Managing a carbon footprint associated with executing a continuous integration pipeline on computer nodes

    公开(公告)号:US12124845B2

    公开(公告)日:2024-10-22

    申请号:US17971924

    申请日:2022-10-24

    申请人: RED HAT, INC.

    IPC分类号: G06F8/77 G06Q30/018

    CPC分类号: G06F8/77 G06Q30/018

    摘要: A carbon footprint associated with executing a job on one or more computer nodes can be automatically managed using some techniques described herein. As one particular example, a system can determine a first carbon footprint associated with applying a continuous integration (CI) pipeline to source code using a first set of nodes of a continuous integration system. The system can also select a second set of nodes of the continuous integration system, the second set of nodes being associated with a second carbon footprint that is lower than the first carbon footprint. The system can then control the continuous integration system to apply the CI pipeline to the source code using the second set of nodes.

    LABEL FILTERING AND ENCRYPTION
    3.
    发明公开

    公开(公告)号:US20240137218A1

    公开(公告)日:2024-04-25

    申请号:US17969539

    申请日:2022-10-18

    申请人: Red Hat, Inc.

    IPC分类号: H04L9/08

    CPC分类号: H04L9/088

    摘要: Systems and methods for securing label metadata. One aspect presented herein includes a container orchestration system comprising a plurality of worker nodes, able to run application containers; an orchestrator node to orchestrate application container deployment on the plurality of worker nodes via a virtual network layer, wherein the plurality of worker nodes and the orchestrator node form a cluster, the orchestrator node comprising an API server that serves as an entry point to the cluster; an encryption layer run on the master node comprising a processor and a computer readable medium storing instructions executable by the processor to: receive a deployment file via the API server; associate an encryption key with the sensitive metadata; receive a request for data, via the virtual network layer, from at least one worker node, wherein the request for data includes the sensitive metadata; provide the sensitive metadata to the at least one worker node.

    Dynamic computation offloading to graphics processing unit

    公开(公告)号:US11947941B2

    公开(公告)日:2024-04-02

    申请号:US17410032

    申请日:2021-08-24

    申请人: RED HAT, INC.

    IPC分类号: G06F8/41

    摘要: A method includes receiving source code of a program to be compiled and compiling the source code of the program. Compiling the source code includes identifying a first function in the source code of the program that is a candidate to be executed by a graphics processing unit (GPU), generating a first intermediate representation and a second intermediate representation for the first function, and inserting a second function in the program in place of the first function, wherein the second function is to select one of the first intermediate representation or the second intermediate representation to be executed. The method further includes providing a compiled program package including the second function, the first intermediate representation and the second intermediate representation.

    Cloud-based keyless entry system
    7.
    发明授权

    公开(公告)号:US11731585B2

    公开(公告)日:2023-08-22

    申请号:US17513554

    申请日:2021-10-28

    申请人: Red Hat, Inc.

    摘要: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.

    AUTHENTICATING ELECTRONIC KEY DEVICES
    8.
    发明公开

    公开(公告)号:US20230256936A1

    公开(公告)日:2023-08-17

    申请号:US17672609

    申请日:2022-02-15

    申请人: Red Hat, Inc.

    摘要: An example method may include receiving, from a key device, a first counter value and a first encoded counter value, identifying, among one or more mapping table entries in an access control unit mapping table, an access control unit mapping table entry specifying a second counter value that corresponds to the received first counter value, determining whether a second encoded counter value specified by the identified access control unit mapping table entry corresponds to the received first encoded counter value, and responsive to determining that the second encoded counter value corresponds to the received first encoded counter value, sending, to a control unit, an indication that permission is granted. The first encoded counter value may include a cryptographic encoding of the first counter value generated in view of a secret key.

    APPLICATION PROFILING TO RESIZE AND RECONFIGURE COMPUTE INSTANCES

    公开(公告)号:US20230119536A1

    公开(公告)日:2023-04-20

    申请号:US17505862

    申请日:2021-10-20

    申请人: Red Hat, Inc.

    摘要: Systems and techniques for application profiling to resize and reconfigure compute instances are generally described. In some examples, a first application executing in a user space of a first compute instance may be determined. A Berkeley Packet Filter (BPF) process may be executed in the user space of the first compute instance. The BPF process monitors resource consumption of a first resource of the first compute instance. First consumption data for the first resource may be determined. The first consumption data may be associated with a first process of the first application over a first period of time. The first consumption data may be evaluated using first criteria. A configuration of a second compute instance may be determined based on evaluation of the first consumption data using the first criteria. The second compute instance may be deployed according to the configuration.

    DISTRIBUTED DATA GRID ROUTING FOR CLUSTERS MANAGED USING CONTAINER ORCHESTRATION SERVICES

    公开(公告)号:US20230074530A1

    公开(公告)日:2023-03-09

    申请号:US17468257

    申请日:2021-09-07

    申请人: Red Hat, Inc.

    摘要: A cloud-native architecture for containerized systems using consistent hashing routing is described. A reverse proxy server executing on a container-based cluster of compute nodes managed using a container orchestration service may determine a current data grid topology. The reverse proxy server may receive a first request from a first client device to retrieve first data from the container-based cluster of compute nodes. The request may be parsed to determine a key of a key-value pair and a hash value may be computed using the key. A consistent hashing algorithm may be executed to determine a node associated with the hash value. The first data may be retrieved from the node using the hash value. The first data may be sent to the first client device.