G06F16/2255

EFFECTIVE AND SCALABLE BUILDING AND PROBING OF HASH TABLES USING MULTIPLE GPUS
20230214225 · 2023-07-06 ·

Described approaches provide for effectively and scalably using multiple GPUs to build and probe hash tables and materialize results of probes. Random memory accesses by the GPUs to build and/or probe a hash table may be distributed across GPUs and executed concurrently using global location identifiers. A global location identifier may be computed from data of an entry and identify a global location for an insertion and/or probe using the entry. The global location identifier may be used by a GPU to determine whether to perform an insertion or probe using an entry and/or where the insertion or probe is to be performed. To coordinate GPUs in materializing results of probing a hash table a global offset to the global output buffer may be maintained in memory accessible to each of the GPUs or the GPUs may compute global offsets using an exclusive sum of the local output buffer sizes.

Prospect selection for direct mail

A collateral generation system generates and sends physical direct mail to one or more users on behalf of an entity with which the users have interacted. The collateral generation system can send physical direct mail to prospects, who may not have a prior relationship with the entity. In general, prospects would not normally be sent mailings because the entity lacks some primary information about the entity, such as an address or sufficient identifying information to obtain an address of the entity. The collateral generation system identifies prospects based on activity online and obtains mailing addresses of the prospects from an identification service while retaining user anonymity of those prospects. The collateral generation system generates collateral, which may be personalized for a defined block group of prospects (e.g., individuals or organizations), and the collateral is sent as physical mail to the prospects on behalf of the entity.

Ordinal position-specific and hash-based efficient comparison of sequencing results

The technology disclosed generates a reference array of variant data for locations that are shared between read results which are to be compared, and generates hashes over a selected pattern length of positions in the reference array to independently produce non-unique window hashes for base patterns in the read results. It then selects for comparison window hashes that occur less than a ceiling number of times and compares the selected window hashes to identify common window hashes between the read results. It then determines a similarity measure for the read results based on the common window hashes.

SYSTEMS AND METHODS FOR SCALABLE OFF-CHAIN STORAGE OF BLOCKCHAIN-SECURED DATA

A system described herein may generate a hash value based on a set of data stored in an off-chain repository. The system may record an association between the set of data and the hash value to a blockchain system, receive a query from a client device, determine that the query is associated with the set of data, output a response to the query based on the set of data. The response may include the hash value. The system may authenticate the query (e.g., the client device) using one or more suitable authentication mechanisms, thus securing access to the set of data. The client device may verify the set of data based on determining that the hash value included in the response matches the hash value recorded to the blockchain system as being associated with the set of data.

Data Privacy Management & Compliance Using Distributed Ledger Technology

Novel improvements in processes utilizing distributed ledger technologies for management and compliance with data privacy laws, regulations, policies, guidelines, rules, and standards of personal information. California Consumer Privacy Act (CCPA), together with similar Europe, Colorado and Virginia privacy laws, are exemplary applications. Metadata and database schemas are utilized to form one or more metamodels and data graphs, stored on a distributed ledger or blockchain. Apparatus, architectures and systems are also disclosed.

System and method to provide homogeneous fabric attributes to reduce the need for SA access in a high performance computing environment

Systems and methods for InfiniBand fabric optimizations to minimize SA access and startup failover times. A system can comprise one or more microprocessors, a first subnet, the first subnet comprising a plurality of switches, a plurality of host channel adapters, a plurality of hosts, and a subnet manager, the subnet manager running on one of the one or more switches and the plurality of host channel adapters. The subnet manager can be configured to determine that the plurality of hosts and the plurality of switches support a same set of capabilities. On such determination, the subnet manager can configure an SMA flag, the flag indicating that a condition can be set for each of the host channel adapter ports.

Auto-completion for gesture-input in assistant systems

In one embodiment, a method includes receiving an initial input in a first modality from a first user from a client system associated with the first user, determining one or more intents corresponding to the initial input by an intent-understanding module, generating one or more candidate continuation-inputs based on the one or more intents, where the one or more candidate continuation-inputs are in one or more candidate modalities, respectively, and wherein the candidate modalities are different from the first modality, and sending instructions for presenting one or more suggested inputs corresponding to one or more of the candidate continuation-inputs to the client system.

Database storing authenticated skill-based attributes

An example operation may include one or more of receiving a request to store a skill-based attribute of a user at a database, temporarily storing the skill-based attribute and an identification of one or more storage nodes associated with the skill-based attribute in a temporary data structure of the database, determining whether a predetermined amount of the one or more storage nodes have authenticated the user as having the skill-based attribute, and, in response successful authentication of the skill-based attribute by the predetermined amount of storage nodes, transferring the authenticated skill-based attribute from the temporary data structure to a primary data structure of the database.

Consistent structured data hash value generation across formats and platforms
11693849 · 2023-07-04 · ·

Methods, information handling systems and computer readable media are disclosed for generation of consistent structured data hash values across platforms and structured data formats. In one embodiment, a method includes identifying, at an information handling system, a set of data segments within a set of structured data and expressing the set of structured data in a standard format. This embodiment of the method further includes, for each of the data segments within the set of data segments, applying a hash algorithm to produce a data segment hash value and obtaining a standardized identifier for the data segment. The method continues with assembling an aggregate hash code comprising the standardized identifier and the data segment hash value for each of the data segments, and confirming an association of the aggregate hash code with the set of structured data.

Hash for structural data with same data meaning

Provides a method for hashing structural data. According to this method, structural data that includes a plurality of keys and a plurality of values corresponding to respective keys is received. A plurality of key-value pairs can be parsed from the structural data, with each of the plurality of key-value pairs including a key and a value respectively corresponding to the key. A hash value of the plurality of key-value pairs is computed according to a predefined policy as a hash value of the structural data, wherein the predefined policy includes sorting the plurality of key-value pairs or processed key-value pairs.