Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

39results about How to "Maintain data consistency" patented technology

Method and system to make a read-only file system appear to be writeable

A writeable clone of a read-only dataset, e.g., an RPPI of a file system, a mirror file system, etc., is created to make the read-only dataset appear from a client's perspective to be modifiable / writeable, yet without actually modifying the read-only dataset itself. Any change attempted to be made on the read-only dataset is stored in the writeable clone. In one embodiment, the clone shares data blocks with the read-only dataset.
Owner:NETWORK APPLIANCE INC

Undoing user actions in a client program

Methods and apparatus, including computer program products, implementing techniques for undoing user actions in a client program. The techniques include displaying a user interface in a client program, the user interface having a plurality of controls, the plurality of controls including multiple types of controls, each control having a state; for each control in the plurality of controls, storing the state of the control as a first state for the control; receiving user input comprising a change to the state of a control in the plurality of controls; updating the state of the control based on the user input; storing the updated state of the control as a second state for the control; receiving user input comprising a request to undo the change; and restoring the state of the control to reflect the first state for the control.
Owner:SAP AG

Cache memory and method of controlling the same

It is an object of the present invention to reduce output of a WAIT signal to maintain data consistency to effectively process subsequent memory access when there is no subsequent memory access in case of miss hit in a cache memory having a multi-stage pipeline structure. A cache memory according to the present invention performs update processing of a tag memory and a data memory and decides whether or not there is a subsequent memory access upon decision by a hit decision unit that an input address is a miss hit. Upon decision that there is a subsequent memory access, a controller outputs a WAIT signal to generate a pipeline stall for the pipeline processing of the processor to the processor, while the controller does not output a WAIT signal upon decision that there is no subsequent memory access.
Owner:RENESAS ELECTRONICS CORP

Distributed system transaction management method and device

The invention discloses a distributed system transaction management method and device. The method comprises the steps of: when a message sent by an active party node is received, carrying out storage on the message, marking a message state as a to-be-confirmed state, and sending a storage result of the message to the active party node; when an indication message sent by the active party node and used for indicating that a service operation is executed is received, updating the message state into a to-be-sent state; after the active party node executes the service operation, when a service operation result returned by the active party node is received, if the service operation result is that a service is successfully processed, sending the message to a passive party node, and updating the message state into a sent state; and after the passive party node executes the service operation, when a service operation result returned by the passive party node is that the service is failed in processing, sending the service operation result to the active party node and indicating the active party node to carry out a rolling-back operation. The method and the device which are disclosed by the invention achieve an effect of keeping consistency of data between the active party node and the passive party node.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Systems and methods for consensus protocol selection based on delay analysis

A method for selecting a consensus protocol comprises separating a consensus protocol into one or more communication steps, wherein the consensus protocol is useable to substantially maintain data consistency between nodes in a distributed computing system, and wherein a communication step comprises a message transfer, attributable to the consensus protocol, in the distributed computing system, and computing an estimated protocol-level delay based on one or more attributes associated with the separated communication steps of the consensus protocol.
Owner:IBM CORP

Method for creating avatars for protecting sensitive data

The present invention relates to a method for creating avatars from an initial sensitive data set stored in a database of a computer system, the initial data comprising attributes relating to a plurality of individuals, the method comprising: a) choosing a number {k} of nearest neighbors to be used from all the individuals in the initial data set, b) identifying, for attributes relating to a given individual, the k nearest neighbors from among the other individuals in the data set, c) generating, for at least one attribute relating to said individual, a new attribute value from quantities which are characteristic of the attribute in the identified k nearest neighbors and weighted by a coefficient, and d) creating avatar data comprising the new attribute value(s), so as to ensure the sensitive data relating to the individual are non-identifiable.
Owner:BIG DATA SANTE

Method and apparatus for enabling consistent ancillary disk array storage device operations with respect to a main application

A method and apparatus for enhancing data recovery in data processing systems in which applications span multiple logical devices. A data processing system includes multiple standard devices for storing data and corresponding BCV devices for, in one mode, operating as mirrors of those standard devices. If certain of those BCV devices are associated with the same data set, a CONSISTENT SPLIT operation controls the way in which each of these BCV devices is detached from its corresponding standard device and made available to another application. Each command to an application for controlling the BCV devices is translated into one or more request data structures that identify the BCV devices as being involved in a consistent split operation and that establishes a system lock out for those particular devices during which those devices are split from their respective devices in a consistent manner.
Owner:EMC IP HLDG CO LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products