Repair Consistency Errors Patents (Class 707/691)
-
Publication number: 20140032505Abstract: A method and a non-transitory computer readable medium that stores instructions for converting a first file of a first format to a second file of a second format that differs from the first format; wherein the converting comprises converting first file fields having invalid values with second file fields having valid values; and converting the second file to a third file of the first file format, if the converting of the first file to the second file succeeds.Type: ApplicationFiled: July 25, 2012Publication date: January 30, 2014Inventors: Aviv Grafi, Itay Glick
-
Publication number: 20140025645Abstract: A method, a system and a computer program product for resolving conflicts between data for database integration. Data is integrated from first and second data sources to produce integrated data, and the presence of a conflict is determined between data from the first data source and data from the second data source, where one or more sets of prioritized policies for resolving conflicts is associated with data of the first and second data sources. A policy is selected from the set of prioritized policies associated with the conflicted data, where the selected policy is appropriate to resolve the conflict and includes the greatest priority. The selected policy is applied to resolve the conflict and to produce a resulting data value for the integrated data.Type: ApplicationFiled: July 23, 2012Publication date: January 23, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kyle G. Brown, Rada Chirkova, Ioannis Viniotis
-
Publication number: 20140025647Abstract: Data is often populated into Configuration Management Databases (CMDBs) from different sources. Because the data can come from a variety of sources, it may have inconsistencies—and may even be incomplete. A Normalization Engine (NE) may be able to automatically clean up the incoming data based on certain rules and knowledge. In one embodiment, the NE takes each Configuration Item (CI) or group of CIs that are to be normalized and applies a rule or a set of rules to see if the data may be cleaned up, and, if so, updates the CI or group of CIs accordingly. In particular, one embodiment may allow for the CI's data to be normalized by doing a look up against a Product Catalog and/or an Alias Catalog. In another embodiment, the NE architecture could be fully extensible, allowing for the creation of custom, rules-based plug-ins by users and/or third parties.Type: ApplicationFiled: September 30, 2013Publication date: January 23, 2014Applicant: BMC Software, Inc.Inventors: Govindarajan RANGARAJAN, Darius WALLACE, Narayan KUMAR, Douglas MUELLER
-
Publication number: 20140025646Abstract: The invention relates to a system handling a plurality of data sets stored in different repositories (310, 320), the system comprising a data managing unit (200) configured to provide processing rules for processing the data sets stored in the different repositories, the processing rules including access rules providing information which of the data repositories should be accessed in the case of a data access request for one of the data sets, the processing rules further including consistency enforcement rules providing correction actions when an inconsistency for said one data set stored in different data repositories is detected.Type: ApplicationFiled: March 28, 2011Publication date: January 23, 2014Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Carolina Canales Valenzuela, Juan Antonio Sanchez Herrero
-
Publication number: 20140012821Abstract: The present invention relates to an apparatus and method for analyzing building auditing information to identify irregular usage patterns and incorrect audit information. The auditing information, such as energy consumption, is analyzed using presence information at room or zone level. Based on pre-selected expectations, clustering is applied to data sets. By using different criteria, the clustering results are examined within every cluster and among clusters to find irregular information. Furthermore, through cross-checking with other background information, irregular usage pattern can be found and incorrect audit information can be identified, so that succeeding energy prediction and decision-support algorithms can work on a reliable set of profiles.Type: ApplicationFiled: March 1, 2012Publication date: January 9, 2014Applicant: KONINKLIJKE PHILIPS N.V.Inventors: Peter Fuhrmann, Hao Hu, Ingrid Christina Maria Flinsenberg
-
Publication number: 20140012820Abstract: Disclosed are methods and apparatus for processing correlated metadata (e.g. programmatic metadata relating to one or more episodes of a television show). Mappings, or correlations, between chunks of metadata that originated from a particular data source and metadata clusters may be determined. Inconsistencies in the correlated metadata may then be detected by a processor. An inconsistency may be an incorrect mapping, the mapping of more than one of the metadata chunks that originated from the same data source to the same metadata cluster, or that one or more of the metadata chunk have not been mapped to a metadata cluster. The mappings may then be edited so as to remove detected inconsistencies by the processor.Type: ApplicationFiled: July 3, 2012Publication date: January 9, 2014Applicant: SETJAM, INC.Inventors: Grzegorz Kapkowski, Marcin Kaszynski, Marek M. Stepniowski
-
