2188 patents
Page 20 of 110
Utility
Trajectory-based Hierarchical Autoscaling for Serverless Applications
4 May 23
A method includes monitoring, during a first time interval, traffic associated with one or more applications executed by a cluster of compute nodes and determining, in view of the traffic associated with the one or more applications during the first time interval, that the traffic is predicted to exceed a capacity threshold of the cluster of compute nodes at an end of a second time interval.
Markus Thoemmes, Roland Ludwig Huss
Filed: 28 Oct 21
Utility
Secure Control of Packet Filter Programs by User Space Processes In Virtual Machines
4 May 23
An example method may include: receiving, by a hypervisor, a data packet, identifying a memory location associated with a guest virtual machine and accessible to the guest virtual machine and the hypervisor, wherein a program mapping table comprising one or more mapping table entries is stored at the memory location, each mapping table entry specifying a program selection criterion and a packet processing program.
Michael Tsirkin, Jesper Brouer
Filed: 28 Oct 21
Utility
Rfid Broadcast Authenticated Activation
4 May 23
A radio frequency identification (RFID) broadcast signal is received.
Leigh Griffin, Pierre-Yves Chibon
Filed: 28 Oct 21
Utility
Evaluating System Recovery Using Emulated Production Systems
4 May 23
The technology disclosed herein can be used to evaluate system recovery using emulated production systems.
Pradeep Kumar Surisetty, Sai Sindhur Malleni, Naga Ravi Chaitanya Elluri
Filed: 28 Oct 21
Utility
Space Efficient Distributed Storage Systems
4 May 23
Space efficient distributed storage systems are disclosed.
Gobinda Das
Filed: 22 Dec 22
Utility
Managing Access to Block Storage In Cloud Computing Environments
4 May 23
Systems and methods for managing access to a block device.
Avraham Talmor, Ilan Gersht, Arie Bregman
Filed: 28 Oct 21
Utility
Converting Computing Infastructure Diagrams to Searchable Diagrams
4 May 23
A computing infrastructure diagram is identified.
Arie Bregman, Avraham Talmor, Ilan Gersht
Filed: 4 Nov 21
Utility
Cloud Network Mechanism Driver Migration
4 May 23
A method includes updating a cloud networking environment from a first network mechanism driver to a second network mechanism driver and identifying a configuration of one or more resources of the cloud networking environment associated with the first network mechanism driver.
Eran Kuris, Arie Bregman
Filed: 28 Oct 21
Utility
Data Privacy Preservation In Object Storage
4 May 23
A method includes receiving data uploaded to a storage system from a client device and in response to receiving the data, instantiating a serverless function for anonymizing the data uploaded to the storage system.
Huamin Chen, Michael Hingston McLaughlin Bursell, Yuval Lifshitz
Filed: 28 Oct 21
Utility
Vehicle Control Using Serverless Functions
4 May 23
Systems and methods for cloud-based keyless entry are generally described.
Andrea Cosentino, Paolo Antinori
Filed: 5 May 22
Utility
Continuous Integration and Deployment Pipeline Selection Based on Dynamic Mapping
4 May 23
For each continuous integration and continuous delivery/deployment (CI/CD) pipeline of a plurality of CI/CD pipelines created for a project, a data structure reflecting an execution configuration of the respective CI/CD pipeline is created.
Arie Bregman, Steve Mattar
Filed: 29 Oct 21
Utility
Infrastructure As Code (Iac) Pre-deployment Analysis Via a Machine-learning Model
4 May 23
Deployment code that identifies a desired deployment of a computer application onto a computing system comprising one or more compute instances is accessed.
Stefan Bunciak, Miroslav Jaros
Filed: 28 Oct 21
Utility
Displaying Multiple Representations of System Management Operations In a User Interface
4 May 23
An example method includes receiving, via a text input component of a containerized cluster user interface, text that includes an operation name that identifies a containerized cluster operation, wherein the text further includes a textual parameter name and a textual parameter value.
Ran Elimelech
Filed: 28 Oct 21
Utility
Binary Execuction by a Virtual Device
4 May 23
Systems and methods for enabling binary execution by a virtual device.
Jesper Brouer, Michael Tsirkin
Filed: 28 Oct 21
Utility
Enhancing Operator Installation and Upgrade Management and Verification
4 May 23
Processing logic may obtain a resource of a platform fora containerized application.
Cathal O'Connor, Brian Gallagher
Filed: 4 Nov 21
Utility
Cloud-based Keyless Entry System
4 May 23
Systems and methods for cloud-based keyless entry are generally described.
Andrea Cosentino, Paolo Antinori
Filed: 28 Oct 21
Utility
Push Notification Qubit Manipulation
4 May 23
Performing qubit manipulation using push notifications is disclosed herein.
Stephen Coady, Leigh Griffin
Filed: 28 Oct 21
Utility
Coordinating dynamic power scaling of agents based on power correlations of agent instructions
2 May 23
Coordinating dynamic power scaling of agents based on power correlations of agent instructions is disclosed.
Jonathan C. Masters
Filed: 29 Jun 21
Utility
Dynamic runtime application integration
2 May 23
Systems and techniques for dynamic runtime application integration are generally described.
Andrea Cosentino, Paolo Antinori
Filed: 3 Feb 22
Utility
Snapshot Volume Proxy for Object Storage Interfaces
27 Apr 23
A snapshot storage proxy receives a request from an object storage interface component to access a snapshot volume, wherein the request is formatted to interact with object storage data, and wherein the snapshot volume is stored as non-object storage data; translates the request from the object storage interface into a snapshot volume request, wherein the snapshot volume request is formatted to interact with non-object storage data; and accesses the snapshot volume in view of the translated snapshot volume request.
Yaniv Kaul
Filed: 26 Oct 21