Patent classifications
G06F16/2358
Dynamic Deactivation of Cold Database in Database Service
Managing databases implemented in a cloud computing environment. A method includes detecting that a database implemented in the cloud computing environment is in a state of non-use. The method further includes as a result of detecting that a database implemented in the cloud computing environment is in a state of non-use, instantiating a workload in the cloud computing environment to deactivate the database. The workload is configured to store metadata for the database and database data remotely in cloud storage such that the database can be reactivated at a later time.
ASSISTIVE TECHNOLOGY NOTIFICATIONS FOR RELEVANT METADATA CHANGES IN A DOCUMENT
User interface information related to relevant events of interest is provided. Events can occur anywhere in a document, and may or may not be relevant to a user utilizing an assistive technology (AT) application, such as a screen reader. A provider-side signaling system component determines whether raised events are relevant to the user. In some examples, when an application makes a plurality of attribute changes in a document at once, the signaling provider batches the related events as a single transaction, and generates a generalized annotation describing the changes. The signaling provider further packages the event notification, and sends the event notification to a client-side signaling system component. The signaling client receives the notification, and determines whether to alert the user of the event(s) based on verbosity settings. The AT application is enabled to interpret the event notification and alert the user in a meaningful way.
Consolidating transaction log requests and transaction logs in a database transaction log service
Methods, systems, and computer program products are provided for consolidating transaction log requests and transaction logs in a database transaction log service. A scalable log service may manage log requests and logs to reduce resource consumption, such as memory and I/O. Log requests may be managed by consolidating (e.g., organizing, merging and/or de-duplicating) the log requests. Transaction log requests may be mapped to read requests for transaction log storage devices in less than a one-to-one ratio. Transaction logs may be managed by using the consolidated log requests to consolidate (e.g., and prefetch) transaction logs from multiple cache and/or storage tiers to a log pool cache. Log requests may be served from the log pool cache.
COMPUTER DATA SYSTEM DATA SOURCE REFRESHING USING AN UPDATE PROPAGATION GRAPH
Described are methods, systems and computer readable media for data source refreshing.
Federation of data during query time in computing systems
Techniques of federation of data during query time are disclosed herein. One example technique includes upon receiving an indication of interaction of a file by a user of a tenant, determining whether automatic replication of the file to a user shard corresponding to the user is permitted according to a company policy or a legal requirement, the user shard being in a second geographic region. The example technique can then include when automatic replication of the file is not permitted, storing the file in a tenant shard corresponding to the tenant in a network storage in the first geographic region and instead of replicating the file to the user shard in the second geographic region, creating, in the user shard in the second geographic region, a file reference that is a pointer to the file stored in the tenant shard in the network storage in the first geographic region.
Including Transactional Commit Timestamps In The Primary Keys Of Relational Databases
In a distributed database, a transaction is to be committed at a first coordinator server and one or more participant servers 1210. The first coordinator server is configured to receive a notification that each participant server of the transaction is prepared at a respective prepared timestamp, the respective prepared timestamp being chosen within a time range for which the respective participant server obtained at least one lock 1220. The first coordinator server computes the commit timestamp for the transaction equal or greater than each of the prepared timestamps 1230, and restrict the commit timestamp such that a second coordinator server sharing at least one of the participant servers for one or more other transactions at a shared shard cannot select the same commit timestamp for any of the other transactions 1240. The transaction is committed at the commit timestamp 1250.
SYSTEMS AND METHODS FOR MAINTAINING DATA OBJECTS TO MANAGE ASYNCHRONOUS WORKFLOWS
Systems and methods for maintaining data objects include receiving an event in a queue indicating a change to a data source; obtaining data corresponding to the event from the data source; determining that a monitored item condition defined in a workflow is satisfied based on the data corresponding to the event; generating a data object responsive to the monitored item condition being satisfied; identifying, using a mapping between fields and triggers generated based on the workflow, a trigger defined in the workflow that uses a first field of one or more fields; determining that the value of the first field satisfies a trigger condition of the trigger; and performing, responsive to determining that the value satisfies the trigger condition, an action corresponding to the trigger defined in the workflow.
APPARATUSES, SYSTEMS, AND METHODS FOR PROVIDING AN EVENT MANAGEMENT FRAMEWORK FOR A GEOGRAPHIC INFORMATION SYSTEM
Apparatuses, systems, and methods are provided for managing events in a Geographic Information System (GIS). A first event may be detected which is associated with a change made via a mapping interface of the GIS. Information associated with the first event may be cached in a memory of a computing device. A second event associated with committing of the change in a database of the GIS may be detected, and in response to detecting the second event, a new event that is a transformation of the first event stored in the memory, the second event or both may be generated.
COMPUTER-IMPLEMENTED METHOD FOR DATABASE MANAGEMENT, COMPUTER PROGRAM PRODUCT AND DATABASE SYSTEM
A computer-implemented method for database management is provided. The method comprises: receiving, from a client device, first data to be stored in a database system that comprises first data storage configured to store a data table and a deletion history table; storing the first data in second data storage that is external to the database system and that is in communication with the database system via a network; obtaining a link that enables access, via the network, to the first data stored in the second data storage; storing the link in the data table; and performing a deletion operation of the first data, in response to a request from the client device to delete the first data from the database system, wherein the deletion operation comprises: deleting the link from the data table without deleting the first data from the second data storage; and storing the link in the deletion history table with a timestamp corresponding to a point in time when the link is deleted from the data table.
ACCELERATING CHANGE DATA CAPTURE DETERMINATION USING ROW BITSETS
Techniques described herein can accelerate change data capture determinations such as stream reads, which show changes made to a table between two points in time. Three distinct row bitests that mark deleted, updated, inserted, rows in micro-partitions can be added as metadata for the table. These bitsets can be generated during DML operations and then stored as metadata of the new partition generated by the DML operations. The bitsets can then be used to generate streams showing the changes in the table between two points in time (changes interval).