摘要:
Content synchronization in a file sharing environment is described. A node in a circle share maintains a version vector that represents that node's knowledge of file synchronization events. Version vector data may be transmitted between nodes of the circle share via a presence service in the form of short notification messages. The version vector data is compared to identify one or more nodes to be synchronized. A resource-aware overlay representing the circle share is computed, and is used to initiate communication to determine which of the available nodes with which to synchronize will provide the most synchronization value to other nodes in the circle share.
摘要:
Content synchronization in a file sharing environment is described. A node in a circle share maintains a version vector that represents that node's knowledge of file synchronization events. Version vector data may be transmitted between nodes of the circle share via a presence service in the form of short notification messages. The version vector data is compared to identify one or more nodes to be synchronized. A resource-aware overlay representing the circle share is computed, and is used to initiate communication to determine which of the available nodes with which to synchronize will provide the most synchronization value to other nodes in the circle share.
摘要:
Various embodiments can utilize a distributed solution for scheduling connections between peers in a file sharing environment. In accordance with at least some embodiments, individual nodes in a peer-to-peer system include scheduling software that enables the nodes to make scheduling decisions with regard to how, when and where connections are made with other peers. Scheduling decisions can be based on a number of different parameters. In at least some embodiments, a synchronization negotiation manager is embodied with logic that drives the negotiation and scheduling process. This logic is represented by an innovative state machine that is designed to implement the negotiation and synchronization process.
摘要:
Various embodiments can utilize a distributed solution for scheduling connections between peers in a file sharing environment. In accordance with at least some embodiments, individual nodes in a peer-to-peer system include scheduling software that enables the nodes to make scheduling decisions with regard to how, when and where connections are made with other peers. Scheduling decisions can be based on a number of different parameters. In at least some embodiments, a synchronization negotiation manager is embodied with logic that drives the negotiation and scheduling process. This logic is represented by an innovative state machine that is designed to implement the negotiation and synchronization process.
摘要:
Systems and methods for security against corruption for networked storage are described. In one aspect, a destination device receives a linear combination of packets. The linear combination of packets represents digitally signed blocks of content and public information used to digitally sign segmented blocks of content. The destination device recombines the linear combination of packets to compute new valid signatures as linear combinations of received homomorphic digital signatures. The new valid signatures are for verifying by a requesting computing device recovering data associated with at least a subset of the linear combination of packets, integrity of the at least a subset. This provides the requesting node with security against corruption of data in networked storage.
摘要:
Embodiments of the invention provide a method and system for automatically instrumenting a set of web documents, such as web pages, as well as embedding structures that present advertising content via the web pages. The instrumentation automatically embeds tags that enable usage information associated with the web documents to be tracked and recorded. Many hundreds or thousands of web pages can be automatically modified without user intervention, enabling comprehensive reporting and tracking to be performed on each page. The web pages are analyzed and insertion points intelligently located. Changes can be verified to ensure that no undesirable effects resulted from embedding the content. The tags can receive parameters customized to the level of users and pages. The tags, insertion information, and other configuration information can be stored in a central repository to make subsequent tagging easier.
摘要:
The described implementations relate to automatic network selection in relation to wireless mobile devices. One method can be applied to a mobile device that has both Wi-Fi and cellular capabilities. The method can attempt to identify Wi-Fi network availability for the mobile device. This method also evaluates whether to configure the mobile device to accomplish data communication over an identified Wi-Fi network or a cellular network.
摘要:
In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one embodiment, one portion of the non-volatile memory is used as a write buffer and a read cache for writes and reads to the long-term storage media. Interfaces are provided for controlling the use of the non-volatile memory as a write buffer and a read cache. Additionally, a portion of the non-volatile memory is used to provide a direct mapping for specified sectors of the long-term storage media. Descriptive data regarding the persistent storage device is stored in another portion of the non-volatile memory.
摘要:
Techniques involving visual display of information related to matching user utterances against graph patterns are described. In one or more implementations, an utterance of a user is obtained that has been indicated as corresponding to a graph pattern through linguistic analysis. The utterance is displayed in a user interface as a representation of the graph pattern.
摘要:
Virtual machine image files are stored in a virtual machine storage by a virtual machine image file server. Users at virtual machine clients connect to the virtual machine image file server and are presented with a list of the available virtual machine image files in a virtual machine image store. Users of the virtual machine clients are able to select the desired virtual machine image, and begin executing in the selected virtual machine environment as soon as the selected virtual machine image file begins downloading to the client computer. When a virtual machine image file is selected for storage it is divided into several segments. Each segment is compared with segments of previously stored virtual machine image files already in storage. For example, only non-duplicate segments are stored.