Publication number: 20140006361Abstract: A computing device detects a synchronization conflict between two versions of a file. In particular, the file may comprise a digital photo. The computing device may characterize a nature of a difference between metadata fields as immutable, mergeable, or subsumable. Core metadata fields may be defined such that a nature of a difference, or conflict, is categorized as immutable. Non-core metadata fields may be defined such that a nature of a difference, or conflict, is characterized as either mergeable or subsumable. A conflict between corresponding mergeable non-core metadata fields may be resolved by merging values of the corresponding non-core metadata fields. A conflict between corresponding subsumable non-core metadata fields may be resolved by replacing a value of a non-core metadata field of an older of the two versions of the file with a value of a corresponding non-core metadata field of a younger of the two versions of the file.Type: ApplicationFiled: August 30, 2013Publication date: January 2, 2014Applicant: Microsoft CorporationInventors: Adedeji Olumuyiwa Akinyemi, Okacey Chidinma Abaraoha, Brian Douglas Remick
-
Patent number: 8620876Abstract: Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to locate and raise an alert for suspect query plans. Security also can be enhanced using a firewall system sitting between the application servers and the client systems that records user and organization information for each client request received, compares this with information included in a response from an application server, and verifies that the response is being sent to the appropriate user. Security also can be enhanced using a client-side firewall system with logic executing on the client system that verifies whether a response from an application server is being sent to the appropriate user system by comparing user and organization id information stored at the client with similar information in the response.Type: GrantFiled: November 1, 2011Date of Patent: December 31, 2013Assignee: salesforce.com, inc.Inventors: Eric Chan, Craig Weissman, Paul Nakada, Dave Moellenhoff, Todd McKinnon
-
Publication number: 20130339313Abstract: Guarded file access operations are provided for creating and using guarded file descriptors, which can detect and prevent erroneous file access operations in computer programs. A file descriptor can be associated with a guard identifier to create a guarded file descriptor. The association can be established when the file is opened, and can be maintained independently of the computer program, which ordinarily maintains its own association between files, file descriptors, and guard identifiers. Subsequent file operations using the guarded file descriptor check that the guard identifier previously associated with that file descriptor is presented, and generate errors without performing the requested file operations if the correct guard identifier is not presented. This check serves as a validation of the computer program's use of file descriptors. An error and stack trace can be generated for use in analyzing a cause of the guard violation.Type: ApplicationFiled: September 15, 2012Publication date: December 19, 2013Applicant: Apple Inc.Inventors: Russell A. BLAINE, Timothy P. Marsland, Benjamin H. Nham, Adam C. Swift, Benjamin C. Trumbull, Umesh S. Vaishampayan
-
Patent number: 8612535Abstract: Calendar repair using a standard message may be provided. Calendar events, such as appointments and meetings, may be created and copied to a plurality of attendee calendars. A first copy of the event may be compared to a second copy of the event to determine whether properties between the events are out-of-sync. If so, a standard meeting request message comprising the correct value may be sent to update the out-of-sync property.Type: GrantFiled: December 28, 2009Date of Patent: December 17, 2013Assignee: Microsoft CorporationInventors: Roberto Ribeiro da Fonseca Mendes, Vanessa C. Feliberti, Firdosh R Ghyara, Sina Hakami, Matthias Leibmann, Paul David Tischhauser
-
Publication number: 20130325820Abstract: A method begins by a processing module retrieving at least a threshold number of error coded data slices of a set of error coded data slices from storage units of a dispersed storage network (DSN) and identifying, based on an intentional error pattern, error coded data slices that were intentionally altered to produce identified error coded data slices. The method continues with the processing module decoding the set of error coded data slices to produce a recovered data segment and encoding the recovered data segment using an altered dispersed storage error encoding function to produce a test set of error coded data slices for comparing with corresponding error coded data slices. When the test set of error coded data slices substantially match the corresponding error coded data slices, the method continues with the processing module indicating that the recovered data segment has not been corrupted.Type: ApplicationFiled: August 5, 2013Publication date: December 5, 2013Applicant: CLEVERSAFE, INC.Inventors: Gary W. Grube, Timothy W. Markison
-
Patent number: 8600959Abstract: A computer-based method and apparatus for identifying hazardous materials based on observable physical properties and signs and systems of exposure to the hazardous materials. The observable physical properties are obtained by preprocessing plain language data to obtain normalized descriptors and modifiers pertaining to a plurality of properties and signs and symptoms. The normalized descriptors and signs and symptoms are presented to a user in lists for comparison with a sample in the field. Once a material is identified, information can be obtained from the apparatus which is necessary for response to an incident involving the hazardous material. The preferred embodiments of the invention are particularly useful to responders to a hazardous waste incident.Type: GrantFiled: March 17, 2011Date of Patent: December 3, 2013Assignee: Alluviam LLCInventor: Gregory A. Ouzounian
