Patent classifications
G06F16/18
Transaction-enabled systems and methods for resource acquisition for a fleet of machines
The present disclosure describes transaction-enabling systems and methods. A system can include a controller and a fleet of machines, each having at least one of a compute task requirement, a networking task requirement, and an energy consumption task requirement. The controller may include a resource requirement circuit to determine an amount of a resource for each of the machines to service the task requirement for each machine, a forward resource market circuit to access a forward resource market, and a resource distribution circuit to execute an aggregated transaction of the resource on the forward resource market.
5G network slicing with distributed ledger traceability and resource utilization inferencing
Various systems and methods for implementing an edge computing system to realize 5G network slices with blockchain traceability for informed 5G service supply chain are disclosed. A system configured to track network slicing operations includes memory and processing circuitry configured to select a network slice instance (NSI) from a plurality of available NSIs based on an NSI type specified by a client node. The available NSIs uses virtualized network resources of a first network resource provider. The client node is associated with the selected NSI. The utilization of the network resources by the plurality of available NSIs is determined using an artificial intelligence (AI)-based network inferencing function. A ledger entry of associating the selected NSI with the client node is recorded in a distributed ledger, which further includes a second ledger entry indicating allocations of resource subsets to each of the NSIs based on the utilization.
Managing datapath validation on per-transaction basis
A technique for managing a datapath of a data storage system includes receiving a request to access target data and creating a transaction that includes multiple datapath elements in a cache, where the datapath elements are used for accessing the target data. In response to detecting that one of the datapath elements is invalid, the technique further includes processing the transaction in a rescue mode. The rescue mode attempts to replace each invalid datapath element of the transaction with a valid version thereof obtained from elsewhere in the data storage system. The technique further includes committing the transaction as processed in the rescue mode.
ARCHITECTURE FOR MANAGEMENT OF DIGITAL FILES ACROSS DISTRIBUTED NETWORK
A server system, based on content of a first file stored on a first client device being modified, automatically receives a copy of the modified first file from a first transfer client, implemented on the first client device, the copy of the modified first file being an updated version of the first file generated from content of the first file being modified. The server system receives, from the first transfer client, first metadata associated with the updated version of the first file, the first metadata being assigned a first priority greater than a second priority assigned to the copy of the modified first file. The server system automatically transfers the first metadata to a second transfer client, implemented on a second client device, before the copy of the modified first file is transferred to the second transfer client to be stored on the second client device.
GENERATING AND MODIFYING A COLLECTION CONTENT ITEM FOR ORGANIZING AND PRESENTING CONTENT ITEMS
The present disclosure is directed toward systems and methods that efficiently and effectively generate and utilize collections of content items. For example, systems and methods described herein generate a collection content item including one or more content item references. In one or more embodiments, the collection content item can include content item references for content items located internally or externally, with granular levels of permissions settings and version controls. Additionally, in response to a detected selection of a content item reference, systems and methods described herein generate a rendering of the associated content item that can be viewed regardless of any third party software installed on the viewing client computing device.
Data Storage System and Method
A system and method are presented that utilize separate append-only arrays to track metadata and real data for a file. All modifications to the file result in metadata records being appended to the end of the metadata array. Write modification commands cause real data to be appended to the file data array. The location of real data on the file data array is identified by a record in the metadata array. Modification commands can be grouped into sets, which complete as a set. Modification sets can rely upon the completeness of prior sets. Read-like commands cause the creation of a virtual array based upon the records of the metadata array. The created virtual array has the same size as the actual file but does not contain the real data for the file. Rather, the virtual file array maps to the actual data stored in the file data array.
ELECTRONIC DEVICE FOR MANAGING JOURNAL FILE AND OPERATION METHOD THEREOF
An electronic device includes: a memory storing a database, a journal file for the database, and instructions; and a processor electrically connected with the memory. The instructions are configured to, when executed by the processor, cause the electronic device to: record a result of processing a transaction in the journal file through a thread of a process associated with the database; identify a size of the journal file through the thread; perform a lock for the journal file during a reference time through the thread, based on the identified size of the journal file through the thread; and transfer the result of processing the transaction to the database through the thread, based on a success of the lock for the journal file, the result of processing the transaction being recorded in the journal file.
CONTROL SERVER, DATA SHARING SYSTEM, AND CONTROL PROGRAM
Upon receiving a usage request that includes a file identifier and a version identifier from a user terminal 20, a control server 10 transmits a file request that is based on the usage request to a file management system, and transmits a permission information request that is based on the usage request to a distributed ledger system. Upon receiving the file request, the file management system acquires the file that corresponds to the combination of the file identifier and the version identifier and transmits the file to the control server 10. Upon receiving the permission information request, the distributed ledger system acquires permission information that corresponds to the combination of the file identifier and the version identifier from a distributed ledger, and transmits the permission information to the control server 10. The control server 10 transmits the file to the user terminal 20 if the user of the user terminal has viewing permission based on the permission information.
Method and system for comparing document versions encoded in a hierarchical representation
This invention discloses a novel system and method for comparing electronic documents that are created on different software platforms or that are in different data formats by traversing the two hierarchical representations of the documents in a manner so as to selectively ignore nodes in the hierarchy and attempt to resynchronize the sequence of traversing when nodes have no matching content.
Using copied data in a distributed storage network
A storage unit includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and processing circuitry. The storage unit receives a set of read slice requests for a set of encoded data slices (EDSs) associated with a data object stored within a first set of storage units, where the storage the first set of storage units includes the storage unit. When at least a read threshold number of EDSs and fewer than all of the set of EDSs can be successfully retrieved from the first set of storage units, the storage unit identifies at least one EDS associated with a data object that is stored in a second set of storage units, obtains the at least one EDS and stores the at least one EDS in the storage unit.