Dynamically sizing chunks in a partially loaded spreadsheet model

ABSTRACT

A method for managing a dynamically-sized chunked spreadsheet model on a server includes creating, on the server, a plurality of chunks representing a spreadsheet, where a first chunk in the plurality of chunks includes a first range of cells in the spreadsheet. The method further includes storing on the server a mutation log for the spreadsheet, and receiving a first plurality of mutations from a plurality of client computers, where the first plurality of mutations are stored in the mutation log. The method further includes applying the first plurality of mutations to the first chunk in response to a first client computer in the plurality of client computers requesting the first range of cells, and sending the first chunk to the first client computer.

BACKGROUND

Cloud storage systems provide users with the ability to store electronic documents and other files on a remote network rather than on a local computer. This allows users the ability to access the remotely stored files from any device that is capable of connecting with the remote network, for example using a web browser over an Internet connection. Users typically log into an account on the cloud storage system using a username and password. The cloud storage system provides a user interface for users to view, edit, and manage files stored on the system. Cloud storage systems also provide users the ability to share files with other users and to allow collaboration between users on the same file.

One type of file that may be stored in a cloud storage system is a spreadsheet. Spreadsheets are usually arranged as a set of rows and columns that define cells, where each cell may contain data, formulae, or other information. Spreadsheets range in size and larger spreadsheets may contain many rows or columns of information. Typically, when a file from a cloud storage system is loaded onto a client computer the data contents of the entire file are sent from the server to the client computer. For large spreadsheets, the amount of data may range in the megabytes or above. Downloading the information to the client computer may take a long time and may also slow down the rendering process on the client computer. In addition, if a user only wants to edit a certain portion of the spreadsheet, loading the entire spreadsheet onto the client computer wastes time and resources.

SUMMARY

The systems and methods described herein provide a data structure of a spreadsheet in a cloud storage system that may be quickly loaded onto a client computer regardless of the size of the spreadsheet. Only a portion of the spreadsheet may be loaded at a time, with other portions of the spreadsheet loaded as needed by the user. A cloud storage system includes one or more servers for storing files for a user, including spreadsheets. Each spreadsheet is represented by a plurality of chunks, where each chunk encompasses a range of cells in the spreadsheet. The cloud storage system maintains a set of chunks for the spreadsheet. Each user with write access to the spreadsheet may load chunks from the cloud storage system, where they are locally stored. Each client computer can then dynamically change its locally-stored set of chunks independent from the cloud storage system and other users. Any individual chunk in one set of chunks may or may not share the same attributes as any individual chunk in another set of chunks. A mutation log associated with the spreadsheet is stored on the cloud storage system. The mutation log records all mutations, or edits, made to the spreadsheet by a number of users with write access to the spreadsheet. The cloud storage system receives mutations from users, records them in the mutation log, and then broadcasts the mutations to other collaborators. When a user on a client computer requests the display of a range of cells of a spreadsheet stored on the cloud storage system, the cloud storage system applies the mutations stored in the mutation log to one or more of its chunks that span the range of cells of the spreadsheet requested. The cloud storage system sends the updated chunks to the client computer for display. The chunk boundaries for each user may be dynamically adjusted depending on the mutations received from each collaborator. The size of the chunks may be based on the memory and connection capabilities of the client computer associated with the chunks.

One aspect described herein discloses a method for managing a dynamically-sized chunked spreadsheet model on a server. The method includes creating, on the server, a plurality of chunks representing a spreadsheet, where a first chunk in the plurality of chunks includes a first range of cells in the spreadsheet. The method further includes storing on the server a mutation log for the spreadsheet, and receiving a first plurality of mutations from a plurality of client computers, where the first plurality of mutations are stored in the mutation log. The method further includes applying the first plurality of mutations to the first chunk in response to a first client computer in the plurality of client computers requesting the first range of cells, and sending the first chunk to the first client computer.

Another aspect described herein discloses a system for managing a dynamically-sized chunked spreadsheet model, the system including a server. The server is configured to communicate with a plurality of client computers using a communication connection, create a plurality of chunks representing a spreadsheet, where a first chunk in the plurality of chunks includes a first range of cells in the spreadsheet, and store a mutation log for the spreadsheet. The server is further configured to receive a first plurality of mutations from the plurality of client computers, where the first plurality of mutations are stored in the mutation log, apply the first plurality of mutations to the first chunk in response to a first client computer in the plurality of client computers requesting the first range of cells, and send the first chunk to the first client computer over the communication connection.

BRIEF DESCRIPTION OF THE DRAWINGS

The methods and systems may be better understood from the following illustrative description with reference to the following drawings in which:

FIG. 1 shows a client-server system for managing a dynamically-sized chunked spreadsheet model in accordance with an implementation as described herein;

FIG. 2 shows the components of a server configured for managing a dynamically-sized chunked spreadsheet model in accordance with an implementation as described herein;

FIG. 3 shows a spreadsheet with dynamically-sized chunks in accordance with an implementation as described herein;

FIG. 4 shows a mutation log for a spreadsheet with dynamically-sized chunks in accordance with an implementation as described herein;

FIG. 5 shows another spreadsheet with dynamically-sized chunks in accordance with an implementation as described herein;

FIG. 6 shows a dependency graph for a spreadsheet with dynamically-sized chunks in accordance with an implementation as described herein;

FIG. 7 shows another spreadsheet with dynamically-sized chunks in accordance with an implementation as described herein;

FIG. 8 shows another dependency graph for a spreadsheet with dynamically-sized chunks in accordance with an implementation as described herein;

FIG. 9 shows a method for managing a dynamically-sized chunked spreadsheet model in accordance with an implementation as described herein; and

FIG. 10 shows another method for managing a dynamically-sized chunked spreadsheet model in accordance with an implementation as described herein.

