Processing allocation in data center fleets

    公开(公告)号:US11637791B2

    公开(公告)日:2023-04-25

    申请号:US17828166

    申请日:2022-05-31

    Applicant: Google LLC

    Abstract: A method and system for allocating tasks among processing devices in a data center. The method may include receiving a request to allocate a task to one or more processing devices, the request indicating a required bandwidth for performing the task, a list of predefined processing device groups connected to a host server and indicating availability of the processing device groups included therein for allocation of tasks and available bandwidth for each available processing device group, assigning the task to a processing device group having an available bandwidth greater than or equal to the required bandwidth for performing the task, and updating the list to indicate that each of the processing device group to which the task is assigned and other processing device group sharing at least one processing device is unavailable. The task may be assigned to an available processing device group having a lowest amount of power needed.

    PROTECTING INTEGRATION BETWEEN RESOURCES OF DIFFERENT SERVICES USING SERVICE-GENERATED DEPENDENCY TAGS

    公开(公告)号:US20220385596A1

    公开(公告)日:2022-12-01

    申请号:US17805397

    申请日:2022-06-03

    Abstract: A resource tag service of a provider network may be used to protect integration between resources of different services by generating dependency tags. When a service receives, from a client, a request for a resource of the service to use another resource of another service, a dependency tag is generated by the resource tag service. The dependency tag indicates that the resource depends on the other resource (e.g., the resources are integrated). When the other service receives, from the client, a request to delete or modify the other resource, the deletion or modification of the other resource is prevented based on the existence of the dependency tag for the other resource (e.g., the dependency tag is attached to the other resource, indicating that the other resource of the other service is integrated with the resource of the service).

    Enforcement of time-based user access levels for computing environments

    公开(公告)号:US11509604B1

    公开(公告)日:2022-11-22

    申请号:US17318160

    申请日:2021-05-12

    Applicant: INCONTACT INC.

    Abstract: A system is provided for enforcing time-based user access levels in a computing infrastructure of an organization. The system includes a processor and a computer readable medium operably coupled thereto, to perform operations which include executing a synchronization of the time-based user access levels, obtaining a first login identifier (ID) of a plurality of login IDs for a group of employees of the organization, identifying a position ID and an employment status ID for the first login ID, determining a current time and a last login timestamp for the first login ID, determining a time-based access rule for the group of employees, determining whether a time period from the last login timestamp to the current time violates the time-based access rule, and setting, for the synchronization of the first login ID, at least a first access level of the first login ID to computing resources.

    TOOL PORT THROTTLING AT A NETWORK VISIBILITY NODE

    公开(公告)号:US20220345408A1

    公开(公告)日:2022-10-27

    申请号:US17862070

    申请日:2022-07-11

    Applicant: Gigamon Inc.

    Abstract: Systems and methods are disclosed for analyzing traffic received at a network visibility node to determine traffic levels relative to capacity at tools communicatively coupled to the network visibility node and throttling traffic when the traffic levels exceed tool capacity. In an illustrative embodiment, streams received at a network visibility node are analyzed to predict a traffic level) for a given traffic flow. The predicted level of traffic for a given traffic flow is used to decide whether to forward traffic associated with the given traffic flow to a tool port of the network visibility node that is communicatively coupled to an external tool.

    Network access method and terminal
    78.
    发明授权

    公开(公告)号:US11469980B2

    公开(公告)日:2022-10-11

    申请号:US17085358

    申请日:2020-10-30

    Abstract: A network access method and a terminal relate to the communications field, where the method includes obtaining, by the terminal, a priority of a first network service, determining, by the terminal according to a relationship between a network service priority and a network service class, a network service class required for performing the first network service, where the relationship is stored in the terminal, obtaining, by the terminal, a network service class of a first network currently accessed by the terminal, accessing, by the terminal, a second network whose network service class is higher than the network service class of the first network when the network service class of the first network is lower than the network service class required for performing the first network service, and performing the first network service using the second network.

    Systems and methods of creating and operating a cloudless infrastructure of computing devices

    公开(公告)号:US11418458B2

    公开(公告)日:2022-08-16

    申请号:US17566258

    申请日:2021-12-30

    Abstract: Aspects involve an apparatus, device, systems, and methods for instantiating and operating a cloudless infrastructure of computing devices that communicate peer-to-peer and mostly off-grid (or otherwise without communicating through a conventional centralized network) to share resources, access, and provide services and applications, store and access data and other information, and the like. The systems may provide services to connecting computing devices, such as user devices, personal computing devices, mobile devices, laptops, personal computers, Internet of Things (IoT) devices etc., in communication with one or more of the nodes of the infrastructure. The infrastructure exchanges or manages communications, transactions, and/or data in a cloudless and/or decentralized environment to freely exchange information between the nodes to allow the infrastructure to scale in response to client demands, adapt the infrastructure to a failed node with minimal impact on connected computing devices, and provide robust security to customer information, communications, and devices.

Patent Agency Ranking