G06F16/235

METHODS AND SYSTEM FOR UPDATING DEVICE MAINTENANCE PROFILES
20230230047 · 2023-07-20 ·

Methods, systems, and apparatus for updating maintenance profiles of devices or equipment are disclosed herein. An updated device maintenance profile is generated based on an existing maintenance profile of a device via an operation that preserves the form logic of the former. An electronic change request is generated irrespective of the data structures in the maintenance profiles, and upon the approval of the request, the updated maintenance profile is activated as the operative maintenance profile of the device. Further, an audit trail recording the activities of the system updating the maintenance profiles of devices is generated.

METHODS AND SYSTEM FOR GENERATING VERSIONS OF A DEVICE MAINTENANCE PROFILE
20230230049 · 2023-07-20 ·

Methods, systems, and apparatus for updating maintenance profiles of devices or equipment are disclosed herein. An updated device maintenance profile is generated based on an existing maintenance profile of a device via an operation that preserves the form logic of the former. An electronic change request is generated irrespective of the data structures in the maintenance profiles, and upon the approval of the request, the updated maintenance profile is activated as the operative maintenance profile of the device. Further, an audit trail recording the activities of the system updating the maintenance profiles of devices is generated.

Method and system of managing a file cache by selective delete-on-read operations

Disclosed is a computer implemented method to manage a cache, the method comprising, determining that a primary application opens a first file, wherein opening the first file includes reading the first file into a file cache from a storage. The method also includes, setting a first monitoring variable in the primary application process proc structure, wherein the first monitoring variable is set in response to the primary application opening the first file, and the first monitoring variable records a set of operations completed on the first file by the primary application. The method comprises a first read of the first file being at a beginning of the first file. The method includes identifying that the first file is read according to a pattern that includes reading the first file sequentially and reading the first file entirely and removing the first file from the file cache.

In-place garbage collection for state machine replication

Garbage collection processing in a distributed shared log system includes a client identifying obsoleted log entries for a shared data object. The client sends information associated with the identified obsoleted log entries to a shared log server. The shared log server receives information associated with obsoleted log entries from all clients in the distributed shared log system and uses the information to delete the obsoleted log entries. The shared log server can update a snapshot mark to indicate the earliest time that a snapshot of the shared log can be taken. The snapshot mark can be updated based on the information associated with obsoleted log entries.

METHOD AND DEVICE FOR SNAPSHOTTING METADATA, AND STORAGE MEDIUM

With the method for snapshotting metadata, in response to reaching a current snapshot moment, a second basic version number of a binary search tree in a database at the current snapshot moment is generated according to a first basic version number at a previous snapshot moment; during a process from the current snapshot moment to a next snapshot moment, whenever metadata in the database is updated, the binary search tree is updated according to the updated metadata, and an updated version number of the binary search tree after each update is generated according to the second basic version number; and in response to reaching the next snapshot moment, a snapshot operation is performed on binary search trees corresponding to all version numbers generated between the current snapshot moment and the next snapshot moment to generate snapshot information of the current snapshot moment.

Modifying storage of encoded data slices based on changing storage parameters

A method includes determining a change to storage parameters associated with storage of data objects in a storage network, where a data segment of the data objects is dispersed storage error encoded into a set of encoded data slices based on dispersed storage error encoding parameters, and where the set of encoded data slices is stored in the set of storage units. The method also includes determining a storage modification process for the set of encoded data slices based on the change to the storage parameters. The method also includes executing the storage modification process such that the set of encoded data slices are stored in the storage network in accordance with the changed storage parameters.

Query rewrite for low performing queries based on customer behavior

A method includes receiving a plurality of product query arrays each including a plurality of individual product queries received during a single user search session. The method further includes inputting the plurality of product query arrays into the query rewrite model. Text of each of the plurality of individual product queries in each product query array is treated as a whole token. The method further includes receiving a product query from a user electronic device. The method further includes determining a query rewrite for the product query using the query rewrite model and determining search results for the product query using the query rewrite. The method further includes sending information for presenting the search results on a display of the user electronic device responsive to the product query.

SYSTEMS AND METHODS TO FACILITATE RAPID DATA ENTRY FOR DOCUMENT REVIEW
20230214378 · 2023-07-06 ·

A computer-implemented method that includes generating a graphical user interface including a coding interface and a document viewer interface. The coding interface displays a grid that includes a plurality of cells representing a plurality of documents and a plurality of fields. A selection of one of the cells is received. The cell represents a selected one of the documents, and a selected one of the fields. A rendering of the selected document is automatically displayed in the document viewer interface. A value entered into the selected cell is received and the value is transmitted to a database for storage thereby.

Data processing method, apparatus, and system

A data processing method, apparatus, and system, where the method includes: receiving a data insertion request sent by service software, where the data insertion request includes a data record, and the data record includes an object type identifier, a field value, a field identifier, and an object instance identifier; generating a field index based on the object type identifier, the field value, and the object instance identifier; generating a relationship index based on the object type identifier; writing the data record to a database; and caching an index record and an operation for the index record into a cache apparatus, where the index record includes the relationship index and the field index. Using the foregoing solution, high-performance data processing of a flat-wide table is implemented.

Unique ID generation for sensors

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.