Decomposition of monoliths into multi-account provider network structures

    公开(公告)号:US12184504B1

    公开(公告)日:2024-12-31

    申请号:US17836795

    申请日:2022-06-09

    Abstract: Remapping mainframe functional components from a mainframe computing environment onto a network of distinct but communicating accounts of a provider network. The mainframe computer (or network of such computers) is analyzed hierarchically through one or more of physical separation between logical partitions (LPARs), LPARs within the mainframe computer(s), separation of batch and transactional workloads, separation of batch and transactional accounts, or security of the mainframe architecture. Mainframe application artifacts obtained through the analyzing are used to generate a graph model representing relationships among the mainframe application artifacts. The graph model includes nodes representing the mainframe application artifacts and edges connecting pairs of the mainframe application artifacts, where the edges represent use relationships between the pairs of mainframe application artifacts. The nodes are then clustered, where the clusters represent sets of mainframe artifacts having high density of use relationships, and the clusters correspond to the distinct accounts in the provider network.

    Migrating data between databases
    2.
    发明授权

    公开(公告)号:US10185727B1

    公开(公告)日:2019-01-22

    申请号:US14985132

    申请日:2015-12-30

    Abstract: Data is migrated between a source database and a target database. The source database management system (“DBMS”) remains operational during the migration. A user selects the source DBMS and target DBMS, provides connection information used to connect to the database management systems and selects a virtual machine instance to perform the migration in conjunction with a database migration service. After the setup is complete, the virtual machine instance in conjunction with the database migration service performs data type transformations, and other operations, without user intervention. The database migration service also converts, without user intervention, the source schema and code to a format compatible with the target DBMS. Any code that is not converted is marked to assist the user of the database migration service identify where manual re-coding is required. The database migration service can also provide recommendations as to a target DBMS that is a suitable target DBMS.

    Authorizing access to operating system resources using security policies managed by service external to the operating system

    公开(公告)号:US12111940B1

    公开(公告)日:2024-10-08

    申请号:US17457640

    申请日:2021-12-03

    CPC classification number: G06F21/604 G06F9/5027

    Abstract: Systems, devices, and methods are provided for authorizing access to operating system resources using security policies managed by a service external to the operating system. An operating system may be provisioned with a kernel-mode component that intercepts system calls from applications, determines a request context for the system call, and sends a request to an external policy management service. The policy management service may be used to perform a policy evaluation to determine whether to grant access to operating system resources. In some cases, policies are cached by the operating system. In various examples, the operating system and policy management service are both hosted on resources managed by a computing resource service provider on behalf of a customer to run mainframe workloads.

    Cloud-based security service for improved compliance of mainframe workloads

    公开(公告)号:US11943261B1

    公开(公告)日:2024-03-26

    申请号:US17457642

    申请日:2021-12-03

    CPC classification number: H04L63/205

    Abstract: Systems, devices, and methods are provided for determining whether security assurances are satisfied by security policies that are used to control access to resources used by a mainframe application. A system may use a database to store a plurality of security policies that may comprise security polices of various resources used by mainframes, including resources managed by operating systems and database systems. A reference policy that corresponds to the security assurance being sought may be determined. The security policies may be evaluated using a satisfiability modulo theories (SMT) solver to determine whether the security policies are equally or less permissive than the reference policy.

    Distributed data set extraction for migration

    公开(公告)号:US11016954B1

    公开(公告)日:2021-05-25

    申请号:US15694624

    申请日:2017-09-01

    Abstract: Distributed extraction of data for migration may be implemented for migrating data sets from a first data store to a second data store. Assignments may be determined for different migration agents to obtain and store the data set in the second data store along with a format for storing the assigned data set portions. The migration agents may then be caused to obtain the assigned portions and store the assigned portions in the second data store according to the identified format. Further operations to request or direct the ingestion of the data set from the second data store may be performed by migration agents with respect to a third data store that performs data ingestion.

Patent Agency Ranking