DETAILED DESCRIPTION

To provide an overall understanding of the systems and methods described herein, certain illustrative embodiments will now be described, including systems and methods for managing a dynamically-sized chunked spreadsheet model on a cloud storage system. However, it will be understood that the systems and methods described herein may be adapted and modified as is appropriate for the application being addressed and that the systems and methods described herein may be employed in other suitable applications, and that such other additions and modifications will not depart from the scope thereof. In particular, a server or system as used in this description may be a single computing device or multiple computing devices working collectively and in which the storage of data and the execution of functions are spread out among the various computing devices.

Aspects of the systems and methods described herein provide a cloud storage system capable of creating, storing, and managing an electronic document with dynamically-sized chunks. An exemplary electronic document that may be represented by dynamically-sized chunks is a spreadsheet, but presentation documents, word processing documents, or other electronic documents may also represented by dynamically-sized chunks. A spreadsheet may be represented by one or more chunks, where each chunk encompasses a range of cells in the spreadsheet. One or more servers hosting a cloud storage system maintains a set of chunks for the spreadsheet. Each user with write access to the spreadsheet may load chunks from the cloud storage system, where they are locally stored. Each client computer can then dynamically change its locally-stored set of chunks independent from the cloud storage system and other users. All chunks are initially empty. A mutation log is associated with the spreadsheet and stored on the server. The mutation log records all mutations made by users to the spreadsheet to any chunk of the spreadsheet. When a user on a client computer requests a range of cells of the spreadsheet from the server, the server applies all the mutations stored in the mutation log to one or more of its chunks representing the range of cells of the spreadsheet requested and sends the copies of the chunks to the client computer. Each chunk is also associated with a dependency graph, which stores the dependencies each cell in the chunk has on other cells. To improve chunk loading performance, snapshots of chunks may be stored and associated with the chunks, where the snapshot captures a chunk at a certain time. This allows the server to only apply mutations occurring after the snapshot rather than starting from an empty chunk. For example, a chunk may be associated with a time-ordered series of snapshots and the cloud storage system utilizes the most recent snapshot to generate an up-to-date version of the chunk. Older snapshots may be used as records of previous versions of the chunk.

A cloud storage system stores files for users and allows users to view, edit, share, and download those files using client computers connected to the cloud storage system over a remote network. One type of file that a cloud storage system may store is a spreadsheet. FIG. 1 illustrates a client-server system, where the server supports a cloud storage system for storing spreadsheets and other files. System 100 includes one or more servers 102 which collectively provide a cloud storage system for storing files such as spreadsheet file 104. System 100 also includes a number of client computers 106 a through 106 d which connect to servers 102 through a remote network, such as the Internet. Each one of client computers 106 a through 106 d may be a desktop computer, laptop computer, mobile device, tablet, or any other computing device capable of connecting with servers 102. The remote network connection may be a wired or wireless Internet connection, local area network (LAN), wide area network (WAN), Wi-Fi network, Ethernet, or any other type of known connection.

A cloud storage system may be configured to create and store a spreadsheet model using dynamically-sized chunks. First, a general cloud storage system is described in more detail. Server 200 in FIG. 2 shows an example of a server for use in a cloud storage system. A cloud storage system may include a number of servers that collectively provide the cloud storage service. Server 200 includes a central processing unit (CPU) 202, read only memory (ROM) 204, random access memory (RAM) 206, input/output interface 208, data store 210, and bus 212. Server 200 may have additional components that are not illustrated in FIG. 2. Bus 212 allows the various components of server 200 to communicate with each other. Input/output interface 208 allows the server 200 to communicate with other devices, such as client computers or other servers in the cloud storage system. Data store 210 may store, among other things, files belonging to users of the cloud storage system. Data store 210 also stores dynamically-sized chunks for each user accessing a spreadsheet stored on the server, a dependency graph for each chunk, and a mutation log for each spreadsheet. Users connect with server 200 through input/output interface 208 to access files stored in data store 210.

Data store 210 for providing cloud storage services may be implemented using non-transitory computer-readable media. In addition, other programs executing on server 200 may be stored on non-transitory computer-readable media. Examples of suitable non-transitory computer-readable media include all forms of non-volatile memory, media and memory devices, including, by way of example only, semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and readable, once-writable, or rewriteable CD-ROM and DVD-ROM disks.