-
Patent number: 8577849Abstract: A computer implemented method for correcting records in a database comprising generating, using a processor, respective candidate replacement entries for multiple inconsistent records of the database, grouping the candidate replacement entries to provide multiple groups of related candidate updates for the database, ranking the groups according to a loss function to quantify database quality, receiving input for a selected group, sorting candidate replacement entries in the selected group, and applying updates from the selected group to the database to correct entries of the inconsistent records.Type: GrantFiled: May 18, 2011Date of Patent: November 5, 2013Assignee: Qatar FoundationInventors: Mohamed Yakout, Ahmed K. Elmagarmid, Jennifer Neville, Mourad Ouzzani, Ihab Francis Ilyas Kaldas
-
Publication number: 20130282668Abstract: Systems and methods for checking for region consistency and table integrity problems and automatically repairing a corrupted HBase cluster. The methods and systems operate in a diagnostic mode and a diagnostic and repair mode. The methods include fixing table integrity problems, such as backwards table regions, table region holes, table region overlap, and the like to restore table integrity invariant. Once the table integrity has been restored, each row key resolves to exactly one region. The methods further include fixing region inconsistencies, such as bad region assignment, no region present in the meta table, region information not in the Hadoop Distributed File System (HDFS), and the like to restore region consistency invariant. The information in the HDFS is taken as ground truth and any meta table or assignment problems that are inconsistent with the HDFS is deemed wrong and removed.Type: ApplicationFiled: March 15, 2013Publication date: October 24, 2013Applicant: CLOUDERA, INC.Inventor: Jonathan Ming-Cyn Hsieh
-
Publication number: 20130268495Abstract: A computer cluster can be divided into a plurality of failure scopes and a voting constraint can be enforced. The voting constraint can allow a portion of the cluster to provide the service if a majority of health votes from cluster members is obtained by that portion. A loss of connectivity between a first failure scope, which has a majority of cluster members in the cluster, and one or more other failure scopes in the cluster can be detected. The loss of connectivity can be such that the first failure scope does not have connectivity to a member in any other failure scope in the cluster. In response to detecting the loss of connectivity, a split brain situation in the cluster can be automatically protected against by preventing the first failure scope from providing the service.Type: ApplicationFiled: April 9, 2012Publication date: October 10, 2013Applicant: MICROSOFT CORPORATIONInventors: Gregory Thiel, Manoharan Kuppusamy, Yogesh Bansal
-
Publication number: 20130262403Abstract: Methods and apparatus for ensuring uniqueness of database object attributes are disclosed. An example computer-implemented method includes receiving a request to insert, update or delete a versioned database object having a first identifier (ID) in a main database table. The method further includes determining, based on the request, whether to fire an insert trigger, a delete trigger or an update trigger for the main database table. In the event an insert trigger is fired, the method includes performing, in a secondary database table, a record insertion process. In the event a delete trigger is fired, the method includes performing, in the secondary database table, a record deletion process. In the event an update trigger is fired, the method includes performing, in the secondary database table, at least one of the record insertion process for a post-update versioned database object and the record deletion process for a pre-update versioned database object.Type: ApplicationFiled: April 23, 2012Publication date: October 3, 2013Applicant: BMC SOFTWARE, INC.Inventors: Zack Milousheff, Mark Hutchins
-
Publication number: 20130246359Abstract: A computer-readable recording medium stores a program that causes a computer to execute a verification support process that includes acquiring a series of data transmitted and received between apparatuses; creating a plurality of data groups by dividing the series of acquired data; detecting among the created data groups, a data group that includes given data acting as an issuance request for identification information of a transmission source; adding the given data to the beginning of subsequent data groups that are among the created data groups and transmitted after the detected data group; and outputting the subsequent data groups to which the given data has been added.Type: ApplicationFiled: March 18, 2013Publication date: September 19, 2013Applicant: FUJITSU LIMITEDInventors: Taichi Sugiyama, Takeshi Yasuie, Yuji Nomura
-
Patent number: 8527474Abstract: A method begins with receiving an indication that one of a plurality of merchant data files includes an inconsistency with respect to a corresponding merchant profile record in a merchant profile database. The merchant data file of the plurality of merchant data files includes merchant name, merchant business address, and merchant business information. The method continues with receiving a request to authenticate the updating of the corresponding merchant profile record when the inconsistency for the one of the plurality of merchant data files is addressed by a merchant device updating the corresponding merchant profile record. The merchant device corresponds to a merchant of the one of the plurality of merchant data files. The method continues with providing an authentication response regarding the updating of the corresponding merchant profile record.Type: GrantFiled: August 26, 2009Date of Patent: September 3, 2013Assignee: Visa USA, Inc.Inventor: Linda R. Hardy-McGee
