Predictive service orchestration using threat modeling analytics

    公开(公告)号:US12293393B2

    公开(公告)日:2025-05-06

    申请号:US17664718

    申请日:2022-05-24

    Abstract: Provided is a computer-implemented method, system, and computer program product for predictive service orchestration using threat modeling analytics. A processor may identify a plurality of attributes of a client computing environment. The processor may collect threat modeling content for a plurality of vendor computing environments. The processor may analyze the threat modeling content for the plurality of vendor computing environments. The processor may compare the analyzed threat modeling content for the plurality of vendor computing environments with the plurality of attributes of the client computing environment. The processor may generate, based on the comparing, a client threat model for the client computing environment.

    Hybridized storage optimization for genomic workloads

    公开(公告)号:US12210904B2

    公开(公告)日:2025-01-28

    申请号:US16023091

    申请日:2018-06-29

    Abstract: A method for more efficiently storing genomic includes designating multiple different data storage techniques for storing genomic data generated by a genomic pipeline. The method further identifies a file, made up of multiple blocks, generated by the genomic pipeline. The method determines which data storage technique is most optimal to store each block of the file. In doing so, the method may consider the type of the file, the stage of the genomic pipeline that generated the file, the access frequency for blocks of the file, the most accessed blocks of the file, and the like. The method stores each block using the data storage technique determined to be most optimal after completion of a designated stage of the genomic pipeline, such that blocks of the file are stored using several different data storage techniques. A corresponding system and computer program product are also disclosed.

    DETERMINING A QUIESCE TIMEOUT FOR A CONTAINERIZED WORKLOAD

    公开(公告)号:US20240273001A1

    公开(公告)日:2024-08-15

    申请号:US18168744

    申请日:2023-02-14

    CPC classification number: G06F11/3089 G06F11/1461 G06F2201/805

    Abstract: Described are techniques for determining a quiesce timeout for a containerized workload used to identify a storage unit for the containerized workload. The techniques include determining an Input/Output (I/O) rate associated with a containerized workload that executes in a container environment, where the containerized workload interfaces with a storage system to store the data. The techniques further include determining a quiesce timeout for the containerized workload that is based at least in part on the I/O rate of data associated with the containerized workload and an amount of memory allocated for buffering the data during performance of a backup operation without incurring an I/O overflow. The techniques further include determining storage unit specifications that enable performance of the backup operation within the quiesce timeout and evaluating storage units available to the container environment to identify a storage unit for the containerized workload based on the storage unit specifications.

    Storage tiering within a unified storage environment

    公开(公告)号:US12019867B2

    公开(公告)日:2024-06-25

    申请号:US17028267

    申请日:2020-09-22

    CPC classification number: G06F3/0604 G06F3/0647 G06F3/067

    Abstract: A method for assigning and migrating files among tiers within a unified storage environment. The method includes one or more computer processors determining a plurality of files stored within a tiered storage environment that are accessed by a set executing applications. The method further includes determining that one or more files of the plurality of files are accessed utilizing two or more protocols. The method further includes identifying a group of two or more tiering policies utilized within a tiered storage environment. The method further includes determining protocol-based heat count values corresponding the plurality of files. The method further includes storing the plurality of files among tiers of the tiered storage environment based on the identified group of two or more tiering polices and the protocol-based heat count values corresponding to the plurality of files.

    Operational command boundaries
    6.
    发明授权

    公开(公告)号:US11676599B2

    公开(公告)日:2023-06-13

    申请号:US17315397

    申请日:2021-05-10

    CPC classification number: G10L15/22 G10L25/78 G10L2015/223

    Abstract: A method for managing commands utilizing command boundaries includes establishing a first command boundary for a first intelligent virtual assistant operating on a first electronic device. The method also includes, responsive to receiving audio from a plurality of sources within a vicinity of the first electronic device, identifying a portion of the audio from the plurality of sources within the first command boundary. The method also includes, responsive to determining a command is identifiable in the portion of the audio from the plurality of sources within the first command boundary, sending the command to the first intelligent virtual assistant on the first electronic device.

    Online file system consistency check for container data on a clustered filesystem

    公开(公告)号:US11650975B2

    公开(公告)日:2023-05-16

    申请号:US17119009

    申请日:2020-12-11

    CPC classification number: G06F16/2365 G06F16/182

    Abstract: Online file system consistency check for container data on a clustered file system is provided via identifying inodes (index nodes) of a group of files in a clustered file system based on a cyber-resiliency for the clustered file system; grouping the inodes based on a buffer size allocated to a FSCK (File System Consistency Check) operation; passing the inodes of to the FSCK operation in a single iteration when a total size of the inodes is less than the buffer size; or when the total size of the inodes is greater than the buffer size, identifying inodes that belong to a first container and that belong to a second container; passing the inodes that belong to the first container to the FSCK operation in a first iteration; and passing, after the first iteration completes, the inodes that belong to the second container to the FSCK operation in a second iteration.

    Metadata based data replication
    9.
    发明授权

    公开(公告)号:US11520664B2

    公开(公告)日:2022-12-06

    申请号:US16920918

    申请日:2020-07-06

    Abstract: A plurality of computing nodes is monitored for updates to one or more files located on the plurality. Based on the monitoring, a first file operation is detected that is related to a first file located on a first node. The first file is related to a first copy that is located on a second node. Based on the first file operation, it is determined that the first file operation is a copy operation of the first file to a second file located on the first node. A copy command related to the first file is transferred, in response to the copy operation, to the second node. In response to the copy operation, a second copy file is created on the second computing node of the plurality. The second copy file is related to the second file located on the first computing node of the plurality.

    OPERATIONAL COMMAND BOUNDARIES
    10.
    发明申请

    公开(公告)号:US20220358914A1

    公开(公告)日:2022-11-10

    申请号:US17315397

    申请日:2021-05-10

    Abstract: A method for managing commands utilizing command boundaries includes establishing a first command boundary for a first intelligent virtual assistant operating on a first electronic device. The method also includes, responsive to receiving audio from a plurality of sources within a vicinity of the first electronic device, identifying a portion of the audio from the plurality of sources within the first command boundary. The method also includes, responsive to determining a command is identifiable in the portion of the audio from the plurality of sources within the first command boundary, sending the command to the first intelligent virtual assistant on the first electronic device.

Patent Agency Ranking