2188 patents
Page 19 of 110
Utility
Extending the Kubernetes Api In-process
25 May 23
Systems and methods for extending a container orchestration engine API in-process are disclosed.
Markus Thoemmes, Francesco Guardiani
Filed: 9 Jan 23
Utility
Deduplication of Container Image Files
25 May 23
A method includes receiving, at a container registry, a container image including a set of files, determining that at least one file of the set of files is a duplicate of a previously stored container image file at the container registry.
Giuseppe Scrivano
Filed: 23 Nov 21
Utility
Time-to-run Column for Database Management Systems
25 May 23
An apparatus and method of performing a time-based operation on a row in a database table includes receiving a function to be applied to a particular row in a table within the database management system.
Michael Kolesnik, Michel Peterson
Filed: 9 Jan 23
Utility
Copy-on-write for virtual machines with encrypted storage
23 May 23
Technology for enabling a hypervisor to perform copy on write features on encrypted storage of a virtual machine.
Michael Tsirkin
Filed: 27 Sep 19
Utility
Efficient authentication in a file system with multiple security groups
23 May 23
Efficient authentication in a file system with multiple security groups is disclosed.
Shyamsundar Ranganathan, Jeffrey Darcy, Pranith K. Karampuri, Vijay Bellur
Filed: 6 Oct 17
Utility
Generation of Service-level Objective Specifications Using Java Annotation
18 May 23
Systems and methods for generating SLO specifications using annotations are generally described.
Paolo Antinori, Eric Wittmann
Filed: 18 Nov 21
Utility
Visual Representations of Source Code Portions In Integrated Development Environments
18 May 23
An integrated development environment (IDE) receives an indication of a selected source code portion within source code.
Paolo Antinori, Eric Wittmann
Filed: 17 Nov 21
Utility
Quantum Isolation Zones
18 May 23
A quantum isolation zone (QIZ) controller executing on a quantum computing system receives, from a first requestor, a request to allocate a group of qubits from a plurality of available qubits that are implemented by the quantum computing system and to establish a QIZ that limits qubit visibility of any quantum process associated with the QIZ to the qubits in the group of qubits.
Leigh Griffin, Stephen Coady
Filed: 18 Nov 21
Utility
Memory Ballooning Related Memory Allocation Techniques for Execution Environments
18 May 23
Systems and methods for ballooning related memory allocation techniques for execution environments.
Michael Tsirkin, David Hildenbrand
Filed: 6 Jan 23
Utility
Customizable Visualization of a Traffic Topology of a Service Mesh
18 May 23
A request for a traffic topology of a service mesh including traffic between multiple services that utilize multiple communication protocols is received.
John Joseph Mazzitelli, Jay Shaughnessy
Filed: 15 Nov 21
Utility
Scalable and Secure Edge Cluster Registration
18 May 23
A method includes initiating, by a device manager associated with a cluster manager proxy, a connection with a cluster of computing devices, wherein initiating the connection includes providing first credentials to the cluster of computing devices to access the cluster manager proxy.
Jonathan Hal Cope, Huamin Chen, Ricardo Noriega De Soto, Frank Alexander Zdarsky
Filed: 15 Nov 21
Utility
Dynamic Scaling of a Distributed Computing System
18 May 23
A technique for dynamic scaling of a distributed computing system is described.
Orit Wasserman, Yehoshua Salomon
Filed: 18 Nov 21
Utility
Federated operator for edge computing network
16 May 23
Systems and methods for inter-cluster deployment of compute services using federated operator components are generally described.
Huamin Chen
Filed: 26 Jun 20
Utility
Managing replica unavailability in a distributed file system
16 May 23
Replica unavailability in a distributed file system can be managed.
Prashanth S. Pai
Filed: 4 Feb 19
Utility
Managing a deduplicated data index
16 May 23
Among other things, in one aspect, in general, a system for managing data in a data storage system includes a plurality of index nodes each storing a map of entries, each entry of the map including an identifier corresponding to a particular portion of data stored in the data storage system, and metadata indicating a location where the particular portion of data is stored in the data storage system, and one or more supernodes configured to return an identification of an index node that recently submitted a request for a particular identifier associated with at least one of the portions of data.
Jonathan Coburn, Michael Fortson
Filed: 2 Apr 18
Utility
Using a caching layer for key-value storage in a database
16 May 23
A technique for using a caching layer for key-value storage in a database is described.
Mark Nelson, Gabriel Zvi BenHanokh
Filed: 28 Jul 21
Utility
Zoned mesh network isolation
16 May 23
Embodiments of the present disclosure include a processing device that determines that a first node device of a plurality of node devices in a network is non-compliant with a network policy, identifies a subset of the plurality of node devices that is associated with the first node device, and disrupts, by the processing device, a communication path of the subset of the plurality of node devices and the first node device within the network.
Pierre-Yves Chibon, Leigh Griffin
Filed: 24 Mar 22
Utility
Secure Modular Devices
11 May 23
A system includes a memory and a processor.
Michael Tsirkin, Sergio Lopez Pascual
Filed: 9 Jan 23
Utility
Automated pinning of file system subtrees
9 May 23
Methods and systems for improved pinning of file system subtrees are provided.
Patrick Donnelly, Sidharth Anupkrishnan
Filed: 13 Aug 20
Utility
Callback-based Qubit Manipulation
4 May 23
Enabling callback-based qubit manipulation is disclosed herein.
Stephen Coady, Leigh Griffin
Filed: 28 Oct 21