G06F16/211

Cloud data attack detection based on cloud security posture and resource network path tracing

The technology disclosed relates to streamlined analysis of security posture of a cloud environment. In particular, the disclosed technology relates to accessing permissions data and access control data for pairs of compute resources and storage resources in the cloud environment, tracing network communication paths between the pairs of the compute resources and the storage resources based on the permissions data and the access control data, accessing sensitivity classification data for objects in the storage resources, qualifying a subset of the pairs of the compute resources and the storage resources as vulnerable to breach attack based on an evaluation of the permissions data, the access control data, and the sensitivity classification data against a set risk criterion, and generating a representation of propagation of the breach attack along the network communication paths, the representation identifying relationships between the subset of the pairs of the compute resources and the storage resources.

System and method for automatic correction/rejection in an analysis applications environment

Systems and methods for automatic error rejection are provided. Systems and methods described herein bypass the creation of a staging table at the outset and, instead, attempt a direct merge from a source data location to a target data location. In the event that the merge fails, then a temporary/staging table can be loaded where errors can be logged, validations can be performed, and erroneous data can be corrected.

Collaborative data mapping system

An example method for mapping data can include: generating a user interface configured to enable a user to create a data element of a mapping specification, wherein the mapping specification includes a spreadsheet having a plurality of data fields; allowing for dragging of the data element onto the user interface and multi-selection of the data element with other data elements; allowing for dropping of the data element into a desired location of the user interface and the multi-selection of the data element; storing the data element in a temporary schema independent from a database schema of the data warehouse; and enabling the user to associate the data element with one or more physical data elements in the database schema.

User-defined groups of graphical objects

In an example, a computer-implemented method to group graphical objects includes displaying, on a display device, a graphical diagram with multiple graphical objects that represent data of a data source. The method includes receiving input to define one or more groups. The method includes, in response to the input, generating one or more containers, each of the one or more containers representing a different one of the one or more groups; and graphically depicting membership of the graphical objects in the one or more groups by relative arrangement of the graphical objects and the one or more containers according to group membership of each of the graphical objects.

Systems and methods for a multi-hierarchy physical storage architecture for managing program and outcome data

In some aspects, the disclosure is directed to methods and systems for data storage and retrieval from a computer memory. A computing device may store a first hierarchical data structure having a first sequence of sub-data structures and a second hierarchical data structure having a second sequence of sub-data structures in memory. The computing device may link the first hierarchical data structure and the second hierarchical data structure together. The computing device may link the first hierarchical data structure and the second hierarchical data structure by inserting an identifier of a sub-data structure of the second sequence in the first sequence.

Transient software error handling in a distributed system

A method for use in a storage system is disclosed, comprising: receiving, at a first server in the storage system, a given block layer request for reservation of a storage resource, by the first server, an identifier corresponding to the given block layer request; performing a search of a database to detect whether the given block layer request has been completed, the search being performed by the first server, the search being performed based on the identifier corresponding to the given block layer request; when the database indicates that the given block layer request has not been completed: completing the given block layer request and transmitting a notification that the given block layer request is completed; and when the database indicates that given block layer request has been completed, re-transmitting a notification that the given block layer request is completed.

Parallel and efficient technique for building and maintaining a main memory CSR based graph index in a RDBMS

Herein are techniques that concurrently populate entries in a compressed sparse row (CSR) encoding, of a type of edge of a heterogenous graph. In an embodiment, a computer obtains a mapping of a relational schema to a graph data model. The relational schema defines vertex tables that correspond to vertex types in the graph data model, and edge tables that correspond to edge types in the graph data model. Each edge type is associated with a source vertex type and a target vertex type. For each vertex type, a sequence of persistent identifiers of vertices is obtained. Based on the mapping and for a CSR representation of each edge type, a source array is populated that, for a same vertex ordering as the sequence of persistent identifiers for the source vertex type, is based on counts of edges of the edge type that originate from vertices of the source vertex type. For the CSR, the computer populates, in parallel and based on said mapping, a destination array that contains canonical offsets as sequence positions within the sequence of persistent identifiers of the vertices.

RIS/PACS INTEGRATION SYSTEMS AND METHODS
20180004897 · 2018-01-04 ·

Example integration systems and methods are disclosed and described. An example apparatus includes a processor and a memory at a first system. The example processor is to be configured by program instructions to at least: authenticate, at the first system, an identity of a first user; when the identity of the first user is positively authenticated by the first system, locate a first content requested by the first user at a second system; receive, at the first system, an authorization from the second system for the first user to access the first content at the second system; when the first user is positively authorized by the second system, provide, via a first viewer, access to the first content at the second system; and facilitate, via the first viewer, manipulation of the first content at the second system according to an access rule for the first content at the second system.

Optimized tenant schema generation
11709807 · 2023-07-25 · ·

A system includes a memory and a processor, where the processor is in communication with the memory. The processor is configured to receive a request to create a tenant schema within a database, where the database includes one or more tenant schemas associated with one or more tenants. The tenant schema associated with a tenant of the one or more tenants is created, where the tenant schema is empty. It is determined whether the database includes a template schema. Upon determining the template schema exists, command is sent to the database to copy the template schema to the tenant schema associated with the tenant.

DATABASE INTEGRATION DEVICE, DATABASE INTEGRATION METHOD, AND COMPUTER PROGRAM PRODUCT

According to one embodiment, a DB integration device includes a receiver and a designator. The receiver is configured to receive at least a request for combining first data and second data. The designator is configured to designate, from among a plurality of DB systems, a DB system for executing a combining process of combining the first data and the second data on the basis of combining capability information. The combining capability information indicates at least one of: whether or not a first DB system is capable of reading the second data from a second DB system and executing the combining process; and whether or not the first DB system is capable of causing the second DB system to read the first data.