-
公开(公告)号:US20230021902A1
公开(公告)日:2023-01-26
申请号:US17380141
申请日:2021-07-20
Applicant: RED HAT, INC.
Inventor: Huamin Chen , Yuval Lifshitz , Daniel Gryniewicz
Abstract: Data can be automatically anonymized in a distributed storage system. For example, a system can receive a notification indicating that an object is stored in a non-persistent bucket of a distributed storage system. The system can read the object from the non-persistent bucket in response to receiving the notification. The system can generate an anonymized version of the object by performing one or more anonymization operations with respect to the object. The system can store the anonymized version of the object in a persistent bucket of the distributed storage system. The system can then transmit a command for causing the object to be removed from the non-persistent bucket.
-
公开(公告)号:US20220035726A1
公开(公告)日:2022-02-03
申请号:US16943024
申请日:2020-07-30
Applicant: RED HAT, INC.
Inventor: Yuval Lifshitz , Casey Bodley , Brett Niver , Matthew Benjamin
Abstract: A notification configuration associated with an object is received by a first host system from a client device. The notification configuration causes host systems to generate notifications for the client device upon storing the object at the host systems. The object is stored in a first memory of the first host system. The notification configuration is transmitted by the first host system to a second host system. The object is provided to the second host system, wherein the second host system is to transmit a notification to the client device upon storing the object at a second memory of the second host system.
-
公开(公告)号:US20200382615A1
公开(公告)日:2020-12-03
申请号:US16423794
申请日:2019-05-28
Applicant: RED HAT, INC.
Inventor: Yuval Lifshitz , Sebastian Scheinkman
Abstract: An asymmetric proxy receives a request from a source network, where the source network sends the request at a first networking layer, and determines a destination network associated with the request, where the destination network communicates at a second networking layer, and where the second networking layer is different than the first networking layer. The asymmetric proxy removes information associated with the source network from one or more networking layers of the request, stores the information associated with the source network in a memory space, translates the one or more networking layers of the request to include information associated with the destination network, and provides the request to the destination network at the second networking layer.
-
公开(公告)号:US20250028381A1
公开(公告)日:2025-01-23
申请号:US18906939
申请日:2024-10-04
Applicant: Red Hat, Inc.
Inventor: Huamin Chen , Omri Zeneva , Yuval Lifshitz , Parul Singh
IPC: G06F1/3296 , G06F1/3231
Abstract: Energy consumption associated with users of a distributed computing system can be monitored using tracing according to some examples described herein. In one such example, a system can execute tracing software configured to track usage of a software service and generate tracing information. The tracing information cant attribute the usage of the software service to a group of users. The system can analyze the tracing information to determine a portion of the usage to attribute to a given user. The system can then determine an energy consumption estimate for the user, for example based on the portion of the usage associated with the user and an energy consumption amount associated with the software service. A graphical user interface can be generated indicating the energy consumption estimate for the user.
-
公开(公告)号:US20230124528A1
公开(公告)日:2023-04-20
申请号:US18080099
申请日:2022-12-13
Applicant: RED HAT, INC.
Inventor: Huamin Chen , Yuval Lifshitz , Daniel Gryniewicz
IPC: G06F21/62 , H04L67/1097
Abstract: Data can be automatically anonymized in a distributed storage system. For example, a system can receive a notification indicating that an object is stored in a non-persistent bucket of a distributed storage system. The system can read the object from the non-persistent bucket in response to receiving the notification. The system can generate an anonymized version of the object by performing one or more anonymization operations with respect to the object. The system can store the anonymized version of the object in a persistent bucket of the distributed storage system. The system can then transmit a command for causing the object to be removed from the non-persistent bucket.
-
公开(公告)号:US20230100931A1
公开(公告)日:2023-03-30
申请号:US17487012
申请日:2021-09-28
Applicant: Red Hat, Inc.
Inventor: Yuval Lifshitz , Huamin Chen
IPC: H04L12/861 , G06F3/06
Abstract: A first set of storage accesses of a storage system are identified. The first set of storage accesses are associated with a first user. A first plurality of storage access notifications is sent to a first message queue associated with the first user based on the first set of storage accesses. A first message queue timeout value of the first message queue is set based on at least one characteristic associated with the first set of storage accesses.
-
公开(公告)号:US11588693B2
公开(公告)日:2023-02-21
申请号:US16801940
申请日:2020-02-26
Applicant: RED HAT, INC.
Inventor: Yuval Lifshitz , Sebastian Scheinkman
IPC: H04L41/084 , H04L41/08 , H04L41/0873 , H04L9/40 , G06F9/455 , H04L41/22
Abstract: A method includes receiving, from an agent executing in a virtual machine, network information associated with the virtual machine, the virtual machine to be migrated to a container. The method further includes generating a container networking configuration based on the network information. The container networking configuration is to provide network access to processes migrated from the virtual machine to the container. The method further includes providing the container networking configuration to a container orchestration system. The container orchestration system is to use the container networking configuration to provide network access to the container.
-
公开(公告)号:US12218806B2
公开(公告)日:2025-02-04
申请号:US17975398
申请日:2022-10-27
Applicant: Red Hat, Inc.
Inventor: Yuval Lifshitz , Yehoshua Salomon
IPC: H04L41/16 , H04L12/66 , H04L41/0896 , H04L43/028
Abstract: Systems and methods providing object storage gateway for a client device with intermittent connectivity. In one implementation, data objects stored locally on the client device are identified. The data objects are associated with an application running on the client device. Filtered data are produced by filtering the data objects in view of a set of rules. Responsive to determining that a connection between the client device and the server device satisfies a quality condition, the filtered data are synchronized with the server device.
-
公开(公告)号:US20240362080A1
公开(公告)日:2024-10-31
申请号:US18309009
申请日:2023-04-28
Applicant: Red Hat, Inc.
Inventor: Huamin Chen , Yuval Lifshitz , Douglas Smithy
IPC: G06F9/50 , G06F1/28 , H04L41/0895 , H04L47/78
CPC classification number: G06F9/5077 , G06F1/28 , H04L41/0895 , H04L47/781
Abstract: A method includes determining, by a processing device, an intended level of power consumption associated with a network function; allocating, in view of the intended level of power consumption, a network device to the network function; allocating, in view of the intended level of power consumption, a processor to the network function; and designating the processor to handle interrupts from the network function via the network device.
-
公开(公告)号:US12099633B2
公开(公告)日:2024-09-24
申请号:US18080099
申请日:2022-12-13
Applicant: RED HAT, INC.
Inventor: Huamin Chen , Yuval Lifshitz , Daniel Gryniewicz
IPC: G06F21/62 , H04L67/1097
CPC classification number: G06F21/6254 , H04L67/1097
Abstract: Data can be automatically anonymized in a distributed storage system. For example, a system can receive a notification indicating that an object is stored in a non-persistent bucket of a distributed storage system. The system can read the object from the non-persistent bucket in response to receiving the notification. The system can generate an anonymized version of the object by performing one or more anonymization operations with respect to the object. The system can store the anonymized version of the object in a persistent bucket of the distributed storage system. The system can then transmit a command for causing the object to be removed from the non-persistent bucket.
-
-
-
-
-
-
-
-
-