会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • TECHNIQUES FOR HANDLING LOCK-RELATED INCONSISTENCIES
    • 处理与锁定相关的不良情况的技术
    • US20060288144A1
    • 2006-12-21
    • US11156318
    • 2005-06-16
    • Wilson ChanAngelo PruscinoStefan RoeschMichael ZollTolga YurekEugene Ho
    • Wilson ChanAngelo PruscinoStefan RoeschMichael ZollTolga YurekEugene Ho
    • G06F12/14
    • G06F9/526G06F2209/522Y10S707/99938
    • Techniques are described herein for handling lock-related inconsistencies. As mentioned above, such inconsistencies occur when two or more sets of lock information, relating to the same resource, convey inconsistent information about locks requested and/or granted on that resource. In general, the techniques involve causing the locally-stored lock information about a resource to be sent to the master node of the resource. The master node of the resource compares the lock information thus received against the lock information maintained by the master node. Based on the comparison, the master node determines how to resolve the lock-related inconsistency, and sends messages to those nodes that need to change their local lock information for the resource. Once all of the lock information has been made consistent, the resource made available for access. Because the lock-related inconsistency is resolved without restarting nodes, the availability required to correct the inconsistency.
    • 本文描述了处理与锁相关的不一致性的技术。 如上所述,当与相同资源相关的两组或多组锁定信息传达关于在该资源上请求和/或授予的锁定的不一致的信息时,会发生这种不一致。 一般来说,这些技术涉及将关于资源的本地存储的锁定信息发送到资源的主节点。 资源的主节点将由此接收的锁定信息与由主节点维护的锁定信息进行比较。 基于比较,主节点确定如何解决与锁相关的不一致,并向需要更改其资源的本地锁信息的那些节点发送消息。 一旦所有的锁信息一致,该资源就可用于访问。 由于锁定相关的不一致性在不重新启动节点的情况下得到解决,所以需要更改不一致的可用性。
    • 3. 发明授权
    • Adaptive region locking
    • 自适应区域锁定
    • US08103642B2
    • 2012-01-24
    • US11346822
    • 2006-02-03
    • Eugene HoWilson Wai Shun ChanTak Fung WangAngelo PruscinoTolga Yurek
    • Eugene HoWilson Wai Shun ChanTak Fung WangAngelo PruscinoTolga Yurek
    • G06F7/00G06F17/00G06F15/173
    • G06F9/526G06F2209/522G06F2209/523
    • A method and apparatus for managing locks in a database system is provided. A master node grants a lock on a first resource and a group of resources that includes the first resource to a first requester node. The requester node receives a mapping corresponding to the group of resources that may indicate that a lock already exists for a second resource in the group. If the requester node desires a lock on a resource located in the group, the requester node grants itself the lock without notifying the master node. A second requester node requests a lock for a particular resource in the group of resources. The first requester node grants the lock on the particular resource and updates the mapping to indicate that a different node holds a lock for the particular resource.
    • 提供了一种用于管理数据库系统中的锁的方法和装置。 主节点向包括第一资源的第一资源和一组资源授予对第一请求者节点的锁定。 请求者节点接收对应于可以指示组中的第二资源的锁已经存在的资源组的映射。 如果请求者节点希望对位于组中的资源进行锁定,则请求者节点自己给予锁定而不通知主节点。 第二个请求者节点向资源组中的特定资源请求锁。 第一个请求者节点授予对特定资源的锁定,并更新映射以指示不同的节点持有特定资源的锁。
    • 4. 发明申请
    • TECHNIQUES FOR ADAPTIVE TRACE LOGGING
    • 自适应追踪记录技术
    • US20110067008A1
    • 2011-03-17
    • US12559338
    • 2009-09-14
    • Deepti SrivastavaWilson ChanJohn HsuEugene HoTolga YurekBeverly ZaneAngelo Pruscino
    • Deepti SrivastavaWilson ChanJohn HsuEugene HoTolga YurekBeverly ZaneAngelo Pruscino
    • G06F9/44
    • G06F11/3636G06F11/3466G06F2201/865
    • Techniques for adaptive trace logging include, in one embodiment, obtaining input data on trace logging behavior and computing resources used by trace logging. Based on the obtained input data, an adaptive trace logging module automatically takes action at runtime to reduce the amount of computing resources consumed by tracing logging. For example, the action taken may include decreasing a trace logging level of an executing software program to reduce the number of trace logging messages added to a trace log. In another embodiment, the techniques include detecting a condition of an executing software program that warrants a change to a trace logging level of the executing program. The adaptive trace logging module automatically changes the trace logging level of the executing program as-needed for the detected condition. For example, the adaptive trace logging module may increase the trace logging level of an executing program upon detecting a deadlock or other abnormal condition of the executing program. By automatically increasing the trace logging level upon detecting an abnormal condition, additional trace logging messages may be written to a trace log aiding diagnosis and troubleshooting of the condition.
