-
1.
公开(公告)号:US20240241967A1
公开(公告)日:2024-07-18
申请号:US18622522
申请日:2024-03-29
发明人: Suren Kumar , Vinod Durairaj
CPC分类号: G06F21/577 , G06N5/02 , G06F2221/034
摘要: One example method includes receiving data from a container data collector (CDC), and the data concerns a container, analyzing the data and, based on the analyzing, identifying a security tool needed to scan the container, drawing the security tool from a knowledge lake, executing the security tool to perform a vulnerability scan of the container, based on the executing of the security tool, generating and analyzing a report concerning the vulnerability scan, and transmitting the report, and results of the analyzing, to an alert and action stage.
-
公开(公告)号:US11122130B1
公开(公告)日:2021-09-14
申请号:US17073048
申请日:2020-10-16
摘要: Embodiments described herein relate to a method for orchestrating migrations using workflows. The method may include: receiving, by a migrator, a migration request; invoking, by the migrator, an endpoint information collector (EIC) to obtain endpoint information from a source endpoint and a target endpoint; performing a pre-requisite check using the endpoint information; analyzing, by a migration analyzer, the endpoint information to obtain a migration workflow; and performing a migration using the migration workflow.
-
公开(公告)号:US11645103B2
公开(公告)日:2023-05-09
申请号:US16936465
申请日:2020-07-23
发明人: Suren Kumar , Vinod Durairaj , Veena Rao
CPC分类号: G06F9/45558 , H04L9/0825 , H04L63/0428 , G06F2009/4557 , G06F2009/45587 , G06F2009/45595
摘要: A method for securing the movement of virtual machines (VMs) between hosts. The method includes obtaining a first VM movement request; in response to obtaining the first VM movement request, identifying a first VM of the VMs and a first targeted host of the hosts associated with the first VM movement request using VM metadata and host metadata; making a first determination that the first targeted host is registered; in response to making the first determination, initiating the movement of the first VM to the first targeted host; and initiating, after the movement of the first VM, encryption of communication between the first VM and the first targeted host.
-
公开(公告)号:US20220382879A1
公开(公告)日:2022-12-01
申请号:US17383252
申请日:2021-07-22
发明人: Suren Kumar , Vinod Durairaj
摘要: One example method includes collecting container information concerning a container, analyzing the container information to identify a security tool needed to perform a vulnerability scan of the container, accessing the security tool from a knowledge lake, running the security tool on the container information to identify a security vulnerability of the container, based on the running of the security tool, generating an alert indicating that the container has the security vulnerability, capturing the security vulnerability and, based on the captured security vulnerability, updating a container image that was used to spawn the container.
-
公开(公告)号:US11989308B2
公开(公告)日:2024-05-21
申请号:US17383252
申请日:2021-07-22
发明人: Suren Kumar , Vinod Durairaj
CPC分类号: G06F21/577 , G06N5/02 , G06F2221/034
摘要: One example method includes collecting container information concerning a container, analyzing the container information to identify a security tool needed to perform a vulnerability scan of the container, accessing the security tool from a knowledge lake, running the security tool on the container information to identify a security vulnerability of the container, based on the running of the security tool, generating an alert indicating that the container has the security vulnerability, capturing the security vulnerability and, based on the captured security vulnerability, updating a container image that was used to spawn the container.
-
公开(公告)号:US11874851B2
公开(公告)日:2024-01-16
申请号:US17355541
申请日:2021-06-23
发明人: Suren Kumar , Vinod Durairaj
摘要: Embodiments for providing end-to-end automated contextual and differentiated application level replication by dynamically creating replication profiles for asynchronous or synchronous replication at runtime to maintain any relevant service level agreement requirements. Based on relevant operating information, data sources are identified as critical and non-critical servers and their data is tagged accordingly in the replication application by using an analytics engine. The information and tags are used to produce a trained model for machine learning processes that can generated predictions for future replication operations. An error handler identifies erroneous predictions and provides a fallback mechanism to avoid any customer replication service level agreement breach at any given time.
-
公开(公告)号:US11782493B2
公开(公告)日:2023-10-10
申请号:US16943757
申请日:2020-07-30
IPC分类号: G06F1/28 , G06F1/32 , G06F11/30 , G06F1/3215 , G06F1/3234 , G06F1/3209
CPC分类号: G06F1/28 , G06F1/325 , G06F1/3209 , G06F1/3215 , G06F11/3062
摘要: A method and system for intelligent power distribution management. Specifically, the disclosed method and system propose allocating (and deallocating) reserve or supplemental electrical power to host devices dynamically based on intelligent analyses of host device telemetry including, but not limited to, workload criticality, workload computing resource utilization, hardware configuration metadata, various operational parameters describing host device state, and measurements (as well as other information) pertinent to electrical power usage.
-
公开(公告)号:US11593161B2
公开(公告)日:2023-02-28
申请号:US17073096
申请日:2020-10-16
摘要: Embodiments described herein relate to a method for new endpoint addition. The method may include receiving, during execution of a migration workflow, a request to add a new endpoint to the migration workflow. The execution of the migration workflow includes performing a first migration job associated with a first consistency group and assigned a first priority; making a first determination that the first priority is higher than a priority threshold; based on the first determination, completing the first migration job; performing, after completing the first migration job, a new endpoint addition action set. The method may also include adding, based on the new endpoint migration job priority, the new endpoint migration job to a queue of remaining migration jobs of the migration workflow.
-
公开(公告)号:US20220382780A1
公开(公告)日:2022-12-01
申请号:US17355541
申请日:2021-06-23
发明人: Suren Kumar , Vinod Durairaj
摘要: Embodiments for providing end-to-end automated contextual and differentiated application level replication by dynamically creating replication profiles for asynchronous or synchronous replication at runtime to maintain any relevant service level agreement requirements. Based on relevant operating information, data sources are identified as critical and non-critical servers and their data is tagged accordingly in the replication application by using an analytics engine. The information and tags are used to produce a trained model for machine learning processes that can generated predictions for future replication operations. An error handler identifies erroneous predictions and provides a fallback mechanism to avoid any customer replication service level agreement breach at any given time.
-
公开(公告)号:US20220121482A1
公开(公告)日:2022-04-21
申请号:US17073096
申请日:2020-10-16
IPC分类号: G06F9/48
摘要: Embodiments described herein relate to a method for new endpoint addition. The method may include receiving, during execution of a migration workflow, a request to add a new endpoint to the migration workflow. The execution of the migration workflow includes performing a first migration job associated with a first consistency group and assigned a first priority; making a first determination that the first priority is higher than a priority threshold; based on the first determination, completing the first migration job; performing, after completing the first migration job, a new endpoint addition action set. The method may also include adding, based on the new endpoint migration job priority, the new endpoint migration job to a queue of remaining migration jobs of the migration workflow.
-
-
-
-
-
-
-
-
-