3707 patents
Page 29 of 186
Utility
Fabricless Allocation of a Local Cache In a Fabric Environment
22 Sep 22
Worker threads allocate at least some recycled cache slots of a local portion of a shared memory to the compute node to which the memory portion is local.
Steve Ivester, Kaustubh Sahasrabudhe
Filed: 17 Mar 21
Utility
Synchronization Object Issue Detection Using Object Type Queues and Associated Monitor Threads In a Storage System
22 Sep 22
At least one processing device comprises a processor and a memory coupled to the processor.
Vladimir Shveidel, Lior Kamran
Filed: 22 Mar 21
Utility
7kt00z68p7z ui1blhpc7twjp1fjbg3b1q
22 Sep 22
A computer implemented method, computer program product, and system for managing execution of a workflow comprising a set of subworkflows, comprising optimizing the set of subworkflows using a deep neural network, wherein each subworkflow of the set of subworkflows has a set of tasks, wherein each task of the sets of tasks has a requirement of resources of a set of resources; wherein each task of the sets of tasks is enabled to be dependent on another task of the sets of tasks, training the deep neural network by: executing the set of subworkflows, collecting provenance data from the execution, and collecting monitoring data that represents the state of said set of resources, wherein the training causes the neural network to learn relationships between the states of said set of resources, the said sets of tasks, their parameters and the obtained performance, optimizing an allocation of resources of the set of resources to each task of the sets of tasks to ensure compliance with a user-defined quality metric based on the deep neural network output.
Chandra YELESHWARAPU, Jonas F. DIAS, Angelo CIARLINI, Romulo D. Pinho, Vinicius GOTTIN, Andre MAXIMO, Edward PACHECO, David HOLMES, Keshava RANGARAJAN, Scott David SENFTEN, Joseph Blake WINSTON, Xi WANG, Clifton Brent WALKER, Ashwani DEV, Nagaraj SIRINIVASAN
Filed: 6 Apr 22
Utility
drzx7xd2os9prlmp4iqydq kp8isajw86g27vhvzp34dgoru03lj1du80xv
22 Sep 22
A method for managing bugs includes obtaining, by a bug deduplication system, a set of bugs, performing an encoding on each section of a first bug of the set of bugs to obtain encoded sections, wherein the encoded sections comprise a first encoded section and a second encoded section, applying a first classification model to the first encoded section to obtain a first section score, applying a second classification model to the second encoded section to obtain a second section score, generating a confidence score based on the first encoded section and the second section, and providing the confidence score to a client, wherein the client initiates a corrective action for the first bug based on the confidence score.
Jayanth Kumar Reddy Perneti, Vindhya Gangaraju
Filed: 19 Mar 21
Utility
ck0s4sbpjzl5ll5g atm83
22 Sep 22
A method, electronic device, and a computer readable medium for managing backup data that includes determining an expiration time of backup data in a data set to be backed up in a source storage device, and determines a priority of the backup data to be migrated in a migration operation to be performed based on the expiration time.
Yi Wang, Jun Tang, Qingxiao Zheng, Bing Liu
Filed: 25 Aug 21
Utility
lzg2c06mdz2kd89v lra
22 Sep 22
Techniques for providing a fencing scheme for cluster systems without inherent hardware fencing.
Inna Reznik, Ahia Lieber, Peter J. McCann, Joe Caisse
Filed: 22 Mar 21
Utility
uj007td6gkn8 hkt7dkw8csxc
22 Sep 22
A method, an electronic device, and a computer program product for obtaining a hierarchical data structure and processing a log entry is disclosed.
Yudai Wang, Min Liu, Sanping Li, Travis Liu, Yongbing Xue
Filed: 29 Jul 21
Utility
xspxb9yy8h fuwxl54shjufbi0guiv1549m42mvn4p9eimiyywh9x
22 Sep 22
One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match.
Ido Begun, Jehuda Shemer
Filed: 2 Jun 22
Utility
yh4uqfguixdhhp83xbxa1hxtxqnvg5kvapbm s2dko3
15 Sep 22
Configuring systems to provide host access may include: configuring a stretched volume; and performing processing that allows the host access to the stretched volume.
