G06F11/202

NETWORK VIRTUALIZATION POLICY MANAGEMENT SYSTEM

Concepts and technologies are disclosed herein for providing a network virtualization policy management system. An event relating to a service can be detected. A first policy that defines allocation of hardware resources to host the virtual network functions can be obtained, as can a second policy that defines deployment of the virtual network functions to the hardware resources. The hardware resources can be allocated based upon the first policy and the virtual network functions can be deployed to the hardware resources based upon the second policy.

Distributed components in computing clusters

The subject disclosure is directed towards components in different server clusters, e.g., comprising software components such as components of a distributed computing system. Components are available for use by distributed computing system applications, yet managed by the distributed computing system runtime such that only a single instance can be activated and exist within communicating (non-partitioned) clusters. Also described is recovery from a situation in which no longer partitioned clusters each have created the same component.

Managing files according to categories
11487625 · 2022-11-01 · ·

According to various embodiments, with respect to a target set of files being managed (e.g., protected by data snapshots), each file in the target set of files is classified into one of two or more filesets (discontiguous filesets), where each of these filesets comprises one or more files that are related to each other by one or more factors, such as frequency of file change or purpose of existence (e.g., used by a software application). Once classified, files within the target set of files can be uniquely processed by a data management operation (e.g., incremental data snapshot process) according to their association to a discontiguous fileset.

Data management platform

Some examples relate generally to a data management platform comprising: a storage device configured to store secondary data and one or more processors in communication with the storage device and configured to perform certain operations. The operations may include identifying an aspect of the secondary data stored in the storage device, the secondary data including a backup of respective primary data stored in a primary data source; identifying or receiving an indication of a target to receive data associated with the identified aspect of the secondary data; and transmitting the data associated with the aspect of the secondary data to the target.

Utilizing machine learning to streamline telemetry processing of storage media
11474986 · 2022-10-18 · ·

Data associated with storage media utilized by one or more storage systems is received. The data is provided as an input to a machine learning model executed by a processing device. The machine learning model identifies one or more deterministic characteristics from the data. The one or more deterministic characteristics associated with the storage media are received from the machine learning model. A data structure comprising the one or more deterministic characteristics is generated for use in a telemetry process to qualify types of storage media.

Method for controlling and automatically restarting a technical apparatus
11662764 · 2023-05-30 · ·

The invention is part of the field of computer technology. It describes the architecture of a secure automation system and a method for safe autonomous operation of a technical apparatus, in particular a motor vehicle. The architecture disclosed herein solves the problem that any Byzantine error in one of the complex subsystems of a distributed real-time computer system, regardless of whether the error was triggered by a random hardware failure, a design error in the software or an intrusion, must be recognized and controlled in such a way that no security-relevant incident occurs. The architecture includes four largely independent subsystems which are arranged hierarchically and each form an isolated Fault-Containment Unit (FCU). At the top of the hierarchy is a secure subsystem, which executes simple software on fault-tolerant hardware. The other three subsystems are insecure because they contain complex software executed on non-fault-tolerant hardware.

Malware protection for virtual machines

A computer-implemented method at a data management system comprises: receiving, at a storage appliance from a server hosting a virtual machine, a write made to the virtual machine; computing, at the storage appliance, a fingerprint of the transmitted write; comparing, at the storage appliance, the computed fingerprint to malware fingerprints in a malware catalog; repeating the computing and comparing; and disabling the virtual machine if a number of matches from the comparing breaches a predetermined threshold over a predetermined amount of time.

MANAGEMENT OF MICROSERVICES FAILOVER

Embodiments described herein are generally directed to intelligent management of microservices failover. In an example, responsive to an uncorrectable hardware error associated with a processing resource of a platform on which a task of a service is being performed by a primary microservice, a failover trigger is received by a failover service. A secondary microservice is identified by the failover service that is operating in lockstep mode with the primary microservice. The secondary microservice is caused by the failover service to takeover performance of the task in non-lockstep mode based on failover metadata persisted by the primary microservice. The primary microservice is caused by the failover service to be taken offline.

OPERATING A DATA CENTER

In an approach, a primary data center is provided including primary source and primary target database systems, where a function is activated causing the primary target database system to: include a copy of data and receive analysis queries from the primary source database system; and execute the analysis queries on data. A processor, in response to detecting a failure in the primary source database system: offloads queries intended for the primary source database system to a secondary source database system of a secondary data center also including a secondary target database system and a copy of data, where the function is deactivated. A processor, responsive to the primary target database system being available: receives analysis queries, processed by the secondary source database system, of the offloaded queries; and copies data to the secondary target database system. A processor causes the function to be activated in the secondary data center.

Application alerting system and method for a computing infrastructure

An application alerting system includes a computing system that executes an application alerting service monitor at least one of multiple computing resources configured in a computing infrastructure to determine whether the one monitored computing resource experiences a failure. When a failure is detected, the service transmits a failure notification to applications associated with the failed monitored computing resource such that the application may perform at least one remedial action according to the received failure notification.