-
Publication number: 20130204847Abstract: According to one embodiment, an ontology update device, which updates a smart grid ontology including an equipment class and individual properties of the class is provided. A storage stores two or three higher-order layers within a domain ontology (DO) layer including specs of the equipment class and the properties, a meta-ontology (MO) layer including specs of metadata of the class and the properties, and an axiomatic ontology (AO) layer including the metadata specs. An access controller controls access to the smart grid ontology so that access is allowed only from a database (DB) or an adapter of a lower-order layer existing in a limited number of specific nodes for a higher-order node. An updater updates the DO layer so that the DO layer is consistent with the MO layer.Type: ApplicationFiled: March 14, 2013Publication date: August 8, 2013Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Kabushiki Kaisha Toshiba
-
Patent number: 8504517Abstract: Systems and methods for performing data replication are disclosed. Determining whether to update replicated data typically involves comparison of readily obtainable attributes of a given source file and its corresponding replicated file. Such attributes can be obtained from, for example, metadata. In certain situations, an additional assessment of the source and replicated files can be beneficial. For example, if integrity of an existing replicated file's content is maintained, one may not want to re-replicate the corresponding source file. For large source files, such a decision can provide substantial reductions in expenditures of available computing and network resources. In certain embodiments, a threshold for identifying such large files can be based on one or more operating parameters such as network type and available bandwidth. In certain embodiments, replication file's integrity can be checked by calculating and comparing checksums for the replication file and its corresponding source file.Type: GrantFiled: March 29, 2010Date of Patent: August 6, 2013Assignee: CommVault Systems, Inc.Inventor: Vijay H. Agrawal
-
Publication number: 20130185266Abstract: Managing data units by converting the data units into data segments and access files describing how to retrieve the data segments using hash values for the data segments. In a data store operation, the data unit is divided into data segments and an access file is generated. The access file includes segmenting scheme information for the data segments, hashing scheme information for the hash values, hash identification information describing the hash values, and location information identifying the locations at which the data segments are available. In a data retrieval operation, data from the data unit is retrieved by accessing the data segments and extracting the data therefrom, where the data segments are retrieved based on the access file for the data unit.Type: ApplicationFiled: January 17, 2012Publication date: July 18, 2013Applicant: Apple Inc.Inventors: Deric S. Horn, Jeffrey D. Chung, Wenguang Wang
-
Patent number: 8489561Abstract: The disclosure generally describes computer-implemented methods, software, and systems for updating enterprise portal content meta-models. One computer-implemented method includes receiving a content analysis request associated with a content repository, analyzing, using at least one computer, the content repository content objects for inconsistencies with a meta-model, receiving meta-model modification suggestion data, modifying the meta-model using the meta-model modification suggestion data, and receiving modification status data.Type: GrantFiled: April 3, 2012Date of Patent: July 16, 2013Assignee: SAP Portals Israel LtdInventors: Eyal Nathan, Nimrod Barak
-
Patent number: 8489560Abstract: Disclosed in a system and method for facilitating the management of keyword/Uniform Resource Locator (URL) data. A first processor receives from a second processor, a request to transmit keyword/URL data. The first processor transmits to the second processor, the keyword/URL data. The first processor receives from the second processor, modified keyword/URL data. The first processor validates the modified keyword/URL data to determine if the modified keyword/URL data includes errors. The modified keyword/URL data can be used to perform keyword ranking using a search engine.Type: GrantFiled: September 8, 2010Date of Patent: July 16, 2013Assignee: Conductor, Inc.Inventor: Chealsea Conroy
-
Publication number: 20130166517Abstract: A system and a method for locating application-specific data that has been previously deleted and located in an address of the data storage device marked as being available for storing new data. The method includes accessing unidentified data from at least one data storage device; examining the unidentified data to detect at least one application-specific data pattern associated with at least one application; for each detected application-specific data pattern, executing an application-specific validation process to determine whether the unidentified data includes valid data associated with a corresponding application; and if it is determined that the unidentified data includes valid data associated with the corresponding application, then recovering the valid data.Type: ApplicationFiled: December 12, 2012Publication date: June 27, 2013Applicant: MAGNET FORENSICS INC.Inventor: Magnet Forensics Inc.
