|
Found results for
patents
1.
|
WORKFLOW OPTIMIZATION
Document Number |
03106673 |
Status |
In Force |
Filing Date |
2019-08-15 |
Open to Public Date |
2020-02-20 |
Grant Date |
2023-06-13 |
Owner |
- EMC IP HOLDING COMPANY LLC (USA)
- LANDMARK GRAPHICS CORPORATION (USA)
|
Inventor |
- Dias, Jonas F.
- Ciarlini, Angelo
- Pinho, Romulo D.
- Gottin, Vinicius
- Maximo, Andre
- Pacheco, Edward
- Holmes, David
- Rangarajan, Keshava
- Senften, Scott David
- Winston, Joseph Blake
- Wang, Xi
- Walker, Clifton Brent
- Dev, Ashwani
- Yeleshwarapu, Chandra
- Srinivasan, Nagaraj
|
Abstract
Managing execution of a workflow has a set of subworkflows. Optimizing the set of subworkflows using a deep neural network, each subworkflow of the set has a set of tasks. Each task of the sets has a requirement of resources of a set of resources; each task of the sets is enabled to be dependent on another task of the sets of tasks. Training the deep neural network by: executing the set of subworkflows, collecting provenance data from the execution, and collecting monitoring data that represents the state of said set of resources. Training causes the neural network to learn relationships between the states of the set of resources, the sets of tasks, their parameters and the obtained performance. Optimizing an allocation of resources to each task to ensure compliance with a user-defined quality metric based on the deep neural network output.
IPC Classes ?
- G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
- G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
- G06N 3/02 - Neural networks
- G06N 3/12 - Computing arrangements based on biological models using genetic models
|
2.
|
METHOD AND SYSTEM FOR CLOUD BASED STORAGE
Document Number |
02766731 |
Status |
In Force |
Filing Date |
2012-02-03 |
Open to Public Date |
2012-08-03 |
Grant Date |
2019-12-03 |
Owner |
EMC IP HOLDING COMPANY LLC (USA)
|
Inventor |
- Dumitrescu, Razvan
- Nossik, Misha
- Du, Lejin
- You, Zhengping
- Berfeld, Yuri
|
Abstract
A method is disclosed wherein a first virtual machine is provided in execution. A storage area network for storing of data of the first virtual machine is also provided. A second virtual machine is executed for receiving first data from the first virtual machine for storage within the storage area network and for securing the first data to form secured first data and for storing the secured first data within the storage area network.
IPC Classes ?
- H04L 12/16 - Arrangements for providing special services to substations
- G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
- G06F 12/16 - Protection against loss of memory contents
- G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
|
3.
|
METHOD AND SYSTEM FOR SECURING DATA
Document Number |
02759612 |
Status |
In Force |
Filing Date |
2011-11-23 |
Open to Public Date |
2012-05-23 |
Grant Date |
2018-10-23 |
Owner |
EMC IP HOLDING COMPANY LLC (USA)
|
Inventor |
Huapaya, Luis Miguel
|
Abstract
Disclosed is a method of supporting security policies and security levels associated with processes and applications. A security level is associated with a process independent of a user executing the process. When secure data is to be accessed, the security level of the process is evaluated to determine whether data access is to be granted. Optionally, the security level of a user of the process is also evaluated prior to providing data access.
IPC Classes ?
- G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
|
4.
|
SYSTEM AND METHOD FOR DATA DEDUPLICATION FOR DISK STORAGE SUBSYSTEMS
Document Number |
02808516 |
Status |
In Force |
Filing Date |
2011-07-15 |
Open to Public Date |
2012-01-19 |
Grant Date |
2018-11-06 |
Owner |
EMC IP HOLDING COMPANY LLC (USA)
|
Inventor |
Bates, John W.
|
Abstract
A method for data deduplication includes the following steps. First, segmenting an original data set into a plurality of data segments. Next, transforming the data in each data segment into a transformed data representation that has a band-type structure for each data segment. The band-type structure includes a plurality of bands. Next, selecting a first set of bands, grouping them together and storing them with the original data set. The first set of bands includes non-identical transformed data for each data segment. Next, selecting a second set of bands and grouping them together. The second set of bands includes identical transformed data for each data segment. Next, applying a hash function onto the transformed data of the second set of bands and thereby generating transformed data segments indexed by hash function indices. Finally, storing the hash function indices and the transformed data representation of one representative data segment in a deduplication database.
IPC Classes ?
- H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- G06F 12/14 - Protection against unauthorised use of memory
- G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
|
5.
|
EFFICIENT MANAGEMENT OF CRYPTOGRAPHIC KEY GENERATIONS
Document Number |
02539879 |
Status |
In Force |
Filing Date |
2004-10-13 |
Open to Public Date |
2005-04-28 |
Grant Date |
2013-09-24 |
Owner |
- TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) (Sweden)
- EMC IP HOLDING COMPANY LLC (USA)
|
Inventor |
- Selander, Goeran
- Lindholm, Fredrik
- Nystroem, Magnus
|
Abstract
The invention generally relates to management of cryptographic key generations in an information environment comprising a key-producing side generating and distributing key information to a key-consuming side. A basic concept of the invention is to define, by means of a predetermined one-way key derivation function, a relationship between generations of keys such that earlier generations of keys efficiently may be derived from later ones but not the other way around. A basic idea according to the invention is therefore to replace, at key update, key information of an older key generation by the key information of the new key generation on the key-consuming side. Whenever necessary, the key-consuming side iteratively applies the predetermined one- way key derivation function to derive key information of at least one older key generation from the key information of the new key generation. In this way, storage requirements on the key-consuming side can be significantly reduced.
|
|