-
公开(公告)号:US12124845B2
公开(公告)日:2024-10-22
申请号:US17971924
申请日:2022-10-24
申请人: RED HAT, INC.
发明人: Paolo Antinori , Alessio Soldano
IPC分类号: G06F8/77 , G06Q30/018
CPC分类号: G06F8/77 , G06Q30/018
摘要: A carbon footprint associated with executing a job on one or more computer nodes can be automatically managed using some techniques described herein. As one particular example, a system can determine a first carbon footprint associated with applying a continuous integration (CI) pipeline to source code using a first set of nodes of a continuous integration system. The system can also select a second set of nodes of the continuous integration system, the second set of nodes being associated with a second carbon footprint that is lower than the first carbon footprint. The system can then control the continuous integration system to apply the CI pipeline to the source code using the second set of nodes.
-
2.
公开(公告)号:US12015540B2
公开(公告)日:2024-06-18
申请号:US17468257
申请日:2021-09-07
申请人: Red Hat, Inc.
发明人: Vittorio Rigamonti , Paolo Antinori
IPC分类号: H04L45/121 , H04L9/06 , H04L9/08 , H04L45/02 , H04L45/122 , H04L45/42 , H04L67/2895
CPC分类号: H04L45/121 , H04L9/0643 , H04L9/0825 , H04L45/02 , H04L45/122 , H04L45/42 , H04L67/2895
摘要: A cloud-native architecture for containerized systems using consistent hashing routing is described. A reverse proxy server executing on a container-based cluster of compute nodes managed using a container orchestration service may determine a current data grid topology. The reverse proxy server may receive a first request from a first client device to retrieve first data from the container-based cluster of compute nodes. The request may be parsed to determine a key of a key-value pair and a hash value may be computed using the key. A consistent hashing algorithm may be executed to determine a node associated with the hash value. The first data may be retrieved from the node using the hash value. The first data may be sent to the first client device.
-
公开(公告)号:US20240137218A1
公开(公告)日:2024-04-25
申请号:US17969539
申请日:2022-10-18
申请人: Red Hat, Inc.
IPC分类号: H04L9/08
CPC分类号: H04L9/088
摘要: Systems and methods for securing label metadata. One aspect presented herein includes a container orchestration system comprising a plurality of worker nodes, able to run application containers; an orchestrator node to orchestrate application container deployment on the plurality of worker nodes via a virtual network layer, wherein the plurality of worker nodes and the orchestrator node form a cluster, the orchestrator node comprising an API server that serves as an entry point to the cluster; an encryption layer run on the master node comprising a processor and a computer readable medium storing instructions executable by the processor to: receive a deployment file via the API server; associate an encryption key with the sensitive metadata; receive a request for data, via the virtual network layer, from at least one worker node, wherein the request for data includes the sensitive metadata; provide the sensitive metadata to the at least one worker node.
-
公开(公告)号:US11947941B2
公开(公告)日:2024-04-02
申请号:US17410032
申请日:2021-08-24
申请人: RED HAT, INC.
发明人: Nicola Ferraro , Paolo Antinori
IPC分类号: G06F8/41
CPC分类号: G06F8/451 , G06F8/4441 , G06F8/457
摘要: A method includes receiving source code of a program to be compiled and compiling the source code of the program. Compiling the source code includes identifying a first function in the source code of the program that is a candidate to be executed by a graphics processing unit (GPU), generating a first intermediate representation and a second intermediate representation for the first function, and inserting a second function in the program in place of the first function, wherein the second function is to select one of the first intermediate representation or the second intermediate representation to be executed. The method further includes providing a compiled program package including the second function, the first intermediate representation and the second intermediate representation.
-
5.
公开(公告)号:US20230385140A1
公开(公告)日:2023-11-30
申请号:US17825051
申请日:2022-05-26
申请人: RED HAT, INC
发明人: Luca Burgazzoli , Paolo Antinori
CPC分类号: G06F9/548 , G06F8/24 , G06F9/542 , G06F9/45558 , G06F2009/4557
摘要: In one example, a system can identify application programming interface (API) object classes specified in a definition file. The definition file can be for a target API object. The system can then update an attribute field associated with the target API object to specify the API object classes. Operator software in a distributed computing environment can be configured to monitor the API object classes specified in the attribute field of the target API object and execute computing logic in response to events related to the API object classes.
