Dynamic routing of file system objects

ABSTRACT

Methods, systems, and apparatuses are described for dynamic management of file system objects (e.g., a file or a directory). Such management includes syncing, routing, and storing capabilities. A file system object may be tagged with one or more tags based on at least one of file system object content or file system object location. Dynamic rules that control routing of file system objects to one or more locations based on the one or more tags are accessed and searched for an applicable rule. The file system object may be routed and/or stored based on the applicable rule. The rules may specify allowable locations as well as locations that are not allowed for a given file system object. The location may be a cloud-based location, a location that is on the premises of the enterprise, a location provided by and/or serviced by a competing entity, etc.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.17/160,092, filed on Jan. 27, 2021, titled “Dynamic Routing of FileSystem Objects,” which is incorporated by reference herein in itsentirety. This application is also a continuation of allowed U.S.application Ser. No. 15/610,495, filed on May 31, 2017, titled “DynamicRouting of File System Objects,” which is incorporated by referenceherein in its entirety.

BACKGROUND

The increasing growth of data is causing higher spending on storage anddemanding better data management. Regulations impose a need to betterhandle sensitive information such as personal information and financialdocuments. Leakage of business-critical information or personalinformation is problematic. Existing solutions of data managementattempt to balance various management scenarios. For example, existingsolutions may focus on improved security to prevent data leakage, orease of data management (e.g., backup, archival), although the solutionsmay not be interoperable. These solutions may work based on where a fileis located (e.g., in a particular folder), but not based on the businessvalue of the file to the enterprise that owns it. The folder-basedapproach has users figure out where to store their data based on complexcompany policies. It is common to place files in the wrong folder in thefolder-based approach.

Many solutions exist in the emerging market space of enterprise filesync and share (EFSS). Example solutions include Microsoft® OneDrive®,Microsoft® OneDrive® for Business, Box®, DropBox®, Google® Drive,Egnyte®, and Accellion®. Most of these solutions offer some sort of synccapability that enables a file to be synchronized and/or replicatedacross various cloud computing systems or geographical locations.

SUMMARY

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used to limit the scope of the claimed subject matter.

Methods, systems, and apparatuses are described for enabling dynamicrule-based file system object (e.g., a file or a directory) managementin an enterprise file system. In particular, rule-based logic may beutilized to determine which file system objects may be routed to acloud-based location, as well as the specific cloud-based location inwhich to store or to direct the file system objects.

Further features and advantages of the invention, as well as thestructure and operation of various embodiments, are described in detailbelow with reference to the accompanying drawings. It is noted that theembodiments are not limited to the specific embodiments describedherein. Such embodiments are presented herein for illustrative purposesonly. Additional embodiments will be apparent to persons skilled in therelevant art(s) based on the teachings contained herein.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form a partof the specification, illustrate embodiments and, together with thedescription, further explain the principles of the embodiments and toenable a person skilled in the pertinent art to make and use theembodiments.

FIG. 1 shows a block diagram of a system for dynamically managing filesystem objects, according to an example embodiment.

FIG. 2 depicts a flowchart of a method of dynamic routing of file systemobjects based on rules, according to an example embodiment.

FIG. 3 is a block diagram of a file resource manager, according to anexample embodiment.

FIG. 4 is a diagram of example tags that may be applied to a file systemobject, according to embodiments.

FIG. 5 is a block diagram of a tagger configured to tag file systemobjects, according to an example embodiment.

FIG. 6 is a block diagram of another tagger configured to tag filesystem objects, according to an example embodiment.

FIG. 7 is a block diagram of a file repository, according to an exampleembodiment.

FIG. 8 depicts a flowchart of a method of tagging a file system objectand generating rules for routing file system objects to a cloud-basedlocation, according to an embodiment.

FIG. 9 is a block diagram of an example computing device that may beused to implement embodiments.

The features and advantages of the present invention will become moreapparent from the detailed description set forth below when taken inconjunction with the drawings, in which like reference charactersidentify corresponding elements throughout. In the drawings, likereference numbers generally indicate identical, functionally similar,and/or structurally similar elements. The drawing in which an elementfirst appears is indicated by the leftmost digit(s) in the correspondingreference number.

DETAILED DESCRIPTION Introduction

The present specification discloses numerous example embodiments. Thescope of the present patent application is not limited to the disclosedembodiments, but also encompasses combinations of the disclosedembodiments, as well as modifications to the disclosed embodiments.

References in the specification to “one embodiment,” “an embodiment,”“an example embodiment,” etc., indicate that the embodiment describedmay include a particular feature, structure, or characteristic, butevery embodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same embodiment. Further, when a particular feature,structure, or characteristic is described in connection with anembodiment, it is submitted that it is within the knowledge of oneskilled in the art to effect such feature, structure, or characteristicin connection with other embodiments whether or not explicitlydescribed.

Numerous exemplary embodiments are described as follows. It is notedthat any section/subsection headings provided herein are not intended tobe limiting. Embodiments are described throughout this document, and anytype of embodiment may be included under any section/subsection.Furthermore, embodiments disclosed in any section/subsection may becombined with any other embodiments described in the samesection/subsection and/or a different section/subsection in any manner.

Example Embodiments

As organizations and enterprises face increasing data costs and risks,better insights into enterprise data may be desired to enable betterdata management based on business value. According to exampleembodiments, file system objects (FSOs) may be automatically classified(e.g., based on location and/or content) such that actions or policiesmay be automatically applied based on the classification. Systemadministrators are enabled to define policies that span across anenterprise or other entity to better translate business requirements toinformation technology actions.

For example, a company may have a policy to keep personal information onthe premises of the company rather than storing it in the cloud. Thispolicy may be defined by a system administrator to automatically applyto file system objects (e.g., files or folders created by a humanresources application) such that these file system objects will remainon the premises and not be moved to any cloud-based storage. Moreover,when new data directories are added, the rules and actions can remainthe same since the actions are taken per business criticality of thefile system objects regardless of their location. Thus, cost of datamanagement (e.g., backup, archival, hierarchical storage management,etc.) may be reduced, for example, because file system objects may beautomatically expired to reduce storage purchasing needs, file systemobjects may be moved to less expensive or sensitive storage, backup offile system objects may be optimized, or business critical files may bereplicated and/or moved. In this manner, security risks are bettermanaged because sensitive files are not routed to third party servers,or sensitive information may be placed in an encrypted storagerepository rather than an unencrypted one, etc.

Embodiments described herein enable dynamic rule-based file systemobjects management as part of an enterprise (or other entity) file syncand share solution. Such management includes syncing, routing, andstoring capabilities. In an example embodiment, a file system objecttagged with one or more tags based on at least one of file system objectcontent or file system object location is received. Dynamic rules thatcontrol routing of file system objects to one or more locations based onthe one or more tags are accessed. The dynamic rules may be searched foran applicable rule for routing the file system object, and the filesystem object is routed and/or stored based on the applicable rule.

For instance, an enterprise administrator may define rules withcondition(s) to check and corresponding action(s) to take (e.g., where afile system object may be directed to and/or stored). The rules mayspecify location restrictions for a given file system object, such asallowable locations as well as locations that are not allowed for thegiven file system object. The rules may be defined at a file level or adirectory (folder) level. The location may be a cloud-based location, alocation that is on the premises of the enterprise, a location on localcomputer storage, a location provided by and/or serviced by theenterprise or a competing entity, or elsewhere.

In an example embodiment, the interpretation of a location may beautomatically determined without input from the administrator. In otherwords, how a particular location is defined or viewed as allowable ornot allowable for a particular file system object or for a particularentity/provider may be automatically determined.

