Match Document Document Title
9189536 Maintaining a relationship between two different items of data  
Data is stored persistently. At least two different items of the data are stored in two different non-conflicting regions or two different physical clusters. A relationship is maintained between...
9043295 Providing record-level alternate-index upgrade locking  
In one embodiment, a method includes receiving a request to perform an update on a base data set in a record-oriented file system, locate all alternate index (AIX) records for the base data set,...
9043352 Method for searching document objects on a network  
Methods for searching relationships between and among documents are detailed. One method includes steps for selecting one or more initial search items from a group consisting of: (a) document...
9037559 File system queue  
A method and system that enables operation of a file system-based queue that supports the efficient and fair distribution of messages among a plurality of processors.
9037558 Management of long-running locks and transactions on database tables  
Establishment of an exclusive lock on each of an outer database ownership table and an inner database ownership table is attempted. In response to establishing the exclusive lock on each of the...
9037557 Optimistic, version number based concurrency control for index structures with atomic, non-versioned pointer updates  
Methods, systems and computer program products for traversing a level in a search path in a tree data structure by recording a version number of a node on the search path, finding a child pointer...
9031923 System for accessing shared data using multiple application servers  
A system including multiple application servers for accessing shared data and a centralized control unit for centrally controlling a lock applied to the shared data by each of the application...
9026510 Configuration-less network locking infrastructure for shared file systems  
A network-based method for managing locks in a shared file system (SFS) for a group of hosts that does not require any configuration to identify a server for managing locks for the SFS. Each host...
9015136 Storing temporary state data in separate containers  
A temporary state service protocol is utilized by clients to temporarily store and access data within rows of a database between different requests made by end users. Each client creates and...
9015137 Creating and maintaining order of a log stream  
Provided are techniques for using a series of compare and swap operations to assign a Relative Byte Address (RBA) and a Logical Record Sequence Number (LRSN) to a log record. One or more log...
9009125 Creating and maintaining order of a log stream  
Provided are techniques for using a series of compare and swap operations to assign a Relative Byte Address (RBA) and a Logical Record Sequence Number (LRSN) to a log record. One or more log...
9009196 Discovery and client routing to database nodes  
Aspects of the subject matter described herein relate to database access. In aspects, a request for access to a database is received at a node of a database cluster. Also received at the node is...
8996484 Recursive lock-and-propagate operation  
A distributed database server receives an operation request including a flag to cause recursive lock-and-propagate operation, acquires a local lock, tests the operation locally and propagates the...
8990179 Time limited lock ownership  
Described herein are techniques for time limited lock ownership. In one embodiment, in response to receiving a request for a lock on a shared resource, the lock is granted and a lock lease period...
8984008 Re-use of binaries for multiple user accounts  
A computing device has multiple user profiles. While a particular user profile is the currently-active user profile of a computing device, the computing device determines whether a binary that is...
8977651 Method and apparatus for multi-process access to a linked-list  
Data is retrieved from a linked-list by locking the linked-list, retrieving data from an element in the linked-list, advancing to a subsequent element in the linked-list while a breakpoint is not...
8966491 System and method for implementing NUMA-aware reader-writer locks  
NUMA-aware reader-writer locks may leverage lock cohorting techniques to band together writer requests from a single NUMA node. The locks may relax the order in which the lock schedules the...
8965862 Directory oplock  
Current file systems may implement opportunistic locks on files that allow clients to locally cache file data, while promoting data consistency when multiple clients read/write the same file....
8966451 Identifying potential lock conditions in transactional software applications  
Systems, and products for testing a transactional software application which interacts with a database structure. The software application includes a plurality of application units, which are...
8965863 Scalable, adaptable, and manageable system for multimedia identification  
An architecture for a multimedia search system is described. To perform similarity matching of multimedia query frames against reference content, reference database comprising of a cluster index...
8954408 Allowing writes to complete without obtaining a write lock to a file  
Provided are a computer program product, system, and method for allowing writes to complete without obtaining a write lock to a file. A lock is provided to a first request, comprising a read or...
8953202 Image forming apparatus, information processing apparatus, image forming system, and method for forming images  
Image forming apparatuses are connected to a network. Each image forming apparatus communicates with remaining ones of the image forming apparatuses. An image forming section forms an image in...
8954409 Acquisition of multiple synchronization objects within a computing device  
In general, techniques of the present disclosure relate to synchronizing concurrent access to multiple portions of a data structure. In one example, a method includes, sequentially selecting a...
8954410 Multi-row transactions  
Techniques are provided for more efficient multi-row atomic, consistent, isolated and durable (ACID)-compliant transactions with snapshot isolation semantics (or just “multi-row transactions” for...