-
Patent number: 8458143Abstract: An information system including subscriber stations (MS), at least two service sources (2 to 5) providing a respective service to subscriber stations of the system, and an access point (1) arranged to analyze a service request in order to forward the service request to the service source (2) offering the service, the service sources (2 to 5) being arranged to analyze a received service request in order to provide the subscriber station (MS) with the requested service. In order to improve the user friendliness of the system said system further includes a memory (7) for storing service requests which have led to successful identification of the requested service, and an error correction device (6) arranged to correct a received service request by utilizing the service requests stored in the memory (7) if no service source or no service can be identified.Type: GrantFiled: September 24, 2003Date of Patent: June 4, 2013Assignee: Syslore OyInventors: Lauri Loven, Jorkki Hyvonen, Henri Tykka, Jukka Laurila, Hannu Kauppinen, Pasi Salento, Timo Heikkinen
-
Patent number: 8452738Abstract: An imaging apparatus is capable of recording a first image file and a second image file which differs from the first image file in a recording format and which needs to be managed by a management file. The imaging apparatus includes an imaging unit that converts a subject optical image into an image signal, a signal processor that creates based on the image signal the first image file, or image data including the second image file and a management file associated with the second image file, and a controller that controls the signal processor. The controller checks consistency between the management file and the second image file, and controls the signal processor such that, when the management file is not consistent with the second image file, creation of the image data is inhibited but creation of the first image file is allowed.Type: GrantFiled: November 16, 2010Date of Patent: May 28, 2013Assignee: Panasonic CorporationInventor: Tsutomu Mukai
-
Publication number: 20130073525Abstract: Electronic data file and content capturing systems and methods enable enhanced accessibility and reduced complexity for clients managing large volumes of digital data files. According to one aspect, a system and method provided for validation and tracking of content collection tasks. According to another aspect, systems and methods are disclosed for error management through integrated interfaces that are capable of interacting with and correcting the results of content collection tasks.Type: ApplicationFiled: September 17, 2012Publication date: March 21, 2013Applicant: Massachusetts Mutual Life Insurance CompanyInventor: Massachusetts Mutual Life Insurance Company
-
Publication number: 20130054539Abstract: A computer implemented method for repairing records of a database, comprises determining a first set of records of the database which violate a functional dependency of the database, modifying records in the first set to make them consistent with the functional dependency to provide an output consistent database instance, determining a second set of records of the output consistent database instance comprising duplicate records, merging duplicate records in the second set in dependence on the functional dependencies of the records to provide a modified database instance.Type: ApplicationFiled: August 26, 2011Publication date: February 28, 2013Applicant: Qatar FoundationInventors: Ihab Francis Ilyas KALDAS, Mohamed YAKOUT, Ahmed K. ELMAGARMID
-
Publication number: 20130046739Abstract: The system and method described herein may be used to reconcile duplicate configuration items in a configuration management database. In particular, corresponding properties that represent relationships with a trial configuration item and an existing configuration item may be compared to reconcile whether the trial configuration item corresponds to the existing configuration item and should therefore be combined with the existing configuration item, or alternatively whether the trial configuration item represents a new configuration item that can be added to the configuration management database. If comparing the properties associated with the trial configuration item and the existing configuration item results in an indeterminate outcome, a reconciliation engine may inspect a table stored directly on the trial configuration item and/or the existing configuration item to reconcile whether the trial configuration item and the existing configuration item are indeed different or identical.Type: ApplicationFiled: August 18, 2011Publication date: February 21, 2013Applicant: Computer Associates Think, Inc.Inventors: Marvin Waschke, Steven Greenspan
-
Patent number: 8370474Abstract: A method, device, and medium are provided for improving a user's Internet experience, comprising in one aspect, receiving, from a gateway, an indication of a reply from a content provider indicating an error requiring arbitration, determining, on the basis of an arbitration agreement, one or more remediation measures for the gateway to take in response to the error, the remediation measures selected from the set consisting of: passing the reply to the user unchanged, providing cached content to the user, rewriting the error reply to include a redirection to an alternate page, rewriting the error reply to include an alternate reply status code, providing a standardized error page in place of the error reply provided by the content provider, rejecting future requests sent to the content provider, and redirecting future requests sent to the content provider to an alternate content provider; and sending to the gateway an arbitration response including a remediation policy indicating the remediation measures.Type: GrantFiled: March 26, 2010Date of Patent: February 5, 2013Assignee: Sprint Communications Company L.P.Inventors: Raymond Emilio Reeves, Simon Youngs, Gary Duane Koller
-