In another example embodiment, before performing any syncing or sharingactivity for a file system object, a file system agent may scan the filesystem object for its contents, including properties, to use to tag thefile system object. Subsequently, routing rules may be compared to thetags and/or to see if one or more of the applied tags matches any rules.If a matching rule is found, the file system object may be automaticallysynced, routed, and/or stored as specified by the matching rule withoutfurther input from the administrator.

The management of file system objects may be implemented in variousmanners in embodiments. For example, FIG. 1 shows a system 100 forautomatically managing file system objects to route and/or store thefile system objects based on predefined rules. In an embodiment, system100 may be implemented as an enterprise or other entity file sync andshare (EFSS) system. As shown in FIG. 1, system 100 includes one or morecomputing devices 102, one or more file servers 104, a first cluster 110having node 114 and node 116, and a second cluster 112 having node 118and node 120. Computing device(s) 102, file server(s) 104, and each ofclusters 110 and 112 may be communicatively connected via a network 108.Network 108 may comprise one or more networks such as local areanetworks (LANs), wide area networks (WANs), enterprise networks, theInternet, etc., and may include one or more of wired and/or wirelessportions.

Clusters 110 and 112 may form a network-accessible server set. Forexample, each of nodes 114, 116, 118 and 120 may comprise a group orcollection of one or more servers (e.g., computing devices) that areeach hosted on a network such as the Internet (e.g., in a “cloud-based”embodiment) to store, manage, and process data. In an embodiment, nodes114, 116, 118, and/or 120 may be co-located (e.g., housed in one or morenearby buildings with associated components such as backup powersupplies, redundant data communications, environmental controls, etc.)to form a datacenter, or may be arranged in other manners. In an exampleembodiment, nodes 114, 116, 118 and 1120 may share physical resources(e.g., power supplies, network) and/or have the same or similarstructures (e.g., hardware, configurations) for ease of management.Additionally, there may be isolation among clusters 110 and 112 forresiliency, redundancy, and failure management purposes such that afailure in a single cluster may not impact other clusters. Accordingly,in an embodiment, nodes 114, 116, 118 and 120 may each be a datacenterin a distributed collection of datacenters. The datacenters may be ownedand/or operated by a same owner (e.g., an enterprise) and/or differentowners (e.g., different enterprises, vendors, etc.). It is noted thatwhile FIG. 1 shows two clusters 110 and 112 each having two nodes,system 100 may include any number of clusters, and each cluster mayinclude any number of nodes.

In accordance with an embodiment, nodes (e.g., nodes 114, 116, 118 and120), and/or clusters (e.g., clusters 110 and 112) located in a firstgeographic region (e.g., North Central US) may be paired with a secondplurality of nodes and/or clusters located in a second geographic region(e.g., South Central US). The first plurality and the second pluralitymaybe be collectively referred to as a region pair. Thenetwork-accessible server set may comprise any number of region pairs,where each region pair covers a different portion of the world.Moreover, each region of a region pair may include one or moreavailability zones. Each availability zone may include one or moreclusters (e.g., clusters 110 and 112) located within that region.

Each of node 114, node 116, node 118, and node 120 may include and/orexecute one or more computing resources (e.g., computer networks,servers, storage, applications and services). As shown in FIG. 1, node114 may host and execute resources 122A-122N, node 116 may host andexecute resources 124A-124N, node 118 may host and execute resources126A-126N, and node 120 may host and execute resources 128A-128N, whereN is any integer greater than 1. Each of nodes 114, 116, 118 and 120 maybe configured to co-host and execute any number of resources.

Note that the variable “N” (or other variable) is appended to variousreference numerals for illustrated components to indicate that thenumber of such components is variable, with any value of 1 and greater.Note that for each distinct component/reference numeral, the variable“N” has a corresponding value, which may be different for the value of“N” for other components/reference numerals. The value of “N” for anyparticular component/reference numeral may be less than 10, in the 10s,in the hundreds, in the thousands, or even greater, depending on theparticular component and/or implementation.

Computing device(s) 102 may be any type of stationary or mobilecomputing device(s), including a mobile computer or mobile computingdevice (e.g., a Microsoft® Surface® device, a personal digital assistant(PDA), a laptop computer, a notebook computer, a tablet computer such asan Apple iPad™, a netbook, etc.), a mobile phone, a wearable computingdevice, or other type of mobile device, or a stationary computing devicesuch as a desktop computer or PC (personal computer), or a server.

File server(s) 104 is configured to manage data (e.g., file systemobjects) for system 100. File server(s) 104 may be implemented in anytype of stationary or mobile computing device(s), including a mobilecomputer or mobile computing device (e.g., a Microsoft® Surface® device,a personal digital assistant (PDA), a laptop computer, a notebookcomputer, a tablet computer such as an Apple iPad™, a netbook, etc.), amobile phone, a wearable computing device, or other type of mobiledevice, or a stationary computing device such as a desktop computer orPC (personal computer), or a server.

As shown in FIG. 1, file server(s) 104 includes a file resource manager106. In an embodiment in which system 100 is an EFSS solution, fileresource manager 106 may be implemented as a client-side agent. Fileresource manager 106 is configured to dynamically manage data based onrules by checking predefined rules for at least one matching ruleassociated with a file system object and routing the file system objectaccordingly. For example, file resource manager 106 may determinewhether the file system object should remain on the premises (e.g., instorage of file server(s) 104) or moved to any cloud-based location(e.g., cluster 110 or cluster 112), or routed to a specific location(e.g., any of nodes 114, 116, 118 or 120) based on one or more matchingrules. In the embodiment of FIG. 1, file resource manager 106 is shownto be in file server(s) 104, which may be located on the premises of theenterprise. Alternatively and/or additionally, file resource manager 106may also be located in a cloud-based location, e.g., any of nodes 114,116, 118 or 120, a separate node/server, or as a server-side agent.

Embodiments of system 100 may be implemented in various manners. Forinstance, FIG. 2 depicts a flowchart 200 of a method of dynamic routingof file system objects based on rules, according to an exampleembodiment. In an embodiment, flowchart 200 may be implemented by fileserver(s) 104 and file resource manager 106 as shown in FIG. 1. Forpurposes of illustration, flowchart 200 of FIG. 2 is described withrespect to FIG. 3. FIG. 3 shows a block diagram of a file resourcemanager 300 configured to automatically manage data based on rules,according to an example embodiment. As shown in FIG. 3, file resourcemanager 300 includes rules checker 302, which is configured to searchfor a matching rule for a received file system object and object router304, which is configured to route the received file system object to thelocation indicated by the applicable, matching rule. Rules checker 302includes an object receiver 306, a rule accessor 308, and a rulesearcher 310. File resource manager 300 is an example of file resourcemanager 106 of FIG. 1. Flowchart 200 and file resource manager 300 aredescribed as follows. Note that the steps of flowchart 200 may beperformed in an order different than shown in FIG. 2 in someembodiments. Furthermore, not all steps of flowchart 200 need to beperformed in all embodiments. Other structural and operation embodimentswill be apparent to persons skilled in the relevant art(s) based on thefollowing description.

Flowchart 200 begins with step 202. In step 202, a file system objecttagged with one or more tags based on at least one of file system objectcontent or file system object location is received. For example, fileresource manager 106 or file resource manager 300 may receive a filesystem object. In particular, as shown in FIG. 3, the file system objectmay be received at file resource manager 300 by object receiver 306 viacommunication link 322 (a wired, wireless, or wired/wireless combinationconnection) from an object storage 318. Object storage 318 may bestructured as a database, in the form of a file/folder hierarchy, or inanother manner to store file system objects. Object storage 318 maystore a plurality of tagged file system objects 320. File system objects320 may include any number of file system objects, including numbers inthe ones, tens, hundreds, thousands, millions, or even greater numbersof file system objects. Each file system object of file system objects320 may be a database object (e.g., a table), a file, a directory, orother data object of any format that is tagged with one or more tags.Each tag represents a classification value of the corresponding filesystem object, which may be determined based on properties of the filesystem object (e.g., indicating personal information, businessimportance, confidentially, tasks, retention period), and/or determinedin another manner.

