WO2010010393A1 - Monitoring of backup activity on a computer system - Google Patents
Monitoring of backup activity on a computer system Download PDFInfo
- Publication number
- WO2010010393A1 WO2010010393A1 PCT/GB2009/050904 GB2009050904W WO2010010393A1 WO 2010010393 A1 WO2010010393 A1 WO 2010010393A1 GB 2009050904 W GB2009050904 W GB 2009050904W WO 2010010393 A1 WO2010010393 A1 WO 2010010393A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- backup
- client
- information
- computer system
- backed
- Prior art date
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 14
- 230000000694 effects Effects 0.000 title claims abstract description 13
- 238000004891 communication Methods 0.000 claims abstract description 5
- 238000000034 method Methods 0.000 claims description 30
- 238000004590 computer program Methods 0.000 claims description 7
- 238000013459 approach Methods 0.000 abstract description 2
- 238000007726 management method Methods 0.000 description 12
- 238000012552 review Methods 0.000 description 6
- 238000012550 audit Methods 0.000 description 4
- 238000007689 inspection Methods 0.000 description 3
- 230000000717 retained effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 239000003086 colorant Substances 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
Definitions
- the present invention is concerned with monitoring of backup activity on a computer system.
- Storage manager software (abbreviated below to "SM" will be used to refer to backup products that can be installed on a computer or server (referred to hereafter as a node or nodes) which may be running any one of several operating systems (for demonstration purposes, nodes running Wintel and UNIX operating systems will be further referenced).
- SM Storage manager software
- the client is configured to perform a backup of data located on the node using an incremental backup method.
- the client is registered with a specific SM server (referred to hereafter as the storage manager server). Communication between the client and the storage manager server is performed over a Local Area Network (LAN) or a Wide Area Network (WAN) using a system protocol such as Internet Protocol (IP).
- LAN Local Area Network
- WAN Wide Area Network
- IP Internet Protocol
- the client can be used to manually perform a backup, however in most cases a schedule is used to schedule a backup to start on the node at a particular time.
- An existing SM of this type is sold by International Business Machines under the name Tivoli
- any data to be backed up is backed up to the storage manager server over the network.
- the storage manager server subsequently saves the data to storage media that can be accessed in the event that the data has to be restored.
- client information Detailed results, detailing the activity of a backup job performed by the client, are entered into log files located on the node (and will be referred to hereafter as client information). Only a subset of this information is reported to the storage manager server, typically in the form of return codes.
- a computer system comprising a storage manager server and multiple clients, the storage manager server being adapted to receive data objects to be backed up from the clients and to store them in at least one mass storage device, and the clients being adapted to create client information comprising a log of status of backup jobs carried out by the client, the system being characterized in that it further comprises a home server adapted to receive client information from the client, to parse the client information, and so to provide a user with back relating to the success, failure or other status of backup operations on the computer system.
- the invention can thus provide a means for monitoring the backup activity which is distinct from the monitoring activity of the SM itself and which utilizes the client information, thus providing potentially more detailed and reliable information than for example return code-based facilities of the SFvI.
- True failure information normally found only on the client, is made available thus reducing time and effort normally required to connect to the client to ascertain failure information.
- a method of monitoring backup activity on a computer system comprising a storage manager server which receives data objects to be backed up from multiple clients in the system and which stores the data objects in at least one main storage device, the clients creating client information comprising respective logs of backup jobs which they carry out, the method of monitoring comprising providing a home server, transferring client information from the clients to the home server, parsing the client information received by the home server, and providing a user with backup information relating to the success, failure or other current backup status of a node.
- a computer program product for running on a home server of a computer system in which the home server is in communication with multiple clients, the computer program product comprising instructions which cause the home server to receive from the clients respective client information files comprising logs of backup jobs carried out by the clients, to parse the client information files, and to output for a user backup information relating to the success, failure or other current backup status of a node.
