G06F11/2048

Encryption for a distributed filesystem

A computing device comprising a frontend and a backend is operably coupled to a plurality of storage devices. The backend comprises a plurality of buckets. Each bucket is operable to build a failure-protected stipe that spans two or more of the plurality of the storage devices. The frontend is operable to encrypt data as it enters the plurality of storage devices and decrypt data as it leaves the plurality of storage devices.

High availability for a relational database management system as a service in a cloud platform

A Relational Database Management System (“RDBMS”) as a service cluster may including a master RDBMS Virtual Machine (“VM”) node associated with an Internet Protocol (“IP”) address and a standby RDBMS VM node associated with an IP address. The RDBMS as a service (e.g., PostgreSQL as a service) may also include n controller VM nodes each associated with an IP address. An internal load balancer may receive requests from cloud applications and include a frontend IP address different than the RDBMS IP as a service addresses and a backend pool including indications of the master RDBMS VM node and the standby RDBMS VM node. A Hyper-Text Transfer Protocol (“HTTP”) custom probe may transmit requests for the health of the master RDBMS VM node and the standby RDBMS VM node via the associated IP addresses, and responses to the requests may be used in connection with a failover operation.

Managing replication of computing nodes for provided computer networks

Techniques are described for providing managed computer networks, such as for managed virtual computer networks overlaid on one or more other underlying computer networks. In some situations, the techniques include facilitating replication of a primary computing node that is actively participating in a managed computer network, such as by maintaining one or more other computing nodes in the managed computer network as replicas, and using such replica computing nodes in various manners. For example, a particular managed virtual computer network may span multiple broadcast domains of an underlying computer network, and a particular primary computing node and a corresponding remote replica computing node of the managed virtual computer network may be implemented in distinct broadcast domains of the underlying computer network, with the replica computing node being used to transparently replace the primary computing node in the virtual computer network if the primary computing node becomes unavailable.

Electronic apparatus and boot method thereof
11586504 · 2023-02-21 · ·

An electronic apparatus and a boot method thereof are provided. The electronic apparatus includes a first controller, a basic input output system (BIOS), and a second controller. The first controller is configured to receive a boot code and provides the boot code to the electronic apparatus for performing a boot operation. The BIOS is configured to provide the boot code. The second controller has at least one communication interface. The at least one communication interface is configured to be connected to at least one external apparatus. The at least one external apparatus provides a backup boot code to the second controller. When the boot operation performed by the electronic apparatus according to the boot code provided by the BIOS fails, the second controller replaces the first controller to receive the backup boot code and provides the backup boot code to enable the electronic apparatus to perform the boot operation.

NETWORK VIRTUALIZATION POLICY MANAGEMENT SYSTEM

Concepts and technologies are disclosed herein for providing a network virtualization policy management system. An event relating to a service can be detected. A first policy that defines allocation of hardware resources to host the virtual network functions can be obtained, as can a second policy that defines deployment of the virtual network functions to the hardware resources. The hardware resources can be allocated based upon the first policy and the virtual network functions can be deployed to the hardware resources based upon the second policy.

Adaptive query routing in a replicated database environment

Technologies are described providing adaptive query routing in a replicated database environment. The technologies can be used with a variety of replication protocols. Prepared statements, such as for queries, from a database client can be routed to a source node, or a source node and available replica nodes, when a replica node becomes unavailable. When a replica node becomes available again, a prepared statement can be updated to indicate that the updated prepared statement can be executed at nodes including the replica node that is available again. Prepared statement routing can also be used when a portion of replicated data becomes unavailable at a replica node, but a portion of replicated data remains available.

ENCRYPTION FOR A DISTRIBUTED FILESYSTEM

A computing device comprising a frontend and a backend is operably coupled to a plurality of storage devices. The backend comprises a plurality of buckets. Each bucket is operable to build a failure-protected stripe that spans two or more of the plurality of the storage devices. The frontend is operable to encrypt data as it enters the plurality of storage devices and decrypt data as it leaves the plurality of storage devices.

DATA PROCESSING METHOD FOR DISTRIBUTED STORAGE SYSTEM, APPARATUS, AND ELECTRONIC DEVICE
20230033754 · 2023-02-02 ·

Provided are a data management method for a distributed storage system, an apparatus, and an electronic device. The method comprises: sending to each storage server a first request for acquiring data copy information; and according to the data copy information returned by each storage server in response to the first request, updating mapping data used to reflect the correspondence between the data copy information and the storage servers.

Dynamically allocating streams during restoration of data

The systems and methods described herein dynamically allocate streams when restoring data from databases. In some embodiments, the system and methods restore data from a database by determining a number of streams to allocate to the database for restoring files of data from the database. The determined number of streams may be based on a total amount of data within the database, and/or may be based, at least in part, on the previous number of streams used during backup operations, in order to balance the benefit of allocating streams to a restoration of data with any detriments associated with changing the number of streams from the number used during previous backup operations.

LOCKSTEP PROCESSOR RECOVERY FOR VEHICLE APPLICATIONS
20230092343 · 2023-03-23 · ·

A fault tolerant processing environment wherein multiple processors are configured as worker nodes and redundant nodes, with a failed worker node replaced programmatically by a manager node. Each of the processing nodes may include a processor and memory associated with the processor and communicate with other processing nodes using a network. A manager node creates a message passing interface (MPI) communication group having worker nodes and redundant nodes, instructs the worker nodes to perform lockstep processing of tasks for an application, and monitors execution of the tasks. If a node fails, the manager node creates a replacement worker node from one of the redundant processing nodes and creates a new communications group. It then instructs those nodes in the new communications group to resume processing based on the application state and checkpoint backup data.