-
公开(公告)号:US10382580B2
公开(公告)日:2019-08-13
申请号:US15500237
申请日:2014-08-29
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet Sharma , Wenjie Lin , David Lee , Subramoniam Iyer , Ajay Gupta , Sarbajit Chatterjee , Deepti Sharma
Abstract: Examples relate to scaling persistent connections for cloud computing. In some examples, a data packet is used to determine connection information of the first connection. At this stage, server portion of the first connection is closed by using the connection information to send a close command to the cloud server. In response to a keepalive signal from the client computing device, the connection information is used to send a keepalive response to the client computing device to maintain a client portion of the first connection. In response to a service request from the client computing device, a service notification including the service request is sent to the client computing device, where the client computing device initiates a second connection with the cloud server to process the service request.
-
2.
公开(公告)号:US20180288101A1
公开(公告)日:2018-10-04
申请号:US15472939
申请日:2017-03-29
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet Sharma , Arun Raghuramu , David Lee
Abstract: In some examples, a method includes establishing, by a network device acting as an orchestrator host for a virtual network function (VNF), a trust relationship with a VNF vendor that dynamically specify a set of usage right policies; determining, by the network device, allowed usage rights associated with the VNF based on the set of usage right policies; installing, by the network device, the VNF on a plurality of compute nodes based on the allowed usage rights; and auditing VNF usage right compliance by: issuing a proof quote request to the plurality of compute nodes; receiving a proof quote response comprising a plurality of resource states on the plurality of compute nodes; and verifying whether usage of the VNF on the plurality of compute nodes complies with the allowed usage rights based on the proof quote response.
-
公开(公告)号:US11792207B2
公开(公告)日:2023-10-17
申请号:US17539831
申请日:2021-12-01
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet Sharma , Arun Raghuramu , David Lee
IPC: H04L9/40 , G06F21/64 , H04L9/32 , H04W12/106 , H04W4/40 , H04L67/12 , H04W4/021 , G06F9/455 , G06F16/27 , G06F16/182 , H04W4/70 , H04L9/00
CPC classification number: H04L63/123 , G06F9/45558 , G06F16/1834 , G06F16/27 , G06F21/64 , H04L9/3297 , H04L63/0485 , H04L63/0492 , H04W4/70 , H04W12/106 , G06F2009/45587 , G06F2009/45595 , H04L9/50 , H04L67/12 , H04L2209/127 , H04W4/021 , H04W4/40
Abstract: In some examples, a secure compliance protocol may include a virtual computing instance (VCI) deployed on a hypervisor and may be provisioned with hardware computing resources. In some examples the VCI may also include a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes, and a plurality of agents to generate a plurality of compliance proofs; the VCI may communicate with a server corresponding to a node of the plurality of nodes; and receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device.
-
4.
公开(公告)号:US20220300422A1
公开(公告)日:2022-09-22
申请号:US17204899
申请日:2021-03-17
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Xiongbing Ou , Thomas Anthony Phelan , David Lee
IPC: G06F12/0811 , G06F16/182 , G06F12/121
Abstract: Embodiments described herein are generally directed to caching and data access improvements in a large scale data processing environment. According to an example, an agent running on a first worker node of a cluster receives a read request from a task. The worker node of the cluster to which the data at issue is mapped is identified. When the first worker node is the identified worker node, it is determined whether its cache contains the data; if so, the data is fetched from a remote data lake and the agent locally caches the data; otherwise, when the identified worker node is another worker node of the compute cluster, the data is fetched from a remote agent of that worker node. The agent responds to the read request with cached data, data returned by the remote data lake, or data returned by the remote data agent as the case may be.
-
公开(公告)号:US20190312855A1
公开(公告)日:2019-10-10
申请号:US15947052
申请日:2018-04-06
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet Sharma , Arun Raghuramu , David Lee
Abstract: In some examples, a secure compliance protocol may include a virtual computing instance (VCI) deployed on a hypervisor and may be provisioned with hardware computing resources. In some examples the VCI may also include a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes, and a plurality of agents to generate a plurality of compliance proofs; the VCI may communicate with a server corresponding to a node of the plurality of nodes; and receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device.
-
6.
公开(公告)号:US11797447B2
公开(公告)日:2023-10-24
申请号:US17204899
申请日:2021-03-17
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Xiongbing Ou , Thomas Anthony Phelan , David Lee
IPC: G06F12/0811 , G06F16/182 , G06F12/121 , G06F9/54
CPC classification number: G06F12/0811 , G06F12/121 , G06F16/182 , G06F9/541 , G06F2212/1021
Abstract: Embodiments described herein are generally directed to caching and data access improvements in a large scale data processing environment. According to an example, an agent running on a first worker node of a cluster receives a read request from a task. The worker node of the cluster to which the data at issue is mapped is identified. When the first worker node is the identified worker node, it is determined whether its cache contains the data; if so, the data is fetched from a remote data lake and the agent locally caches the data; otherwise, when the identified worker node is another worker node of the compute cluster, the data is fetched from a remote agent of that worker node. The agent responds to the read request with cached data, data returned by the remote data lake, or data returned by the remote data agent as the case may be.
-
公开(公告)号:US11223631B2
公开(公告)日:2022-01-11
申请号:US15947052
申请日:2018-04-06
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet Sharma , Arun Raghuramu , David Lee
IPC: H04L12/26 , H04L12/40 , G06F11/30 , G06F21/57 , H04L29/06 , G06F9/455 , G06F21/64 , G06F16/27 , G06F16/182 , H04W4/70 , H04L9/32 , H04W12/106 , G06F21/55 , H04W4/40 , H04L29/08 , H04W4/021
Abstract: In some examples, a secure compliance protocol may include a virtual computing instance (VCI) deployed on a hypervisor and may be provisioned with hardware computing resources. In some examples the VCI may also include a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes, and a plurality of agents to generate a plurality of compliance proofs; the VCI may communicate with a server corresponding to a node of the plurality of nodes; and receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device.
-
公开(公告)号:US20170279922A1
公开(公告)日:2017-09-28
申请号:US15500237
申请日:2014-08-29
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet Sharma , Wenjie Lin , David Lee , Subramoniam Lyer , Ajay Gupta , Sarbajit Chatterjee , Sharma Deepti
CPC classification number: H04L67/325 , H04L12/6418 , H04L63/0823 , H04L65/1066 , H04L67/1097 , H04L69/28 , H04L69/40
Abstract: Examples relate to scaling persistent connections for cloud computing. In some examples, a data packet is used to determine connection information of the first connection. At this stage, server portion of the first connection is closed by using the connection information to send a close command to the cloud server. In response to a keepalive signal from the client computing device, the connection information is used to send a keepalive response to the client computing device to maintain a client portion of the first connection. In response to a service request from the client computing device, a service notification including the service request is sent to the client computing device, where the client computing device initiates a second connection with the cloud server to process the service request.
-
-
-
-
-
-
-