A spreadsheet stored on a cloud storage system may be represented by one or more chunks. FIG. 3 shows an example spreadsheet 300 with dynamically-sized chunks. Spreadsheet 300 as illustrated has rows 1 through 14 and columns A through E, although a spreadsheet may include any number of rows and columns. The cloud storage system may represent the entire spreadsheet 300 using one or more chunks, where each chunk represents a range of cells in the spreadsheet. In FIG. 3, chunk 302 represents rows 1 through 7 and chunk 304 represents rows 8 through 14. Chunks may represent any range of rows, columns, or a combination of rows and column ranges. For example, a chunk may represent the first 1,000 rows of a spreadsheet, the second 1,000 rows of a spreadsheet, the first 1,000 columns of the spreadsheet, or a range of cells covered by rows 1 through 1,000 and columns 100 through 200. For a small spreadsheet with 100 rows and 5 columns, the server may only create one chunk. For a large spreadsheet with 10,000 rows and 20 columns, the server may create 10 chunks, each spanning 1,000 rows. A spreadsheet file may include a number of individual sheets, each having its own tab, arranged in a “workbook” structure. Chunks may be created for each sheet within the spreadsheet file.

The server maintains a master set of chunks for a spreadsheet. Each user with write access to the spreadsheet may load chunks from the cloud storage system, where they are locally stored. Each client computer can then dynamically change its locally-stored set of chunks independent from the cloud storage system and other users. The server may initially set the chunks for each user to be identical, but the size and range of the chunks may be further customized by the client computer and may be based on the capabilities of each client computer that accesses the spreadsheet. For example, if the client computer is a desktop computer with a large cache, the chunk sizes may be large. If the client computer is a tablet or mobile device with smaller memory capabilities, the chunk sizes may be small. The chunk sizes may also be based on the bandwidth of the connection between the client computer and the server. The size and range of the chunks are not static, but may be dynamically changed by the client computer as edits are made to the spreadsheet. For example, if a user adds many rows to a portion of a spreadsheet covered by one chunk, the client computer may split the chunk into two chunks. If a user deletes many rows from a portion of a spreadsheet covered by one chunk, the client computer may merge the reduced chunk with another chunk. If a user adds one or deletes one row in a chunk, the client computer may adjust the boundaries of adjacent chunks. There may be a tolerance range so that repeated insertion and deletion of cells does not repeatedly invoke the merge and split functions, or the boundary adjustment of chunks. The effects of these edits, or mutations, on a chunked spreadsheet model will be discussed in further detail below. Each chunk has an associated ID to uniquely identify it. One of the chunks in the spreadsheet is designated to store metadata information about the entire spreadsheet, such as total number of rows and columns, name of the spreadsheet, chunk IDs, and any other commonly used metadata fields. This chunk may be the first chunk that is normally loaded when a user requests the spreadsheet (e.g. the chunk encompassing row 1 and column 1).

In addition to representing a spreadsheet by one or more dynamically-sized chunks, a mutation log is associated with the spreadsheet. FIG. 4 shows an example of a mutation log 400. The mutation log may apply to all chunks of a spreadsheet, so only one log is stored per spreadsheet. Alternatively, each chunk of the spreadsheet may have an associated mutation log. Mutation log 400 stores mutations, or edits, that all users with write access to the spreadsheet send to the cloud storage system, in the order in which they are received. The cloud storage system stores the mutations and also propagates the mutations to each collaborator that is also working on the same spreadsheet. These edits may be to set the value of cells, delete cell values, enter formulae into cells, cut, copy or paste values, add or delete rows and columns, sorting row or column values, filtering row or column values, linking to external data, performing a calculation, or any other operation permissible in an electronic spreadsheet. For example, mutation log 400 stores a number of set value commands, such as “Set A2=2” for mutation A, “Set A3=4” for mutation B, and “Set B3=A2+A3” for mutation C. Mutation log 400 may also store row addition and deletion mutations, such as “Delete Row 6” for mutation I and “Add Row 11” for mutation J. Other mutations not shown in FIG. 4 may also be stored in mutation log 400. In case of conflicting mutations or mutations that occur at the same time, the server may engage various conflict resolution mechanisms to determine the proper order of mutations. The mutations correlate directly to cells, rows or columns, without regard to chunks. This allows the size and range of chunks to change without affecting mutation log 400. The cloud storage system may assign a revision number to each mutation received. The syntax of the mutations is not limited to that shown in FIG. 4 but may encompass any known spreadsheet syntax.

FIG. 4 also shows two snapshots, one taken after mutation E and one taken after mutation J. Snapshots are copies of a chunk generated at a certain time with all the mutations occurring before that time incorporated into the chunk. For example, snapshot S1 of a chunk incorporates mutations A-E while snapshot S2 of a chunk incorporates mutations A-J. Snapshots are created by the cloud storage system to lessen the time it takes to load a chunk to a user. For example, when a user requests a chunk from a cloud storage system after mutation G has been entered, the cloud storage system takes an empty initial copy of the chunk and applies mutations A-G stored in mutation log 400 to the empty chunk to obtain the current state of the chunk, and then sends the chunk to the client computer. If the cloud storage system has created and stored snapshot S1, then it only needs to apply mutations F and G to snapshot S1 of the chunk before sending the copy to the client computer.