8949200 Methods for address book synchronization and subscription status notification  
The various disclosed techniques and equipment relate to synchronizing a subscriber's address books located in a portal and in the subscriber's mobile station, determining the subscription status...
8938423 Distributed management framework for personal attributes  
A technique for distributed management of attributes includes propagating attributes based upon attribute-granularity permissions. An example of a system according to the technique may include a...
8935220 Unified geographic database and method of creating, maintaining and using the same  
The present invention involves a Universal Geographic Database (“UGD”). The UGD is an automated, central or distributed, registry of real-world locations and location-related information for...
8935225 Persistent data storage techniques  
A database is maintained that stores data persistently. Tasks are accepted from task sources. At least some of the tasks have competing requirements for use of regions of the database. Each of the...
8930333 Lockahead for simultaneous readers and writers in a clustered file system  
A system and method for efficiently performing simultaneous access of files in a clustered file system. A cluster of nodes is coupled to a data storage medium. A first node executes a first thread...
8924370 Efficient distributed lock manager  
In a cluster where multiple database nodes are synchronized by a distributed lock manager, a process that includes one or more messages that are sent from one or more nodes to a distributed lock...
8914345 Systems and methods for host communication in a clustered file system  
A computer-implemented method for host communication in a clustered file system may include 1) identifying a cluster file system site comprising at least one host that performs data operations on...
8914344 Service manager source code control system  
A method for controlling the user interfaces within a workflow manager to limit access to configuration and development files in the workflow manager is provided. The method comprises receiving...
8898671 Processor that executes a plurality of threads by promoting efficiency of transfer of data that is shared with the plurality of threads  
Provide is a processor that can maintain a dependency relationship between a plurality of instructions and one read instruction. The processor comprises: a setting unit configured to set, when an...
8898127 Device and method for acquiring resource lock  
A lock control device receives a lock acquisition request from an application and transmits a lock acquisition request to a DBMS, receives a lock acquisition response from the DBMS, and transmits...
8892594 System and method for search with the aid of images associated with product categories  
The present application describes performing a user initiated search query comprising receiving user input comprising description details of at least one desired object, retrieving a plurality of...
8892531 Scalable file management for a shared file system  
Managing a shared file system comprising a directory and files stored on a multiple storage devices shared by plural processing nodes, is provided. A plurality of parallel directory traversal...
8892536 Methods for resolving a hang in a database system  
A method for resolving a hang in a database system includes receiving a symbolic graph having a plurality of nodes, where each node represents a database session involved in the hang during a...
8880488 Efficient extent-based B-tree insertion  
A technique manages access to a B-tree structure within a data storage apparatus. The B-tree structure maintains mappings of data blocks of a file system to data blocks of a snapshot storage area....
8874593 Testing data silo  
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for creating a data silo and testing with a data silo including, for example, initiating a test...
8868529 N-dimensional locking  
An apparatus, method and computer-readable storage medium for determining intent object preferences for locking intent objects, and grouping the intent objects into sets based on the intent object...
8868531 Concurrent access methods for tree data structures  
In one embodiment, non-transitory computer-readable medium stores instructions for implementing a file system, which include operations for acquiring an exclusive lock on a first node in an...
8868530 Method and system for managing locks in storage systems  
Machine implemented method and system for a networked storage system having a first storage system node providing storage space to a client computing system at a first storage device and a second...
8869166 Effective management of blocked-tasks in preemptible read-copy update  
A technique for managing read-copy update readers that have been preempted while executing in a read-copy update read-side critical section. A single blocked-tasks list is used to track preempted...
8862561 Detecting read/write conflicts  
A method of managing read/write requests in a non-transitory data storage system includes receiving a read/write request for data stored in the data storage system and processing the read/write...
8862628 Method and system for storing data in a database  
A method allows one to store in a parallel way branches and nodes of a hierarchy into a database by creating queues. Each queue has a status and a unlock item indicating if a superior node has...
8849762 Restoring computing environments, such as autorecovery of file systems at certain points in time  
A method and system for restoring a computing environment from a secondary data store, and facilitating such restoration, is described. In some examples, the system copies the configuration...
8849780 System and method for automation of consistent lock management  
A system and method for automation of consistent lock management, wherein a shared resource is accessed through an accessor object. An accessor object class includes at least one const read access...
8825616 Execution of database queries including filtering  
A query processing system has a query processor and a data manager. The query processor calls the data manager to carry out data access for a query including a filtering operation. The data...
8825594 Caching infrastructure  
Example systems and methods are directed at maintaining and retrieving presence metadata. One example method includes receiving a request from a first client to edit a document file, and sending...
8819005 System for automated computer support  
Systems and methods for providing automated computer support are described herein. One described method comprises receiving a plurality of snapshots from a plurality of computers, storing the...