U.S. patent application number 11/760588 was filed with the patent office on 2008-12-11 for searching and restoring of backups.
This patent application is currently assigned to APPLE INC.. Invention is credited to Pavel Cisler, John Hornkvist, David Lyons, Peter McInerney, Eric Weiss.
Application Number | 20080307017 11/760588 |
Document ID | / |
Family ID | 40096846 |
Filed Date | 2008-12-11 |
United States Patent
Application |
20080307017 |
Kind Code |
A1 |
Lyons; David ; et
al. |
December 11, 2008 |
Searching and Restoring of Backups
Abstract
Methods, systems, and apparatus, including computer program
products, for searching for and presenting backups. A first search
result including a first version of an item is presented. The first
version is associated with a first date range having a first start
date and a first end date. User input requesting that an archive
including one or more versions of the item be searched is received.
A second search result including a second version of the item is
presented. The second version is different from the first version.
The second version is associated with a second date range having a
second start date and a second end date. The second date range does
not overlap with the first date range.
Inventors: |
Lyons; David; (San Jose,
CA) ; Weiss; Eric; (San Francisco, CA) ;
Cisler; Pavel; (Los Gatos, CA) ; McInerney;
Peter; (Cupertino, CA) ; Hornkvist; John;
(Cupertino, CA) |
Correspondence
Address: |
FISH & RICHARDSON P.C.
PO BOX 1022
MINNEAPOLIS
MN
55440-1022
US
|
Assignee: |
APPLE INC.
Cupertino
CA
|
Family ID: |
40096846 |
Appl. No.: |
11/760588 |
Filed: |
June 8, 2007 |
Current U.S.
Class: |
1/1 ;
707/999.204 |
Current CPC
Class: |
G06F 11/1469 20130101;
G06F 3/0482 20130101; G06F 11/1458 20130101; G06F 2201/84 20130101;
G06F 16/248 20190101 |
Class at
Publication: |
707/204 |
International
Class: |
G06F 11/14 20060101
G06F011/14 |
Claims
1. A method comprising: presenting a first search result including
a first version of an item, the first version associated with a
first date range having a first start date and a first end date;
receiving user input requesting that an archive including one or
more versions of the item be searched; and presenting a second
search result including a second version of the item, the second
version different from the first version, the second version
associated with a second date range having a second start date and
a second end date, and where the second date range does not overlap
with the first date range.
2. The method of claim 1, wherein the second date range predates
the first date range.
3. The method of claim 1, wherein the second date range postdates
the first date range.
4. The method of claim 1, wherein presenting a second search result
comprises: in response to the user input, searching the archive for
one or more versions of the item that are associated with
respective date ranges that do not overlap with the first date
range.
5. A method comprising: associating a first archival copy of an
item with a first date range, the first date range having a first
starting date and a first ending date; detecting that the item is
unchanged with respect to the first archival copy; in response to
detecting that the item has not changed, extending the first date
range; detecting a modification of the item; and associating a
second archival copy of the item with a second date range, the
second archival copy including the modification to the item, the
second date range having a second starting date and a second ending
date.
6. The method of claim 5, wherein extending the first date range
comprises updating the first ending date.
7. The method of claim 5, where extending the first date range
includes modifying metadata associated with the first archival
copy.
8. The method of claim 5, where associating the first archival copy
of the item with a first data range includes determining a first
starting point of the first archival copy.
9. The method of claim 5, where detecting a modification of the
item includes comparing the first archival copy of the item to a
current version of the item.
10. A method comprising: presenting a history view including a
first search result including a first version of an item, the first
version associated with a first date range having a first start
date and a first end date; receiving an input in the history view
to identify a second version of the item; and presenting a history
view including the first search result including the identified
second version of the item.
11. The method of claim 10, where receiving the input in the
history view includes an input to a navigation arrow.
12. The method of claim 10, where identifying the second version of
the item includes searching for versions of the item associated
with a data range outside of the first date range.
13. The method of claim 10, where presenting the history view
includes: presenting a plurality of visual representations of the
first search result, each visual representation representing a
particular snapshot in time and where presenting the first search
result including the identified second version of the item includes
automatically traversing one or more of the plurality of visual
representations including the first version of the item.
14. A computer program product, encoded on a computer-readable
medium, operable to cause data processing apparatus to perform
operations comprising: presenting a first search result including a
first version of an item, the first version associated with a first
date range having a first start date and a first end date;
receiving user input requesting that an archive including one or
more versions of the item be searched; and presenting a second
search result including a second version of the item, the second
version different from the first version, the second version
associated with a second date range having a second start date and
a second end date, and where the second date range does not overlap
with the first date range.
15. A computer program product, encoded on a computer-readable
medium, operable to cause data processing apparatus to perform
operations comprising: associating a first archival copy of an item
with a first date range, the first date range having a first
starting date and a first ending date; detecting that the item is
unchanged with respect to the first archival copy; in response to
detecting that the item has not changed, extending the first date
range; detecting a modification of the item; and associating a
second archival copy of the item with a second date range, the
second archival copy including the modification to the item, the
second date range having a second starting date and a second ending
date.
16. A computer program product, encoded on a computer-readable
medium, operable to cause data processing apparatus to perform
operations comprising: presenting a history view including a first
search result including a first version of an item, the first
version associated with a first date range having a first start
date and a first end date; receiving an input in the history view
to identify a second version of the item; and presenting a history
view including the first search result including the identified
second version of the item.
17. A system, comprising: one or more processors; and instructions
configured for execution by the one or more processors, the
instructions comprising instructions to: present a first search
result including a first version of an item, the first version
associated with a first date range having a first start date and a
first end date; receive user input requesting that an archive
including one or more versions of the item be searched; and present
a second search result including a second version of the item, the
second version different from the first version, the second version
associated with a second date range having a second start date and
a second end date, and where the second date range does not overlap
with the first date range.
18. A system, comprising: one or more processors; and instructions
configured for execution by the one or more processors, the
instructions comprising instructions to: associate a first archival
copy of an item with a first date range, the first date range
having a first starting date and a first ending date; detect that
the item is unchanged with respect to the first archival copy; in
response to detecting that the item has not changed, extend the
first date range; detect a modification of the item; and associate
a second archival copy of the item with a second date range, the
second archival copy including the modification to the item, the
second date range having a second starting date and a second ending
date.
19. A system, comprising: one or more processors; and instructions
configured for execution by the one or more processors, the
instructions comprising instructions to: present a history view
including a first search result including a first version of an
item, the first version associated with a first date range having a
first start date and a first end date; receive an input in the
history view to identify a second version of the item; and present
a history view including the first search result including the
identified second version of the item.
Description
BACKGROUND
[0001] The subject matter of this specification relates generally
to storing and restoring digital data.
