会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Storing files in a parallel computing system based on user or application specification
    • 基于用户或应用程序规范将文件存储在并行计算系统中
    • US09298733B1
    • 2016-03-29
    • US13536289
    • 2012-06-28
    • Sorin FaibishJohn M. BentJeffrey M. NickGary GriderAaron Torres
    • Sorin FaibishJohn M. BentJeffrey M. NickGary GriderAaron Torres
    • G06F17/30
    • G06F17/302G06F17/30224
    • Techniques are provided for storing files in a parallel computing system based on a user-specification. A plurality of files generated by a distributed application in a parallel computing system are stored by obtaining a specification from the distributed application indicating how the plurality of files should be stored; and storing one or more of the plurality of files in one or more storage nodes of a multi-tier storage system based on the specification. The plurality of files comprise a plurality of complete files and/or a plurality of sub-files. The specification can optionally be processed by a daemon executing on one or more nodes in a multi-tier storage system. The specification indicates how the plurality of files should be stored, for example, identifying one or more storage nodes where the plurality of files should be stored.
    • 提供了基于用户规范在并行计算系统中存储文件的技术。 由并行计算系统中的分布式应用生成的多个文件通过从分布式应用获得指定如何存储多个文件的规范来存储; 以及基于所述规范,将所述多个文件中的一个或多个存储在多层存储系统的一个或多个存储节点中。 多个文件包括多个完整文件和/或多个子文件。 该规范可以可选地由在多层存储系统中的一个或多个节点上执行的守护进程来处理。 该规范指示如何存储多个文件,例如,识别应该存储多个文件的一个或多个存储节点。
    • 2. 发明授权
    • Virtual machines and cloud storage caching for cloud computing applications
    • 云计算应用的虚拟机和云存储缓存
    • US08805951B1
    • 2014-08-12
    • US13022946
    • 2011-02-08
    • Sorin FaibishJeffrey M. Nick
    • Sorin FaibishJeffrey M. Nick
    • G06F15/167
    • G06F9/5072G06F21/6218H04L63/04
    • An application is included in a virtual machine sent to a cloud computing server. The cloud computing server has a remote access layer that fetches data blocks of the private dataset of the application from private data storage as the data blocks are requested by the application, so that the application in the public cloud begins execution without waiting for the entire application dataset to be transferred to the public cloud, and the data blocks are transferred from the private dataset to the public cloud only when the data blocks are accessed by the application. The application's private data is kept in the public cloud only when it is currently being used. If there are security concerns, the application's private data is transferred over the public network in an encrypted form and stored in the public cloud in an encrypted form.
    • 应用程序包含在发送到云计算服务器的虚拟机中。 云计算服务器具有一个远程访问层,当应用程序请求数据块时,从专用数据存储中取出应用程序的私有数据集的数据块,从而公共云中的应用程序开始执行,而无需等待整个应用程序 数据集转移到公共云中,只有当应用程序访问数据块时,数据块才会从私有数据集传输到公共云。 应用程序的私有数据仅在当前正在使用时才会保留在公共云中。 如果存在安全问题,应用程序的私有数据将以加密形式通过公共网络传输,并以加密形式存储在公共云中。
    • 3. 发明授权
    • Implementing a message queuing interface (MQI) indexed queue support that adds a key to the index on put commit
    • 实现消息队列接口(MQI)索引队列支持,它将put提供的索引添加一个密钥
    • US07035852B2
    • 2006-04-25
    • US09909538
    • 2001-07-20
    • Paul HopewellPaul KettleyJeffrey M. NickPeter SiddallJames H. Warnes
    • Paul HopewellPaul KettleyJeffrey M. NickPeter SiddallJames H. Warnes
    • G06F17/30
    • G06F9/546G06F2209/547G06F2209/548Y10S707/99938
    • Provided are a method, computer program product and system for providing indexed queue support for efficient retrieval of messages from a queue. An index key for expediting message retrieval is assigned to a message when the operation of placing the message on a queue is committed. The index key assigned at commit time comprises an attribute (such as a message ID or correlation ID) specified by the sending application program, which placed the message on the queue. This deferred assignment of an index key until commit time means that the index key can be used to search for messages having the particular attribute without any possibility of identifying messages for retrieval before the messages have been committed. This maintains transactional requirements of a transaction-oriented messaging system which requires a message to only be made available for retrieval by receiver application programs after the sender application's put operation has committed.
