摘要:
A computing device receives a file. The computing device determines whether the file has previously been scanned for violations of a data loss prevention policy. If the file was previously scanned, a result of the previous scan is used to decide whether or not the file violates the data loss prevention policy. If the file was not previously scanned, the file is scanned to decide whether or not the file violates the data loss prevention policy.
摘要:
A method and apparatus for providing information to mitigate a current failure in a datacenter is described. The method comprises processing historical data regarding at least one failure. The historical data includes at least one action related to the at least one failure. The method further includes determining information for mitigating the current failure based on the historical data.
摘要:
A plurality of data objects may be replicated across a plurality of computing nodes coupled to a network. The network may include a first node operable to initiate an update operation to update a plurality of replicas of a first object. If one or more of the replicas are not reachable then the update operation may update a subset (e.g., a quorum) but not all of the replicas. For each node on which one of the replicas was updated in the update operation, the node may add the object to a list of incoherent objects. The list of incoherent objects may subsequently be used to bring the lagging replicas in sync with the replicas that were updated. In another embodiment, a plurality of replicas of an object may be stored on a plurality of nodes, similarly as described above. A first node that stores a replica of the object may store a first timestamp associated with the replica on the first node. The timestamp may be used to ensure that the replica on the first node is coherent with respect to one or more other replicas by periodically communicating with the one or more other replicas when a threshold amount of time has passed without the replica on the first node receiving an update.
摘要:
A plurality of data objects may be replicated across a plurality of computing nodes coupled to a network. The network may include a first node operable to initiate an update operation to update a plurality of replicas of a first object. If one or more of the replicas are not reachable then the update operation may update a subset (e.g., a quorum) but not all of the replicas. For each node on which one of the replicas was updated in the update operation, the node may add the object to a list of incoherent objects. The list of incoherent objects may subsequently be used to bring the lagging replicas in sync with the replicas that were updated. In another embodiment, a plurality of replicas of an object may be stored on a plurality of nodes, similarly as described above. A first node that stores a replica of the object may store a first timestamp associated with the replica on the first node. The timestamp may be used to ensure that the replica on the first node is coherent with respect to one or more other replicas by periodically communicating with the one or more other replicas when a threshold amount of time has passed without the replica on the first node receiving an update.
摘要:
A system for fault tolerant multi-stage data replication with relaxed coherency comprises one or more processors and memory coupled to the processors, where the memory stores program instructions executable by the processors to implement a data replication service. In response to an update request directed at a data object, in a first stage of replication, the data replication service is configured to update respective primary replicas at a plurality of primary replica sites for the data object, and to store metadata descriptors at each of the plurality of primary replica sites. The data replication service is configured to determine whether a notification of the update is to be sent to any other replica sites. In response to identifying such other replica sites, an update notification including contents of a metadata descriptor may be sent to the other replica sites in one or more additional replication stages.
摘要:
An efficient distributed transaction protocol for a distributed file sharing system is described. One embodiment of the protocol involves a transaction coordinator node sending three messages to participant nodes, where the participant nodes reply to only two of those messages. In one embodiment, the transaction coordinator node may return success to the client application after receiving replies to the second message from the participant nodes. The protocol may provide benefits associated with traditional three-phase commit (3PC) protocols while also decreasing response time latencies experienced by client applications and decreasing network traffic.
摘要:
A method and apparatus for managing configurations of computer resources in a datacenter is described. In one embodiment, a method comprises analyzing multiple configurations using rule information to produce an analysis result where each configuration in the multiple configurations defines a configuration of a resource that is managed by the data center, training a Bayesian classifier using the analysis result, and classifiying a second configuration using the trained Bayesian classifier.
摘要:
A method and apparatus for parallel execution of trigger actions. One or more embodiments of the invention comprise providing a C++ class (hereinafter referred to as “dispatcher”) that can take an SQL query or trigger action and start parallel execution of the trigger action. The trigger action is optimized and parallelized. The dispatcher executes the trigger action, sets up the communication links between the various operators in the trigger action, and ensures that all the results are sent back to the trigger.
摘要:
One or more embodiments of the invention provide the ability to utilize the Java programming language as a stored procedure language. One or more embodiments of the invention provide for Java abstract data types (ADT) that map to ADT attributes from a database. The Java ADT can then be manipulated in an application written in the Java programming language such as a stored procedure. Each ADT attribute from a database is mapped to a Java class by wrapping the ADT definition (which is commonly written in C ++) in a Java wrapper. The wrapping process enables a user to write any client side Java application. Once the ADTs are wrapped and a stored procedure is created, the stored procedure must be able to execute. Enhancements permit a stored procedure written in the Java programming language to execute. Such enhancements include a server side cursor that the stored procedure can use to run SQL queries. Additionally, the server has been enhanced to link to a Java virtual machine that can be used to execute the bytecodes of the stored procedure written in the Java programming language.
摘要:
Method and apparatus for detecting web-based electronic mail in network traffic is described. In some examples, web pages are extracted from the network traffic. Fields in each page of a group of the web pages that share a documents structure are identified. A statistical analysis of the fields of each page in the group of web pages is performed to identify any electronic mail (e-mail) fields. The group of web pages is indicated to include web-based e-mail messages if the fields of each page in the group of web pages include at least one e-mail field.