Patent number: 8364614Abstract: A method that imputes missing values while building a predictive model. A population of solutions is created using a data set comprising missing values, wherein each solution comprises parameters of each of the predictive models and the missing values of a data set. Each of the solutions in a population is checked for fitness. After the fitness is checked, the solutions in a population are genetically evolved to establish a successive population of solutions. The process of evolving and checking fitness is continued until a stopping criterion is reached.Type: GrantFiled: January 8, 2008Date of Patent: January 29, 2013Assignee: General Electric CompanyInventors: Tarun Bhaskar, Ramasubramanian Gangaikondan Sundararajan
-
Publication number: 20120330902Abstract: According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query program instructions using correlated order invariant encrypting, the data and query program instructions operating in a customer computer system. The encrypted data and encrypted query program instructions are then transferred to a servicing entity having a test system. The encrypted data and encrypted query program instructions are run on the test system to generate a set of results. The set of results are then used to generate a diagnosis of a problem with the customer computer system. Thus the customer problem can be resolved without the servicing entity having access to the customer's data and query program instructions.Type: ApplicationFiled: August 29, 2012Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Pramod S. Gupta
-
Publication number: 20120310882Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for data synchronization. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving a key-value pair from a first device, the key-value pair including a value corresponding to particular application data of the first device; notifying one or more other devices associated with the first device of the key value pair; receiving a request from a second device for the key-value pair; and sending the key-value pair to the second device.Type: ApplicationFiled: June 1, 2012Publication date: December 6, 2012Applicant: Apple Inc.Inventors: Jeremy M. Werner, Julien Jacques Jalon, Naveen Nalam, Toby Charles Wood Paterson
-
Publication number: 20120303593Abstract: Presented herein are methods of continuously verifying data and repairing errors introduced during replication. In a particular embodiment, a primary data store sends out information sufficient to create a checkpoint together with a checksum for the data being verified at that checkpoint. At the secondary data store, a checkpoint is created in accordance with the checkpointing information, and a checksum is calculated over the indicated data at the created checkpoint. If the calculated checksum disagrees with the received checksum, additional checksums are calculated over subranges of the indicated data and compared with corresponding checksums over the data at the primary data store. The checksums at the primary data store may be requested from the primary data store or calculated locally based on the received overall checksum. Once an erroneous entry is identified, it can then be re-replicated from the primary data store to restore data consistency.Type: ApplicationFiled: May 23, 2011Publication date: November 29, 2012Applicant: MICROSOFT CORPORATIONInventors: Bradley Gene Calder, Niranjan Nilakantan, Shashwat Srivastav, Jiesheng Wu, Abdul Rafay Abbasi, Shane Mainali, Padmanabha Chakravarthy Uddaraju
-
Publication number: 20120296879Abstract: A computer implemented method for correcting records in a database comprising generating, using a processor, respective candidate replacement entries for multiple inconsistent records of the database, grouping the candidate replacement entries to provide multiple groups of related candidate updates for the database, ranking the groups according to a loss function to quantify database quality, receiving input for a selected group, sorting candidate replacement entries in the selected group, and applying updates from the selected group to the database to correct entries of the inconsistent records.Type: ApplicationFiled: May 18, 2011Publication date: November 22, 2012Applicant: Qatar FoundationInventors: Mohamed YAKOUT, Ahmed K. ELMAGARMID, Jennifer NEVILLE, Mourad OUZZANI, Ihab Francis llyas KALDAS
-
Patent number: 8316100Abstract: Autonomic correction of incorrect identities in repositories. A communication is prepared and sent to one or more recipients. In response thereto, a notification is provided to the sender that one or more of the recipient's identities is incorrect. Based on this notification, corrective action is automatically initiated in order to locate the repository, and in particular, an entry in the repository corresponding to the incorrect identity and to take action to correct that identity.Type: GrantFiled: June 6, 2008Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventors: Michael D. Essenmacher, Thomas E. Murphy, Jr., Francis A. Pflug
-
Publication number: 20120278290Abstract: A database archiving model error detection and correction system including an error detection module to detect a referential integrity error in a database archiving model. A column in a foreign key and/or a corresponding unique key column to the foreign key column may include an assigned data mask operation. The error detection module may detect the referential integrity error if a corresponding other column in a foreign key-unique key relationship does not have an identical assigned data mask operation, or if the assigned data mask operation will not result in a unique output value for a unique input value.Type: ApplicationFiled: April 29, 2011Publication date: November 1, 2012Inventors: Thomas Anthony Pinch, Cedric Dandoy
-
