard to the first element.
Description
TECHNICAL FIELD

The disclosed implementations relate generally to storing and restoring digital data.


BACKGROUND

Modern graphical user interfaces allow a large number of graphical objects or items to be displayed on a display screen at the same time. Operating systems, such as Apple Mac OS®, provide user interfaces in which a number of windows can be displayed, overlapped, resized, moved, configured, and reformatted according to the needs of a user or a particular application. Taskbars, menus, virtual buttons and other user interface elements provide mechanisms for accessing and activating windows even when they are hidden behind other windows.


With the sophisticated tools available, users are encouraged not only to create and save a multitude of items in their computers, but also to revise or otherwise improve on them over time. For example, a user can work with a certain file and thereafter save its current version on a storage device. The next day, however, the user could have had second thoughts about the revisions, or could have come up with new ideas, and therefore opens the file again.


The revision process is usually straightforward if the user wants to add more material to the file or make changes to what is there. However, it is typically more difficult for a user to revert a file back to an earlier state if the user has changed his/her mind about modifications that were previously made. Application programs for word processing typically let the user “undo” previous edits of a text, at least up to a predefined number of past revisions. The undo feature also usually is configured so that the previously made revisions must be undone in reverse chronological order; that is, the user must first undo the most recently made edit, then the second-most recent one, and so on. If the user saves and closes the document and thereafter opens it again, it may not be possible to undo automatically any previous edits.


SUMMARY

Systems and methods are provided for storing and restoring digital data. In general, in one aspect, a method is provided. The method includes receiving, while a current view is displayed in a user interface, a first user input requesting that a backup interface be displayed, displaying the backup interface, the backup interface including a display area for presenting at least a first visual representation of an earlier version of the current view and a visual representation of the current view, the earlier version including a first element, receiving, while the backup interface is displayed, a second user input requesting that the current view be modified according to the earlier version, at least with regard to the first element, animating the modification of the first element as moving from the visual representation of the earlier version to the visual representation of the current view, and modifying, in response to the second user input, the current view according to the earlier version, at least with regard to the first element. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media.


Implementations of the aspect can include one or more of the following features. Animating the modification can further includes lifting a copy of the first element from the visual representation of the earlier version, maintaining the position of the copy of the first element while animating the visual representations such that the visual representation of the earlier version falls away and the visual representation of the current view is presented, and adding the copy of the first element to the visual representation of the current view. The aspect can further include displaying the current view in the user interface, where the current view includes the modification of the first element.


In general, in one aspect, a method is provided. The method includes receiving, while a current view is displayed in a user interface, a first user input requesting that a backup interface be displayed and displaying the backup interface, the backup interface including a display area for presenting at least a first visual representation of an earlier version of the current view and a visual representation of the current view, the backup interface further including a timeline, where the timeline represents a plurality of visual representations of earlier versions of the current view. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media.


Implementations of the aspect can include one or more of the following features. Displaying the backup interface can include displaying a timeline including a vertical column of tick marks. The timeline can be a condensed timeline that includes a plurality of condensed tick marks, where each condensed tick mark represents multiple individual tick marks. The timeline can animate in response to a user input. The animation can be based on a cursor position.


The animation can further include determining an identified tick mark, the identified tick mark having a shortest distance from a cursor position and expanding the timeline to display individual tick marks relative to the identified tick mark. Displaying the individual tick marks can include magnifying the identified tick mark. A date can be displayed corresponding to the earlier version of the current view represented by the identified tick mark.


The aspect can further include determining that the cursor position has moved, determining a next identified tick mark relative to the cursor position, and magnifying the next identified tick mark. The aspect can further include receiving an input selecting the identified tick mark, displaying the visual representation of an earlier version of the current view corresponding to the identified tick mark, and compressing the timeline to the condensed timeline.


In general, in one aspect, a method is provided. The method includes displaying a backup interface in a user interface, the backup interface including a display area for presenting a plurality of visual representations of an earlier version of the current view and a visual representation of the current view, and displaying a timeline, the timeline including a series of steps and including one or more compressed portions and an expanded portion where each step in a compressed portion is associated with one or more earlier versions of the current view, and each step in an expanded portion is associated with only a single earlier version of the current view or the current view. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media.


Implementations of the aspect can include one or more of the following features. Each step can have a visible representation in the timeline and includes a tick mark. A tick mark associated with a compressed portion of the time line can be larger than a tick mark associated with an expanded portion of the timeline.


Particular embodiments of the subject matter described in this specification can be implemented to realize one or more of the following advantages. Users can focus in and identify particular snapshots from a timeline of tick marks representing one or more snapshots. A restoration animation provides users with visual cues to the restoration of an item from a history view.


The details of the various aspects of the subject matter described in this specification are set forth in the accompanying drawings and the description below. Other features, aspects, and advantages of the invention will become apparent from the description, the drawings, and the claims.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of an example system.



FIG. 2 is a block diagram of an example architecture for the back up and restoration of data.



FIG. 3 is a flow chart of an example method for restoring an item in a backup interface.



FIGS. 4-12 are screenshots depicting an example restoration animation using a backup interface.



FIG. 13 is a flow chart of an example method for selecting a history view from a timeline.



FIGS. 14-23 are screenshots depicting an example timeline animation.



FIG. 24 shows an example of tick mark expansion.





DETAILED DESCRIPTION


FIG. 1 is a block diagram of a system 100. The system 100 can allow a user to search a captured version of an interface view, perhaps to initiate a restoration based on it. As used herein, a view refers to an item, element, or other content, capable of being stored and/or retrieved in an interface, which can be subjected to a backup operation by a backup component 117. For example, a user interface view can contain any number of icons, files, folders, application state information and/or machine state information, preferences, etc.


The system 100 includes a personal computer 102 communicatively coupled to a remote server 107 via a network interface 116 and a network 108 (e.g., local area network, wireless network, Internet, intranet, etc.). The computer 102 generally includes a processor 103, memory 105, one or more input devices 114 (e.g., keyboard, mouse, etc.), and one or more output devices 115 (e.g., a display device). A user interacts with the system 100 via the input and output devices 114, 115. The system 100 includes various hardware elements. The system 100 can include hardware, software, and combinations of the two.


The computer 102 also includes a local storage device 106 and a graphics module 113 (e.g., a graphics card) for storing information and generating graphical objects, respectively. The local storage device 106 can be a computer-readable medium. The term “computer-readable medium” refers to any medium that includes data and/or participates in providing instructions to a processor for execution, including without limitation, a machine-readable storage device such as non-volatile media (e.g., optical or magnetic disks) and volatile media (e.g., memory). The computer-readable medium also includes transmission media. Transmission media includes, without limitation, coaxial cables, copper wire, fiber optics, and computer buses. Transmission media can also take the form of acoustic, light or radio frequency waves.


While modifications of a user interface view are described herein with respect to a personal computer 102, it should be apparent that the disclosed implementations can be incorporated in, or integrated with, any electronic device that has a user interface, including without limitation, portable and desktop computers, servers, electronics, media players, game devices, mobile phones, email devices, personal digital assistants (PDAs), embedded devices, televisions, other consumer electronic devices, etc.


Systems and methods are provided for searching stored contents that correspond to earlier versions of system information, application information, or system, application, or user interface state. The systems and methods can be stand-alone or otherwise integrated into a more comprehensive application. In the materials presented below, integrated systems and methods are provided for viewing and modifying an interface view (e.g., a user interface view).


Though discussion is made with reference to modifying a user interface view, those of ordinary skill will recognize that such a view can be based on various data structures, files, processes, and other aspects of information management. It follows that modification to file structures, data and the like is also contemplated in order to achieve the modification to the user interface view. In other words, while the restoration of the user interface view from one state to another can be the most apparent change from the user's perspective, this is accomplished through the corresponding changes in the underlying system content.


One of ordinary skill in the art will recognize that the engines, methods, processes and the like that are described can themselves be an individual process or application, part of an operating system, a plug-in, an application, or the like. In one implementation, the system and methods can be implemented as one or more plug-ins that are installed and run on the personal computer 102. The plug-ins are configured to interact with an operating system (e.g., MAC OS® X, WINDOWS XP, LINUX, etc.) and to perform the various functions, as described below.


A system and method for modifying a user interface view can also be implemented as one or more software applications running on the computer 102. Such a system and method can be characterized as a framework or model that can be implemented on various platforms and/or networks (e.g., client/server networks, wireless networks, stand-alone computers, portable electronic devices, mobile phones, etc.), and/or embedded or bundled with one or more software applications (e.g., email, media player, browser, etc.).


The computer 102 includes the backup component 117 that allows for the storage of versions of the computer's files or other items (e.g., restoring a view including past state of a file, application, application data, parameters, settings, and the like), for example within the local storage 106 or in an external storage repository. In one implementation, the backup component 117 also allows a user to select any of the stored versions and use it to initiate a restoration of backup data corresponding to that version in the computer 102.


In some implementations, the computer 102 can include a search component 118 that allows for searches of the computer's files or other items, for example within the local storage 106 or an external storage repository. In one implementation, the search component 118 can interact with the backup component 117 to perform searches of stored versions of the computer's files and other items. Particularly, in one implementation, the search component 118 provides that a user can select search results identified in an earlier version and use them to initiate a restoration of that version in the computer 102. This means that when a user searches for a file but the file is not found, the user can invoke the backup component 117 (or a portion thereof) to show one or more previous states of, for example, the C: drive or some other system resource. For example, if the user is looking for content of the C: drive (that does not currently hold the sought file), the user (or the computer) can launch a backup component to look at previous states of the C: drive to see if the file has been archived. This operation can be facilitated by the search environment forwarding information (e.g., an identity of the sought file) to the backup environment for showing the correct archive(s).



