Patent classifications
G06F11/0757
Database recovery time objective optimization with synthetic snapshots
Methods and systems for reducing the amount of time to restore a database or other application by dynamically generating and storing synthetic snapshots are described. When backing up a database, an integrated data management and storage system may acquire snapshots of the database at a snapshot frequency and acquire database transaction logs at a frequency that is greater than the snapshot frequency. In response to detecting that the database is unable to provide a database snapshot, the integrated data management and storage system may generate a synthetic snapshot of the database by instantiating a compatible version of the database locally, acquiring a previously stored snapshot of the database, applying data changes from one or more database transaction logs to the previously stored snapshot to generate the synthetic snapshot, and storing the synthetic snapshot of the database within the integrated data management and storage system.
Transaction exchange platform with watchdog microservice
Aspects described herein may relate to a transaction exchange platform using a streaming data platform (SDP) and microservices to process transactions according to review and approval workflows. The transaction exchange platform may receive transactions from origination sources, which may be added to the SDP as transaction objects. Microservices on the transaction exchange platform may interact with the transaction objects based on configured workflows associated with the transactions. Processing on the transaction exchange platform may facilitate clearing and settlement of transactions. Some aspects may provide for dynamic and flexible reconfiguration of workflows and/or microservices. Other aspects may provide for data snapshots and workflow tracking, allowing for monitoring, quality control, and auditability of transactions on the transaction exchange platform.
Using a track format code in a cache control block for a track in a cache to process read and write requests to the track in the cache
Provided are a computer program product, system, and method for using a track format code in a cache control block for a track in a cache to process read and write requests to the track in the cache. A track format table associates track format codes with track format metadata. A determination is made as to whether the track format table has track format metadata matching track format metadata of a track staged into the cache. A determination is made as to whether a track format code from the track format table for the track format metadata in the track format table matches the track format metadata of the track staged. A cache control block for the track being added to the cache is generated including the determined track format code when the track format table has the matching track format metadata.
Regression-based calibration and scanning of data units
Read operations can be performed to read data stored at a data block. Parameters reflective of a separation between a pair of programming distributions associated with the data block can be determined based on the plurality of read operations. A read request to read the data stored at the data block can be received. In response to receiving the read request, a read operation can be performed to read the data stored at the data block based on the parameters that are reflective of the separation between the pair of programming distributions associated with the data block.
Machine learning-based techniques for providing focus to problematic compute resources represented via a dependency graph
Methods, systems, apparatuses, and computer-readable storage mediums are described for machine learning-based techniques for reducing the visual complexity of a dependency graph that is representative of an application or service. For example, the dependency graph is generated that comprises a plurality of nodes and edges. Each node represents a compute resource (e.g., a microservice) of the application or service. Each edge represents a dependency between nodes coupled thereto. A machine learning-based classification model analyzes each of the nodes to determine a likelihood that each of the nodes is a problematic compute resource. For instance, the classification model may output a score indicative of the likelihood that a particular compute resource is problematic. The nodes and/or edges having a score that exceed a predetermined threshold are provided focus via the dependency graph.
Access consistency in high-availability databases
Techniques are disclosed relating to maintaining a high availability (HA) database. In some embodiments, a computer system receives, from a plurality of host computers, a plurality of requests to access data stored in a database implemented using a plurality of clusters. In some embodiments, the computer system responds to the plurality of requests by accessing data stored in an active cluster. The computer system may then determine, based on the responding, health information for ones of the plurality of clusters, wherein the health information is generated based on real-time traffic for the database. In some embodiments, the computer system determines, based on the health information, whether to switch from accessing the active cluster to accessing a backup cluster. In some embodiments, the computer system stores, in respective clusters of the database, a changeover decision generated based on the determining.
Method, electronic device, and computer product for storage management
Techniques for storage management involve: obtaining information indicating an error of a storage device of a data storage system; if the number of occurrences of the error within a predetermined time period exceeds a predetermined threshold, stopping obtaining the information indicating the error; and generating an event indicating whether the number of occurrences of the error within the predetermined time period exceeds the predetermined threshold for further diagnosis of the error. As a result, errors from the storage device can be automatically managed, which helps to improve the data storage system's capacity to handle different types of errors of the storage device.
System and method for contact center fault diagnostics
A system and methods for contact center fault diagnostics, comprising a diagnostic engine and test cases used for testing components and services in a contact center, designed to operate on a contact center with a specified test campaign, allowing a contact center's various services and systems to be tested either internally or externally in an automated fashion with specified testcases being used to specify the format and expectations of a specific test, with reports of failures and points of failure being made available to system administrators.
Traffic management architecture
A cable distribution system includes a head end connected to a plurality of customer devices through a transmission network that provides data suitable for the plurality of customer devices. A traffic monitoring system receives from a customer support device a first data request for a parameter of one of the plurality of customer devices. The traffic monitoring system provides a second data request for the parameter of the one of said plurality of customer devices to a customer premise equipment management system in response to receiving the first data request. The traffic monitoring system receiving a first data response including the parameter from the customer premise equipment management system in response to providing the second data request to the customer premise equipment management system. The traffic monitoring system providing a second data response including the parameter from the traffic management system to the customer support device in response to receiving the first data response.
Serverless Application Function Execution
Executing serverless application functions is provided. A response to a user request for a service is received with an include callback parameter and a transaction identifier of the user request included in a header of the response from an external service via a network. A checkpoint of a container corresponding to the service is retrieved from a data store using the transaction identifier of the user request. The container corresponding to the service is restored using the checkpoint to process the response received from the external service.