[0002] Modern graphical user interfaces allow a large number of
graphical objects or items to be displayed on a display screen at
the same time. Operating systems, e.g., Apple Mac OS.RTM., provide
user interfaces in which a number of graphical user interface
windows can be displayed, overlapped, resized, moved, configured,
and reformatted according to the needs of a user or a particular
application. Taskbars, menus, virtual buttons, and other user
interface elements provide mechanisms for accessing and activating
windows even when they are hidden behind other windows.
[0003] With the sophisticated tools available, users are encouraged
not only to create and save a multitude of items in their
computers, but to revise or otherwise improve on them over time.
For example, a user can work with a certain file and thereafter
save the file's current version on a storage device. The next day,
however, the user could have had second thoughts about the
revisions, or could have come up with new ideas, and therefore
opens the file again.
[0004] The revision process is usually straightforward if the user
wants to add more material to the file or make changes to what is
there. But it is typically more difficult for a user who has
changed his/her mind about changes that were previously made and
wants the file returned to a previous version. Application programs
for word processing typically let the user "undo" previous edits of
a text, at least up to a predefined number of past revisions. The
undo feature also usually is configured so that the previously made
revisions must be undone in reverse chronological order; that is,
the user must first undo the most recently made edit, then the
second-most recent one, and so on. If the user saves and closes the
document and thereafter opens the document again, it might not be
possible to automatically undo any previous edits.
SUMMARY
[0005] In general, one aspect of the subject matter described in
this specification can be embodied in methods that include the
actions of presenting a first search result including a first
version of an item, the first version associated with a first date
range having a first start date and a first end date; receiving
user input requesting that an archive including one or more
versions of the item be searched; and presenting a second search
result including a second version of the item, the second version
different from the first version, the second version associated
with a second date range having a second start date and a second
end date, and where the second date range does not overlap with the
first date range. Other embodiments of this aspect include
corresponding systems, apparatus, and computer program
products.
[0006] In general, another aspect of the subject matter described
in this specification can be embodied in methods that include the
actions of associating a first archival copy of an item with a
first date range, the first date range having a first starting date
and a first ending date; detecting that the item is unchanged with
respect to the first archival copy; in response to detecting that
the item has not changed, extending the first date range; detecting
a modification of the item; and associating a second archival copy
of the item with a second date range, the second archival copy
including the modification to the item, the second date range
having a second starting date and a second ending date. Other
embodiments of this aspect include corresponding systems,
apparatus, and computer program products.
[0007] In general, another aspect of the subject matter described
in this specification can be embodied in methods that include the
actions of presenting a history view including a first search
result including a first version of an item, the first version
associated with a first date range having a first start date and a
first end date; receiving an input in the history view to identify
a second version of the item; and presenting a history view
including the first search result including the identified second
version of the item. Other embodiments of this aspect include
corresponding systems, apparatus, and computer program
products.
[0008] Particular embodiments of the subject matter described in
this specification can be implemented to realize one or more of the
following advantages. An archival copy of a file is associated with
a date range during which the corresponding file outside of the
archive has not been modified. When a user browses archival copies
of the file, the user can jump from one archival copy directly to
another archival copy that includes changes to the file relative to
the preceding archival copy.
[0009] The details of one or more embodiments of the subject matter
described in this specification are set forth in the accompanying
drawings and the description below. Other features, aspects, and
advantages of the subject matter will become apparent from the
description, the drawings, and the claims.
BRIEF DESCRIPTION OF THE DRAWINGS
[0010] FIG. 1 is a block diagram of an example system.
[0011] FIG. 2 is a block diagram of an example of architecture for
backing up, searching, and restoring system information.
[0012] FIG. 3 is a screen shot depicting an example of a desktop
user interface including a search application.
[0013] FIG. 4 is a screen shot depicting an example of a desktop
user interface including a first list of options within a search
application.
[0014] FIG. 5 is a screen shot depicting an example of a desktop
user interface including a second list of options within a search
application.
[0015] FIG. 6 is a screen shot depicting an example of a desktop
user interface including several search inputs within a search
application.
[0016] FIGS. 7A-7C is a screen shot depicting an example of a
backup interface including search results within a search
application.
[0017] FIG. 8 is a screen shot depicting an example of a backup
interface including an item timeline associated with search results
within a search application.
[0018] FIG. 9 is a flow chart of an example of a process for
searching and restoring system information.
[0019] FIG. 10 is a flow chart of an example of a process for
searching for items associated with date ranges.
[0020] FIG. 11 is a flow chart of an example of a process for
associating archival copies of items with date ranges.
[0021] Like reference numbers and designations in the various
drawings indicate like elements.
DETAILED DESCRIPTION
[0022] FIG. 1 is a block diagram of an example system 100. The
system 110 can be used for allowing a user to search a captured
version of an interface view, perhaps to initiate a restoration
based on the captured version. As used herein, a view refers to an
item, element, or other content, capable of being stored and/or
retrieved in an interface that can be subjected to a backup
operation by a backup component 117. For example, a user interface
view can contain any number of icons, files, folders, application
state information and/or machine state information, preferences,
etc.
[0023] The system 100 includes a personal computer 102
communicatively coupled to a remote server 107 using a network
interface 116 and a network 108 (e.g., local area network, wireless
network, Internet, intranet, etc.). The computer 102 generally
includes a processor 103, memory 105, one or more input devices 114
(e.g., keyboard, mouse, etc.) and one or more output devices 115
(e.g., a display device). A user interacts with the system 100
using the input and output devices 114, 115. The system 100 as
shown includes various hardware elements. However, the system 100
can include hardware, software, and combinations of the two.
[0024] The computer 102 also includes a local storage device 106
and a graphics module 113 (e.g., a graphics card) for storing
information and generating graphical objects, respectively. The
local storage device 106 can be a computer-readable medium. The
computer readable medium can be, for example, a machine-readable
storage device, a machine-readable storage substrate, a memory
device, a composition of matter effecting a machine-readable
propagated signal, or a combination of one or more them.
[0025] While modifications of a user interface view are described
herein with respect to a personal computer 102, it should be
apparent that the disclosed implementations can be incorporated in,
or integrated with, any electronic device that has a user
interface, including without limitation, portable and desktop
computers, servers, electronics, media players, game devices,
mobile phones, email devices, personal digital assistants (PDAs),
embedded devices, televisions, other consumer electronic devices,
etc.
[0026] Systems and methods are provided for searching stored
contents that correspond to earlier versions of system information,
application information, or system, application, or user interface
state. The systems and methods can be stand alone or otherwise
integrated into a more comprehensive application. In one
implementation, an integrated system and method for modifying a
user interface view is disclosed.
[0027] Though discussion is made with reference to modifying a
interface view (e.g., a user interface view), those of ordinary
skill will recognize that such a view can be based on various data
structures, files, processes, and other aspects of information
management. Thus, a modification to file structures, data and the
like is also contemplated in order to achieve the modification to
the user interface view. In other words, while the restoration of
the user interface view from one state to another can be the most
apparent change from the user's perspective, this is accomplished
through the corresponding changes in the underlying system
content.
