-
公开(公告)号:US20220021608A1
公开(公告)日:2022-01-20
申请号:US17483490
申请日:2021-09-23
申请人: Kshitij Arun Doshi , S M Iftekharul Alam , Francesc Guim Bernat , Satish Chandra Jha , Vesh Raj Sharma Banjade
发明人: Kshitij Arun Doshi , S M Iftekharul Alam , Francesc Guim Bernat , Satish Chandra Jha , Vesh Raj Sharma Banjade
IPC分类号: H04L12/717 , H04L12/747 , H04L12/751 , H04L12/733 , H04L12/707
摘要: Various aspects of methods, systems, and use cases include en-route computing coordination. A method may include receiving a packet including a compute task and context information, identifying a destination node for the packet, and determining a route for the packet to the destination node. The route may include an intermediary node determined based on the context information and available resources at the intermediary node to execute the compute task of the packet at the intermediary node. The method may include forwarding the packet to a next device along the route.
-
公开(公告)号:US20220014566A1
公开(公告)日:2022-01-13
申请号:US17484617
申请日:2021-09-24
申请人: Francesc Guim Bernat , Hassnaa Moustafa , Kshitij Arun Doshi , Christian Maciocco , Vesh Raj Sharma Banjade , Satish Chandra Jha , S M Iftekharul Alam
发明人: Francesc Guim Bernat , Hassnaa Moustafa , Kshitij Arun Doshi , Christian Maciocco , Vesh Raj Sharma Banjade , Satish Chandra Jha , S M Iftekharul Alam
IPC分类号: H04L29/06
摘要: Various aspects of methods, systems, and use cases include security-based orchestration. A method may include evaluating, within a secure environment of an untrusted device, a preamble to determine a set of security requirements. The method may include, providing, to an attestation server, an indication of security parameters for services of the untrusted device corresponding to security requirements of the set of security requirements, and in response to receiving a confirmation from the attestation server, providing a request to the untrusted device outside the secure environment to generate a trusted domain including the services.
-
公开(公告)号:US20210320875A1
公开(公告)日:2021-10-14
申请号:US17357358
申请日:2021-06-24
申请人: Francesc Guim Bernat , Karthik Kumar , Thomas E. Willis , Timothy Verrall , Robert G. Southworth
发明人: Francesc Guim Bernat , Karthik Kumar , Thomas E. Willis , Timothy Verrall , Robert G. Southworth
IPC分类号: H04L12/851
摘要: A network switch includes a memory device to store a stream information of a plurality of data streams being handled by the network switch, the stream information including a stream identifier, a stream service level agreement (SLA), and a stream traffic type; accelerator circuitry to apply stream transformation functions to data streams; telemetry circuitry to monitor egress ports of the network switch; and scheduler circuitry to: receive telemetry data from the telemetry circuitry to determine that a utilization of egress ports of the network switch is over a threshold utilization; determine a selected data stream of the plurality of data streams to transform; use the accelerator circuitry to transform the selected data stream to produce a transformed data stream, wherein the transformed data stream complies with a corresponding stream SLA; and transmit the transformed data stream on an egress port.
-
公开(公告)号:US20210318965A1
公开(公告)日:2021-10-14
申请号:US17357662
申请日:2021-06-24
IPC分类号: G06F12/123 , G06F12/14 , G06F12/02 , G06F1/3234
摘要: The platform data aging for adaptive memory scaling described herein provides technical solutions for technical problems facing power management for electronic device processors. Technical solutions described herein include improved processor power management based on a memory region life-cycle (e.g., short-lived, long-lived, static). In an example, a short-term memory request is allocated to a short-term memory region, and that short-term memory region is powered down upon expiration of the lifetime of all short-term memory requests on the short-term memory region. Multiple memory regions may be scaled down (e.g., shut down) or scaled up based on demands for memory capacity and bandwidth.
-
公开(公告)号:US20210152543A1
公开(公告)日:2021-05-20
申请号:US17127852
申请日:2020-12-18
摘要: Systems and techniques for automatic escalation of trust credentials are described herein. Requestor data may be received that describes workloads of a requestor. A set of trust credentials may be determined by using an escalation prediction model to evaluate the requestor data. The multi-access token may be assembled from the set of trust credentials. The multi-access token may be transmitted to an information provider to fulfill a request of a requestor.