To be tagged, file system objects 320 of object storage 318 may havebeen automatically profiled (e.g., by a search of the file system objectfor one or more keywords whose presence indicate a particularclassification) to determine a tag for the file system object, and thedetermined tag can be applied to the file system object. Alternatively,a file system object may be manually tagged with a manually determinedtag, or may be tagged in another manner (e.g., as described in furtherdetail below with respect to FIGS. 5 and 6).

For instance, in an embodiment, object receiver 306 scans the receivedfile system object to determine the tags that are associated with thereceived file system object. The one or more tag(s) associated with afile system object may be stored in the file system object (e.g., in aheader, footer, or body of the file system object, in a property fieldthereof, etc.) as attributes of the file system object, or may be storedin a table or other data structure linked to the file system object(e.g., the table associates an identifier for the file system objectwith the one or more tags). In an example embodiment, the classificationof a file system object indicated by a tag may be automatic and based ona location of the file system object (a directory, a particular storagedevice partition, a particular storage device, a particular storagedevice collection/network, a particular region, etc.), an ownership ofthe file system object (e.g., a user, an administrator, an enterprise orother entity, etc.), a content of the file system object (e.g., textualinformation, a word processing document, a spreadsheet, privateinformation, public information, an audio file, a video file, etc.), orother parameters, such as file size or file extension. For instance, thetag-indicated classification may be automatically applied based on aline of business (e.g., file system objects from a human resourcesapplication are tagged with “personal information” or a similarindicator when saved, or file system objects that are saved to a patentfolder may be tagged with “business confidential”). The classificationof a file system object may alternatively be a manual process performedby a user and/or administrator, and/or a user or administrator may beenabled to manual adjust an automatically generated classification. Asshown in FIG. 3, object receiver 306 may transmit/provide the tag(s)determined for the file system object to rules accessor 308 as tags 312.Once a file system object has been tagged the tag values may remain withthe file system object while it is moved from one location to another,or may be automatically changed pursuant to tags associated with the newlocation.

In step 204, dynamic rules that determine whether to route the filesystem object to a cloud-based location based on the one or more tagsare accessed. For example, file resource manager 106 or file resourcemanager 300 may access one or more storage repository or databases thatcontain predefined rules that may be applicable to the file systemobject. As shown in FIG. 3, rules storage 324 may be accessed by rulesaccessor 308. As shown in FIG. 3, rules accessor 308 may retrieve rules328 applicable to tags 312 received for the file system object.

In an embodiment, rules storage 324 may include a rules collection 326(e.g., a table, list, file, etc.) that contains predefined rules thatdetermine whether (and how) to route file system objects to acloud-based location based on the one or more tags. Rules 328 retrievedfor a particular file system object may specify whether the file systemobject must remain on the premises of the enterprise that owns it orwhether it may be routed to a cloud-based location. If a cloud-basedlocation is allowable for the file system object, rules 328 may indicatea specific cloud-based location for routing and/or storing the filesystem object. The rules may also specify which locations are notallowable for the file system object, and in such case, file resourcemanager 106 or file resource manager 300 will not move the file systemobject to these locations.

Some example rules include: “allowed-storage=onprem” that indicates thatthe file system object may be stored on the premises of the enterpriseonly, and “allowed-storage=first_cloud_service” that indicates that thefile system object may be stored at the identified first cloud service.Rules may include more than one expressions and/or complex expressions.For instance, rule “allowed-storage=first_cloud_service AND onprem”indicates that the file system object may remain on the premises or bemoved to the first cloud service. Another example of a rule includes“allowed-storage=second_cloud_service ANDallowed-storage≠third_cloud_service” that indicates that the file systemobject may be stored on the second cloud service but not allowed on thethird cloud service. The dynamic rules may be generated in a manner toavoid conflict among the dynamic rules, for example, by prioritizing thedynamic rules in some manner such as by use of a rule precedent asdescribed below in reference to step 208. For example, in the case ofmultiple matching or applicable rules, the first rule (e.g., in anordering maintained in rules collection 326) that matches any of thetags of the file system object may be used to route the file systemobject. The dynamic rules may be set at a file system object level(e.g., file or directory level); and may be based on file system objectproperties, file system object content, file system object date ofcreation, date of modification or date of access, or some other date ordate range.

While the rules are depicted as being stored in rules collection 326 inFIG. 3, any other data structure (e.g., multiple tables, lists, arrays,etc.) may be used to store the rules. Also, the rules may be stored inone or multiple storage repositories. In an example embodiment, thedynamic rules may be perpetuated when the file system object is moved toanother location, such that new rules do not have to be generated eventhough there is a location change.

Referring back to FIG. 2, in step 206, the dynamic rules are searchedfor an applicable rule for routing the file system object. For example,file resource manager 106 or file resource manager 300 may search thedynamic rules for an applicable rule for routing the file system object.As shown in FIG. 3, rule searcher 310 receives rules 314, which includesthe rules determined for the file system object being processed. Basedon rules 314, rule searcher 310 may determine one or more matching rulesapplicable to the file system object, indicated as matching rules 316.Matching rules 316 specify whether and where the file system object maybe moved and/or stored. It is noted a file system object may be routedand/or stored at more than one locations, as indicated by a matchingrule. If no applicable rule is indicated by matching rules 316, fileresource manager 106 or file resource manager 300 may send an alert toan administrator and/or follow a default procedure, for example, bykeeping the file system object on the premises until the database ofrules has been updated and/or a predefined time window has passed beforesearching the rules collection 326 for matching rules again.

In step 208, the file system object is routed based on the applicablerule. For example, file resource manager 106 or file resource manager300 may route the received file system object according to theapplicable rule found by rule searcher 310, as indicated by matchingrules 316. Such routing may include synchronizing the file system objectat one or more locations. The one or more locations may be a cloud-basedlocation, a location that is on the premises of the enterprise that ownsthe file system object, a location provided by and/or serviced by theenterprise or by an entity different from the enterprise (e.g., acompeting entity). A cloud-based location may be any of a public,private or hybrid cloud infrastructure that is owned and/or operated bythe enterprise and/or other entities. A public cloud may be based on astandard cloud computing model where resources (e.g., applications andstorage) may be made available to the general public over a network(e.g., the Internet) by the provider of the public cloud. A privatecloud may be a type of cloud computing that is similar to the publiccloud but through a proprietary architecture and may be dedicated to asingle enterprise. A hybrid cloud may include a combination of thepublic cloud and private cloud. As shown in FIG. 3, routing informationand/or the applicable rule may be transmitted in matching rules 316 toobject router 304. Object router 304 may route the received file systemobject based on the routing information and/or the applicable rule.