- the present invention makes it possible to present the backup data via a website in such a way that one is able at a glance to gain a complete overview of the current as well as historical backup situation for an individual node or complete environment, be it large or small.
- Potentially critical scenarios can be automatically flagged with coloured warnings on the website as well as e-mail and SMS (text message) alerts.
- the time and effort saved in identifying failed backups, as well as the advantage of having all the client information to hand means one can concentrate on solving backup problems.
- being able to proactively react to possibly critical situations that may normally go undetected helps protect against possible data loss.
- the backups can be monitored by anyone who has a valid account for the website, thus removing the pressure from node or server administrators. Reports complete with graphs and tables can be generated for individual nodes or the complete environment for several time frames. This is particularly helpful in an audit situation, and for ensuring Service Level Agreements (SLAs) are reached.
- SLAs Service Level Agreements
- Figure 1 is a diagrammatic representation of a backup environment
- Figure 2 is a diagrammatic representation of an environment for implementing the present invention
- Figure 3 is a screen display from a website used in an embodiment of the present invention.
- Figure 4 is a backup environment summary prepared by a system embodying the present invention
- Figure 5 presents summary data in relation to a chosen item in the backup environment summary
- Figure 6 presents backup information specific to a chosen node
- Figure 7 presents a historical backup data for a given node
- Figure 8 is a graph of the frequency of backup operation outcomes - failure, success, etc. - over time.
- Figure 9 shows backup information for a particular node.
- EBC electronic commerce
- a Wintef server to be referred to hereafter as a "home server”
- home server a Wintef server
- log files containing the client information are either collected by the home server or can be delivered.
- the software which comprises a parsing mechanism, applies specific initial parsing logic to the client information.
- two distinct log files are created. Key amongst them is a file containing summary information pertaining to the latest backup from every node where log files were available. This log file will be referred to hereafter as the "summary log.”
- the second part of EBC is a second Wintel server (to be referred to hereafter as the "host") running a data warehouse and hosting a website.
- the host running a data warehouse and hosting a website.
- the summary log is sent, e.g. via FTP or e-mail (with attachment) to the host where it is further parsed, having a certain criterion inspected as well as specific values compared and contrasted.
- the results of the data warehouse parsing are subsequently accessible via the website with a valid and registered e-mail account.
- the system makes it possible to drill down to the latest client information from an individual node. This means one is able to immediately identify (in most cases) the cause of a backup failure without having to spend time connecting to a node and manually checking the respective client information.
- the website offers an abundance of information to the end user, highlighting possible critical situations with the use of colours. However this is a passive approach to backup monitoring and relies on someone actively logging on and paying attention to the backups. In order to ensure that no critical warnings are overlooked, messages containing warnings and backup failure information can be sent to those who choose to have this service. These may for example be SMS (text messages) and/or e-mails. Each subscriber is able to individually tailor the service to meet his or her requirements. It is possible to receive just e-mails or SMS messages or both for the complete environment, and to specify individual nodes. This service ensures that the backups are proactively monitored, enabling administrators to swiftly and efficiently react to failed or possibly critical situations that may otherwise go undetected, even if a manual backup control was performed.
- SMS text messages
- EBC is also able to report on all backup activity at node level, service pack level or complete environment level over several (user defined) time scales.
- EBC is a complete backup monitoring and reporting system that enables one to proactively manage, react and report on the backup environment from anywhere in the world. Additionally, the information available can be used for audits or to ensure Service Level Agreements (SLAs) have been reached or adhered to.
- SLAs Service Level Agreements
- the storage manager software serves to backup data located on nodes running several platforms such as Wintel and UNIX.
- the storage manager server has storage resources 16 in the form of multiple mass media devices (tapes, disks) connected to it where backup data from the clients 12a, 12b is stored and managed.
- the role of the storage manager server 10 is to schedule backup jobs on each client and store and manage the data backed up from the clients, making it available as and when a restore is required.
- Each node to be backed up must have SM client software, called an SM client, installed on it.
