-
公开(公告)号:US20240338634A1
公开(公告)日:2024-10-10
申请号:US18297760
申请日:2023-04-10
发明人: Kavish DWIVEDI , Nipun RAWAT , Thiruvenkadam RAJASEKARAN , Sampat CHOUDHARY , Tushar SINGHAL , Santhoshkumar SELLADURAI , Manoj CG , Shubhanjali AWASTHI , Vishnu Prasath SRINIVASAN , Balaji BALASUBRAMANYAN , Murugesh SESHADRI , Elizabeth Anne PIERCE , Aniket DWIVEDI
IPC分类号: G06Q10/0639 , G06Q10/0637
CPC分类号: G06Q10/06393 , G06Q10/0637
摘要: A method for dynamically controlling the alignment of multi-nested Objectives and Key Results (OKRs) is implemented via an application service provider server including a processor. The method includes executing, via a network, an enterprise application on a remote computing system and causing surfacing of a user interface on the display of the remote computing system during the execution of the enterprise application, where the user interface corresponds to a goal-setting feature of the enterprise application. The method also includes receiving, via the surfaced user interface, user input including an alignment permission policy for a multi-nested OKR of an enterprise, where the alignment permission policy defines a list of enterprise users who are allowed to align child OKR objects to a parent objective of the multi-nested OKR. The method further includes applying the alignment permission policy to the multi-nested OKR.
-
公开(公告)号:US20240250997A1
公开(公告)日:2024-07-25
申请号:US18626555
申请日:2024-04-04
发明人: Shayak LAHIRI , Narasimhan RAMASUBRAMANIAN , Simon Karl Lars JAEGER , Kritika Kishore PRASAD , Adrian F. TERAN , Marius C. NICULESCU , Jagannathan Deepak MANOHAR , Peter J. KAUFMAN , Preston D. ADAM , Balaji BALASUBRAMANYAN , Seth C. BEINHART , Matthew REYNOLDS , Sumit LAHIRI
IPC分类号: H04L9/40
CPC分类号: H04L63/20
摘要: Examples of the present disclosure describe systems and methods for. In some examples, a software agent collects data from a node, such as logs or monitoring information, and provides the data to a controller. The controller assesses the attestation state and the configuration drift of the node. In some examples, the controller applies a taint to the node, which may indicate a condition or constraint on the node. A scheduler manages the workloads on the node based on the attestation state, the configuration drift, and in some examples, the taint of the node. The scheduler decides whether to schedule a workload to the node, evict a workload from the node, or keep a workload on the node depending on the attestation state and configuration drift of the node, for example, whether the workload has a toleration for the taint of the node.
-
公开(公告)号:US20240220602A1
公开(公告)日:2024-07-04
申请号:US18603700
申请日:2024-03-13
发明人: Tushar Suresh SUGANDHI , Amber Tianqi GUO , Balaji BALASUBRAMANYAN , Abhijat SINGH , Ahmed Saruhan KARADEMIR , Benjamin M. SCHULTZ , Hari R. PULAPAKA , Gupta SHUBHAM , Chase THOMAS , Carlos Ernesto Peza RAMIREZ
CPC分类号: G06F21/51 , G06F9/45558 , G06F21/57 , H04L9/3236 , H04L9/3263 , G06F2009/4557 , H04L2209/127
摘要: Environment type validation can provide a tamper-resistant validation of the computing environment within which the environment type validation is being performed. Such information can then be utilized to perform policy management, which can include omitting verifications in order to facilitate the sharing of policy, such as application licenses, from a host computing environment into a container virtual computing environment. The environment type validation can perform multiple checks, including verification of the encryption infrastructure of the computing environment, verification of code integrity mechanisms of that computing environment, checks for the presence of functionality evidencing a hypervisor, checks for the presence or absence of predetermined system drivers, or other like operating system components or functionality, checks for the activation or deactivation of resource management stacks, and checks for the presence or absence of predetermined values in firmware.
-
公开(公告)号:US20210133312A1
公开(公告)日:2021-05-06
申请号:US16672429
申请日:2019-11-01
发明人: Tushar Suresh SUGANDHI , Amber Tianqi GUO , Balaji BALASUBRAMANYAN , Abhijat SINGH , Ahmed Saruhan KARADEMIR , Benjamin M. SCHULTZ , Hari R. PULAPAKA , Gupta SHUBHAM , Chase THOMAS , Carlos Ernesto Peza RAMIREZ
摘要: Environment type validation can provide a tamper-resistant validation of the computing environment within which the environment type validation is being performed. Such information can then be utilized to perform policy management, which can include omitting verifications in order to facilitate the sharing of policy, such as application licenses, from a host computing environment into a container virtual computing environment. The environment type validation can perform multiple checks, including verification of the encryption infrastructure of the computing environment, verification of code integrity mechanisms of that computing environment, checks for the presence of functionality evidencing a hypervisor, checks for the presence or absence of predetermined system drivers, or other like operating system components or functionality, checks for the activation or deactivation of resource management stacks, and checks for the presence or absence of predetermined values in firmware.
