Technologies for identifying thread memory allocation

    公开(公告)号:US10860377B2

    公开(公告)日:2020-12-08

    申请号:US15466072

    申请日:2017-03-22

    Inventor: Brian Toal

    Abstract: Systems, methods, and computer-readable media for identifying and managing memory allocation for one or more threads are described. A computer system may detect that a threshold memory utilization has been met, and may determine an aggregate memory allocation for a thread. The aggregate memory allocation may be a difference between a first memory allocation for the thread at a first time that the threshold memory utilization was met and a second memory allocation for the thread at a second time that the threshold memory utilization was met. The computer device may provide an indication that the thread has met or exceeded a threshold memory allocation when the aggregate memory allocation is greater than or equal to the threshold memory allocation. The computer device may disable the thread when the aggregate memory allocation is greater than or equal to the threshold memory allocation. Other embodiments may be described and/or claimed.

    Systems and methods of a virtualized management operation engine of a distributed system

    公开(公告)号:US11734058B2

    公开(公告)日:2023-08-22

    申请号:US17081048

    申请日:2020-10-27

    Abstract: Systems and method are provided for receiving, at a virtualized management operation engine (VMOE) of a distributed system, a management task request from a client for one or more services. The management task request may be to an orchestrator of a first application server of one or more application servers of the distributed system. The first application server having the orchestrator may determine whether the management task request is valid. The first application server having the orchestrator may generate a request message based on the valid management task request. A message bus may broadcast the generated request message to one or more agents of the one or more application servers of the distributed system. The one or more agents may execute an operation based on the request message when the request message is intended for the one or more agents.

    System and method of providing web content using a proxy cache

    公开(公告)号:US11082519B2

    公开(公告)日:2021-08-03

    申请号:US15589444

    申请日:2017-05-08

    Abstract: A computer-implemented method of providing content using a request-response protocol is provided. The method comprises storing a data object associated with a key, receiving a first response message from a server containing an invalidate parameter wherein the invalidate parameter includes a pattern that matches the key, and invalidating the stored data object associated with the key in response to the invalidate parameter. A computing system comprising one or more processors and non-transitory computer readable storage medium embodying programming instructions configurable to cause the one or more processors to implement a proxy cache is also provided. The proxy cache is configured to store a data object associated with a key, receive a first response message from a server containing an invalidate parameter wherein the invalidate parameter includes a pattern that matches the key, and invalidate the stored data object associated with the key in response to the invalidate parameter.

    Multivariate auto-differential correlation engine in a computing environment

    公开(公告)号:US11327952B2

    公开(公告)日:2022-05-10

    申请号:US16563204

    申请日:2019-09-06

    Abstract: A metric data stream for a plurality of metrics may be retrieved from a database system. Each metric may measure a respective computing characteristic. The metric data stream may include a plurality of values for each of a sequence of time intervals. Each value may correspond with a respective one of the metrics. A plurality of metric correlation matrices may be determined for the metrics, each of which is associated with a respective time period in the metric data stream. A subset of comparison metric correlation matrices may be selected from the plurality of metric correlation metric matrices. A designated anomaly score may be determined for a designated time period by comparing a designated metric correlation matrix associated with the designated time period with the selected subset of comparison metric correlation metric matrices.

    SYSTEMS AND METHODS OF A VIRTUALIZED MANAGEMENT OPERATION ENGINE OF A DISTRIBUTED SYSTEM

    公开(公告)号:US20220129304A1

    公开(公告)日:2022-04-28

    申请号:US17081048

    申请日:2020-10-27

    Abstract: Systems and method are provided for receiving, at a virtualized management operation engine (VMOE) of a distributed system, a management task request from a client for one or more services. The management task request may be to an orchestrator of a first application server of one or more application servers of the distributed system. The first application server having the orchestrator may determine whether the management task request is valid. The first application server having the orchestrator may generate a request message based on the valid management task request. A message bus may broadcast the generated request message to one or more agents of the one or more application servers of the distributed system. The one or more agents may execute an operation based on the request message when the request message is intended for the one or more agents.

    SYSTEM FOR SECURING MEMORY DUMPS
    6.
    发明申请

    公开(公告)号:US20210143991A1

    公开(公告)日:2021-05-13

    申请号:US16677572

    申请日:2019-11-07

    Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for securing memory dumps. In response to a trigger condition, a server generates a symmetric key corresponding to an instance of a memory dump. The server encrypts memory contents of the server using the symmetric key. In addition, the server encrypts the symmetric key using a key-encrypting key (kek), which can include a public key Both the encrypted memory contents and the encrypted symmetric key are stored for the instance of the memory dump. Responsive to a request for information pertaining to the instance of the memory dump, the encrypted memory contents and the encrypted symmetric key are retrieved from storage, the encrypted symmetric key is decrypted using a private key, and the symmetric key is used to decrypt the encrypted memory contents.

    System for securing memory dumps
    8.
    发明授权

    公开(公告)号:US11431481B2

    公开(公告)日:2022-08-30

    申请号:US16677572

    申请日:2019-11-07

    Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for securing memory dumps. In response to a trigger condition, a server generates a symmetric key corresponding to an instance of a memory dump. The server encrypts memory contents of the server using the symmetric key. In addition, the server encrypts the symmetric key using a key-encrypting key (kek), which can include a public key Both the encrypted memory contents and the encrypted symmetric key are stored for the instance of the memory dump. Responsive to a request for information pertaining to the instance of the memory dump, the encrypted memory contents and the encrypted symmetric key are retrieved from storage, the encrypted symmetric key is decrypted using a private key, and the symmetric key is used to decrypt the encrypted memory contents.

Patent Agency Ranking