- SM client software
- a configuration file or files are used. Detailed information pertaining to a backup is to be found in log files produced by the client 12a, 12b. There are slight differences between the number and type of tiles used tor Wintel and UNIX clients. Both will be detailed below.
- a Wintel client has three main files:
- the configuration file can be edited to configure the various specific SM settings for the respective backup. This includes specifying files/directories, otherwise known as "objects", that should be included in or excluded from the backup.
- objects files/directories, otherwise known as "objects", that should be included in or excluded from the backup.
- a "management class” which defines how long the objects that are backed up by the client should be retained once they have been transferred to the server. Additionally it defines how many versions are to be retained and for how long. If a management class is specifically defined on the client, this will be used. If however no management class is defined on the client, a default management class defined on the server that the client is connected to will be used.
- the main client backup information file contains the backup statistics resulting from the backup activity of the client.
- This file can contain more or less information pertaining to the backups depending on how the configuration file is configured. For example, it can contain a listing of every single file or directory backed up, or just a summary of the backup statistics depending on the configuration.
- a UNIX client may have up to five files:
- An incremental backup works by initially inspecting "objects". Objects are directories and files that reside on the file system of a node. What should be inspected is based on the include and exclude statements defined in the respective configuration files. Following the inspection phase, the inspected objects are compared with those that were previously backed up to see if they already exist or have been modified. If an object is new or has been modified since the last backup, it will be backed up and the data sent to the server. All other objects will not be backed up.
- the system to be described below through the utilisation of information obtained directly and automatically from the node only, makes it possible via a secure Internet website to gain, at a glance, an overview of a backup environment, large or small, or simply view backup information pertaining to a single backup.
- the option of receiving an e-mail or SMS or both makes certain that valuable information that may only otherwise be gleaned from browsing the website is not overlooked.
- the system enables a user to be actively or passively informed, and thus to proactively react against potential critical situations based on key client information (the only realistic data source that should be considered when monitoring SM backups) that, left undetected, could lead to data loss.
- EBC utlises only client information found on the respective nodes. Client log files are obtained from every monitored node.
- a UNIX node 12c has an SM client installed on it.
- the arrow 20 pointing from a home server 22 to the node 12c indicates that the log files are being collected from the node 12c by the home server 22.
- a Wintel node 12d has an SM client installed on it.
- the arrow pointing from the node 12d to the home server indicates that the log files are being sent from the node 12d to the home server 22.
- the parser applies initial parsing logic to them.
- the resulting information pertaining to the latest backup of each respective node, where the required client log files were available is subsequently entered into a file called the summary log.
- the summary log file forms the basis of information used to monitor and report on the backups. Within this file it is already possible to glean the basic status of most jobs, for example (a) failed, (b) still running or (c) successful.
- a second file is generated called the missing nodes log. If the log files from a node were once available but for whatever reason became unavailable, the name(s) of the missing nodes(s) appear(s) in this file. This file is produced as part of the initial parsing on the home server.
- the files once automatically loaded into the data warehouse 26 are further parsed with the resulting data uploaded to the website which is then available to an EBC service provider 28. Additionally, depending on how the user has configured his or her account, they will receive e-mails and SMS (text) messages detailing the specific backup failures and warnings.
- Website access requires a valid account (e-mail address) and password.
- the initial website view seen in Figure 3 offers several viewing options from a backup environment overview to detailed node backup information. It is also possible to generate reports as well as export data to a commercial spreadsheet package.
- the backup environment summary ( Figure 4) enables one to view the backup results of the complete environment at a glance, thus gleaning the most important statistics such as the number of backups that are failed, unknown or have possible warnings associated with them.
- the user may create a "Personai Backup View", selecting the particular backup information required, including alerts, the personal backup view being subsequently automatically provided to that particular user.
- EBC offers a "point in time” option that makes it possible to specify a date and view the respective backup information, and thus to establish whether or not the restore is possible (as long as there was data available at this time). This feature is also very useful in an audit situation where one must demonstrate that a particular backup (chosen at random by an auditor) was successful and most importantly that a record exists.
