Patent classifications
G06F16/1734
Lock management associated with a key-value database system
A first data structure lock to access a first data structure of a first set of data structures to perform an operation associated with a transaction is acquired. The operation associated with the transaction is executed, wherein the operation is one of inserting the transaction into the first data structure or removing the transaction from the first data structure. An oldest active transaction of the first data structure is identified. A globally oldest active transaction of the set of the data structures in view of the oldest active transaction is determined. A second set of data structures is accessed, the second set of data structures including information associated with completed transactions to identify a set of data locks associated with completed transactions each having a transaction completion identifier that satisfies a condition when compared to a transaction start identifier associated with the globally oldest active transaction. The set of data locks are released.
Data guardianship in a cloud-based data storage system
Techniques and mechanisms described herein provide for verification of data across cloud-based and on-premises data storage systems. According to various embodiments, a backup client implemented on a first compute node can store a data file in a backup data repository. A data guardianship can store first data file state information describing the data file in a key-value store accessible via the internet. A data verification instance can analyze the backup data repository to verify that the data file is stored intact in the backup data repository.
METHODS FOR ENSURING CORRECTNESS OF FILE SYSTEM ANALYTICS AND DEVICES THEREOF
Methods, non-transitory machine readable media, and computing devices that ensure correctness of file system analytics are disclosed. With this technology, a first generation number for a volume is incremented in response to a modification of a rule set that defines properties of objects of a file system associated with the volume. A determination is made when a second generation number in a first inode for a first one of the objects matches the first generation number. The first inode is identified based on a traversal of a directory tree associated with the file system. The modified rule set is applied to the properties for the first one of the objects to obtain values, when the second generation number fails to match the first generation number. Analytics data is output after the traversal has completed. The analytics data is generated in response to a query and is based on the values.
USER-BASED ACCESS TO CONTENT OF FILES
A computing system may receive an input indicative of at least one portion of a first file is to be made accessible to a first user, and may generate a second file including the at least one portion of the first file and excluding other portions of the first file. Based on determining that the first file is to be shared with the first user, the computing system may send, to a second client device operated by the first user, the second file so as to limit access, by the first user, to contents of the first file.
OPTIMIZING FILE RECALL FOR MULTIPLE USERS
In an approach to improve file recall between storage devices by optimizing file recall for multiple users. Embodiments of the present invention obtain one or more similarities among one or more users based on one or more usage points and divide the one or more users into a plurality of clusters based on a content of the one or more usage points. Further, embodiments select a cluster from the plurality of clusters based on cluster importance, and select the content used by more than a predetermined percentage of the weighted users pertaining to the selected cluster as an automated recall subject. Additionally, embodiments recal one or more selected content from a secondary storage device to a primary storage device.
Computer system and method of evaluating changes to data in a prediction model
Provided is a computer system to present information useful for achieving purposes related to an object by utilizing AI prediction. The computer system manages a prediction model for predicting an object event based on evaluation data and feature profiling database that defines a change rule of each of the plurality of feature values included in the evaluation data, generates change policy data by changing the plurality of feature values included in the evaluation data based on the feature profiling database, calculates an evaluation value indicating effectiveness of the change policy data, and generates display data for presenting the change policy data and the evaluation value as information useful for achieving purposes related to the object.
PROGRAMATIC MODIFICATIONS TO FILE CONTENT
Non-limiting examples of systems, methods, and devices for programmatic modifications to files are disclosed herein. In an implementation, content of a file is auto-updated based on an association with an external resource. The external resource may access a data source and monitor for real-time status updates. When a status update is observed, the external resource captures the change and updates a version of the content based on the captured change. If necessary, the external resource may capture the change in a first format and transform the captured change into a second format that is compatible with the version of the content. State information of the updated version is then sent to the file and the content of the file may be updated according to the state information.
Time-based virtual machine reversion
Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.
Computer-implemented method for the monitoring of a plurality of cable-processing machines, and a monitoring system
A computer-implemented method for the monitoring of a plurality of cable-processing machines for the processing of cables includes the following steps: transmission of production parameters from one cable-processing machine, or a plurality of cable-processing machines, to a control server with a central database, wherein the production parameters include settings for the cable-processing machine for the processing of the cables by the cable-processing machine in question; reception of the production parameters by the control server; and storage of the production parameters in the central database.
Integrated hierarchical storage management
File access statistics associated with a content file are maintained by a file tier agent of a secondary storage system. The content file is accessible via a primary storage system. A target storage tier corresponding to the file access statistics associated with the content file is determined according to one or more policies. At least a portion of data of the content file is migrated to the determined storage tier while accessibility of the content file via the primary storage system is maintained.