Patent classifications
G06F16/2322
GRANULARLY TIMESTAMPED CONCURRENCY CONTROL FOR KEY-VALUE STORE
Systems and methods discussed herein, based on a key-value data store including multiple-tiered sorted data structures in memory and storage, implement granularly timestamped concurrency control. The multiple-tiering of the key-value data store enables resolving the snapshot queries by returning data record(s) according to granularly timestamped snapshot lookup instead of singularly indexed snapshot lookup. Queries return a merged collection of records including updates from data structures in memory and in storage, such that a persistent storage transaction may refer to non-committed updates up to a timeframe defined by the snapshot read timestamp. This way, inconsistency is avoided that would result from merely reading data records committed in storage, without regard as to pending, non-committed updates thereto. The global timestamp further modifies the generation of the local transaction commit timestamp and the local snapshot read timestamp, so as to establish a granularly timestamped concurrency control scheme (over three levels of granularity).
HIGH-PERFORMANCE KEY-VALUE STORE
A key-value store is provided, implementing multiple-tiered sorted data structures in memory and storage, including concurrent write buffers in memory, and page-level consolidation of updates on storage, where pages are trivially translated in physical-to-virtual address mapping. The key-value store is built on an indexed sorted data structure on storage, occupying much less storage space and incurring much less disk activity in consolidating updates than a conventional log-structured merge tree organized into files. Concurrent write buffers operate concurrently and independently so that data is committed from memory to storage in an efficient manner, while maintaining chronological sequence of delta pages. Trivial mapping allows mappings of a number of physical pages to be omitted, enabling page mapping tables to occupy less storage space, and simplifying processing workload of read operation retrievals from storage.
Cross-platform control profiling tool for autonomous vehicle control
Systems and methods are disclosed for collecting driving data from simulated autonomous driving vehicle (ADV) driving sessions and real-world ADV driving sessions. The driving data is processed to exclude manual (human) driving data and to exclude data corresponding to the ADV being stationary (not driving). Data can further be filtered based on driving direction: forward or reverse driving. Driving data records are time stamped. The driving data can be aligned according to the timestamp, then a standardized set of metrics is generated from the collected, filtered, and time-aligned data. The standardized set of metrics are used to grade the performance the control system of the ADV, and to generate an updated ADV controller, based on the standardized set of metrics.
PROJECT CREATION SYSTEM INTEGRATING PROOF OF ORIGINALITY
An embodiment comprises methods of managing and systems for processing media projects. The project processing system comprises a memory circuit and a hardware processor configured to execute computer-executable instructions. The hardware processor executes the computer-executable instructions to: receive a request from a first user to submit a first media project, determine that a first user is permitted to submit the first media project, create a first data block representing the requested submission of the first media project, the first data block including a time stamp, broadcast the first data block to a distributed network for validation, and append the first data block to a first dynamic structure based on the distributed network validating the submission. The hardware processor also further executes the computer-executable instructions to store a copy of the first dynamic structure as and generate an image indicating proof of originality associated with the first data block.
File system warnings application programing interface (API)
The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to user accounts for all members of the organization to all content items in the organization directory on the respective file systems of the members' client devices. Members can reach any content item at the same path as other members relative to the organization directory root on their respective client device. In some embodiments novel access permissions are granted to maintain path consistency.
Determining object geolocations based on heterogeneous data sources
An example method of determining geolocations of objects based on information retrieved from heterogeneous data sources comprises: receiving, from a first data source associated with an object by an ontology-defined relationship, a first dataset including a first data item specifying a first time identifier and a first geolocation associated with the object; receiving, from a second data source associated with an object by an ontology-defined relationship, a second dataset including a second data item specifying a second time identifier and a second geolocation associated with the object; and determining, by applying a rule set associated with the ontology to the first dataset and the second dataset, a geolocation of the object and a corresponding time identifier.
System and methods for creating, distributing, analyzing and optimizing data-driven signals
Provided for herein may be a system for optimizing data-driven signals, comprising a database subsystem configured to retrieve rich time-series data, a signal scheduler subsystem configured to trigger a signal generator subsystem time interval, a data aggregator subsystem configured to retrieve and process data from the database subsystem, a signal generator subsystem configured to create a data-driven signal from data aggregated by the data aggregated subsystem, a signal sender subsystem configured to send object data, a data downloader subsystem; and a data analyzer subsystem configured to analyze and provide analysis on data in the database subsystem.
Tagging application resources for snapshot capability-aware discovery
Tagging application resources for snapshot capability-aware discovery is described. If an application's host determines that one of an application's resource satisfies any snapshot capability rule, the application's host associates the application resource with a snapshot capable tag. The application's host outputs an identifier of the application resource and any associated snapshot capable tag to a backup server. The application's host inputs a request from the backup server to create a snapshot of the application resource associated with the snapshot capable tag and creates the snapshot of the application resource associated with the snapshot capable tag.
Secure data replication in distributed data storage environments
A described method includes receiving, by a database system, an instruction to change a first data element in a table in a database, which includes a first copy and a second copy of the table. A first entry is created in a first change-table. The first entry includes an updated value for a first data element. A second entry is created in a second change-table. Creating the second entry includes, changing the updated value into a ciphertext if the first data element is secured, and storing the ciphertext into the second entry. If the first data element is non-secured, the updated value is stored into the second entry as is. The second copy of the table is modified using the second change-table. The second copy of the table is used to respond to subsequent queries.
SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.