- Graphs and charts can be generated to help to identify trends and identify problem areas. As well as this they can be used for audits and for demonstrating Service Level Agreement (SLA) compliance.
- EBC offers several graph options specific for an individual node, service pack Wintel, UNIX or covering the complete environment. For example Figure 8 shows a graph of the outcomes of backup operations - successful, failed, etc. - over a consecutive sequence of backups.
- EBC enables one to view detailed failure information pertaining to a backup via the website, thus saving time and effort connecting to the node. It also has the advantage that it allows people to view the information who would normally not have the correct rights to view the information on the node. Armed with this detailed information it is then possible to take steps to prevent a further failed backup.
- the file system of a node may become corrupt.
- the inspection can simply stop, and only a backup of the objects inspected thus far is performed. Barring any other backup issues that may arise, the SM can subsequently - and erroneously - proclaim the backup as "successful". Left undetected, this can have devastating consequences as depending at what level the corrupt file system was located it could mean that only a small percentage of the objects to be backed up were actually backed up, thus making the restore of any affected objects impossible.
- the server 10 and the client 12 communicate the status of a backup job via "return codes".
- Particular return code values may for example indicate
- the value of the return code for any respective backup job is based primarily on the successful completion or failure of the scheduled job that starts the backup on the client. Subsequently, additional information pertaining to the respective backup such as the number of objects failed is taken into account.
- the server classifies the respective backup job as return code "0" or completely successful and attributes the corresponding return code. If the schedule for a backup job on a client starts and ends without an error, but one or more objects are reported as failed, the job is given a return code indicating that the scheduled job was successful, but one or more objects failed. In a worst-case scenario, every single object could fail for whatever reason during the backup, SM can declare the schedule that started the backup as successfully run although one or more objects were not backed up. This is because it is normal for some objects to fail, e.g. for one of the reasons just mentioned.
- outcome (b) above is a common occurrence, such a job (as long as the schedule started and completes successfully) is normally classed as successful by administrators and no further action is taken. With regard to the "worst case scenario”, if no further action were taken and it were left undetected, it would not be possible to restore any of the objects that were affected by the respective backup.
- an e-mail or SMS can be sent to proactively inform the relevant parties.
- a management class is an entry that may be included in the server identification file or the include/exclude file located locally on the respective node. This entry defines how "objects" are stored and managed within the SM storage infrastructure. The main purpose of the management class is to define how many versions of an object should be stored and for how long once it has been backed up.
- Information pertaining to the fact that the management class defined in the server identification or include/exclude files located on the node is invalid can be found in the specific error information file located on the node. This information may or may not be communicated to the respective server. In the event that it is communicated to the server, it may well be overlooked.
- an "invalid management" class is defined, a warning will appear on the website highlighting the issue. As before an e-mail and/or an SMS can be sent to proactively inform the relevant parties.
- the SM may report a backup as "successful" although nothing at al! has been backed up.
- the first is that no new objects were created or have been modified since the last backup.
- the second can be clue to a configuration error in the configuration file.
- EBC generates a warning on the website indicating that although the backup was successful, 0 bytes of information were backed up. E-mail and/or SMS alerts are available for this warning.
