2188 patents
Page 10 of 110
Utility
Quantum process termination
17 Oct 23
Quantum process termination is disclosed.
Leigh Griffin, Stephen Coady
Filed: 28 Jan 21
Utility
Distributed Anomaly Detection Using Combinable Measurement Value Summaries
12 Oct 23
Distributed anomaly detection using combinable measurement value summaries is disclosed.
William C. Benton, Sophie Watson
Filed: 12 Jun 23
Utility
Cross-validating Files to Facilitate Code Generation
12 Oct 23
In various examples disclosed herein, provided is a method and system for cross-validating files to facilitate code generation.
Edoardo Vacchi, Paolo Antinori
Filed: 8 Apr 22
Utility
Profiling and Optimization of Compiler-generated Code
12 Oct 23
The technology disclosed herein enables a processing device to receive program code comprising a plurality of program code instructions, wherein the plurality of program code instructions comprise at least one profiling instruction, wherein the program code is loaded from an executable program file that specifies a persistent memory region; and execute the program code including the at least one profiling instruction, wherein to execute the at least one profiling instruction, the processing device is to: identify a memory location in the persistent memory region in view of a profiling identifier included in the at least one profiling instruction, generate a profiling information item, and store the profiling information item in the persistent memory region at the identified memory location.
Ulrich Drepper
Filed: 2 Jun 23
Utility
Rebasing Image Layers Utilising a Repository-based Strategy
12 Oct 23
A system and method of performing a rebase action to image layers of a container.
Pierre-Yves Chibon, Leigh Griffin
Filed: 6 Apr 22
Utility
Just-in-time Packager Build System
12 Oct 23
A method includes receiving a software build task, identifying one or more previously executed software build tasks in view of one or more properties of the software build task and determining a set of computing resources to be allocated to a build container for performing the software build task in view of the one or more previously executed software build tasks.
Leigh Griffin, Leonardo Rossetti
Filed: 11 Apr 22
Utility
Generating Filesystem Images with Integrated Containers
12 Oct 23
Generating filesystem images with integrated containers is disclosed herein.
Pierre-Yves Chibon, Leigh Griffin
Filed: 11 Apr 22
Utility
Optimizing Execution of Quantum Service Definition Files Using a Quantum Optimization Database
12 Oct 23
Optimizing execution of quantum service definition files using a quantum optimization database is disclosed herein.
Stephen Coady, Leigh Griffin
Filed: 11 Apr 22
Utility
Containerized Gateways and Exports for Distributed File Systems
12 Oct 23
Systems and method for improved creation and management of distributed file systems are provided.
Varsha Rao, Patrick Donnelly, Ramana Krisna Venkatesh Raja, Jeffrey Layton
Filed: 15 Jun 23
Utility
Managing Message Sizes In a Mesh Network
12 Oct 23
In one example described herein, a processing device can receive computing metrics from nodes within a mesh network.
Andrea Cosentino, Leigh Griffin, Paolo Antinori
Filed: 8 Apr 22
Utility
Constrained key derivation in temporal space
10 Oct 23
The technology disclosed herein provides an enhanced cryptographic access control mechanism that uses cryptographic keys that are based on temporal data.
Nathaniel P. McCallum, Peter M. Jones
Filed: 7 Feb 19
Utility
Cloud resource management using externally-sourced data
10 Oct 23
A processing device can make use of an Artificial Intelligence (AI) model to make projections about resource usage based on data from external sources.
Juana Nakfour
Filed: 8 Sep 21
Utility
Node-local-unscheduler for scheduling remediation
10 Oct 23
A system for scheduling remediation includes a memory, a processor in communication with the memory, a container scheduled on a first node, a scheduler executing on the processor, and a node-local-unscheduler (“NLU”).
Jay Vyas, Huamin Chen
Filed: 2 Jul 21
Utility
Managing sensitive information using a trusted platform module
10 Oct 23
Sensitive information can be managed using a trusted platform module.
Ricardo Noriega De Soto, Michael Bursell, Huamin Chen
Filed: 19 Apr 21
Utility
Power consumption optimization on the cloud
10 Oct 23
A power consumption optimization system includes a virtual machine (VM) provisioned on a host, a memory, a server, and a processor in communication with the memory.
Huamin Chen, Jay Vyas
Filed: 3 Oct 22
Utility
Prefetching metadata in a storage system
10 Oct 23
Aspects and features of the present disclosure can prefetch metadata in the nodes of a cloud-based storage system.
Gabriel Zvi BenHanokh, Joshua Durgin
Filed: 5 Jan 21
Utility
Hypercall Acceleration for Nested Virtual Machines
5 Oct 23
Systems and methods for accelerating hypercalls for nested virtual machines.
Michael Tsirkin, Karen Noel
Filed: 8 Jun 23
Utility
Managing a Presentation Mode for Application Programming Interface Functions
5 Oct 23
Systems and methods for providing a presentation mode for application programming interface functions.
Paolo Antinori, Eric Wittmann, Carles Arnal Castello
Filed: 5 Apr 22
Utility
Efficient Queue Access for User-space Packet Processing
5 Oct 23
An example method may include determining whether a preemption flag associated with a first input/output (I/O) handling thread is equal to a first value indicating that preemption of the first I/O queue handling thread is forthcoming, wherein the first I/O queue handling thread is executing on a first processor, the first I/O queue handling thread is associated with a first set of one or more queue identifiers, and each queue identifier identifies a queue being handled by the first I/O queue handling thread, and, responsive to determining that the preemption flag is equal to the first value, transferring the first set of one or more queue identifiers to a second I/O queue handling thread executing on a second processor.
Michael Tsirkin
Filed: 22 Mar 22
Utility
Network Bound Encryption for Orchestrating Workloads with Sensitive Data
5 Oct 23
The technology disclosed herein provides network bound encryption that enables a node management device to orchestrate workloads with encrypted data without sharing the decryption key.
Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum
Filed: 5 Jun 23