Patent application number | Description | Published |
20090300654 | Collection access in a parallel environment - Systems, methods, and other embodiments associated with collection access are described. One example system includes a data store to store a set of listener object identifiers. A listener object identifier identifies a member of a set (or collection) of listener objects. A Listener object initiates an action in response to an occurrence of an event associated with a member of a set of external logics. A member of the set of external logics invokes a notify process to trigger actions. The example system may also include storing the listener object identifiers in an array to allow instances of the notify process to operate in parallel. | 12-03-2009 |
20140379756 | SYSTEM AND METHOD FOR TRANSPARENT MULTI KEY-VALUE WEIGHTED ATTRIBUTED CONNECTION USING UNI-TAG CONNECTION POOLS - A system and method for transparent multi key-value weighted attributed connection using uni-tag connection pools. In accordance with an embodiment, a connection pool enables labeling of connections that software applications can use to access a database. A connection pool associated with a database enables tagging of connection pools at the database and allows applications to selectively obtain connections based on tags. A request is received from an application to query data from the database using a labeled connection or low-cost alternative. If a low-cost connection is found, but requires configuration, the system returns unmatched labels for use by the application in configuring its environment to use the connection. The system can also generate a tag for the connection. Upon subsequent release of the database session, the tag can be made available for subsequent use of the tag, or a tagged connection, by the same or by other applications. | 12-25-2014 |
20140380004 | EFFICIENT STORAGE AND RETRIEVAL OF FRAGMENTED DATA USING PSEUDO LINEAR DYNAMIC BYTE ARRAY - A system and method for efficient storage and retrieval of fragmented data using a pseudo linear dynamic byte array is provided. In accordance with an embodiment, the system comprises a database driver which provides access by a software application to a database. The database driver uses a dynamic byte array to enable access by the application to data in the database, including determining a size of a required data to be stored in memory, and successively allocating and copying the required data into the dynamic byte array as a succession of blocks. The data stored within the succession of blocks can then be accessed and provided to the application. | 12-25-2014 |
20150026213 | SYSTEM AND METHOD FOR PROVIDING A SHAREABLE GLOBAL CACHE FOR USE WITH A DATABASE ENVIRONMENT - Described herein is a system and method for providing a shareable global cache for use with a database environment. In accordance with an embodiment, a shareable global cache is used for caching connections to database instances. When a request is received for a particular service, the system looks for an idle connection to that service, and, if none is available, locates an existing connection to a database instance serving that service and switches a service on the existing connection to that service. | 01-22-2015 |
20150026405 | SYSTEM AND METHOD FOR PROVIDING A SECOND LEVEL CONNECTION CACHE FOR USE WITH A DATABASE ENVIRONMENT - Described herein is a system and method for providing a level 2 connection cache for use with a database environment. In accordance with an embodiment, a second level, or level 2 (L2), connection cache is used to cache no-session connections for use with a database. When a connection is requested, a no-session connection (NSC) can be retrieved from the cache and a database session is attached. Later, when the connection is closed, the database session is logged off and the no-session connection returned to the cache for subsequent use. | 01-22-2015 |
20160072816 | SYSTEM AND METHOD FOR PROVIDING AN INTEGRATED FIREWALL FOR SECURE NETWORK COMMUNICATION IN A MULTI-TENANT ENVIRONMENT - An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which provide a plurality of database services with application servers hosting database service consumers each having a different database service consumer identity. The firewall functionality integrated into each database server provides access control by discarding communication packets which do not include a database service consumer identity and using the database service consumer identity in combination with an access control list to control access from the database service consumers to the database services. The access control includes address resolution access control, connection establishment access control, and data exchange access control based on said access control list. The integrated firewall enables direct connection of database servers and application servers via an InfiniBand network providing without requiring a separate intermediary firewall appliance or security node. | 03-10-2016 |
20160072817 | SYSTEM AND METHOD FOR PROVIDING FOR SECURE NETWORK COMMUNICATION IN A MULTI-TENANT ENVIRONMENT - A security solution provides secure communication in a multi-tenant environment which includes a connection-based fabric, storage cells holding data associated with different tenants, database servers which provide a plurality of database services using said data, application servers hosting database service consumers. The fabric is configured into partitions isolating the storage cells from the database service consumers. The application servers securely associate unique database service consumer identities with each database service consumer and all communications with the database servers. The database servers reject all communications from the application servers which do not include an identity and use an access control list to control access from the database service consumers to the database services using address resolution access control, connection establishment access control, and data exchange access control based on said access control list. DoS attack prevention can also be performed based on consumer identities included in packets. | 03-10-2016 |