When a spreadsheet is first generated in a cloud storage system, one or more chunks are created that represent the spreadsheet. Initially, all the cells in every chunk have no value (i.e. the spreadsheet is empty), such as shown in FIG. 3. As the cloud storage system receives mutations for the spreadsheet from any number of users, the mutations are stored in a mutation log associated with the spreadsheet, such as shown in FIG. 4. The cloud storage system also sends each mutation to the other collaborators who are working on the same spreadsheet, either individually or in batches. When a client computer requests a range of cells of the spreadsheet encompassed by a chunk, the cloud storage system applies all the mutations received up to that point and applies it to an empty version of the chunk (or a snapshot if one has been created). After all the mutations have been applied, a copy of the chunk is sent to the client computer. For example, mutation log 400 depicted in FIG. 4 is associated with empty spreadsheet 300 in FIG. 3. One or more users send mutations A-E shown in FIG. 4 to the cloud storage system. The cloud storage system stores these mutations in mutation log 400. Then a user on a client computer requests a copy of chunk 302 or chunk 304 of spreadsheet 300. Alternatively, the cloud storage system may save a snapshot of both chunks after mutation E has occurred, such as snapshot S1 illustrated in FIG. 4. In either situation, spreadsheet 500 shown in FIG. 5 depicts the current state of both chunks after mutation E. The client computer stores the copy of the chunk received from the cloud storage system in local memory. The server sends the client computer mutations made by other collaborators on the spreadsheet, which are applied to the chunk at the client computer. If the client computer requires additional portions of the spreadsheet to be loaded, the client computer makes additional chunk requests to the cloud storage system.

Spreadsheet 500 includes chunk 502 and chunk 504, which correspond to chunks 302 and 304 respectively in FIG. 3, but shown after mutations A-E from mutation log 400 have been applied to the chunks. Mutation A, “Set A2=2”, is applied to both chunk 502 and chunk 504. Cell A2 is found in chunk 502 and so it is set to the value “2”, as illustrated. Chunk 504 does not include cell A2, so the application of mutation A to chunk 504 results in a null effect. Mutation B, “Set A3=4”, is also applied to both chunks but has no effect on chunk 504 because cell A3 is located in chunk 502. Likewise with mutation C, which sets cell B3=A2+A3. Mutations D and E, however, produce a change in chunk 504 but no change in chunk 502. After mutations A-E are applied to chunks 502 and 504, cell A2 has the value “2”, cell A3 has the value “4”, cell B3 has the value “6” (A2+A3), cell C10 has the value “8” (A2×A3), and cell E9 has the value “14” (B3+C10).

Each chunk is associated with a dependency graph which records any dependent relationships of cells within the chunk with other cells, either within the same chunk or in a different chunk. FIG. 6 shows two such dependency graphs, graph 602 associated with chunk 502 and graph 604 associated with chunk 504. When the cloud storage system receives a mutation from a user, the cloud storage system applies the mutations to the dependency graphs for each chunk to ensure that relationships between cells are properly preserved. Thus mutations A-E in mutation log 400 are applied to chunks 502 and 504 as well as to graphs 602 and 604. For example, mutation C specifies that the value of cell B3 in chunk 502 depends on the values of cells A2 and A3 and so it is recorded in graph 602 as “A2:A3→B3”. In chunk 504, the values of cells C10 and E9 depend on the values of other cells in both chunk 502 and chunk 504, so the dependency relationship for both cells is recorded in both graphs 602 and 604. The structure and syntax of dependency graphs 600 is not limited to what is shown in FIG. 6 but may encompass any known structure and syntax for expressing relationships between spreadsheet cells. For example, the dependency graphs may be stored as an R-tree. When a user requests a chunk to be loaded on the user's client computer, the cloud storage system applies all the mutations to chunk and to its corresponding dependency graph and sends the chunk and the dependency graph to the client computer. The client computer queries the dependency graph to determine if any cells are dependent on cells in other chunks. The client computer may already have copies of the other chunks that are necessary to determine the cell values stored in local memory, but if the client computer does not have one or more necessary chunks, the client computer requests those chunks from the cloud storage system. The cloud storage system applies the mutations in the mutation log to those chunks and sends them to the client computer. Once the client computer has all the chunks necessary to determine the value of the cells in the first chunk, the client computer calculates the actual cell values for the chunk.

At a later time after mutations A-E were received, the cloud storage system receives mutations F-J for the spreadsheet and records the mutations in mutation log 400. Spreadsheet 700 in FIG. 7 shows the state of chunks 702 and 704 (which correspond to chunks 302 and 304 respectively) after mutations A-J have been applied. For example, spreadsheet 700 may represent a snapshot of chunks 702 and 704 taken after mutation J has been received (snapshot S2 in FIG. 4), or a client computer may request a version of spreadsheet 700 after mutation J has been received and the cloud storage system returns chunks 702 and 704. The cloud storage system may start with empty chunks 302 and 304 and apply mutations A-J to derive chunks 702 and 704. Alternatively, if a snapshot of the chunks exists, the cloud storage system may start with the snapshots and apply only the mutations that are received after the snapshots. For example, chunks 502 and 504 may represent snapshots of the chunks after mutation E. When a client computer requests either chunk 702 or 704 after mutation J has been received, the cloud storage system applies mutations F-J to snapshot chunks 502 or 504 and returns chunk 702 or 704, respectively.

