-
公开(公告)号:US08886929B2
公开(公告)日:2014-11-11
申请号:US11392404
申请日:2006-03-29
CPC分类号: G06F21/53 , G06F9/45558 , G06F21/566 , G06F21/572 , G06F2009/45587
摘要: A method includes generating a chain of trust for a virtual endpoint. The virtual endpoint is associated with a layered architecture that includes layers, which include a physical layer. For each layer, a code image of a process of the layer is measured before the process is loaded to form a node of the chain of trust.
摘要翻译: 一种方法包括为虚拟端点生成信任链。 虚拟端点与包括物理层的层的分层架构相关联。 对于每个层,在加载进程之前测量该层的进程的代码图像以形成信任链的节点。
-
公开(公告)号:US20240259465A1
公开(公告)日:2024-08-01
申请号:US18619949
申请日:2024-03-28
申请人: Igor Duarte Cardoso , Todd Malsbary , Eric W. Multanen , Malini Bhandaru , Kshitij Arun Doshi , Ned M. Smith , Sunil Cheruvu , Anahit Tarkhanyan , Mats Gustav Agerstam
发明人: Igor Duarte Cardoso , Todd Malsbary , Eric W. Multanen , Malini Bhandaru , Kshitij Arun Doshi , Ned M. Smith , Sunil Cheruvu , Anahit Tarkhanyan , Mats Gustav Agerstam
CPC分类号: H04L67/10 , G06F11/3006 , G06F21/577
摘要: Various systems and methods for providing intent-based workload orchestration described herein. A data center system may include a plurality of compute nodes and an orchestration node. The orchestration node may be configured to identify a workload for execution on the plurality of compute nodes; identify intents that define requirements for the execution of the workload on the plurality of compute nodes; monitor the execution of the workload to produce monitoring data; and control the execution of the workload based on the intents and the monitoring data, to dynamically adapt to changed conditions during the execution of the workload.
-
公开(公告)号:US20240241769A1
公开(公告)日:2024-07-18
申请号:US18617321
申请日:2024-03-26
申请人: Ned M. Smith , Kshitij Arun Doshi , Sunil Cheruvu
发明人: Ned M. Smith , Kshitij Arun Doshi , Sunil Cheruvu
CPC分类号: G06F9/5077 , G06F9/505 , G06F21/54
摘要: Various systems and methods for providing secure and reliable node lifecycle in elastic workloads are described here. A compute node may be configured to: receive data describing a first elastic workload of the plurality of elastic workloads, the first elastic workload to execute on a first virtual execution environment, the first virtual execution environment associated with a first security context; determine a common resource that is used by the plurality of elastic workloads; store the common resource in a memory accessible by the first virtual execution environment; and execute the first elastic workload, wherein the first elastic workload has access to the common resource, and wherein the plurality of elastic workloads is executed in isolation from one another based on respective security contexts.
-
公开(公告)号:US20240232669A1
公开(公告)日:2024-07-11
申请号:US18617302
申请日:2024-03-26
申请人: Ned M. Smith , Kshitij Arun Doshi , Sunil Cheruvu
发明人: Ned M. Smith , Kshitij Arun Doshi , Sunil Cheruvu
IPC分类号: G06N7/01
CPC分类号: G06N7/01
摘要: Various systems and methods for providing Monte Carlo as a service are described here. A networked computing device may be configured to receive data describing an elastic workload that is partitioned among multiple nodes, execute a Monte Carlo simulation using at least a portion of the data describing the elastic workload, to obtain a workload configuration that distributes the elastic workload over a plurality of nodes, and present the workload configuration.
-
公开(公告)号:US20230319141A1
公开(公告)日:2023-10-05
申请号:US18205664
申请日:2023-06-05
CPC分类号: H04L67/12 , H04L12/1881 , H04L12/185
摘要: Various systems and methods for providing consensus-based named function execution are described herein. A system is configured to access an interest packet received from a user device, the interest packet including a function name of a function and a data payload; broadcast the interest packet to a plurality of compute nodes, wherein the plurality of compute nodes are configured to execute a respective instance of the function; receive a plurality of responses from the plurality of compute nodes, the plurality of responses including respective results of the execution of the respective instances of the function; analyze the plurality of responses using a consensus protocol to identify a consensus result; and transmit the consensus result to the user device.
