-
1.
公开(公告)号:US20190325048A1
公开(公告)日:2019-10-24
申请号:US15958754
申请日:2018-04-20
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Glenn S. WATKINS , John Michael Czerkowicz
IPC: G06F17/30
Abstract: In example implementations, a system may receive an input/output (I/O) operation in an object store storing a first object, determine objects represented in the object store affected by storing the first object, transcode the I/O operation into a transaction including the linked list of updates to objects represented in the object store, determine a persistent storage for storing the transaction and persist the transaction to the persistent storage according to a data structure determined by the type of persistent storage.
-
公开(公告)号:US20190238394A1
公开(公告)日:2019-08-01
申请号:US15884150
申请日:2018-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Glenn S. WATKINS , John Michael Czerkowicz
Abstract: In an example, a system includes network nodes implementing an object store. The system may determine reference count updates for objects stored on the object store, and delay persisting the reference count updates to a persistent storage. The system may cancel reference count updates that increments and decrement between the determined reference count update and another reference count update received during the delay in persisting the reference count update to the persistent storage to minimize writing to the object record.
-
公开(公告)号:US20190236316A1
公开(公告)日:2019-08-01
申请号:US15884164
申请日:2018-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Glenn S. WATKINS , John Michael CZERKOWICZ , Yan XIAO
CPC classification number: G06F21/78 , G06F16/152 , H04L9/0643 , H04L9/0891 , H04L9/0894 , H04L9/3236 , H04L9/3247 , H04L67/1095
Abstract: In an example, a system may include an object store for storing objects, wherein each object is identified by an object signature generated according to a first cryptographic function, wherein the objects stored in the object store exhibit a hierarchical relationship from a root object. The system may receive a second cryptographic function for the object store, receive an I/O request affecting an object in the object store, encode the affected object according to the second cryptographic function, and persist the affected object alongside other objects in the object store encoded according to the first cryptographic function.
-
-