FIG. 2 is a block diagram of an example architecture 200 for the back up and restoration of data. The data can include, e.g., application files, application data, settings, parameters or the like, such as those associated with a set of applications 228. The backup component 117 provides back up and restoration capability for the system 100. Many different items or elements can be the subject of a backup operation in the system 100. For example, folders, files, items, information portions, directories, images, system parameters, playlists, address books, e-mails, e-mail folders, a state of an application or state of the system, preferences (e.g., user or system preferences), and the like all can be candidates for archiving. Other types of data can be included in backup operations.


In this example, the backup component 117 includes a local storage device 204 and an external storage device 232. Backup data can be stored on either. Any number of local and/or external storage devices can be used by the backup component 117 for storing backup data corresponding to the versions. In one implementation, no local storage is provided. In one implementation, the backup component 117 stores the backup data in a format corresponding to a file system structure.


In one implementation, one copy of original data (e.g., folders, files, items, information portions, directories, images, system parameters, playlists, address books, e-mails, e-mail folders, application states, preferences, and the like) is stored in the system as backup data (e.g., an original version of the data). When one or more subsequent sets of backup data, or versions, of the data are generated through subsequent backup operations, the backup data can contain only the differences between a current data version and the prior backup data, thereby saving storage space. In some implementations, the storage devices 204 and 232 can be used to store the original backup data as well as links pointing to the original backup data. The links can be hard links which reference, or point to, physical data, or as another example can be symbolic links that reference another file on the storage device (e.g., by name or location).


In one implementation, the backup component 117 runs as a background task on an operating system 230, where the task is generally not visible to the user. The backup component 117 can be configured to run across multiple user accounts. In another implementation, the backup component 117 runs within an application 228 in the user space.


The backup component 117 includes an activity monitoring engine 212. In one implementation, the activity monitoring engine 212 monitors for changes within an application view (e.g., application files or state) that are targeted for inclusion in backup operations. A change can also include the addition of new files or data (e.g., files or other data structures) or deletion of the same.


In one implementation, the activity monitoring engine 212 is capable of discerning between a substantive change (e.g. the text within a document has been modified) and a non-substantive change (e.g. the play count within an iTunes playlist has been updated, or several changes cancel each other out) through its interaction with the applications 228. The activity monitoring engine 212 can create, for example, a list of modified elements (e.g., files) to be used when a backup operation is eventually triggered. In one implementation, the activity monitoring engine 212 can monitor the system for periods of inactivity. The activity monitoring engine 212 can then trigger a backup operation during a period of time in which the backup operation will not cause a system slowdown for an active user.


A preference management engine 214 specifies some operating parameters of the backup component 117. In one implementation, preference management engine 214 contains user-specified and/or system default application parameters for the backup component 117. These can include settings for the details of capturing and storing the views. For example, the preference management engine 214 can determine the frequency of the backup operations, the storage location for the backup data, the types of elements (e.g. files or other items) that are eligible for inclusion in backup operations, and the events which trigger a backup operation (periodic or event-driven, etc.).


In one implementation, the preference management engine 214 can detect when a new storage device is being added to the system and prompt the user to specify whether it should be included as a backup repository. Files and other items can be scheduled for a backup operation based on location (e.g. everything on lettered drives such as C: drive and within D:/photos, or named drives such as “MyBigDisk” drive or within named directories such as within “/ExtraStorage/Photos”, thus reference in this specification to drives is not limited to lettered drives or paths), a correlation with specific applications (e.g. all pictures, music, e-mail in an inbox, an address book and system settings), or a combination of strategies. Different types of items can be scheduled to be stored on different devices or on different segments of a storage device during a backup operation.


A backup management engine 216 coordinates the collection, storage, and retrieval of views performed by the backup component 117. For example, the backup management engine 216 can trigger the activity monitoring engine 212 to watch for activities that satisfy a requirement specified in the preference management engine 214 for initiating a backup operation.


A change identifying engine 218 locates specific elements (e.g., monitored files or other items within) the system 200 to determine if they have changed. The change identifying engine 218 can be capable of discerning a substantive change from a non-substantive change, similar to the example described above for the activity monitoring engine 212. In one implementation, the change identifying engine 218 traverses a target set of elements (e.g., files, data, or other items), comparing a previous version to the current version to determine whether or not a modification has occurred.


A backup capture engine 220 locates views (e.g., elements, files, data, or other items) that are to be included in a backup. The backup capture engine 220 can invoke the activity monitoring engine 212 and/or the change identifying engine 218, for example, to generate a capture list identifying data to be included in a next backup operation. The backup capture engine 220 can then store copies of the listed data in one or more targeted storage repositories. The backup capture engine 220 can track multiple versions of the data included in the backup repository.


The backup component 117 includes a backup restoration engine 222 to restore previous versions of views (e.g., files, data, or other items). In one implementation, the backup restoration engine 222 provides a user interface (e.g., a graphical user interface) where a user can select the item(s) to be restored.


The backup component 117 includes an animation management engine 234. The animation management engine 234 performs or otherwise manages animations occurring within a user interface generated by the backup component 117. For example, the animation management engine 234 can animate a timeline of captured earlier versions stored by the backup component 117. Such animation can give an overview of the archive data that is available and can help a user in choosing a particular backup version to restore.


The search component 118 can search directly within the one or more applications 228 for a current state or version of the files or other items. In addition, the search component 118 can search earlier versions of the files and other items using the backup component 117. For example, the search component 118 can provide a search interface within a backup user interface that allows searches of earlier versions of the files or other items. In addition, the search component 118 can provide a search interface within a user interface (e.g., a desktop user interface) that allows searches of the current version of the files or other items.


For example, the search component 118 can be used to initiate a search to find a particular item or element, such as an image file. If this search finds the sought item, and if the item meets the user's expectations, there may be no need to do any further searching at that time. However, if the search does not find the sought item, or if the item that is found does not meet the user's expectations, the user can choose to perform a search of historical views. The user can activate the backup user interface to search the historical views.



FIG. 3 is a flow chart of an example method 300 for restoring an item in a backup interface. For convenience, the method 300 will be described with respect to a system (e.g., system 100) performing the method 300. The system initiates (302) a backup interface. In some implementations, a user can initiate a backup interface from a user interface (e.g., a desktop user interface). For example, a backup interface icon can be provided in the user interface (e.g., by the backup component 117). Alternatively, the backup component can initiate the backup interface in response to a user selected menu item. For example, using a drop down menu in the user interface.


In some implementations, the desktop user interface includes one or more windows. The windows can provide, for example, a current view of an open application (e.g., a user interface of the current application state) or a current view of a navigation interface (e.g., for navigating a file system, for example, of local storage 106). The user can initiate the backup interface within an active window of the user interface, e.g., from a particular application or navigation interface.


A backup interface icon or menu option can allow a user to enter the backup interface with respect to the active window. For example, a user can enter the backup interface from a navigation interface providing a particular view of the file system in order to search for a missing or earlier version of an item (e.g., a file or folder).


The system displays (304) the backup interface. The backup interface can include multiple history views with respect to the current view. The history views can be visual representations of the backup data presented in the history view. In some implementations, the history views are presented as snapshots. A snapshot, as used herein, can refer to a backup element stored in an archive that includes a backup of selected items or content as specified by the backup component 117. A snapshot can also represent the current view in the backup interface. In some implementations, the snapshots are arranged in a cascading stack, where each next snapshot moving through the stack corresponds to a point in time further in the past relative to the current view (e.g., presented at the top of the stack).


For example, if the user activated the backup interface from an interface of a particular application, each snapshot can provide a visual representation of the application's user interface corresponding to the state when the corresponding backup occurred. Similarly, if the user activated the backup interface from a particular point in the file system using the navigation interface, the snapshots can provide representations of the navigation interface at particular points in time. As a result, the user can visually identify items in snapshots for restoration or restore an entire state (e.g., of an application) represented by the snapshot.


The system receives (306) an input to display a particular snapshot. The user can navigate between snapshots in the backup interface. For example, the user can use navigation buttons (e.g., arrow buttons) to move forward or backward though the snapshots. Alternatively, the user can select a particular snapshot directly in the stack using, for example, an input device (e.g., a mouse) to move a cursor to a particular snapshot and then select the snapshot. In other implementations, the snapshots can be represented in other ways, for example, as a timeline of tick marks within the backup interface. The user can select a particular tick mark to select a specific snapshot (as described in greater detail below). When the user selects a particular snapshot, the selected snapshot is presented as a current snapshot at the top of the stack of snapshots.


The system receives (308) an input to restore an item in the particular displayed snapshot. For example, a user can enter the backup interface from a navigation interface in order to restore an earlier version of a particular file. Once the user identifies the particular earlier version of the file in a selected snapshot (e.g., corresponding to an earlier time prior to some edits to the file that the user wishes to undo), the user can select the file for restoration. Similarly, the user can select other aspects in the snapshot, for example, presented application data (e.g., mail messages in snapshots of an e-mail application interface, songs from a music management application) as well as state information for a collection of data represented by the snapshot (e.g., a state of an application).


The user can select the file, for example, by selecting the file in the snapshot with an input device. The selected item can be identified, for example, by highlighting the item in the snapshot. The user can then select a restore control to activate a restoration process for the selected file.


In some implementations, the system animates (310) a restoration of the selected item to the current view. For example, the system can animate the item by lifting a copy of the item off of the selected snapshot and transporting the item forward in time to the snapshot representing the current state. One example animation is described with respect to FIGS. 4-12 below.


The system restores (312) the item to a current view and exits the backup interface. For example, if the restored item exists in the current view (e.g., when restoring an earlier version of the item), the restored item can replace the existing item in the current view (e.g., the exiting item is deleted and replaced with the restored item). Alternatively, the restored item can be separately saved (e.g., under a different filename). Alternatively, if the item does not exist in the current view (e.g., restoring an item that was deleted from the current view), then the copy of the restored item can simply be copied, e.g., to a location corresponding to the current view.