-
公开(公告)号:US20210051096A1
公开(公告)日:2021-02-18
申请号:US17086320
申请日:2020-10-30
IPC分类号: H04L12/725 , H04L12/803 , H04L12/933 , H04L12/825 , H04L12/931
摘要: Technologies for quality of service based throttling in a fabric architecture include a network node of a plurality of network nodes interconnected across the fabric architecture via an interconnect fabric. The network node includes a host fabric interface (HFI) configured to facilitate the transmission of data to/from the network node, monitor quality of service levels of resources of the network node used to process and transmit the data, and detect a throttling condition based on a result of the monitored quality of service levels. The HFI is further configured to generate and transmit a throttling message to one or more of the interconnected network nodes in response to having detected a throttling condition. The HFI is additionally configured to receive a throttling message from another of the network nodes and perform a throttling action on one or more of the resources based on the received throttling message. Other embodiments are described herein.
-
公开(公告)号:US20210006972A1
公开(公告)日:2021-01-07
申请号:US17025519
申请日:2020-09-18
摘要: Methods, systems, and use cases for geofence-based edge service control and authentication are discussed, including an orchestration system with memory and at least one processing circuitry coupled to the memory. The processing circuitry is configured to perform operations to obtain, from a plurality of connectivity nodes providing edge services, physical location information, and resource availability information associated with each of the plurality of connectivity nodes. An edge-to-edge location graph (ELG) is generated based on the physical location information and the resource availability information, the ELG indicating a subset of the plurality of connectivity nodes that are available for executing a plurality of services associated with an edge workload. The connectivity nodes are provisioned with the ELG and a workflow execution plan to execute the plurality of services, the workflow execution plan including metadata with a geofence policy. The geofence policy specifies geofence restrictions associated with each of the plurality of services.
-
公开(公告)号:US20200319696A1
公开(公告)日:2020-10-08
申请号:US16907264
申请日:2020-06-21
IPC分类号: G06F1/3234 , G06F12/0804 , G06N3/08 , G06N3/04 , G06F1/3287
摘要: Methods and apparatus for platform ambient data management schemes for tiered architectures. A platform including one or more CPUs coupled to multiple tiers of memory comprising various types of DIMMs (e.g., DRAM, hybrid, DCPMM) is powered by a battery subsystem receiving input energy harvested from one or more green energy sources. Energy threshold conditions are detected, and associated memory reconfiguration is performed. The memory reconfiguration may include but is not limited to copying data between DIMMs (or memory ranks on the DIMMS in the same tier, copying data between a first type of memory to a second type of memory on a hybrid DIMM, and flushing dirty lines in a DIMM in a first memory tier being used as a cache for a second memory tier. Following data copy and flushing operations, the DIMMs and/or their memory devices are powered down and/or deactivated. In one aspect, machine learning models trained on historical data are employed to project harvested energy levels that are used in detecting energy threshold conditions.
-
公开(公告)号:US20200285523A1
公开(公告)日:2020-09-10
申请号:US16878861
申请日:2020-05-20
申请人: Francesc Guim Bernat , Kshitij Arun Doshi , Bassam N. Coury , Suraj Prabhakran , Timothy Verrall
发明人: Francesc Guim Bernat , Kshitij Arun Doshi , Bassam N. Coury , Suraj Prabhakran , Timothy Verrall
摘要: Systems and methods may be used to determine where to run a service based on workload-based conditions or system-level conditions. An example method may include determining whether power available to a resource of a compute device satisfies a target power, for example to satisfy a target performance for a workload. When the power available is insufficient, an additional resource may be provided, for example on a remote device from the compute device. The additional resource may be used as a replacement for the resource of the compute device or to augment the resource of the compute device.
-
公开(公告)号:US20200084202A1
公开(公告)日:2020-03-12
申请号:US16683410
申请日:2019-11-14
申请人: Ned M. Smith , John J. Browne , Kapil Sood , Francesc Guim Bernat , Kshitij Arun Doshi , Rajesh Poornachandran , Tarun Viswanathan , Manish Dave
发明人: Ned M. Smith , John J. Browne , Kapil Sood , Francesc Guim Bernat , Kshitij Arun Doshi , Rajesh Poornachandran , Tarun Viswanathan , Manish Dave
摘要: Various approaches for implementing attestation using an attestation token are described. In an edge computing system deployment, an edge computing device includes an attestable feature (e.g., resource, service, entity, property, etc.) which is accessible from use of an attestation token, by the operations of: obtaining a first instance of a token that provides proof of attestation for an accessible feature of the edge computing device, with the token including data to indicate trust level designations for the feature as attested by an attestation provider; receiving, from a prospective user of the feature, a request to use the feature and a second instance of the token, with the second instance of the token originating from the attestation provider; and providing access to the feature based on a verification of the instances of the token, by using the verification to confirm attestation of the trust level designations for the feature.
-
-
-
-
-
-
-
-
-