G06F16/24569

Processing large query results in a database accelerator environment

A computer-implemented method for facilitating large data transfers from a first data management system to a second data management system is disclosed. The method comprises receiving data from the first data management system by a first buffer component, rerouting, upon the first buffer component reaching a predefined fill-level, dynamically the received data to a second buffer component, wherein the second buffer component is adapted to process the rerouted received data, forwarding, by the second buffer component, the rerouted data once the first buffer component is again ready for receiving the rerouted data from the second buffer component, and sending, by a sending component, the data buffered in the first component to the second data management system.

SYSTEMS AND METHODS FOR PROCESSING AND DISTRIBUTING SERVICE REQUESTS TO COMPUTATIONAL STORAGE DEVICES
20230361944 · 2023-11-09 ·

Systems and methods for processing and distributing a service request. The service request is received from a client, and a location of data is identified. A status of a computational storage device associated with the location is determined. The service request is transmitted to a storage service associated with the computational storage device based on the status. A response to the service request from the storage service, is identified, and the response is provided to the client.

SYSTEMS AND METHODS FOR PROCESSING DATABASE QUERIES VIA A COMPUTATIONAL STORAGE DEVICE
20230359624 · 2023-11-09 ·

Systems and methods for processing a database query from a device are disclosed. A first command is received in response to the database query. In response to the first command, a storage device is signaled for scanning data in a database object. The signaling of the storage device may include: transmitting a second command for configuring the storage device based on the database query; transmitting a third command for executing a scan of the data in the database object; and transmitting a fourth command for reading an output of the scan, wherein the output is responsive to the database query.

QUERY PLANNER
20230222123 · 2023-07-13 · ·

Disclosed embodiments include an accelerated database management system including at least one processor including circuitry and a memory. The memory includes instructions that when executed by the circuitry cause the at least one processor to: receive an initial database query; generate a main query based on the initial database query; analyze the main query, and based on the analysis of the main query, generate at least a first sub-query and a second sub-query, wherein the second sub-query differs from the first sub-query; process the first sub-query along a first processing path to provide a first input to an execution module; process the second sub-query along a second processing path, different from the first processing path, to provide a second input to the execution module; and based on the first input and the second input received by the execution module, generate a main query result.

DATA ANALYSIS ACCELERATION ARCHITECTURE

Disclosed embodiments include system including a hardware based, programmable data analytics processor configured to reside between a data storage unit and one or more hosts. The programmable data analytics processor includes a selector module configured to input a first set of data and, based on a selection indicator, output a first subset of the first set of data; a filter and project module configured to input a second set of data and, based on a function, output an updated second set of data; a join and group module configured to combine data from one or more third data sets into a combined data set; and a communications fabric configured to transfer data between any of the selector module, the filter and project module, and the join and group module.

Cloud data attack detection query builder

The technology disclosed relates to streamlined analysis of security posture of a cloud environment. In particular, the disclosed technology relates to a graphical query builder for generating a subject path signature, for example representing a vulnerability path in the cloud environment. A computer-implemented method includes generating a graphical user interface having configurable node elements and edge elements and, in response to user input on the graphical user interface, configuring the node elements to represent entities in a subject path signature in the cloud environment and the edge elements to represent relationships between the entities in the subject path signature. The method also includes generating a query representing the subject path signature, executing the query to qualify a set of network paths in the cloud environment as conforming to the subject path signature, and outputting query results identifying the qualified set of network paths.

IN-CLOUD AND CONSTANT TIME SCANNERS

The technology disclosed relates to in-cloud, constant time content scanning. In particular, it relates to obtaining administrative access to a cloud environment account for bulk content scanning of storage resources, and deploying serverless, containerized scanners to run locally on the cloud environment account, including queuing objects in the cloud environment account, partitioning the objects into a plurality of object chunks, and depending upon a M number of object chunks in the plurality of object chunks, initializing a N number of instances of the serverless, containerized scanners, where M»N. Each initialized serverless, containerized scanner scans a corresponding object chunk exactly once to detect a multiplicity of different data patterns.

CLOUD INFRASTRUCTURE DETECTION WITH RESOURCE PATH TRACING

The technology disclosed relates to streamlined analysis of infrastructure posture of a cloud environment. In particular, it relates to accessing permissions data and access control data for pairs of compute resources and storage resources in the cloud environment, tracing network communication paths between the pairs of the compute resources and the storage resources based on the permissions data and the access control data, and constructing a cloud infrastructure map that graphically depicts the pairs of the compute resources and the storage resources as nodes, and the network communication paths as edges between the nodes.

CLOUD ENVIRONMENT ANALYTICS USING SNAPSHOTTING
20230087093 · 2023-03-23 · ·

The technology disclosed relates to streamlined analysis of security posture of a cloud environment. In particular, the disclosed technology relates to a system that analyzes data posture in a cloud environment database using a snapshot of the database. A computer-implemented method includes receiving a request to access a database in the cloud environment, wherein the database includes a first authentication requirement. The method includes identifying a snapshot of the database, wherein the snapshot includes a second authentication requirement that is different than the first authentication requirement. The method includes accessing the snapshot using the second authentication requirement, generating a representation of the database using the snapshot, and generating a data posture analysis result indicative of a data posture of the database based on scanning the representation of the database.

SYSTEMS AND METHODS FOR IMPROVING CACHE EFFICIENCY AND UTILIZATION

Systems and methods for improving cache efficiency and utilization are disclosed. In one embodiment, a graphics processor includes processing resources to perform graphics operations and a cache controller of a cache coupled to the processing resources. The cache controller is configured to control cache priority by determining whether default settings or an instruction will control cache operations for the cache.