-
公开(公告)号:US12132621B1
公开(公告)日:2024-10-29
申请号:US18500300
申请日:2023-11-02
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Gavin Brebner , Anne Moelle
IPC: G06F15/173 , H04L41/16 , H04L41/50 , H04L41/5025
CPC classification number: H04L41/5032 , H04L41/16 , H04L41/5025
Abstract: In certain embodiments, a computer-implemented method includes monitoring, over time, values for a service metric associated providing a computerized service over a communication network and evaluating, according to a statistical model, the values for the service metric to determine whether the values are anomalous values. The statistical model includes a predicted distribution of the values for the service metric and a normal value range within the predicted distribution of the values for the service metric. Anomalous values may be values for the service metric outside the normal value range. The method includes detecting a performance issue with the computerized service and determining, in response to detecting the performance issue, whether one or more of the values for the service metric are anomalous. The method includes automatically setting, in accordance with whether one or more of the values are anomalous, a value of a service level threshold for the service metric.
-
公开(公告)号:US12131290B2
公开(公告)日:2024-10-29
申请号:US17809553
申请日:2022-06-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Graham Clarke , Gina M. Correa
IPC: G06Q10/00 , G06Q10/0833 , G06Q10/0837 , G06Q10/087
CPC classification number: G06Q10/087 , G06Q10/0833 , G06Q10/0837
Abstract: Techniques are provided for a spare part management and reservation system. Based on a received request from a first client device, stored data is retrieved indicating whether a part is available to a user. A first indication is received from the first client device comprising a request from the user to reserve the part in an inventory. In response to data indicating that the part is available to the user, a contingent reservation of the part by the user is generated and transmitted. A second indication comprising a notification indicating whether the part has been consumed by the user is received from the first client device. In response to the notification indicating that the part has or has not been consumed by the user, a real-time update to the contingent reservation comprising either a confirmed reservation or an indication that the part is available for reservation is generated and transmitted.
-
73.
公开(公告)号:US12131205B2
公开(公告)日:2024-10-29
申请号:US18458304
申请日:2023-08-30
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Joseph G. Tietz
IPC: G06F9/54
CPC classification number: G06F9/546
Abstract: Systems and methods are provided for managing data transmissions in integrated circuits using a handshake, credit path, and data path. For example, the handshake between transmission and receiving sides can enable information to be passed over a separate path from the data path. Based on a calculated round trip delay, the system can identify the number of top level flops or registers needed in the credit path, which can be the same as the number of top level flops or registers in the data path. The receiving side can calculate the required number of credits per requested virtual channel based on the available queuing resources of the receiving side and the round trip delay of the data path, in order to ensure full bandwidth data streaming on the channel.
-
公开(公告)号:US12131029B2
公开(公告)日:2024-10-29
申请号:US17976721
申请日:2022-10-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Keith D. Underwood , Robert L. Alverson
IPC: G06F3/06
CPC classification number: G06F3/0613 , G06F3/0659 , G06F3/067
Abstract: A method and apparatus are provided for facilitating a datatype engine (DTE) to support high performance computing. A network interface card (NIC) receives, via a message passing interface, a command to read data from a host memory. The NIC determines that the command indicates a first datatype descriptor stored in the NIC. The NIC forms, based on the command, a packet which indicates a base address and a length associated with the data to be read from the host memory and passes the packet to the DTE. The DTE generates a plurality of read requests comprising offsets from the base address and corresponding lengths based on the first datatype descriptor. The DTE passes the plurality of read requests to a direct memory access module, thereby allowing the NIC to access the host memory while eliminating copies of the data on the host during transfer of the command across a network.
-
公开(公告)号:US20240356836A1
公开(公告)日:2024-10-24
申请号:US18675642
申请日:2024-05-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Edwin L. Froese , Robert L. Alverson , Konstantinos Fragkiadakis
IPC: H04L45/28 , G06F9/50 , G06F9/54 , G06F12/0862 , G06F12/1036 , G06F12/1045 , G06F13/14 , G06F13/16 , G06F13/28 , G06F13/38 , G06F13/40 , G06F13/42 , G06F15/173 , H04L1/00 , H04L43/0876 , H04L43/10 , H04L45/00 , H04L45/02 , H04L45/021 , H04L45/028 , H04L45/12 , H04L45/122 , H04L45/125 , H04L45/16 , H04L45/24 , H04L45/42 , H04L45/745 , H04L45/7453 , H04L47/10 , H04L47/11 , H04L47/12 , H04L47/122 , H04L47/20 , H04L47/22 , H04L47/24 , H04L47/2441 , H04L47/2466 , H04L47/2483 , H04L47/30 , H04L47/32 , H04L47/34 , H04L47/52 , H04L47/62 , H04L47/625 , H04L47/6275 , H04L47/629 , H04L47/76 , H04L47/762 , H04L47/78 , H04L47/80 , H04L49/00 , H04L49/101 , H04L49/15 , H04L49/90 , H04L49/9005 , H04L49/9047 , H04L67/1097 , H04L69/22 , H04L69/28 , H04L69/40
CPC classification number: H04L45/28 , G06F9/505 , G06F9/546 , G06F12/0862 , G06F12/1036 , G06F12/1063 , G06F13/14 , G06F13/16 , G06F13/1642 , G06F13/1673 , G06F13/1689 , G06F13/28 , G06F13/385 , G06F13/4022 , G06F13/4068 , G06F13/4221 , G06F15/17331 , H04L1/0083 , H04L43/0876 , H04L43/10 , H04L45/02 , H04L45/021 , H04L45/028 , H04L45/122 , H04L45/123 , H04L45/125 , H04L45/16 , H04L45/20 , H04L45/22 , H04L45/24 , H04L45/38 , H04L45/42 , H04L45/46 , H04L45/566 , H04L45/70 , H04L45/745 , H04L45/7453 , H04L47/11 , H04L47/12 , H04L47/122 , H04L47/18 , H04L47/20 , H04L47/22 , H04L47/24 , H04L47/2441 , H04L47/2466 , H04L47/2483 , H04L47/30 , H04L47/32 , H04L47/323 , H04L47/34 , H04L47/39 , H04L47/52 , H04L47/621 , H04L47/6235 , H04L47/626 , H04L47/6275 , H04L47/629 , H04L47/76 , H04L47/762 , H04L47/781 , H04L47/80 , H04L49/101 , H04L49/15 , H04L49/30 , H04L49/3009 , H04L49/3018 , H04L49/3027 , H04L49/90 , H04L49/9005 , H04L49/9021 , H04L49/9036 , H04L49/9047 , H04L67/1097 , H04L69/22 , H04L69/40 , G06F2212/50 , G06F2213/0026 , G06F2213/3808 , H04L69/28
Abstract: Systems and methods are provided for managing multicast data transmission in a network having a plurality of switches arranged in a Dragonfly network topology, including: receiving a multicast transmission at an edge port of a switch and identifying the transmission as a network multicast transmission; creating an entry in a multicast table within the switch; routing the multicast transmission across the network to a plurality of destinations via a plurality of links, wherein at each of the links the multicast table is referenced to determine to which ports the multicast transmission should be forwarded; and changing, when necessary, the virtual channel used by each copy of the multicast transmission as the copy progresses through the network.