[0028] One of ordinary skill in the art will recognize that the
engines, methods, processes and the like that are described can
themselves be an individual process or application, part of an
operating system, a plug-in, an application, or the like. In one
implementation, the system and methods can be implemented as one or
more plug-ins that are installed and run on the personal computer
102. The plug-ins are configured to interact with an operating
system (e.g., MAC OS X, WINDOWS XP, LINUX, etc.) and to perform the
various functions, as described with below. A system and method for
modifying a user interface view can also be implemented as one or
more software applications running on the computer 102. Such a
system and method can be characterized as a framework or model that
can be implemented on various platforms and/or networks (e.g.,
client/server networks, wireless networks, stand-alone computers,
portable electronic devices, mobile phones, etc.), and/or embedded
or bundled with one or more software applications (e.g., email,
media player, browser, etc.).
[0029] The computer 102 includes the backup component 117 that
allows for the storage of versions of the computer's files or other
items (e.g., restoring a view including a past state of a file,
application, application data, parameters, settings, and the like),
for example within the local storage 106 or in an external storage
repository. In one implementation, the backup component 117 also
allows a user to select any of the stored versions and use the
selected version to initiate a restoration of that version in the
computer 102.
[0030] The computer 102 also includes a search component 118 that
allows for searches of the computer's files or other items, for
example within the local storage 106 or an external storage
repository. In one implementation, the search component 118 can
interact with the backup component 117 to perform searches of
stored versions of the computer's files and other items.
Particularly, in one implementation, the search component 118
allows a user to select search results that have been identified in
an earlier version and use the search results to initiate a
restoration of that version in the computer 102.
[0031] FIG. 2 is a block diagram of an example architecture 200 for
backup operations. The architecture 200 can be used to provide
backup operations and restoration of backup data including
application data (e.g., application files, application data,
settings, parameters or the like), associated with a set of
applications 228.
[0032] In one implementation, the backup component 117 provides
back up and restoration capability for the system 100. Many
different items or elements can be the subject of a backup
operation in the system 100. For example, data elements including
folders, files, items, information portions, directories, images,
system or application parameters, playlists, address books,
e-mails, e-mail folders, a state of an application or state of the
system, preferences (e.g., user or system preferences), and the
like all can be candidates for inclusion in an archive of backup
data during the backup operation. Other types of data can also be
included in the backup data for the system 100. In this example,
the backup component 117 includes a local storage device 204 and an
external storage device 232. Backup data, e.g., particular versions
or views resulting from backup operations, can be stored on either
or both storage devices. Any number of local and/or external
storage devices can be used by the backup component 117 for storing
the backup data representing one or more versions of data. In one
implementation, no local storage is provided.
[0033] In some implementations, for any one element, e.g., item,
file, etc., multiple versions can be backed up and stored. In some
implementations, for any one element, multiple backup copies can be
saved, and any one version of the item, file, element, etc. can be
embodied by more than one backup copy (e.g., if the item is backed
up periodically and the item remains unchanged over multiple backup
intervals).
[0034] In one implementation, the backup component 117 runs as a
background task on an operating system 230 that is not visible to
the user. The backup component 117 can be capable of running across
multiple user accounts. In another implementation, the backup
component 117 runs within an application in the user space.
[0035] The backup component 117 includes an activity monitoring
engine 212. In one implementation, the activity monitoring engine
212 monitors for changes within applications (e.g., application
files or state) that are targeted for backup operations. A change
can include the addition of new files or data (e.g., files or other
data structures) or deletion of the same.
[0036] In one implementation, the activity monitoring engine 212 is
capable of discerning between a substantive change (e.g. the text
within a document has been modified) and a non-substantive change
(e.g. the play count within an iTunes playlist has been updated, or
several changes cancel each other out) through its interaction with
the application programs 228. The activity monitoring engine 212
can, for example, create a list of modified elements (e.g., files)
to be used when a backup operation is eventually triggered.
[0037] In one implementation, the activity monitoring engine 212
can monitor the system for periods of inactivity. The activity
monitoring engine 212 can then trigger a backup operation during a
period of time in which the backup operation will not cause a
system slowdown for an active user.
[0038] A preference management engine 214 specifies some operating
parameters of the backup component 117. In one implementation,
preference management engine 214 contains user-specified and/or
system default application parameters for the backup component 117.
These can include settings for the details of capturing and storing
the views. For example, the preference management engine 214 can
determine the frequency of a backup operations, the storage
location for the backup data, the types of data elements (e.g.,
files or other items) that are to be included in the backup
operations, and the events which can trigger a backup operation
(periodic or event-driven, etc.).
[0039] In one implementation, the preference management engine 214
can detect that a new storage device is being added to the system
and prompt the user whether it should be included as a backup
repository. Files and other items can be scheduled for a backup
operation due to location (e.g. everything on the C: drive and
within D:/photos), a correlation with specific applications (e.g.
all pictures, music, e-mail in an inbox, an address book and system
settings), or a combination of strategies. Different types of items
can be scheduled to be stored on different devices or on different
segments of a storage device during a backup operation. In one
implementation, the backup component 117 stores the versions in a
format corresponding to a file system structure.
[0040] A backup management engine 216 coordinates the collection,
storage, and retrieval of data (e.g., views) performed by the
backup component 117. For example, the backup management engine 216
can trigger the activity monitoring engine 212 to monitor for
activities that satisfy a requirement specified in the preference
management engine 214.
[0041] A change identifying engine 218 locates specific elements
(e.g., monitored files or other items) to determine if the elements
have changed. The change identifying engine 218 can be capable of
discerning a substantive change from a non-substantive change,
similar to the example described above for the activity monitoring
engine 212. In one implementation, the change identifying engine
218 traverses a target set of elements (e.g., files or other
items), comparing a previous version to the current version to
determine whether or not a modification has occurred.
[0042] A backup capture engine 220 locates views that are to be
included in the backup operation. The view (e.g., of an
application, file system, etc.) can include various elements (e.g.,
files, state, and other application information). The backup
capture engine 220 can invoke the activity monitoring engine 212
and/or the change identifying engine 218, for example, to generate
a capture list identifying data to include in a next backup
operation. The backup capture engine 220 can then store data
associated with the listed data in one or more targeted storage
repositories. For example, the backup capture engine 220 can store
the changed elements in a file system hierarchy that includes
references (e.g., links) to unchanged elements. The backup capture
engine 220 can track multiple version of each view included in the
backup repository.
[0043] The backup component 117 includes a backup restoration
engine 222 to restore previous versions of views (e.g., files,
data, or other items). In one implementation, the backup
restoration engine 222 provides a user interface (e.g., a graphical
user interface) where a user can select a view or portions of a
view (e.g., elements, items, etc.) to be restored.
