-
公开(公告)号:US10671944B2
公开(公告)日:2020-06-02
申请号:US15369941
申请日:2016-12-06
Applicant: Amazon Technologies, Inc.
Inventor: Steve Huynh , Owen Cummings , Karl Gohde , Antonio Gabriel Perez de Tejada Martinez , Adam Douglas Morley , Graham Pedersen , James Christopher Sorenson, III
Abstract: A system capable of identifying and locking resources (e.g., items, tickets, etc.) may map resources to a bit vector and use bit vectors to efficiently identify and lock the resources. For example, tickets to a concert may be mapped to a bit vector and the system may generate an availability bit vector indicating an availability of the seat locations. Thus, the tickets may be reserved by changing a binary value for bits corresponding to individual tickets. In addition, the system may generate bit vectors corresponding to metadata associated with the seat locations (e.g., aisle seat, handicap accessible, first ten rows, back ten rows, etc.), allowing the system to easily identify available seat locations that satisfy the search request. As the bit vectors are relatively small and can be processed easily, the system may improve a latency and reduce an error rate associated with searching for and reserving seat locations.
-
公开(公告)号:US10158579B2
公开(公告)日:2018-12-18
申请号:US13924157
申请日:2013-06-21
Applicant: Amazon Technologies, Inc.
Inventor: Adam Douglas Morley , Vincent Anthony Brancato , Stefano Stefani , Jai Vasanth , Wei Xiao , Maximiliano Maccanti , Swaminathan Sivasubramanian , Rande A. Blackman , Timothy Andrew Rath
IPC: H04L12/911 , H04L12/24 , H04L29/08 , G06F11/20 , G06F9/50
Abstract: Methods and apparatus for resource silos at network-accessible services are disclosed. A subset of resources used for a database service, including at least one resource from each of a plurality of data centers, is selected for membership in a resource silo based on grouping criteria. A silo routing layer node identifies the resource silo as the target silo to which a client work request is to be directed. The client work request is sent to a front-end resource of the target silo either by the client, or by the silo routing layer node on behalf of the client. The front-end resource of the target silo transmits a representation of the work request to a back-end resource of the target silo, where a work operation corresponding to request is performed.
-
公开(公告)号:US20180157997A1
公开(公告)日:2018-06-07
申请号:US15369941
申请日:2016-12-06
Applicant: Amazon Technologies, Inc.
Inventor: Steve Huynh , Owen Cummings , Karl Gohde , Antonio Gabriel Perez de Tejada Martinez , Adam Douglas Morley , Graham Pedersen , James Christopher Sorenson, III
Abstract: A system capable of identifying and locking resources (e.g., items, tickets, etc.) may map resources to a bit vector and use bit vectors to efficiently identify and lock the resources. For example, tickets to a concert may be mapped to a bit vector and the system may generate an availability bit vector indicating an availability of the seat locations. Thus, the tickets may be reserved by changing a binary value for bits corresponding to individual tickets. In addition, the system may generate bit vectors corresponding to metadata associated with the seat locations (e.g., aisle seat, handicap accessible, first ten rows, back ten rows, etc.), allowing the system to easily identify available seat locations that satisfy the search request. As the bit vectors are relatively small and can be processed easily, the system may improve a latency and reduce an error rate associated with searching for and reserving seat locations.
-
公开(公告)号:US11314717B1
公开(公告)日:2022-04-26
申请号:US15632266
申请日:2017-06-23
Applicant: Amazon Technologies, Inc.
Inventor: Tate Andrew Certain , Anshul Gupta , Vaibhav Jain , Sharatkumar Nagesh Kuppahally , Alexander Richard Keyes , Rajaprabhu Thiruchi Loganathan , Ravi Math , Adam Douglas Morley , Lokendra Singh Panwar , Krishnan Seshadrinathan , James Christopher Sorenson, III , Stefano Stefani , Wei Xiao
Abstract: Scalable architecture for propagating updates may be implemented for data replicated from a data set. A node may receive updates to items in a data set that have been committed to the data set. The node may determine whether the update should be applied to a replicated portion of the data set. For updates that should be applied, the node may identify another node that hosts the replicated portion of the data set and send a request to the other node to perform a conditional atomic operation to apply the update to the item in the replicated portion of the data set. The condition may compare a version identifier associated with an update and a current version identifier for the item at the other node. If the condition evaluates true, then the update to the item in the replicated portion may be performed.
-
5.
公开(公告)号:US10013449B1
公开(公告)日:2018-07-03
申请号:US14859062
申请日:2015-09-18
Applicant: Amazon Technologies, Inc.
