Managing resources in a configurable computing environment

    公开(公告)号:US10061621B1

    公开(公告)日:2018-08-28

    申请号:US15952819

    申请日:2018-04-13

    CPC classification number: G06F9/5066 G06F9/4843 G06F9/5072 G06F2209/5022

    Abstract: In one example, a system can receive configuration data indicating how resources can be combined, identify availability data indicating the total number of various resources that are available, and determine maximum-capacity data using the availability data and the configuration data. The system can also receive distribution data having probability distributions for jobs to be implemented using the resources, determine capacity valuations using the distribution data and the availability data, and determine a configuration of resources using the capacity valuations and the maximum-capacity data. Thereafter, the system can receive a job and determine that a valuation for the job exceeds a predefined threshold associated with using the configuration of resources. In response to determining that the valuation exceeds the predefined threshold, the system can assign the resources to the job in the configuration. The system can then cause the job to be performed using the configuration of resources assigned to the job.

    Two-part job scheduling with capacity constraints and preferences

    公开(公告)号:US10261837B2

    公开(公告)日:2019-04-16

    申请号:US16023949

    申请日:2018-06-29

    Abstract: Exemplary embodiments relate to the problem of allocating a finite number of units of a resource among requestors willing to offer different amounts of value for the resource. When different classes of requestors are permitted to cancel the request or fail to show up to collect the unit of the resource with different probabilities (collectively referred to as “wash”), the problem becomes difficult to solve efficiently. According to the procedures described herein, the capacity is artificially inflated to offset the impact of wash, and then protection levels are computed using the inflated capacity as if there was no wash. The capacity is then artificially inflated again based on the new protection levels, and the process is repeated until, e.g., the results converge. Using this procedure, overallocation limits and protection levels can be computed in real-time, and accordingly the resource can be allocated efficiently as new requests are received.

    Handling bulk requests for resources

    公开(公告)号:US11366699B1

    公开(公告)日:2022-06-21

    申请号:US17670104

    申请日:2022-02-11

    Abstract: Some examples describes herein relate to handling bulk requests for resources. In one example, a system can determine a bulk request parameter-value associated with a bulk request. The system can then predict a baseline benefit value, which can be a benefit value when the bulk request parameter-value is used as a lower boundary for a unit parameter-value. The system can also determine a lower boundary constraint on the unit parameter-value independently of the bulk request parameter-value. The system can then execute an iterative process using the baseline benefit value and the lower boundary constraint. Based on a result of the iterative process, the system can determine whether and how much the bulk request parameter-value should be adjusted. The system may adjust the bulk request parameter-value accordingly or output a recommendation to do so.

    Two-Part Job Scheduling with Capacity Constraints and Preferences

    公开(公告)号:US20190012210A1

    公开(公告)日:2019-01-10

    申请号:US16023949

    申请日:2018-06-29

    Abstract: Exemplary embodiments relate to the problem of allocating a finite number of units of a resource among requestors willing to offer different amounts of value for the resource. When different classes of requestors are permitted to cancel the request or fail to show up to collect the unit of the resource with different probabilities (collectively referred to as “wash”), the problem becomes difficult to solve efficiently. According to the procedures described herein, the capacity is artificially inflated to offset the impact of wash, and then protection levels are computed using the inflated capacity as if there was no wash. The capacity is then artificially inflated again based on the new protection levels, and the process is repeated until, e.g., the results converge. Using this procedure, overallocation limits and protection levels can be computed in real-time, and accordingly the resource can be allocated efficiently as new requests are received.

Patent Agency Ranking