[0044] A backup conflict resolution engine 234 can be configured to
resolve a conflict that is presented for a particular restoration.
For example, the backup conflict resolution engine 234 can detect
that the restoration of a particular item to a previous version
thereof would result in some portion of information being lost from
the current version of the item. In some implementations, the
conflict resolution engine 234 can detect this condition, alert the
user about it, present one or more possible actions, and receive
the user's selection of how to proceed, to name a few examples.
[0045] The search component 118 can search directly within the one
or more applications 228 for a current state or version of the
element including particular files or other items. In addition, the
search component 118 can search earlier versions of the files and
other items using the backup component 117. For example, the search
component 118 can provide a search interface within a backup
interface that allows searches of earlier versions of the files or
other items. In addition, the search component 118 can provide a
search interface within a desktop user interface that allows
searches of the current version of the files or other items.
Alternatively, in another implementation, the search interface can
be presented within the backup interface. Additionally, the search
interface can be a component within a single interface, such as a
portion of the backup interface and not a separate interface.
[0046] For example, the search component 118 can be used to
initiate a search to find a particular item or element, such as an
image file. If this search finds the sought item, and if the item
meets the user's expectations, there may be no need to do any
further searching. However, if the search does not find the sought
item, or if the item that is found does not meet the user's
expectations, the user can choose to perform a search of historical
views. The user can activate the backup interface to search the
historical views.
[0047] An example of such searching will now be described with
reference to FIG. 9. An example process 900 for searching and
restoring system information is shown. The process 900 can be
performed, for example, by a system such as the system 100 or 200.
For clarity of presentation, the description that follows uses the
systems 100 and 200 as an example. However, another system, or
combination of systems, can be used to perform the process 900.
[0048] The system receives (902) a search entry from a user. For
example, a user can make a search input using the search component
118. The system searches (904) the current contents based on the
search entry. For example, the search component 118 can search data
managed by a particular application 228 (e.g., an application that
manages the file system). In one implementation, a search
application presents a search result to the user from searching the
current contents (e.g., a current view). The presented search
results can include one or more elements, or items, matching the
search entry.
[0049] The system searches (906) a backup archive based on the
search entry. For example, the search component 118 can use the
backup component 117 to access and search historical data (e.g.,
files, system or application states, or other items). The searching
(906) can be performed by default whenever the searching (904) is
done. However, in some implementations, the searching (906) is
performed upon user initiation. For example, the user can activate
the backup component 117 to perform the searching (906).
[0050] The system presents (908) results of one or more searches.
For example, the search component 118 can present results of a
search of the current state of the system 100 within a desktop user
interface or results of a search of one or more historical states
with a backup interface, or both. For example, in one
implementation, one or more history views associated with the
current view are presented to the user where each history view
includes search results (e.g., visual representations of the search
application) based on a search of system data from stored history
data e.g., an archive. The search results presented can include one
or more items that were not present in the search result provided
for the current contents.
[0051] In some implementations, both the current contents and the
search of the backup archive can always be searched. In certain
implementations, the search of the backup archive can be performed
automatically upon determining that no results or a non-desired
result occurs during the search of the current contents. In certain
implementations, the presentation of the results from the current
contents search and the backup archive search can occur in separate
steps. For example, upon determining that the results of the search
of the current contents are not sufficient, a user can initiate a
search and presentation of the backup archive.
[0052] In some implementations, items in the backup archive are
associated with respective date ranges. The date range indicates a
time span when the item in the backup archive remained unchanged.
For example, if an item in the current contents takes on a
particular version and remains unchanged for five days, then a
backup version of the item can be associated with a date range
spanning the five days. For example, multiple backup operations of
the item can occur during that date range. However, with each
backup operation the backup component 117 determines that the item
is unchanged. A snapshot of the item can be taken during each
backup operation, at which time the date range can be updated. As
used herein, a snapshot refers to a backup element stored in an
archive that includes a backup of selected items or content as
specified by the backup component 117. A snapshot can also refer to
a view of the current system state with respect to a file, an item,
an element, etc.
[0053] The date range can be defined by a start date and an end
date that specifies when the item became the version associated
with the date range and when the item was modified to become a
different version. In some implementations, the start date and the
end date defining the date range of an item in the backup archive
can be included in metadata associated with the item. The
association of a date range with an item in the backup archive is
described below in relation to FIG. 11.
[0054] The date ranges associated with current and backup versions
of items can be used during a search of the current system state
and the backup archive. An example of searching and presenting
current and backup content associated with date ranges will now be
described with reference to FIG. 10. An example process 1000 for
searching system information associated with date ranges is shown.
The process 1000 can be performed, for example, by a system such as
the system 100 or 200. For clarity of presentation, the description
that follows uses the systems 100 and 200 as an example. However,
another system, or combination of systems, can be used to perform
the process 1000.
[0055] The system presents (1002) a version of an item. For
convenience, this presented version of the item will be referred to
as version X. In some implementations, the presented version X
corresponds to a search result of a search performed in accordance
with the process 900. For example, a search of the current state of
the system and/or the backup archive can be performed and a version
(which can be the current version or a version that is stored in
the backup archive) of an item can be presented as a search result
in a backup interface. The item can be a file, a data entry (e.g.,
in an address book or a calendar), or any type of data that can be
stored in the system. Version X is associated with a date range
defined e.g., to include a start date and an end date. The date
range indicates the time span when version X was without any
substantive modification (e.g., no user edits that result in a
substantive change to the data of a file).
[0056] The system receives (1004) user input requesting a search of
the archive (and optionally the current system state). The input
can be a request to search the archive for other backup versions of
the item and/or to search the current system state for the current
version of the item. In some implementations, the input is a
request to navigate, in a backup interface, between search results
corresponding to the current system state and one or more backup
versions of the item stored in the archive.
[0057] For example, if a search result corresponding to the current
state is presented in the backup interface, the user can enter an
input (e.g., click on a directional arrow) to navigate to a search
result corresponding to a previous version in the backup interface
(e.g., corresponding to backup data from an earlier backup
operation). Likewise, if the search result corresponding to a
backup is presented in the backup interface, the user can enter an
input to navigate to a search result corresponding to the current
state or to an older or newer backup.
[0058] The system searches (1006) the archive and/or the current
system state. In some implementations, the search is in response to
a user input requesting the search, described above in reference to
block 1004. The search component 118 can search data in the current
file system and use the backup component 117 to access and search
data in a backup archive.
[0059] The search looks for versions of the item that are different
from version X. In some implementations, the search looks for
versions of the item whose date ranges are outside of the date
range of version X. For example, if version X is associated with a
date range of Jan. 1, 2005 to Jan. 5, 2005, then the search looks
for versions with date ranges that end before or on Jan. 1, 2005 or
that begin on or after Jan. 5, 2005 (e.g., snapshots including the
item which were taken before or after the date range).
