2188 patents
Page 3 of 110
Utility
Cloud Cluster Storage Resource Autoscaler
28 Dec 23
Methods, systems, and computer program products herein provide operations or techniques for managing resource allocation in a data storage environment.
Huamin Chen, Chen Wang, Yuval Lifshitz
Filed: 27 Jun 22
Utility
Replacing Stale Clusters In a Cluster Pool
28 Dec 23
Systems and methods are disclosed for replacing stale clusters in a cluster pool.
Eric Fried
Filed: 27 Jun 22
Utility
diz4xp2m1p06nrjntguvrs2ftdsto9ijaxqqpbnwatlx1oxswe3mvldc6hg
28 Dec 23
Systems and methods for intelligently scheduling containers are described.
Stephen Coady, Leigh Griffin
Filed: 27 Jun 22
Utility
ca3dwsk zskcxcuj4adprkp5
28 Dec 23
A method includes obtaining an energy consumption profile for a plurality of computing nodes, determining resource utilization characteristics of each of the plurality of computing nodes, and estimating energy consumption for each of the plurality of computing nodes in view of the energy consumption profile and resource utilization characteristics of the plurality of computing nodes.
Chen Wang, Huamin Chen
Filed: 28 Jun 22
Utility
mryqiom7tn1clhiw5yx5kabiqcyz
28 Dec 23
Some examples described herein relate to debugging operator errors in a distributed computing environment.
Laura Fitzgerald, Leigh Griffin
Filed: 28 Jun 22
Utility
y1asca7xbw2v286ychx5x65453u12fgedg2hkumrgcflx5x
28 Dec 23
Customized policy decision point (PDP) services for policy-based access control systems can be generated according to some examples.
Leigh Griffin, Aoife Moloney
Filed: 28 Jun 22
Utility
whmhcq0ef822qz49ec8s40au17jqu
21 Dec 23
Systems and methods for managing components of the CI/CD system in view of time-based records associated with the components.
Arie Bregman, Avraham Avi Talmor
Filed: 21 Jun 22
Utility
27yur54blnwuhnv1cplwckcd0f64c54ba
21 Dec 23
Systems and methods are described for improving portability of virtual machine checkpoints without affecting system performance.
Ashutosh Mehra, Daniel Heidinga
Filed: 26 May 22
Utility
9ilcqpbg1ac1v4ojktxr68vu95dhwufebk0no 5njl8a4oohtqqg5g351gud
21 Dec 23
Page table entries for a maximum number of virtual functions configurable by a physical function of a single root input-output virtualization (SR-IOV) device can be pre-allocated to provide access for nested virtual machines and containers.
Michael Tsirkin
Filed: 15 Jun 22
Utility
ewi7g9wg911glov6lway n7ok5owds41c9c2
21 Dec 23
One example described herein includes a system that can receive values for performance factors associated with a distributed storage system.
Veera Raghava, Sunil Angadi
Filed: 16 Jun 22
Utility
omx0nd3ifijogifvcvj80lyas6wlk751sv7r2tb07p8gp5mf 98rk3
21 Dec 23
A communication system for a micro-frontend architecture can include a first message handler associated with a requestor of data and a second message handler associated with a requestee.
Alexandre Porcelli Bakos, Tiago Fernandes, Eder Ignatowicz
Filed: 1 Sep 23
Utility
j8umb87p lah18z2vfsimi83r
19 Dec 23
An application programming interface (API) gateway device receives an API request from a client device, the API gateway to provide access to a plurality of services provided by a plurality of compute nodes.
Leigh Griffin, Pierre-Yves Chibon
Filed: 11 Jul 22
Utility
hu3qhksc65tj636hplwr1p7 hktgnkmi3z272wvt6su9pghaxsq
19 Dec 23
Systems and methods for implementing multi-factor system-to-system authentication using secure execution environments.
Michael Hingston McLaughlin Bursell
Filed: 12 Oct 20
Utility
wx2nubhtkc4zc737jfybej4ao0miayn7g1ioyfsejs7t1
19 Dec 23
The technology disclosed herein enables performing data correlation to optimize continuous integration environments.
Arie Bregman, Avraham Talmor, Ilan Gersht
Filed: 20 Dec 21
Utility
dmpi7tlfqxt68xbcbwab70gcl1qfnth1f4ko52nbbnw ml
19 Dec 23
A method includes detecting a change in control of a peripheral device from a first security domain to a second security domain of a computer system and in response to detecting the change in control of the peripheral device, reading a current firmware version of the peripheral device and determining whether the current firmware version of the peripheral device is trusted by the computer system.
Michael Tsirkin, Amnon Ilan
Filed: 30 Nov 20
Utility
kn9hn955nds8w5u0dh nr25icfixlp3h
19 Dec 23
The technology disclosed herein enables efficient launching of trusted execution environments.
Michael Hingston McLaughlin Bursell, Michael Tsirkin, Nathaniel McCallum
Filed: 30 Nov 20
Utility
dz7vwlvx44xt0txavlll2m 6v
19 Dec 23
A sliding window cache can be used for data storage in a data grid.
Vittorio Rigamonti, Tristan Tarrant
Filed: 17 Mar 22
Utility
5bdfqvactf6vanq6arownpt
19 Dec 23
Systems and methods for implementing a build-time, automatic, exporter configuration rule generator that removes the need for manual definition of exporter configurations are described.
Paolo Antinori, Andrea Tarocchi
Filed: 8 Sep 21
Utility
35vgxg8ic3nbtgerfn0a28ji
14 Dec 23
An example system includes a memory, a processor in communication with the memory, and a hypervisor.
Michael Tsirkin, Andrea Arcangeli, Giuseppe Scrivano
Filed: 8 Jun 22
Utility
zj3fzm7hxw k0qo19t6hj86r2ndrrksu6
14 Dec 23
Deployment times for container clones may be reduced by implementing some examples described herein.
Giuseppe Scrivano
Filed: 10 Jun 22