If multiple rules are found to be applicable, object router 304 mayapply a rule precedent to prevent conflicting rules. The rule precedent,which may also be stored in rules collection 326 or another datastructure, sets forth the ranking or order to be applied to the matchingrules. The ranking may be manually set by an administrator orautomatically determined based on any parameter, e.g., time, location,regulations, business policies, etc. For example, the rule precedent maydictate that the first matching rule is to be applied to the file systemobject when there are multiple matching rules. The file system objectmay be directed, routed, synchronized, and/or stored at one or morelocations indicated by the applicable rule. The locations may includeany storage location, such as a storage location on the premises of theenterprise, a general storage that is cloud-based, or a specific storagelocation that is in the cloud (e.g., a specific geographical location ora location associated with a specific vendor). In an embodiment, theinterpretation of a location may be automatically determined by objectrouter 304 based on matching rules 316 without input from theadministrator. In other words, how a particular location is defined orviewed as allowable or not allowable for a particular file system objectmay be automatically determined. For example, a file system object thatis generated in a particular geographic location or by a particular lineof business may be constrained in terms where it may be routed and/orstored by regulations, business practices, or any other parameters, andthe constraints may be automatically determined and applied to the filesystem object. When the applicable rule indicates that the file systemobject is not allowed to be moved to a particular location, objectrouter 304 does not allow the file system object to be routed to thenon-allowed location.

As described above, file system manager 300 may be configured to routefile system objects according to rules and tags. In further embodiments,file system manager 300 may be configured to apply tags to file systemobjects, and/or may be configured to generate the rules that are used toroute tagged file system objects. Such embodiments are described asfollows with respect to FIGS. 4-8.

In an embodiment, a tag may be applied to a file system object by atagger. FIG. 4 is a diagram that shows example tags that may be appliedto a file system object 402 for purposes of enabling routing of filesystem object 402, according to an embodiment. For example, as shown inFIG. 4, file system object 402 may include any of tags 404, whichinclude tags related to personal information 408, business importance410, confidentiality 412, task 414, retention period 416, and/or othertag 418. Any number of these and/or other tags may be applied to a filesystem object. Non-limiting examples of each of these tags are providedas follows.

Personal information 408 may include information about individuals(e.g., demographic information such as age, sex, height, etc.,residential address, etc.), about employees of an enterprise, forexample, content that is generated by a human resources application.Personal information 408 may be represented in various ways, such as bytextual data (e.g., male, female, etc.) and/or Boolean values, forexample, “yes” if the file system object includes personal informationand “no” if the file system object does not include personalinformation. Business importance 410 may include information thatpertains to the business and may be represented with an indicator ofimportance. For example, business critical file system objects may beordered on a scale from 1 to 5 with 1 being the most critical to thebusiness. Thus, the indicator of importance maybe an integer, althoughin other cases, may be textual. Confidentiality 412 may includeinformation that indicates whether the file system object includesconfidential information, for example, represented by a Boolean value,for example, “true” if the file system object includes confidentialinformation and “false” if not, by “public” or “private” tag values,etc. Confidentiality 412 may further indicate a level of confidentiality(e.g., 10 is highest level most needing to be maintained asconfidential; 0 is lowest level).

Task 414 may include information about a specific project or someproject aspect. For example, task 414 information may be represented bya string, for example, a textual description of the project and/or itsname. Retention period 416 information may indicate how long a filesystem object should be retained, and may be represented in any suitablemanner, such as by an integer (e.g., a length of time) or a date format(e.g., for a specific date). Other tag 418 information includes otherinformation not depicted in FIG. 4 or expressly mentioned herein, butthat may be apparent to persons skilled in the relevant art(s) based onthe teachings herein.

In an embodiment, each type of tag for a file system object may includea pair of information: the tag name (e.g., such as those listed above)and the tag value. Some tag values require more information (e.g., anordered list tag requires a list of valid values, etc.) Tag values mayinclude the following non-limiting examples: a Boolean value (e.g.,yes/no, true/false), a number/integer, a multiple choice list thatincludes a list of values where multiple values can be selected, anordered list that includes a list of values that have an implicitordering (e.g., high, medium, or low or first, second or last), astring, or a multi-string that allows several unique strings to becombined into a tag. File system object 402 may be tagged with any orall of tags 404. For example, file system object 402 may be tagged withthe personal information tag with the value “yes” if it includespersonal information, or file system object 402 may be tagged with theconfidentiality tag with value “true” if it is placed in the“engineering” directory and/or includes the text “confidential” as partof its content.

A file system object may be tagged in various manners. For example, filesystem object 404 of FIG. 4 may be tagged according to one or more oftagging techniques 406, which includes: manual tagging 420, line ofbusiness tagging 422, file owner tagging 424, file content-based tagging426, and other tagging technique 428. Manual tagging 420 may beperformed by a user or an administrator. For example, an engineer whodrafted a document may apply a confidential tag to the document.Alternatively, inherited tagging may be used. For instance, the engineermay save the document as a file in a particular folder called “patent,”which may be tagged as confidential, thereby causing the saved documentto inherit the confidential tag of the “patent” folder. Line of businesstagging 422 may occur when a file system object is tagged based on theline of business associated with it. For example, when a human resourcesapplication saves a file to a server, the application may set the“personal information” tag to have a value of “yes” to indicate that thefile includes personal information and should be managed accordingly.Automatic tagging may be based on file owner tagging 424, filecontent-based tagging 426, or other tagging technique 428. For example,dynamic tagging may occur without user input based on ownership (e.g.,enterprise), file content (e.g., confidential or secret), or otherparameters (e.g., file size, file extension). File system object 402 maybe tagged by one or more tagging techniques 406. Such tagging techniques406 may be applied to file system object by an object tagger, which mayapply the tags to the file system object as corresponding tags.

For example, FIG. 5 depicts a block diagram of file resource manager 300configured to tag file system objects, according to an exampleembodiment. In particular, as shown in FIG. 3, file resource manager 300includes an object tagger 504. Object tagger 504 is configured to applytags to file system objects that enable organized routing of the filesystem objects. Object tagger 504 is described as follows.

As shown in FIG. 5, object tagger 504 receives a file system object 502via communication link 512. Tagger 504 may automatically tag file systemobject 502 with one or more tags by changing the file system object 502to include the one or more tags. For example, tagger 504 may scan filesystem object 502 for its content, including any properties, and thentag file system object 502 accordingly. Thus, file system object 502 maybe altered by the tagging process. File system object 502 may be taggedwith any number of tags, such as tags 404 shown in FIG. 4. The output oftagger 504 is a tagged version of file system object 502, which may besent to a storage repository, such as database 506 via communicationlink 510. The tagged version of file system object 502 may include extrametadata and/or content (e.g., a header of the file system object) thatis not present in file system object 502. Accordingly, the taggedversion of file system object 502 includes all the tags needed forclassification purposes. While only one file system object is shown asbeing tagged in FIG. 5, multiple file system objects may be tagged(e.g., in a batch operation) at a time by tagger 504. Database 506 isconfigured to store a plurality of tagged file system objects 508, amongother data. In an embodiment, tagged file system objects 508 may bestored in the same storage as tagger 504.

The tagging of a file system object may alternatively be implemented asshown in FIG. 6. FIG. 6 depicts an object tagger 604, also configured totag file system objects, according to an embodiment. Object tagger 604shown in FIG. 6 may be implemented in file server(s) 104 shown in FIG. 1and/or in file resource manager 106 or file resource manager 300. Objecttagger 604 is described as follows.

As shown in FIG. 6, tagger 604 receives file system object 602 viacommunication link 610. Tagger 604 may automatically tag file systemobject 602 with one or more tags by populating a database or other datastructure with a file system object identifier and the one or more tagsassociated with the file system object. For example, tagger 604 may scanfile system object 602 for its content (including properties) and thentag file system object 602 accordingly. In this embodiment, rather thanaltering file system object 602, tagger 604 populates a reference table612 with the tags of file system object 602. Reference table 612 may bestored in a storage location, such as database 610 and is accessible totagger 604 via communication link 614. The tags of file system object602 may be placed in reference table 612 in association with a filesystem object identifier representing file system object 602 along withone or more tags representing the tags of file system object 602. Filesystem object 602 may be associated with any number of tags, such astags 404 shown in FIG. 4. The output of tagger 604 is a tagged versionof file system object 502, which may be sent to a storage repository,such as database 606 via communication link 616. The tagged version offile system object 602 may simply be the same as file system object 602since it is not altered in the tagging process as relevant data areextracted and placed on reference table 612. Thus, the tagged version offile system object 602 may not include all the data needed forclassification purposes. As such, when file system object 602 isreceived for classification, reference table 612 may be consulted toobtain the necessary information. While only one file system object isshown as being tagged in FIG. 6, multiple file system objects may betagged (e.g., in a batch operation) at a time by tagger 604. Database606 is configured to store a plurality of tagged file system objects608, among other data. For example, reference table 612 and tagged filesystem objects 608 may all be stored in one of database 606 or database610 or stored in the same location as tagger 604.