[0060] The system presents (1008) another version of the item. For
example, the search component 118 can present results of the search
performed in accordance with block 1006 in a backup interface. The
version that is presented is different from version X, and is
associated with a date range that is outside of the date range of
the version displayed in block 1002. For example, if version X,
presented in the backup interface in accordance with block 1002, is
the current version of the item, the version in the archive
immediately preceding version X (which is not necessarily the most
recent backup copy, as the current version may have been backed up
into the backup archive multiple times) can be identified from the
backup archive and presented. Thus, a particular version can be
valid over a number of backup operations.
[0061] The user can navigate between different distinct versions of
the item without having to navigate through all backups of the
item. The search through the archive uses the date ranges
associated with the versions to identify which backups include a
distinct version of the item and which backups include the same
version of the item as the preceding backup. Consequently, backup
data (e.g., particular snapshots including the item) where the
version is the same can be skipped when navigating the backup
interface.
[0062] An example of associating versions of an item with date
ranges will now be described with reference to FIG. 11. An example
process 1100 for associating versions of system information with
date ranges is shown. The process 1100 can be performed, for
example, by a system such as the system 100 or 200. For clarity of
presentation, the description that follows uses the systems 100 and
200 as an example. However, another system, or combination of
systems, can be used to perform the process 1100.
[0063] The system captures and saves (1102) an archival copy of an
item. For convenience, this archival copy will be referred to as
archival copy A. An archival copy of the item is a backup copy of
the item that is captured by the backup capture engine 220 and
stored in the archive, for example. The captured and saved archival
copy embodies the version of the item that is an unchanged version.
In some implantations, the end date is the current date if there is
no newer version of the item in the file system. Alternatively, the
end date can correspond to the date in which the version was
superseded by a new version of the item.
[0064] Archival copy A is associated with a date range, defined by
a start date and an end date (1104). The start date and end date
can be included in metadata associated with archival copy A. In
some implementations, the start date of the date range is the date
when the version embodied by archival copy A became the current
version of the item. For example, the start date can be the date
when the version of the item was created (e.g., when the item was
created, when the item was modified into the version embodied by
the archival copy and saved). In some implementations, the end date
is a latest date at which the version embodied by archival copy A
is the current version. For example, if archival copy A embodies
the current version of the item, then the end date can be the date
when archival copy A was captured and saved.
[0065] The system detects (1106) that the item is unchanged with
respect to archival copy A. In some implementations, the item, in
its current version, is compared to archival copy A by the change
identifying engine 218. In some implementations, the comparison is
performed when another archival copy of the item is to be captured
and stored. If the item was not changed substantively since
archival copy A, the lack of substantive change is detected by the
change identifying engine 218.
[0066] The date range associated with archival copy A is extended
(1108). In some implementations, the end date of the date range
associated with archival copy A is updated to extend the date
range. For example, when a new archival copy of an item is
captured, and the item has not changed substantively since archival
copy A, then the date range of archival copy A is extended (e.g.,
by changing the end date to the date and time of the new archival
copy) to indicate a longer time span during which the version
embodied by archival copy A embodies the current version of the
item.
[0067] The system detects (1110) a modification of the item with
respect to the archival copy A. In some implementations, when a new
archival copy is captured and saved after the item is changed to a
different version, the change identifying engine 218 identifies the
change in the item to the new version. For convenience, the new
archival copy, embodying a version different from the version
embodied by archival copy A, will be referred to as archival copy
B.
[0068] The system associates (1112) a date range defined by a start
date and an end date with archival copy B. The date range
associated with archival copy B is different from the date range
associated with archival copy A, as archival copy A and archival
copy B embody different versions of the item. In some
implementations, the start date and the end date of the date range
associated with archival copy B is included in metadata associated
with archival copy B. The start date of the date range of archival
copy B is no earlier than the end date of the date range of
archival copy A; the date range during which the version embodied
by archival copy B is the current version is later than the date
range of the version embodied by archival copy A.
[0069] FIG. 3 is a screen shot depicting an example of a desktop
user interface 300 including a search application 301. In certain
implementations, the search component 118 generates the search
application 301. The desktop user interface 300 (also referred to
herein as "desktop") can be a conventional user interface as can be
provided by an operating system. The desktop 300 has a background,
a menu bar 302, an application launch bar 304, and can include
windows, icons, and other elements. The desktop 300 can have
multiple applications running, any or all of which can be presented
in a separate window.
[0070] The search application 301 allows a user to select one or
more search controls and search parameters that specify a search
for files or items to be presented in a search results area 306.
Search location controls 308 allow a user to select a location, for
example within the local storage device 204 or the external storage
device 232, where the search will be performed, such as a server,
the computer 102, a home folder, or another location. Here, a user
has selected a "Home" location control 308a, as indicated at the
top of the search application 301. In addition, a navigation area
310 allows a user to navigate to a location within the selected
search location. A search phrase control 312 allows a user to input
a search phrase to be included in the search. For example, the
search application 301 can identify any titles, content, or
metadata that contains the search phrase. Search application 301 is
only one example search application. In other implementations,
other search applications can be used.
[0071] The search application 301 allows a user to tailor the
search by selecting add controls 314. Here, the search application
301 currently includes two search controls 316a-b. The search
controls 316a-b each include a first search parameter 318a-b,
respectively, and a second search parameter 320a-b, respectively.
Examples of these search controls will be described below.
[0072] In some implementations, the backup component 117 generates
a backup interface that can be used for viewing earlier versions of
a view that have been included in one or more backup operation
(e.g., as stored in an archive), and optionally also for restoring
a selected portion of the earlier version of a view. The backup
interface can be activated to backup or restore content (e.g.,
media) or data associated with an application or the system. In one
implementation, the user can activate the backup interface from the
desktop using a user-selectable backup icon 326 in the application
launch bar 304. As another example, a user can activate the backup
interface from the menu bar 302. The menu bar 302 can include a
backup options menu in addition to the activation selection. The
backup options menu can include selections allowing a user to
specify data to include in particular backup operations. In other
implementations, the user can choose to enter the backup interface
directly from an operating system applications menu. In some
implementations, the backup component can provide several icons or
menus available in other locations within the desktop 300 or
running applications, thereby providing several options for
activating or otherwise initiating the backup interface.
[0073] FIG. 4 is a screen shot depicting an example of the desktop
user interface 300 that presents a list 402 including search
parameters for the search application 301. The list 402 shows the
possible values for the first search parameter within a search
control, in this example the search control 316a.