FIGS. 4-12 are screenshots depicting an example restoration animation using a backup interface.



FIG. 4 shows an example user interface 400 prior to entering a backup interface. The user interface 400 can include a number of windows representing, for example, active applications or open navigation interfaces. In this example, a current view of a navigation interface 402 is displayed in a window in the user interface 400. In particular, the navigation interface 402 shows a view of a portion of a file system including a navigable hierarchy in a navigation pane and a list of items in a display pane, respectively. The listed items can be files, folders, or other items associated with the particularly selected portion of the file system hierarchy. The display pane includes, for example, file 406. File 406 can be a current version of a file where, for example, the user wishes to restore an earlier version. Alternatively, the user could enter the backup interface from the user interface 400 to search for an item was missing from the navigation interface 402.


With the navigation interface 400 as the active window, the user can launch the backup user interface by, for example, selecting a backup option from a menu 404 of the user interface 400 or using an icon or menu item associated with the navigation interface 402.



FIG. 5 shows an example backup interface 500. The backup user interface includes snapshots 502, timeline 504, navigation controls 506a-b, and a control bar 508 including, for example, a “cancel” control 510, an “only show changes” control 512, and a “restore” control 514. The control bar 508 can also include a date display 516, which displays the date of the topmost snapshot of snapshots 502.


The “cancel” control 510 can allow the user to cancel the restoration of one or more files or items. In some implementations, canceling a restoration will also lead to exiting the backup interface and returning, for example, to the user interface 400 of FIG. 4. The “restore” control 514 can allow a user to restore a selected item in a snapshot to the current view (e.g., to the current view of the file system).


In some implementations, the “restore” control 514 can be used to restore the entire contents of the selected snapshot e.g., restore the current file system state with all the files or items in a currently selected snapshot. The “only show changes” control 512 can allow a user to select whether or not snapshots without changed items will be presented in the backup interface. In some implementations, the “only show changes” control 512 can be toggled to display a “show all” control.


In FIG. 5, the current snapshot 520 (e.g., the topmost snapshot) represents the current view of the navigation interface 402. Thus, the date display 516 displays the date of the snapshot as “Today (Now)”. Additionally, the contents of the current snapshot 520 correspond to the contents presented in the navigation interface 402, in particular, the snapshot 520 includes the item 406.



FIG. 6 shows an animation of the backup interface 500 when a user selects a particular snapshot. The user can select a particular snapshot, e.g., in the stack of snapshots 502. The backup interface can animate the snapshots 502 such that they appear to move forward to display the selected snapshot as the current snapshot (displayed on top of the stack). For example, the user can navigate to snapshots using the navigation controls 506a-b. Alternatively, the user can select a snapshot directly by selecting from the snapshots 502 or the timeline 504.


During the animation, snapshots between the current snapshot and selected snapshot can appear to move forward and dissolve in sequence. Thus, as shown in FIG. 6, the current snapshot 520 is shown as partially transparent as it moves forward. The current snapshot 520 is also shown larger to appear closer in space. In some implementations, the animated snapshots move in front of the control bar 508 and navigation buttons 506.



FIG. 7 shows the backup interface 500 with the selected snapshot as the current snapshot 720. The current snapshot 720 represents a history view taken on the current day, but at 6:00 PM, as shown in the date display 516. The selected snapshot includes particular contents associated with the navigation interface, including item 706. The item 706 represents an earlier version of the item 406 of the current state of the navigation interface 402 shown in FIG. 4. The item 706 is shown as selected by the user (e.g., highlighted).



FIG. 8 shows the backup interface 500 as the user initiates a restore of the item 706 to the current view. The user has selected the “restore” control 514, now shown as highlighted.



FIG. 9 shows the backup interface 500 during an animation of the item 706 while restoring the item 706. In the animation of the item 706, a copy of the item 706 appears to lift away from the snapshot 720. The snapshots 702 animate backward to the snapshot representing the current view. While the snapshots 702 animate backward, the item 706 appears to remain in place. Consequently, the item 706 appears to move forward through the snapshots 702 to the current view.



FIG. 10 shows the backup interface 500 where the item 706 has been placed in the snapshot 520 representing the current view. Also shown in the snapshot 706 is the current version of the item 406. As shown in FIG. 11, the item 706 has replaced the current version of the item 406 indicating that the item 706 has been restored to the current view, replacing the item 406. Once the item 706 has been restored to the current view, the backup interface 500 exits.



FIG. 12 shows the user interface 400 after the backup interface 500 exits. The user interface 400 again shows the navigation interface 402, however, the item 406 has now been replaced with the item 706, which was restored by the backup component.



FIG. 13 is a flow chart of an example method 1300 for restoring an item in a backup interface. For convenience, the method 1300 will be described with respect to a system (e.g., system 100) performing the method 1300. The system initiates (1302) a backup interface. In some implementations, a user can initiate a backup interface from a user interface (e.g., a desktop user interface). For example, a backup interface icon can be provided in the user interface (e.g., by the backup component 117). Alternatively, the backup component can initiate the backup interface in response to a user selected menu item. For example, using a drop down menu in the user interface. The system can initiate the backup interface using techniques similar to those described above with respect to FIG. 3.


The system displays (1304) the backup interface. The backup interface can include multiple history views with respect to the current view. The history views can be visual representations of the backup data presented in the history view. In some implementations, the history views are presented in the form of snapshots. The snapshot can also represent the current view in the backup interface. In some implementations, the snapshots are arranged in a cascading stack, where each next snapshot moving through the stack corresponds to a point in time further in the past relative to the current view (e.g., presented at the top of the stack), as described above.


For example, if the user activated the backup interface from an interface of a particular application, each snapshot can provide a visual representation of the application's user interface corresponding to the state when the corresponding backup occurred. Similarly, if the user activated the backup interface from a particular point in the file system using the navigation interface, the snapshots can provide representations of the navigation interface at particular points in time. As a result, the user can visually identify items in snapshots for restoration or restore an entire state (e.g., of an application) represented by the snapshot.


The backup component can represent snapshots in the backup interface in other ways, for example, as a timeline of markers (e.g., tick marks) within the backup interface. The user can select a particular tick mark to select a specific snapshot. When a user selects a particular snapshot, the selected snapshot is presented as a current snapshot at the top of the stack of snapshots.


The system determines (1306) a cursor position relative to the timeline. For example, the position of a cursor can be determined as it changes position within the backup interface (e.g., corresponding to a user movement of a mouse device). The position can be determined, for example, according to a pixel location of the cursor relative to the pixels forming the timeline in the backup interface. Additionally, the movements of the cursor within the backup interface can be tracked by the backup component.


The system animates (1308) the timeline based on the determined cursor position. For example, the backup component can provide a dynamic animation of the timeline that is responsive to cursor position. For example, the timeline can expand as the cursor approaches a particular region of the timeline. The expansion can include enlarging the timeline as well as increasing the number of tick marks to enhance resolution. For example, a condensed tick mark in the timeline, before expansion, can represent multiple tick marks where each of the condensed tick marks corresponds to a particular history view. That single tick mark can expand to the multiple tick marks as the cursor approaches in order to display the underlying tick marks. Each of the underlying tick marks can correspond to a particular history view. In some implementations, a date can be displayed for the history view corresponding to a closest proximity tick mark (with reference to the cursor).


In some implementations, the system automatically scrolls the timeline toward the center if the cursor position is near either end of the timeline. For example, if the system determines a cursor position at a top edge of the timeline, the animation can scroll the timeline and cursor downward by some amount. The cursor is scrolled with the timeline to maintain the positional relationship between a particular tick mark and the cursor. In some implementations, the scroll is only enough to allow nearby tick marks to expand fully during the animation. In other implementations, the scroll brings the cursor, and corresponding point in the timeline to the vertical center of the interface.


The system receives (1310) input selecting a tick mark in the timeline. For example, once the user has identified a specific tick mark, the tick mark can be selected using the input device. For example, the user can identify the particular tick mark for selection according to the displayed date information associated with the tick mark. The user can then select the tick mark in order to view the associated history view (e.g., as a snapshot).


The system displays (1312) a history view corresponding to the selected tick mark. For example, when the user selects a tick mark corresponding to a particular history view, the history view can be presented in the backup interface as the current snapshot (e.g., a topmost snapshot) in the backup interface. The user can then view or select, or otherwise navigate the items in the snapshot. In some implementations, the user can restore one or more selected items or the entire view to the current view. Alternatively, the user can select a new snapshot to view, e.g., using the timeline.



FIGS. 14-23 are screenshots depicting an example timeline animation.



FIG. 14 shows a backup interface 1400. The backup user interface includes snapshots 1402, timeline 1404, navigation controls 1406a-b, and a control bar 1408 including, for example, a “cancel” control 1410, an “only show changes” control 1412, and a “restore” control 1414. The control bar 1408 can also include a date display 1416, which displays the date of the topmost snapshot of snapshots 1402.


The “cancel” control 1410 can allow the user to cancel the restoration of one or more files or items. In some implementations, canceling a restoration will also lead to exiting the backup interface and returning, for example, to a desktop user interface (e.g., user interface 400 of FIG. 4). The “restore” control 1414 can allow a user to restore a selected item in a snapshot to the current view (e.g., to the current view of the file system).


In some implementations, the “restore” control 1414 can be used to restore the entire contents of the selected snapshot e.g., restore the current file system state with all the files or items in a currently selected snapshot. The “only show changes” control 1412 can allow a user to select whether or not snapshots without changed items will be presented in the backup interface. In some implementations, the “only show changes” control 1412 can be toggled to display a “show all” control.