The decision of which mechanism (e.g., tagger 504 or tagger 604) to useto tag a file system object may be made by an administrator orautomatically, e.g., by a file server (e.g., file server(s) 104). Thisdecision may be made based on a type of file system object, for example.

In an example embodiment, the dynamic routing of a file system of a filesystem object may be performed by a computing device. For example, FIG.7 is a block diagram of a computing device 700, according to an exampleembodiment. Computing device 700 is configured to tag file systemobjects, generate rules that determine where the file system objects maybe routed and/or stored, perform a check of the rules for a particularfile system object, and route and/or store that particular file systemobject according to any matching rule. Computing device 700 may includeat least one file repository 702, which includes at least one processor704 (e.g., a central processing unit, a microprocessor, amultiprocessor, etc.) and memory 706. Processor 704 may load and executefile resource manager 300 (e.g., from storage). These elements aredescribed as follows.

As shown in FIG. 7, file resource manager 300 includes tagger 710configured to tag file system objects, a rule generator 724 (that mayinclude user interface (UI) 712) configured to enable generation ofrules for routing of file system objects, a rules checker 714 configuredto check the rules for a received file system object, and router 716configured to route and/or store the received file system objectaccording to any matching or applicable rule.

Tagger 710 is an example of tagger 504 shown in FIG. 5 or tagger 604shown in FIG. 6. In an example embodiment, tagger 710 receives a filesystem object and tags it with predefined tags and/or based on itscontent. Information of file system objects (e.g., tags) may betransmitted to rules generator 724 via communication link 718.

Rule generator 724 is configured to facilitate rule generatorautomatically or by manual interaction by a user and/or administrator(e.g., interacting with UI 712). As shown in FIG. 7, rule generator 724may generate rules 708, which hare stored in memory 706 or other storage(e.g., via communication link 722). Rules 708 may include any number ofrules configured for routing of file system objects based on tags. Eachrule generated by rule generator 724 may include a rule name and a rulescope (rule logic). The rule name may indicate how the rule relates to atag value of a file system object, and the rule scope may include logicconfigured to differentiate among the different file system objectcategories. For example, the rule logic or mechanism for routingengineering file system objects may be different from the logic used toroute finance file system objects. Multiple mechanisms may be used in agenerated rule.

For example, all files within a folder may be tagged by object tagger710 with the same or different tag values, such as tagging all fileswithin the “engineering” folder with a tag value of “medium secrecy” fora confidentiality tag. Rules generator 724 may generate a rule that isconfigured to route the files in the folder (or the folder and itscontents as a whole), based on the tag values.

As another example, object tagger 710 may tag file system objects basedon their respective content. In operation, object tagger 710 may searchfor text or patterns (e.g., similar to a search indexer) and if certaintext or patterns are found, then the file system object may be taggedbased on the text or patterns found. Object tagger 710 may implement oneor more search parameters for determining tags, which may result inmultiple tags being applied to a file system object. For example, searchparameters may include “confidential” and/or “private,” and both ofthese key words may be found within the same search. In this case,multiple tag values may be assigned to the file system object during thetagging process. Rule generator 724 may generate a rule that isconfigured to route the file system objects based on these tag values.

Rule generator 724 may be configured to automatically generate rules, orenable a user to configure rules either from scratch or to configureexisting rules. For instance, UI 712 may enable a user to inputtext/patterns and/or logic (e.g., an expression, a string, etc.) desiredfor a rule to be generated to route file system objects based on tagvalues. For example, UI 712 may include a graphical user interface (GUI)that displays one or more forms and/or other UI controls that enable auser to configure a rule, including assigning a rule name andconfiguring logic of the rule. Rule generator 724 may be alternativelyor additionally configured to automatically analyze tags applied to filesystem objects and to generate rules based thereon. For instance, rulegenerator 724 may implement artificial intelligence (AI), includingmachine learning, to monitor how files in one or more folders are routedby a user, and may automatically correlate the determined routing totags applied to the files/folders. Rule generator 724 may in this mannerdetermine and generate a rule that emulates how the user had beenmanually routing the file system objects, thereby relieving the user ofthis task.

In yet another example, rules generator 724 may implement alocation-based routing mechanism to define rules with conditions/tags tocheck and corresponding actions to take regarding where a file systemobject may be routed, synchronized, and/or stored. For example, agenerated rule may dictate whether to route file system objects to acloud-based location based on one or more file system object tags (e.g.,tags 404 shown in FIG. 4). The rule may specify whether the file systemobject should remain on the premises of the enterprise that owns it orwhether it may be routed to a cloud-based location based on the tags ofthe file system object. If a cloud-based location is allowable for thefile system object, the rule may indicate a specific cloud-basedlocation for routing and/or storing the file system object. The rule mayalso specify which locations are not allowable for the file systemobject, and in such case, the file system object should not be moved tothe restricted, non-allowable locations.

Some example rules include: “allowed-storage=onprem” that indicates thatthe file system object may be stored on the premises of the enterpriseonly, and “allowed-storage=first_cloud_service” that indicates that thefile system object may be stored at the first cloud service. Rules mayinclude more than one expressions or complex expressions. For instance,rule “allowed-storage=first_cloud_service AND onprem” indicates that thefile system object may remain on the premises or be moved to the firstcloud service. Another rule example is“allowed-storage=second_cloud_service ANDallowed-storage≠third_cloud_service” that indicates that the file systemobject may be stored on the second cloud service but not allowed on thethird cloud service. Once defined, the rules may be stored in memory 706as rules 708 via communication link 722. Rules 708 may also be storedelsewhere (e.g., in a database separate from computing device 700).

Other rule generation mechanisms may be utilized or built by the user oradministrator to be implemented for rules generator 724 for specializedneeds. For example, an expiration mechanism may be leveraged to movedata out of control of users and into the control of an administrator bymoving file system objects scheduled for expiration into a specifieddirectory while preserving their directory structure. The administratormay then backup or archive the file system objects and/or delete them.Before the file system objects expire, a notification mechanism may sendan email to the administrator and/or the owners of the file systemobjects notifying them of the set of file system objects that willexpire, or the notification mechanism may enter event log entries and/orother customized actions. The expiration rule may expire file systemobjects based on any condition, for example, names of file systemobjects matching a supplied pattern, the time lapse amount (e.g., days)since creation of file system objects, the time lapse amount sincemodification of file system objects, or the time lapse amount since lastaccess of file system objects. For instance, a file system object may bemarked for expiration if it has not been modified for 10 years and havea confidentiality tag lower than “high.”