Dmitry Tylik, Dave J. Lindner, Girish Sheelvant, Nagasimha G. Haravu
Filed: 10 Mar 21
Utility
tga 96czord561cvjth1rrcjob967x0t7fmuf1970idr0yigxfiemer1
15 Sep 22
One example method includes file specific compression selection.
RĂ´mulo Teixeira de Abreu Pinho, Vinicius Michel Gottin, Joel Christner
Filed: 12 Mar 21
Utility
bhrq1k63v233wll50lk3jku8zaebs0vgkbebrwwkoog
15 Sep 22
In one aspect, an example methodology implementing the disclosed techniques includes, responsive to a determination, by a first thread attempting to start an operation, that a second thread has started the operation, obtaining a value of a stamp included in a synchronization object related to the operation.
Vladimir Shveidel, Lior Kamran
Filed: 10 Mar 21
Utility
5kyq 0tuhig54sinzd6v624hpxjv2ya8qq8
15 Sep 22
One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match.
Ido Begun, Jehuda Shemer
Filed: 2 Jun 22
Utility
nlmn0oou7tdd gby91lz4rpdsuwkk19qh5txpmepd
15 Sep 22
An apparatus comprises a processing device configured to receive, at a user interface of a trust platform configured to manage cloud assets operating in clouds of two or more cloud service providers, a request to view multi-cloud relative risk information for at least a subset of the cloud assets on which workloads of a given entity run.
Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
Filed: 11 Mar 21
Utility
em19rko7o 0hxgxpgdc0lc6cgq96usd9b2375lxjz2a17tzbyg17
15 Sep 22
An apparatus comprises a processing device configured to receive, at a trust platform configured to manage cloud assets operating in clouds of two or more cloud service providers, self-reported risk information for at least a subset of the cloud assets on which workloads of a given entity run.
Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
Filed: 11 Mar 21
Utility
xa7apji2q0fq5wtg33fdmf87qy
15 Sep 22
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for data processing.
Zhen Jia, Anzhou Hou, Danqing Sha, Bin He
Filed: 9 Apr 21
Utility
95g ukx9tzo5raa4z4re
15 Sep 22
A method of operating a computing device for processing data is provided.
Vladimir Shveidel, Alexei Kabishcer
Filed: 11 Mar 21
Utility
m3wkmo92f4irjvwwwjgg4rd2a
15 Sep 22
An apparatus comprises at least one processing device comprising a processor coupled to a memory.
Amit Pundalik Anchi, Vinay G. Rao, Srinivas Kangyampeta, Madhu Tarikere
Filed: 9 Mar 21
Utility
wj4weusipst84mh0c86lel3578zowcl2berp0m0b
15 Sep 22
A method for deploying product applications within virtual machines onto on-premises and public cloud infrastructures.
Lihui Su, Yujun Liang, Yin Wei, Ming Zhang, James Morton
Filed: 11 Mar 21
Utility
uar8ek vvcbq7kuf8dslzsck20crwt7wmr5t36
15 Sep 22
One example method includes receiving, from a microservice, a service request that identifies a service needed by the microservice, and an API of an endpoint that provides the service, evaluating the service request to determine whether the service request conforms to a policy, when the service request has been determined to conform with the policy, evaluating the endpoint to determine if endpoint performance meets established guidelines, and when it is determined that the endpoint performance does not meet the established guidelines, identifying an alternative endpoint that meets the established guidelines and that provides the requested service.
Aman Wangde, Victor Fong, Malini Bhattacharjee, Xuebin He, Kenneth Durazzo
Filed: 12 Mar 21
Utility
izqbykn2q09542qvpfuj6e3t8kdcd5oxjrubs5
15 Sep 22
Techniques described herein relate to methods and systems for managing backup operations.
Shelesh Chopra, Rahul Deo Vishwakarma, Sharath Talkad Srinivasan
Filed: 11 Mar 21