[0074] In this example, the list 402 includes the values "Kind,"
"Last Opened," "Last Modified,", "Created," "Keywords," "Color
Label," "Name," "Contents," "Size," and "Other." "Kind" allows a
user to input a type of items for which to search. "Last opened,"
"Last Modified," and "Created" allow a user to input dates or time
periods about which an item was last opened, modified, or created,
respectively. "Keywords" allows a user to select keywords
associated with items for which to search. The keywords can be
located, for example, in metadata associated with items. "Color
label" allows a user to select a color or colors for which to
search (e.g., files labeled with a particular color label such as
"red" for important files). "Name" allows a user to input the name
or part of a name of an item, such as a file name or title.
"Contents" allows a user to specify contents to search for, such as
a phrase within a text file. "Size" allows a user to input a size
or range of sizes of items for which to search. Here, the "Kind"
search parameter is selected, as indicated by a dashed line
404.
[0075] FIG. 5 is a screen shot depicting an example of the desktop
user interface 300 that presents a list 502 including search
parameters for the search application 301. The list 502 shows the
possible values for the second search parameter 320a. In this
example, that search parameter is associated with the "Kind" search
parameter that the user has selected. The list 502 includes "Any,"
"Images," "Text," "PDF" (Portable Document Format), "Movies,"
"Music," "Documents," "Presentations," "Folders," "Applications,"
and "Other." The search control 316a limits the search to a
particular kind of item, in this case, document files. In general,
the search application 301 can include any number of search
controls. Here, the "Documents" search parameter is selected, as
indicated by a dashed line 504. Other search parameters can also be
used. Additionally, in one implementation, the search can be part
of an application (e.g., part of a word processing application,
messaging application, music application, etc.) instead of a
particular search application.
[0076] FIG. 6 is a screen shot depicting an example of the desktop
user interface 300 including several search controls within the
search application 301. In addition to the search controls 316a-b
the search application 301 here includes search controls 602a-g.
The search controls 602a-g have first search parameters 604a-g,
respectively, and the first search parameters 604a-g have
associated therewith second search parameters 606a-g.
[0077] Here, the search parameter 318b indicates that the last
modified time and/or date is a criterion for the search. The search
parameter 320b allows a user to select a relationship to the last
modified date, such as no limitation with respect to the modified
date (e.g., "Any time"), modified dates within a particular time
period (e.g., "Within Last") or modified dates before, after, or on
a particular date. In some implementations, a time period input
control and a time units control allow a user to input a time
period length and to select units for the time period, such as
seconds, minutes, hours, days, months, or years.
[0078] The search parameter 604a indicates that the date and/or
time that a file or item was last opened is a condition of the
search. The associated search parameter 606a indicates that an item
that was opened on any date satisfies the search condition in the
search control 602a. Alternatively, the search parameter 606a can
specify a time period or a particular date in which a file or item
was last opened as a condition for the search control 602a.
[0079] The search parameter 604b indicates that the date and/or
time that a file or item was created is a condition of the search.
The associated search parameter 606b indicates that any date
satisfies the search condition in the search control 602b.
Alternatively, the search parameter 606b can specify a time period
or a particular date in which a file or item was last opened as a
condition for the search control 602b.
[0080] The search parameter 604c indicates that keywords associated
with a file or item are a condition of the search. For example, the
keywords can be contained in metadata associated with image, audio,
or video files. The associated search parameter 606c allows a user
to select a particular keyword from a list of keywords. The
selected keyword is the search condition for the search control
602c.
[0081] The search parameter 604d indicates that a color label
associated with a file or item is a condition of the search. The
associated search parameter 606d allows a user to select color
labels. The color labels are the search condition for the search
control 602d.
[0082] The search parameter 604e indicates that a file or item name
is a condition of the search. The associated search parameter 606e
indicates that the name must contain the text input by the user in
search parameter 612 (e.g., "resume"). Alternatively, the search
parameter 606e can indicate other name conditions, such as
matching, beginning with, or ending with the text in the search
parameter 612.
[0083] The search parameter 604f indicates that the contents of a
file or item are a condition of the search. The associated search
parameter 606f allows a user to input text for which to search
within the contents of the files or items.
[0084] The search parameter 604g indicates that the size of a file
or item is a condition of the search. The associated search
parameter 606g indicates that sizes greater than the size input by
the user in search parameter 614 and having units as selected in
search parameter 616 satisfy the search condition. Alternatively,
the search parameter 606g can indicate other size conditions, such
as an exact size or less than a particular size.
[0085] A user can remove search controls by selecting remove
controls. For example, a user can remove the search controls 602a-g
by selecting remove controls 618a-g, respectively.
[0086] In general, a user can trigger the search application 301 to
perform searches of the current version of files and items. A user
can access earlier versions of the files and items by initiating a
backup interface. For example, the user can select the backup icon
326 to initiate the backup interface. Here, the user initiates the
backup interface, for example using one of the controls previously
mentioned.
[0087] FIG. 7A is a screen shot depicting an example of a backup
interface 700 including search results within the search
application 301. In addition to the search application 301, the
backup interface 700 includes a timeline 702 and function buttons.
In some implementations, the timeline 702 includes snapshots
representing the results of performing the current search on an
earlier version of system contents that have been backed up. A
snapshot refers to a backup element stored in a historical archive
that includes a backup of selected items or content as specified by
the backup component 117. In this particular example, the timeline
702 presents a date beneath snapshots 704a-d indicating the date of
the contents on which that search was performed.
[0088] The timeline 702 can include a number of snapshots
representing searches performed on current and/or earlier versions
or states of the files or items that have been backed up. In one
implementation, each snapshot provides a representation of the
current or an earlier version of the files or items at a particular
point in time that is responsive to the search. In some
implementations, the timeline 702 includes a visual representation
of the search results screen, such as a miniature version thereof.
The timeline 702 can appear across the top portion of the backup
interface 700 (as shown). Alternatively, the timeline 702 may not
appear in the top portion of the backup interface 700 until a user
moves their cursor to (or otherwise activates) the top portion of
the interface. In an alternative implementation, in place of the
timeline 702, a number of snapshots are presented in a cascading
stack. The user can navigate through the stack to snapshots
corresponding to particular points in time.
[0089] The backup interface 700 can also include function controls.
For example, the interface 700 can include arrow buttons 706a and
706b to navigate the snapshots forward or backward. Arrow buttons
708a and 708b and an associated scroll bar 709 can allow the user
to navigate to additional snapshots not shown in the current
timeline window, thus there can be a large number of snapshots from
which to select.
[0090] The search application 301 includes the search controls
316a-b as described above with reference to FIG. 6. Here, the
search application 301 also includes a search phrase of "resume" in
the search phrase control 312. The search location controls 308
include a selected "Career" folder location control 710. The
navigation area 310 shows sub-folders of the selected "Career"
folder. The search application 301 can present search results in
the search results area 306 for a search performed using a
currently selected snapshot. Here, the search results area 306
presents a list of one or more items 712 satisfying the search
conditions (i.e., being in the folder "Career," including the
phrase "resume," and being of type "Documents"). These results are
represented by a currently selected snapshot 704a, as indicated by
dashed line 714. The timeline 702 indicates that these search
results are dated for the current time (i.e., the current version
of the presented data in the file system). An item 712 can be
represented by an identifier, such as a name or an icon, and/or can
include a representation of the contents of the item, such as a
thumbnail picture. A user can change the search by adding,
removing, or modifying search controls.
