Determining and implementing a feasible resource optimization plan for public cloud consumption

    公开(公告)号:US11561842B2

    公开(公告)日:2023-01-24

    申请号:US16779358

    申请日:2020-01-31

    Abstract: Example implementations relate to determining and implementing a feasible resource optimization plan for public cloud consumption. Telemetry data over a period of time is obtained for a current deployment of virtual infrastructure resources within a current data center of a cloud provider that supports an existing service and an application deployed on the virtual infrastructure resources. Information regarding a set of constraints to be imposed on a resource optimization plan is obtained. Indicators of resource consumption relating to the currently deployed virtual infrastructure resources during the period of time are identified by applying a deep learning algorithm to the telemetry data. A resource optimization plan is determined that is feasible within the set of constraints based on a costing model associated with resources of an alternative data center of the cloud provider, the indicators of resource consumption and costs associated with the current deployment.

    Upgrade recommendations
    362.
    发明授权

    公开(公告)号:US11561782B2

    公开(公告)日:2023-01-24

    申请号:US16775179

    申请日:2020-01-28

    Abstract: An example recommendation device can include a memory resource storing instructions executable by a processing resource to: determine dependencies of a hardware topology, determine properties of an upgrade to be performed on the hardware topology, compare the properties of the upgrade to the determined dependencies of the hardware topology to identify potential events, and generate a recommendation for deploying the upgrade on the hardware topology based on the comparison.

    SYSTEM AND METHOD FOR FACILITATING EFFICIENT MANAGEMENT OF DATA STRUCTURES STORED IN REMOTE MEMORY

    公开(公告)号:US20230019758A1

    公开(公告)日:2023-01-19

    申请号:US17377777

    申请日:2021-07-16

    Abstract: A system and method are provided for facilitating efficient management of data structures stored in remote memory. During operation, the system receives a request to allocate memory for a first part in a data structure stored in a remote memory associated with a compute node in a network. The system pre-allocates a buffer in the remote memory for a plurality of parts in the data structure and stores a first local descriptor associated with the buffer in a local worker table stored in a volatile memory of the compute node. The first local descriptor facilitates servicing future access requests to the first and other parts in the data structure. The system stores a first global descriptor for the buffer in a shared global table stored in the remote memory and generates a first reference corresponding to the first part, thereby facilitating faster traversals of the data structure.

    Generating snapshots of a key-value index

    公开(公告)号:US11556513B2

    公开(公告)日:2023-01-17

    申请号:US16916645

    申请日:2020-06-30

    Abstract: A computer implemented method may include: storing key-value pairs in an index in persistent storage, where indirect nodes of the index include pointers, where each pointer identifies an index portion and includes a generation identifier for the identified index portion, where the index comprises a plurality of snapshots associated with a plurality of generations; receiving a request to read data of a particular snapshot of the index, wherein the particular snapshot is associated with a particular generation of the plurality of generations; in response to the request, performing a traversal starting from a particular root node associated with the particular generation; and providing the requested data based on the traversal.

    SECURE RESTORE OF A COMPUTING SYSTEM

    公开(公告)号:US20230011413A1

    公开(公告)日:2023-01-12

    申请号:US17454936

    申请日:2021-11-15

    Abstract: Examples described herein relate to a method and a system, for example, a restore management system for providing secure restore of computing system. In some examples, the restore management system may determine that the computing system is restored. Further, the restore management system may isolate the computing system by restricting access to the computing system for any data traffic other than data traffic associated with a security fix to be applied to the computing system. Furthermore, the restore management system may determine that the security fix has been successfully applied to the computing system and, in response to determining that the security fix has been successfully applied, the restore management system may remove the computing system from isolation.

    Optical network having combined circuit-packet switch architecture

    公开(公告)号:US11553260B2

    公开(公告)日:2023-01-10

    申请号:US17655032

    申请日:2022-03-16

    Abstract: An optical network includes top networking ports coupled to a packet switch, first media converters, second media converters, and bottom networking ports. The first media converters are coupled to top networking ports, each of the first media converters including a first ASIC transceiver that has a circuit switch function. The second media converters are coupled to the first media converter via optical cables to receive the optical signals. Each of the second media converters includes a second ASIC transceiver that has a circuit switch function. The bottom networking ports are coupled to the second media converters. The first ASIC transceiver and the second ASIC transceiver are configured to transmit a signal from one of the top networking ports to any one of the bottom networking ports, and transmit a signal from one of the bottom networking ports to any one of the top networking ports.

    Label based policy enforcement
    370.
    发明授权

    公开(公告)号:US11552824B2

    公开(公告)日:2023-01-10

    申请号:US17391790

    申请日:2021-08-02

    Abstract: Examples disclosed herein relate to a method comprising receiving a data packet originating from a first device and intended for a second device, wherein the first device and the first access device belong to a first branch of a Wide Area Network (WAN) using a MPLS overlay and the second device belongs to a second branch of the WAN. The method includes encapsulating the data packet in VXLAN including a VXLAN label identifying a role type and transmitting the data packet to a first core device. The method includes determining an MPLS label corresponding to the role type and transmitting the data packet over the MPLS overlay to a second core device belonging to the second branch of the WAN. The method includes translating the MPLS label into the VXLAN label and transmitting the data packet including the VXLAN label to a second access device for an enforcement action.

Patent Agency Ranking