摘要:
Provided are techniques for using containers to store objects. One data store from a set of data stores is assigned as a primary data store, wherein the remaining data stores comprise secondary data stores. A container for a group is created on the primary data store. A unique identifier for the container is generated on the primary data store. Metadata for the container is stored on the primary data store. Zero or more objects are stored in the container on the primary data store. For each of the secondary data stores that have objects belonging to the group, a container is created in that secondary data store having the unique identifier, wherein the container spans the primary data store and the secondary data stores, and wherein the objects in the container do not span the primary data store and the secondary data stores.
摘要:
Provided are techniques for using containers to store objects. One data store from a set of data stores is assigned as a primary data store, wherein the remaining data stores comprise secondary data stores. A container for a group is created on the primary data store. A unique identifier for the container is generated on the primary data store. Metadata for the container is stored on the primary data store. Zero or more objects are stored in the container on the primary data store. For each of the secondary data stores that have objects belonging to the group, a container is created in that secondary data store having the unique identifier, wherein the container spans the primary data store and the secondary data stores, and wherein the objects in the container do not span the primary data store and the secondary data stores.
摘要:
A network is described including a server and a network device remotely coupled to the server. The network device includes a non-volatile storage device having data stored therein, which is preferably modified solely in response to instructions generated by the server. During initialization, the network device performs a first portion of an operating system boot sequence then generates and forwards trigger data, which includes identification information for identifying the network device, to the server. In response, the server generates action data, which includes one or more data update instructions for modifying the data stored within the non-volatile storage device. Following a second portion of the operating system boot sequence, the action data is forwarded from the server to the network device. If the action data includes one or more data update instructions, the network device performs the one or more data update instructions and repeats the operating system boot sequence.