System, apparatus and method for advanced monitoring in an edge system

    公开(公告)号:US12132661B2

    公开(公告)日:2024-10-29

    申请号:US17005449

    申请日:2020-08-28

    申请人: Intel Corporation

    摘要: In one embodiment, an apparatus includes: a monitor circuit to monitor traffic of a plurality of sources through the apparatus and maintain telemetry information regarding the traffic based at least in part on telemetry rules received from the plurality of sources, wherein the monitor circuit is to determine whether to send a callback message to a selected one of the plurality of sources, the callback message including telemetry information associated with the traffic of the selected source through the apparatus; and a storage coupled to the monitor circuit, the storage to store the telemetry information, wherein the monitor circuit is to access the telemetry information from the storage. Other embodiments are described and claimed.

    Back-reference data structure for a deduplication storage system

    公开(公告)号:US12130707B2

    公开(公告)日:2024-10-29

    申请号:US18185202

    申请日:2023-03-16

    IPC分类号: G06F16/215 G06F11/14

    CPC分类号: G06F11/1453 G06F2201/84

    摘要: Example implementations relate to deduplication operations in a storage system. An example includes generating a housekeeping work map to delete a backup item stored in a deduplication storage system; selecting a first work entry of the housekeeping work map, where the first work entry identifies a first container index and a first manifest; in response to a selection of the first work entry, loading the first container index into the memory, the first container index comprising a back-reference data structure; identifying, in the back-reference data structure, a back-reference entry indexed to the first manifest; determining, using the back-reference entry indexed to the first manifest, a first set of data units included in the first manifest and that are indexed in the first container index; and decrementing, in the first container index, a set of reference counts for the determined first set of data units.

    Autoscaling nodes of a stateful application based on role-based autoscaling policies

    公开(公告)号:US12124888B2

    公开(公告)日:2024-10-22

    申请号:US18342998

    申请日:2023-06-28

    IPC分类号: G06F9/50

    CPC分类号: G06F9/5077 G06F2209/505

    摘要: Example implementations relate to a role-based autoscaling approach for scaling of nodes of a stateful application in a large scale virtual data processing (LSVDP) environment. Information is received regarding a role performed by the nodes of a virtual cluster of an LSVDP environment on which a stateful application is or will be deployed. Role-based autoscaling policies are maintained defining conditions under which the roles are to be scaled. A policy for a first role upon which a second role is dependent specifies a condition for scaling out the first role by a first step and a second step by which the second role is to be scaled out in tandem. When load information for the first role meets the condition, nodes in the virtual cluster that perform the first role are increased by the first step and nodes that perform the second role are increased by the second step.

    Minimally invasive pedicle screw extension sleeve system

    公开(公告)号:US12096965B2

    公开(公告)日:2024-09-24

    申请号:US17895099

    申请日:2022-08-25

    申请人: Genesys Spine

    IPC分类号: A61B17/70

    CPC分类号: A61B17/708 A61B17/7085

    摘要: An embodiment includes a system comprising: a tulip including a slot to receive a linkage, first and second side walls that define a portion of the slot, and a ring that couples the first side wall to the second side wall; wherein the ring couples to the first side wall at a thinned first proximal fulcrum and to the second side wall at a thinned second proximal fulcrum and the ring pivots about the first and second proximal fulcrums when the ring is forced proximally; wherein the first side wall includes a first sidewall projection that projects past the first proximal fulcrum and the second side wall includes a second sidewall projection that projects past the second proximal fulcrum. Other embodiments are described herein.

    Server groupings based on action contexts

    公开(公告)号:US12073248B2

    公开(公告)日:2024-08-27

    申请号:US17227647

    申请日:2021-04-12

    IPC分类号: G06F9/50 H04L67/50

    CPC分类号: G06F9/5011 H04L67/535

    摘要: Example implementations relate to method and system for an action contextual grouping of servers for applying one or more actions to each group. The method includes analyzing data corresponding to a plurality of servers and a management system to generate a dataset including contextual data and server features. The method further includes obtaining a plurality of actions from the management system, and mapping each action to a plurality of criteria to generate an action criteria table. The plurality of criteria includes dynamic contextual criteria derived by the management system based on at least some of contextual data. The method further includes comparing the plurality of criteria for each action in the action criteria table to the contextual data and/or the server features for each server to tag a corresponding server to the action, and grouping the plurality of servers into a plurality of action contextual groups based on the tag.

    Managing use of management controller secrets based on firmware ownership history

    公开(公告)号:US12069169B2

    公开(公告)日:2024-08-20

    申请号:US17588620

    申请日:2022-01-31

    IPC分类号: H04L9/08 G06F9/4401 G06F21/57

    摘要: A management controller of a computer platform, determines whether an ownership history of management firmware for the management controller represents multiple owners. The management controller includes a set of one-time programmable elements that represent a first secret. The management controller manages use of the first secret based on the ownership history. The management includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, generating, by the management controller, a second secret to replace the first secret. The management further includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, storing, by the management controller, the second secret in a non-volatile memory and generating, by the management controller, cryptographic keys based on the second secret.