-
公开(公告)号:US12126642B2
公开(公告)日:2024-10-22
申请号:US18150860
申请日:2023-01-06
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Ramsundar Janakiraman
CPC classification number: H04L63/1425 , H04L63/20
Abstract: Systems and methods for providing remote network security using a network embeddings model are provided. A method consistent with the present disclosure includes retrieving a corpus of network activity data associated with a first network. The network activity data may be generated from users within the first network submitting network requests for network assets to service the network requests. The method also includes creating a crafted encoded corpus by selecting a subset of the corpus of network activity data and creating a network embeddings model based on the crafted encoded corpus. Lastly, the method includes generating an alert in an event that the network security system identifies an anomaly associated with the crafted encoded corpus of network activity data.
-
公开(公告)号:US12124617B2
公开(公告)日:2024-10-22
申请号:US17930333
申请日:2022-09-07
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Wan-Yen Hsu , Chih-Hao Chang , Lin-Chan Hsiao
CPC classification number: G06F21/64 , G06F9/5072 , G06F21/121 , G06F21/71 , H04L9/0825 , H04L9/3236 , H04L9/3247
Abstract: Examples described herein relate to a security management system to secure a container ecosystem. In some examples, the security management system may protect one or more entities such as container management applications, container images, containers, and/or executable applications within the containers. The security management system may make use of digital cryptography to generate digital signatures corresponding to one or more of these entities and verify them during the execution so that any compromised entities can be blocked from execution and the container ecosystem may be safeguarded from any malicious network attacks.
-
公开(公告)号:US20240348457A1
公开(公告)日:2024-10-17
申请号:US18583323
申请日:2024-02-21
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Thomas M. Laffey
CPC classification number: H04L9/3263 , H04L9/0869
Abstract: In some examples, a virtual manager in an electronic device generates a seed based on a first key stored in a physical security processor of the electronic device. The virtual manager initializes a virtual security processor by providing the seed to the virtual security processor. The electronic device creates, in the virtual security processor, a virtual security processor key based on the seed, and a virtual security processor certificate based on the virtual security processor key. The virtual security processor key is bound to the physical security processor based on the virtual security processor key being generated from the first key stored in the physical security processor. An identity of a virtual entity in the electronic device is included in the virtual security processor certificate.
-
公开(公告)号:US20240345823A1
公开(公告)日:2024-10-17
申请号:US18345433
申请日:2023-06-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Sebastien Bouat , Valentin D. Emmanuele , Maxim Patrushev
IPC: G06F8/65
CPC classification number: G06F8/65
Abstract: Examples of the present technology provide automated CI/CD systems that unify the CI/CD methodology for virtualized and containerized software environments. To realize this unification, CI/CD systems of the present technology are intelligently designed to leverage a common set of inputs (i.e., artifacts and deployment descriptors) that can facilitate automatic deployment of the software system in either a virtualized environment, a containerized environment, or both. Accordingly, CI/CD systems of the present technology provide a flexible software development tool that facilitates efficient, and automated deployment of software systems in both virtualized and containerized environments.
-
公开(公告)号:US12113703B2
公开(公告)日:2024-10-08
申请号:US17587143
申请日:2022-01-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Shravan Kumar Vuggrala , Raghunandan Prabhakar
IPC: H04L45/28 , H04L45/00 , H04L45/021 , H04L61/103
CPC classification number: H04L45/28 , H04L45/021 , H04L45/66 , H04L61/103
Abstract: Data transfer for access points or switches in a cluster upon data tunnel failure is described. An example includes receiving uniform mapping information for a cluster including a bucket map mapping an active gateway and a standby gateway for each of multiple entries, the bucket map including mapping a first gateway node as a standby gateway and a second gateway node as an active gateway for an entry. Synchronized user information is received from the second gateway node including identification of a user indexed to the first entry. A message is received from a first AP or switch requesting activation of the user on the first gateway node as a standby gateway upon failure of a data tunnel between the first AP or switch and the second gateway node. The user is activated on the first gateway node.
-
-
-
-
-
-
-
-
-