G06F11/3414

Throughput estimation device and throughput estimation system
11507490 · 2022-11-22 · ·

The throughput estimation device 10 comprises a storage 11 which stores tuples, each including an evaluation formula and parameter data, and a calculation device constructing unit 12 which constructs a calculation device according to a configuration including data associated with software processes, data associated with hardware resources, data associated with interconnections between a software process and a hardware resource, and the tuples, wherein the calculation device inputs a load vector describing input information load to the software processes, and outputs a result value.

Adaptive re-keying in a storage system
11595204 · 2023-02-28 · ·

Techniques for adaptive re-keying of encrypted data are provided. For example, a method comprises the following steps. Utilization information associated with a storage system is obtained, wherein the storage system comprises a set of storage devices. The method dynamically selects a re-keying process from a plurality of different re-keying processes based on at least a portion of the obtained utilization information. At least a portion of the set of storage devices are re-keyed in accordance with the selected re-keying process.

Flexible policy semantics extensions using dynamic tagging and manifests

This disclosure describes a method of utilizing network controllers to store mappings between policies, dynamic operating attributes (DOA), and trigger values in a manifest and utilizing software agents in communication to monitor DOAs of respective workloads or workload groupings for trigger values associated with the DOAs to apply a corresponding policy at run-time. The method provides for flexible policy semantics and on-demand policy provisioning. The method includes receiving at a network controller, a definition of a policy, a DOA associated with a workload, and a trigger value associated with the DOA, storing a mapping between the policy, DOA and trigger value, sending the DOA and the trigger value to a datapath agent monitoring respective workloads, receiving an indication that a current value of the DOA of the workload corresponds to the trigger value from the software agent, and sending the policy to the software agent for distribution to the workload.

Methods and systems for automated testing using browser extension
11507497 · 2022-11-22 · ·

According to certain aspects of the disclosure, non-transitory computer readable media, systems and methods are disclosed for creating and executing test scenarios for automated testing of web pages. A computer system, for example, may perform operations including: recording one or more actions performed by a user on a web page, the one or more actions resulting in a web page element being displayed in the web browser application, recording an identifier of the web page element, in response to detecting a user input indicating a selection of the web page element, and recording a characteristic of the web page element; and generating, by the testing extension, a test scenario specifying a testable outcome resulting from the one or more actions, the testable outcome being an occurrence of an element having the identifier and the characteristic.

Method and system for generating latency aware workloads using resource devices in a resource device pool

A method for managing data includes obtaining, by a management module, a workload generation request, wherein the workload generation request specifies a plurality of resource devices, identifying available resource devices in a resource device pool based on the plurality of resource devices, performing a latency analysis on the available resource devices to obtain a plurality of resource device combinations and a total latency cost of each resource device combination, and selecting a resource device combination of the plurality of resource device combinations based on the total latency cost of each resource device combination, wherein the resource device combination comprises a second plurality of resource devices and wherein each of the second plurality of resource devices is one of the plurality of resource devices.

EFFICIENT ERROR REPRODUCTION SCENARIOS THROUGH DATA TRANSFORMATION
20230058452 · 2023-02-23 · ·

Systems, methods, and computer media are described for creating efficient error reproduction scenarios. Raw workload capture data can be consolidated based on transactional dependence of the requests in the capture data. The consolidated workload capture data can be stored as a separate data structure that can be accessed to identify requests on which a request of interest in the raw workload capture data is transactionally dependent. For a request of interest (e.g., a request that caused an error), a lightweight error reproduction scenario can be generated that includes the identified transactionally dependent requests and excludes unrelated requests.

MANAGING THE DEGRADATION OF INFORMATION HANDLING SYSTEM (IHS) PERFORMANCE DUE TO SOFTWARE INSTALLATIONS
20230056727 · 2023-02-23 · ·

Systems and methods for managing the degradation of IHS performance due to software installations are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: identify a workload; in response to the identification, configure a performance measurement; calculate a level of performance degradation of the IHS based, at least in part, upon the performance measurement; and in response to the level of performance degradation meeting a threshold value, provide an indication to a user or Information Technology (IT) administrator.

Edge computing workload balancing

A set of workload criteria is determined from a workload associated with a plurality of sources. The workload is divided among a set of workload groups according to the set of workload criteria and a first workload scheduler. A set of edge computing resources is assigned to each workload group within the set according to the set of workload criteria and the set of workload groups. A portion of the workload associated with a subset of the plurality of sources is handled by a first subset of edge computing resources and a second workload scheduler, where the subset of sources is associated with a first workload group. The handling includes balancing, by the second workload scheduler, the portion of the workload among the subset of sources. The handled workload is reported to a control center.

Baselining for compute resource allocation
11494233 · 2022-11-08 · ·

Aspects of the disclosure provide for mechanisms for resource allocation in computer systems. A method of the disclosure may include running, on a plurality of nodes of a computer system, a benchmark workload utilizing a plurality of compute resources, and generating, by a processing device, a plurality of benchmarking results representing performance of the computer system utilizing the plurality of compute resources. The method may further include creating, by the processing device, a resource definition for the compute system in view of the benchmarking results, wherein the resource definition comprises a first resource allocation unit indicative of a first computing capacity of the computer system utilizing a first compute resource and a second resource allocation unit indicative of a second computing capacity of the computer system utilizing a second compute resource, and wherein the plurality of compute resources comprises the first compute resource and the second compute resource.

TECHNOLOGIES FOR SWITCHING NETWORK TRAFFIC IN A DATA CENTER

Technologies for switching network traffic include a network switch. The network switch includes one or more processors and communication circuitry coupled to the one or more processors. The communication circuity is capable of switching network traffic of multiple link layer protocols. Additionally, the network switch includes one or more memory devices storing instructions that, when executed, cause the network switch to receive, with the communication circuitry through an optical connection, network traffic to be forwarded, and determine a link layer protocol of the received network traffic. The instructions additionally cause the network switch to forward the network traffic as a function of the determined link layer protocol. Other embodiments are also described and claimed.