Mutations F, G, and H in mutation log 400 are set value mutations and are applied to both chunk 702 and chunk 704, producing a null effect in any chunks which are not affected by the mutations. Thus the value of cell D1 is set to “3”, the value of D12 is set to “12”, and the value of A3 is set to “5”. Mutation I deletes row 6 of spreadsheet 700. When a row is deleted, the boundaries of chunks may change. For example, because row 6 was within chunk 702 before it was deleted, chunk 702 encompasses new rows 1-6 after the deletion of row 6 rather than rows 1-7 as originally defined. All rows below row 6 are shifted up one row. Thus chunk 704 now encompasses rows 7 through 13 and all the cell values in chunk 704 are shifted up one row. Mutation J inserts a new row as row 11, which affects chunk 704 but not chunk 702. Chunk 704 now encompasses rows 7 through 14 and the values of any cells at or below old row 11 are shifted down one row. After mutation J has been applied, the value of cell C9 in chunk 704 is now set as A2×A3. C10 was originally set to this value, but the deletion of row 6 shifted the value up one row to C9. Likewise, the original value of E9(B3+C10) has been shifted to E8. The value of D12 was originally set to “12”, was shifted up one row by the deletion of row 6, and then shifted down one row by the addition of row 1. Thus cell D12 still contains the value “12”.

Dependency graphs 802 and 804 in FIG. 8 show the dependency relationships for cells in chunks 702 and 704 respectively. Mutations F-J, in addition to being applied to the chunks, are also applied to graphs 802 and 804. Both graphs have been affected by the row deletions and additions. For example, cell C9 rather than cell C10 depends on cells A2 and A3 because of the deletion of row 6. Likewise, cell E8 rather than cell E9 depends on cells B3 and C9 because of the deletion of row 6. Once dependency graphs 800 are updated with the mutations, the cloud storage system may send the dependency graphs along with a copy of the chunks when requested by a user. In this manner, FIGS. 3 through 8 show the operation of dynamically-sized chunks for a spreadsheet model implemented in a cloud storage system.

Methods for creating, storing, and delivering a dynamically-sized chunked spreadsheet model on a cloud storage system are now described. One method for managing a dynamically-sized chunked spreadsheet model on a server is illustrated in FIG. 9. Method 900 includes creating, on the server, a plurality of chunks representing a spreadsheet, where a first chunk in the plurality of chunks includes a first range of cells in the spreadsheet. The method further includes storing on the server a mutation log for the spreadsheet, and receiving a first plurality of mutations from a plurality of client computers, where the first plurality of mutations are stored in the mutation log. The method further includes applying the first plurality of mutations to the first chunk in response to a first client computer in the plurality of client computers requesting the first range of cells, and sending the first chunk to the first client computer.

Method 900 begins when a server hosting a cloud storage system creates a spreadsheet, the spreadsheet including one or more chunks, illustrated at 902. One or more servers such as server 200 in FIG. 2 may host the cloud storage system. This may be in response to a user saving a spreadsheet on the cloud storage system. Each chunk represents a range of cells in the spreadsheet, such as chunks 302 and 304 in spreadsheet 300 shown in FIG. 3. For example, a chunk may represent a number of rows in the spreadsheet, or a number of columns in a spreadsheet. The spreadsheet file may be a workbook that includes a number of separate sheets and chunks are created for each sheet in the workbook. The spreadsheet may initially have only one chunk if the spreadsheet is empty. The server designates one chunk to store metadata information about the entire spreadsheet, such as total number of rows and columns, name of the spreadsheet, chunk IDs, and any other commonly used metadata fields. The server maintains a set of chunks for the spreadsheet. Each user with write access to the spreadsheet may load chunks from the cloud storage system, where they are locally stored. Each client computer can then dynamically change its locally-stored set of chunks independent from the cloud storage system and other users. Thus changes to the size and boundaries of one user's chunks do not affect the size or boundaries other users' chunks. For example, different users may be on client computers with different memory and connection capabilities and the client computer may optimize the chunk size for each client computer. The chunks are stored on the server in lieu of the full spreadsheet.

After a plurality of chunks for a spreadsheet are created, the server stores a mutation log associated with the spreadsheet, illustrated at 904. The mutation log records all mutations, or edits, made by users with write access to the spreadsheet. Mutation log 400 shown in FIG. 4 is an example of a mutation log stored on the server. The server receives a plurality of mutations from one or more users using client computers to work on the spreadsheet, illustrated at 906. Mutations may include commands to set cell values, commands to insert or delete rows or columns, cut, copy, and past commands, filtering row or column values, linking to external data, performing a calculation, and any other standard spreadsheet operations. The server may dynamically modify the range of cells of a chunk based on one or more of the mutations. For example, the server may adjust chunk row boundaries if it receives insert or delete row commands. The mutation log records all mutations in the order in which they are received. In case of conflicting mutations or mutations that occur at the same time, the server may engage various conflict resolution mechanisms to determine the proper order of mutations. The server also sends each received mutation to other collaborators who are also working on the spreadsheet. The mutations stored in the mutation log do not have any chunk information associated with them—they are independent of the chunks. This allows the mutations to be stored on a single mutation log applicable to all chunks. The mutations are not automatically applied to the chunks when they are received, but rather are stored in the mutation log. Each chunk may also have an associated dependency graph, which records the relationships cells within the chunk have with other cells. The plurality of mutations are applied to the dependency graph of each chunk so that the dependency relationships are up-to-date. Examples of dependency graphs in include graphs 602 and 604 shown in FIG. 6 and graphs 802 and 804 shown in FIG. 8.

