Topology aware distributed storage system

    公开(公告)号:US10019452B2

    公开(公告)日:2018-07-10

    申请号:US15159480

    申请日:2016-05-19

    Applicant: MORGAN STANLEY

    Inventor: Glenn M. Judd

    CPC classification number: G06F16/137

    Abstract: A topology aware distributed storage system includes a plurality of storage nodes, at least one client node, and a storage manager and metadata store. A user-defined storage policy specifies where data is stored within a topological hierarchy of nodes within the network. A hierarchical ring topology including a hierarchical structure of rings representing an organizational structure of nodes is computed and flattened into a single global ring divided into segments corresponding to a unique range of integers and associated with a replica set responsible for storing a key corresponding to one of the integers. A hash function is performed on a user key received from the client node, and the hashed key is looked up on the flattened global ring stored on each storage node to identify the replica set responsible for storing data corresponding to the hashed key.

    METHOD AND SYSTEM FOR IMPLEMENTING REVERSE DIRECTORY LOOKUP USING HASHED FILE METADATA

    公开(公告)号:US20180032540A1

    公开(公告)日:2018-02-01

    申请号:US15221887

    申请日:2016-07-28

    CPC classification number: G06F16/152 G06F16/137

    Abstract: A method and a system for implementing a reverse directory lookup using hash table, the method comprising: calculating using a hash function, a hash value of file name, upon creating a new file in a file system; writing the calculated hash value to the metadata of the file; reading the hash value at a meta data of a file of a desirable identifier (ID), responsive to an inquiry of a file name associated with the desirable ID; and searching for a corresponding file name for the desirable ID at a bucket storing all files associated with this bucket according to their filename's hash values, based on a hash function.

    SOURCE CODE TRANSFER CONTROL METHOD, COMPUTER PROGRAM THEREFOR, AND RECORDING MEDIUM THEREFOR

    公开(公告)号:US20180018165A1

    公开(公告)日:2018-01-18

    申请号:US15541591

    申请日:2016-01-05

    CPC classification number: G06F8/71 G06F8/75 G06F16/137

    Abstract: Disclosed is a source code transfer control method, a computer program therefor, and a recording medium therefor. The source code transfer control method is a method executed in a configuration management system interworking with a static analyzer server. The method includes: (a) receiving a source code transfer request; (b) transmitting file identification information on a source code that is requested for transfer, to a static analyzer server; (c) receiving a return value from the static analyzer server on the basis of the file identification information, the return value being produced from an analysis result associated with the transfer-requested source code and loaded on the static analyzer server, the return value being a value produced for each check item that is preset for transfer control; and (d) providing information on whether the transfer-requested source code can be normally transferred on the basis of the return value.

    DATABASE WORKLOAD CAPTURE AND REPLAY
    54.
    发明申请

    公开(公告)号:US20170322972A1

    公开(公告)日:2017-11-09

    申请号:US15150075

    申请日:2016-05-09

    Applicant: SAP SE

    Abstract: Technologies are described for facilitating data workload capture, workload replay, and comparing the performance of a plurality of database systems. A plurality of requests for database operations are received from one or more database clients. The requests for database operations are executed. For the plurality of requests for database operations, execution context information is generated for a plurality of execution contexts. For the plurality of requests for database operations, a plurality of performance measures are generated. The execution context information and the performance measures are stored in a workload capture store, such as a file. The workload capture file is useable to replay the captured workload at a second database system using at least a portion of the execution context information and at least a portion of the performance measures.

    DATA FINGERPRINT STRENGTHENING
    58.
    发明申请
    DATA FINGERPRINT STRENGTHENING 审中-公开
    数据指纹加强

    公开(公告)号:US20160350301A1

    公开(公告)日:2016-12-01

    申请号:US14722914

    申请日:2015-05-27

    Abstract: Techniques and mechanisms described herein facilitate the strengthening of a data fingerprint. According to various embodiments, a data stream may be parsed into a plurality of data chunks. A hash function may be applied to each of the data chunks to determine a respective data chunk hash value. A respective data chunk fingerprint for each of the plurality of data chunks may be transmitted to a remote server. Each data chunk fingerprint may include the respective data chunk hash value and one or more respective intermediate hash values.

    Abstract translation: 这里描述的技术和机制有助于加强数据指纹。 根据各种实施例,数据流可以被解析成多个数据块。 散列函数可以应用于每个数据块以确定相应的数据块哈希值。 可以将多个数据块中的每一个的相应数据块指纹发送到远程服务器。 每个数据块指纹可以包括相应的数据块哈希值和一个或多个相应的中间散列值。

    METHOD AND APPARATUS FOR DATA STORAGE AND RETRIEVAL
    60.
    发明申请
    METHOD AND APPARATUS FOR DATA STORAGE AND RETRIEVAL 审中-公开
    数据存储和检索的方法和装置

    公开(公告)号:US20160253322A1

    公开(公告)日:2016-09-01

    申请号:US15028554

    申请日:2013-10-18

    Inventor: Qingsong Li

    CPC classification number: G06F16/2255 G06F12/0864 G06F16/137

    Abstract: Methods and apparatuses for data storage and retrieval have been provided. More specifically, a hash table is provided. The hash table comprises a first level slot array with a constant number of slots and at least one second level slot array with a variant number of slots. Each slot of the first level slot array is associated with a hash code range, and each slot of the first level slot array is linked to at most one second level slot array. Various operations, such as PUT, GET, RANGE_SEARCH of the hash table have been described. Moreover, a hash method has been provided for network management information to use the proposed hash table.

    Abstract translation: 已经提供了用于数据存储和检索的方法和装置。 更具体地,提供了散列表。 哈希表包括具有恒定数量的时隙的第一级时隙阵列和具有不同数目的时隙的至少一个第二级时隙阵列。 第一级时隙阵列的每个时隙与散列码范围相关联,并且第一级时隙阵列的每个时隙被链接到至多一个第二级时隙阵列。 已经描述了各种操作,例如散列表的PUT,GET,RANGE_SEARCH。 此外,已经提供了一种用于网络管理信息以使用所提出的散列表的哈希方法。

Patent Agency Ranking