摘要:
Fault-recovery information for transactional operations between computer systems and the outcome of those operations is logged at the originating point of the units of work, such as source-computer systems, which may include client computers in a client/server system. By using these distributed logs of fault-recovery information, a target-computer system, which may include a server computer, can reconstruct the target-computer system's previous interaction with various source-computer systems. Source-computer systems may use a proxy server for logging fault-recovery information to persistent storage. A target-computer system may digitally sign the fault-recovery information it sends to a source-computer system thereby making the fault-recovery information's authenticity verifiable. Similarly, the target-computer system may encrypt the fault-recovery information before sending it to the source-computer system to preserve the privacy of the fault-recovery information.
摘要:
A storage management system in which a volume provider incorporates an application programming interface (API) for receiving storage access information that characterizes high-level input/output (I/O) attributes of the storage volume such as intended access patterns, a desired level of fault handling and optimization preferences. The volume provider and the underlying storage devices conform to the specified attributes as best as possible and resolve any conflicts with the communicated attributes. The volume providers monitor the storage volumes and may reconfigure the storage volumes in order to accomplish the desired attributes.
摘要:
A mount manager and supporting data structures enable automatic identification and re-establishment of logical volumes on non-removable storage devices in a computer system across multiple reboots and reconfigurations. The mount manager generates a redirected name for a new logical volume when a unique volume identifier is presented to the mount manager by the operating system. The mount manager stores the unique volume identifier and the associated redirected name in a persistent mount manager data structure The mount manager establishes a symbolic link between the persistent redirected name, which is used by higher layers of the operating system and user applications to address the logical volume, and a non-persistent device name used by the operating system. During the boot process, the mount manager uses the data structure entries identified by the unique volume identifiers of the arriving logical volumes to reconstruct the symbolic links so that references to the redirected name will resolve to the correct non-persistent device name. When the system undergoes physical reconfiguration, the mount manager associates an existing redirected name to a different non-persistent device name if the unique volume identifier is present in the data structure. In this fashion, logical volumes can be removed and restored in the computer without the knowledge of higher layers of the operating system and user applications. Optionally, the mount manager builds an in-memory data structure from the persistent data structure to increase the speed of the identification process.
摘要:
The present invention is directed to systems and methods for hierarchical storage management. A system manager specifies policies used to migrate and recall data from between the local and a remote storage while the system itself is afforded latitude in complying or violating these policies. As a violation of the migration policy, the system of the present invention pre-migrates data from local storage to remote storage prior to the time that a given file will become eligible for migration thereto. During pre-migration, data resides in both local and remote storage. Once the time for migration has arrived, local storage space may be freed bv simply deleting the data stored locally and retaining the data stored remotely. As part of the recall policy, data is delayed from returning to local storage from the remote storage unless an access request or a write command specifically requires that the data be returned. Mechanisms are disclosed to detect if I/O requests that occur after data has been pre-migrated but before the data has been migrated invalidate the pre-migration.
摘要:
A system and method are provided for preserving spacial and temporal locality of sets of related objects when moving the sets within a storage hierarchy via a common server. The appropriate meta data is gathered to track the spacial and temporal locality of the sets of objects being moved within the storage hierarchy and the algorithm uses the meta data to preserve the spacial and temporal locality when moving the objects. A collection of logically clustered data objects is identified. The logical cluster is then moved down through the storage hierarchy together to be stored in less costly storage devices. The logical cluster of data objects is then retrievable more efficiently as a whole when requested.
摘要:
Techniques are described for facilitating performance of tasks involving human review of media data (e.g., images, audio clips, video clips, etc.), such as to identify one or more targets of interest. The media data review may be performed for various reasons, such as to assist in locating one or more target objects in a large geographical area (e.g., one or more missing people or vehicles) based on human review of large quantities of images that each correspond to a small subset of the geographical area. When one or more of the reviewed media data pieces are identified as being relevant, information about those identified media data pieces may be used in various ways. Furthermore, in at least some situations, the media data review may be part of a charitable effort that uses human volunteers to review the media data without monetary payment or other compensation.
摘要:
A set of techniques for customizing resources for the workload of an application is described. The application can be received and hosted on a set of hardware and software resources of a service provider, which may include server instances, databases, load balancers and the like. Once the application is deployed and processing workload, it can be monitored to gather runtime trace information associated with the workload. This runtime trace information can be analyzed for potential optimizations and improvements to the set of resources or their configuration. Additionally, the user is enabled to input hardware/software specifications for the resources used to run the application. The service provider can use these specifications, along with the runtime trace information to optimize the resource stack used to execute the user's application.
摘要:
Techniques are described for providing client computing nodes with enhanced access to remote network-accessible services, such as by providing local capabilities specific to the remote services. In at least some situations, access to remote services by a client computing node may be enhanced by automatically locally performing some activities of the remote services, such as to improve the efficiency of communications that are sent between the client computing node and the remote service and/or to improve the efficiency by the remote service of processing communications from the client computing node. As one example, a node manager system local to a client computing node may perform authentication of communications sent by the client computing node to a remote service and/or may perform other activities specific to the remote service, so that the remote service does not need to perform the authentication and/or other performed activities for the communications.
摘要:
A method for providing application content including obtaining, by a declarative content engine executing on a computer processor, an initial application content from a content repository and expressing the initial application content in a declarative programming language to obtain declarative content and transmitting the declarative content to a user experience player (UXP). The UXP processes the declarative content to obtain the initial application content, binds the initial application content to first platform-specific templates and first platform-specific navigation patterns, and renders the initial application content in a first platform-specific user display format. Additionally, the method includes receiving a user action from the UXP in response to the transmission of the declarative content, storing the user action associated with the declarative content in a user data instance repository, determining, using an interaction module and the received user action, a next application content, and obtaining the next application content from the content repository.
摘要:
A set of techniques is described for enabling profile-driven compiler optimization based on cloud-specific information. A service provider may host applications on behalf of multiple users by providing a set of shared resources in a multi-tenant computing environment, where the resources are shared by the various applications hosted thereon. The service provider can collect runtime conditions, resource contention data and other environment-specific information of the shared resources. This gathered information can be provided a profile-driven compiler. The profile-driven compiler can use the information to recompile the source code of the application to produce an optimized version the application that is specifically tuned to run on the shared resources. The running version of the application can then be replaced by the optimized version.