Datacenter IoT-triggered preemptive measures using machine learning

    公开(公告)号:US11561851B2

    公开(公告)日:2023-01-24

    申请号:US17382065

    申请日:2021-07-21

    Abstract: One example method includes performing a machine learning process that involves performing an assessment of a state of a computing system, and the assessment includes analyzing information generated by an IoT edge sensor in response to a sensed physical condition in the computing system, and identifying an entity in the computing system potentially impacted by an event associated with the physical condition. The example method further includes identifying a preemptive recovery action and associating the preemptive recovery action with an entity, and the preemptive recovery action, when performed, reduces or eliminates an impact of the event on the entity, determining a cost associated with implementation of the preemptive recovery action, evaluating the cost associated with the preemptive recovery actions and identifying the preemptive recovery action with the lowest associated cost, implementing the preemptive recovery action with the lowest associated cost, and repeating part of the machine learning process.

    OPTIMIZING DOCKER IMAGE ENCRYPTION - KUBERNETES USING SHAMIR SECRETS TO ENFORCE MULTIPLE CONSTRAINTS IN CONTAINER RUNTIME ENVIRONMENT

    公开(公告)号:US20220283794A1

    公开(公告)日:2022-09-08

    申请号:US17193159

    申请日:2021-03-05

    Abstract: One example method includes using a primary key to encrypt a decryption key, splitting the primary key into ‘n’ parts, where at least ‘k’ parts of the ‘n’ parts are required to restore the primary key, and ‘k’≤‘n’, storing some of the ‘k’ parts in respective locations in a production environment, and one of the stored ‘k’ parts is held by a verifier stage, receiving, at the verifier stage, a request for restoration of the primary key, where the request is received from a deployment pod and the request includes a subset of the ‘k’ parts and the encrypted decryption key, performing, by the verifier stage, a validation process concerning the deployment pod, and restoring, by the verifier stage, the primary key, wherein the primary key is restored using the ‘k’ part held by the verifier stage.

    Data storage agnostic deduplication for virtual machines

    公开(公告)号:US11341099B1

    公开(公告)日:2022-05-24

    申请号:US16384626

    申请日:2019-04-15

    Abstract: Described is a system that provides deduplication management at a virtualization layer allowing virtual machines to store deduplicated data amongst various back-end data storage architectures. For example, the system may be storage-agnostic by operating at a hypervisor layer to fully leverage the benefits provided by virtualization. Accordingly, implementing deduplication by a hypervisor results in “pluggable” software-defined storage management. In addition, such a system may be implemented on any on-demand infrastructure (e.g. Infrastructure as a Service (IaaS)) environment that includes varying types of back-end storage solutions including solutions from various vendors. In addition, by operating within the virtualized layer of an on-demand computing resource environment (e.g. cloud environment), the system may provide deduplication across different resource clusters (e.g. hypervisor clusters) and environments. Moreover, the system may operate in a multitenancy environment to support global deduplication amongst multiple tenants, or tenant-specific deduplication.

    DATA CENTER BACKUP AT THE EDGE
    54.
    发明申请

    公开(公告)号:US20220083433A1

    公开(公告)日:2022-03-17

    申请号:US17024296

    申请日:2020-09-17

    Abstract: One example method includes determining a respective available data storage capacity for each of the edge sites, receiving available data storage capacity information from each of the edge sites, storing the available data storage capacity information, creating a backup dataset, determining whether the group of edge sites have an aggregate amount of available storage capacity to store the backup dataset, and storing the backup dataset across the edge sites when the aggregate amount of available storage capacity is sufficient to store the entire backup dataset.

    Non-centralized data synchronization for IoT and other distributed applications

    公开(公告)号:US11243978B2

    公开(公告)日:2022-02-08

    申请号:US16024254

    申请日:2018-06-29

    Abstract: Disclosed is a method, apparatus, and system for processing a data update message in a multi-agent system comprising a plurality of agents, the operations comprising: receiving, at a second agent, the data update message comprising data for a node in a shared data tree and a first node context map from a first agent, the first node context map comprising last known contexts of all the agents for the node according to knowledge of the first agent; determining, at the second agent, whether any of three conditions relating to the first node context map and a second node context map is true, the second node context map comprising last known contexts of all the agents for the node according to knowledge of the second agent; and in response to determining that none of the three conditions relating to the first node context map and the second node context map is true, updating, at the second agent, the node based on the data update message from the first agent.

    VM PROTECTION WITH TRUE ZERO RTO
    56.
    发明申请

    公开(公告)号:US20210349637A1

    公开(公告)日:2021-11-11

    申请号:US17382037

    申请日:2021-07-21

    Abstract: One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.

    VM protection with true zero RTO
    59.
    发明授权

    公开(公告)号:US11099770B1

    公开(公告)日:2021-08-24

    申请号:US16802120

    申请日:2020-02-26

    Abstract: One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.

    TRUE ZERO RTO ELIMINATING OS AND APP LOAD TIMES

    公开(公告)号:US20210247993A1

    公开(公告)日:2021-08-12

    申请号:US16784078

    申请日:2020-02-06

    Abstract: One example method includes performing a cloning process that includes cloning an OS disk and a data disk of a source VM to create a replica VM having an OS disk and a data disk that correspond, respectively, to the OS disk and data disk of the source VM. A replication process is then performed that includes replicating an application from the data disk of the source VM to the data disk of the replica VM, and the replication process does not include any replication of the OS disk of the source VM to the OS disk of the replica VM. Finally, the replica VM is powered up so that the OS of the replica VM is running, and the application is running on the replica VM. When performing a recovery with the replica VM, the RTO does not include an OS boot time.

Patent Agency Ranking