CN103778064A - Data management method and device - Google Patents

Data management method and device Download PDF

Info

Publication number
CN103778064A
CN103778064A CN201210407470.0A CN201210407470A CN103778064A CN 103778064 A CN103778064 A CN 103778064A CN 201210407470 A CN201210407470 A CN 201210407470A CN 103778064 A CN103778064 A CN 103778064A
Authority
CN
China
Prior art keywords
data
rule
junk
junk data
meet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210407470.0A
Other languages
Chinese (zh)
Other versions
CN103778064B (en
Inventor
阳振坤
孙志东
庄明强
黄贵
沈金堤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Tmall Technology Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201210407470.0A priority Critical patent/CN103778064B/en
Publication of CN103778064A publication Critical patent/CN103778064A/en
Application granted granted Critical
Publication of CN103778064B publication Critical patent/CN103778064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a data management method. The data management method comprises the steps that when a fragment organizing condition is met, whether data to be organized in a memory space or in a database meet a preset junk data rule is judged, the data meeting the junk data rule are deleted if the data meeting the junk data rule, and the physical memory space occupied by the data meeting the junk data rule is recovered. The invention further provides a data management device. The data management method has the advantages that the maintenance cost of a system can be reduced, and the efficiency of the system is improved.

Description

A kind of data managing method and device
Technical field
The present invention relates to computer system, relate in particular to a kind of data managing method and device.
Background technology
In storage system, usually there are and constantly produce some junk datas, for example need data or the expired data etc. of deleting, the capacity of storage system is always limited, junk data had both consumed storage space, conventionally also affect the performance of system, therefore need often to delete these junk datas, guarantee the normal operation of storage system.Existing common scheme has:
1) trigger+defragmentation of relational database: trigger is conventionally at the retouching operation (insert/update/delete of database, insert/upgrade/delete etc.) or database start before or after closing and carry out, in trigger, can actuating logic judgement delete the data that become rubbish.After deletion action is carried out, these junk datas are just no longer visible to user, and the storage space that they take is recovered in the time of next database operation defragmentation.
This scheme has following shortcoming:
Whether trigger conventionally could become junk data and delete the data that become rubbish according to rule judgment data in the time that data change, if data do not change, trigger is normally idle;
Trigger must be deleted the data that become rubbish just can make their spaces invisible to user and that they are taken reclaim in follow-up defragmentation process, and this need to carry out deletion action in database;
Trigger is carried out in same affairs with outside write request conventionally, this often brings larger extra pressure to database, reduced the read-write service ability of database, special peak time database read-write service ability, therefore data base administrator usually forbids the use of trigger;
2) press subregion and delete junk data: many databases are supported partition table, can for example, carry out subregion by certain rule (carrying out scope, hash or complex method etc. according to certain row) to data, data in table are stored in to multiple files physically, directly delete by storing process for the partition table no longer needing;
It is high that this method is compared the first efficiency, there is again the situation of junk data but cannot process existing valid data in same subregion, in addition, this method requires data can divide Division, when business is adjusted or usually needs to re-start data partition when demand changes, complex operation, very flexible and usually need shutdown operation;
3) data of data base administrator's operation are deleted operation+defragmentation: data base administrator can be according to the demand of business, move some timings or the operation of non-timed, whether database is become junk data and carry out and delete by the rule judgment data of specifying in " inquiry+judgement+deletion " mode.After this deletion action is carried out, these junk datas are just no longer visible to user, and the storage space that they take is recovered in the time of next database operation defragmentation;
This " inquiry+judgement+deletion " need to first be inquired about, rear judgement, delete again the data that become rubbish, this process produces the random IO (Input/Output of a large amount of disks, I/O) write operation, efficiency is lower, even carry out also usually read-write service performance and the response time etc. of database being produced to considerable influence in the low ebb phase of database access;
4) each unit of Google BigTable Version Control+compacting (compaction): BigTable can retain multiple versions of same data, these versions can (for example retain 3 versions by the control of version number, after new data writes, the version writing is the earliest automatically discarded) or control by time variable and (for example retain 1 week, the versions of data that exceedes one week is automatically discarded), discarded data are no longer visible to user, and the storage space that they take is recovered in the time carrying out compacting (compaction) operation next time;
This mechanism is only suitable for each unit stores the situation of multiple versions of data, is not suitable for the scene that other carry out junk data judgement and deletion by rule and condition.
In sum, prior art is urgently improved.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of data managing method and device, and the invalid junk data existing in more intelligent identification and deletion system reduces junk data simultaneously and deletes the impact on system, improves system effectiveness.
In order to address the above problem, the embodiment of the present invention provides a kind of data managing method, comprising:
