-
公开(公告)号:US20200287724A1
公开(公告)日:2020-09-10
申请号:US16293575
申请日:2019-03-05
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Kiran Kumar Vaddi , Om Kumar , Jaivish Kothari
IPC: H04L9/32
Abstract: Example techniques for establishing trusted communication with container-based services are described. In an example, a digital certificate stored in a memory is injected from the memory into a container. The container is external to the memory. The digital certificate is usable to establish a trusted communication between a service deployed in the container and a software program.
-
2.
公开(公告)号:US20200099687A1
公开(公告)日:2020-03-26
申请号:US16142601
申请日:2018-09-26
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Hardik Dhirendra Parekh , Om Kumar , Kiran Kumar Vaddi
IPC: H04L29/06
Abstract: Examples described relate to secure communication between services hosted on a private cloud and a public cloud. In an example, an agent on a private cloud may poll a secure server on a public cloud to determine whether the secure server includes a request for a service hosted on the private cloud. The request may be made by a service hosted on the public cloud. In response to a determination that the secure server includes the request for the service hosted on the private cloud the agent may retrieve the request from the secure server on the public cloud. The request may be executed on the private cloud, and a response may be generated. The agent may provide the response to the secure server on the public cloud. The response may be shared with the service hosted on the public cloud by the secure server.
-
公开(公告)号:US10887312B2
公开(公告)日:2021-01-05
申请号:US16142601
申请日:2018-09-26
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Hardik Dhirendra Parekh , Om Kumar , Kiran Kumar Vaddi
IPC: H04L29/06
Abstract: Examples described relate to secure communication between services hosted on a private cloud and a public cloud. In an example, an agent on a private cloud may poll a secure server on a public cloud to determine whether the secure server includes a request for a service hosted on the private cloud. The request may be made by a service hosted on the public cloud. In response to a determination that the secure server includes the request for the service hosted on the private cloud the agent may retrieve the request from the secure server on the public cloud. The request may be executed on the private cloud, and a response may be generated. The agent may provide the response to the secure server on the public cloud. The response may be shared with the service hosted on the public cloud by the secure server.
-
公开(公告)号:US10778772B2
公开(公告)日:2020-09-15
申请号:US16254682
申请日:2019-01-23
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Kiran Kumar Vaddi
Abstract: In some examples, a system receives information indicating resources relating to a workload, and receives information indicating relative priorities of a plurality of factors that affect placement of the workload on a cloud platform. For each respective cloud platform of a plurality of cloud platforms, the system computes factor values representing respective factors of the plurality of factors, the factor values computed for the respective cloud platform dependent upon information pertaining to the plurality of factors provided for the respective cloud platform, and computes an aggregate score based on the factor values for the respective cloud platform and weights assigned to the factor values based on the relative priorities. The system selects, for placement of the workload, a cloud platform from among the plurality of cloud platforms based on the aggregate scores.
-
公开(公告)号:US20200252387A1
公开(公告)日:2020-08-06
申请号:US16263560
申请日:2019-01-31
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jaivish Kothari , Kiran Kumar Vaddi
Abstract: Example implementations relate to accessing a control platform. A computing device may comprise a processing resource and a memory resource storing non-transitory machine-readable instructions to cause the processing resource to receive an access request for a control platform of a plurality of control platforms, access the control platform based on the received access request, and transmit access description information based on an action performed with the control platform.
-
公开(公告)号:US11307839B2
公开(公告)日:2022-04-19
申请号:US16453665
申请日:2019-06-26
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Kiran Kumar Vaddi , Om Kumar , Lokesh Shivashankara
Abstract: Example techniques for updating of container-based applications are described. In an example, a second version of an application code or application code changes are retrieved from a code storage location. Based on the retrieved second version or the retrieved application code changes, an application hosted in a container is updated.
-
公开(公告)号:US20200236169A1
公开(公告)日:2020-07-23
申请号:US16254682
申请日:2019-01-23
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Kiran Kumar Vaddi
Abstract: In some examples, a system receives information indicating resources relating to a workload, and receives information indicating relative priorities of a plurality of factors that affect placement of the workload on a cloud platform. For each respective cloud platform of a plurality of cloud platforms, the system computes factor values representing respective factors of the plurality of factors, the factor values computed for the respective cloud platform dependent upon information pertaining to the plurality of factors provided for the respective cloud platform, and computes an aggregate score based on the factor values for the respective cloud platform and weights assigned to the factor values based on the relative priorities. The system selects, for placement of the workload, a cloud platform from among the plurality of cloud platforms based on the aggregate scores.
-
公开(公告)号:US20200225990A1
公开(公告)日:2020-07-16
申请号:US16245362
申请日:2019-01-11
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Kiran Kumar Vaddi , Hardik Dhirendra Parekh
Abstract: A method for managing container usage in a computing system, includes: gathering a plurality of infrastructure costs associated with a container; invoking an orchestration tool in a containerization system to determine a plurality of workload costs associated with the container; determining a container usage cost from the gathered infrastructure costs and the determined workload costs; and managing the container usage in the computing system based on the determined container usage cost. In some instances, the method is implemented in the functionality of a cost analyzer resident on a computing apparatus. In other instances, the method may be implemented in a computing system in which a cost analyzer operates.
-
公开(公告)号:US11444785B2
公开(公告)日:2022-09-13
申请号:US16293575
申请日:2019-03-05
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Kiran Kumar Vaddi , Om Kumar , Jaivish Kothari
IPC: H04L9/32
Abstract: Example techniques for establishing trusted communication with container-based services are described. In an example, a digital certificate stored in a memory is injected from the memory into a container. The container is external to the memory. The digital certificate is usable to establish a trusted communication between a service deployed in the container and a software program.
-
公开(公告)号:US10896067B2
公开(公告)日:2021-01-19
申请号:US16245362
申请日:2019-01-11
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Kiran Kumar Vaddi , Hardik Dhirendra Parekh
Abstract: A method for managing container usage in a computing system, includes: gathering a plurality of infrastructure costs associated with a container; invoking an orchestration tool in a containerization system to determine a plurality of workload costs associated with the container; determining a container usage cost from the gathered infrastructure costs and the determined workload costs; and managing the container usage in the computing system based on the determined container usage cost. In some instances, the method is implemented in the functionality of a cost analyzer resident on a computing apparatus. In other instances, the method may be implemented in a computing system in which a cost analyzer operates.
-
-
-
-
-
-
-
-
-