Method and mechanism for managing and accessing static and dynamic data
First Claim
1. A computer implemented method for accessing data in a computing system, the method comprising:
- using at least one processor to perform a process, the process comprising;
associating a hierarchical key with a first subtree to provide a first tree;
associating the hierarchical key with a second subtree to provide a second tree;
accessing against the hierarchical key by a member of a first group causes access to the first subtree of the first tree and accessing against the hierarchical key by a member of a second group causes access to the second subtree of the second tree, wherein the first tree and the second tree comprise different hierarchies having different hierarchically structured data and the different subtrees are accessible by the hierarchical key; and
storing the hierarchical key on a volatile or non-volatile computer-usable medium, wherein members of different groups access different subtrees in different storage locations using a hierarchical data structure.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a method, mechanism, and computer usable medium for managing and accessing static and shard data. In one approach, described is a method and mechanism for implementing group dependent keys (GDKs) in a computing system, in which the GDK is visible to all members of a distributed system, but its value(s) and subtree(s) could be different for different groups. Members of each group see the same view of the value and subtree of a GDK. Also disclosed is a method, mechanism, and computer usable medium for implementing group dependent links (GDLs) in a computing system. According to one approach, a data transformation function is used to coordinate changes to different versions of shared data.
-
Citations
54 Claims
-
1. A computer implemented method for accessing data in a computing system, the method comprising:
-
using at least one processor to perform a process, the process comprising; associating a hierarchical key with a first subtree to provide a first tree; associating the hierarchical key with a second subtree to provide a second tree; accessing against the hierarchical key by a member of a first group causes access to the first subtree of the first tree and accessing against the hierarchical key by a member of a second group causes access to the second subtree of the second tree, wherein the first tree and the second tree comprise different hierarchies having different hierarchically structured data and the different subtrees are accessible by the hierarchical key; and storing the hierarchical key on a volatile or non-volatile computer-usable medium, wherein members of different groups access different subtrees in different storage locations using a hierarchical data structure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer implemented method for managing shared data in a computing system implemented by using a processor, comprising:
-
associating a hierarchical key with a first subtree of a first tree; associating the hierarchical key with a link to a second subtree of a second tree; accessing against the hierarchical key by a member of a first group causes access to the first subtree of the first tree and accessing against the hierarchical key by a member of a second group causes access to the second subtree of the second tree, wherein the first tree and the second tree comprise different hierarchies having different hierarchically structured data and the different subtrees are accessible by the hierarchical key; and storing a first version of a data item for the hierarchical key associated with the first group in a first storage location on a volatile or non-volatile computer-usable medium and a second version of the data item for the hierarchical key associated with the second group in the second storage location on the volatile or non-volatile computer-usable medium, wherein the hierarchical key accesses different versions of the data item stored in different storage locations. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A volatile or non-volatile computer-readable medium that stores instructions for accessing data in a computing system, the instructions performing a process comprising:
-
associating a hierarchical key with a first subtree to provide a first tree; associating the hierarchical key with a second subtree to provide a second tree; accessing against the hierarchical key by a member of a first group causes access to the first subtree of the first tree and accessing against the hierarchical key by a member of a second group causes access to the second subtree of the second tree, wherein the first tree and the second tree comprise different hierarchies having different hierarchically structured data and the different subtrees are accessible by the hierarchical key; and storing the hierarchical key on a volatile or non-volatile computer-usable medium, wherein the hierarchical key represents different data structure values for accessing different subtrees for members of different groups. - View Dependent Claims (44, 45)
-
-
46. A system for accessing data in a computing system, comprising:
-
a processor that is configured to; associate a hierarchical key with a first subtree to provide a first tree; associate the hierarchical key with a second subtree to provide a second tree; access against the hierarchical key by a member of a first group causes access to the first subtree of the first tree and accessing against the hierarchical key by a member of a second group causes access to the second subtree of the second tree, wherein the first tree and the second tree comprise different hierarchies having different hierarchically structured data and the different subtrees are accessible by the hierarchical key; and a volatile or non-volatile computer-readable medium that is configured to store the hierarchical key, wherein the hierarchical key represents different data structure values for accessing different subtrees for members of different groups. - View Dependent Claims (47, 48)
-
-
49. A system for managing shared data in a computing system, comprising:
-
a processor that is to; associate a hierarchical key with a first subtree to provide a first tree; associate the hierarchical key with a link to a second subtree to provide a second tree; access against the hierarchical key by a member of a first group causes access to the first subtree of the first tree and accessing against the hierarchical key by a member of a second group causes access to the second subtree of the second tree, wherein the first tree and the second tree comprise different hierarchies having different hierarchically structured data and the different subtrees are accessible by the hierarchical key; and a volatile or non-volatile computer-readable medium that is to store a first version of a data item for the hierarchical key associated with the first group in a first storage location on the volatile or non-volatile computer-usable medium and a second version of the data item for the hierarchical key associated with the second group in the second storage location on the volatile or non-volatile computer-usable medium, wherein the hierarchical key accesses different versions of the data item. - View Dependent Claims (50, 51)
-
-
52. A volatile or non-volatile computer-readable medium that stores instructions for managing shared data in a computing system, the instructions performing a process comprising:
-
associating a hierarchical key with a first subtree to provide a first tree; associating the hierarchical key with a link to a second subtree to provide a second tree; accessing against the hierarchical key by a member of a first group causes access to the first subtree of the first tree and accessing against the hierarchical key by a member of a second group causes access to the second subtree of the second tree, wherein the first tree and the second tree comprise different hierarchies having different hierarchically structured data and the different subtrees are accessible by the hierarchical key; and storing a first version of a data item for the hierarchical key associated with the first group in a first storage location of a volatile or non-volatile computer-usable medium and a second version of the data item for the hierarchical key associated with the second group in the second storage location of the volatile or non-volatile computer-usable medium, wherein the hierarchical key accesses different versions of the data item. - View Dependent Claims (53, 54)
-
Specification