Patent classifications
G06F16/174
SYSTEM AND METHOD FOR AN ULTRA HIGHLY AVAILABLE, HIGH PERFORMANCE, PERSISTENT MEMORY OPTIMIZED, SCALE-OUT DATABASE
A shared-nothing database system is provided in which parallelism and workload balancing are increased by assigning the rows of each table to “slices”, and storing multiple copies (“duplicas”) of each slice across the persistent storage of multiple nodes of the shared-nothing database system. When the data for a table is distributed among the nodes of a shared-nothing system in this manner, requests to read data from a particular row of the table may be handled by any node that stores a duplica of the slice to which the row is assigned. For each slice, a single duplica of the slice is designated as the “primary duplica”. All DML operations (e.g. inserts, deletes, updates, etc.) that target a particular row of the table are performed by the node that has the primary duplica of the slice to which the particular row is assigned. The changes made by the DML operations are then propagated from the primary duplica to the other duplicas (“secondary duplicas”) of the same slice.
POINT CLOUD DATA ENCAPSULATION METHOD AND POINT CLOUD DATA TRANSMISSION METHOD
Provided are a point cloud data encapsulation method and a point cloud data transmission method. The point cloud data encapsulation method includes: compressing a point cloud media file; and encapsulating the compressed point cloud media file and setting a classification record according to a data type, where the classification record is used for indicating a data type of each portion of point cloud data in the point cloud media file. The problem of low transmission efficiency of the media content and waste of storage space in the point cloud data transmission is solved, the flexibility of the media content combination is increased, management control of a multimedia service is increased, users are given more rights to independently select and acquire the media content, diversified application scenarios are provided, and better multimedia content provision and transmission solutions are provided for network operators.
Monitoring changes to data items using associated metadata
Embodiments are directed towards managing and tracking item identification of a plurality of items to determine if an item is a new or existing item, where an existing item has been previously processed. In some embodiments, two or more item identifiers may be generated. In one embodiment, generating the two or more item identifiers may include analyzing the item using a small item size characteristic, a compressed item, or for an identifier collision. The two or more item identifiers may be employed to determine if the item is a new or existing item. In one embodiment, the two or more item identifiers may be compared to a record about an existing item to determine if the item is a new or existing item. If the item is an existing item, then the item may be further processed to determine if the existing item has actually changed.
Monitoring changes to data items using associated metadata
Embodiments are directed towards managing and tracking item identification of a plurality of items to determine if an item is a new or existing item, where an existing item has been previously processed. In some embodiments, two or more item identifiers may be generated. In one embodiment, generating the two or more item identifiers may include analyzing the item using a small item size characteristic, a compressed item, or for an identifier collision. The two or more item identifiers may be employed to determine if the item is a new or existing item. In one embodiment, the two or more item identifiers may be compared to a record about an existing item to determine if the item is a new or existing item. If the item is an existing item, then the item may be further processed to determine if the existing item has actually changed.
Systems and methods for uploading streamed objects to a cloud storage system
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key. The plaintext object keys are generated in advance of uploads. The plaintext object keys can be stored in an object database in the cloud. Alternatively, the plaintext object keys can be provided to a customer's HSM, encrypted, and returned to the cloud, such that encrypted object keys, encrypted by the customer, are stored in the cloud. The cloud can alternatively encrypt the customer's object keys with a master key for the customer, which is then encrypted by the customer's HSM before being stored in the cloud. Proxies are also deployed for efficiently communicating with customer security modules.
Policy enforcement and performance monitoring at sub-LUN granularity
Techniques are provided for enforcing policies at a sub-logical unit number (LUN) granularity, such as at a virtual disk or virtual machine granularity. A block range of a virtual disk of a virtual machine stored within a LUN is identified. A quality of service policy object is assigned to the block range to create a quality of service workload object. A target block range targeted by an operation is identified. A quality of service policy of the quality of service policy object is enforced upon the operation using the quality of service workload object based upon the target block range being within the block range of the virtual disk.
Technologies for providing shared memory for accelerator sleds
Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.
SYSTEM AND METHOD FOR OPERATIONAL WORKFLOW TRANSPARENCY AND END-TO-END EVENTS TRACKING
A method for operational workflow transparency and end-to-end events tracking, the method includes at an event producer system, generating events, corresponding key business attributes, provider industry standard identifiers, patient identifiers, and patient information, and publishing the events and the key business attributes to a tracking system. At a tracking system, receiving and validating the events from the event producer system, generating a universally unique lexicographically sortable identifier (ULID) for an append-only log data structure for the respective event, generating a search index to enable search capabilities for the append-only log data structure, and temporally appending the respective event into the append-only log data structure for the corresponding prior-authorization case.
Real-time archiving method and system based on hybrid cloud
Provided are a data archiving method and apparatus capable of providing a remote near-line data archiving function by receiving remote function invoking from a target system in which data is stored, providing the target system with a first function for archiving, in a storage system, at least some of the data stored in the target system over a network in response to the remote function invoking, and providing the target system with a second function for the query of the data archived in the storage system over the network.
File Storage Method and Apparatus, and Device and Readable Storage Medium
A file storage method, apparatus, device and a readable storage medium. The method includes: performing striping processing on a target file to obtain multiple target objects, and calculating fingerprint information of each target object; using a first target object and logical information of the target file to form a logical header object, and storing the logical header object in a storage system; using the fingerprint information of each second target object to determine whether the second target object has been stored in the storage system; and if the second target object has not been stored in the storage system, determining the second target object as a third target object and storing same in the storage system. According to the method, logical information of each file can be preserved, and files of some users can be prevented from being modified or deleted after deduplication is performed in the storage system.