After a plurality of mutations are received by the server and stored in the mutation log, the server receives a request from a user on a client computer to send the client computer a copy of a range of cells of the spreadsheet, illustrated at 908. For example, this may occur when a client computer requests a range of cells of the spreadsheet encompassed by a first chunk of which the client computer does not currently have a copy. When the request is received by the server, the server applies all the mutations stored in the mutation log to the first chunk on the server in the order in which they are stored. The chunk may initially be empty, so the mutations represent all the edits made by all users to that chunk of the spreadsheet. When all the mutations have been applied, the chunk is up-to-date with all user edits. For example, spreadsheet 500 in FIG. 5 shows up-to-date chunks 502 and 504 after mutations 1-5 listed in mutation log 400 have been applied to the chunk. The server then sends the up-to-date chunk to the client computer, illustrated at 910. If the client computer requests another range of cells of the spreadsheet encompassed by another chunk, the server applies the plurality of mutations to this additional chunk and sends it to the client computer. If the client computer requests a range of cells of the spreadsheet encompassed by multiple chunks, the server applies the plurality of mutations to all the necessary chunks and sends them to the client computer. Unless there are snapshots of the chunk available, the server applies all of the plurality of mutations to any chunk when that chunk is requested by the client computer. In this manner, the server provides a method for managing a dynamically-sized chunked spreadsheet model.

Another method for managing a dynamically-sized chunked spreadsheet model on a server may use snapshots of chunks to decrease the time it takes to generate a chunk for sending to a client computer, as illustrated in FIG. 10. Method 1000 includes creating, on the server, a first plurality of chunks representing a spreadsheet, where a first chunk in the plurality of chunks includes a first range of cells in the spreadsheet, and storing on the server a mutation log for the spreadsheet. The method further includes receiving a first plurality of mutations from a plurality of client computers, where the first plurality of mutations are stored in the mutation log, and storing a snapshot of the first chunk, where the first plurality of mutations are applied to the first chunk to obtain the snapshot. The method further includes receiving a second plurality of mutations from the plurality of client computers, where the second plurality of mutations are stored in the mutation log. The method further includes applying the second plurality of mutations to the snapshot to obtain a modified snapshot in response to a first client computer in the plurality of client computers requesting the first range of cells, and sending the modified snapshot to the first client computer.

Method 1000 begins when a server hosting a cloud storage system creates a spreadsheet, the spreadsheet including one or more chunks, illustrated at 1002. One or more servers such as server 200 in FIG. 2 may host the cloud storage system. This may be in response to a user saving a spreadsheet on the cloud storage system. Each chunk represents a range of cells in the spreadsheet, such as chunks 302 and 304 in spreadsheet 300 shown in FIG. 3. For example, a chunk may represent a number of rows in the spreadsheet, or a number of columns in a spreadsheet. The spreadsheet file may be a workbook that includes a number of separate sheets and chunks are created for each sheet in the workbook. The spreadsheet may initially have only one chunk if the spreadsheet is empty. The server designates one chunk to store metadata information about the entire spreadsheet, such as total number of rows and columns, name of the spreadsheet, chunk IDs, and any other commonly used metadata fields. The server maintains a set of chunks for the spreadsheet. Each user with write access to the spreadsheet may load chunks from the cloud storage system, where they are locally stored. Each client computer can then dynamically change its locally-stored set of chunks independent from the cloud storage system and other users. Thus changes to the size and boundaries of one user's chunks do not affect the size or boundaries other users' chunks. For example, different users may be on client computers with different memory and connection capabilities and the client computer may optimize the chunk size for each client computer. The chunks are stored on the server in lieu of the full spreadsheet.

After a plurality of chunks for a spreadsheet are created, the server stores a mutation log associated with the spreadsheet, illustrated at 1004. The mutation log records all mutations, or edits, made by users with write access to the spreadsheet. Mutation log 400 shown in FIG. 4 is an example of a mutation log stored on the server. The server receives a first plurality of mutations from one or more users using client computers to work on the spreadsheet, illustrated at 1006. Mutations may include commands to set cell values, commands to insert or delete rows or columns, cut, copy and paste commands, filtering row or column values, linking to external data, performing a calculation, and any other standard spreadsheet operations. The server may dynamically modify the range of cells of a chunk based on one or more of the mutations. For example, the server may adjust chunk row boundaries if it receives insert or delete row commands. The mutation log records all mutations in the order in which they are received. In case of conflicting mutations or mutations that occur at the same time, the server may engage various conflict resolution mechanisms to determine the proper order of mutations. The server also sends each received mutation to other collaborators who are also working on the spreadsheet. The mutations stored in the mutation log do not have any chunk information associated with them—they are independent of the chunks. This allows the mutations to be stored on a single mutation log applicable to all chunks. The mutations are not automatically applied to the chunks when they are received, but rather are stored in the mutation log. Each chunk may also have an associated dependency graph, which records the relationships cells within the chunk have with other cells. The first plurality of mutations is applied to the dependency graph of each chunk so that the dependency relationships are up-to-date. Examples of dependency graphs in include graphs 602 and 604 shown in FIG. 6 and graphs 802 and 804 shown in FIG. 8.