In the time meeting defragmentation condition, judge whether the data in storage space or database to be arranged meet default junk data rule, if met, delete the data that meet described junk data rule, and reclaim the shared amount of physical memory of data that meets described junk data rule.
Said method also can have following characteristics: while receiving real time data read requests, judge whether institute's request msg meets described junk data rule, if met,, in the time exporting the data of asking, filter the data that meet described junk data rule.
Said method also can have following characteristics: every junk data rule comprises the logical combination of one or more rule, and every one or more data of junk data rule association;
Describedly judge in storage space to be arranged or database or whether the data of asking meet default junk data rule and comprise:
Described in judgement in storage space to be arranged or database or the data of asking whether meet its associated junk data rule.
Said method also can have following characteristics: described junk data rule is systemic presupposition, or arranges and dynamically update according to user.
Said method also can have following characteristics: describedly meet defragmentation condition and comprise following one or a combination set of:
Current system load is less than load threshold;
Current time meets defragmentation time conditions.
The embodiment of the present invention also provides a kind of data administrator, it is characterized in that, comprises regular control module, rule parsing module, defragmentation scheduler module and junk data removing module, wherein:
Described regular control module is used for, and junk data rule is set;
Described rule parsing module is used for, and explains and carries out junk data rule, judges whether data meet described junk data rule;
Described defragmentation scheduler module is used for, and in the time meeting defragmentation condition, calls described junk data removing module;
Described junk data removing module is used for, after being called by described defragmentation scheduler module, calling rule parsing module judges whether the data in storage space or database to be arranged meet junk data rule, if met, delete the data that meet described junk data rule, and reclaim the shared amount of physical memory of data that meets described junk data rule.
Said apparatus also comprises: data read filtering module, while being used for receiving real time data read requests, call described rule parsing module and judge whether the data of asking meet described junk data rule, in the time exporting the data of asking, filter and meet described junk data.
Said apparatus also can have following characteristics: every junk data rule of described regular control module setting comprises the logical combination of one or more rule, and every one or more data of junk data rule association;
Described rule parsing module judges whether data meet default junk data rule and comprise:
Described rule parsing module judges whether described data meet its associated junk data rule.
Said apparatus also can have following characteristics: the described junk data rule that described regular control module arranges is systemic presupposition, or described regular control module arranges and dynamically updates described junk data rule according to user.
Said apparatus also can have following characteristics: describedly meet defragmentation condition and comprise following one or a combination set of:
Current system load is less than load threshold;
Current time meets defragmentation time conditions.
The embodiment of the present invention has proposed a kind of data managing method and device, allow storage system automatically identify junk data and not need user or system management memory person etc. to carry out explicit deletion according to rule, the operations such as the defragmentation that delay is carried out can be reclaimed the storage space that they take, and before junk data is not really deleted, user also no longer reads these data.Compared with prior art scheme, the application's advantage comprises:
Efficiency is high: junk data is identified filtration automatically, deletes without user's maintenance program; User's (as system management memory person) only need to arrange junk data rule, do not need explicitly to delete junk data, once junk data taking effect rules, those data that should become rubbish according to junk data rule are just no longer visible to user, storage space when follow-up storage system is carried out defragmentation or other similar operations, these junk datas of recovery being taken;
Little to systematic influence: not need the in real time explicit deletion action (only logic is deleted, and postpones to carry out physics and deletes) of carrying out, exempted the impact on performance of storage system;
Flexible: junk data rule is supported the Boolean expression of various multiple data sources complexity, and can not shut down and safeguard in real time adjustment; Junk data rule can be revised as required at any time, does not affect list structure, also can not affect the use of user to storage system; Setting junk data rule comes into force afterwards immediately;
Be conducive to protect hardware; improve service life of equipment: make full use of ardware feature; random disk I/O in rubbish deletion action (being the deletion of carrying out at any time as required data in prior art in system operational process) is converted into order IO (the unified deletion of carrying out data in defragmentation in the embodiment of the present invention; need to be in the deletion of carrying out at any time as required data in system operational process); efficiently simultaneously to hardware longevity close friends such as SSD (Solid State Disk, solid state hard disc).
Certainly, implement arbitrary product of the present invention and must not necessarily need to reach above-described all advantages simultaneously.
Accompanying drawing explanation
Fig. 1 is embodiment of the present invention data administrator block diagram.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, hereinafter in connection with accompanying drawing, embodiments of the invention are elaborated.It should be noted that, in the situation that not conflicting, the combination in any mutually of the feature in embodiment and embodiment in the application.