Inventor: Wei Xiao , Kiran Kumar Muniswamy Reddy , Pejus Manoj Das , Adam Douglas Morley , Shirley Xue Yi Ly
IPC: G06F17/30
CPC classification number: G06F16/2365 , G06F16/22
Abstract: A non-relational data store may implement validating and non-validating secondary indexes for a table. Operations at a table for a given item may be performed when indexing the item to create a secondary index or when updates to the given item are received. Attribute values of a given item may be validated with respect to an indexing schema for the secondary index. For a non-validating secondary index, validation errors detected for the attribute values may be ignored so that the operation at the table may be performed. For a validating secondary index, validation errors detected for the attribute values may result in denying performance of the operation. In some embodiments, a secondary index from may be changed from validating to non-validating, or non-validating to validating.
-
公开(公告)号:US20170286477A1
公开(公告)日:2017-10-05
申请号:US15627338
申请日:2017-06-19
Applicant: Amazon Technologies, Inc.
Inventor: Adam Douglas Morley , Swaminathan Sivasubramanian
CPC classification number: G06F11/1469 , G06F16/22 , G06F16/23 , G06F16/2358
Abstract: A database system may implement database system recovery using non-volatile system memory. An update to a data page of a database may be received. A version of the data page may be obtained in system memory. A new version of the data page may be determined according to the received update. The new version of the data page may be maintained in a non-volatile portion of system memory irrespective of a failure of the database. In at least some embodiments, the update may be performed without generating recovery log records indicating the update. Upon recovery from a database failure, data pages maintained in non-volatile system memory may be made available to service access requests.
-
公开(公告)号:US11940990B1
公开(公告)日:2024-03-26
申请号:US15625976
申请日:2017-06-16
Applicant: Amazon Technologies, Inc.
Inventor: Sharatkumar Nagesh Kuppahally , Ravi Math , Adam Douglas Morley , Ming-chuan Wu , Wei Xiao , Rajaprabhu Thiruchi Loganathan
IPC: G06F16/23 , G06F16/245 , G06F16/27
CPC classification number: G06F16/2379 , G06F16/245 , G06F16/27
Abstract: Consistent queries to replicated data may be performed according to global clock values. Time values for updates performed at a data set may be identified according to a global clock. The updates may be replicated to a replicated portion of a data set. Queries directed to the replicated portion of the data set may be performed in response to determining that the time values for updates indicate that the replicated portion of the data set is consistent with a time value identified for the query according to the global clock.
-
公开(公告)号:US10700925B2
公开(公告)日:2020-06-30
申请号:US15420007
申请日:2017-01-30
Applicant: Amazon Technologies, Inc.
Inventor: Adam Douglas Morley , David Craig Yanacek
IPC: G06F15/177 , H04L12/24 , H04L29/08
Abstract: Methods and apparatus for dedicated endpoint instances for network-accessible services are disclosed. The number of dedicated endpoint instances to be established to direct work requests of a given client to back-end nodes of a service may be determined. Configuration policies for the instances, including one or more policies related to caching, authentication, redundancy, durability, availability, and/or load balancing, may also be determined. Configuration of the instances may be initiated, and an indication that the endpoint or endpoints have been configured may be provided to the client.
-
公开(公告)号:US10394462B1
公开(公告)日:2019-08-27
申请号:US14560917
申请日:2014-12-04
Applicant: Amazon Technologies, Inc.
Inventor: Adam Douglas Morley
Abstract: A multi-tenant database may maintain a plurality of datasets on a memory device that is subject to degraded operation caused by a subset of possible state transitions within the device's memory cells. A storage engine may identify entropy characteristics of datasets, independently of other datasets hosted on the memory, and use the entropy to construct a symbol table that maps from data within the dataset to symbols that may be stored on the memory device with a minimized number of state transitions.
-
10.
公开(公告)号:US10089191B2
公开(公告)日:2018-10-02
申请号:US14949644
申请日:2015-11-23
Applicant: Amazon Technologies, Inc.
Inventor: Samuel James McKelvie , Yan Valerie Leshinsky , Ian P. Nowland , Darin Lee Frink , Anurag Windlass Gupta , Adam Douglas Morley , Christopher Nathan Watson , Michael David Marr
Abstract: Application program data stored in system memory may be selectively persisted. An indication may be provided to an application program that an application data object or a range of application data stored in system memory may be treated as persistent. Data backup may be enabled for the application data object or range of application data in the event of a system failure, copying the application data object or range of application data from system memory to non-volatile data storage. Upon recovery from a system failure, further data backup for the application data object or the range of application data may be disabled. In some embodiments, at least some of the application data object or range of application data may be recovered for the application program to access. Data backup for the application data object or the range of application data may also be re-enabled.
-
-
-
-
-
-
-
-
-