After the first plurality of mutations are received by the server and stored in the mutation log, the server stores a snapshot of a first chunk, illustrated at 1008. A snapshot captures the state of the first chunk after the first plurality of mutations are applied to the first chunk. For example, chunks 502 and 504 in FIG. 5 may be snapshots of chunks 302 and 304 respectively taken after the server receives mutations A-E listed in mutation log 400. The server takes a copy of the first chunk and applies the first plurality of mutations to obtain the snapshot. The snapshot is stored on the server and associated with the first chunk. The snapshot allows the server to decrease the amount of time necessary to generate an up-to-date version of the first chunk when a client computer requests a copy of the hunk. After the snapshot has been stored, the server receives an additional second plurality of mutations from the one or more client computers, illustrated at 1010. The second plurality of mutations are also stored in the mutation log. For example, mutations F-J listed in mutation log 400 shown in FIG. 4 may be received after the server takes a snapshot incorporating mutations A-E. The second plurality of mutations are applied to the dependency graph of each chunk so that the dependency relationships are up-to-date.

After the second plurality of mutations are received by the server and stored in the mutation log, the server receives a request from a user on a client computer to send the client computer the first chunk, illustrated at 1012. For example, this may occur when a client computer requests a range of cells of the spreadsheet encompassed by the first chunk. When the request is received by the server, the server applies the second plurality of mutations stored in the mutation log to the snapshot. Applying only the second plurality of mutations to the snapshot takes less time than applying both the first and second plurality of mutations to the initial first chunk. Both processes would lead to the same result. A modified snapshot is obtained after the second plurality of mutations have been applied to the snapshot. For example, mutations F-J listed in mutation log 400 may be applied to snapshot 502 in FIG. 5, where snapshot 502 already incorporates mutations A-E. The result is modified snapshot 702 shown in FIG. 7, which may also be obtained if mutations A-J were applied to empty chunk 302 in FIG. 3. The server sends the modified snapshot to the client computer, illustrated at 1014. The server may take additional snapshots of the first chunk as more mutations are received. If a client computer requests a copy of the first chunk, the server takes the most recent snapshot of the first chunk and only applies mutations received after that snapshot was stored. The server sends this modified snapshot to the client computer. Because each client computer maintains separate sets of chunks, each chunk within each set may have one or more snapshots associated with it. In this manner, the server provides a method for managing a dynamically-sized chunked spreadsheet model using snapshots to decrease the time to deliver chunks to a client computer.

It will be apparent that aspects of the systems and methods described herein may be implemented in many different forms of software, firmware, and hardware in the implementations illustrated in the figures. The actual software code or specialized control hardware used to implement aspects consistent with the principles of the systems and method described herein is not limiting. Thus, the operation and behavior of the aspects of the systems and methods were described without reference to the specific software code—it being understood that one of ordinary skill in the art would be able to design software and control hardware to implement the aspects based on the description herein.

Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. 

