会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Transaction consistency and problematic states
    • 事务一致性和问题状态
    • US20070072163A1
    • 2007-03-29
    • US11515557
    • 2006-09-05
    • Dana GroffJames JohnsonJonathan CargilleNorbert KustersRan KalachSurendra Verma
    • Dana GroffJames JohnsonJonathan CargilleNorbert KustersRan KalachSurendra Verma
    • G09B3/00G09B7/00
    • G06F11/1474G06F11/1471G06F2201/82
    • Aspects of the subject matter described herein relate to transactions. In aspects, a consistency requester such as a shadow copy service requests to have a consistent view of a set of resources. In response, transactions that are in a problematic state are allowed to exit the problematic state while new and existing transactions that are not in the problematic state are allowed to perform any work except work that takes them into the problematic state. After no transactions are in the problematic state, a consistent view of the set of resources is available. This view may be used by the consistency requester as desired. Afterwards, the consistency requester may indicate that a consistent view is no longer needed. Transactions are then allowed to enter the problematic state. Transactions may also be allowed to enter the problematic state if a timeout elapses.
    • 本文描述的主题的方面涉及交易。 在一些方面,诸如卷影副本服务的一致性请求者请求具有一组资源的一致视图。 作为回应,处于有问题状态的事务被允许退出有问题的状态,而不能处于问题状态的新的和现有的事务被允许执行任何工作,除了使它们进入有问题的状态的工作。 在没有交易处于问题状态之后,可以使用一组资源的一致视图。 该视图可以由所需的一致性请求者使用。 之后,一致性请求者可能表示不再需要一致的视图。 然后允许交易进入有问题的状态。 如果超时,也可允许交易进入问题状态。
    • 5. 发明申请
    • Commit tree optimization based on recovery topology information
    • 基于恢复拓扑信息提交树优化
    • US20070239736A1
    • 2007-10-11
    • US11401029
    • 2006-04-10
    • Dana GroffJames JohnsonJohn DotyJonathan CargilleKapil GuptaMichael Clark
    • Dana GroffJames JohnsonJohn DotyJonathan CargilleKapil GuptaMichael Clark
    • G06F17/30
    • G06F9/466Y10S707/99932
    • Minimizing transaction managers. A method that may be practiced in a commit tree topology including a plurality of transaction managers to manage transactions. The transactions include a set of operations that are all performed if a transaction is completed or all aborted if a transaction is not completed. The transaction managers store transaction result information to allow recovery of a transaction in case of system failure. The method includes acts for minimizing storage overhead by minimizing the number of transaction managers used to coordinate transactions. The method includes identifying a set of transaction managers. A first transaction manager is selected from among the set of transaction managers. A second transaction manager is identified from among the set of transaction managers that is always available when the first transaction manager is available. Messages are redirected from a subordinate associated with the first transaction manager to the second transaction manager.
    • 最小化交易经理。 可以在包括多个事务管理器的提交树拓扑中实践的方法来管理事务。 事务包括一组操作,如果事务完成或者如果事务未完成则全部中止操作。 事务管理器存储事务结果信息,以便在系统故障的情况下恢复事务。 该方法包括通过最小化用于协调事务的事务管理器的数量来最小化存储开销的动作。 该方法包括识别一组事务管理器。 从一组事务管理器中选择第一个事务管理器。 从第一个事务管理器可用时始终可用的一组事务管理器中识别出第二个事务管理器。 消息从与第一个事务管理器关联的下属重定向到第二个事务管理器。
    • 6. 发明授权
    • Security model for common multiplexed transactional logs
    • 常用复用事务日志的安全模型
    • US08321667B2
    • 2012-11-27
    • US11711990
    • 2007-02-28
    • Dexter P. BradshawWilliam R. TiptonDana GroffZoheb Lester Alexander Vacheri
    • Dexter P. BradshawWilliam R. TiptonDana GroffZoheb Lester Alexander Vacheri
    • H04L29/06G06F17/00
    • G06F21/6218G06F9/455
    • A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers—abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations—by using the interfaces brokered by the principal in the protected subsystem.
    • 在事务日志记录基础设施中提供安全模型,该基础架构被安排为构建在底层安全文件系统上的受保护子系统。 虚拟日志流所使用的基础文件系统中的文件受到保护,不受直接用户写入的影响,只能通过由机器范围的主体中介的受保护子系统进行写入,以便共享共享多个物理日志的虚拟日志文件 相互安全 日志文件句柄和用户和内核模式对象通过使用一致的安全语义的专用和虚拟日志的接口向日志客户端公开。 日志客户端与底层安全文件系统无关,只能操纵文件系统容器 - 通过归一化输入/输出操作来实现物理日志并用于虚拟化文件系统的抽象对象 - 通过使用受保护的主体代理的接口 子系统。
    • 8. 发明申请
    • Multi-level read caching for multiplexed transactional logging
    • 用于多重事务日志记录的多级读取缓存
    • US20080133615A1
    • 2008-06-05
    • US11633248
    • 2006-12-04
    • Dexter P. BradshawWilliam R. TiptonDana Groff
    • Dexter P. BradshawWilliam R. TiptonDana Groff
    • G06F17/30
    • G06F12/0866G06F12/0897G06F2212/466
    • A transactional logging service is provided to user-mode and kernel-mode log clients by utilizing a marshalling area to buffer a set of log records that a log client assembles into a log stream. Disk I/O (input/output) functionality is then separately brokered using a kernel-mode address space for a single dedicated physical log, or virtual logs multiplexed to a single log, which is written to stable storage that contains log records from across all of the log streams. Physical log writes are handled by a shared log flush queue and physical log reads are provided by a file system cache that underlies the service. A multi-level cache hierarchy is utilized when a log client needs to access a log record. A series of caches are queried in order of increasing latency until the targeted log record is located. The target log record is only read from disk in the event that it missed at each cache in the hierarchy.
