-
公开(公告)号:US11537516B1
公开(公告)日:2022-12-27
申请号:US17491004
申请日:2021-09-30
Applicant: Amazon Technologies, Inc.
Inventor: Tyler Michael Jung , Slavcho Georgiev Slavchev , Nishant Jain , Vishwas Narendra , Nikhil Shah , James Zuber , Sameer Choudhary , Christopher A. Stephens , Suchindra Yogendra Agarwal , Phillip H. Pruett
IPC: G06F12/08 , G06F12/0802
Abstract: Systems and methods are provided for using a distributed cache architecture with different methods to load balance requests depending upon whether a requested data item is a freely-requested item (e.g., a “hot key”). The cache may be implemented as a consistent hash ring, and most keys may be assigned to particular node based on a consistent hash. For hot key requests, the requests may be distributed among a subset of nodes rather than being assigned to a specific node using consistent hashing. When a witness service is used to ensure that cached data is fresh, verification requests for data regarding hot keys may be batched to avoid overloading the witness service with hot key requests.
-
公开(公告)号:US11864095B2
公开(公告)日:2024-01-02
申请号:US18046866
申请日:2022-10-14
Applicant: Amazon Technologies, Inc.
Inventor: Malik Bouchet , Chandan Talukdar , Christopher A. Stephens , Anna Viktorivna Druzkina , Richard M. Sears
Abstract: Disclosed are system architectures and techniques for multiple access points for a data container. Control plane and data plane APIs are disclosed for generating access points and associating the access points with data containers, as well as for generating access point policies that specify permissions for the access points. More than one access point may be associated with a single data container. A storage service receives requests directed to the access points, and grants or denies the requests based on the permissions specified in the corresponding policies. Various types of use cases for using access policies are contemplated such as default, regional, or network-based (e.g., VPC-based) use-cases or the like. A system may implement layers of policies such as identity and access management policies, access point policies and data container policies.
-
3.
公开(公告)号:US20140337247A1
公开(公告)日:2014-11-13
申请号:US14341164
申请日:2014-07-25
Applicant: Amazon Technologies, Inc.
Inventor: Christopher A. Stephens , Gregory N. Hullender , Erik W. Selberg
CPC classification number: G06Q30/0603 , G06Q10/10 , G06Q30/00
Abstract: Disclosed are various embodiments for using contributor-provided attributes in conjunction with an electronic item catalog. A computer reconciles a plurality of attributes for an item in an electronic catalog using feedback data related to the item. Each of the attributes is provided by one of a plurality of users. The reconciled attribute of the item is updated in the electronic catalog.
Abstract translation: 公开了结合电子商品目录使用贡献者提供的属性的各种实施例。 计算机使用与该项目有关的反馈数据来协调电子目录中的项目的多个属性。 每个属性由多个用户之一提供。 项目的对帐属性在电子目录中更新。
-
公开(公告)号:US20230061347A1
公开(公告)日:2023-03-02
申请号:US18046866
申请日:2022-10-14
Applicant: Amazon Technologies, Inc.
Inventor: Malik Bouchet , Chandan Talukdar , Christopher A. Stephens , Anna Viktorivna Druzkina , Richard M. Sears
Abstract: Disclosed are system architectures and techniques for multiple access points for a data container. Control plane and data plane APIs are disclosed for generating access points and associating the access points with data containers, as well as for generating access point policies that specify permissions for the access points. More than one access point may be associated with a single data container. A storage service receives requests directed to the access points, and grants or denies the requests based on the permissions specified in the corresponding policies. Various types of use cases for using access policies are contemplated such as default, regional, or network-based (e.g., VPC-based) use-cases or the like. A system may implement layers of policies such as identity and access management policies, access point policies and data container policies.
-
公开(公告)号:US11477725B2
公开(公告)日:2022-10-18
申请号:US16917507
申请日:2020-06-30
Applicant: Amazon Technologies, Inc.
Inventor: Malik Bouchet , Chandan Talukdar , Christopher A. Stephens , Anna Viktorivna Druzkina , Richard M. Sears
Abstract: Disclosed are system architectures and techniques for multiple access points for a data container. Control plane and data plane APIs are disclosed for generating access points and associating the access points with data containers, as well as for generating access point policies that specify permissions for the access points. More than one access point may be associated with a single data container. A storage service receives requests directed to the access points, and grants or denies the requests based on the permissions specified in the corresponding policies. Various types of use cases for using access policies are contemplated such as default, regional, or network-based (e.g., VPC-based) use-cases or the like. A system may implement layers of policies such as identity and access management policies, access point policies and data container policies.
-
公开(公告)号:US20210410051A1
公开(公告)日:2021-12-30
申请号:US16917507
申请日:2020-06-30
Applicant: Amazon Technologies, Inc.
Inventor: Malik Bouchet , Chandan Talukdar , Christopher A. Stephens , Anna Viktorivna Druzkina , Richard M. Sears
Abstract: Disclosed are system architectures and techniques for multiple access points for a data container. Control plane and data plane APIs are disclosed for generating access points and associating the access points with data containers, as well as for generating access point policies that specify permissions for the access points. More than one access point may be associated with a single data container. A storage service receives requests directed to the access points, and grants or denies the requests based on the permissions specified in the corresponding policies. Various types of use cases for using access policies are contemplated such as default, regional, or network-based (e.g., VPC-based) use-cases or the like. A system may implement layers of policies such as identity and access management policies, access point policies and data container policies.
-
-
-
-
-