Any of the tagging (by tagger 710) and rule generation (by rulegenerator 724) mechanisms can set values and/or define rules in anaggregated manner, such that multiple tags of a file system object maybe used in a single rule. For example, a rule may be set to allow filesystem objects created over ten years ago but tagged as “confidential”to be moved to a cloud-based location, but file system objects less than10 years old and tagged as “confidential” may not be moved to acloud-based location. Tagger 710 may assign multiple values to the sametag of a file system object. For example, a tagging mechanismimplemented by tagger 710 may set the confidentiality tag (e.g., shownin FIG. 4 as confidentiality 412) of a file system object to “medium”since the file system object is located in the “engineering” directory.Another tagging mechanism may set the confidentiality tag to “high”because the file system object contains the text “confidential.” Toresolve such a conflict, the tag values may be aggregated or prioritizedin some manner, such as in accordance with a prioritization mechanism(e.g., prioritization logic and/or code), for example, that implements arule precedent. For example, for yes/no tags, “yes” wins over “no.” Fora multiple choice list tag, values may be combined into a set. For anordered list, the highest entry in the list may be favored/selected. Fora multi-string tag, the strings may be combined into one set of uniquestrings. Accordingly, the rule precedent may set forth the action(s) tobe taken in the case of conflict. The rule precedent may be determinedby the administrator or automatically applied based on any parameter,e.g., time, location, regulation, business policies, etc.

In an embodiment, tagger 710 may re-evaluate existing tag values for afile system object if the file system object and/or the taggingmechanisms have changed. Such re-evaluation process may overwrite anyexisting values set by the previous tagging process. Because the taggingprocess may take time, tagging/re-tagging of file system objects may beperformed on a scheduled basis as specified by a system administrator.During the tagging (by tagger 710) and rule generation (by rulegenerator 724), tagger 710 or rule generator 724 may find any filesystem objects that have not yet been tagged or need to have their tagsre-evaluated. Once a file system object has been tagged the tag valuesmay remain with the file system object while it is moved from onelocation to another, or may be automatically changed pursuant to tagsassociated with the new location. In addition, the dynamic rules may beperpetuated when the file system object is moved to another location,such that new rules do not have to be generated even though there is alocation change. Tagger 710 and/or rule generator 724 may be configuredto remove tags from a file system object designated by a systemadministrator. For example, the removal of a tag may be performed by acommand (e.g., clearfiletag).

Returning to FIG. 7, rules checker 714 is an example of rules checker302 and object router 716 is an example of object router 304,respectively shown in FIG. 3. In an embodiment, a file system object maybe received at rules checker 714. The file system object may be storedin a storage repository on the same as or a different computing devicethan computing device 700. In an embodiment, the file system object maybe file or directory and is tagged with one or more tags. Rules checker714 may scan the received file system object for the associated tags.Rules checker 714 may also determine the associated tags by other means(e.g., checking reference table 612 shown in FIG. 6). Using the tags,rules checker 714 may access predefined rules 708 in memory 706 viacommunication link 722 to search for applicable rule(s) to determine howto route the received file system object.

Rules 708 may specify whether the file system object is to remain on thepremises of the enterprise (or other entity) that owns it or whether itmay be routed to a cloud-based location. If a cloud-based location isallowable for the file system object, the rules may indicate a specificcloud-based location for routing and/or storing the file system object.The rules may also specify which locations are not allowable for thefile system object, and in such case, the file system object should notbe moved to these restricted, non-allowable locations. Some examplerules include: “allowed-storage=onprem” that indicates that the filesystem object may be stored on the premises of the enterprise only, and“allowed-storage=first_cloud_service” that indicates that the filesystem object may be stored at the first cloud service. Rules mayinclude more than one expressions and/or complex expressions. Forinstance, rule “allowed-storage=first_cloud_service AND onprem”indicates that the file system object may remain on the premises or bemoved to the first cloud service. Another example of a rule includes“allowed-storage=second_cloud_service ANDallowed-storage≠third_cloud_service” that indicates that the file systemobject may be stored on the second cloud service but not allowed on thethird cloud service.

Returning to FIG. 7, rules checker 714 may perform a search forapplicable rules for routing the file system object based on its tags.The matching or applicable rule may specify where the file system objectmay be moved and/or stored or may not be moved and/or stored.Additionally, the file system object may be routed and/or stored at morethan one locations. If no applicable rule is found, rules checker 714may send an alert to an administrator and/or follow a default procedure,for example, to keep the file system object on the premises until thedatabase of rules has been updated and/or a time window has passedbefore searching the rules again.

Once one or more applicable rule(s) is/are identified, routinginformation and/or the applicable rule(s) may be transmitted to objectrouter 716 via communication link 720. Object router 716 is configuredto route, synchronize, and/or store the received file system objectbased on the routing information and/or the applicable rule(s). Ifmultiple rules are found to be applicable, and the rules areconflicting, a rule precedent may be applied to prevent conflict. Therule precedent, which may be stored in memory 706 with or separatelyfrom rules 708, sets forth the ranking or order to be applied to thematching rules. The ranking may be manually set by an administrator orautomatically determined based on any parameter (e.g., time, location,regulations, business policies, etc.). For example, the rule precedentmay dictate that the first matching rule is to be applied to the filesystem object when there are multiple matching rules. The file systemobject may be directed, routed, synchronized, and/or stored at one ormore locations indicated by the applicable rule. The locations mayinclude any storage location, such as a storage location on the premisesof the enterprise, a general storage that is cloud-based, a specificstorage location that is in the cloud (e.g., a specific geographicallocation or a location associated with a specific vendor), etc. Acloud-based location may be any of a public, private or hybrid cloudinfrastructure that is owned and/or operated by the enterprise and/orother entities. A public cloud may be based on a standard cloudcomputing model where resources (e.g., applications and storage) may bemade available to the general public over a network (e.g., the Internet)by the provider of the public cloud. A private cloud may be a type ofcloud computing that is similar to the public cloud but through aproprietary architecture and may be dedicated to a single enterprise. Ahybrid cloud may include a combination of one or more aspects of thepublic cloud and private cloud. When the applicable rule indicates thatthe file system object is not allowed to be moved to a particularlocation, object router 716 does not route the file system object to thenon-allowed location.

Accordingly, in embodiments, a file system object may be tagged andrules may be dynamically generated for routing tagged file systemobjects in various ways. For instance, FIG. 8 depicts a flowchart 800 ofa method of tagging a file system object and generating rules forrouting file system objects to a cloud-based location, according to anembodiment. Flowchart 800 is described with respect to computing device700 for illustrative purposes. The steps of flowchart 800 may beperformed in an order different than shown in FIG. 8 in someembodiments. Furthermore, not all steps of flowchart 800 need to beperformed in all embodiments. Further structural embodiments will beapparent to persons skilled in the relevant art(s) based on thefollowing description of flowchart 800 and computing device 700.

Flowchart 800 begins with step 802. In step 802, a file system object isautomatically tagged with one or more tags based on at least one of filesystem object content or file system object location. For example,tagger 710 may automatically tag a received file system object based onits tags (e.g., tags 404 shown in FIG. 4), as described above.

In step 804, dynamic rules that determine whether to route a file systemobject to a cloud-based location based on one or more tags aregenerated. For example, rules generator 724, including UI 712, mayenable dynamic generation of rules 708 that determine how a file systemobject may be routed, synced, and/or stored, particularly with respectto a cloud-based location. Rules 708 may specify whether the file systemobject must or may remain on the premises of the enterprise that owns itor whether it may be routed to a cloud-based location. If a cloud-basedlocation is allowable for the file system object, the rules may indicatea specific cloud-based location for routing and/or storing the filesystem object. The rules may also specify which locations are notallowable for the file system object, and in such case, the file systemobject should not be moved to these restricted, non-allowable locations.Some example rules include: “allowed-storage=onprem” that indicates thatthe file system object may be stored on the premises of the enterpriseonly, and “allowed-storage=first_cloud_service” that indicates that thefile system object may be stored at the first cloud service. Rules mayinclude more than one expressions or complex expressions. For instance,rule “allowed-storage=first_cloud_service AND onprem” indicates that thefile system object may remain on the premises or be moved to the firstcloud service. Another example of a rule includes“allowed-storage=second_cloud_service ANDallowed-storage≠third_cloud_service” that indicates that the file systemobject may be stored on the second cloud service but not allowed on thethird cloud service.

