-
11.
公开(公告)号:US20240176608A1
公开(公告)日:2024-05-30
申请号:US18436515
申请日:2024-02-08
Applicant: Red Hat, Inc.
Inventor: Cathal O'Connor , Brian Gallagher
CPC classification number: G06F8/63 , G06F8/65 , G06F21/577 , G06F2221/033
Abstract: The sizes of image files for deploying software in a computing environment can be reduced according to some examples described herein. In one example, a system can identify base image files that each include at least a predefined amount of dependencies relied upon by target software. The system can then select a particular base image file, from the base image files, having a smallest size as compared to a remainder of the base image files. The system can then build a customized image file from the base image file, where the customized image file is configured for deploying the target software to a computing environment.
-
公开(公告)号:US11973682B2
公开(公告)日:2024-04-30
申请号:US17676714
申请日:2022-02-21
Applicant: Red Hat, Inc.
Inventor: Leigh Griffin , Cathal O'Connor
IPC: H04L45/021 , H04L45/00 , H04L45/28 , H04L45/42
CPC classification number: H04L45/021 , H04L45/20 , H04L45/28 , H04L45/42
Abstract: A system and method of dynamically mapping a network topology of a mesh network of nodes. The method including maintaining, by a processing device of a control node of the mesh network, a network topology map indicating groups of neighboring nodes. The method including determining that a first node of the mesh network discovered a neighbor change event associated with a second node. The method including identifying, based on the network topology map, a group of neighboring nodes of a target node of the mesh network responsive to determining that the first node detected the neighbor change event. The method including transmitting a targeted message to a first neighboring node of the group of neighboring nodes to cause the first neighboring node to notify the group of neighboring nodes of the neighbor change event.
-
13.
公开(公告)号:US20230367565A1
公开(公告)日:2023-11-16
申请号:US17743650
申请日:2022-05-13
Applicant: RED HAT, INC.
Inventor: Cathal O'Connor , Brian Gallagher
Abstract: A shim layer can be incorporated into a container image for intercepting calls between an upper layer and a lower layer of the container image according to some aspects described herein. For example, a system can build an image file that includes a stacked arrangement of layers configured for deploying a software program within a container. The stacked arrangement of layers can include a lower layer including one or more objects. The stacked arrangement of layers can include an upper layer positioned above the lower layer, where the upper layer includes the software program. And the stacked arrangement of layers can include a shim layer positioned between the lower layer and the upper layer. The shim layer can include a shim, which is configured to intercept calls involving the one or more objects from the software program and responsively allow or reject the calls based on control data.
-
公开(公告)号:US20230224162A1
公开(公告)日:2023-07-13
申请号:US17571660
申请日:2022-01-10
Applicant: Red Hat, Inc.
Inventor: Brian Gallagher , Cathal O'Connor
IPC: H04L9/32
CPC classification number: H04L9/3239 , H04L9/3247 , H04L2209/38
Abstract: Systems and methods of the disclosure include: receiving, by a node of a distributed ledger network, first transaction data, wherein the first transaction data comprises an alert derived from a state of a computer system; storing the first transaction data in a first block of the distributed ledger network; receiving, by the node, second transaction data, wherein the second transaction data comprises an identifier of a remedial action performed on the computer system in response to the alert and a result of performing the remedial action; and storing the second transaction data in a block of the distributed ledger network, wherein the block is provided by one of: the first block or a second block.
-
公开(公告)号:US12229251B2
公开(公告)日:2025-02-18
申请号:US18083324
申请日:2022-12-16
Applicant: Red Hat, Inc.
Inventor: Brian Gallagher , Cathal O'Connor
Abstract: Systems and methods comprising at least one node comprising an application container; a container image associated with the application container; a static analyzer module deployed to analyze the container image, with instructions configured to autonomously parse, code of an application, during compile time of the application, wherein the application is to be deployed in the application container; determine, based on the parsing, for at least one section of the code, at least one module necessary for execution of the at least one section; annotate, the at least one section of the code, based on the determined at least one module; and inject, at least one wrapper around the at least one section of the code, wherein the wrapper adds at least one restriction to an execution of the at least one section at runtime, wherein the restrictions are based on at least one condition.
