Patent classifications
G06F16/1774
PREVENTING DUPLICATION OF FILES IN A STORAGE DEVICE
Duplication of files in a storage device of a computing device can be avoided using some techniques described herein. In one example, a system can determine a checksum of a file in a software package. The system can then determine that the file is absent from a storage device by issuing a command for accessing the file based on the checksum. In response to determining that the file is absent from the storage device, the system can download a copy of the file from a remote computing device to the storage device over a network.
Partition level operation with concurrent activities
Techniques of implementing partition level operations with concurrent activities are disclosed. A first operation can be performed on a first partition of a table of data. The first partition can be one of a plurality of partitions of the table, where each partition has a plurality of rows. A first partition level lock can be applied to the first partition for a period in which the first operation is being performed on the first partition, thereby preventing any operation other than the first operation from being performed on the first partition during the period the first partition level lock is being applied to the first partition. A second operation can be performed on a second partition of the table at a point in time during which the first operation is being performed on the first partition.
AVOIDING DATA INCONSISTENCY IN A FILE SYSTEM USING 2-LEVEL SYNCHRONIZATION
A method of synchronously executing input/output operations (IOs) for a plurality of applications using a storage device with a file system includes the steps of: receiving a first write IO including an instruction to write first data at a first address of the file system; determining that, within a first range of the file system comprising the first address, there are no pending unmap IOs for deallocating storage space of the storage device from files of the plurality of applications; after determining that there are no pending unmap IOs within the first range, locking the first range to prevent incoming unmap IOs from deallocating storage space within the first range from the files of the plurality of applications; after locking the first range, writing the first data to the storage device at the first address; and after writing the first data, unlocking the first range.
Methods and systems for managing prioritized database transactions
A database management system for controlling prioritized transactions, comprising: a processor adapted to: receive from a client module a request to write into a database item as part of a high-priority transaction; check a lock status and an injection status of the database item; when the lock status of the database item includes a lock owned by a low-priority transaction and the injection status is not-injected status: change the injection status of the database item to injected status; copy current content of the database item to an undo buffer of the low-priority transaction; and write into a storage engine of the database item.
Lock management associated with a key-value database system
A first data structure lock to access a first data structure of a first set of data structures to perform an operation associated with a transaction is acquired. The operation associated with the transaction is executed, wherein the operation is one of inserting the transaction into the first data structure or removing the transaction from the first data structure. An oldest active transaction of the first data structure is identified. A globally oldest active transaction of the set of the data structures in view of the oldest active transaction is determined. A second set of data structures is accessed, the second set of data structures including information associated with completed transactions to identify a set of data locks associated with completed transactions each having a transaction completion identifier that satisfies a condition when compared to a transaction start identifier associated with the globally oldest active transaction. The set of data locks are released.
Network node management on a blockchain
An example operation may include one or more of identifying application instances in a cluster group, receiving a request to perform a consensus decision regarding ownership of the cluster group via peer nodes of a blockchain, identifying individual consensus decision votes from the peer nodes, and performing the consensus decision based on the individual consensus decision votes.
Data storage methods and systems
Data storage methods and systems for use with multiple cloud storage systems. The methods and systems use passive metadata files which are stored on cloud storage systems to eliminate the risk of a data conflict when data is being written to the multi-cloud storage system. The methods and systems enable a multi-cloud storage system to function safely without data corruption or loss due to potential conflicts. The methods and systems achieve this without the need for a central control server and without the need for the cloud storage systems or the clients to communicate with one another.
Data mesh parallel file system replication
Embodiments relate to providing a multi-cloud, multi-region, parallel file system cluster service with replication between file system storage nodes. In some embodiments, a first file system storage node of a file system storage cluster receives a request from a client device to write data to a first file system stored on the first file system storage node. In response to the request to write the data to the first file system, a plurality of servers of the first file system storage node writes, in parallel, the data to the first file system and sends instructions to a second file system storage node of the file system storage cluster for writing the data to a second file system stored on the second file system storage node.
DISPLAY MOUNT INTERFACESMANAGING ACCESS TO FILE-BASED DATABASE
According to aspects of the present disclosure, there are provided methods and computer program product for accessing a file-based database, the method comprising receiving, at a first process of a multi-process application, a request from a second process of the multi-process application to perform an operation on a file-based database; in response to receiving the request at the first process, beginning execution of a database access thread to perform the requested operation on the file-based database, and providing, by the first process, a result of the requested operation to the second process, and wherein if the requested operation is a write access to the file-based database, limiting to one a number of threads executing to perform operations on the file-based database while the database access thread to perform the write access is executing.
Method and system for generating immutable backups with configurable retention spans
In general, the invention relates to a method for performing backup operations. The method includes generating a backup on backup storage system, locking the backup for a retention span, generating a backup archive log image using archive log files for the backup, and locking the backup archive log image for a second retention span.