G06F9/544

MULTI-TENANT DATA PROTECTION IN EDGE COMPUTING ENVIRONMENTS

Various approaches for implementing multi-tenant data protection are described. In an edge computing system deployment, a system includes memory and processing circuitry coupled to the memory. The processing circuitry is configured to obtain a workflow execution plan that includes workload metadata defining a plurality of workloads associated with a plurality of edge service instances executing respectively on one or more edge computing devices. The workload metadata is translated to obtain workload configuration information for the plurality of workloads. The workload configuration information identifies a plurality of memory access configurations and service authorizations identifying at least one edge service instance authorized to access one or more of the memory access configurations. The memory is partitioned into a plurality of shared memory regions using the memory access configurations. A memory access request for accessing one of the shared memory regions is processed based on the service authorizations.

METHOD AND SYSTEM FOR DIFFERENTIAL DEDUPLICATION IN UNTRUSTED STORAGE
20230267217 · 2023-08-24 ·

The present disclosure provides a method and system for differential deduplication of data blocks in an untrusted storage. An example system determines first data blocks of similar data blocks as reference data blocks and second data blocks of the identified similar data blocks which are compressed using the reference data blocks to enable differential deduplication of data blocks.

METHOD AND APPARATUS FOR BUFFER SHARING
20230267568 · 2023-08-24 · ·

Embodiments are generally directed to methods and apparatuses for buffer sharing. An embodiment of a method comprises: receiving a plurality of graphics data comprising a first graphics data, each of the plurality of graphics data mapped to a corresponding buffer in a Graphics Processing Unit (GPU) memory, wherein the first graphics data is mapped to a first buffer in the GPU memory; receiving a second graphics data mapped to a second buffer in the GPU memory; comparing the first buffer mapped by the first graphics data with the second buffer mapped by the second graphics data; and remapping the second graphics data to the first buffer if the first buffer is identical with the second buffer.

METHODS AND SYSTEMS FOR MEMORY MANAGEMENT IN A PUBLISH AND SUBSCRIBE SYSTEM
20220155992 · 2022-05-19 · ·

Systems and methods for sharing information between a publisher and a subscriber are disclosed. The system includes a shared memory and a memory broker. The memory broker is configured to receive a request for writing a message relating to a topic from a publisher and determine whether a communication channel corresponding to the topic exists in the shared memory. If the communication channel corresponding to the topic exists, the memory broker then assigns a buffer ring on the communication channel to the publisher, transmits information relating to the buffer ring to the publisher, and transmits information relating to the buffer ring to one or more subscribers of the communication channel.

Technologies for dynamically managing resources in disaggregated accelerators

Technologies for dynamically managing resources in disaggregated accelerators include an accelerator. The accelerator includes acceleration circuitry with multiple logic portions, each capable of executing a different workload. Additionally, the accelerator includes communication circuitry to receive a workload to be executed by a logic portion of the accelerator and a dynamic resource allocation logic unit to identify a resource utilization threshold associated with one or more shared resources of the accelerator to be used by a logic portion in the execution of the workload, limit, as a function of the resource utilization threshold, the utilization of the one or more shared resources by the logic portion as the logic portion executes the workload, and subsequently adjust the resource utilization threshold as the workload is executed. Other embodiments are also described and claimed.

Multiparty computation method, apparatus and program

A method for multiparty computation wherein a plurality of parties each compute a preset function without revealing inputs thereof to others, comprises: each of the parties performing a validation step to validate that computation of the function is carried out correctly, wherein the validation step includes: a first step that prepares a plurality of verified multiplication triples and feeds a multiplication triple to a second step when required; and the second step that consumes a randomly selected multiplication triple generated by the first step, wherein the first step performs shuffling of the generated multiplication triples, in at least one of shuffle in a sequence and shuffle of sequences.

SDIO chip-to-chip interconnect protocol extension for slow devices and power savings

A method of improving synchronization over a secure digital (SD) bus between an SD host and an SD client device is described. The method includes writing to a client event register to interrupt the SD host for an SD extended command. The method also includes triggering the SD host to issue the SD extended command to the SD client device over the SD bus in response to the SD client device writing to the client event register.

Memory system and operating method thereof
11334493 · 2022-05-17 · ·

A memory system includes: a memory device including a plurality of memory blocks; and a controller for dynamically changing a size of a write buffer based on whether a current workload is a sequential workload or a mixed workload, wherein the controller includes: a workload detecting unit suitable for changing current workload from the sequential workload to the mixed workload based on a read count, or from the mixed workload to the sequential workload based on a write count; and a write buffer managing unit suitable for reducing the size of the write buffer when the current workload is changed to the mixed workload.

Systems and methods for supporting secure transfer of data between workspaces

Systems and methods support secure transfer of data between workspaces operating on an IHS (Information Handling System). Upon a request for access to a first managed resource, such as protected data, a first workspace is deployed according to a first workspace definition. Upon a request for access to a second managed resource, a second workspace is deployed according to a second workspace definition. In response to an indication of a portion of the protected data from the first workspace being copied to a buffer supported by the IHS and of a request to paste the copied portion of the protected data to the second workspace, the protections provided by the second workspace are evaluated. If the protections of the second workspace are inadequate, an updated second workspace definition is selected that specifies additional protections. The second workspace is updated according to the updated second workspace definition and the transfer is permitted.

Method and apparatus for traversing graph database based on allocation of threads to operators

A method includes obtaining a graph traversal statement; determining at least two operators contained in the graph traversal statement and an execution order, of the at least two operators, allocating a respective thread to each operator, creating a buffer queue for each two adjacent operators; for each two adjacent operators, executing an operation of a former operator by a thread, writing an executing result of the former operator to the buffer queue; an executing an operator of a latter operator by reading the execution result of the former operator by a thread from the buffer queue.