[0091] A restore button 716, when selected, restores the current
system state with the files or items in the presented search
results. In some implementations, this exits the backup interface
700. A user can select one or more items in the search results and
then select the restore button 716 to modify the current version of
the item or items selected, if such a version exists, or otherwise
to restore the file or item to the current state. For example, the
user can select a few images to restore, thereby triggering the
restore button to display a more precise message, such as "restore
selection only." Restoration of the items results in the retrieval
of the item from the archive, and instantiation in the current
environment. For example, a file can be retrieved from an archive
folder and placed in its current folder, where it is accessible to
a user; a system preference (e.g., a time zone or language setting)
can be retrieved from an archive and restored as a current system
preference that affects the system operation in some regard; or an
address book can be restored such that contacts existing in the
archived address book are returned to a current address book.
[0092] In some implementations, an information button 718 can be
included in the backup interface 700. The information button 718
can provide information regarding the selected snapshot. In one
implementation, selecting the information button 718 opens a panel
display. The panel display provides, in one implementation,
information including the date and time the snapshot was made, the
location of actual contents in a snapshot, the size of the
snapshot, and a comment section.
[0093] A close button 720 can be selected to exit the backup engine
700 and return the user to the desktop 300. In some
implementations, the backup engine 700 can automatically close upon
restoring a particular snapshot. In other implementations, the
backup engine 700 can be minimized for purposes of navigating to
other applications, such as an email application or a web
browser.
[0094] In some implementations, the user can select an item
timeline icon 722 to open a timeline view of snapshots, which can
present text information about one or more snapshots and optionally
facilitate navigation to any snapshot. In some implementations, the
timeline view can be toggled off and on using the item timeline
icon 722. Here, the user initiates the timeline view.
Alternatively, in some implementations, a timeline is represented
by a series of tick marks in the backup interface (e.g., presented
in chronological order). A user can select a particular tick mark
in order to move to a snapshot corresponding to that tick mark.
[0095] In some implementations, all snapshots that include a
particular item or file are shown in the timeline, even if there
are consecutive snapshots where the file remained the same version.
In one implementation, once an item or file takes on a particular
version and that version is captured in a snapshot, then subsequent
consecutive snapshots of the same version can be omitted from the
timeline 702 or otherwise de-emphasized in the timeline 702 (e.g.,
by graying out; by displaying in dotted lines, as illustrated by
snapshot 704c in contrast to snapshots 704a, 704b, and 704d).
[0096] In some implementations, when the user selects the arrow
706a to navigate to an older snapshot, the backup interface
navigates to a snapshot whose version of the file or item is
different from the version in the snapshot from which the
navigation is performed. Vice versa, if the user selects the arrow
706b to navigate to a newer snapshot, the backup interface
navigates to a snapshot whose version of the file or item is
different from the version in the snapshot from which the
navigation is performed. Thus, one or more intermediate snapshots
can be skipped when they include a version of the file that is the
same as the version in the starting snapshot.
[0097] As an example, while the current state snapshot is
highlighted, the user selects the arrow 706a while the current
state snapshot 704a is currently selected, as shown in FIG. 7A. The
backup interface navigates to a snapshot that is older than the
currently selected snapshot and whose version of the file is
different from the version in the currently selected snapshot,
which is snapshot 704b. FIG. 7B shows snapshot 704b being selected,
as indicated by dotted line 714. From there, if the user selects
arrow 706a again, the backup interface navigates to snapshot 704d,
as shown in FIG. 7C. Snapshot 704d includes a version of the file
that is different from the version of the file in snapshot 704b.
Snapshot 704c is skipped over in the navigation because that
snapshot includes the same version as snapshot 704d.
[0098] In some implementations, whether a snapshot should be
skipped over in the timeline navigation (and whether it should be
omitted from the timeline, grayed out, etc.) can be based on date
ranges associated with the versions of the file. For example, the
version in snapshots 704d and 704c can be associated with the date
range of Aug. 15, 2005 to Aug. 16, 2005; the version in snapshot
704b can be associated with the date range of Aug. 17, 2005 to Aug.
17, 2005; and the current snapshot 704a can be associated with the
date range of Aug. 18, 2005 to the present date. When arrow 706a or
706b is selected from a particular snapshot, the user interface
looks for snapshots having date ranges that are outside of the date
range of the particular snapshot. For example, if snapshot 706c is
the currently selected snapshot and the use selects arrow 706a to
navigate to an older snapshot, the user interface looks for
snapshots that are older than Aug. 15, 2005; these older snapshots
have date ranges that are outside of the date range associated with
the version in snapshots 704d and 704c.
[0099] FIG. 8 is a screen shot depicting an example of the backup
interface 700 including an item timeline 802 associated with search
conditions within the search application 301. The item timeline 802
indicates that, for the current search conditions, there is one
result in the 56 available snapshots. That is, in this
implementation, there are a total of 56 snapshots available that
includes one file that matches the current search conditions. The
one file can be in different versions throughout the 56
snapshots.
[0100] The item timeline 802 presents a list 804 of the resulting
snapshots. The list 804 includes the date of the snapshot as well
as the number of items in the snapshot that satisfy the search
conditions. The item timeline 802 allows a user to see when the
responsive contents were captured and how many results exist for
each time or date. In other implementations, different information
can be presented. For example, snapshots that include a version
that is different from the version in the immediately preceding
snapshot can be marked by an asterisk. A user can select a snapshot
in the list 804 to navigate to that snapshot. The search
application 301 then presents, in the search results area 306, a
result of the search performed on the corresponding contents. In
certain implementations, the item timeline 802 is transparent or
semi-transparent allowing windows, applications, or the backup
interface 700 to be at least partly visible through the item
timeline 802.
[0101] In some implementations, the timeline 702 can show only
those of the snapshot search results that are different from the
current version. That is, the timeline in such an implementation
can show all snapshots that match the search, except those whose
corresponding earlier state is identical to the current state.
[0102] In one example, a user can search for a file in a particular
drive of a computer, such as the C: drive. Upon the search not
locating the file, the user can initiate the backup engine to view
the contents of the drive at various times in the past. After
selecting a particular snapshot representing the state of the drive
at some point in the past, the results of the search are updated
based on the selected snapshot. For example, the results now
indicate whether the sought file is in the selected snapshot. If it
is there, the user can restore the file from the snapshot search
results. In an alternative implementation, when an initial search
does not locate the searched for item, the backup engine can be
automatically initiated (or a user prompt can be generated to
initiate the backup engine). The backup engine can then present
snapshots of the search results at different times.