In FIG. 14, the current snapshot 1420 (e.g., the topmost snapshot) represents the current view of the navigation interface. Thus, the date display 1416 displays the date of the snapshot as “Today (Now)”. Additionally, the contents of the current snapshot 1420 correspond to the contents of the navigation interface 1402, in particular, the snapshot 1420 includes the item 1406.



FIG. 15 shows a portion of the backup interface 1400 focusing on the timeline 1402. In addition, FIG. 15 shows a condensed state of the timeline 1402 in which the entire timeline is shown (e.g., tick marks representing all available snapshots in the backup component). In some implementations, the timeline 1402 is represented as a vertical column of timeline items, referred to here as tick marks. Each tick mark represents one or more snapshots. In some implementations, the timeline arranges tick marks beginning from the bottom with a tick mark representing the current view (e.g., the current state of the file system as shown in the navigation interface). Moving up the timeline 1402 from the current view are tick marks representing snapshots from the most recent to the oldest available snapshot. Other layouts of the timeline in the backup interface are possible.


One or more tick marks can include data labels at various positions in the timeline 1402. For example, the timeline 1402 labels the current view in FIG. 15 as “now”. Other tick marks can include labels representing months and years, e.g., “January 2003” and “May 2007”. Thus, the timeline 1402 encompasses a range from a first snapshot taken in January 2003 to the present state in June 2007.


In some implementations, there is a limit to the number of tick marks that can be presented in the timeline 1402. For example, if each tick mark is represented by a horizontal line having a height of two pixels and each tick mark is separated by a space having a height of 10 pixels, 100 tick marks would require 1190 vertical pixels. Consequently, timeline 1402, in an compressed state, can include compressed tick marks that are associated with multiple snapshots. In some implementations, the spacing between tick marks in the timeline 1402 is variable. For example, as snapshots are added during backup operations, the corresponding tick marks are added to the timeline 1402. As the number increases, the spacing between each tick mark can be reduced, e.g., incrementally until a minimum pixel spacing is reached.


The backup component can determine a compression for the timeline when there are more individual tick marks than vertical space in the backup interface. Those individual tick marks can be compressed according to specified criteria. In one implementation, the compression initially calculates two timelines. The first represents the maximum number of tick marks that can fit in the available space using the minimal spacing between tick marks. The first timeline will be the final timeline. The backup component calculates the second timeline by reducing the spacing until all of the tick marks fit within the total available space.


The backup component then calculates a span of each tick mark in the first timeline. The backup component calculates the span, for example, including determining two points based on the center point of the tick mark. In one implementation, the points define a distance plus or minus one-half the minimum spacing amount from the center point. Each tick mark in the first timeline spans either one or multiple tick marks in the second timeline. If a tick mark in the timeline spans only one tick mark, than the backup component replaces the tick mark with only that tick mark. However, if a tick mark in the first timeline spans multiple tick marks in the second timeline, than the backup component replaces the tick mark with a condensed tick mark that contains/references all of the spanned tick marks.



FIG. 16 shows an implementation of the timeline 1402 where the cursor has moved to a particular tick mark near the top of the timeline 1402 (e.g., corresponding to the oldest snapshots). In particular, the position of the cursor is between “January 2003” and “February 2003” data labels on the timeline 1402.


In some implementations, the backup component can delay the animation such that the cursor can reach a particular point in the timeline 1402 before animation occurs. Similarly, if all the snapshots are visible in the compressed timeline 1402 (e.g., each tick mark represents a single snapshot), then no animation need occur. Alternatively, the animation can begin when the cursor position is within a threshold distance relative to the timeline 1402.


As shown in FIG. 16, the animation has begun such that the tick marks in the timeline 1402 appear thicker. Additionally, they have expanded such that the bottom of the timeline 1402 does not extend to the most recent tick marks. Instead, the visible timeline 1402 now ends with a most recent date label of November 2005. A date display 1602 is presented, identifying the date of the snapshot in closest proximity to the cursor. For example, in FIG. 16, the date display 1602 reveals that the cursor is in closest proximity to a tick mark representing a snapshot dated “Thursday, Jan. 23, 2003 8:40 PM”.



FIG. 17 shows the timeline 1402 of FIG. 16 as the animation continues. The animation expands the timeline 1402 toward an expanded state in order present additional snapshots (and associated tick marks). As the timeline animates, the timeline 1402 can maintain the position of the tick mark closest to the cursor (e.g., the user maintains a cursor position over the same tick mark throughout the animation). Thus, the date display 1602 remains the same. In FIG. 17, the timeline has continued to expand such that the visible timeline has a range between January and August 2003. The tick marks between each month represented in the timeline 1402 have increased in height, appearing as blocks 1702.



FIG. 18 shows the timeline 1402 of FIG. 17 after additional animation. Specifically, in FIG. 18, the timeline has expanded further such that the earliest shown date label is April 2003 instead of August 2003. As a result, the vertical distance between date labels (e.g., months) has increased. Within that space, the tick mark blocks 1702 have increased in height and additional tick marks within those blocks are becoming visible. Additionally, the tick marks near the cursor position can expand horizontally such that the tick mark in closest proximity to the cursor is most prominent.



FIG. 19 shows the timeline 1402 after complete expansion of the timeline 1402 to a magnified state. The timeline has expanded so that each tick mark shown corresponds to a single snapshot. Thus, as shown in this example, there is a snapshot taken once a day so that there is a corresponding tick mark in the magnified state of the timeline 1402 for each day. Additionally, the backup component can apply a magnification to the tick mark corresponding to the cursor position. For example, the identified tick mark 1902, corresponding to the cursor position, is emphasized (e.g., enlarged) as compared to the other tick marks, for example, to enhance the identification of the selected tick mark.


In some implementations, the enlargement includes horizontal and vertical thickening of the identified tick mark 1902. In other implementations, the magnification also enlarges the tick marks adjacent to the identified tick mark 1902, though to a lesser extent (e.g., forming a bell curve shape with the selected tick mark 1902 in the center). The user can select the identified tick mark 1902 in order to display the corresponding snapshot in the backup interface.



FIG. 20 shows user navigation between tick marks while the timeline 1402 remains in the expanded state. The user can move the cursor (e.g., with the mouse) along the timeline 1420 to a different tick mark. As the cursor moves, the date (e.g., snapshot) in closest proximity to the cursor) changes accordingly. Additionally, in one implementation, the magnification of the tick mark identified by the cursor position dynamically moves with the cursor. For example, as shown in FIG. 20, the user has moved the cursor down the timeline 1402 to identify a tick mark 2002. The tick mark 2002 has a data 2004 of “Thursday, Feb. 13, 2003 8:40 PM”. Additionally, the timeline 1402 shows the identified tick mark 2002 in the enlarged state. The previously identified tick mark 1902 returned to an unmagnified state corresponding to the other tick marks in the timeline 1402.


When the user moves the cursor away from the timeline, for example, after selecting a particular snapshot for display or to navigate to a different portion of the timeline, the timeline returns to the condensed state.



FIGS. 21-23 show an example animation illustrating a gradual condensing of the timeline 1402 to the condensed state. In FIG. 21, the user has moved the cursor away from the timeline, initiating the animation. The tick marks begin to combine to form blocks in the timeline 1401. As the tick marks combine, more of the timeline 1402 becomes visible within the backup interface. Finally, the timeline 1402 returns to the condensed state shown in FIG. 23. In FIG. 23, the timeline 1402 includes the entire timeline 1402 representing all available backup snapshots.



FIG. 24 shows an example of tick mark expansion. FIG. 24 includes an example condensed timeline 2402, an expanded timeline 2404, and a magnified timeline 2406. In the condensed timeline 2402, each displayed tick mark represents multiple individual tick marks. The expanded timeline 2402 expands each tick mark in the condensed timeline 2402 to the underlying tick marks representing individual snapshots. For example, the compressed tick mark 2408 in the condensed timeline 2402 is expanded in the expanded timeline 2404 to five individual snapshots 2410. Additionally, because of the expansion, the overall timeline is longer in the expanded timeline 2404 as compared to the condensed timeline 2402. Finally, the magnified timeline 2406 includes the same number of tick marks as in the expanded timeline 2404, however, particular tick marks are magnified. For example, a tick mark 2412 can correspond to the tick mark associated with a cursor position. The tick mark 2412 is therefore magnified, becoming larger in height and/or width relative to the other tick marks. Additionally, the magnification can smoothly transition such that a specified number of adjacent tick marks to the tick mark 2412 are partially magnified according to proximity to the tick mark 2412.


In the above description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding. It will be apparent, however, to one skilled in the art that implementations can be practiced without these specific details. In other instances, structures and devices are shown in block diagram form in order to avoid obscuring the disclosure.


In particular, one skilled in the art will recognize that other architectures and graphics environments can be used, and that the examples can be implemented using graphics tools and products other than those described above. In particular, the client/server approach is merely one example of an architecture for providing the functionality described herein; one skilled in the art will recognize that other, non-client/server approaches can also be used. Some portions of the detailed description are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to convey most effectively the substance of their work to others skilled in the art. An algorithm is conceived here, and generally, to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.


It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.


An apparatus for performing the operations herein can be specially constructed for the required purposes, or it can comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program can be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.


The algorithms and modules presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems can be used with programs in accordance with the teachings herein, or it can prove convenient to construct more specialized apparatuses to perform the method steps. The required structure for a variety of these systems will appear from the description. In addition, the present examples are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages can be used to implement the teachings as described herein. Furthermore, as will be apparent to one of ordinary skill in the relevant art, the modules, features, attributes, methodologies, and other aspects can be implemented as software, hardware, firmware or any combination of the three. Of course, wherever a component is implemented as software, the component can be implemented as a standalone program, as part of a larger program, as a plurality of separate programs, as a statically or dynamically linked library, as a kernel loadable module, as a device driver, and/or in every and any other way known now or in the future to those of skill in the art of computer programming. Additionally, the present description is in no way limited to implementation in any specific operating system or environment.