    • 在一个实施例中,用于自适应跟踪记录的技术包括获取跟踪记录行为和跟踪记录使用的计算资源的输入数据。 基于获得的输入数据,自适应跟踪记录模块在运行时自动执行操作,以减少跟踪记录所消耗的计算资源量。 例如,采取的措施可能包括减少执行软件程序的跟踪日志记录级别,以减少添加到跟踪日志中的跟踪日志记录消息的数量。 在另一个实施例中,这些技术包括检测执行软件程序的条件,该程序保证对执行程序的跟踪记录级别的改变。 自适应跟踪记录模块根据检测到的条件自动更改执行程序的跟踪记录级别。 例如,自适应跟踪记录模块可以在检测到执行程序的死锁或其他异常状况时增加执行程序的跟踪记录级别。 通过在检测到异常情况后自动增加跟踪日志记录级别,可能会向跟踪记录中写入附加的跟踪记录消息,以帮助诊断和排除故障。
    • 5. 发明授权
    • Techniques for adaptive trace logging
    • 自适应跟踪记录技术
    • US09529694B2
    • 2016-12-27
    • US12559338
    • 2009-09-14
    • Deepti SrivastavaWilson ChanJohn HsuEugene HoTolga YurekBeverly ZaneAngelo Pruscino
    • Deepti SrivastavaWilson ChanJohn HsuEugene HoTolga YurekBeverly ZaneAngelo Pruscino
    • G06F9/44G06F11/36G06F11/34
    • G06F11/3636G06F11/3466G06F2201/865
    • Techniques for adaptive trace logging include, in one embodiment, obtaining input data on trace logging behavior and computing resources used by trace logging. Based on the obtained input data, an adaptive trace logging module automatically takes action at runtime to reduce the amount of computing resources consumed by tracing logging. For example, the action taken may include decreasing a trace logging level of an executing software program to reduce the number of trace logging messages added to a trace log. In another embodiment, the techniques include detecting a condition of an executing software program that warrants a change to a trace logging level of the executing program. The adaptive trace logging module automatically changes the trace logging level of the executing program as-needed for the detected condition. For example, the adaptive trace logging module may increase the trace logging level of an executing program upon detecting a deadlock or other abnormal condition of the executing program. By automatically increasing the trace logging level upon detecting an abnormal condition, additional trace logging messages may be written to a trace log aiding diagnosis and troubleshooting of the condition.
    • 在一个实施例中,用于自适应跟踪记录的技术包括获取跟踪记录行为和跟踪记录使用的计算资源的输入数据。 基于获得的输入数据,自适应跟踪记录模块在运行时自动执行操作,以减少跟踪记录所消耗的计算资源量。 例如,采取的措施可能包括减少执行软件程序的跟踪日志记录级别,以减少添加到跟踪日志中的跟踪日志记录消息的数量。 在另一个实施例中,这些技术包括检测执行软件程序的条件,该程序保证对执行程序的跟踪记录级别的改变。 自适应跟踪记录模块根据检测到的条件自动更改执行程序的跟踪记录级别。 例如,自适应跟踪记录模块可以在检测到执行程序的死锁或其他异常状况时增加执行程序的跟踪记录级别。 通过在检测到异常情况后自动增加跟踪日志记录级别,可以向跟踪日志中写入附加的跟踪记录消息,以帮助诊断和故障排除。
    • 6. 发明申请
    • Adaptive region locking
    • 自适应区域锁定
    • US20070185872A1
    • 2007-08-09
    • US11346822
    • 2006-02-03
    • Eugene HoWilson Wai ChanTak WangAngelo PruscinoTolga Yurek
    • Eugene HoWilson Wai ChanTak WangAngelo PruscinoTolga Yurek
    • G06F17/30
    • G06F9/526G06F2209/522G06F2209/523
    • A method and apparatus for managing locks in a database system is provided. A master node grants a lock on a first resource and a group of resources that includes the first resource to a first requester node. The requester node receives a mapping corresponding to the group of resources that may indicate that a lock already exists for a second resource in the group. If the requester node desires a lock on a resource located in the group, the requester node grants itself the lock without notifying the master node. A second requester node requests a lock for a particular resource in the group of resources. The first requester node grants the lock on the particular resource and updates the mapping to indicate that a different node holds a lock for the particular resource.
