-
公开(公告)号:US11107273B2
公开(公告)日:2021-08-31
申请号:US16530034
申请日:2019-08-02
发明人: James R. King , Nicole Reineke
摘要: In a computing environment comprising a plurality of equipment racks wherein each equipment rack comprises one or more of compute, storage and network assets, the method captures an image of at least one equipment rack in the computing environment. The method identifies a known object in the image to determine physical characteristics of the equipment rack. The method receives, from a peer-to-peer network, positioning beacon signals respectively associated with at least a portion of the compute, storage and network assets in and around the equipment rack. The method determines a closest asset among the portion of the compute, storage and network assets for which positioning beacon signals are received. The method obtains data indicative of physical characteristics associated with the closest asset, obtains a model of the computing environment based on the obtained data, and then obtains a three-dimensional map of the computing environment based on the model.
-
公开(公告)号:US20210109823A1
公开(公告)日:2021-04-15
申请号:US16653560
申请日:2019-10-15
IPC分类号: G06F11/14
摘要: Restore operations in containerized environments are disclosed. An ephemeral instance of an application is created and a datastore is mounted to the ephemeral instance. The ephemeral instance is not accessible to users or application. The backup data is restored to the datastore. Once restored, the datastore is then mounted to a production instance and production resumes.
-
公开(公告)号:US11030066B2
公开(公告)日:2021-06-08
申请号:US16668676
申请日:2019-10-30
发明人: Xuebin He , Alex Robbins , James R. King , Amy Seibel , Victor Fong
摘要: Techniques for dynamic decomposition of an application executing in a computing environment are provided. For example, an apparatus comprises at least one processing platform comprising one or more processing devices. The at least one processing platform is configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, and cause the portion of marked code identified in the request to be executed in the second virtual computing element, when it is decided to execute the portion of the marked code in the second virtual computing element.
-
公开(公告)号:US11748162B2
公开(公告)日:2023-09-05
申请号:US16735195
申请日:2020-01-06
发明人: Victor Fong , Xuebin He , James R. King , Alex Robbins , Kenneth Durazzo
CPC分类号: G06F9/5027 , G06F9/45558 , G06F2009/45595
摘要: Techniques for function execution environment selection for a decomposed application are provided. In one example, an apparatus comprises at least one processing platform configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, determine an execution environment from one or more execution environments specified in the marked code for the second virtual computing element to execute the marked code, when it is decided to execute the portion of the marked code in the second virtual computing element, and cause the portion of marked code identified in the request to be executed.
-
公开(公告)号:US20210232200A1
公开(公告)日:2021-07-29
申请号:US16750571
申请日:2020-01-23
发明人: James R. King , Amy Seibel
摘要: One example method includes performing, in an edge device that includes a power source, operations including monitoring a running process and obtaining, based on the monitoring, power consumption information associated with the running process, adjusting, based on the power consumption information, a priority of the running process, and providing, to an entity, the power consumption information and/or information concerning the priority of the running process.
-
公开(公告)号:US11609829B2
公开(公告)日:2023-03-21
申请号:US17412505
申请日:2021-08-26
IPC分类号: G06F11/14
摘要: Restore operations in containerized environments are disclosed. An ephemeral instance of an application is created and a datastore is mounted to the ephemeral instance. The ephemeral instance is not accessible to users or application. The backup data is restored to the datastore. Once restored, the datastore is then mounted to a production instance and production resumes.
-
公开(公告)号:US11341359B2
公开(公告)日:2022-05-24
申请号:US16518507
申请日:2019-07-22
发明人: Valerie Charry , James R. King
摘要: Data points are collected from multiple infrastructure domains of at least one data center in a computing environment. A graphical representation is generated from the collected data points that represents an infrastructure state of the at least one data center, wherein each vertex in the graphical representation corresponds to one of one or more compute components, one or more storage components, and one or more network components of the data center, and an edge connecting two vertices corresponds to a relationship between the components to which the vertices correspond. The graphical representation representing the infrastructure state of the at least one data center is sent to an infrastructure generation engine for composition with one or more other graphical representations respectively representing the infrastructure state of one or more other data centers in the computing environment.
-
公开(公告)号:US11172035B2
公开(公告)日:2021-11-09
申请号:US16514424
申请日:2019-07-17
发明人: Nicole Reineke , James R. King
IPC分类号: H04L29/08
摘要: In an edge data management methodology, first information is obtained pertaining to a given data set associated with a computing environment, wherein the computing environment comprises one or more edge computing networks and one or more centralized computing networks. Second information is obtained that is descriptive of processing functionalities available at the one or more edge computing networks. Third information is obtained that is descriptive of processing functionalities available at the one or more centralized computing networks. A processing location decision is generated for at least a portion of the given data set based on the obtained first, second and third information. Time cost information may also be obtained that is associated with processing of at least a portion of the given data set, and used to generate the processing location decision.
-
公开(公告)号:US11106548B2
公开(公告)日:2021-08-31
申请号:US16653560
申请日:2019-10-15
IPC分类号: G06F11/14
摘要: Restore operations in containerized environments are disclosed. An ephemeral instance of an application is created and a datastore is mounted to the ephemeral instance. The ephemeral instance is not accessible to users or application. The backup data is restored to the datastore. Once restored, the datastore is then mounted to a production instance and production resumes.
-
公开(公告)号:US20210029614A1
公开(公告)日:2021-01-28
申请号:US16523473
申请日:2019-07-26
发明人: James R. King , Justin A. Kenney
摘要: In a computing environment comprising a plurality of compute, storage and network assets, a method initiates at a given asset a join operation for the given asset to become a member of a mesh network formed by the plurality of compute, storage and network assets. A network neighbor data structure associated with the given asset is created/updated based on the join operation. The method initiates at the given asset a route discovery operation to identify one or more routes through the mesh network to enable the given asset to access a remote support gateway. A network routing data structure associated with the given asset is created/updated based on the route discovery operation. The given asset may also advertise at least a portion of its routing data structure to the compute, storage and network assets in the computing environment.
-
-
-
-
-
-
-
-
-