Patent classifications
G06F11/0718
PERSISTENT METAFILE USED TO CACHE SLOT HEADER METADATA FOR IMPROVED READ PERFORMANCE OF OBJECTS WITHIN AN OBJECT STORE
Techniques are provided for implementing a unified object format. The unified object format is used to format data in a performance tier (e.g., infrequently accessed data, snapshot data, etc.) into objects that are stored into an object store for low cost, scalable, long term storage compared to storage of the performance tier. With the unified object format, compression of the data may be retained when the data is stored as the objects into the object store. Additional compression may also be provided for the data in the objects. The unified object format includes slot header metadata used to track the location of the data within the object notwithstanding the data being compressed and/or stored at non-fixed boundaries. The slot header metadata may be cached at the performance tier for improved read performance and may be repaired by a repair subsystem (a slot header repair subsystem).
UNIFIED OBJECT FORMAT FOR RETAINING COMPRESSION AND PERFORMING ADDITIONAL COMPRESSION FOR REDUCED STORAGE CONSUMPTION IN AN OBJECT STORE
Techniques are provided for implementing a unified object format. The unified object format is used to format data in a performance tier (e.g., infrequently accessed data, snapshot data, etc.) into objects that are stored into an object store for low cost, scalable, long term storage compared to storage of the performance tier. With the unified object format, compression of the data may be retained when the data is stored as the objects into the object store. Additional compression may also be provided for the data in the objects. The unified object format includes slot header metadata used to track the location of the data within the object notwithstanding the data being compressed and/or stored at non-fixed boundaries. The slot header metadata may be cached at the performance tier for improved read performance and may be repaired by a repair subsystem (a slot header repair subsystem).
Distinguished nest-based access control
Techniques for determining and displaying error messages including a cause of an error generated because two types are not members of the same nest are disclosed. The system detects, at runtime, an instruction in a first type that attempts to access a private member of a second type. The system evaluates one or more nestmate criteria to determine whether the first type and the second type are within a same nest. A nest host corresponding to the nest specifies each nest member of the nest, and each nest member specifies an association with the nest. Responsive to determining that a particular nestmate criterion is not met, the system determines that the first type and the second type are not within the same nest and records or displays data identifying the particular nestmate criterion that has not been met, and throws an access error.
Signal pathways in multi-tile processors
Embodiments herein may present a multi-tile processor including a plurality of processor tiles, and a plurality of interconnects selectively coupling the plurality of processor tiles to each other. A first processor tile may include a memory to store a bulletin board to hold a message, an execution unit, and an encapsulated software module. The encapsulated software module may select a second processor tile coupled with the first processor tile by an interconnect to be a part of a signal pathway. The second processor tile may be selected based on a selection criterion of the signal pathway and the message held in the bulletin board. The encapsulated software module may post and read a message at the bulletin board stored in the memory, or read a message from a bulletin board stored in a memory of the second processor tile. Other embodiments may be described and/or claimed.
DISTINGUISHED NEST-BASED ACCESS CONTROL
Techniques for determining and displaying error messages including a cause of an error generated because two types are not members of the same nest are disclosed. The system detects, at runtime, an instruction in a first type that attempts to access a private member of a second type. The system evaluates one or more nestmate criteria to determine whether the first type and the second type are within a same nest. A nest host corresponding to the nest specifies each nest member of the nest, and each nest member specifies an association with the nest. Responsive to determining that a particular nestmate criterion is not met, the system determines that the first type and the second type are not within the same nest and records or displays data identifying the particular nestmate criterion that has not been met, and throws an access error.
Computer architecture for performing error detection and correction in a correlithm object processing system
A correlithm object processing system includes a reference table that stores a plurality of correlithm objects, and a first node communicatively coupled to a second node by a communication channel. The first node is configured to receive a particular one of the plurality of correlithm objects from the second node over the communication channel. The first node determines distances between the received correlithm object and each of the plurality of correlithm objects stored in the reference table. The first node further identifies one of the plurality of correlithm objects from the reference table with the shortest distance, and outputs the identified correlithm object.
RECORDING MEDIUM, FAILURE CAUSE IDENTIFYING APPARATUS, AND FAILURE CAUSE IDENTIFYING METHOD
A non-transitory computer-readable storage medium storing a program that causes a computer to execute a process, the process includes extracting a first node related to a node indicating abnormality included in a plurality of nodes; identifying a first objective variable and a first explanatory variable of the first objective variable, the first objective variable being each of combinations of operation data of the first node and the first node; extracting, in a detection process performed by using the first explanatory variable, a second objective variable and a second explanatory variable of the second objective variable, the second objective variable being each of combinations of the operation data and the node indicating abnormality; determining a number of objective variables common to the second explanatory variable; and setting a priority order for locations of a cause of a failure, based on the number of objective variables.
FALLBACK COMMAND IN A MODULAR CONTROL SYSTEM
A device may include a memory storing instructions and a processor configured to execute the instructions to receive an instruction from an administration device; identify a link selector in the instruction that corresponds to a resource attribute of a first resource that specifies how a second resource is to be controlled by the first resource; query a database of contracts between resources to determine that the second resource is available to be controlled by the first resource, based on resource contracts associated with the second resource. The processor may be further configured to generate a resource contract between the first resource and the second resource that indicates the second resource is controlled by the first resource and enable the first resource to communicate with the second resource in accordance with the generated resource contract.
Automatically reconfiguring a performance test environment
Described herein is a system for automatically reconfiguring a test environment. As described above, performance testing can be a time-consuming and error-prone resulting in the use of unnecessary computational resources. The system may use machine-learning to determine whether the test environment, test data, and/or test script is to be reconfigured to optimize the performance test. The system may iteratively reconfigure the test environment, test data, and/or test script, and re-execute the performance test, until an optimal performance test of an application is executed based on a specified performance requirement.
Binary large object platform for interactively analyzing and editing structural metadata
Embodiments include methods, systems and computer program products method for editing and correcting structural metadata associated a binary large object (BLOB). The computer-implemented method includes obtaining, using a processor, at least a portion of structural metadata associated with the BLOB. The processor converts one or more fields associated with the at least a portion of structural metadata and determines that the one or more fields generated one or more errors or null values. The processor provides an interface, wherein the interface is used to cause a first movement or edit the one or more fields. The processor determines that the first movement or edit of the one or more fields fixes the one or more errors or null values and provides an indication that the first movement or edit of the one or more fields has or has not fixed the one or more errors or null values.