Patent application number | Description | Published |
20130268644 | CONSISTENT RING NAMESPACES FACILITATING DATA STORAGE AND ORGANIZATION IN NETWORK INFRASTRUCTURES - Computer-implemented methods and systems for managing data objects within a computer network infrastructure that facilitate more efficient and reliable data storage and access are provided. An exemplary method may comprise establishing a physical identifier for each storage resource. A plurality of unique virtual identifiers for each storage resource is generated based on the physical identifier. The plurality of unique virtual identifiers is stored in a consistent ring namespace accessible to every node. An object identifier associated with a location of a data object to be stored in a storage resource is generated. The object identifier is mapped to the consistent ring namespace. The method may also include enabling traversing the consistent ring namespace from any node in the computer network to locate and access the data object. | 10-10-2013 |
20130268770 | CRYPTOGRAPHIC HASH DATABASE - A method for bursting a hash table of a key-value database comprises receiving a key and a value, traversing trie nodes of the key-value database from a root node to a leaf node by recursively dividing the key into a prefix and a suffix, reaching the leaf node, the leaf node being the hash table, determining that the key is not stored in the hash table, determining that the hash table is not able to store the key and the value, removing the hash table, associating a new trie node with a parent trie node of the hash table, associating two or more new hash tables with the new trie node, moving all keys and associated values from the hash table into one of the two or more new hash tables, and inserting the key and the associated value into one of the two or more new hash tables. | 10-10-2013 |
20140351419 | AUTOMATIC DATA RING DISCOVERY AND CONFIGURATION - Computer-implemented methods and systems for automatic ring discovery and configuration are provided. An exemplary method may comprise connecting a data node to a network. When connected, the data node periodically sends an advertisement to the network and monitors the network for one or more further advertisements of further data nodes associated with one or more data rings. The monitoring is performed for a predetermined time period. If one or more further advertisements are received, the data node determines which data ring to join using predefined criteria. The predetermined criteria may include a number of data nodes in the data ring, free space in the data ring, allowable number of the data nodes, compatibility of software versions of the data node and the data ring. Alternatively, if no advertisements are received within the predetermined time period, the data node creates a new data ring. | 11-27-2014 |
20140372490 | HYBRID GARBAGE COLLECTION - Disclosed is a method for hybrid garbage collection of objects in a file system. An example method includes associating, with each object in the file system, a reference counter, an expiration time, and a version identifier. The object is can be kept in the file system while the reference counter of the object is non-zero. After determining that the reference counter of the object is zero, the object can be kept in the file system up to the expiration time associated with the object. When a reference referring to the object is deleted, the expiration time of the object is updated to the latest of the expiration times of the object and the reference. Furthermore, the object can be kept in the file system while the version identifier of the object is larger than a predetermined version number. | 12-18-2014 |
20140379671 | DATA SCRUBBING IN CLUSTER-BASED STORAGE SYSTEMS - Disclosed is the technology for data scrubbing in a cluster-based storage system. This technology allows protecting data against failures of storage devices by periodically reading data object replicas and data object hashes stored in a plurality of storage devices and rewriting those data object replicas that have errors. The present disclosure addresses aspects of writing data object replicas and hashes, checking validity of data object replicas, and performing data scrubbing based upon results of the checking. | 12-25-2014 |
20150015131 | Modular Electronics Chassis - An apparatus for removing a modular electronic device from a chassis and a method for assembling thereof are provided. The apparatus for removing the modular electronic device from the chassis comprises a door pivotally coupled to the chassis, a sliding element in slidable engagement with the door, an ejection actuator including a spring member connected to the ejection actuator and to the rear of the chassis, and a linkage element connecting the sliding element with the ejection actuator. Additionally, the apparatus for removing the modular electronic device from the chassis comprises a guide rail disposed in the chassis enclosure to guide the modular electronic device and to guide the ejection actuator along the chassis enclosure. | 01-15-2015 |
20150019491 | Replication of Data Between Mirrored Data Sites - Computer-implemented methods and systems for replication of data between mirrored data sites are provided. An exemplary method may comprise receiving a data object at a mirrored data site, the mirrored data site including one or more data nodes. The data objects are replicated to the one or more data nodes internally. Then, a data object reference associated with the data object is generated. The reference referring to the data object is queued for transmission to all other mirrored data sites. The data object reference associated with the data object is transmitted to the other mirrored data sites. When the data object is received at each mirrored data site, it is replicated to one or more data nodes within the site. After transmitting the data object, the data object reference is discarded. | 01-15-2015 |
20150106335 | HIERARCHICAL DATA ARCHIVING - Disclosed is a file versioning system and corresponding methods for its operation. The file versioning system allows making snapshots of the file system every time there is a modification to the file system or its items. The snapshots may be linked to their immediate predecessors. Some older snapshots may be discarded according to a “thinning out” process based on multiple criteria. The snapshots may be displayed to a user in a manner making it easy to select a desired version. | 04-16-2015 |