The embodiment of the present invention provides a kind of data managing method, comprising:
In the time meeting defragmentation condition, judge whether the data in storage space or database to be arranged meet default junk data rule, if met, delete and meet the data of described junk data rule, and reclaim the described shared amount of physical memory of data that meets described junk data rule.
Wherein, described method also comprises:
While receiving data read request, judge whether institute's request msg meets described junk data rule, if met, in the time exporting the data of asking, filter the data that meet described junk data rule.
Wherein, every junk data rule comprises the logical combination of one or more rule, and every one or more data of junk data rule association;
Describedly judge in storage space to be arranged or database or whether the data of asking meet default junk data rule and comprise:
Described in judgement in storage space to be arranged or database or the data of asking whether meet its associated junk data rule.
Wherein, described junk data rule is systemic presupposition, or arranges and dynamically update according to user.That is, can in system, preset junk data rule, also can in system operational process, change at any time junk data rule.
Wherein, describedly meet defragmentation condition and comprise following one or a combination set of:
Current system load is less than load threshold;
Current time meets defragmentation time conditions.
Described defragmentation time conditions can be the time of specifying, and can be also fixed time and frequency etc.
When system load is less than load threshold, carry out defragmentation, can avoid the system that affects to provide service for user.
Wherein, the judgment rule of junk data can for example, be described with various program languages (SQL (Structured Query Language, Structured Query Language (SQL)) and various programming languages etc.), such as:
The rule of a) " deleting the data of input on June 11st, 2012 " can be described as: (modify_time >=' 20120611 ' & & modify_time < ' 20120612 ');
The rule of b) " if the data consumption time exceedes one day, it being deleted from storage system " can be described as: ($ sys_date > (consumption_time+1));
The rule of c) " if an order is to generate before for 365 days, so it being deleted from storage system " can be described as: ($ sys_date > (created_time+365));
The rule of d) " if the 1st row of one article of record are greater than the 3rd row with the 2nd row sum, deleting it " can be described as: (([1]+[2]) > [3]);
Situation b) and situation c) in, even if data are not revised, they also may become junk data, thereby invisible to user, the space that they take also can be reclaimed in the time of follow-up defragmentation or other similar operations.
Set forth principle of the present invention take immediate news systems and shopping commending system as example respectively below.
Immediate news systems
Imagining an immediate news systems utilizes storage system to preserve each user's undelivered message, be that other users issue this user but this user's of undelivered message (because this user is online or the reason such as Network Abnormal), undelivered message is being sent to after targeted customer and can deleted.In system, define " undelivered message table " and " finally sending to message time table ", respectively as shown in following table 1 and table 2:
Table 1: undelivered message table
Figure BDA00002294215500071
Wherein, " targeted customer ID " and " sender ID " is respectively unique identity ID of targeted customer and sender, and message time is the time (when the date: divide: second: microsecond) that server is received message.For same targeted customer, the message time of reception is different and from morning to night arrange by the time.
Table 2: finally send to message time table
Figure BDA00002294215500081
Wherein, " finally send to message time " and refer to the message time of the last item message of sending to this user.Above-mentioned two tables are by " targeted customer ID " association.
According to the demand, system management memory person need to configure following junk data rule in system:
Rule 1: " if message is sent to, deleting this message "
Once other users have sent a piece of news to certain user and this message cannot be sent to, in above-mentioned " undelivered message table ", increase a record, if this targeted customer's record does not exist in " finally sending to message time table ", increase a record, " finally sending to message time " field is wherein Null (sky).For example, user N has sent a piece of news to user D: " please wait 10 minutes ", but this message is not sent to user D, just increases a record so in " undelivered message table ", as shown in table 3:
Table 3: undelivered message table
In " finally sending to message time table ", also increase the record of D, as shown in table 4:
Table 4: finally send to message time table
Figure BDA00002294215500092
In 20120611 mornings, user A and D have successively reached the standard grade, and system is that the undelivered message that they preserve is also successively sent to them, so the content of " finally sending to message time table " has become shown in following table 5:
Table 5: finally send to message time table
Figure BDA00002294215500093
Because the message of having sent in " undelivered message table " does not need user to delete or system management memory person's deletion, a field only " finally sending to message time table " changes, because junk data deletes, the read and write access of storage system is greatly reduced, the performance of storage system can significantly promote.
System management memory person conventionally also configure storage system carry out time (for example morning, 1:30 started) of internal fragmentation arrangement and frequency (for example every day 1 time or weekly 1 inferior); therefore storage system can at the appointed time be carried out defragmentation to the data of its storage by the frequency of specifying, and reclaims the space that junk data takies.Suppose that storage system arranges at 20120615 1:30, when undelivered message table is arranged, because the message that sends to A and D is sent to, meet this junk data rule " if message is sent to; delete this message ", send to the shared space of message of A and D to be recovered (being that message is deleted), the content of " undelivered message table " after arrangement is as shown in table 6:
Table 6: undelivered message table
Figure BDA00002294215500101
Shopping commending system
A large amount of historical behavior data such as commending system often needs to utilize the browsing of user, collects, transaction, in conjunction with the possible hobby of various data mining algorithm analysis user, for improve these historical datas of accuracy to have certain ageing, such as utilizing the inventory records of browsing within month to recommend; Require Recommendations to meet relevant policies and regulations requirement, the historical commodity data relying in system must be the commodity of optional undercarriage state simultaneously, avoids occurring in final recommendation results many illegal commodity.System has defined " goods browse history lists " and " condition of merchandise table " as an example of goods browse history example, as shown in table 7 and table 8:
Table 7: goods browse history lists
Figure BDA00002294215500111
Wherein, " buyer ID " and " seller ID " is respectively the unique identity ID that recommends buyer and commodity seller, and the browsing time is the time (when the date: divide: second: microsecond) that commodity details page is browsed in server record user request.Arrange by time ascending order for same buyer's storage.
Table 8: condition of merchandise table
Figure BDA00002294215500112
" condition of merchandise " shows that commodity are normal or because the reason such as law, policy is forced undercarriage deletion, above-mentioned two tables are by " commodity ID " association.
User's the behavior of browsing is by real time record to " goods browse history lists ", and " condition of merchandise table " also can be revised as violation commodity the state of forcing undercarriage by backstage personnel operation simultaneously.Force the commodity of undercarriage can list the blacklist of commending system in, carry out the deletion of expired and invalid data to " goods browse history lists " according to condition of merchandise and browsing time.
According to the demand, system management memory person need to configure following junk data rule (being associated following rule) to " goods browse history lists " in system:
Rule 2: " if the browsing time is before one month or commodity are forced undercarriage, deleting this record "
Such as 20120621 mornings, commodity 1000005 are forced undercarriage, and condition of merchandise table is updated to table 9:
Table 9 condition of merchandise table
Figure BDA00002294215500122
User carries out after junk data rule configuration, 6.21 rear storage systems are carried out junk data arrangement according to this junk data rule, the 2nd row in table 7, and commodity 1000001 are because the browsing time is before one month, meet junk data rule, deleted, 4-5 is capable, because commodity 1000005 are forced undercarriage, also meet junk data rule, deleted, therefore, the net result of " goods browse history lists " is as following table 10:
Table 10: goods browse history lists
The embodiment of the present invention also provides a kind of data administrator, as shown in Figure 1, comprises that regular control module 101, rule parsing module 102, defragmentation scheduler module 103, junk data removing module 104 and data read filtering module 105, wherein:
Described regular control module 101 for, junk data rule is set;
Described rule parsing module 102 for, explain and carry out junk data rule, judge whether data meet described junk data rule;
Described defragmentation scheduler module 103 for, in the time meeting defragmentation condition, call described junk data removing module 104;
Described junk data removing module 104 for, after being called by described defragmentation scheduler module, calling rule parsing module 102 judges whether the data in storage space or database to be arranged meet junk data rule, if met, delete and meet the data of described junk data rule, and reclaim the described shared amount of physical memory of data that meets described junk data rule;
Described data read filtering module 105 for, while receiving real time data read requests, call described rule parsing module 102 and judge whether asked data meet described junk data rule, in the time exporting the data of asking, filter the data that meet described junk data rule.
Wherein, every junk data rule that described regular control module 101 arranges comprises the logical combination of one or more rule, and every one or more data of junk data rule association;
Described rule parsing module 102 judges whether data meet default junk data rule and comprise:
Described rule parsing module 102 judges whether described data meet its associated junk data rule.
Wherein, the described junk data rule that described regular control module 101 arranges is systemic presupposition, or described regular control module 101 arranges and dynamically updates described junk data rule according to user.
Wherein, describedly meet defragmentation condition and comprise following one or a combination set of:
Current system load is less than load threshold;
Current time meets defragmentation time conditions.
The data managing method that the embodiment of the present invention provides and device, user's (as system management memory person) only need to arrange junk data rule, do not need explicitly to delete junk data, once junk data taking effect rules, those data that should become rubbish according to junk data rule are just no longer visible to user, storage space when follow-up storage system is carried out defragmentation or other similar operations, these junk datas of recovery being taken; This scheme does not need the explicit deletion action of carrying out in real time, has exempted the impact on performance of storage system, in addition, does not need user manually to delete, and has reduced system maintenance cost.
One of ordinary skill in the art will appreciate that all or part of step in said method can carry out instruction related hardware by program and complete, described program can be stored in computer-readable recording medium, as ROM (read-only memory), disk or CD etc.Alternatively, all or part of step of above-described embodiment also can realize with one or more integrated circuit.Correspondingly, the each module/unit in above-described embodiment can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.