What is claimed is:
 1. A method for managing a dynamically-sized chunked spreadsheet model on a server, the method comprising: creating, on the server, a plurality of chunks representing a spreadsheet, wherein a first chunk in the plurality of chunks comprises a first range of cells in the spreadsheet; storing on the server a mutation log for the spreadsheet; receiving a first plurality of mutations from a plurality of client computers, wherein the first plurality of mutations are stored in the mutation log; applying the first plurality of mutations to the first chunk in response to a first client computer in the plurality of client computers requesting the first range of cells; modifying the range of cells that comprise the first chunk based on the first plurality of mutations, wherein: when at least one of the plurality of mutations comprises deleting at least one row from a portion of the spreadsheet covered by the first chunk, determining whether the application of the at least one of the plurality of mutations reduces the size of the first chunk below a predetermined threshold, and merging the first chunk with a different chunk from the plurality of chunks, or, when at least one of the plurality of mutations comprises adding at least one row to a portion of the spreadsheet covered by the first chunk, determining whether the application of the at least one of the plurality of mutations increases the size of the first chunk above the predetermined threshold, and splitting the first chunk into two chunks; and sending the first chunk to the first client computer.
 2. The method of claim 1, wherein a second chunk in the plurality of chunks comprises a second range of cells in the spreadsheet, the method further comprising: applying the first plurality of mutations to the second chunk in response to the first client computer requesting the second range of cells; and sending the second chunk to the first client computer.
 3. The method of claim 2, wherein the first client computer requests the first and second range of cells at the same time.
 4. The method of claim 1, wherein the range of cells of the first chunk is a range of rows in the spreadsheet.
 5. The method of claim 1, wherein a first mutation in the first plurality of mutations is selected from the group consisting of a cut command, a copy command, a paste command, a set value command, an insert row command, a delete row command, an insert column command, a delete column command, a filter command, a sort command, an external link command, and a calculation command.
 6. The method of claim 1, wherein the first chunk is associated with a dependency graph.
 7. The method of claim 6, wherein receiving the first plurality of mutations includes applying the first plurality of mutations to the dependency graph.
 8. The method of claim 6, wherein the dependency graph is sent to the first client computer along with the first chunk.
 9. The method of claim 1, the method further comprising: storing a snapshot of the first chunk, wherein the first plurality of mutations are applied to the first chunk to obtain the snapshot; receiving a second plurality of mutations from the plurality of client computers, wherein the second plurality of mutations are stored in the mutation log; applying the second plurality of mutations to the snapshot to obtain a modified snapshot in response to the first client computer requesting the first range of cells; modifying the range of cells that comprise the first chunk based on the second plurality of mutations, wherein: when at least one of the plurality of mutations comprises deleting at least one row from a portion of the spreadsheet covered by the first chunk, determining whether the application of the at least one of the plurality of mutations reduces the size of the first chunk below a predetermined threshold, and merging the first chunk with a different chunk from the plurality of chunks, or, when at least one of the plurality of mutations comprises adding at least one row to a portion of the spreadsheet covered by the first chunk, determining whether the application of the at least one of the plurality of mutations increases the size of the first chunk above the predetermined threshold, and splitting the first chunk into two chunks; and sending the modified snapshot to the first client computer.
 10. The method of claim 1, wherein each client computer in the plurality of client computers maintain separate sets of the plurality of chunks.
 11. The method of claim 1, wherein each mutation in the first plurality of mutations does not include any information about the plurality of chunks.
 12. A system for managing a dynamically-sized chunked spreadsheet model, the system comprising: a server, wherein the server is configured to: communicate with a plurality of client computers using a communication connection; create a plurality of chunks representing a spreadsheet, wherein a first chunk in the plurality of chunks comprises a first range of cells in the spreadsheet; store a mutation log for the spreadsheet; receive a first plurality of mutations from the plurality of client computers, wherein the first plurality of mutations are stored in the mutation log; apply the first plurality of mutations to the first chunk in response to a first client computer in the plurality of client computers requesting the first range of cells; modify the range of cells that comprise the first chunk based on the first plurality of mutations, wherein: when at least one of the plurality of mutations comprises deleting at least one row from a portion of the spreadsheet covered by the first chunk, determine whether the application of the at least one of the plurality of mutations reduces the size of the first chunk below a predetermined threshold, and merge the first chunk with a different chunk from the plurality of chunks, or, when at least one of the plurality of mutations comprises adding at least one row to a portion of the spreadsheet covered by the first chunk, determine whether the application of the at least one of the plurality of mutations increases the size of the first chunk above a predetermined threshold, and split the first chunk into two chunks; and send the first chunk to the first client computer over the communication connection.
 13. The system of claim 12, wherein a second chunk in the plurality of chunks comprises a second range of cells in the spreadsheet, and wherein the server is further configured to: apply the first plurality of mutations to the second chunk in response to the first client computer requesting the second range of cells; and send the second chunk to the first client computer.
 14. The system of claim 13, wherein the first client computer requests the first and second range of cells at the same time.
 15. The system of claim 12, wherein the range of cells of the first chunk is a range of rows in the spreadsheet.
 16. The system of claim 12, wherein a first mutation in the first plurality of mutations is selected from the group consisting of a cut command, a copy command, a paste command, a set value command, an insert row command, a delete row command, an insert column command, a delete column command, a filter command, a sort command, an external link command, and a calculation command.
 17. The system of claim 12, wherein the first chunk is associated with a dependency graph.
 18. The system of claim 17, wherein the server is further configured to apply the first plurality of mutations to the dependency graph.
 19. The system of claim 17, wherein the dependency graph is sent to the first client computer along with the first chunk.
 20. The system of claim 12, wherein the server is further configured to: store a snapshot of the first chunk, wherein the first plurality of mutations are applied to the first chunk to obtain the snapshot; receive a second plurality of mutations from the plurality of client computers, wherein the second plurality of mutations are stored in the mutation log; apply the second plurality of mutations to the snapshot to obtain a modified snapshot in response to the first client computer requesting the first range of cells; modify the range of cells that comprise the first chunk based on the second plurality of mutations, wherein: when at least one of the plurality of mutations comprises deleting at least one row from a portion of the spreadsheet covered by the first chunk, determine whether the application of the at least one of the plurality of mutations reduces the size of the first chunk below a predetermined threshold, and merge, the first chunk with a different chunk from the plurality of chunks, or, when at least one of the plurality of mutations comprises adding at least one row to a portion of the spreadsheet covered by the first chunk, determine whether the application of the at least one of the plurality of mutations increases the size of the first chunk above a predetermined threshold, and split the first chunk into two chunks; and send the modified snapshot to the first client computer over the communication network.
 21. The system of claim 12, wherein each client computer in the plurality of client computers maintain separate sets of the plurality of chunks.
 22. The system of claim 12, wherein each mutation in the first plurality of mutations does not include any information about the plurality of chunks. 