- a backup job runs for longer than twenty-four hours. Apart from the initial backup, not all data is backed up every time a backup is performed. Only new objects or objects that have been modified since the last backup are indeed backed up, which is why a backup is normally complete in under twenty-four hours. In the event that a backup does run longer than twenty-four hours, it could indicate a problem, e.g. the backup session between the client and the server may be hanging. With this in mind, a warning for this event is available via the website and is available with an e-mail and/or SMS alert.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Hardware Redundancy (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1101317.4A GB2474790B (en) | 2008-07-22 | 2009-07-22 | Monitoring of backup activity on a computer system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0813397.7A GB0813397D0 (en) | 2008-07-22 | 2008-07-22 | Monitoring of backup activity on a computer system |
GB0813397.7 | 2008-07-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010010393A1 true WO2010010393A1 (en) | 2010-01-28 |
Family
ID=39737447
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2009/050904 WO2010010393A1 (en) | 2008-07-22 | 2009-07-22 | Monitoring of backup activity on a computer system |
Country Status (2)
Country | Link |
---|---|
GB (2) | GB0813397D0 (en) |
WO (1) | WO2010010393A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9471576B1 (en) | 2011-12-08 | 2016-10-18 | Veritas Technologies | Systems and methods for providing backup storage interfaces |
EP3528123A1 (en) * | 2018-02-16 | 2019-08-21 | Wipro Limited | Method and system for automating data backup in hybrid cloud and data centre (dc) environment |
CN110245045A (en) * | 2019-05-23 | 2019-09-17 | 平安科技(深圳)有限公司 | A kind of keyword alarm method and device based on log |
US10684921B1 (en) * | 2011-12-08 | 2020-06-16 | Veritas Technologies Llc | Systems and methods for navigating backup configurations |
US11645164B2 (en) | 2021-08-11 | 2023-05-09 | International Business Machines Corporation | Adjusting data backups based on system details |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999023562A1 (en) * | 1997-11-03 | 1999-05-14 | Gateway, Inc. | Automatic backup based on disk drive condition |
EP0945800A1 (en) * | 1998-03-02 | 1999-09-29 | Hewlett-Packard Company | Data backup system |
US20040030721A1 (en) * | 2000-10-17 | 2004-02-12 | Hans-Joachim Kruger | Device and method for data mirroring |
US20050228836A1 (en) * | 2004-04-08 | 2005-10-13 | Bacastow Steven V | Apparatus and method for backing up computer files |
EP1635244A2 (en) * | 2004-09-09 | 2006-03-15 | Microsoft Corporation | Method, system, and apparatus for creating an archive routine for protecting data in a data protection system |
US20060136360A1 (en) * | 2004-12-22 | 2006-06-22 | Alexander Gebhart | Preserving log files in a distributed computing environment |
US20070061385A1 (en) * | 2003-05-06 | 2007-03-15 | Aptare, Inc. | System to manage and store backup and recovery meta data |
US20070198593A1 (en) * | 2005-11-28 | 2007-08-23 | Anand Prahlad | Systems and methods for classifying and transferring information in a storage network |
-
2008
- 2008-07-22 GB GBGB0813397.7A patent/GB0813397D0/en not_active Ceased
-
2009
- 2009-07-22 WO PCT/GB2009/050904 patent/WO2010010393A1/en active Application Filing
- 2009-07-22 GB GB1101317.4A patent/GB2474790B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999023562A1 (en) * | 1997-11-03 | 1999-05-14 | Gateway, Inc. | Automatic backup based on disk drive condition |
EP0945800A1 (en) * | 1998-03-02 | 1999-09-29 | Hewlett-Packard Company | Data backup system |
US20040030721A1 (en) * | 2000-10-17 | 2004-02-12 | Hans-Joachim Kruger | Device and method for data mirroring |
US20070061385A1 (en) * | 2003-05-06 | 2007-03-15 | Aptare, Inc. | System to manage and store backup and recovery meta data |
US20050228836A1 (en) * | 2004-04-08 | 2005-10-13 | Bacastow Steven V | Apparatus and method for backing up computer files |
EP1635244A2 (en) * | 2004-09-09 | 2006-03-15 | Microsoft Corporation | Method, system, and apparatus for creating an archive routine for protecting data in a data protection system |
US20060136360A1 (en) * | 2004-12-22 | 2006-06-22 | Alexander Gebhart | Preserving log files in a distributed computing environment |
US20070198593A1 (en) * | 2005-11-28 | 2007-08-23 | Anand Prahlad | Systems and methods for classifying and transferring information in a storage network |