-
16.
公开(公告)号:US20240311104A1
公开(公告)日:2024-09-19
申请号:US18673419
申请日:2024-05-24
Applicant: RED HAT, INC.
Inventor: Cathal O'Connor , Brian Gallagher
Abstract: A shim layer can be incorporated into a container image for intercepting calls between an upper layer and a lower layer of the container image according to some aspects described herein. For example, a system can build an image file that includes a stacked arrangement of layers configured for deploying a software program within a container. The stacked arrangement of layers can include a lower layer including one or more objects. The stacked arrangement of layers can include an upper layer positioned above the lower layer, where the upper layer includes the software program. And the stacked arrangement of layers can include a shim layer positioned between the lower layer and the upper layer. The shim layer can include a shim, which is configured to intercept calls involving the one or more objects from the software program and responsively allow or reject the calls based on control data.
-
17.
公开(公告)号:US11928452B2
公开(公告)日:2024-03-12
申请号:US17592140
申请日:2022-02-03
Applicant: Red Hat, Inc.
Inventor: Cathal O'Connor , Brian Gallagher
CPC classification number: G06F8/63 , G06F8/65 , G06F21/577 , G06F2221/033
Abstract: The sizes of image files for deploying software in a computing environment can be reduced according to some examples described herein. In one example, a system can identify base image files that each include at least a predefined amount of dependencies relied upon by target software. The system can then select a particular base image file, from the base image files, having a smallest size as compared to a remainder of the base image files. The system can then build a customized image file from the base image file, where the customized image file is configured for deploying the target software to a computing environment.
-
公开(公告)号:US11907142B2
公开(公告)日:2024-02-20
申请号:US17592739
申请日:2022-02-04
Applicant: RED HAT, INC.
Inventor: Brian Gallagher , Cathal O'Connor
CPC classification number: G06F13/22 , G06F9/4498 , G06F9/541 , G06N20/00
Abstract: Excessive polling that may result in wasted computing resources and unnecessary network traffic can be avoided using some techniques described herein. In one example, a method can include obtaining historical data indicating execution times associated with computing operations. The method can also include determining polling times to assign to the computing operations by applying a model to the historical data. The method may also include configuring a software application to implement the polling times in relation to polling processes for transmitting requests to execute the computing operations to one or more destinations.
-
公开(公告)号:US20230297970A1
公开(公告)日:2023-09-21
申请号:US17695182
申请日:2022-03-15
Applicant: Red Hat, Inc.
Inventor: Brian Gallagher , Cathal O'Connor
CPC classification number: G06Q10/20 , G06Q10/06311
Abstract: Processing logic may generate metadata in view of monitoring a response of each of a plurality of components of an application to past maintenance tasks, wherein the metadata comprises an expected downtime of a first of the plurality of components of the application and a second expected downtime of a second of the plurality of components of the application in response to the expected downtime of the first of the plurality of components. Processing logic may obtain a notification to perform a maintenance task for a first of the plurality of components. In view of the metadata, processing logic may schedule the maintenance task for the first of the plurality of components to coincide with a second maintenance task of the second of the plurality of components.
-
公开(公告)号:US20230275931A1
公开(公告)日:2023-08-31
申请号:US17680700
申请日:2022-02-25
Applicant: Red Hat, Inc.
Inventor: Leigh Griffin , Cathal O'Connor
IPC: H04L9/40
CPC classification number: H04L63/205
Abstract: A method includes determining that access permissions associated with a service of a computing system have been revoked, identifying one or more access policy sets including access policy rules associated with the service, removing the access policy rules associated with the service from the one or more access policy sets, and marking one or more decision execution paths of a policy decision point associated with the service with a feature flag.
-
-
-
-
-
-
-
-
-