17933635. DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES simplified abstract (International Business Machines Corporation)
Contents
- 1 DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES
Organization Name
International Business Machines Corporation
Inventor(s)
Peng Hui Jiang of Beijing (CN)
DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES - A simplified explanation of the abstract
This abstract first appeared for US patent application 17933635 titled 'DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES
Simplified Explanation
The abstract of the patent application describes a method, computer program product, and computer system for analyzing database access patterns and directing traffic based on activity thresholds.
- Traffic is collected against a NoSQL database by an activity collector.
- A database transaction log is periodically extracted and analyzed.
- The collected traffic and analyzed database transaction log are used to build a knowledge base of database access patterns.
- Current traffic is captured to compute an activity threshold.
- Traffic is directed to a workload processor based on the activity threshold.
- Traffic is directed to an intensive insert/update/delete (IUD) processor if the activity threshold exceeds a configured threshold.
- Temporary shards are generated along with adaptive keys and indexes to handle intensive IUD processor traffic.
Potential Applications
This technology could be applied in database management systems, data analytics, and workload optimization tools.
Problems Solved
This technology solves the problem of efficiently managing database traffic based on real-time activity thresholds and access patterns.
Benefits
The benefits of this technology include improved performance, optimized resource allocation, and enhanced scalability in database systems.
Potential Commercial Applications
The potential commercial applications of this technology include database management software, cloud computing platforms, and big data analytics tools.
Possible Prior Art
One possible prior art for this technology could be systems that analyze database access patterns for optimization purposes.
Unanswered Questions
How does this technology handle security and privacy concerns in database traffic analysis?
This article does not address the specific methods or mechanisms used to ensure the security and privacy of the data being analyzed.
What are the scalability limitations of this technology in handling large volumes of database traffic?
This article does not provide information on the scalability limitations of the system when dealing with a high volume of database traffic.
Original Abstract Submitted
Method, computer program product, and computer system are provided. Traffic is collected against a NoSQL database by an activity collector. A database transaction log is periodically extracted and analyzed. The collected traffic and the analyzed database transaction log are input to building a knowledge base of database access patterns. Current traffic is captured and used to compute an activity threshold. Traffic is directed to a workload processor based on the activity threshold. Traffic is directed to an intensive insert/update/delete (IUD) processor in response to the activity threshold exceeding a configured threshold. A plurality of temporary shards is generated along with an adaptive key and adaptive index in the plurality of temporary shards. The intensive IUD processor traffic is re-directed to the plurality of temporary shards while the activity threshold exceeds the configured threshold.