    • 通过利用编组区来缓冲日志客户端组装成日志流的一组日志记录,向用户模式和内核模式日志客户端提供事务日志记录服务。 然后,使用单个专用物理日志的内核模式地址空间或复制到单个日志的虚拟日志分别对磁盘I / O(输入/输出)功能进行操作,将其写入包含来自所有的日志记录的稳定存储 的日志流。 物理日志写入由共享日志刷新队列处理,物理日志读取由作为服务的文件系统缓存提供。 当日志客户端需要访问日志记录时,将使用多级缓存层次结构。 一系列缓存按照延迟时间的顺序进行查询,直到找到目标日志记录。 只有当它在层次结构中的每个高速缓存中丢失时才会从磁盘读取目标日志记录。
    • 9. 发明申请
    • Security model for common multiplexed transactional logs
    • 常用复用事务日志的安全模型
    • US20080208924A1
    • 2008-08-28
    • US11711990
    • 2007-02-28
    • Dexter P. BradshawWilliam R. TiptonDana GroffZoheb Vacheri
    • Dexter P. BradshawWilliam R. TiptonDana GroffZoheb Vacheri
    • G06F12/16
    • G06F21/6218G06F9/455
    • A security model is provided in a transactional logging infrastructure that is arranged as a protected subsystem built on an underlying secure file system. Files in the underlying file system used by virtual log streams are protected from direct user writes, and are written-to only through the protected subsystem that is brokered by a machine-wide principal so that virtual log files sharing the same multiplexed physical log are kept secure from each other. Log file handles and user- and kernel-mode objects are exposed to log clients through interfaces using consistent security semantics for both dedicated and virtual logs. Log clients are agnostic of the underlying secure file system and can only manipulate file system containers—abstract objects that implement the physical log and used to virtualize the file system by normalizing input/output operations—by using the interfaces brokered by the principal in the protected subsystem.
    • 在事务日志记录基础设施中提供安全模型,该基础架构被安排为构建在底层安全文件系统上的受保护子系统。 虚拟日志流所使用的基础文件系统中的文件受到保护,不受直接用户写入的影响,只能通过由机器范围的主体中介的受保护子系统进行写入,以便共享共享多个物理日志的虚拟日志文件 相互安全 日志文件句柄和用户和内核模式对象通过使用一致的安全语义的专用和虚拟日志的接口向日志客户端公开。 日志客户端与底层安全文件系统无关,只能操纵文件系统容器 - 通过归一化输入/输出操作来实现物理日志并用于虚拟化文件系统的抽象对象 - 通过使用受保护的主体代理的接口 子系统。
    • 10. 发明授权
    • Multi-level read caching for multiplexed transactional logging
    • 用于多重事务日志记录的多级读取缓存
    • US08074027B2
    • 2011-12-06
    • US11633248
    • 2006-12-04
    • Dexter P. BradshawWilliam R. TiptonDana Groff
    • Dexter P. BradshawWilliam R. TiptonDana Groff
    • G06F12/00
    • G06F12/0866G06F12/0897G06F2212/466
    • A transactional logging service is provided to user-mode and kernel-mode log clients by utilizing a marshalling area to buffer a set of log records that a log client assembles into a log stream. Disk I/O (input/output) functionality is then separately brokered using a kernel-mode address space for a single dedicated physical log, or virtual logs multiplexed to a single log, which is written to stable storage that contains log records from across all of the log streams. Physical log writes are handled by a shared log flush queue and physical log reads are provided by a file system cache that underlies the service. A multi-level cache hierarchy is utilized when a log client needs to access a log record. A series of caches are queried in order of increasing latency until the targeted log record is located. The target log record is only read from disk in the event that it missed at each cache in the hierarchy.
    • 通过利用编组区来缓冲日志客户端组装成日志流的一组日志记录,向用户模式和内核模式日志客户端提供事务日志记录服务。 然后,使用单个专用物理日志的内核模式地址空间或复制到单个日志的虚拟日志分别对磁盘I / O(输入/输出)功能进行操作,将其写入包含来自所有的日志记录的稳定存储 的日志流。 物理日志写入由共享日志刷新队列处理,物理日志读取由作为服务的文件系统缓存提供。 当日志客户端需要访问日志记录时,将使用多级缓存层次结构。 一系列缓存按照延迟时间的顺序进行查询,直到找到目标日志记录。 只有当它在层次结构中的每个高速缓存中丢失时才会从磁盘读取目标日志记录。