Patents by Inventor Xiaoqiao Meng
Xiaoqiao Meng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11956330Abstract: Methods, systems and computer program products for data fetching in a networked computing environment. In one embodiment, the method comprises receiving a request from an analytical node for a set of data for a defined job, and identifying in networked storage a subset of the data for the job. The subset of data is loaded to the analytical node based on the sequence in which the data are projected to be accessed in the job. In an embodiment, the request includes a specification for the job, and the specification is analyzed to identify the subset of data. In one embodiment, the subset of data is identified by identifying another job having a relationship to the defined job, and identifying the data used for that other job. In an embodiment, the networked computing environment is a cloud computing environment, and the defined job is an analytics job.Type: GrantFiled: December 30, 2020Date of Patent: April 9, 2024Assignee: International Business Machines CorporationInventors: Xiaoqiao Meng, Wei Tan, Guohui Wang, Zhe Zhang
-
Patent number: 11356541Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: GrantFiled: September 30, 2019Date of Patent: June 7, 2022Assignee: International Business Machines CorporationInventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G. M. Richards, Sivasakthi Thirugnanapandi
-
Patent number: 11212374Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: GrantFiled: September 30, 2019Date of Patent: December 28, 2021Assignee: International Business Machines CorporationInventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G. M. Richards, Sivasakthi Thirugnanapandi
-
Patent number: 11182084Abstract: Various embodiments manage dynamic memory allocation data. In one embodiment, a set of memory allocation metadata is extracted from a memory heap space. Process dependent information and process independent information is identified from the set of memory allocation metadata based on the set of memory allocation metadata being extracted. The process dependent information and the process independent information at least identify a set of virtual memory addresses available in the memory heap space and a set of virtual memory addresses allocated to a process associated with the memory heap space. A set of allocation data associated with the memory heap space is stored in a persistent storage based on the process dependent information and the process independent information having been identified. The set of allocation data includes the process independent allocation information and a starting address associated with the memory heap space.Type: GrantFiled: February 17, 2020Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Michel Hack, Xiaoqiao Meng, Jian Tan, Yandong Wang, Li Zhang
-
Publication number: 20210120092Abstract: Methods, systems and computer program products for data fetching in a networked computing environment. In one embodiment, the method comprises receiving a request from an analytical node for a set of data for a defined job, and identifying in networked storage a subset of the data for the job. The subset of data is loaded to the analytical node based on the sequence in which the data are projected to be accessed in the job. In an embodiment, the request includes a specification for the job, and the specification is analyzed to identify the subset of data. In one embodiment, the subset of data is identified by identifying another job having a relationship to the defined job, and identifying the data used for that other job. In an embodiment, the networked computing environment is a cloud computing environment, and the defined job is an analytics job.Type: ApplicationFiled: December 30, 2020Publication date: April 22, 2021Inventors: Xiaoqiao Meng, Wei Tan, Guohui Wang, Zhe Zhang
-
Patent number: 10931776Abstract: Methods, systems and computer program products for data fetching in a networked computing environment. In one embodiment, the method comprises receiving a request from an analytical node for a set of data for a defined job, and identifying in networked storage a subset of the data for the job. The subset of data is loaded to the analytical node based on the sequence in which the data are projected to be accessed in the job. In an embodiment, the request includes a specification for the job, and the specification is analyzed to identify the subset of data. In one embodiment, the subset of data is identified by identifying another job having a relationship to the defined job, and identifying the data used for that other job. In an embodiment, the networked computing environment is a cloud computing environment, and the defined job is an analytics job.Type: GrantFiled: December 31, 2013Date of Patent: February 23, 2021Assignee: International Business Machines CorporationInventors: Xiaoqiao Meng, Wei Tan, Guohui Wang, Zhe Zhang
-
Publication number: 20200183596Abstract: Various embodiments manage dynamic memory allocation data. In one embodiment, a set of memory allocation metadata is extracted from a memory heap space. Process dependent information and process independent information is identified from the set of memory allocation metadata based on the set of memory allocation metadata being extracted. The process dependent information and the process independent information at least identify a set of virtual memory addresses available in the memory heap space and a set of virtual memory addresses allocated to a process associated with the memory heap space. A set of allocation data associated with the memory heap space is stored in a persistent storage based on the process dependent information and the process independent information having been identified. The set of allocation data includes the process independent allocation information and a starting address associated with the memory heap space.Type: ApplicationFiled: February 17, 2020Publication date: June 11, 2020Applicant: International Business Machines CorporationInventors: Michel HACK, Xiaoqiao MENG, Jian TAN, Yandong WANG, Li ZHANG
-
Patent number: 10592131Abstract: Various embodiments manage dynamic memory allocation data. In one embodiment, a set of memory allocation metadata is extracted from a memory heap space. Process dependent information and process independent information is identified from the set of memory allocation metadata based on the set of memory allocation metadata being extracted. The process dependent information and the process independent information at least identify a set of virtual memory addresses available in the memory heap space and a set of virtual memory addresses allocated to a process associated with the memory heap space. A set of allocation data associated with the memory heap space is stored in a persistent storage based on the process dependent information and the process independent information having been identified. The set of allocation data includes the process independent allocation information and a starting address associated with the memory heap space.Type: GrantFiled: October 27, 2017Date of Patent: March 17, 2020Assignee: International Business Machines CorporationInventors: Michel Hack, Xiaoqiao Meng, Jian Tan, Yandong Wang, Li Zhang