Example Computer System Implementations

Computing device(s) 102, file server(s) 104, file resource manager 106,node 114, node 116, node 118, node 120, file resource manager 300, ruleschecker 302, object router 304, receiver 306, accessor 308, searcher310, tagger 504, tagger 604, file repository 702, processor 704, tagger710, rules checker 714, object router 716, rule generator 724, flowchart200, and/or flowchart 800 may be implemented in hardware, or hardwarewith any combination of software and/or firmware, including beingimplemented as computer program code executed in one or more processorsand/or stored in a computer readable storage medium, or beingimplemented as hardware logic/electrical circuitry, such as beingimplemented together in a system-on-chip (SoC). The SoC may include anintegrated circuit chip that includes one or more of a processor (e.g.,a microcontroller, microprocessor, digital signal processor (DSP),etc.), memory, one or more communication interfaces, and/or furthercircuits and/or embedded firmware to perform its functions.

FIG. 9 depicts an example processor-based computer system 900 that maybe used to implement various embodiments described herein. For example,system 900 may be used to implement computing device(s) 102, fileserver(s) 104, node 114, node 116, node 118, node 120, and/or filerepository 702, as described above. The description of system 900provided herein is provided for purposes of illustration, and is notintended to be limiting. Embodiments may be implemented in further typesof computer systems, as would be known to persons skilled in therelevant art(s).

As shown in FIG. 9, system 900 includes a processing unit 902, a systemmemory 904, and a bus 906 that couples various system componentsincluding system memory 904 to processing unit 902. Processing unit 902may comprise one or more circuits, microprocessors or microprocessorcores. Bus 906 represents one or more of any of several types of busstructures, including a memory bus or memory controller, a peripheralbus, an accelerated graphics port, and a processor or local bus usingany of a variety of bus architectures. System memory 904 includes readonly memory (ROM) 908 and random access memory (RAM) 910. A basicinput/output system 912 (BIOS) is stored in ROM 908.

System 900 also has one or more of the following drives: a hard diskdrive 914 for reading from and writing to a hard disk, a magnetic diskdrive 916 for reading from or writing to a removable magnetic disk 918,and an optical disk drive 920 for reading from or writing to a removableoptical disk 922 such as a CD ROM, DVD ROM, BLU-RAY™ disk or otheroptical media. Hard disk drive 914, magnetic disk drive 916, and opticaldisk drive 920 are connected to bus 906 by a hard disk drive interface924, a magnetic disk drive interface 926, and an optical drive interface928, respectively. The drives and their associated computer-readablemedia provide nonvolatile storage of computer-readable instructions,data structures, program modules and other data for the computer.Although a hard disk, a removable magnetic disk and a removable opticaldisk are described, other types of computer-readable memory devices andstorage structures can be used to store data, such as flash memorycards, digital video disks, random access memories (RAMs), read onlymemories (ROM), and the like.

A number of program modules may be stored on the hard disk, magneticdisk, optical disk, ROM, or RAM. These program modules include anoperating system 930, one or more application programs 932, otherprogram modules 934, and program data 936. In accordance with variousembodiments, the program modules may include computer program logic thatis executable by processing unit 902 to perform any or all of thefunctions and features of file server(s) 104, file resource manager 106,file resource manager 300, rules checker 302, object router 304,receiver 306, accessor 308, searcher 310, tagger 504, tagger 604, filerepository 702, processor 704, tagger 710, rules checker 714, objectrouter 716, rule generator 724, flowchart 200, and/or flowchart 800(including any step of flowcharts 200 and 800).

A user may enter commands and information into system 900 through inputdevices such as a keyboard 938 and a pointing device 940 (e.g., amouse). Other input devices (not shown) may include a microphone,joystick, game controller, scanner, or the like. In one embodiment, atouch screen is provided in conjunction with a display 944 to allow auser to provide user input via the application of a touch (as by afinger or stylus for example) to one or more points on the touch screen.These and other input devices are often connected to processing unit 902through a serial port interface 942 that is coupled to bus 906, but maybe connected by other interfaces, such as a parallel port, game port, ora universal serial bus (USB). Such interfaces may be wired or wirelessinterfaces.

Display 944 is connected to bus 906 via an interface, such as a videoadapter 946. In addition to display 944, system 900 may include otherperipheral output devices (not shown) such as speakers and printers.

System 900 is connected to a network 948 (e.g., a local area network orwide area network such as the Internet) through a network interface 950,a modem 952, or other suitable means for establishing communicationsover the network. Modem 952, which may be internal or external, isconnected to bus 906 via serial port interface 942.

As used herein, the terms “computer program medium,” “computer-readablemedium,” and “computer-readable storage medium” are used to refer tophysical hardware media such as the hard disk associated with hard diskdrive 914, removable magnetic disk 918, removable optical disk 922,other physical hardware media such as RAMs, ROMs, flash memory cards,digital video disks, zip disks, MEMs, nanotechnology-based storagedevices, and further types of physical/tangible hardware storage media.Such computer-readable storage media are distinguished from andnon-overlapping with communication media (do not include communicationmedia). Communication media embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wireless media such asacoustic, RF, infrared and other wireless media, as well as wired media.Embodiments are also directed to such communication media that areseparate and non-overlapping with embodiments directed tocomputer-readable storage media.

As noted above, computer programs and modules (including applicationprograms 932 and other programs 934) may be stored on the hard disk,magnetic disk, optical disk, ROM, RAM, or other hardware storage medium.Such computer programs may also be received via network interface 950,serial port interface 942, or any other interface type. Such computerprograms, when executed or loaded by an application, enable computingdevice 900 to implement features of embodiments discussed herein.Accordingly, such computer programs represent controllers of thecomputing device 900.

Embodiments are also directed to computer program products comprisingcomputer code or instructions stored on any computer-readable medium.Such computer program products include hard disk drives, optical diskdrives, memory device packages, portable memory sticks, memory cards,and other types of physical storage hardware.

Additional Example Embodiments

In an embodiment, a method comprises: receiving a file system objecttagged with one or more tags based on at least one of file system objectcontent or file system object location; accessing dynamic rules thatcontrol routing of file system objects to one or more cloud-basedlocations based on the one or more tags; searching the dynamic rules foran applicable rule for routing the file system object, the searchingcomprises selecting the applicable rule to be a first rule of thedynamic rules to match a tag of the one or more tags when there aremultiple matches; routing the file system object based on the applicablerule; and avoiding routing the file system object to a cloud-basedlocation disallowed by the applicable rule.

In an embodiment, the method further comprises: automatically taggingthe file system object with the one or more tags by changing the filesystem object to include the one or more tags.

In an embodiment, the method further comprises: automatically taggingthe file system object with the one or more tags by populating adatabase with a file system object identifier and the one or more tagsassociated with the file system object.

In an embodiment, the method further comprises: generating the dynamicrules, said generating comprising prioritizing the dynamic rules toavoid conflict among the dynamic rules.

In an embodiment, the dynamic rules are based on at least one of adirectory level, a file system object level, a file system objectproperty, a file system object content, a date of file system objectcreation, or a date range.

In an embodiment, the searching further comprises: when no applicablerule is found, performing at least one of waiting until the dynamicrules are updated to search the dynamic rules again or waiting until atime window has passed to search the dynamic rules again.

In an embodiment, the cloud-based location comprises at least one of apublic cloud, a private cloud, or a hybrid cloud.