It will be understood by those skilled in the relevant art that the above-described implementations are merely exemplary, and many changes can be made without departing from the true spirit and scope of the present invention. Therefore, it is intended by the appended claims to cover all such changes and modifications that come within the true spirit and scope of this invention.

Claims
  • 1. A method comprising: at a device including a display, an input device, a processor, and a non-transitory memory storing instructions that, when executed by the processor, cause: displaying, on the display, a backup interface, including concurrently displaying: a display area for presenting at least a first visual representation of an earlier version of a user interface window and a visual representation of a current view of the user interface window; anda timeline associated with a first time scale, where the timeline represents a plurality of visual representations of earlier versions of the user interface window, wherein the timeline includes: a first portion of the plurality of visual representations of earlier versions of the user interface window that is displayed with a condensed appearance in which a respective amount of time is represented by a first length, wherein the first portion includes a first tick mark of a first size, and wherein the first tick mark, when selected, is a second size that is larger than the first size while maintaining the first time scale for the timeline; anda second portion of the plurality of visual representations of earlier versions of the user interface window that is displayed with an expanded appearance in which the respective amount of time is represented by a second length greater than the first length, wherein the second portion includes a second tick mark of the second size; andwhile concurrently displaying the display area and the timeline, detecting a user input at a location on the timeline corresponding to the first portion of the timeline; andin response to detecting the user input at the location on the timeline corresponding to the first portion of the timeline, displaying an animation of the first portion of the timeline spatially expanding to the expanded appearance and the second portion of the timeline spatially shrinking to the condensed appearance while maintaining the first time scale for the timeline.
  • 2. The method of claim 1, where displaying the backup interface including the timeline includes displaying the timeline as a vertical column of tick marks.
  • 3. The method of claim 1, where displaying the first portion includes displaying a condensed tick mark that represents a first set of individual tick marks, and where displaying the second portion includes displaying a second set of individual tick marks.
  • 4. The method of claim 3, further comprising, displaying a date corresponding to the earlier version of the user interface window, wherein the earlier version of the user interface window is represented by the condensed tick mark.
  • 5. The method of claim 1, wherein spatially expanding the first portion of the timeline comprises increasing a size of at least one individual tick mark relative to at least one other individual tick mark.
  • 6. The method of claim 1, wherein spatially expanding the first portion of the timeline comprises magnifying the first portion of the timeline by a first magnification; the method further comprising magnifying a third portion of the timeline by a second magnification, wherein, before magnifying the third portion of the timeline, the third portion of the timeline is displayed with the condensed appearance, and wherein the first magnification is different than the second magnification.
  • 7. The method of claim 1, wherein spatially expanding the first portion of the timeline comprises extending the first length associated with the first portion of the timeline.
  • 8. The method of claim 1, wherein the user input at the location on the timeline corresponding to the first portion of the timeline corresponds to hovering a cursor over the first tick mark.
  • 9. The method of claim 1, wherein the animation also includes changing the first tick mark from the first size to the second size and changing the second tick mark from the second size to the first size while maintaining the first time scale for the timeline.
  • 10. The method of claim 1, wherein spatially expanding the first portion of the timeline includes increasing the first length representing the first portion of the timeline.
  • 11. A system comprising: a display; andone or more processors coupled with the display and operable to interact with a non-transitory computer-readable storage medium in order to perform operations comprising: displaying, on the display, a backup interface, including concurrently displaying: a display area for presenting at least a first visual representation of an earlier version of a user interface window and a visual representation of a current view of the user interface window; anda timeline associated with a first time scale, where the timeline represents a plurality of visual representations of earlier versions of the user interface window, wherein the timeline includes: a first portion of the plurality of visual representations of earlier versions of the user interface window that is displayed with a condensed appearance in which a respective amount of time is represented by a first length, wherein the first portion includes a first tick mark of a first size, and wherein the first tick mark, when selected, is a second size that is larger than the first size while maintaining the first time scale for the timeline; anda second portion of the plurality of visual representations of earlier versions of the user interface window that is displayed with an expanded appearance in which the respective amount of time is represented by a second length greater than the first length, wherein the second portion includes a second tick mark of the second size; andwhile concurrently displaying the display area and the timeline, detecting a user input at a location on the timeline corresponding to the first portion of the timeline; andin response to detecting the user input at the location on the timeline corresponding to the first portion of the timeline, displaying an animation of the first portion of the timeline spatially expanding to the expanded appearance and the second portion of the timeline spatially shrinking to the condensed appearance while maintaining the first time scale for the timeline.
  • 12. The system of claim 11, where displaying the backup interface includes displaying the timeline as a vertical column of tick marks.
  • 13. The system of claim 11, where displaying the first portion includes displaying a condensed tick mark that represents a first set of individual tick marks, and where displaying the second portion includes displaying a second set of individual tick marks.
  • 14. The system of claim 13, where a date is displayed corresponding to the earlier version of the user interface window, wherein the earlier version of the user interface window is represented by the condensed tick mark.
  • 15. The system of claim 11, wherein spatially expanding the first portion of the timeline comprises increasing a size of at least one individual tick mark relative to at least one other individual tick mark.
  • 16. The system of claim 11, wherein spatially expanding the first portion of the timeline comprises magnifying the first portion of the timeline by a first magnification; the method further comprising magnifying a third portion of the timeline by a second magnification, wherein, before magnifying the third portion of the timeline, the third portion of the timeline is displayed with the condensed appearance, and wherein the first magnification is different than the second magnification.
  • 17. The system of claim 11, wherein spatially expanding the first portion of the timeline comprises extending the first length associated with the first portion of the timeline.
  • 18. The system of claim 11, wherein the user input at the location on the timeline corresponding to the first portion of the timeline corresponds to hovering a cursor over the first tick mark.
  • 19. The system of claim 11, wherein the animation also includes changing the first tick mark from the first size to the second size and changing the second tick mark from the second size to the first size while maintaining the first time scale for the timeline.
  • 20. A non-transitory computer-readable medium including one or more sequences of instructions which, when executed by one or more processors coupled with a display, causes: displaying, on the display, a backup interface, including concurrently displaying: a display area for presenting at least a first visual representation of an earlier version of a user interface window and a visual representation of a current view of the user interface window; anda timeline associated with a first time scale, where the timeline represents a plurality of visual representations of earlier versions of the user interface window, wherein the timeline includes: a first portion of the plurality of visual representations of earlier versions of the user interface window that is displayed with a condensed appearance in which a respective amount of time is represented by a first length, wherein the first portion includes a first tick mark of a first size, and wherein the first tick mark, when selected, is a second size that is larger than the first size while maintaining the first time scale for the timeline; anda second portion of the plurality of visual representations of earlier versions of the user interface window that is displayed with an expanded appearance in which the respective amount of time is represented by a second length greater than the first length, wherein the second portion includes a second tick mark of the second size; andwhile concurrently displaying the display area and the timeline, detecting a user input at a location on the timeline corresponding to the first portion of the timeline; andin response to detecting the user input at the location on the timeline corresponding to the first portion of the timeline, displaying an animation of the first portion of the timeline spatially expanding to the expanded appearance and the second portion of the timeline spatially shrinking to the condensed appearance while maintaining the first time scale for the timeline.
  • 21. The non-transitory computer-readable medium of claim 20, where displaying the backup interface includes displaying the timeline as a vertical column of tick marks.
  • 22. The non-transitory computer-readable medium of claim 20, where displaying the first portion includes displaying a condensed tick mark that represents a first set of individual tick marks, and where displaying the second portion includes displaying a second set of individual tick marks.
  • 23. The non-transitory computer-readable medium of claim 22, where a date is displayed corresponding to the earlier version of the user interface window, wherein the earlier version of the user interface window is represented by the condensed tick mark.
  • 24. The non-transitory computer-readable medium of claim 20, wherein spatially expanding the first portion of the timeline comprises increasing a size of at least one individual tick mark relative to at least one other individual tick mark.
  • 25. The non-transitory computer-readable medium of claim 20, wherein spatially expanding the first portion of the timeline comprises magnifying the first portion of the timeline by a first magnification; the method further comprising magnifying a third portion of the timeline by a second magnification, wherein, before magnifying the third portion of the timeline, the third portion of the timeline is displayed with the condensed appearance, and wherein the first magnification is different than the second magnification.
  • 26. The non-transitory computer-readable medium of claim 20, wherein spatially expanding the first portion of the timeline comprises extending the first length associated with the first portion of the timeline.
  • 27. The non-transitory computer-readable medium of claim 20, wherein the user input at the location on the timeline corresponding to the first portion of the timeline corresponds to hovering a cursor over the first tick mark.
  • 28. The non-transitory computer-readable medium of claim 20, wherein the animation also includes changing the first tick mark from the first size to the second size and changing the second tick mark from the second size to the first size while maintaining the first time scale for the timeline.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of and claims priority to U.S. application Ser. No. 13/211,273, filed on Aug. 16, 2011, which is a continuation application of and claims priority to U.S. application Ser. No. 11/760,708, filed on Jun. 8, 2007. The disclosure of the foregoing applications are incorporated herein by reference.