-
Publication number: 20200028942Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: September 30, 2019Publication date: January 23, 2020Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20200028943Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: September 30, 2019Publication date: January 23, 2020Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Patent number: 10521393Abstract: A method, system and computer program product for remote direct memory access (RDMA) optimized producer-consumer message processing in a messaging hub is provided. The method includes initializing a shared memory region in memory of a host server hosting operation of a messaging hub. The initialization provides for a control portion and one or more data portions, the control portion storing an index to an available one of the data portions. The method also includes transmitting to a message producer an address of the shared memory region and receiving a message in one of the data portions of the shared memory region from the message producer by way of an RDMA write operation on a network interface of the host server. Finally, the method includes retrieving the message from the one of the data portions and processing the message in the messaging hub in response to the receipt of the message.Type: GrantFiled: July 4, 2018Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Yuqing Gao, Xavier R. Guerin, Xiaoqiao Meng, Tiia Salo
-
Patent number: 10348868Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: GrantFiled: December 13, 2017Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G. M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20180329860Abstract: A method, system and computer program product for remote direct memory access (RDMA) optimized producer-consumer message processing in a messaging hub is provided. The method includes initializing a shared memory region in memory of a host server hosting operation of a messaging hub. The initialization provides for a control portion and one or more data portions, the control portion storing an index to an available one of the data portions. The method also includes transmitting to a message producer an address of the shared memory region and receiving a message in one of the data portions of the shared memory region from the message producer by way of an RDMA write operation on a network interface of the host server. Finally, the method includes retrieving the message from the one of the data portions and processing the message in the messaging hub in response to the receipt of the message.Type: ApplicationFiled: July 4, 2018Publication date: November 15, 2018Inventors: Yuqing Gao, Xavier R. Guerin, Xiaoqiao Meng, Tiia Salo
-
Patent number: 10083193Abstract: A method to share remote DMA (RDMA) pointers to a key-value store among a plurality of clients. The method allocates a shared memory and accesses the key-value store with a key from a client and receives an information from the key-value store. The method further generates a RDMA pointer from the information, maps the key to a location in the shared memory, and generates a RDMA pointer record at the location. The method further stores the RDMA pointer and the key in the RDMA pointer record and shares the RDMA pointer record among the plurality of clients.Type: GrantFiled: January 9, 2015Date of Patent: September 25, 2018Assignee: International Business Machines CorporationInventors: Shicong Meng, Xiaoqiao Meng, Jian Tan, Yandong Wang, Li Zhang
-
Patent number: 10019408Abstract: A method, system and computer program product for remote direct memory access (RDMA) optimized producer-consumer message processing in a messaging hub is provided. The method includes initializing a shared memory region in memory of a host server hosting operation of a messaging hub. The initialization provides for a control portion and one or more data portions, the control portion storing an index to an available one of the data portions. The method also includes transmitting to a message producer an address of the shared memory region and receiving a message in one of the data portions of the shared memory region from the message producer by way of an RDMA write operation on a network interface of the host server. Finally, the method includes retrieving the message from the one of the data portions and processing the message in the messaging hub in response to the receipt of the message.Type: GrantFiled: September 15, 2016Date of Patent: July 10, 2018Assignee: International Business Machines CorporationInventors: Yuqing Gao, Xavier R. Guerin, Xiaoqiao Meng, Tiia Salo
-
Patent number: 9946684Abstract: Embodiments relate to methods, systems and computer program products for cache management in a Remote Direct Memory Access (RDMA) data store. Aspects include receiving a request from a remote computer to access a data item stored in the RDMA data store and creating a lease including a local expiration time for the data item. Aspects further include creating a remote pointer to the data item, wherein the remote pointer includes a remote expiration time and transmitting the remote pointer to the remote computer, wherein the lease is an agreement that that the remote computer can perform RDMA reads on the data item until the remote expiration time.Type: GrantFiled: June 17, 2015Date of Patent: April 17, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xiaoqiao Meng, Jian Tan, Yandong Wang, Li Zhang
-
Publication number: 20180103125Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: December 13, 2017Publication date: April 12, 2018Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20180103124Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: December 13, 2017Publication date: April 12, 2018Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20180103126Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: December 13, 2017Publication date: April 12, 2018Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Patent number: 9940301Abstract: Embodiments relate to methods, systems and computer program products for cache management in a Remote Direct Memory Access (RDMA) data store. Aspects include receiving a request from a remote computer to access a data item stored in the RDMA data store and creating a lease including a local expiration time for the data item. Aspects further include creating a remote pointer to the data item, wherein the remote pointer includes a remote expiration time and transmitting the remote pointer to the remote computer, wherein the lease is an agreement that that the remote computer can perform RDMA reads on the data item until the remote expiration time.Type: GrantFiled: January 9, 2015Date of Patent: April 10, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xiaoqiao Meng, Jian Tan, Yandong Wang, Li Zhang