- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Maxim Drobachevsky - Beer Sheva, IL Sharon Vitek - Tel-Aviv, IL Jehuda Shemer - Kfar Saba, IL Adam Brenner - Mission Viejo CA, US Arun Murti - Mission Viejo CA, US
International Classification:
G06F 3/06 G06F 9/54
Abstract:
Embodiments for optimizing a cost of storing backup data in an object store of a public cloud network provided by a cloud provider by storing delta objects each embodying changes to blocks of the backup data between a full backup incremental backups. The delta objects are each of a same block size, which can be changed. The process selects two sequential delta objects to form a larger object by extending each block to a minimal part size that is larger than the block size and inserting a region of unchanged data between the two delta objects. The larger object is divided into three different parts comprising the inserted region, and each of the extended delta object blocks. The process calculates an API and a compute cost for a synthesis operation on the delta objects based on a cost model and current price schedule of the cloud provider for the three different parts, and for the substantially larger object as a whole. The process selects a block size for the delta objects based on a lowest calculated cost.
Organizational Awareness For Automating Data Protection Policies
- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Adam Brenner - Mission Viejo CA, US
International Classification:
G06F 11/14 G06F 16/28
Abstract:
Embodiments for automating backup policy application to users in a data protection system of an organization, by defining a plurality of backup policies to apply to data processed by users in the organization, wherein each backup policy dictates a different performance characteristic based on storage cost and target storage type and location. Next, identifying a hierarchical position of a user within the organization and determining communication and grouping behavior of the user within the organization. A score is calculated for the user based on their hierarchical position and communication and grouping behavior, and an appropriate backup policy is assigned to a data processing device operated by the user based on the total score for the user.
Organizational Awareness For Automating Data Protection Policies Using Historical Weighting
- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Adam Brenner - Mission Viejo CA, US
International Classification:
G06F 11/14 G06Q 10/10
Abstract:
Embodiments for automating backup policy application to users in a data protection system of an organization, by defining a plurality of backup policies to apply to data processed by users in the organization, wherein each backup policy dictates a different performance characteristic based on storage cost and target storage type and location. Next, identifying a hierarchical position of a user within the organization and determining communication and grouping behavior of the user within the organization. A score is calculated for the user based on their hierarchical position and communication and grouping behavior, and an appropriate backup policy is assigned to the user based on their total score. If a user moves upward, a stronger protection policy is immediately applied, whereas is user moves down, a weaker protection policy is applied after a period of time to extend strong data protection if desired
Organizational Awareness For Automating Data Protection Policies With Social Graph Integration
- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Adam Brenner - Mission Viejo CA, US
International Classification:
G06F 11/14 H04L 29/12 H04L 29/08
Abstract:
Embodiments for automating backup policies applied to users in an organization by defining backup policies based on hierarchical positions of users within the organization as modified by any communication and grouping behavior of the user within the organization. A social graph generator utilizes relevant relationships revealed by active participant communications to create a greater knowledge of data usage within the enterprise to generate social graphs that quantify a type of commonality between people. The integration of social graph information in calculating a score based on hierarchical data adds organizational awareness to the process by factoring in people's communication patterns within the organization and leverages any links that are revealed by such patterns.
One example method includes receiving an input that indicates selection of a cloud storage provider, receiving one or more product selection inputs, each of the product selection inputs indicating selection of a respective data protection product, receiving an input indicating an instance size, assembling the inputs together to define a data protection configuration, and automatically generating a script which, when executed by one or more hardware processors, deploys the data protection configuration in a cloud storage environment of the selected cloud storage provider.
Visual Mapping Of Protection Status For Networking Devices
- Hopkinton MA, US Adam Brenner - Mission Viejo CA, US Mark Malamut - Aliso Viejo CA, US Vijay Anand - Irvine CA, US
International Classification:
G06F 11/14
Abstract:
Embodiments are described for a method and system of applying data protection software mechanisms to network devices to auto-discover the networking equipment, save changes from memory (TCAM) to local storage, backup changes to protection storage, provide auditing and tracking history of changes, and provide the ability to deploy test/development copies of changes using software defined networking techniques. Embodiments include an efficient visual mapping aspect provided through a GUI to display the topography and backup/protection configuration of network devices in a system.
Hash Migration Using A Gold Image Library Management System
- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Stephen Smaldone - Woodstock CT, US
International Classification:
G06F 3/06 G06F 9/50
Abstract:
Embodiments for migrating hash values for backup data blocks in a network of data protection targets (DPTs) and a common data protection target implementing a Gold image library management system in which backups of Gold images used as templates for physical machines and virtual machines are stored on the CDPT. The CDPT and each DPT stores backup data split into chunks that are uniquely identified by a respective hash of its contents, and maintains data structures comprising the hash, chunk size, chunk data, and a list of DPT and CDPT identifiers. The hashes are partitioned into a set of buckets in the CDPT. A Bloom filter is generated for each bucket of hashes, and stored in each DPT so that each DPT stores Bloom filters for all CDPTs in the network. Each DPT checks its list of hashes against the Bloom filters in each of the DPTs to determine whether to keep or free chunks of data.
- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Stephen Smaldone - Woodstock CT, US
International Classification:
G06F 11/14
Abstract:
Facilitating efficient copy reuse of point-in-time (PIT) backup data in a data storage system by providing a data protection target (DPT) for storing user the PIT backup data, and a common data protection target (CDPT) accessible to but separate from the data protection target for storing Gold image data comprising structural data for operating system and application programs as defined by a manufacturer and different from the backed user content data. A Gold image copy reuse coordinator component or process receives a selection of a Gold image to be combined with a specified PIT backup dataset, and combines the specified PIT backup dataset with the selected Gold image to form a synthetic copy of the specified PIT backup dataset stored in the DPT. The synthetic copy can then be exposed to a system through a file share protocol for reuse by a user.
Name / Title
Company / Classification
Phones & Addresses
Mark Malamut President
Sign Arts Products Corp Telecommunications · Whol Rigid Polyurethane Foam · Other Chemical and Allied Products Merchant Wholesalers
34700 Pacific Coast Hwy #207, Capistrano Beach, CA 92624 (949)4899890
Mark Malamut President
CREATIVE ELECTRONIC SOLUTIONS, INC
18377 Bch Blvd STE 334, Huntington Beach, CA 92648
Emc
Senior Principal Software Engineer
Fulcrum Point Technologies Jan 1997 - Aug 2011
Owner
Emc Jan 1997 - Aug 2011
Consult Technologist and Advanced Development
Eis 1992 - 2002
Consultant
Msc Software 1990 - 1999
Software Consulting Engineer
Education:
University at Buffalo 1976 - 1980
Bachelors, Computer Science
Skills:
Software Development Cloud Computing Enterprise Software Agile Methodologies Software Engineering Management Integration Program Management Software Project Management Saas Perl Architecture Product Management Unix Consulting Enterprise Architecture Sdlc Software Design System Architecture Linux Requirements Analysis Solaris Virtualization Scrum Architectures Security
Certifications:
R Programming The Data Scientist's Toolbox Aws Architecture