Claims (10)

1. a data managing method, is characterized in that, comprising:
In the time meeting defragmentation condition, judge whether the data in storage space or database to be arranged meet default junk data rule, if met, delete the data that meet described junk data rule, and reclaim the shared amount of physical memory of data that meets described junk data rule.
2. the method for claim 1, is characterized in that, described method also comprises:
While receiving real time data read requests, judge whether institute's request msg meets described junk data rule, if met,, in the time exporting the data of asking, filter the data that meet described junk data rule.
3. method as claimed in claim 1 or 2, is characterized in that, every junk data rule comprises the logical combination of one or more rule, and every one or more data of junk data rule association;
Describedly judge in storage space to be arranged or database or whether the data of asking meet default junk data rule and comprise:
Described in judgement in storage space to be arranged or database or the data of asking whether meet its associated junk data rule.
4. method as claimed in claim 1 or 2, is characterized in that, described junk data rule is systemic presupposition, or arranges and dynamically update according to user.
5. method as claimed in claim 1 or 2, is characterized in that, describedly meets defragmentation condition and comprises following one or a combination set of:
Current system load is less than load threshold;
Current time meets defragmentation time conditions.
6. a data administrator, is characterized in that, comprises regular control module, rule parsing module, defragmentation scheduler module and junk data removing module, wherein:
Described regular control module is used for, and junk data rule is set;
Described rule parsing module is used for, and explains and carries out junk data rule, judges whether data meet described junk data rule;
Described defragmentation scheduler module is used for, and in the time meeting defragmentation condition, calls described junk data removing module;
Described junk data removing module is used for, after being called by described defragmentation scheduler module, calling rule parsing module judges whether the data in storage space or database to be arranged meet junk data rule, if met, delete the data that meet described junk data rule, and reclaim the shared amount of physical memory of data that meets described junk data rule.
7. device as claimed in claim 6, it is characterized in that, described device also comprises: data read filtering module, while being used for receiving real time data read requests, call described rule parsing module and judge whether the data of asking meet described junk data rule, in the time exporting the data of asking, filter and meet described junk data.
8. the device as described in claim 6 or 7, is characterized in that,
Every junk data rule of described regular control module setting comprises the logical combination of one or more rule, and every one or more data of junk data rule association;
Described rule parsing module judges whether data meet default junk data rule and comprise:
Described rule parsing module judges whether described data meet its associated junk data rule.
9. the device as described in claim 6 or 7, is characterized in that, the described junk data rule that described regular control module arranges is systemic presupposition, or described regular control module arranges and dynamically updates described junk data rule according to user.
10. the device as described in claim 6 or 7, is characterized in that, describedly meets defragmentation condition and comprises following one or a combination set of:
Current system load is less than load threshold;
Current time meets defragmentation time conditions.
CN201210407470.0A 2012-10-23 2012-10-23 A kind of data managing method and device Active CN103778064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210407470.0A CN103778064B (en) 2012-10-23 2012-10-23 A kind of data managing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210407470.0A CN103778064B (en) 2012-10-23 2012-10-23 A kind of data managing method and device

