Verifying and Balancing Server Resources via Stored Usage Data
First Claim
1. A method, comprising the steps of:
- A) storing, by a server computer communicatively coupled to a network;
i) an electronic file;
ii) a file identification for the electronic file;
iii) a stored checksum associated with the file identification; and
iv) at least one copy of the electronic file;
B) identifying, by the server computer, a modification to the electronic file;
C) generating, by the server computer, from the electronic file, a second checksum;
D) determining, by the server computer, whether the second checksum matches the stored checksum; and
E) responsive to a determination that the second checksum does not match the stored checksum;
i) removing the electronic file from the at least one server computer; and
ii) generating a second copy of the electronic file from the at least one copy of the electronic file.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of the present invention provide for a user uploading a file and a customized metadata about the file to a file storage system. This information may be forwarded to an application, possibly an API, which may divide the file into a plurality of file chunks if the file is greater than a predetermined file size. One or more tracker servers may check a database to locate optimal file locations for the file or file chunks to be stored within the file storage system. These optimal locations may be returned from the tracker servers to the application/API which may perform an HTTP request to write the file to the file storage system. The file write may be validated and finalized, and the successful write may be displayed to the user on a user interface on a client.
17 Citations
20 Claims
-
1. A method, comprising the steps of:
-
A) storing, by a server computer communicatively coupled to a network; i) an electronic file; ii) a file identification for the electronic file; iii) a stored checksum associated with the file identification; and iv) at least one copy of the electronic file; B) identifying, by the server computer, a modification to the electronic file; C) generating, by the server computer, from the electronic file, a second checksum; D) determining, by the server computer, whether the second checksum matches the stored checksum; and E) responsive to a determination that the second checksum does not match the stored checksum; i) removing the electronic file from the at least one server computer; and ii) generating a second copy of the electronic file from the at least one copy of the electronic file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 17, 18)
-
-
11. A method, comprising the steps of:
-
A) storing, by a server computer communicatively coupled to a network, in a database communicatively coupled to the network, a threshold value for a server usage metric; B) monitoring, by the server computer, the server usage metric for a first server computer and a second server computer; C) determining, by the server computer, whether the server usage metric for the first server computer exceeds the threshold value; D) responsive to a determination that the server usage metric for the first server computer exceeds the threshold value; i) determining, by the server computer, whether the server usage metric for the second server computer exceeds the threshold value; and ii) responsive to a determination that the server usage metric for the second server computer does not exceed the threshold value, running, by the server computer, on the second server computer, a server process to change the server usage metric. - View Dependent Claims (12, 13, 14, 15, 16, 19, 20)
-
Specification