会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • TECHNIQUES FOR HANDLING LOCK-RELATED INCONSISTENCIES
    • 处理与锁定相关的不良情况的技术
    • US20060288144A1
    • 2006-12-21
    • US11156318
    • 2005-06-16
    • Wilson ChanAngelo PruscinoStefan RoeschMichael ZollTolga YurekEugene Ho
    • Wilson ChanAngelo PruscinoStefan RoeschMichael ZollTolga YurekEugene Ho
    • G06F12/14
    • G06F9/526G06F2209/522Y10S707/99938
    • Techniques are described herein for handling lock-related inconsistencies. As mentioned above, such inconsistencies occur when two or more sets of lock information, relating to the same resource, convey inconsistent information about locks requested and/or granted on that resource. In general, the techniques involve causing the locally-stored lock information about a resource to be sent to the master node of the resource. The master node of the resource compares the lock information thus received against the lock information maintained by the master node. Based on the comparison, the master node determines how to resolve the lock-related inconsistency, and sends messages to those nodes that need to change their local lock information for the resource. Once all of the lock information has been made consistent, the resource made available for access. Because the lock-related inconsistency is resolved without restarting nodes, the availability required to correct the inconsistency.
    • 本文描述了处理与锁相关的不一致性的技术。 如上所述,当与相同资源相关的两组或多组锁定信息传达关于在该资源上请求和/或授予的锁定的不一致的信息时,会发生这种不一致。 一般来说,这些技术涉及将关于资源的本地存储的锁定信息发送到资源的主节点。 资源的主节点将由此接收的锁定信息与由主节点维护的锁定信息进行比较。 基于比较,主节点确定如何解决与锁相关的不一致,并向需要更改其资源的本地锁信息的那些节点发送消息。 一旦所有的锁信息一致,该资源就可用于访问。 由于锁定相关的不一致性在不重新启动节点的情况下得到解决,所以需要更改不一致的可用性。
    • 7. 发明申请
    • TECHNIQUES FOR ADAPTIVE TRACE LOGGING
    • 自适应追踪记录技术
    • US20110067008A1
    • 2011-03-17
    • US12559338
    • 2009-09-14
    • Deepti SrivastavaWilson ChanJohn HsuEugene HoTolga YurekBeverly ZaneAngelo Pruscino
    • Deepti SrivastavaWilson ChanJohn HsuEugene HoTolga YurekBeverly ZaneAngelo Pruscino
    • G06F9/44
    • G06F11/3636G06F11/3466G06F2201/865
    • Techniques for adaptive trace logging include, in one embodiment, obtaining input data on trace logging behavior and computing resources used by trace logging. Based on the obtained input data, an adaptive trace logging module automatically takes action at runtime to reduce the amount of computing resources consumed by tracing logging. For example, the action taken may include decreasing a trace logging level of an executing software program to reduce the number of trace logging messages added to a trace log. In another embodiment, the techniques include detecting a condition of an executing software program that warrants a change to a trace logging level of the executing program. The adaptive trace logging module automatically changes the trace logging level of the executing program as-needed for the detected condition. For example, the adaptive trace logging module may increase the trace logging level of an executing program upon detecting a deadlock or other abnormal condition of the executing program. By automatically increasing the trace logging level upon detecting an abnormal condition, additional trace logging messages may be written to a trace log aiding diagnosis and troubleshooting of the condition.