Publications (2)

Publication Number Publication Date
CN103778064A true CN103778064A (en) 2014-05-07
CN103778064B CN103778064B (en) 2017-10-27

Family

ID=50570325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210407470.0A Active CN103778064B (en) 2012-10-23 2012-10-23 A kind of data managing method and device

Country Status (1)

Country Link
CN (1) CN103778064B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107767204A (en) * 2016-08-23 2018-03-06 北京京东尚科信息技术有限公司 The method and system of batch modification order data object
WO2018127116A1 (en) * 2017-01-09 2018-07-12 腾讯科技(深圳)有限公司 Data cleaning method and apparatus, and computer-readable storage medium
CN108932111A (en) * 2018-06-15 2018-12-04 深圳市华傲数据技术有限公司 A kind of optimization method, medium and the equipment of reading and writing data performance
CN108959500A (en) * 2018-06-26 2018-12-07 郑州云海信息技术有限公司 A kind of object storage method, device, equipment and computer readable storage medium
CN116049021A (en) * 2022-08-29 2023-05-02 荣耀终端有限公司 Storage space management method, electronic device, and computer-readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829355A (en) * 2005-03-02 2006-09-06 乐金电子(中国)研究开发中心有限公司 Battery locking device and method for mobile communication terminal
US20070168334A1 (en) * 2006-01-13 2007-07-19 Julien Loic R Normalization support in a database design tool
CN101464904A (en) * 2009-01-09 2009-06-24 华为技术有限公司 File identification method and device
CN101957811A (en) * 2010-10-18 2011-01-26 中兴通讯股份有限公司 Method for filtering and analyzing data set of report form and report form processing equipment
CN102073464A (en) * 2011-01-14 2011-05-25 南开大学 Method for creating allocation-on-demand incremental volume
CN102521145A (en) * 2011-12-23 2012-06-27 东信和平智能卡股份有限公司 Java card system and space distribution processing method thereof
CN102591788A (en) * 2011-12-23 2012-07-18 飞天诚信科技股份有限公司 Method for recovering Java card garbage