Patent number: 8301602Abstract: Described are techniques for correcting at least some inconsistencies in a file system accessed by at least one client, while maintaining the file system online. A file system checking utility is executed on the file system to detect and create corrections for inconsistencies in the file system. The file system is updated to include at least some corrections. Also described is a computer system comprising a file system accessed by a client. A file system checking utility is executed on the file system to detect at least some inconsistencies in the file system, and to create a corrected version of the file system that includes corrections to correct for at least some of the detected inconsistencies. A report is created. The file system is not updated with the corrected version unless the proposed corrections are approved. The file system checking utility may be periodically scheduled for execution.Type: GrantFiled: May 1, 2008Date of Patent: October 30, 2012Assignee: EMC CorporationInventors: Xiaoye Jiang, Ajay Potnis, Mrinalini Chavan, Sairam Iyer, John Hayden
-
Patent number: 8296272Abstract: An information processing apparatus which may include basic-file management means for managing a file stored in a storage medium by utilizing basic-file management information stored in the same storage medium, specific-file management means for managing a specific type file in files which are adapted to share predetermined management-use information items out of management-use information items set to each file owned by the basic-file management means, and which are managed by the basic-file management means by utilizing specific-file management information stored in the storage medium, comparing means for comparing, when performing an index display in which the specific type file to be stored in the storage medium is displayed in an index style, a content of the management-use information item, about the specific type file to be displayed in the index display, shared by the basic-file management information and the specific-file management information, and display controlling means for executing the index dType: GrantFiled: December 5, 2007Date of Patent: October 23, 2012Assignee: Sony CorporationInventors: Hideo Obata, Shigeru Kashiwagi, Masayoshi Ohno
-
Patent number: 8290997Abstract: A file operations engine is provided that manages many user interactions with their files via a computer system. The operation engine may provide a user with the option to keep both files that have a file name conflict. It may further permit the user to rename a file involved with a file name conflict. The operations engine may also automatically rename one of the files of a file name conflict by appending a character to a root of the filename. The character may include the lowest integer available for the root in a destination for the files. The operations engine may provide the option to keep both files as part of a pre-calculation of potential errors for a requested operation. The operations engine may place file name conflicts in an error queue and permit the user to select an option to keep both files after the conflict is encountered.Type: GrantFiled: November 30, 2010Date of Patent: October 16, 2012Assignee: Microsoft CorporationInventors: Christopher S. Davis, David R. Johnson, Robert F. Day, Stephan Hoefnagels, Timothy P. McKee
-
Publication number: 20120246123Abstract: Managing a contact list in a collaboration system, by detecting if a contact has been offline for at least a predefined period of time and/or detecting if a target identifier is being entered into a contact list of a first user of a first collaboration system, where the contact is identified by a target identifier in a contact list of a first user of a first collaboration system, searching a collaboration system directory to find a replacement identifier associated with a second user of the first collaboration system, where the second user meets a predefined peer criterion with respect to the first user, and where the replacement identifier a) is different from a target identifier, and b) meets a predefined similarity criterion with respect to the target identifier, and replacing the target identifier with the replacement identifier in the contact list of the first user.Type: ApplicationFiled: May 30, 2012Publication date: September 27, 2012Applicant: International Business Machines CorporationInventors: VLADIMIR GAMALEY, Gili Nachum, Gil Perzy
-
Publication number: 20120233133Abstract: Method, system, and computer program product embodiments for recording data on a contactless integrated circuit (IC) memory associated with a data storage cartridge are provided. In one exemplary embodiment, an index of a plurality of files to be recorded on a storage media of the data storage cartridge is parsed with a table of contents (TOC) profile file to build a table of contents (TOC) specific to an owning application of the plurality of files. The TOC is written to the contactless IC memory.Type: ApplicationFiled: May 21, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shinobu FUJIHARA, Diana J. HELLMAN, Glen A. JAQUETTE
-
Publication number: 20120226669Abstract: A method for merging a source electronic memory storage cluster into a destination electronic memory storage cluster may include designating a source storage cluster having a first configuration; designating a destination storage cluster having a second configuration; receiving a configuration database including mapping information associated with the first configuration of the source storage cluster; merging the configuration database for the source storage cluster into the destination storage cluster; identifying a conflict between the source storage cluster configuration and the destination storage cluster configuration by comparing mapping information for the imported configuration database for the source storage cluster to mapping information for a configuration database associated with the second configuration of the destination storage cluster; resolving the identified conflict between the source storage cluster configuration and the destination storage cluster configuration; and merging the configuratType: ApplicationFiled: March 4, 2011Publication date: September 6, 2012Applicant: LSI CORPORATIONInventors: Martin Jess, Keith W. Holt
-