-
公开(公告)号:US20220224776A1
公开(公告)日:2022-07-14
申请号:US17711742
申请日:2022-04-01
IPC分类号: H04L67/5681 , H04L43/0852 , G06F12/0897 , G06F12/0891
摘要: The present disclosure is related to managing a caching system based on object fetch costs, where the fetch cost are based on the access latency, cache misses, and time to reuse of individual objects. The caching system may be a multi-tiered caching system that includes multiple storage tiers, where an object management system determines whether to retain or evict an object from a cache of a particular storage tier based on the object's fetch cost. Additionally, eviction can include moving objects from a current storage tier to another storage tier based on the current storage tier and fetch costs.
-
公开(公告)号:US20220222359A1
公开(公告)日:2022-07-14
申请号:US17711542
申请日:2022-04-01
IPC分类号: G06F21/60
摘要: System and techniques for fault tolerant telemetry of distributed devices are described herein. A node includes a hardware component that receives telemetry from an entity resident on the node. The hardware component signs the telemetry with a cryptographic key to create signed telemetry and stores the signed telemetry in memory of the hardware component. Then, upon request from a remote entity, the hardware component provides the signed telemetry.
-
公开(公告)号:US20220114055A1
公开(公告)日:2022-04-14
申请号:US17559877
申请日:2021-12-22
申请人: Kshitij Arun Doshi , Francesc Guim Bernat , Christian Maciocco , Ned M. Smith , S M Iftekharul Alam , Satish Chandra Jha , Vesh Raj Sharma Banjade , Alexander Bachmutsky
发明人: Kshitij Arun Doshi , Francesc Guim Bernat , Christian Maciocco , Ned M. Smith , S M Iftekharul Alam , Satish Chandra Jha , Vesh Raj Sharma Banjade , Alexander Bachmutsky
摘要: Systems and techniques for transparent dynamic reassembly of computing resource compositions are described herein. An indication may be obtained of an error state of a component of a computing system. An offload command may be transmitted to component management software of the computing system. An indication may be received that workloads to be executed using the component have been suspended. An administrative mode command may be transmitted to the component. The administrative mode command may place the component in partial shutdown to prevent the component from receiving non-administrative workloads. Data of the component may be synchronized with a backup component. Workloads from the component may be transferred to the backup component. An offload release command may be transmitted to the software of the computing system.
-
公开(公告)号:US20220014466A1
公开(公告)日:2022-01-13
申请号:US17484125
申请日:2021-09-24
IPC分类号: H04L12/747 , H04L29/08 , H04L29/06
摘要: System and techniques for information centric network tunneling are described herein. At an ICN router, a data handle for data—that includes an indication of security metadata—is received. The security metadata is obtained based on the data handle and the data is cached based on the security metadata. An ICN node at an interface of the ICN router is tested for compatibility with the security metadata and a version of the data is transmitted to the ICN node based on the compatibility of the ICN node with the security metadata.
-
公开(公告)号:US20210328783A1
公开(公告)日:2021-10-21
申请号:US17358474
申请日:2021-06-25
IPC分类号: H04L9/08
摘要: System and techniques for decentralized key generation and management are described herein. An information centric network (ICN) node receives a first ICN interest packet for public encryption parameters of an identity based encryption (IBE) key generation center (KGC). Public encryption parameters for the KGC are received in a first ICN data packet in response to the first ICN interest packet. The public encryption parameters are cached and used to respond a second ICN interest packet for the public parameters. A third ICN data packet may be received from the KGC in response to a key generation request. Here, the third data packet includes an indication that the third ICN data packet is part of a one-time session. Then, the third ICN data packet is transmitted without caching the third ICN data packet content based on the indication.
-
-
-
-
-
-
-
-
-