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829355A (en) * 2005-03-02 2006-09-06 乐金电子(中国)研究开发中心有限公司 Battery locking device and method for mobile communication terminal
US20070168334A1 (en) * 2006-01-13 2007-07-19 Julien Loic R Normalization support in a database design tool
CN101464904A (en) * 2009-01-09 2009-06-24 华为技术有限公司 File identification method and device
CN101957811A (en) * 2010-10-18 2011-01-26 中兴通讯股份有限公司 Method for filtering and analyzing data set of report form and report form processing equipment
CN102073464A (en) * 2011-01-14 2011-05-25 南开大学 Method for creating allocation-on-demand incremental volume
CN102521145A (en) * 2011-12-23 2012-06-27 东信和平智能卡股份有限公司 Java card system and space distribution processing method thereof
CN102591788A (en) * 2011-12-23 2012-07-18 飞天诚信科技股份有限公司 Method for recovering Java card garbage

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107767204A (en) * 2016-08-23 2018-03-06 北京京东尚科信息技术有限公司 The method and system of batch modification order data object
CN107767204B (en) * 2016-08-23 2021-08-03 北京京东尚科信息技术有限公司 Method and system for modifying order data objects in batch
WO2018127116A1 (en) * 2017-01-09 2018-07-12 腾讯科技(深圳)有限公司 Data cleaning method and apparatus, and computer-readable storage medium
CN108287835A (en) * 2017-01-09 2018-07-17 腾讯科技(深圳)有限公司 A kind of data clearing method and device
US11023448B2 (en) 2017-01-09 2021-06-01 Tencent Technology (Shenzhen) Company Limited Data scrubbing method and apparatus, and computer readable storage medium
CN108287835B (en) * 2017-01-09 2022-06-21 腾讯科技(深圳)有限公司 Data cleaning method and device
CN108932111A (en) * 2018-06-15 2018-12-04 深圳市华傲数据技术有限公司 A kind of optimization method, medium and the equipment of reading and writing data performance
CN108959500A (en) * 2018-06-26 2018-12-07 郑州云海信息技术有限公司 A kind of object storage method, device, equipment and computer readable storage medium
CN116049021A (en) * 2022-08-29 2023-05-02 荣耀终端有限公司 Storage space management method, electronic device, and computer-readable storage medium
CN116049021B (en) * 2022-08-29 2023-10-20 荣耀终端有限公司 Storage space management method, electronic device, and computer-readable storage medium

Also Published As

Publication number Publication date
CN103778064B (en) 2017-10-27

Similar Documents

Publication Publication Date Title
CN109857737B (en) Cold and hot data storage method and device and electronic equipment
US8352429B1 (en) Systems and methods for managing portions of files in multi-tier storage systems
US9110909B2 (en) File level hierarchical storage management system, method, and apparatus
US10158483B1 (en) Systems and methods for efficiently and securely storing data in a distributed data storage system
US9355112B1 (en) Optimizing compression based on data activity
JP4733461B2 (en) Computer system, management computer, and logical storage area management method
US9213731B2 (en) Determining whether to relocate data to a different tier in a multi-tier storage system
US10970300B2 (en) Supporting multi-tenancy in a federated data management system
CN104781812A (en) Policy driven data placement and information lifecycle management
CN107016123B (en) File management method and terminal device
CN109947373B (en) Data processing method and device
CN103116661A (en) Data processing method of database
CN103778064A (en) Data management method and device
EP2286342A1 (en) Storage performance optimization
CN110659259B (en) Database migration method, server and computer storage medium
CN103605585A (en) Intelligent backup method based on data discovery
CN104854582A (en) Method and system for memory efficient, update optimized, transactional full-text index view maintenance
CN110825694A (en) Data processing method, device, equipment and storage medium
RU2665272C1 (en) Method and apparatus for restoring deduplicated data
CN110209736A (en) Device, method and the storage medium of block chain data processing
US10289685B2 (en) Information lifecycle governance
US20230161795A1 (en) Time series data management systems and methods
AU2023248423A1 (en) Time series data layered storage systems and methods
JP4526337B2 (en) Data management system and method
CN111767284B (en) Data processing method, device, storage medium and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211115

Address after: Room 507, floor 5, building 3, No. 969, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee after: Zhejiang tmall Technology Co., Ltd

Address before: P.O. Box 847, 4th floor, Grand Cayman capital building, British Cayman Islands

Patentee before: Alibaba Group Holdings Limited