Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

912 results about "Shard" patented technology

A database shard is a horizontal partition of data in a database or search engine. Each individual partition is referred to as a shard or database shard. Each shard is held on a separate database server instance, to spread load.

System and method for limiting fragmentation

A method and system are disclosed for controlling the storage of data in a storage device to reduce fragmentation. The method may include a controller of a storage device receiving data for storage in non-volatile memory, proactively preventing fragmentation by only writing an amount of sequentially addressed logical groups of data into a main storage area of the storage device, such as multi-level cell (MLC) flash memory, and reactively defragmenting data previously written into the MLC memory when a trigger event is reached. The system may include a storage device with a controller configured to perform the method noted above, where the thresholds for minimum sequential writes into MLC, and for scanning the memory for fragmented data and removing fragmentation by re-writing the fragmented data already in MLC into new MLC blocks, may be fixed or variable.
Owner:SANDISK TECH LLC

Hot spot analysis of IMS databases

A method and system for analyzing the physical characteristics of database records, such as in IMS databases. The information obtained during this analysis may then be used to perform a more efficient reorganization or restructuring of the database. In one embodiment, the method involves tracing the database retrieval process to collect physical location information for each segment of each database record in an IMS database. The database retrieval process for each database record may begin at the root segment of the database record and traverse the child segments of the database record, preferably in hierarchical order, e.g. top to bottom, left to right. The database retrieval process identifies the segment code causing the first reference to a block and the number of segments retrieved from the block before fetching a new block. The physical location information for each segment of each database record in the IMS database may be analyzed to identify one or more segments which represent a fragmented boundary twin chain. Two calculations may be performed for those segments which are boundary twin chains. If the total number of physical blocks currently used to hold the boundary twin chain exceeds the minimum number of physical blocks needed to hold the boundary twin chain by a pre-determined amount, the boundary twin chain may be determined to be fragmented. Similar calculations may be performed for the database record. A reorganization recommendation list for the database record may be created in response to determining whether the database record is fragmented.
Owner:BMC SOFTWARE

Optimized deploying method based on virtual cluster online migration

InactiveCN106020934AOvercome the defect that the expected amount of requested resources cannot be obtainedReduce performance lossProgram initiation/switchingSoftware simulation/interpretation/emulationVirtualizationShard
The invention relates to an optimized deploying method based on virtual cluster online migration, and belongs to the cloud computing technical field; the method comprises the following steps: using a management module to connect with a management cluster node, wherein the management module is provided with an overall monitoring module, an algorithm forming module, a migration planning module and a migration driving module; using the overall monitoring module to receive the cluster node and virtual machine information data in the cloud computing environment, and sending the information to the algorithm forming module so as to predict future loads and build a long term load performance model; planning a deploying strategy for the virtual cluster, and sorting the virtual machines in the virtual cluster into different host nodes of the cluster, thus allowing the virtual machines to fully utilize the host resources in the cluster when the virtual cluster migration is finished. The novel method can solve the problems that the virtualization technology may easily cause resource fragments, and can solve the defects that the virtual machines cannot obtain the expected requesting resource quantity when the dynamic loading demands and the virtual machines are combined, thus reducing virtual machine performance loss in the cluster nodes, and improving resource utilization rate.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Detecting a file fragmentation point for reconstructing fragmented files using sequential hypothesis testing

File carving is a technique whereby data files are extracted from a digital device without the assistance of file tables or other disk meta-data, and can therefore be used to recover files that are fragmented. Sequential hypothesis testing procedures are used to detect a fragmentation point of a file by sequentially comparing adjacent pairs of blocks from the starting block of a file until the fragmentation point is reached. The detected fragmentation point can be used to help recover the fragmented file. Such a serial analysis helps to minimize errors and improve performance.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Data processing method, system and device based on node group and medium

The invention relates to a data processing method, system and device based on a node group and a medium. The method is executed by one first node in a node group, and comprises the following steps: constructing a mapping relationship according to a local first user identifier, wherein the mapping relationship is used for mapping the first user identifier into a target value; carrying out homomorphic encryption on the mapping parameters of the mapping relation to obtain a mapping parameter ciphertext, and transmitting the mapping parameter ciphertext to a second node in the node group; receiving a reference value and fragment information correspondingly fed back by the second node; when a result obtained after homomorphic decryption is performed on the reference value is consistent with a target value, retaining the fragment information fed back corresponding to the reference value, triggering one of the first nodes in the node group to collect the fragment information retained in eachof the first nodes, and performing aggregating according to the collected fragment information to obtain a user identifier intersection between the nodes in the node group and aggregating user data corresponding to the user identifier intersection. According to the method, the data security during intersection solving of multi-party data can be ensured.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method and device for storing length-various field of embedded database

The invention discloses a realization method and a device of length-varying field memory of an imbedded database, which comprises: allocating a large memory block as an exclusive memory area of a length-varying field for each datasheet of a database, dividing the memory block into a plurality of BLOCKS with fixed sizes which are connected pre-and post through an index to form a BLOCK chain. When real length of a length-varying field is less than or equals to one BLOCK length, one BLOCK is allocated to store the length-varying field; when real length of a length-varying field is more than one BLOCK length, a plurality of BLOCKS are allocated to form a BLOCK chain to store the length-varying field. The invention can effectively solve the memory fragment problem and improves memory utility rate.
Owner:ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products