-
6.
公开(公告)号:US20230273836A1
公开(公告)日:2023-08-31
申请号:US17680725
申请日:2022-02-25
申请人: Red Hat, Inc.
发明人: Andrea Cosentino , Paolo Antinori
CPC分类号: G06F9/5077 , G06F9/45558 , G06F2009/45583 , G06F2009/45591 , G06F2209/5011
摘要: Events associated with a virtual machine can be used to adjust an amount of resource objects that may be allocated from a resource pool for the virtual machine. For example, a system can receive a notification including event data indicating an event related to the virtual machine, wherein the virtual machine is configured to rely on resource objects in a resource pool for performing one or more computing operations. The system can determine that the event is a particular type of event. Based on determining that the event is the particular type of event, the system can select a scaling policy corresponding to the particular type of event. The system can then apply the scaling policy to the event data to determine a scaling strategy for adjusting the amount of resource objects.
-
公开(公告)号:US11731585B2
公开(公告)日:2023-08-22
申请号:US17513554
申请日:2021-10-28
申请人: Red Hat, Inc.
发明人: Andrea Cosentino , Paolo Antinori
CPC分类号: B60R25/24 , B60R25/01 , B60R25/33 , G07C9/00309 , H04L9/3242 , G07C2009/00984 , H04L2209/84
摘要: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
-
公开(公告)号:US20230256936A1
公开(公告)日:2023-08-17
申请号:US17672609
申请日:2022-02-15
申请人: Red Hat, Inc.
发明人: Andrea Cosentino , Paolo Antinori
CPC分类号: B60R25/24 , H04L9/0643 , H04L9/0861 , B60R25/04 , H04L2209/84
摘要: An example method may include receiving, from a key device, a first counter value and a first encoded counter value, identifying, among one or more mapping table entries in an access control unit mapping table, an access control unit mapping table entry specifying a second counter value that corresponds to the received first counter value, determining whether a second encoded counter value specified by the identified access control unit mapping table entry corresponds to the received first encoded counter value, and responsive to determining that the second encoded counter value corresponds to the received first encoded counter value, sending, to a control unit, an indication that permission is granted. The first encoded counter value may include a cryptographic encoding of the first counter value generated in view of a secret key.
-
公开(公告)号:US20230119536A1
公开(公告)日:2023-04-20
申请号:US17505862
申请日:2021-10-20
申请人: Red Hat, Inc.
发明人: Andrea Cosentino , Paolo Antinori
IPC分类号: G06F9/4401 , G06F9/50 , G06F11/30 , G06F11/34
摘要: Systems and techniques for application profiling to resize and reconfigure compute instances are generally described. In some examples, a first application executing in a user space of a first compute instance may be determined. A Berkeley Packet Filter (BPF) process may be executed in the user space of the first compute instance. The BPF process monitors resource consumption of a first resource of the first compute instance. First consumption data for the first resource may be determined. The first consumption data may be associated with a first process of the first application over a first period of time. The first consumption data may be evaluated using first criteria. A configuration of a second compute instance may be determined based on evaluation of the first consumption data using the first criteria. The second compute instance may be deployed according to the configuration.
-
10.
公开(公告)号:US20230074530A1
公开(公告)日:2023-03-09
申请号:US17468257
申请日:2021-09-07
申请人: Red Hat, Inc.
发明人: Vittorio Rigamonti , Paolo Antinori
IPC分类号: H04L12/727 , H04L12/733 , H04L12/751 , H04L12/717 , H04L29/08 , H04L9/06 , H04L9/08
摘要: A cloud-native architecture for containerized systems using consistent hashing routing is described. A reverse proxy server executing on a container-based cluster of compute nodes managed using a container orchestration service may determine a current data grid topology. The reverse proxy server may receive a first request from a first client device to retrieve first data from the container-based cluster of compute nodes. The request may be parsed to determine a key of a key-value pair and a hash value may be computed using the key. A consistent hashing algorithm may be executed to determine a node associated with the hash value. The first data may be retrieved from the node using the hash value. The first data may be sent to the first client device.
-
-
-
-
-
-
-
-
-