- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Maxim Drobachevsky - Beer Sheva, IL Sharon Vitek - Tel-Aviv, IL Jehuda Shemer - Kfar Saba, IL Adam Brenner - Mission Viejo CA, US Arun Murti - Mission Viejo CA, US
International Classification:
G06F 3/06 G06F 9/54
Abstract:
Embodiments for optimizing a cost of storing backup data in an object store of a public cloud network provided by a cloud provider by storing delta objects each embodying changes to blocks of the backup data between a full backup incremental backups. The delta objects are each of a same block size, which can be changed. The process selects two sequential delta objects to form a larger object by extending each block to a minimal part size that is larger than the block size and inserting a region of unchanged data between the two delta objects. The larger object is divided into three different parts comprising the inserted region, and each of the extended delta object blocks. The process calculates an API and a compute cost for a synthesis operation on the delta objects based on a cost model and current price schedule of the cloud provider for the three different parts, and for the substantially larger object as a whole. The process selects a block size for the delta objects based on a lowest calculated cost.
Organizational Awareness For Automating Data Protection Policies
- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Adam Brenner - Mission Viejo CA, US
International Classification:
G06F 11/14 G06F 16/28
Abstract:
Embodiments for automating backup policy application to users in a data protection system of an organization, by defining a plurality of backup policies to apply to data processed by users in the organization, wherein each backup policy dictates a different performance characteristic based on storage cost and target storage type and location. Next, identifying a hierarchical position of a user within the organization and determining communication and grouping behavior of the user within the organization. A score is calculated for the user based on their hierarchical position and communication and grouping behavior, and an appropriate backup policy is assigned to a data processing device operated by the user based on the total score for the user.
Organizational Awareness For Automating Data Protection Policies Using Historical Weighting
- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Adam Brenner - Mission Viejo CA, US
International Classification:
G06F 11/14 G06Q 10/10
Abstract:
Embodiments for automating backup policy application to users in a data protection system of an organization, by defining a plurality of backup policies to apply to data processed by users in the organization, wherein each backup policy dictates a different performance characteristic based on storage cost and target storage type and location. Next, identifying a hierarchical position of a user within the organization and determining communication and grouping behavior of the user within the organization. A score is calculated for the user based on their hierarchical position and communication and grouping behavior, and an appropriate backup policy is assigned to the user based on their total score. If a user moves upward, a stronger protection policy is immediately applied, whereas is user moves down, a weaker protection policy is applied after a period of time to extend strong data protection if desired
Organizational Awareness For Automating Data Protection Policies With Social Graph Integration
- Hopkinton MA, US Mark Malamut - Aliso Viejo CA, US Adam Brenner - Mission Viejo CA, US
International Classification:
G06F 11/14 H04L 29/12 H04L 29/08
Abstract:
Embodiments for automating backup policies applied to users in an organization by defining backup policies based on hierarchical positions of users within the organization as modified by any communication and grouping behavior of the user within the organization. A social graph generator utilizes relevant relationships revealed by active participant communications to create a greater knowledge of data usage within the enterprise to generate social graphs that quantify a type of commonality between people. The integration of social graph information in calculating a score based on hierarchical data adds organizational awareness to the process by factoring in people's communication patterns within the organization and leverages any links that are revealed by such patterns.
One example method includes receiving an input that indicates selection of a cloud storage provider, receiving one or more product selection inputs, each of the product selection inputs indicating selection of a respective data protection product, receiving an input indicating an instance size, assembling the inputs together to define a data protection configuration, and automatically generating a script which, when executed by one or more hardware processors, deploys the data protection configuration in a cloud storage environment of the selected cloud storage provider.
Intelligent Monitoring Of Backup, Recovery And Anomalous User Activity In Data Storage Systems
- Hopkinton MA, US Brian E. Freeman - Golden CO, US Mark Malamut - Aliso Viejo CA, US
International Classification:
G06F 11/14 G06F 11/07
Abstract:
Embodiments for a system and method of monitoring performance metrics of a computer network, by defining key performance indicators for the user behavior in the computer network, collecting behavior statistics for each user for each of the key performance indicators, and providing one or more anomaly detection policies to define anomalous behavior of the users with respect to data assets of the computer network. An anomaly detection policy is applied to the collected behavior statistics to detect anomalous user behavior and an alert notification is sent to administrative or security personnel upon each detected instance of abnormal user behavior.
Intelligent Alert Reduction In A Backup And Recovery Activity Monitoring System
Embodiments for monitoring performance metrics of a computer network by defining key performance indicators for the computer network, collecting performance data for the key performance indicators, and providing one or more anomaly detection policies to define anomalous performance of the computer network using defined threshold values. A policy is applied to the collected performance data to detect abnormal performance and a notification is sent to a user upon each instance of the detected abnormal performance. An alert tracking component is used to reduce alert generation by compiling and displaying past alert response data to allow a user to directly modify threshold values for alert generation and define temporary parameters to increase alert thresholds.
Visual Mapping Of Protection Status For Networking Devices
- Hopkinton MA, US Adam Brenner - Mission Viejo CA, US Mark Malamut - Aliso Viejo CA, US Vijay Anand - Irvine CA, US
International Classification:
G06F 11/14
Abstract:
Embodiments are described for a method and system of applying data protection software mechanisms to network devices to auto-discover the networking equipment, save changes from memory (TCAM) to local storage, backup changes to protection storage, provide auditing and tracking history of changes, and provide the ability to deploy test/development copies of changes using software defined networking techniques. Embodiments include an efficient visual mapping aspect provided through a GUI to display the topography and backup/protection configuration of network devices in a system.
Name / Title
Company / Classification
Phones & Addresses
Mark Malamut President
Sign Arts Products Corp Telecommunications · Whol Rigid Polyurethane Foam · Other Chemical and Allied Products Merchant Wholesalers
34700 Pacific Coast Hwy #207, Capistrano Beach, CA 92624 (949)4899890
Mark Malamut President
CREATIVE ELECTRONIC SOLUTIONS, INC
18377 Bch Blvd STE 334, Huntington Beach, CA 92648
Youtube
Mike Malamut Collection (full episode)
Lance Lambert takes The Vintage Vehicle Show to Sherman Oaks, Californ...
Duration:
26m 43s
Alaskan Malamute - Top 10 Facts
The Alaskan Malamute features a powerful, sturdy body built for stamin...
Duration:
7m 37s
GIANT ALASKAN MALAMUTE DOGS
Anneka meets Lorna of Artic Rainbow & her pack of Alaskan Malamutes, f...
Duration:
13m 6s
The Adam Malamut Show Episode 20 with Attorne...
Duration:
47m 17s
The Adam Malamut Show Episode 13: The Changin...
On today's show, attorneys Adam Malamut and Mark Natale address the ch...
Duration:
41m 17s
Episode 14: Workers' Compensation and Employm...
Malamut & Associates attorneys Adam Malamut and Mark Natale break into...