摘要:
Techniques are described for facilitating use of sequences of invocable services in a configurable manner, including by providing a metering service that tracks the use of invocable services by other invocable services or applications. In at least some situations, the invocable services are fee-based Web services or other fee-based network-accessible services, and are made available by providers of the services for use by others in exchange for fees defined by the service providers. The described techniques facilitate use of a sequence of such invocable services by applications in a manner configured by the creators of the applications and providers of the services, including to allow the application creators to define pricing terms that will be used to determine fees that end users of the applications will be charged for use of the invocable services via the applications.
摘要:
Techniques are described for facilitating use of sequences of invocable services in a configurable manner, including by providing a metering service that tracks the use of invocable services by other invocable services or applications. In at least some situations, the invocable services are fee-based Web services or other fee-based network-accessible services, and are made available by providers of the services for use by others in exchange for fees defined by the service providers. The described techniques facilitate use of a sequence of such invocable services by applications in a manner configured by the creators of the applications and providers of the services, including to allow the application creators to define pricing terms that will be used to determine fees that end users of the applications will be charged for use of the invocable services via the applications.
摘要:
A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node.
摘要:
Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest.
摘要:
A data processing system having a host processor and an attached processor is disclosed. Each processor is capable of executing user programs under a different operating system and each processor is capable of accessing system memory but the host processor controls and performs all input and output operations for both processors. System memory is shared by the processors, therefore, only one processor is active on the bus system at any given time. Apparatus is disclosed for holding the host processor and starting the attached processor upon a command from the host and apparatus is disclosed for holding the attached processor and starting the host in the event of interrupt conditions, attempted access by the attached processor to protected areas of memory, or execution of an "out" instruction by the attached processor. Memory mapping apparatus which is under host control, but provides mapping for both the host and attached processors is shown.
摘要:
A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node.
摘要:
A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node.
摘要:
Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest.
摘要:
Dynamic object replication in distributed storage systems. A system may implement a web services interface, storage nodes, storage node selection logic and a coordinator. The web services interface may be configured to receive, according to a web services protocol, client requests to store data objects including a given client request to store a given one of the data objects. The storage nodes may be configured to store replicas of the data objects. The storage node selection logic may be configured to dynamically determine a write plan for storing replicas of the given data object to corresponding storage nodes, where the write plan is dynamically determined according to current state information of the storage nodes. The coordinator may be configured to receive the client requests from the web services interface, and for the given client request, to store the replicas of the given data object to the corresponding storage nodes according to the write plan.
摘要:
A technique for permitting data transfers between a high speed bus and a low speed bus which operate independently and asynchronously wherein when the low speed bus requires access to the high speed bus, the busy status of the latter bus is determined and transfers are made to the high speed bus at high speed when such bus is not busy. When the high speed bus requires access to the low speed bus, if the low speed bus is busy the requesting master on the high speed bus is temporarily placed in a pending status and is removed from its tenure on the high speed bus, so that the high speed bus is free to handle other requests. When the low speed bus is free, the highest priority pending requestor is provided access to the low speed bus on a priority basis over all then current requestors.