    • 提供了一种用于提供索引队列支持以从队列中有效检索消息的方法,计算机程序产品和系统。 当消息放置在队列上的操作被提交时,用于加速消息检索的索引键被分配给消息。 在提交时分配的索引关键字包括由发送应用程序指定的属性(诸如消息ID或相关ID),该消息将消息放置在队列上。 索引键的延迟分配直到提交时间意味着可以使用索引关键字来搜索具有特定属性的消息,而无需在消息提交之前识别用于检索的消息。 这维护面向事务的消息系统的事务性要求,该消息系统要求消息仅在发送者应用程序的投入操作已经提交之后被接收方应用程序提供。
    • 9. 发明授权
    • Method and system for locking a page of real storage using a virtual
address
    • 使用虚拟地址锁定实际存储页面的方法和系统
    • US5613086A
    • 1997-03-18
    • US567861
    • 1995-12-06
    • Jeffrey A. FreyDavid C. MannersJeffrey M. Nick
    • Jeffrey A. FreyDavid C. MannersJeffrey M. Nick
    • G06F12/08G06F12/10G06F12/12G06F12/14
    • G06F12/126G06F12/10
    • A LOCK PAGE instruction is provided for locking a page of real storage using a virtual address. The LOCK PAGE instruction includes an operation code which specifies the operation to be performed, a first operand which contains the value of the real address obtained during execution of the LOCK PAGE instruction and a second operand which contains the value of the virtual address of the page to be locked during execution of LOCK PAGE. LOCK PAGE enables an address page or a data page to be locked without requiring the entire address space to be locked. A page is locked when a lock control bit in general register 0 is zero, the page is valid in main storage and a lock bit located in a page table entry is zero. In addition to the above, the technique used by an operating system service for reclaiming a page of real storage is altered to intersect with the LOCK PAGE facility.
    • 提供LOCK PAGE指令,用于使用虚拟地址锁定实际存储的页面。 LOCK PAGE指令包括指定要执行的操作的操作代码,第一操作数,其包含在执行LOCK PAGE指令期间获得的实际地址的值和包含页面的虚拟地址的值的第二操作数 在执行LOCK PAGE期间被锁定。 锁定页面可以锁定地址页面或数据页面,而不需要锁定整个地址空间。 当通用寄存器0中的锁控制位为零时,页面被锁定,该页在主存储器中有效,并且位于页表条目中的锁位为零。 除了上述之外,操作系统服务用于回收真实存储页面的技术被改变以与LOCK PAGE设备相交。
    • 10. 发明授权
    • Software cache management of a shared electronic store in a supplex
    • US5457793A
    • 1995-10-10
    • US860807
    • 1992-03-30
    • David A. ElkoJeffrey A. FreyBrian B. MooreJeffrey M. NickKevin F. SmithMichael D. Swanson
    • David A. ElkoJeffrey A. FreyBrian B. MooreJeffrey M. NickKevin F. SmithMichael D. Swanson
    • G06F12/02G06F12/08G06F12/12G06F15/167G06F17/30
    • G06F12/084G06F12/023G06F12/0866G06F12/123Y10S707/968Y10S707/99956
    • Storage is managed in a shared electronic store (SES) by assigning storage classes (STCs) to each directory entry having a data item stored in SES. The assignments of directory entries and data elements to the respective STCs can be changed at any time by any CPC. Eventually, no free space remains in the SES cache, and then space for new directory entries and data items must be obtained by reclaiming space occupied by directory entries and associated unchanged data items. The reclaiming of SES space is controlled on a STC basis. Any specified STC may reclaim from itself or from another STC using reclaiming software/microcode in SES, which includes a reclaim vector, a reclaim counter, a queue, and reclaiming controls. The vector and counter have respective elements for all possible STCs to controls how a specified STC may reclaim space from any or all target STC. Any enabled target STC reclaims its space according to an LRU algorithm maintained by a queue for the STC. A CPC can issue a command to load different values in target STC elements in the SES vector for a specified STC to control how reclaiming is apportioned for the specified STC. In SES, associated target counter elements are loaded from its vector. Reclaiming is done automatically in SES upon each directory miss in the current target STC having a non-zero counter value, when no free space exists. The counter is decremented for each reclaimed directory entry until its count reaches zero, and then the counter element for the next non-zero target STC is used for reclaiming until it reaches zero. When all STC elements in the counter are zero for the specified STC, the counter elements are reloaded from the vector elements to repeat the reclaiming operation, as long as a repeat factor for the specified STC has not reached zero. The repeat factor is decremented each time the counters are loaded from the vector. When the counters and repeat factor have all reached zero, reclaiming is disabled for the specified STC.