Power consumption optimization on the cloud

    公开(公告)号:US11460903B2

    公开(公告)日:2022-10-04

    申请号:US16700233

    申请日:2019-12-02

    Applicant: Red Hat, Inc.

    Abstract: A power consumption optimization system includes a virtual machine (VM) provisioned on a host, a memory, a server, and a processor in communication with the memory. The processor causes the server to store a power consumption profile of the VM. The VM runs at a processor frequency state. Additionally, the processor causes the server to receive a request to lower a processor frequency for the VM from an original processor frequency state to a reduced processor frequency state. The request has request criteria indicating a time duration associated with the request. The server validates the request criteria and a requirement of another tenant on the host. Responsive to validating the request criteria and the requirement the other tenant on the host, the server confirms the request to lower the processor frequency. Additionally, the server lowers the processor frequency to the reduced processor frequency state during the time duration.

    COOPERATIVE CLOUD INFRASTRUCTURE USING BLOCKCHAINS FOR HARDWARE OWNERSHIP AND ACCESS

    公开(公告)号:US20220291942A1

    公开(公告)日:2022-09-15

    申请号:US17826947

    申请日:2022-05-27

    Applicant: Red Hat, Inc.

    Abstract: A system includes a memory, a processor in communication with the memory, a hypervisor executing on the processor, a pool of hypervisor resources, and a cloud-sharing module (CSM). The CSM runs in a kernel to assign an anonymous identity to a hypervisor resource from the pool of hypervisor resources. The CSM broadcasts a transaction for the hypervisor resource and determines which provider owns the hypervisor resource. A first provider is associated with a second anonymous identity and a second provider is associated with a third anonymous identity. Additionally, the CSM receives mining information that includes a block associated with the transaction, where the block is part of a blockchain. The CSM completes the transaction for the first anonymous identity associated with the hypervisor resource between the second anonymous identity and the third anonymous identity.

    Low impact snapshot database protection in a micro-service environment

    公开(公告)号:US11307939B2

    公开(公告)日:2022-04-19

    申请号:US16521853

    申请日:2019-07-25

    Applicant: Red Hat, Inc.

    Abstract: An implementation of the disclosure provides a method including identifying, by a processing device, a plurality of transactions in a transaction queue within a cloud computing environment, each of the transactions comprising an operation associated with a storage device of the cloud computing environment, comparing a priority status of at least one operation comprised by the transaction queue with a status threshold level associated with the snapshot policy, and responsive to determining that the priority status of at least one operation meets the status threshold level, providing, by the processing device subsequent to an execution of the at least one operation, a request to generate a point-in-time snapshot of at least a portion of the storage device, the point-in-time snapshot comprising state information corresponding to an application in the storage device.

    Executing code referenced from a microservice registry

    公开(公告)号:US11138030B2

    公开(公告)日:2021-10-05

    申请号:US16025525

    申请日:2018-07-02

    Applicant: Red Hat, Inc.

    Abstract: Methods and systems for executing code referenced from a microservice registry are disclosed. For example, a microservice registry is stored in a memory. The microservice registry includes references to a plurality of microservices including a first microservice. An isolated guest executing on one or more processors receives a request to execute an executable code and determines that the executable code is unavailable in the first isolated guest. The isolated guest determines that, based on the microservice registry, the first microservice executes the executable code. The isolated guest forwards the first request to the first microservice and receives a result of the request from the first microservice.

    Node-local-unscheduler for scheduling remediation

    公开(公告)号:US11055133B2

    公开(公告)日:2021-07-06

    申请号:US15606697

    申请日:2017-05-26

    Applicant: Red Hat, Inc.

    Abstract: A system for scheduling remediation includes a memory, a processor in communication with the memory, a container scheduled on a first node, a scheduler executing on the processor, and a node-local-unscheduler (“NLU”). The scheduler has a watch module. The NLU executes on the processor to determine a status of the container as failing validation. The NLU has access to scheduling policies corresponding to the container and the first node. Responsive to determining the status of the container as failing validation, the NLU annotates the container and stops execution of the container. The watch module executes on the processor to detect the annotation associated with the container. Responsive to detecting the annotation, the container is rescheduled to a second node.