US Referenced Citations (434)
Number Name Date Kind
5150407 Chan Sep 1992 A
5150473 Zulch Sep 1992 A
5163148 Walls Nov 1992 A
5276867 Kenley et al. Jan 1994 A
5349658 O'Rourke et al. Sep 1994 A
5369570 Parad Nov 1994 A
5574846 Yoshimura et al. Nov 1996 A
5659614 Bailey Aug 1997 A
5664186 Bennett et al. Sep 1997 A
5680562 Conrad et al. Oct 1997 A
5717869 Moran Feb 1998 A
5736974 Selker Apr 1998 A
5745669 Hugard et al. Apr 1998 A
5754178 Johnston et al. May 1998 A
5758359 Saxon May 1998 A
5790120 Lozares et al. Aug 1998 A
5802175 Kara Sep 1998 A
5818936 Mashayekhi Oct 1998 A
5819032 De Vries et al. Oct 1998 A
5819292 Hitz et al. Oct 1998 A
5831617 Bhukhanwala Nov 1998 A
5832526 Schuyler Nov 1998 A
5946699 Sawashima Aug 1999 A
5961605 Deng et al. Oct 1999 A
5987566 Vishlitzky et al. Nov 1999 A
6006227 Freeman et al. Dec 1999 A
6023506 Ote et al. Feb 2000 A
6054989 Robertson et al. Apr 2000 A
6061062 Venolia May 2000 A
6097313 Takahashi et al. Aug 2000 A
6112318 Jouppi et al. Aug 2000 A
6121969 Jain et al. Sep 2000 A
6134660 Boneh et al. Oct 2000 A
6167532 Wisecup Dec 2000 A
6188405 Czerwinski et al. Feb 2001 B1
6269381 St. Pierre et al. Jul 2001 B1
6353824 Boguraev Mar 2002 B1
6366933 Ball Apr 2002 B1
6366988 Skiba et al. Apr 2002 B1
6396500 Qureshi et al. May 2002 B1
6397308 Ofek et al. May 2002 B1
6424626 Kidambi et al. Jul 2002 B1
6460055 Midgley et al. Oct 2002 B1
6486896 Ubillos Nov 2002 B1
6493745 Cherian Dec 2002 B1
6529900 Patterson Mar 2003 B1
6553392 Mosher, Jr. et al. Apr 2003 B1
6574733 Langford Jun 2003 B1
6600501 Israel et al. Jul 2003 B1
6604118 Kleiman et al. Aug 2003 B2
6625704 Winokur Sep 2003 B2
6629129 Bookspan et al. Sep 2003 B1
6636937 Peter Oct 2003 B2
6638313 Freeman et al. Oct 2003 B1
6701454 Fischer et al. Mar 2004 B1
6711572 Zakharov et al. Mar 2004 B2
6714201 Grinstein et al. Mar 2004 B1
6714952 Dunham et al. Mar 2004 B2
6724918 Yen et al. Apr 2004 B1
6725427 Freeman et al. Apr 2004 B2
6728735 Fong Apr 2004 B1
6750890 Sugimoto Jun 2004 B1
6760723 Oshinsky et al. Jul 2004 B2
6768999 Prager et al. Jul 2004 B2
6785751 Connor Aug 2004 B1
6785786 Gold et al. Aug 2004 B1
6801229 Tinkler Oct 2004 B1
6836657 Ji et al. Dec 2004 B2
6857001 Hitz et al. Feb 2005 B2
6892211 Hitz et al. May 2005 B2
6901493 Maffezzoni May 2005 B1
6918124 Novik et al. Jul 2005 B1
6947556 Matyas et al. Sep 2005 B1
6948039 Biessener et al. Sep 2005 B2
6950989 Rosenzweig Sep 2005 B2
6959368 St. Pierre et al. Oct 2005 B1
6993710 Coad et al. Jan 2006 B1
6996782 Parker Feb 2006 B2
7069402 Coulter et al. Jun 2006 B2
7072916 Lewis Jul 2006 B1
7099900 Bromley et al. Aug 2006 B1
7103740 Colgrove et al. Sep 2006 B1
7107527 Takahashi et al. Sep 2006 B2
7111136 Yamagami Sep 2006 B2
7133902 Saha et al. Nov 2006 B2
7134026 Horiuchi et al. Nov 2006 B2
7134093 Etgen Nov 2006 B2
7146574 Goldthwaite Dec 2006 B2
7155486 Aoshima et al. Dec 2006 B2
7174352 Kleiman et al. Feb 2007 B2
7185028 Lechner Feb 2007 B2
7200617 Kibuse Apr 2007 B2
7213040 Stokes May 2007 B1
7222194 Kano et al. May 2007 B2
7257717 Huang Aug 2007 B2
7275075 Cannon Sep 2007 B2
7278111 Stata Oct 2007 B2
7284190 Chellis et al. Oct 2007 B2
7289973 Kiessig et al. Oct 2007 B2
7318134 Oliveira Jan 2008 B1
7320076 Caronni Jan 2008 B2
7334195 Gemmell Feb 2008 B2
7366994 Loui Apr 2008 B2
7386801 Horvitz et al. Jun 2008 B1
7401194 Jewell Jul 2008 B2
7418619 Uhlmann et al. Aug 2008 B1
7434164 Salesin et al. Oct 2008 B2
7434177 Ording et al. Oct 2008 B1
7440125 Maekawa et al. Oct 2008 B2
7483693 Lueng et al. Jan 2009 B2
7505038 Bell Mar 2009 B2
7505762 Onyon et al. Mar 2009 B2
7518611 Boyd et al. Apr 2009 B2
7549114 Bederson Jun 2009 B2
7558930 Kitamura et al. Jul 2009 B2
7559016 Rakowski et al. Jul 2009 B1
7574459 Sen et al. Aug 2009 B2
7590668 Kathuria et al. Sep 2009 B2
7596586 Gokhale et al. Sep 2009 B2
7600133 Long et al. Oct 2009 B2
7620670 Tokuda et al. Nov 2009 B2
7624133 Ojalvo Nov 2009 B1
7630021 Matsuzaka et al. Dec 2009 B2
7657450 Amit et al. Feb 2010 B2
7657582 Cram Feb 2010 B1
7660817 Smith et al. Feb 2010 B2
7669141 Pegg Feb 2010 B1
7676689 Shioyama et al. Mar 2010 B1
7698686 Carroll Apr 2010 B2
7703044 Graham Apr 2010 B2
7707284 Friedman Apr 2010 B2
7711771 Kirnos May 2010 B2
7716171 Kryger May 2010 B2
7716194 Williams May 2010 B2
7734594 Wang Jun 2010 B2
7735018 Bakhash Jun 2010 B2
7739464 Coulter et al. Jun 2010 B1
7739622 DeLine et al. Jun 2010 B2
7743347 Graham et al. Jun 2010 B2
7747655 Hull et al. Jun 2010 B2
7752573 Shiba et al. Jul 2010 B2
7761456 Cram et al. Jul 2010 B1
7774718 Finke-Anlauff et al. Aug 2010 B2
7788080 Graham et al. Aug 2010 B2
7788592 Williams et al. Aug 2010 B2
7800615 MacPherson Sep 2010 B2
7809687 Cisler et al. Oct 2010 B2
7809688 Cisler et al. Oct 2010 B2
7836311 Kuriya et al. Nov 2010 B2
7853566 Cisler et al. Dec 2010 B2
7853567 Cisler et al. Dec 2010 B2
7856424 Cisler et al. Dec 2010 B2
7860839 Cisler et al. Dec 2010 B2
7882072 Axe et al. Feb 2011 B1
7890527 Nene et al. Feb 2011 B1
7899829 Malla Mar 2011 B1
7934064 Per et al. Apr 2011 B1
7944445 Schorr May 2011 B1
7953730 Bleckner May 2011 B1
7999810 Boice et al. Aug 2011 B1
8010900 Hart et al. Aug 2011 B2
8019155 Hibino Sep 2011 B2
8024292 Thompson et al. Sep 2011 B2
8028249 Loui Sep 2011 B2
8055911 Feng et al. Nov 2011 B2
8099392 Paterson et al. Jan 2012 B2
8161410 Bray Apr 2012 B2
8166415 Cisler et al. Apr 2012 B2
8209308 Rueben et al. Jun 2012 B2
8219995 Flemming et al. Jul 2012 B2
8229897 Cannon et al. Jul 2012 B2
8234591 Dhawan et al. Jul 2012 B1
8245078 Chatterjee et al. Aug 2012 B1
8260770 Bell et al. Sep 2012 B2
8285835 Deolasee Oct 2012 B1
8311988 Cisler et al. Nov 2012 B2
8375318 Masuda et al. Feb 2013 B2
8484569 Carlson et al. Jul 2013 B2
8490019 Jarrett et al. Jul 2013 B2
8495024 Cisler et al. Jul 2013 B2
8527909 Mullany Sep 2013 B1
8533593 Grossman et al. Sep 2013 B2
8627195 Hayden Jan 2014 B1
8775378 Cisler et al. Jul 2014 B2
8826123 Audet Sep 2014 B2
8839087 Hayden Sep 2014 B1
9009115 Cisler et al. Apr 2015 B2
9134879 Kumamoto Sep 2015 B2
20010047368 Oshinsky et al. Nov 2001 A1
20010055317 Kajizaki et al. Dec 2001 A1
20020002562 Moran Jan 2002 A1
20020016912 Johnson Feb 2002 A1
20020023198 Kokubun et al. Feb 2002 A1
20020046220 Freeman et al. Apr 2002 A1
20020049883 Schneider et al. Apr 2002 A1
20020054158 Asami May 2002 A1
20020063737 Feig et al. May 2002 A1
20020065999 Kikuchi et al. May 2002 A1
20020075322 Rosenzweig et al. Jun 2002 A1
20020080180 Mander et al. Jun 2002 A1
20020107886 Gentner et al. Aug 2002 A1
20020109728 Tiongson Aug 2002 A1
20020112237 Kelts Aug 2002 A1
20020120648 Ball et al. Aug 2002 A1
20020156921 Dutta et al. Oct 2002 A1
20020160760 Aoyama Oct 2002 A1
20020174283 Lin Nov 2002 A1
20030009493 Parker Jan 2003 A1
20030014521 Elson et al. Jan 2003 A1
20030016248 Hayes Ubillos Jan 2003 A1
20030018878 Dorward et al. Jan 2003 A1
20030034990 Roelofs Feb 2003 A1
20030038831 Engelfriet Feb 2003 A1
20030050940 Robinson Mar 2003 A1
20030063128 Salmimaa et al. Apr 2003 A1
20030065687 Momiji et al. Apr 2003 A1
20030097640 Abrams et al. May 2003 A1
20030122874 Dieberger et al. Jul 2003 A1
20030126247 Strasser Jul 2003 A1
20030131007 Schirmer et al. Jul 2003 A1