    • 提供了一种用于管理数据库系统中的锁的方法和装置。 主节点向包括第一资源的第一资源和一组资源授予对第一请求者节点的锁定。 请求者节点接收对应于可以指示组中的第二资源的锁已经存在的资源组的映射。 如果请求者节点希望对位于组中的资源进行锁定,则请求者节点自己给予锁定而不通知主节点。 第二个请求者节点向资源组中的特定资源请求锁。 第一个请求者节点授予对特定资源的锁定,并更新映射以指示不同的节点持有特定资源的锁。
    • 7. 发明授权
    • Cluster delta push
    • 集群增量推
    • US07921090B2
    • 2011-04-05
    • US11450179
    • 2006-06-09
    • Eugene HoKotaro OnoNeil MacnaughtonMichael ZollHerbert van den Bergh
    • Eugene HoKotaro OnoNeil MacnaughtonMichael ZollHerbert van den Bergh
    • G06F17/00G06F7/00G06F15/16
    • G06F17/30362
    • Methods and apparatuses for providing access to data in a cluster database are described. Embodiments of the invention include identifying situations in which many nodes require relatively equal access to a data block, and taking appropriate measures to improve the performance of the system in these situations. For example, a node may automatically downgrade its lock from an X lock to an S lock as soon as it has finished a modification of the data. S locks are sent to other nodes in the system as soon as a modification is complete. Modifications to the data are also sent to other nodes in the system as soon as a modification is complete. Depending on the size of the data modification, the entire data block may be sent, or only the modifications to the data may be sent.
    • 描述了用于提供对群集数据库中的数据的访问的方法和装置。 本发明的实施例包括识别许多节点需要对数据块相对相等的访问的情况,并且在这些情况下采取适当的措施来提高系统的性能。 例如,一旦节点完成数据的修改,节点就可以自动将其锁定从X锁降级到S锁。 一旦修改完成,S锁将被发送到系统中的其他节点。 一旦修改完成,对数据的修改也将发送到系统中的其他节点。 根据数据修改的大小,可以发送整个数据块,或者仅可以发送对数据的修改。
    • 8. 发明申请
    • Cluster delta push
    • 集群增量推
    • US20070288463A1
    • 2007-12-13
    • US11450179
    • 2006-06-09
    • Eugene HoKotaro OnoNeil MacnaughtonMichael ZollHerbert van den Bergh
    • Eugene HoKotaro OnoNeil MacnaughtonMichael ZollHerbert van den Bergh
    • G06F17/30
    • G06F17/30362
    • Methods and apparatuses for providing access to data in a cluster database are described. Embodiments of the invention include identifying situations in which many nodes require relatively equal access to a data block, and taking appropriate measures to improve the performance of the system in these situations. For example, a node may automatically downgrade its lock from an X lock to an S lock as soon as it has finished a modification of the data. S locks are sent to other nodes in the system as soon as a modification is complete. Modifications to the data are also sent to other nodes in the system as soon as a modification is complete. Depending on the size of the data modification, the entire data block may be sent, or only the modifications to the data may be sent.
    • 描述了用于提供对群集数据库中的数据的访问的方法和装置。 本发明的实施例包括识别许多节点需要对数据块相对相等的访问的情况,并且在这些情况下采取适当的措施来提高系统的性能。 例如,一旦节点完成数据的修改,节点就可以自动将其锁定从X锁降级到S锁。 一旦修改完成,S锁将被发送到系统中的其他节点。 一旦修改完成,对数据的修改也将发送到系统中的其他节点。 根据数据修改的大小,可以发送整个数据块,或者仅可以发送对数据的修改。
    • 9. 发明申请
    • Techniques for improved read-write concurrency
    • 改进的读写并发技术
    • US20080071997A1
    • 2008-03-20
    • US11521908
    • 2006-09-15
    • Juan LoaizaNeil MacNaughtonEugene HoVipin GokhaleKiran GoyalTirthankar Lahiri
    • Juan LoaizaNeil MacNaughtonEugene HoVipin GokhaleKiran GoyalTirthankar Lahiri
    • G06F13/00G06F12/14
    • G06F9/526G06F17/30362G06F2209/523
    • Techniques are provided for performing changes to a resource governed by a locking mechanism. An entity (such as a server instance in a database system cluster) requests permission to modify the resource. In response to the request, the entity receives a first lock on the resource, which grants permission to perform the change to the resource without making the change permanent. After receiving the first lock, the entity performs the change to a copy of the resource that resides in shared memory without making another copy of the resource. After performing the change and until receiving permission to make the change permanent, the entity prevents the change to the resource from becoming permanent. After performing the change, the entity receives a second lock on the resource, which grants the entity permission to make the change permanent. After receiving the second lock, the entity ceases to prevent the change to the resource from becoming permanent.
    • 提供了用于对由锁定机构管理的资源进行更改的技术。 实体(如数据库系统集群中的服务器实例)请求修改资源的权限。 响应于该请求,实体在资源上接收到第一个锁定,该权限允许对资源执行更改,而不会使更改永久性。 在接收到第一个锁定之后,实体对驻留在共享内存中的资源的副本执行更改,而不创建资源的另一个副本。 执行变更后,直到获得变更永久性的许可,实体将防止资源变为永久性。 执行更改后,实体将在资源上收到第二个锁定,该实体授予实体永久性更改权限。 收到第二个锁后,实体停止防止资源变为永久性。