    Method for generating synthetic data sets at scale with non-redundant partitioning

    公开(公告)号:US10891311B2

    公开(公告)日:2021-01-12

    申请号:US15294142

    申请日:2016-10-14

    Applicant: Red Hat, Inc.

    Abstract: An example system includes a first machine and a second machine, a clustering module, and a training module. The clustering module receives a plurality of data sets, each including attributes. The clustering module partitions the plurality of data sets into a first clustered data set and a second clustered data set. Each data set of the plurality of data sets is partitioned. The training module assigns a first stochastic model to the first clustered data set and a second stochastic model to the second clustered data set. The first machine selects the first clustered data set and the first stochastic model and generates a first synthetic data set having generated data for each one of the attributes. The second machine selects the second clustered data set and the second stochastic model and generates a second synthetic data set having generated data for each one of the attributes.

    Distributing Requests for Data Among Servers Based On Indicators of Intent to Access the Data

    公开(公告)号:US20200374376A1

    公开(公告)日:2020-11-26

    申请号:US16991733

    申请日:2020-08-12

    Applicant: Red Hat, Inc.

    Abstract: Requests for data can be distributed among servers based on indicators of intent to access the data. For example, a kernel of a client device can receive a message from a software application. The message can indicate that the software application intends to access data at a future point in time. The kernel can transmit an electronic communication associated with the message to multiple servers. The kernel can receive a response to the electronic communication from a server of the multiple servers. Based on the response and prior to receiving a future request for the data from the software application, the kernel can select the server from among the multiple servers as a destination for the future request for the data.

    PROVIDING HIGH AVAILABILITY FOR A THIN-PROVISIONED CONTAINER CLUSTER

    公开(公告)号:US20200036649A1

    公开(公告)日:2020-01-30

    申请号:US16593506

    申请日:2019-10-04

    Applicant: Red Hat, Inc.

    Abstract: A system and method for providing high availability for a thin-provisioned container cluster includes a memory, one or more processors in communication with the memory, a scheduler executing on the one or more processors, and a spot instance market monitor. The spot instance market monitor receives market information about spot instances in a cloud system at a first time. The spot instances are available to a client at the first time. The spot instance market monitor determines, based on the market information, a respective reliability value for each of the spot instances at the first time. Then, the scheduler selects one spot instance among the spot instances based on the reliability value of the spot instance. In response to the selection of the spot instance, the scheduler schedules a container on the spot instance and executes the container on the spot instance.

    Session key exchange as a service

    公开(公告)号:US10547443B2

    公开(公告)日:2020-01-28

    申请号:US15604586

    申请日:2017-05-24

    Applicant: Red Hat, Inc.

    Abstract: An example method may include receiving, at a session key service, a first session key and a first public key of a client device to be authenticated to a web server. The first session key being encrypted by the client device using a second public key of the web server. The web server is a subscriber of the session key service hosted in a cloud-based environment. The method may also include decrypting, using a first private key of the web server, the first session key to obtain a plaintext session key, encrypting the plaintext session key using the first public key of the client device to generate a second session key, and sending the second session key to the web server to facilitate a decryption of the second session key by the client device for an authentication of the client device to the web server.

    Providing high availability for a thin-provisioned container cluster

    公开(公告)号:US10447614B2

    公开(公告)日:2019-10-15

    申请号:US15631747

    申请日:2017-06-23

    Applicant: Red Hat, Inc.

    Abstract: A system and method for providing high availability for a thin-provisioned container cluster includes a memory, one or more processors in communication with the memory, a scheduler executing on the one or more processors, and a spot instance market monitor. The spot instance market monitor receives market information about spot instances in a cloud system at a first time. The spot instances are available to a client at the first time. The spot instance market monitor determines, based on the market information, a respective reliability value for each of the spot instances at the first time. Then, the scheduler selects one spot instance among the spot instances based on the reliability value of the spot instance. In response to the selection of the spot instance, the scheduler schedules a container on the spot instance and executes the container on the spot instance.

Patent Agency Ranking