Patent classifications
G06F9/468
Systems and methods for virtual session connection using component-based connection leases
A computing device may include a memory and a processor cooperating with the memory and configured to receive connection leases providing instructions for connecting to computing sessions, and request connections to the computing sessions including the connection leases. Each connection lease may comprise a first component unique to a published resource, and a second component referenced by the first component and shared in common with a plurality of different published resources in other connection leases, with the second component being updateable independent of the first component.
SUPPORTING PROCESSING-IN-MEMORY EXECUTION IN A MULTIPROCESSING ENVIRONMENT
A processor for supporting PIM (Processing-in-Memory) execution in a multiprocessing environment includes logic configured to: receive a request to initiate an offload of a number of PIM instructions to a PIM device. The request is issued by a first thread of a processor. The logic is also configured to reserve, based on information in the request, resources of the PIM device for execution of the plurality of instructions.
Information processing method, information processing apparatus and information processing system
An information processing method implemented by a computer, the method includes the steps of transmitting authentication information to a destination specified by a first user, receiving, from a terminal used by a second user corresponding to the destination, the authentication information and a second identification information for identifying the terminal, authenticating the terminal if the authentication information from the terminal is received, and storing the second identification information received from the terminal in association with a first identification information for identifying the first user, if the terminal has been authenticated.
SYSTEMS, DEVICES, AND METHODS FOR SELECTING A DISTRIBUTED FRAMEWORK
A method of selecting a distributed framework includes identifying, by a selection device coupled to a memory, at least a first cryptographic evaluator of a plurality of cryptographic evaluators, wherein identifying the at least a first cryptographic evaluator further comprises and evaluating a secure proof generated by the at least a first cryptographic evaluator, and identifying the at least a first cryptographic evaluator as a function of the secure proof, assigning, by the selection device, a confidence level of the at least a first cryptographic evaluator, and selecting, by a selection device, a distributed framework from the plurality of cryptographic evaluators as a function of the confidence level, and assigning a task to the distributed framework.
MANAGING DATABASE QUOTAS WITH A SCALABLE TECHNIQUE
A method and system for providing a scaling quota for a database system have been developed. The method defines a product that is defined by a client using a quota application programming interface (API). A report is created for the defined product with the quota API that is unique to the defined product and specifies a product quota and a limit endpoint for the report. The product quota is managed with a message broker by keeping an updated quota count for each report and product quota. An approval or rejection message is generated by the message broker for the client once the updated quota count reaches the limit endpoint. Finally, a response to the approval or rejection message from the client is generated for the database client by a limit provider application programming interface (API).
Triggered queue transformation
Methods and systems disclosed herein relate generally to evaluating resource loads to determine when to transform queues and to specific techniques for transforming at least part of queues so as to correspond to alternative resources.
System and method for a workload management and scheduling module to manage access to a compute environment according to local and non-local user identity information
A system, method and computer-readable media for managing a compute environment are disclosed. The method includes importing identity information from an identity manager into a module performs workload management and scheduling for a compute environment and, unless a conflict exists, modifying the behavior of the workload management and scheduling module to incorporate the imported identity information such that access to and use of the compute environment occurs according to the imported identity information. The compute environment may be a cluster or a grid wherein multiple compute environments communicate with multiple identity managers.
Access control configurations for inter-processor communications
Methods, systems, and devices for access control configurations for inter-processor communications are described to support reconfiguration of a dynamic access control configuration at a device. For example, additional configuration fields may be added to existing access control rules of the device, where these additional fields may be configured by a processor sending information to a receiving processor, via a shared memory resource or region of the device. The additional fields may include a read-only value which may specify a processor which has exclusive write permission for a memory region of the share memory. This value may indicate the sending processor of the memory region, and the value may be set by access control hardware when the additional field is changed. Other processors of the device may be prevented from writing to the memory region.
Method and system for discovering and logging new microservices for a platform for unified governance of a plurality of intensive computing solutions
A method (800) for logging microservices in a platform for unified governance of a plurality of intensive computing solutions (70) comprising: a proxy microservice (20), a token security microservice (30), at least one security repository (35,36,37), a logging module (90), a service register (91), and comprising the steps of: Reception (820) of a join request from a new microservice (60), Verification (830) of the unique identifier of the new microservice (IDMS), Generation (840) of an authentication token and transmission to the new microservice, Reception (850) of a logging request from a new microservice, comprising data that provides access to the resources of the new microservice and the generated authentication token, Verification (860) of the authentication token with the token security microservice (30), Logging (870), when the authentication token is validated, data that provides access to the resources of the new microservice on the service register (91).
Systems and methods for processing optimizations and templating using metadata-driven blockchain techniques
The present disclosure generally relates to Blockchain-based systems configured to process access rights to resources in a computationally efficient manner. Certain embodiments of the present disclosure generally relate to systems and methods that generate distributed applications to represent digital access rights to resources. Additionally, certain embodiments of the present disclosure generally relate to systems and methods that enhance the processing of assigning access rights using a Blockchain-based system using metadata.