-
5.
公开(公告)号:US20230334127A1
公开(公告)日:2023-10-19
申请号:US18170584
申请日:2023-02-17
CPC分类号: G06F21/123 , G06F16/212 , G06F21/554 , H04L9/3234 , H04L9/3236 , H04L9/3247 , G06F2221/033 , G06Q2220/18
摘要: Methods for protecting software licensing information via a trusted platform module (TPM) are performed by systems and devices. When a licensing server is unreachable, a license is generated for a software application by a licensing manager. The license is generated via a secure register of the TPM using an asymmetric key, specific to the software application and policy-tied to the secure register, to generate a signature of a hashed license file for the software application. The asymmetric key is stored, mapped to the license file, and used for subsequent license validation. A licensing manager validation command is provided to validate the license using the key, as applied to the hash, to verify the signature and checking validity of the time stamp. Time stamp expiration or alteration of the license are determined to provoke invalidation indications for the validating application.
-
公开(公告)号:US20220405382A1
公开(公告)日:2022-12-22
申请号:US17662869
申请日:2022-05-11
发明人: Tushar Suresh SUGANDHI , Amber Tianqi GUO , Balaji BALASUBRAMANYAN , Abhijat SINGH , Ahmed Saruhan KARADEMIR , Benjamin M. SCHULTZ , Hari R. PULAPAKA , Gupta SHUBHAM , Chase THOMAS , Carlos Ernesto Peza RAMIREZ
摘要: Environment type validation can provide a tamper-resistant validation of the computing environment within which the environment type validation is being performed. Such information can then be utilized to perform policy management, which can include omitting verifications in order to facilitate the sharing of policy, such as application licenses, from a host computing environment into a container virtual computing environment. The environment type validation can perform multiple checks, including verification of the encryption infrastructure of the computing environment, verification of code integrity mechanisms of that computing environment, checks for the presence of functionality evidencing a hypervisor, checks for the presence or absence of predetermined system drivers, or other like operating system components or functionality, checks for the activation or deactivation of resource management stacks, and checks for the presence or absence of predetermined values in firmware.
-
公开(公告)号:US20190180033A1
公开(公告)日:2019-06-13
申请号:US15894745
申请日:2018-02-12
发明人: Bryan R. BORN , Giridhar VISWANATHAN , Peteris LEDINS , Balaji BALASUBRAMANYAN , Margarit Simeonov CHENCHEV , Benjamin M. SCHULTZ , Hari R. PULAPAKA , Frederick Justus SMITH , Narasimhan RAMASUBRAMANIAN , Raphael GIANOTTI SERRANO DOS SANTO , Nived KALAPPURAIKAL SIVADAS , Ravinder THIND , Matthew David KURJANOWICZ
摘要: Securely performing file operations. A method includes determining a trust characteristic assigned to a file. When the trust characteristic assigned to the file meets or exceeds a predetermined trust condition, then the method includes performing a file operation on the file in a host operating system while preventing the file operation from being performed in the container operating system. When the trust characteristic assigned to the file does not meet or exceed the predetermined trust condition, then the method includes performing the file operation on the file in the container operating system while preventing the file operation from being performed directly in the host operating system.
-
公开(公告)号:US20180349629A1
公开(公告)日:2018-12-06
申请号:US15871635
申请日:2018-01-15
发明人: Margarit Simeonov CHENCHEV , Benjamin M. SCHULTZ , Giridhar VISWANATHAN , Balaji BALASUBRAMANYAN , Yanan ZHANG , Frederick Justus SMITH , Hari R. PULAPAKA , David WESTON
摘要: Technologies are described for selective persistence of data utilized by software containers. A configuration policy is defined that includes data that specifies one or more data stores for which data is not to be persisted following accesses to a software container and one or more data stores for which data is to be persisted following accesses to the software container. When the software container is first accessed, the data stores identified in the configuration policy are attached to the software container. Upon a subsequent access to the container, such as at the conclusion of a user session or upon destruction of the container, the data in the attached data stores is persisted or deleted based upon the configuration policy. When the software container is once again accessed, the data store containing the persisted data can be re-attached to the software container.
-
-
-
-
-
-
-