G06F16/284

Credential mapping for analytics platform
11539534 · 2022-12-27 · ·

An analytics platform or another system is provided to store multiple sets of credentials and other connection information in each user profile and to map the stored credentials to different resources within the platform. Each set of credentials can be associated with a credential mapping key, and each resource in the platform can be mapped to the credentials using a connection associating the resource with the credential mapping key. By mapping multiple sets of credentials and other connection information to the resources within the platform, the user profile can be transparently authenticated when accessing resources in the platform, different credentials can be used to authenticate the user profile with accessing different resources, and administrators can benefit by having greater control over permissions with the platform.

Sort optimization

A system and method for processing of queries including receiving a query including a set operation and a sort operation, wherein the set operation includes a first data structure and a second data structure and the sort operation requests a result set that is sorted based on a column or attribute of the first data structure and a column or attribute of the second data structure; generating a query plan in which a sort operation occurs prior to the set operation; determining a first, partial set of one or more resultant rows responsive to the query; sending the first, partial set of one or more resultant rows responsive to the query to a client; determining a second, partial set of one or more resultant rows responsive to the query; and sending the second, partial set of one or more resultant rows to the client.

Using structured data templates and invocation statements to dynamically define values for efficient data encoding

Structured data templates and invocation statements may be used to dynamically define values, which allows for more efficient data encoding than traditional techniques. A given structured data template may be assigned a template identifier. A writer may generate an invocation statement that references a template identifier for a particular structured data template in order to generate a more compact representation of a structured portion of source data (based on the structured data template matching the structured portion of data). The structured data template may specify that any number of the fields is an “unassigned” field. The invocation statement may specify values for these fields, resulting in a more compact representation of the structured portion of data. The use of an invocation statement and a structured data template eliminates the repetitive scaffolding of an object being written out.

PROCESSING LARGE QUERY RESULTS IN A DATABASE ACCELERATOR ENVIRONMENT

A computer-implemented method for facilitating large data transfers from a first data management system to a second data management system is disclosed. The method comprises receiving data from the first data management system by a first buffer component, rerouting, upon the first buffer component reaching a predefined fill-level, dynamically the received data to a second buffer component, wherein the second buffer component is adapted to process the rerouted received data, forwarding, by the second buffer component, the rerouted data once the first buffer component is again ready for receiving the rerouted data from the second buffer component, and sending, by a sending component, the data buffered in the first component to the second data management system.

Database security
11531775 · 2022-12-20 · ·

A method includes automatically determining a component of a security label for each first record in a first table of a database having multiple tables, including: identifying a second record related to the first record according to a foreign key relationship; identifying a component of the security label for the second record; and assigning a value for the component of the security label for the first record based on the identified component of the security label for the second record. The method includes storing the determined security label in the record.

Autonomous workload management in an analytic platform

A data store system may include at least one storage device to store a plurality of data and at least one processor with access to the storage device. The at least one processor may receive a plurality of features associated with an environment. The at least one processor may further generate a state representation of the environment based on the plurality of features. The at least one processor may further generate a plurality of predicted future states of the environment based on the state representation. The at least one processor may further generate at least one action to be performed by the environment based on the plurality of predicted future states. The at least one processor may provide the at least one action to the environment to be performed. A method and computer-readable medium are also disclosed.

Tenant copy operation in a microservice architecture
11531575 · 2022-12-20 · ·

Computer-readable media, methods, and systems are disclosed for copying tenant data within a cloud-based microservice architecture including a Kubernetes cluster. Copy tasks are generated for a plurality of microservices and progress of the copy tasks is monitored by updating one or more statuses associated with the copy tasks. One or more job files may be generated for each microservice including executable code for copying the tenant data within the microservice or within a data store associated with the respective microservice.

Information Processing Method, Electronic Device, and Storage Medium

An information processing method, an electronic device, and a storage medium are provided, which relate to the field of artificial intelligence technologies such as big data, knowledge graphs, deep learning and the like. The method includes: determining a first independence relationship according to a plurality of variables and values respectively corresponding to the plurality of variables, wherein the first independence relationship includes: at least two variables of the plurality of variables being relatively independent; determining a first adjustment scheme according to the plurality of variables and the first independence relationship; adjusting the first independence relationship according to the first adjustment scheme, to obtain a second independence relationship; and obtaining a causal relationship information processing result according to the second independence relationship.

ESTABLISHING ONE-TO-MANY RELATIONSHIPS FOR EVENTS IN A RELATIONAL DATABASE
20220398560 · 2022-12-15 ·

In some implementations, a device may receive an indication of an event that is associated with a first account and an entity, and an amount associated with the event. The device may establish a record, in a relational database, to link an identifier associated with the first account with the event. The device may receive, from a device associated with the first account, a request to associate the event with the first account and a second account. The device may modify the record to link the identifier associated with the event with the identifier associated with the first account and an identifier associated with the second account. The device may update a first balance associated with the first account to reduce the first balance and update a second balance associated with the second account to increase the second balance based on modifying the record.

DISTRIBUTED TRACING TECHNIQUES FOR ACQUIRING BUSINESS INSIGHTS

Methods, systems, and devices are described. A user journey may be initiated by a user device, and a trace may be generated for the user journey. The trace may include one or more spans that each correspond to at least one service of a set of services that provide functionality to the user journey (e.g., as components of an application). Based on the generated trace including the one or more spans, both diagnostic information and user-specific transaction information may be collected for the user journey. For example, the diagnostic information may include information associated with a service (e.g., how long the service took to complete) and the user-specific transaction information may include information related to the user, such as a location of the user, a type of device used for a transaction, among other examples. The diagnostic information and user-specific transaction information may be stored and processed by a system.