20030135650 Kano et al. Jul 2003 A1
20030137540 Klevenz et al. Jul 2003 A1
20030158834 Sawdon Aug 2003 A1
20030158861 Sawdon Aug 2003 A1
20030158862 Eshel Aug 2003 A1
20030158863 Haskin Aug 2003 A1
20030167380 Green Sep 2003 A1
20030172937 Faries et al. Sep 2003 A1
20030177149 Coombs Sep 2003 A1
20030182332 McBrearty et al. Sep 2003 A1
20030195903 Manley et al. Oct 2003 A1
20030220949 Witt et al. Nov 2003 A1
20040003351 Sommerer et al. Jan 2004 A1
20040027371 Jaeger Feb 2004 A1
20040143652 Grannan et al. Feb 2004 A1
20040044707 Richard Mar 2004 A1
20040066414 Czerwinski et al. Apr 2004 A1
20040073560 Edwards Apr 2004 A1
20040078641 Fleischmann Apr 2004 A1
20040088331 Therrien et al. May 2004 A1
20040117459 Fry Jun 2004 A1
20040125137 Stata Jul 2004 A1
20040125150 Adcock et al. Jul 2004 A1
20040133575 Farmer Jul 2004 A1
20040139396 Gelernter et al. Jul 2004 A1
20040153445 Horvitz Aug 2004 A1
20040153973 Horwitz Aug 2004 A1
20040162675 Moon Aug 2004 A1
20040163009 Goldstein et al. Aug 2004 A1
20040167942 Oshinsky et al. Aug 2004 A1
20040175000 Caronni Sep 2004 A1
20040193953 Callahan Sep 2004 A1
20040199779 Huang Oct 2004 A1
20040199826 Bertram et al. Oct 2004 A1
20040210608 Lee et al. Oct 2004 A1
20040220965 Harville et al. Nov 2004 A1
20040220980 Forster Nov 2004 A1
20040222992 Calkins et al. Nov 2004 A1
20040228493 Ma Nov 2004 A1
20040230892 Horton Nov 2004 A1
20040235523 Schrire et al. Nov 2004 A1
20040236769 Smith Nov 2004 A1
20040236916 Berkowitz et al. Nov 2004 A1
20040236958 Teicher et al. Nov 2004 A1
20040267700 Dumais et al. Dec 2004 A1
20050010955 Elia et al. Jan 2005 A1
20050047295 Kim et al. Mar 2005 A1
20050052458 Lambert Mar 2005 A1
20050071390 Midgley et al. Mar 2005 A1
20050080769 Gemmell Apr 2005 A1
20050086613 McKnight et al. Apr 2005 A1
20050091596 Anthony et al. Apr 2005 A1
20050097475 Makioka et al. May 2005 A1
20050102329 Jiang et al. May 2005 A1
20050102695 Musser May 2005 A1
20050108253 Metsatahti et al. May 2005 A1
20050138013 Walker Jun 2005 A1
20050138066 Finke-Anlauff et al. Jun 2005 A1
20050138081 Alshab et al. Jun 2005 A1
20050144135 Juarez et al. Jun 2005 A1
20050149577 Okada Jul 2005 A1
20050151737 Chiu Jul 2005 A1
20050165867 Barton et al. Jul 2005 A1
20050187992 Prahlad Aug 2005 A1
20050204186 Rothman et al. Sep 2005 A1
20050216520 He et al. Sep 2005 A1
20050216527 Erlingsson Sep 2005 A1
20050216838 Graham Sep 2005 A1
20050246398 Barzilai et al. Nov 2005 A1
20050262168 Helliker et al. Nov 2005 A1
20050262377 Sim-Tang Nov 2005 A1
20050286428 Oksanen Dec 2005 A1
20060015863 Vaidyanathan Jan 2006 A1
20060026218 Urmston Feb 2006 A1
20060036568 Moore et al. Feb 2006 A1
20060041603 Paterson et al. Feb 2006 A1
20060041823 Wolfgang Feb 2006 A1
20060053332 Uhlmann Mar 2006 A1
20060064444 Van Ingen et al. Mar 2006 A1
20060064634 Dettinger et al. Mar 2006 A1
20060080521 Barr et al. Apr 2006 A1
20060085792 Traut Apr 2006 A1
20060085817 Kim et al. Apr 2006 A1
20060088167 Bade et al. Apr 2006 A1
20060101384 Sim-Tang May 2006 A1
20060106893 Daniels et al. May 2006 A1
20060117022 Lucas Jun 2006 A1
20060117309 Singhal et al. Jun 2006 A1
20060129496 Chow et al. Jun 2006 A1
20060137010 Kramer et al. Jun 2006 A1
20060143250 Peterson et al. Jun 2006 A1
20060150107 Leung et al. Jul 2006 A1
20060156246 Williams Jul 2006 A1
20060156259 Wagner et al. Jul 2006 A1
20060161861 Holecek et al. Jul 2006 A1
20060173848 Peterson et al. Aug 2006 A1
20060174211 Hoellerer Aug 2006 A1
20060200754 Kablesh et al. Sep 2006 A1
20060206460 Gadkari Sep 2006 A1
20060218363 Palapudi Sep 2006 A1
20060224956 Storisteanu et al. Oct 2006 A1
20060224993 Wong Oct 2006 A1
20060235907 Kathuria et al. Oct 2006 A1
20060236406 Johnson Oct 2006 A1
20060248294 Nedved et al. Nov 2006 A1
20060253470 Friedman et al. Nov 2006 A1
20060282786 Shaw Dec 2006 A1
20060288205 Linares Dec 2006 A1
20070015118 Nickell et al. Jan 2007 A1
20070027935 Haselton et al. Feb 2007 A1
20070030528 Quaeler et al. Feb 2007 A1
20070038687 Carroll Feb 2007 A1
20070038884 Campbell et al. Feb 2007 A1
20070043715 Kaushik et al. Feb 2007 A1
20070043790 Kryger Feb 2007 A1
20070070066 Bakhash Mar 2007 A1
20070078910 Bopardikar Apr 2007 A1
20070088702 Fridella et al. Apr 2007 A1
20070094312 Sim-Tang Apr 2007 A1
20070106978 Felts May 2007 A1
20070112732 Clark May 2007 A1
20070130232 Therrien Jun 2007 A1
20070136381 Cannon Jun 2007 A1
20070136389 Bergant et al. Jun 2007 A1
20070136423 Gilmore et al. Jun 2007 A1
20070143425 Kieselbach et al. Jun 2007 A1
20070150326 Nakao et al. Jun 2007 A1
20070156772 Lechner Jul 2007 A1
20070168497 Locker et al. Jul 2007 A1
20070174580 Shulga Jul 2007 A1
20070179952 Vespe Aug 2007 A1
20070180268 Filimon et al. Aug 2007 A1
20070185879 Roublev et al. Aug 2007 A1
20070185922 Kapoor et al. Aug 2007 A1
20070186127 Desai et al. Aug 2007 A1
20070192386 Fries et al. Aug 2007 A1
20070245238 Fugitt et al. Oct 2007 A1
20070266007 Arrouye et al. Nov 2007 A1
20070271263 Merrild Nov 2007 A1
20070271303 Menendez et al. Nov 2007 A1
20070282854 Bhogal et al. Dec 2007 A1
20070288536 Sen et al. Dec 2007 A1
20080016576 Ueda et al. Jan 2008 A1
20080022393 Waltermann et al. Jan 2008 A1
20080028007 Ishii et al. Jan 2008 A1
20080033969 Koo et al. Feb 2008 A1
20080034004 Cisler Feb 2008 A1
20080034011 Cisler et al. Feb 2008 A1
20080034013 Cisler Feb 2008 A1
20080034016 Cisler Feb 2008 A1
20080034017 Giampaolo et al. Feb 2008 A1
20080034019 Cisler et al. Feb 2008 A1
20080046557 Cheng Feb 2008 A1
20080065663 Farlee et al. Mar 2008 A1
20080070496 Jackson Mar 2008 A1
20080071796 Ghuneim Mar 2008 A1
20080077808 Teicher et al. Mar 2008 A1
20080082578 Hogue et al. Apr 2008 A1
20080091655 Gokhale et al. Apr 2008 A1
20080126442 Cisler et al. May 2008 A1
20080133487 Gross Jun 2008 A1
20080133622 Brown Jun 2008 A1
20080141029 Culver Jun 2008 A1
20080162999 Schulueter et al. Jul 2008 A1
20080168184 Freedman et al. Jul 2008 A1
20080168245 De Atley et al. Jul 2008 A1
20080168391 Robbin et al. Jul 2008 A1
20080172607 Baer Jul 2008 A1
20080177961 McSharry et al. Jul 2008 A1
20080208630 Fors et al. Aug 2008 A1
20080208631 Morita Aug 2008 A1
20080214163 Onyon et al. Sep 2008 A1
20080216011 Gould Sep 2008 A1
20080222512 Albornoz et al. Sep 2008 A1
20080229037 Bunte et al. Sep 2008 A1
20080240560 Hibino Oct 2008 A1
20080250314 Larsen Oct 2008 A1
20080250342 Clark et al. Oct 2008 A1
20080250400 Vertes Oct 2008 A1
20080256138 Sim-Tang Oct 2008 A1
20080285754 Kezmann Nov 2008 A1
20080294663 Heinley Nov 2008 A1
20080307017 Lyons et al. Dec 2008 A1
20080307020 Ko et al. Dec 2008 A1
20080307347 Cisler et al. Dec 2008 A1
20080310628 Fujioka et al. Dec 2008 A1
20080310633 Brown et al. Dec 2008 A1
20080313243 Poston et al. Dec 2008 A1
20090006475 Udezue Jan 2009 A1
20090019291 Murray Jan 2009 A1
20090031401 Cudich et al. Jan 2009 A1
20090052669 Ma Feb 2009 A1
20090177995 Gould Jul 2009 A1
20090307333 Welingkar et al. Dec 2009 A1
20100017855 Johnson et al. Jan 2010 A1
20100063960 Lehto Mar 2010 A1
20100070888 Watabe Mar 2010 A1
20100121660 Boykin May 2010 A1
20100217929 Kirshenbaum et al. Aug 2010 A1
20100306171 Antos Dec 2010 A1
20100312754 Bear et al. Dec 2010 A1
20110016087 Freedman et al. Jan 2011 A1
