Data access management in a hybrid memory server
First Claim
1. A method, on a server system in an out-of-core processing environment, for managing access to data by accelerator systems, the method comprising:
- receiving a request from an accelerator system for access to a given data set;
determining an access context associated with the given data set;
selecting an access configuration from a plurality of different access configurations available for the accelerator system based on the access context that has been determined;
dynamically configuring the accelerator system according to the access configuration to one ofaccess the given data set directly from the server system,locally store a portion of the given data set in a memory, andlocally store all of the given data set in the memory,receiving a security request from a user associated with the request for access to the given data set;
determining if the security request accelerator system indicates that the user is requesting a fully encrypted communication link;
in response to determining that the accelerator system has requested a fully encrypted communication link, establishing a fully encrypted communication link with the accelerator system;
in response to determining that the user has not requested a fully encrypted communication link, determining if the accelerator system has been configured to access the given data set directly from the server system;
in response to determining that the accelerator system has been configured to access the given data set directly from the server system, establishing a fully encrypted communication link with the accelerator system; and
in response to determining that the accelerator system has not been configured to access the given data set directly from the server system,establishing a partially encrypted communication link with the accelerator system to transfer information associated, the partially encrypted communication link comprising a lower encryption strength than a fully encrypted communication link, andinstructing the accelerator system to maintain a security counter that indicates when to remove the one of the portion or all of the given data set from the memory.
1 Assignment
0 Petitions
Accused Products
Abstract
Once or more embodiments manage access to data by accelerator systems in an out-of-core processing environment. In one embodiment, a request from an accelerator system is received for access to a given data set. An access context associated with the given data set is determined. The accelerator system is dynamically configured, based on the access context that has been determined, based on the access context that has been determined, to one of access the given data set directly from the server system; locally store a portion of the given data set in a memory; and locally store all of the given data set in the memory.
41 Citations
9 Claims
-
1. A method, on a server system in an out-of-core processing environment, for managing access to data by accelerator systems, the method comprising:
-
receiving a request from an accelerator system for access to a given data set; determining an access context associated with the given data set; selecting an access configuration from a plurality of different access configurations available for the accelerator system based on the access context that has been determined; dynamically configuring the accelerator system according to the access configuration to one of access the given data set directly from the server system, locally store a portion of the given data set in a memory, and locally store all of the given data set in the memory, receiving a security request from a user associated with the request for access to the given data set; determining if the security request accelerator system indicates that the user is requesting a fully encrypted communication link; in response to determining that the accelerator system has requested a fully encrypted communication link, establishing a fully encrypted communication link with the accelerator system; in response to determining that the user has not requested a fully encrypted communication link, determining if the accelerator system has been configured to access the given data set directly from the server system; in response to determining that the accelerator system has been configured to access the given data set directly from the server system, establishing a fully encrypted communication link with the accelerator system; and in response to determining that the accelerator system has not been configured to access the given data set directly from the server system, establishing a partially encrypted communication link with the accelerator system to transfer information associated, the partially encrypted communication link comprising a lower encryption strength than a fully encrypted communication link, and instructing the accelerator system to maintain a security counter that indicates when to remove the one of the portion or all of the given data set from the memory. - View Dependent Claims (2, 3)
-
-
4. A server system in an out-of-core processing environment, the server system comprising:
-
a memory; a processor communicatively coupled to the memory; and a data manager communicatively coupled to the memory and the processor, wherein the data manager is configured to perform a method comprising; receiving a request from an accelerator system for access to a given data set; determining an access context associated with the given data set; and selecting an access configuration from a plurality of different access configurations available for the accelerator system based on the access context that has been determined; and dynamically configuring the accelerator system according to the access configuration to one of access the given data set directly from the server system, locally store a portion of the given data set in a memory, and locally store all of the given data set in the memory, receiving a security request from a user associated with the request for access to the given data set; determining if the security request accelerator system indicates that the user is requesting a fully encrypted communication link; in response to determining that the accelerator system has requested a fully encrypted communication link, establishing a fully encrypted communication link with the accelerator system; in response to determining that the user has not requested a fully encrypted communication link, determining if the accelerator system has been configured to access the given data set directly from the server system; in response to determining that the accelerator system has been configured to access the given data set directly from the server system, establishing a fully encrypted communication link with the accelerator system; and in response to determining that the accelerator system has not been configured to access the given data set directly from the server system, establishing a partially encrypted communication link with the accelerator system to transfer information associated, the partially encrypted communication link comprising a lower encryption strength than a fully encrypted communication link, and instructing the accelerator system to maintain a security counter that indicates when to remove the one of the portion or all of the given data set from the memory. - View Dependent Claims (5, 6)
-
-
7. A computer program product for managing access to data by accelerator systems, the computer program product comprising:
a non-transitory storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising; receiving a request from an accelerator system for access to a given data set; determining an access context associated with the given data set; and selecting an access configuration from a plurality of different access configurations available for the accelerator system based on the access context that has been determined; and dynamically configuring the accelerator system according to the access configuration to one of access the given data set directly from the server system, locally store a portion of the given data set in a memory, and locally store all of the given data set in the memory, receiving a security request from a user associated with the request for access to the given data set; determining if the security request accelerator system indicates that the user is requesting a fully encrypted communication link; in response to determining that the accelerator system has requested a fully encrypted communication link, establishing a fully encrypted communication link with the accelerator system; in response to determining that the user has not requested a fully encrypted communication link, determining if the accelerator system has been configured to access the given data set directly from the server system; in response to determining that the accelerator system has been configured to access the given data set directly from the server system, establishing a fully encrypted communication link with the accelerator system; and in response to determining that the accelerator system has not been configured to access the given data set directly from the server system, establishing a partially encrypted communication link with the accelerator system to transfer information associated, the partially encrypted communication link comprising a lower encryption strength than a fully encrypted communication link, and instructing the accelerator system to maintain a security counter that indicates when to remove the one of the portion or all of the given data set from the memory. - View Dependent Claims (8, 9)
Specification