In another embodiment, a system comprises: at least one processorcircuit; and at least one memory that stores program code configured tobe executed by the at least one processor circuit, the program codecomprising: a rules checker configured to receive a file system objecttagged with one or more tags based on at least one of file system objectcontent or file system object location, to access dynamic rules thatcontrol routing of file system objects to one or more cloud-basedlocations based on the one or more tags, and to search the dynamic rulesfor an applicable rule for routing the file system object; and an objectrouter configured to route the file system object based on theapplicable rule.

In an embodiment, the program code further comprises a tagger configuredto automatically tag the file system object by changing the file systemobject to include the one or more tags.

In an embodiment, the program code further comprises a tagger configuredto automatically tag the file system object by populating a databasewith a file system object identifier and the one or more tags associatedwith the file system object.

In an embodiment, the program code further comprises a user interfaceconfigured to generate the dynamic rules and to configure aprioritization mechanism to avoid conflict among the dynamic rules.

In an embodiment, the dynamic rules are based on at least one of adirectory level, a file system object level, a file system objectproperty, a file system object content, a date of file system objectcreation, or a particular date range.

In an embodiment, the rules checker is further configured to search thedynamic rules by selecting the applicable rule to be a first rule of thedynamic rules to match a tag of the one or more tags when there aremultiple matches.

In an embodiment, the object router is further configured to avoidrouting the file system object to a cloud-based location disallowed bythe applicable rule.

In another embodiment, a computing device comprises: at least one filerepository that includes memory and a processor configured to managefile system objects created by one or more users in an enterprise, theprocessor including: a tagger configured to automatically tag a filesystem object with one or more tags based on at least one of file systemobject content or file system object location; and a user interfaceconfigured to enable generation of dynamic rules that control routing offile system objects to a cloud-based location based on the one or moretags.

In an embodiment, the processor further comprises: a rules checkerconfigured to receive a file system object tagged with the one or moretags and to search the dynamic rules for an applicable rule for routingthe file system object.

In an embodiment, the processor further comprises: an object routerconfigured to route the file system object based on the applicable rule.

In an embodiment, the tagger is configured to automatically tag the filesystem object by at least one of: changing the file system object toinclude the one or more tags; or populating a database with a filesystem object identifier and the one or more tags associated with thefile system object.

In an embodiment, the dynamic rules are based on at least one of adirectory level, a file system object level, a file system objectproperty, a file system object content, a date of file system objectcreation, or a particular date range.

In an embodiment, the dynamic rules are perpetuated when the file systemobject is moved to another location.

CONCLUSION

In accordance with an embodiment, any combination of the above-describedembodiments may be utilized depending on the system being implemented

While various embodiments of the present invention have been describedabove, it should be understood that they have been presented by way ofexample only, and not limitation. It will be apparent to persons skilledin the relevant art that various changes in form and detail can be madetherein without departing from the spirit and scope of the invention.Thus, the breadth and scope of the present invention should not belimited by any of the above-described exemplary embodiments, but shouldbe defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A computerized system comprising: one or morecomputer processors; and computer memory storing computer-useableinstructions that, when used by the one or more computer processors,cause the one or more computer processors to perform operationscomprising: tagging a file system object with one or more tags;receiving the file system object tagged with the one or more tags;accessing dynamic rules that control routing of file system objects toone or more cloud-based locations based on the one or more tags; andsearching the dynamic rules for an applicable rule for routing the filesystem object.
 2. The system of claim 1, wherein tagging comprisesautomatically profiling the file system object to determine the one ormore tags.
 3. The system of claim 1, wherein tagging comprises changingthe file system object to include the one or more tags.
 4. The system ofclaim 1, wherein tagging comprises populating a database with a filesystem object that classifies the file system object according to atleast one of: a location of the file system object; a line of businessof the file system object; an ownership of the file system object; acontent of the file system object; a file size of the file systemobject; or a file extension of the file system object.
 5. The system ofclaim 1, wherein searching comprises selecting the applicable rules fromat least one of: a first dynamic rule based on a directory level; asecond dynamic rule based on a file system object level; a third dynamicrule based on a file system object property; or a fourth dynamic rulebased on at least one of a file system object content, a date of filesystem object creation, or a date range.
 6. The system of claim 1,wherein searching comprises: finding multiple dynamic rules applicableto the one or more tags; prioritizing the multiple dynamic rulesaccording to a rule precedent to determine the applicable rule; andselecting the applicable rule from the prioritized multiple dynamicrules.
 7. The system of claim 1, the operations further comprising:generating a user interface configured to enable generation of dynamicrules that control routing of file system objects to a cloud-basedlocation based on the one or more tags.
 8. One or more computer-storagemedia having computer-executable instructions embodied thereon that,when executed by a computing system having a processor and memory, causethe processor to: tag a file system object with one or more tags;receive the file system object tagged with the one or more tags; accessdynamic rules that control routing of file system objects to one or morecloud-based locations based on the one or more tags; and search thedynamic rules for an applicable rule for routing the file system object.9. The media of claim 8, wherein tagging comprises automaticallyprofiling the file system object to determine the one or more tags. 10.The media of claim 8, wherein tagging comprises changing the file systemobject to include the one or more tags.
 11. The media of claim 8,wherein tagging comprises populating a database with a file systemobject that classifies the file system object according to at least oneof: a location of the file system object; a line of business of the filesystem object; an ownership of the file system object; a content of thefile system object; a file size of the file system object; or a fileextension of the file system object.
 12. The media of claim 8, whereinsearching comprises selecting the applicable rules from at least one of:a first dynamic rule based on a directory level; a second dynamic rulebased on a file system object level; a third dynamic rule based on afile system object property; or a fourth dynamic rule based on at leastone of a file system object content, a date of file system objectcreation, or a date range.
 13. The media of claim 8, wherein searchingcomprises: finding multiple dynamic rules applicable to the one or moretags; prioritizing the multiple dynamic rules according to a ruleprecedent to determine the applicable rule; and selecting the applicablerule from the prioritized multiple dynamic rules.
 14. The media of claim8, the operations further comprising: generating a user interfaceconfigured to enable generation of dynamic rules that control routing offile system objects to a cloud-based location based on the one or moretags.
 15. A computer-implemented method, the method comprising: tagginga file system object with one or more tags; receiving the file systemobject tagged with the one or more tags; accessing dynamic rules thatcontrol routing of file system objects to one or more cloud-basedlocations based on the one or more tags; and searching the dynamic rulesfor an applicable rule for routing the file system object.
 16. Themethod of claim 15, wherein tagging comprises automatically profilingthe file system object to determine the one or more tags or changing thefile system object to include the one or more tags.
 17. The method ofclaim 15, wherein tagging comprises populating a database with a filesystem object that classifies the file system object according to atleast one of: a location of the file system object; a line of businessof the file system object; an ownership of the file system object; acontent of the file system object; a file size of the file systemobject; or a file extension of the file system object.
 18. The method ofclaim 15, wherein searching comprises selecting the applicable rulesfrom at least one of: a first dynamic rule based on a directory level; asecond dynamic rule based on a file system object level; a third dynamicrule based on a file system object property; or a fourth dynamic rulebased on at least one of a file system object content, a date of filesystem object creation, or a date range.
 19. The method of claim 15,wherein searching comprises: finding multiple dynamic rules applicableto the one or more tags; prioritizing the multiple dynamic rulesaccording to a rule precedent to determine the applicable rule; andselecting the applicable rule from the prioritized multiple dynamicrules.
 20. The method of claim 15, the operations further comprising:generating a user interface configured to enable generation of dynamicrules that control routing of file system objects to a cloud-basedlocation based on the one or more tags.