G06F16/20

DATABASE REPLICATION USING HETEROGENOUS ENCODING
20230051996 · 2023-02-16 ·

Embodiments of the invention are directed to database replication using heterogenous encoding. Aspects include obtaining a database and analyzing a data pattern of data in the database. Aspects also include identifying a plurality of candidate encoding formats and evaluating a computing cost for encoding the database for each of the plurality of candidate encoding formats. Aspects further include selecting an encoding format from the plurality of candidate encoding formats based at least in part on the computing cost and storing a backup copy of the database using the encoding format.

Identification of intent and non-intent query portions
11580115 · 2023-02-14 · ·

Methods and systems for improved categorization of queries are disclosed. In one aspect, first queries having query results limited to a particular category are identified. Second queries including a first query are also identified. For identified second queries, a pattern is generated based on the second query and the included first query, and a rank of the first query's particular category in results for the second query and a percentage of the second query's results having a category equivalent to the included first query's particular category are determined. The ranks and percentages are aggregated for matching patterns, and second patterns with aggregated ranks and percentages meeting a criterion are determined. Results for a third query are limited to a category equivalent to a particular category for a first query included in the third query, and then transmitted over a computer network to a client device.

Automated orchestration of cyber protection of a set of storage volumes

An Orchestrated Data Recovery (ODR) Cyber Protection Automation (CPA) operates to ensure one-to-one creation of snapsets of a production site and corresponding snapsets of a cyber vault. During an initiation phase, the ODR CPA monitors synchronization of a snapset of production volumes from the production site to the cyber vault. If additional snapsets of the production volumes are created prior to completion of synchronization of the first snapset, the additional snapsets are also synchronized to the cyber vault. Once the initial synchronization of the storage volumes has been completed, the ODR CPA causes a Storage Volume Creation and Management System (SVCMS) to create a snapset of the storage volumes at the cyber vault. Subsequently, each time a snapset is created of the production site, the ODR CPA orchestrates synchronization of the snapset to the cyber vault and creation of a corresponding snapset at the cyber vault.

Monitoring changes to data items using associated metadata

Embodiments are directed towards managing and tracking item identification of a plurality of items to determine if an item is a new or existing item, where an existing item has been previously processed. In some embodiments, two or more item identifiers may be generated. In one embodiment, generating the two or more item identifiers may include analyzing the item using a small item size characteristic, a compressed item, or for an identifier collision. The two or more item identifiers may be employed to determine if the item is a new or existing item. In one embodiment, the two or more item identifiers may be compared to a record about an existing item to determine if the item is a new or existing item. If the item is an existing item, then the item may be further processed to determine if the existing item has actually changed.

Monitoring changes to data items using associated metadata

Embodiments are directed towards managing and tracking item identification of a plurality of items to determine if an item is a new or existing item, where an existing item has been previously processed. In some embodiments, two or more item identifiers may be generated. In one embodiment, generating the two or more item identifiers may include analyzing the item using a small item size characteristic, a compressed item, or for an identifier collision. The two or more item identifiers may be employed to determine if the item is a new or existing item. In one embodiment, the two or more item identifiers may be compared to a record about an existing item to determine if the item is a new or existing item. If the item is an existing item, then the item may be further processed to determine if the existing item has actually changed.

System and method for facilitating user defined virtual space

A system and method for facilitating a user defined virtual space is disclosed. One or more virtual space locations and/or activities may be correlated with user specified geolocations. In some implementations, the user specified geolocations may be verified against one or more spatial requirements prior to recording the user selected space-geolocation correlations. A user request to initiate an action or activity in the virtual space may be received. Prior to executing the requested action or activity in the virtual space, the user current geolocation may be verified against that specified in a space-geolocation correlation corresponding to a virtual space location or activity indicated in the user request.

Systems and methods for attribute analysis of one or more databases

Systems and techniques for indexing and/or querying a database are described herein. Multiple, large disparate data sources may be processed to cleanse and/or combine item data and/or item metadata. Further, attributes may be extracted from the item data sources. The interactive user interfaces allow a user to select one or more attributes and/or other parameters to present visualizations based on the processed data.

Methods and systems for cascade filtering for data exploration in computer systems
11593331 · 2023-02-28 · ·

Methods and systems are provided herein for improved data filtering for use in user interfaces, data visualization, data exploration, and menu operations, which solve the aforementioned problems. Specifically, embodiments disclosed herein relate to improved data structuring for computer devices that provides efficient organization, filtering, and/or navigation in a user interface in order to improve how hierarchical data is displayed and filtered, particularly with regard to small displays or displays of data that aim to be efficient, intuitive, or easy to use.

Data processing method, device, and a storage medium

A data processing method is applied to a computing device serving as a blockchain node. The method comprises: acquiring a data processing request; according to the data processing request, determining a current version identifier; according to the data processing request, determining a target key value pair used for processing data, and processing data in the value range of the target value pair; writing a newly produced target value pair into a storage space, wherein the key domain of a key value pair in the storage area stores a key identifier and a version identifier, and the version identifier in the key domain of the newly produced target key value pair is the current version identifier.

Multi-level architecture of pattern recognition in biological data

Methods, systems and apparatus for detecting patterns in constituents of at least one biological organism are disclosed. In accordance with one method, clusters of the constituents are determined by selecting different subsets of at least one of genes or proteins and identifying the clusters from biological data corresponding to the selected subsets. Here, membership values for the constituents, indicating membership within the clusters, are calculated for use as a basis of an additional cluster determination process to obtain final clusters of constituents. By underpinning the preliminary clustering on different subsets of biological data and formulating the higher-level clustering on the basis of the membership values, the embodiments can enable an evaluation of a large variety of biological data in a practical, accurate and highly efficient manner.