Patent classifications
G06F3/0643
SELECTIVELY SHEARING DATA WHEN MANIPULATING DATA DURING RECORD PROCESSING
A computer-implemented method, according to one embodiment, includes: storing records in an input data buffer, where each of the records include a key which is appended to payload data in the respective record. Moreover, for each of the records: shearing the key associated with the record from the payload data, normalizing the sheared key, and storing the normalized sheared key in a first target area of memory. A determination is made as to whether a size of the payload data in the record is outside a predetermine range, and in response to determining that the size of the payload data in the record is outside the predetermine range, the payload data is stored in a second target area of memory. A data locator is also appended to the normalized sheared key in the first target area of memory to form a sheared record.
METHOD OF STORING DATA AND METHOD OF READING DATA
A method of storing data, a method of reading data, a device, and a storage medium are provided, which relate to a field of artificial intelligence, in particular to the fields of cloud computing technology and distributed storage technology. A specific implementation scheme includes: storing at least one target data into a target file in a storage class memory device; recording a storage address of the at least one target data in the storage class memory device in a dynamic random access memory as a first index data; and synchronously storing the first index data into the storage class memory device as a second index data.
Data storage layouts
A composite layout to store one or more extents of a data object in a first storage system and one or more extents of the data object in a second, different storage system. The first storage system may be configured for the efficient storage of small chunks of data such as, e.g., chunks of data small than the addressable block size of the storage devices used by the storage systems.
Apparatus for securing storage space and method thereof
The electronic device includes a display, a memory, and a processor operatively coupled to the display and the memory. The processor is configured to identify a residual level of a storage space of the memory, in response to the residual level of the storage space of the memory being less than a predefined threshold value, control the display to display a file converting scheme list including a plurality of file converting schemes, select one file converting scheme among the plurality of file converting schemes, based on a received input, and perform file converting, based on the selected file converting scheme.
Object storage system with control entity quota usage mapping
Example object storage systems, bookkeeping engines, and methods provide quota usage monitoring for control entities, such as accounts, users, and buckets. An object data store is configured to enable control entities to access data objects associated with each control entity. Data objects are mapped to the control entities and the data objects are processed to identify object usage values corresponding to each combination of data object and control entity. Total usage values are calculated for each control entity and used to determine a data object access response for a target data object and associated control entities.
Systems and methods of providing fault-tolerant file access
Technologies are provided to ensure integrity of erasure coded data that is subject to read and write access from distributed processes. Multiple processes that access erasure coded data can be coordinated in an efficient, scalable and fault-tolerant manner so that integrity of the original data is maintained. The Technologies include a fault-tolerant access coordination protocol that ensures exclusive write access by a client. The coordination protocol achieves scalability by not relying on centralized components, and achieves efficiency and performance by piggy-packing access coordination messages on operations of the underlying erasure coding protocol.
DATA ACCESS METHOD AND APPARATUS
A data access method performed by a processing device is disclosed. The processing device manages a storage device based on a log-structured file system (LFS), where the processing device writes a target file to the storage device based on an out place update (OPU) mechanism; and the processing device writes file attribute information corresponding to the target file in the storage device to out of band (OOB) data of the storage device, to restore, after abnormal power-off, access to the target file by using the file attribute information stored in the OOB data. In this way, when writing the target file to the storage device, the processing device may write a file attribute corresponding to the target file to the OOB data, so that after abnormal power-off, access to the target file may be restored by using the file attribute information.
Multiple data labels within a backup system
Embodiments for a method performing data migration such as backups and restores in a network by identifying characteristics of data in a data saveset to separate the data into defined types based on respective characteristics, assigning a data label to each defined type by receiving user selection or automatically merging or selecting a priority label, from among many labels associated with a file, defining migration rules for each data label, discovering assigned labels during a migration operation; and applying respective migration rules to labeled data in the data saveset. The migration rules can dictate storage location, access rights, replication periods, retention periods, and similar parameters.
METHOD OF MOVING FILES IN HIERARCHICAL STORAGE SYSTEM
A method for moving files in a hierarchical storage system having a primary storage and a secondary storage including a sequential storage device from the primary storage to the secondary storage includes obtaining a predetermined file size to be written to the secondary storage, extracting, from a plurality of files in the primary storage, a file not stored in the secondary storage and having the oldest last access time, estimating a file size of the file having the oldest last access time on the secondary storage if the file having the oldest last access time is written to the secondary storage, and selecting the file having the oldest last access time as a file to be moved to the secondary storage as long as the estimated file size does not exceed the predetermined file size to be written to the secondary storage.
IMAGE FILE DISTRIBUTION APPARATUS, IMAGE FILE RECOVERY APPARATUS, IMAGE FILE DISTRIBUTION METHOD, IMAGE FILE RECOVERY METHOD, IMAGE FILE DISTRIBUTION PROGRAM, IMAGE FILE RECOVERY PROGRAM, AND RECORDING MEDIUM STORING PROGRAM
Provided are an image file distribution apparatus, an image file recovery apparatus, an image file distribution method, an image file recovery method, an image file distribution program, an image file recovery program, and a recording medium storing the program which can prevent a relatively large increase in the amount of data of an image file even when an (k, n) secret sharing scheme with high security is used. For example, distributed tag information is obtained from tag information of the image file by a (k, n)-threshold secret sharing scheme. For example, distributed image data is obtained from image data by a (k, L, n)-threshold ramp secret sharing scheme. For example, the distributed tag information and the distributed image data are combined to obtain combined data. Since the amount of data in the tag information is small, the use of the (k, n) secret sharing scheme does not cause a large increase in the amount of data. Since the (k, L, n)-threshold ramp secret sharing scheme does not cause a large increase in the amount of data, an increase in the total amount of data in the image data is relatively small.