20110016089 Freedman et al. Jan 2011 A1
20110083098 Cisler et al. Apr 2011 A1
20110202763 Martin et al. Aug 2011 A1
20110296351 Ewing et al. Dec 2011 A1
20110302502 Hart et al. Dec 2011 A1
20120185438 Giampaolo et al. Jul 2012 A1
20120185762 Ozer et al. Jul 2012 A1
20120198383 Cisler et al. Aug 2012 A1
20120287114 Hallock Nov 2012 A1
20120290982 Hallock Nov 2012 A1
20130066836 Weiss et al. Mar 2013 A1
20130212599 Giampaolo et al. Aug 2013 A1
Foreign Referenced Citations (8)
Number Date Country
629950 Dec 1997 EP
1152352 Nov 2001 EP
1582982 Oct 2005 EP
WO 0106356 Jan 2001 WO
WO 02101540 Dec 2002 WO
WO 05045756 May 2005 WO
WO 08019237 Feb 2008 WO
WO 08019259 Feb 2008 WO
Non-Patent Literature Citations (40)
Entry
Rekimoto et. al. “Time-Machine Computing, A time centric approach for the information environment” UIST' (Year: 1999).
“Apple Previews Mac OS X Leopard,” Aug. 7, 2006, [Online] [Retrieved on Nov. 26, 2007] Retrieved from the Internet: URL:http://www.apple.com/pr/library/2006/aug/07leopard.html, pp. 1-2.
“Aulaclic: Unit 6. The Recycle Bin,” Nov. 2005, [Online] [Retrieved on Nov. 26, 2007] Retrieved from the Internet: URL:http://www.teacherclick.com/winxp/t_6_1.htm, pp. 1-2.
“How to Interpret Windows Installer Logs,” [Online] [Retrieved on Dec. 12, 2009] Retrieved from the Internet URL: http://blogs.technet.com/richard_macdonald/archive/2007/04/02/How-to-Interpret-Windows-Installer-Logs.aspx; published Apr. 4, 2007; 6 pages.
“MSDN Academic Alliance Developer Center, Curriculum Repository Glossary,” [Online] [Retrieved on Apr. 22, 2009] Retrieved from the Internet URL: http://www.academicresourcecenter.net/curriculum/glossary.aspx, 4 pages.
“StorageSync: Backup, Restore, & Synchronization Software User's Guide”, SimpleTech, 2003, 100 pages.
“What's New in Word 2002,” Wellesly College Information Services Computing Documentation, Jan. 2002, [Online] Retrieved on Aug. 14, 2008] Retrieved from the Internet URL: http://www.wellesley.edu/Computing/Office02/Word02/word02.html, 19 pages.
Bonwick et al., “The Zettabyte File System,” [Online] [Retrieved on Jan. 22, 2008] Retrieved from the Internet: URL:http://partneradvantage.sun.com/protected/solaris10/adoptionkit/tech/zfs/zfs_overview.pdf, 13 pages.
Bonwick, “ZFS The Last Word in File Systems,” [Online] [Retrieved on Jan. 22, 2008] Retrieved from the Internet: URL:http://opensolaris.org/os/community/zfs/docs/zfs.pdf, 34 pages.
Bott, “Windows XP Backup Made Easy,” [Online] [Retrieved on Jul. 7, 2009]; Retrieved from the Internet URL: http://www.microsoft.com/windowsxp/using/setup/learnmore/bott_03july14.mspx, 4 pages.
Charles Rubin, Mary Millhollon and Katherine Murray, “Microsoft Office Word 2003, Official Manual”, First Edition, Japan, Nikkei BP Softpress, Jul. 12, 2004, vol. 1, p. 300, 815-818.
Chen et al., “Data Redundancy and Compression Methods for a Disk-based Network Backup System”, 2004, IEEE, pp. 1-8.
Engst, “Retrospect 6.0: Powerful Backup Program Adds Panther Compatibility and Enterprise Features,” [Online] [Retrieved on Jul. 8, 2009]; Retrieved from the Internet URL: http://www.macworld.com/article/31038/2004/06/retrospect6x0.html, 8 pages.
Communication pursuant to Article 94(3) EPC for Application No. EP 07 813 540.7, dated Jun. 23, 2009, 2 pages.
Extended European Search Report and Written Opinion, European Application No. 11171738.5, dated Aug. 29, 2011, 5 pages.
Communication pursuant to Article 94(3) EPC for Application No. EP 07 799 899.5, dated May 14, 2009, 2 pages.
Communication pursuant to Article 94(3) EPC for Application No. EP 07 799 899.5, dated Oct. 7, 2009, 4 pages.
Examination Report from European Application No. 07 813 540.7 dated Oct. 27, 2011, 5 pages.
Examination Report from European Application No. 07 813 605.8 dated Oct. 27, 2011, 5 pages.
Extended European Search Report, European Application No. 11184579.8, dated Nov. 17, 2011, 6 pages.
Godfrey, Michael et al., “Using Original Analysis to Detect Merging and Splitting of Source Code Entities,” IEEE Transactions on Software Engineering, vol. 31, No. 2. Feb. 2005. pp. 166-181.
Griffiths, “Leopard first looks: Time Machine,” Aug. 8, 2006 [Online] [Retrieved on Nov. 23, 2007] Retrieved from the Internet: URL:http://www.macworld.com/2006/08/firstlooks/leotimemac/index.php?pf=1, pp. 1-2.
Harder, “Microsoft Windows XP System Restore,” [Online] [Retrieved on Jul. 7, 2009] Retrieved from the Internet URL: http://msdn.microsoft.com/en-us/library/ms997627.aspx, 8 pages.
In-link files, The Open Group Base, Specifications Issue 6 [online]. IEEE Std 1003.1, 2004 Edition. [retrieved on Apr. 6, 2011]. Retrieved from the Internet:URL:http://pubs.opengroup.org/onlinepubs/009695399/utilities/In.html, 5 pages.
International Search Report and Written Opinion, PCT/US2007/074653, dated Aug. 14, 2008, 14 pages.
International Search Report and Written Opinion, PCT/US2007/074729, dated Jul. 12, 2007, 11 pages.
International Search Report and Written Opinion, PCT/US2007/074863 dated Apr. 21, 2009, 20 pages.
International Search Report and Written Opinion, PCT/US2007/074881, dated Jul. 12, 2007, 11 pages.
International Search Report and Written Opinion, PCT/US2008/065146, dated Oct. 31, 2008, 15 pages.
International Search Report and Written Opinion, PCT/US2008/066212, dated Mar. 9, 2009, 20 pages.
Microsoft Corporation, “Description of the AutoRecover Functions in Excel,” [online] Microsoft Corporation, Aug. 10, 2007, Article ID 289273; URL: http://support.microsoft.com/kb/289273/en-us.
Microsoft Technet: “Restore a previous version of a file,” Jan. 21, 2005, [Online] [Retrieved on Oct. 20, 2011] Retrieved from the Internet URL: http://technet.microsoft.com/en-us/library/cc778220(d=printer,v=WS.10).aspx , pp. 1-2.
Microsoft-TechNet, “Using Encrypting File System,” Nov. 3, 2005, Microsoft, 40 pages.
Office Action dated Feb. 29, 2012 from related Chinese Application No. 200880024710.0, 11 pages.
Office Action dated Apr. 1, 2015 from related Chinese Application No. 201310073409.1, 13 pages.
Posey, Brien M., “Working with the Windows Server 2003 Volume Shadow Copy Service”. Published Jun. 24, 2004. http://www.windowsnetworking.com/articles_tutorials/Windows-Server-2003-Volume-Shadow-Copy-Service.html.; 11 pages.
Rubel, “Easy Automated Snapshot-Style Backups with Rsync,” [Online] [Retrieved on Nov. 8, 2010] Retrieved from the Internet URL: http://www.mikerubel.org/computers/rsync_snapshots; 18 pages.
Sun Microsystems, Inc., “ZFS On-Disk Specification,” Draft: Dec. 9, 2005, [Online] [Retrieved on Jan. 22, 2008]; Retrieved from the Internet URL: http://opensolaris.org/os/community/zfs/docs/ondiskformat0822.pdf, 55 pages.
Tittel, “An EAZ Way to Restore Crippled and Inoperable Systems,” ChannelWeb, Apr. 25, 2005, [Online] [Retrieved on Aug. 13, 2008] Retrieved from the Internet URL: http://www.crn.com/white-box/161502165, 10 pages.
Wang et al., “A Secure and Efficient Desktop Backup and Recovery System”, 2007, IEEE, pp. 304-309.
Related Publications (1)
Number Date Country
20160246458 A1 Aug 2016 US
Continuations (2)
Number Date Country
Parent 13211273 Aug 2011 US
Child 15141557 US
Parent 11760708 Jun 2007 US
Child 13211273 US