Non-Patent Citations (1)
Title |
---|
"IBM Tivoli Storage Manager for System Backup and Recovery (SysBack) Version 6.1 Installation and User's Guide, pp. vii, viii, 19-68, 313-328, 347-350", November 2007, IBM, XP002550871 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9471576B1 (en) | 2011-12-08 | 2016-10-18 | Veritas Technologies | Systems and methods for providing backup storage interfaces |
US10684921B1 (en) * | 2011-12-08 | 2020-06-16 | Veritas Technologies Llc | Systems and methods for navigating backup configurations |
EP3528123A1 (en) * | 2018-02-16 | 2019-08-21 | Wipro Limited | Method and system for automating data backup in hybrid cloud and data centre (dc) environment |
US10824514B2 (en) | 2018-02-16 | 2020-11-03 | Wipro Limited | Method and system of automating data backup in hybrid cloud and data centre (DC) environment |
CN110245045A (en) * | 2019-05-23 | 2019-09-17 | 平安科技(深圳)有限公司 | A kind of keyword alarm method and device based on log |
CN110245045B (en) * | 2019-05-23 | 2022-06-07 | 平安科技(深圳)有限公司 | Keyword warning method and device based on log |
US11645164B2 (en) | 2021-08-11 | 2023-05-09 | International Business Machines Corporation | Adjusting data backups based on system details |
Also Published As
Publication number | Publication date |
---|---|
GB2474790B (en) | 2012-12-19 |
GB2474790A (en) | 2011-04-27 |
GB201101317D0 (en) | 2011-03-09 |
GB0813397D0 (en) | 2008-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100579956B1 (en) | Change monitoring system of computer system | |
US8751283B2 (en) | Defining and using templates in configuring information technology environments | |
US8763006B2 (en) | Dynamic generation of processes in computing environments | |
JP5492788B2 (en) | System and apparatus for automatic data anomaly correction in a computer network | |
CN109614283B (en) | Monitoring system of distributed database cluster | |
US9575814B2 (en) | Identifying hung condition exceeding predetermined frequency threshold and modifying hanging escalation tasks to avoid hang conditions | |
US20040148385A1 (en) | Method and apparatus for software and hardware event monitoring and repair | |
US20110296390A1 (en) | Systems and methods for generating machine state verification using number of installed package objects | |
US20080059123A1 (en) | Management of host compliance evaluation | |
US9411969B2 (en) | System and method of assessing data protection status of data protection resources | |
US20130111479A1 (en) | Performance of Scheduled Tasks via Behavior Analysis and Dynamic Optimization | |
US7469287B1 (en) | Apparatus and method for monitoring objects in a network and automatically validating events relating to the objects | |
US7757122B2 (en) | Remote maintenance system, mail connect confirmation method, mail connect confirmation program and mail transmission environment diagnosis program | |
KR100972073B1 (en) | Operation level management system and management method | |
WO2010010393A1 (en) | Monitoring of backup activity on a computer system | |
US20050154734A1 (en) | Method and system for monitoring and reporting backup results | |
KR20040091392A (en) | Method and system for backup management of remote using the web | |
JP6317074B2 (en) | Failure notification device, failure notification program, and failure notification method | |
US7954062B2 (en) | Application status board mitigation system and method | |
US11983252B2 (en) | Software license manager security | |
US8402125B2 (en) | Method of managing operations for administration, maintenance and operational upkeep, management entity and corresponding computer program product | |
US8380729B2 (en) | Systems and methods for first data capture through generic message monitoring | |
US20070005756A1 (en) | Shared data center monitor | |
KR102668343B1 (en) | Method for managing interface, interface governance system, and a storage medium storing a computer-executable program to manage the interface | |
KR102668325B1 (en) | Method for managing interface, interface governance system, and a storage medium storing a computer-executable program to manage the interface |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09785378 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 1101317 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20090722 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1101317.4 Country of ref document: GB |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09785378 Country of ref document: EP Kind code of ref document: A1 |