    • 在一个实施例中,用于自适应跟踪记录的技术包括获取跟踪记录行为和跟踪记录使用的计算资源的输入数据。 基于获得的输入数据,自适应跟踪记录模块在运行时自动执行操作,以减少跟踪记录所消耗的计算资源量。 例如,采取的措施可能包括减少执行软件程序的跟踪日志记录级别,以减少添加到跟踪日志中的跟踪日志记录消息的数量。 在另一个实施例中,这些技术包括检测执行软件程序的条件,该程序保证对执行程序的跟踪记录级别的改变。 自适应跟踪记录模块根据检测到的条件自动更改执行程序的跟踪记录级别。 例如,自适应跟踪记录模块可以在检测到执行程序的死锁或其他异常状况时增加执行程序的跟踪记录级别。 通过在检测到异常情况后自动增加跟踪日志记录级别,可能会向跟踪记录中写入附加的跟踪记录消息,以帮助诊断和排除故障。
    • 8. 发明授权
    • Techniques for adaptive trace logging
    • 自适应跟踪记录技术
    • US09529694B2
    • 2016-12-27
    • US12559338
    • 2009-09-14
    • Deepti SrivastavaWilson ChanJohn HsuEugene HoTolga YurekBeverly ZaneAngelo Pruscino
    • Deepti SrivastavaWilson ChanJohn HsuEugene HoTolga YurekBeverly ZaneAngelo Pruscino
    • G06F9/44G06F11/36G06F11/34
    • G06F11/3636G06F11/3466G06F2201/865
    • Techniques for adaptive trace logging include, in one embodiment, obtaining input data on trace logging behavior and computing resources used by trace logging. Based on the obtained input data, an adaptive trace logging module automatically takes action at runtime to reduce the amount of computing resources consumed by tracing logging. For example, the action taken may include decreasing a trace logging level of an executing software program to reduce the number of trace logging messages added to a trace log. In another embodiment, the techniques include detecting a condition of an executing software program that warrants a change to a trace logging level of the executing program. The adaptive trace logging module automatically changes the trace logging level of the executing program as-needed for the detected condition. For example, the adaptive trace logging module may increase the trace logging level of an executing program upon detecting a deadlock or other abnormal condition of the executing program. By automatically increasing the trace logging level upon detecting an abnormal condition, additional trace logging messages may be written to a trace log aiding diagnosis and troubleshooting of the condition.
    • 在一个实施例中,用于自适应跟踪记录的技术包括获取跟踪记录行为和跟踪记录使用的计算资源的输入数据。 基于获得的输入数据,自适应跟踪记录模块在运行时自动执行操作,以减少跟踪记录所消耗的计算资源量。 例如,采取的措施可能包括减少执行软件程序的跟踪日志记录级别,以减少添加到跟踪日志中的跟踪日志记录消息的数量。 在另一个实施例中,这些技术包括检测执行软件程序的条件,该程序保证对执行程序的跟踪记录级别的改变。 自适应跟踪记录模块根据检测到的条件自动更改执行程序的跟踪记录级别。 例如,自适应跟踪记录模块可以在检测到执行程序的死锁或其他异常状况时增加执行程序的跟踪记录级别。 通过在检测到异常情况后自动增加跟踪日志记录级别,可以向跟踪日志中写入附加的跟踪记录消息,以帮助诊断和故障排除。
    • 10. 发明申请
    • Adaptive region locking
    • 自适应区域锁定
    • US20070185872A1
    • 2007-08-09
    • US11346822
    • 2006-02-03
    • Eugene HoWilson Wai ChanTak WangAngelo PruscinoTolga Yurek
    • Eugene HoWilson Wai ChanTak WangAngelo PruscinoTolga Yurek
    • G06F17/30
    • G06F9/526G06F2209/522G06F2209/523
    • A method and apparatus for managing locks in a database system is provided. A master node grants a lock on a first resource and a group of resources that includes the first resource to a first requester node. The requester node receives a mapping corresponding to the group of resources that may indicate that a lock already exists for a second resource in the group. If the requester node desires a lock on a resource located in the group, the requester node grants itself the lock without notifying the master node. A second requester node requests a lock for a particular resource in the group of resources. The first requester node grants the lock on the particular resource and updates the mapping to indicate that a different node holds a lock for the particular resource.
    • 提供了一种用于管理数据库系统中的锁的方法和装置。 主节点向包括第一资源的第一资源和一组资源授予对第一请求者节点的锁定。 请求者节点接收对应于可以指示组中的第二资源的锁已经存在的资源组的映射。 如果请求者节点希望对位于组中的资源进行锁定,则请求者节点自己给予锁定而不通知主节点。 第二个请求者节点向资源组中的特定资源请求锁。 第一个请求者节点授予对特定资源的锁定,并更新映射以指示不同的节点持有特定资源的锁。