[0103] In another example, a user may desire to restore system
preference information, such as Internet security settings (e.g.,
the user may have discovered that the current security conditions
are inadequate and wishes to return to a safer security
configuration). The user searches for the security setting and then
activates the backup. Previous security settings can be presented
in the search results as the user selects snapshots representing
backed up information for earlier settings. The user can select one
or more desired security settings in a particular search result and
restore them to the current security settings.
[0104] In another example, a user can restore a playlist in iTunes.
The user opens the iTunes application and performs a search for a
particular playlist. Upon the search results being presented, the
user can determine that the current playlist identified in the
search contains songs that are too modern for his or her tastes.
The user can activate the backup and view the results of performing
this search on the backed up contents ranging from the current and
to a point of time in the past, say within the last few years.
After receiving the search results from the earlier playlist
versions, the user can select one of the playlists from the past
and restore it to the present state of iTunes.
[0105] In the above description, for purposes of explanation,
numerous specific details are set forth in order to provide a
thorough understanding. It will be apparent, however, to one
skilled in the art that implementations can be practiced without
these specific details. In other instances, structures and devices
are shown in block diagram form in order to avoid obscuring the
disclosure.
[0106] In particular, one skilled in the art will recognize that
other architectures and graphics environments can be used, and that
the examples can be implemented using graphics tools and products
other than those described above. In particular, the client/server
approach is merely one example of an architecture for providing the
functionality described herein; one skilled in the art will
recognize that other, non-client/server approaches can also be
used. Some portions of the detailed description are presented in
terms of algorithms and symbolic representations of operations on
data bits within a computer memory. These algorithmic descriptions
and representations are the means used by those skilled in the data
processing arts to most effectively convey the substance of their
work to others skilled in the art. An algorithm is here, and
generally, conceived to be a self consistent sequence of steps
leading to a desired result. The steps are those requiring physical
manipulations of physical quantities. Usually, though not
necessarily, these quantities take the form of electrical or
magnetic signals capable of being stored, transferred, combined,
compared, and otherwise manipulated. It has proven convenient at
times, principally for reasons of common usage, to refer to these
signals as bits, values, elements, symbols, characters, terms,
numbers, or the like.
[0107] It should be borne in mind, however, that all of these and
similar terms are to be associated with the appropriate physical
quantities and are merely convenient labels applied to these
quantities. Unless specifically stated otherwise as apparent from
the discussion, it is appreciated that throughout the description,
discussions utilizing terms such as "processing" or "computing" or
"calculating" or "determining" or "displaying" or the like, refer
to the action and processes of a computer system, or similar
electronic computing device, that manipulates and transforms data
represented as physical (electronic) quantities within the computer
system's registers and memories into other data similarly
represented as physical quantities within the computer system
memories or registers or other such information storage,
transmission or display devices.
[0108] An apparatus for performing the operations herein can be
specially constructed for the required purposes, or it can comprise
a general-purpose computer selectively activated or reconfigured by
a computer program stored in the computer. Such a computer program
can be stored in a computer readable storage medium, such as, but
is not limited to, any type of disk including floppy disks, optical
disks, CD ROMs, and magnetic optical disks, read only memories
(ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or
optical cards, or any type of media suitable for storing electronic
instructions, and each coupled to a computer system bus.
[0109] The algorithms and modules presented herein are not
inherently related to any particular computer or other apparatus.
Various general-purpose systems can be used with programs in
accordance with the teachings herein, or it can prove convenient to
construct more specialized apparatuses to perform the method steps.
The required structure for a variety of these systems will appear
from the description. In addition, the present examples are not
described with reference to any particular programming language. It
will be appreciated that a variety of programming languages can be
used to implement the teachings as described herein. Furthermore,
as will be apparent to one of ordinary skill in the relevant art,
the modules, features, attributes, methodologies, and other aspects
can be implemented as software, hardware, firmware or any
combination of the three. Of course, wherever a component is
implemented as software, the component can be implemented as a
standalone program, as part of a larger program, as a plurality of
separate programs, as a statically or dynamically linked library,
as a kernel loadable module, as a device driver, and/or in every
and any other way known now or in the future to those of skill in
the art of computer programming. Additionally, the present
description is in no way limited to implementation in any specific
operating system or environment.
[0110] The subject matter described in this specification can be
implemented as one or more computer program products, i.e., one or
more modules of computer program instructions encoded on a computer
readable medium for execution by, or to control the operation of,
data processing apparatus. The instructions can be organized into
modules (or engines) in different numbers and combinations from the
exemplary modules described. The computer readable medium can be a
machine-readable storage device, a machine-readable storage
substrate, a memory device, a composition of matter effecting a
machine-readable propagated signal, or a combination of one or more
them. The term "data processing apparatus" encompasses all
apparatus, devices, and machines for processing data, including by
way of example a programmable processor, a computer, or multiple
processors or computers. The apparatus can include, in addition to
hardware, code that creates an execution environment for the
computer program in question, e.g., code that constitutes processor
firmware, a protocol stack, a database management system, an
operating system, or a combination of one or more of them. A
propagated signal is an artificially generated signal, e.g., a
machine-generated electrical, optical, or electromagnetic signal,
that is generated to encode information for transmission to
suitable receiver apparatus.
[0111] While this specification contains many specifics, these
should not be construed as limitations on the scope of what may be
claimed, but rather as descriptions of features specific to
particular implementations of the subject matter. Certain features
that are described in this specification in the context of separate
embodiments can also be implemented in combination in a single
embodiment. Conversely, various features that are described in the
context of a single embodiment can also be implemented in multiple
embodiments separately or in any suitable subcombination. Moreover,
although features may be described above as acting in certain
combinations and even initially claimed as such, one or more
features from a claimed combination can in some cases be excised
from the combination, and the claimed combination may be directed
to a subcombination or variation of a subcombination.
[0112] Similarly, while operations are depicted in the drawings in
a particular order, this should not be understood as requiring that
such operations be performed in the particular order shown or in
sequential order, or that all illustrated operations be performed,
to achieve desirable results. In certain circumstances,
multitasking and parallel processing may be advantageous. Moreover,
the separation of various system components in the embodiments
described above should not be understood as requiring such
separation in all embodiments, and it should be understood that the
described program components and systems can generally be
integrated together in a single software product or packaged into
multiple software products.
[0113] The subject matter of this specification has been described
in terms of particular embodiments, but other embodiments can be
implemented and are within the scope of the following claims. For
example, the actions recited in the claims can be performed in a
different order and still achieve desirable results. As one
example, the processes depicted in the accompanying figures do not
necessarily require the particular order shown, or sequential
order, to achieve desirable results. In certain implementations,
multitasking and parallel processing may be advantageous. Other
variations are within the scope of the following claims.
* * * * *