Patent number: 8250042Abstract: A data processing apparatus executes, in response to a processing execution instruction transmitted from an information terminal connected to the data processing apparatus via a network, processing in accordance with the processing execution instruction. The data processing apparatus includes a protocol determining unit configured to determine a protocol used in transmission of the processing execution instruction when an error is caused during execution of the processing, a converting unit configured to convert information on the error in accordance with the protocol determined by the protocol determining unit so that the information is compliant with the protocol, and a transmitting unit configured to transmit the information on the error converted by the converting unit to the information terminal that has transmitted the processing execution instruction using the protocol used in transmission of the processing execution instruction.Type: GrantFiled: May 11, 2009Date of Patent: August 21, 2012Assignee: Canon Kabushiki KaishaInventor: Makiya Tamura
-
Publication number: 20120203745Abstract: A computer implemented method is provided for resolving eventual consistency conflicts when using a Prefix Hash Tree (“PHT”) and Distributed Hash Table (“DHT”). A prefix hash tree having multiple nodes is created that relates to a distributed hash table. The nodes comprise leaf nodes and internal nodes. All distinct records are aggregated across all conflicting nodes, wherein conflicting nodes are nodes that have identical data records. Records returned are counted. If the count of aggregated records exceeds a max record count, nodes are split such that the aggregated records are divided by a prefix into each new node resulting in the consolidation of duplicate data that were in conflicting nodes into a single data record in a single node. If one or more of the returned conflicting nodes is an internal node, the internal node is split regardless of the number of aggregated records.Type: ApplicationFiled: September 30, 2011Publication date: August 9, 2012Applicant: WAVEMARKET INC.Inventors: Jesse Myers, Scott Hotes, Todd Hodes
-
Publication number: 20120166398Abstract: A method, a system, and computer-readable medium for processing of data are disclosed. An acknowledgement is received to store business object data. Based on the acknowledgement, an indication that the business object data is stored in a repository is generated. Processing of the business object data to enable storage in the repository continues while generating such indication.Type: ApplicationFiled: December 22, 2010Publication date: June 28, 2012Inventors: Thomas Gauweiler, Edgar Lott, Manfred Hirsch, Masoud Aghadavoodi Jolfaei
-
Patent number: 8171000Abstract: A method and system for conducting an integrity check of system and user metadata when the metadata is mounted. A filesystem reviewer is embedded within software of a server node. A mutual exclusion lock is obtained on the selected metadata. An automated verification of the locked metadata is conducted while the filesystem is mounted. In addition, an automated salvage of the locked metadata may be conducted while the filesystem is mounted. The verification and/or salvage of the locked metadata can be applied to system, user, and/or a portion of the user metadata.Type: GrantFiled: July 11, 2007Date of Patent: May 1, 2012Assignee: International Business Machines CorporationInventors: James J. Seeger, Thomas K. Clark, Andreas J. Moran, Jason C. Young
-
Patent number: 8161010Abstract: Embodiments may recover from faults by forming a new set of rows by removing rows associated with faulting save operations and repeating the saving and forming operations using the new set of rows until a set of rows that can be saved from the known start state without fault is determined. When the subset of successful rows is found, embodiments are able to provide assurance that no side effects (i.e., code or operations triggered by saving of a data to a particular location) have been executed on behalf of any of the failed rows (side effects from custom PL/SOQL code included) by deferring execution of triggers until an entire set of rows can be saved and committed.Type: GrantFiled: February 23, 2007Date of Patent: April 17, 2012Assignee: salesforce.com, Inc.Inventors: Craig Weissman, Steven Tamm, Simon Fell, Simon Wong, Steve Fisher
-
Patent number: 8156087Abstract: A system analysis apparatus includes a message reconstruction module which reconstructs observed data and data of which the observation has failed, into messages regarding a request and a response which are communicated on a system. The apparatus includes a message candidate extraction module which compares message rules with the reconstructed messages, and extracts messages in the message rules which are identical to the reconstructed messages, from the messages defined in the message rules, as message candidates. The apparatus includes a call relationship extraction module which extracts a call relationship between the message candidates. The apparatus includes a matching module which compares transaction models in which processes in units of transactions on the system have been modeled on the basis of call relationships among the processes on the system, with the extracted call relationship, and selects and determines a transaction model identical to the call relationship.Type: GrantFiled: April 28, 2009Date of Patent: April 10, 2012Assignee: Fujitsu LimitedInventors: Toshihiro Shimizu, Hirokazu Iwakura
-
Publication number: 20120066186Abstract: A method includes accessing, at a device, data identifying a plurality of categories of media content. The data includes a first value associated with a first category of the plurality of categories of media content and a second value associated with a second category of the plurality of categories of media content. The method also includes modifying the data to remove the first category in response to determining that the first value does not satisfy a threshold. The method further includes adjusting the second value after modifying the data to remove the first category.Type: ApplicationFiled: November 17, 2011Publication date: March 15, 2012Applicant: AT&T Intellectual Property I, L.P.Inventor: Randolph Wohlert