Patent application number | Description | Published |
20140188656 | DETERMINING COST OPTIMIZATION BASED ON CONSTRAINTS ON SKI-RENTAL PROBLEMS - A constrained ski-rental problem is defined. In the constrained ski-rental problem, a determination as to whether a first action having a first cost associated therewith or a second action having a second cost associated therewith is more cost effective is performed based on moment information associated with events related to the first action or the second action. The moment information may include a moment of the occurrences distribution of events related to the first and second actions. The moment information may include a moment of a number of occurrences of events related to the first and second actions, a moment of the inter-event times of occurrences of events related to the first and second actions, or the like. The moment information may include a first moment, a second moment, or the like. | 07-03-2014 |
20140195658 | REDUNDANCY ELIMINATION SERVICE ARCHITECTURE FOR DATA CENTER NETWORKS - A redundancy elimination (RE) capability is provided. The RE capability enables dynamic control over use of RE within a network. The dynamic control over use of RE within a network may include initial selection of the network locations at which RE is performed, dynamic modification of the network locations at which RE is performed, or the like. The dynamic control over use of RE within a network may include dynamic control over packet cache sizes of packet caches at the network locations at which RE is performed. The dynamic control over use of RE within a network may include determining RE component selection information for a set of nodes of the network and selecting a set of RE components for the set of nodes, from a set of available RE components of the network, based on the RE component selection information. | 07-10-2014 |
20150199281 | APPARATUS AND METHOD FOR MEETING PERFORMANCE METRICS FOR USERS IN FILE SYSTEMS - A data block storage management capability is presented. A file system includes a plurality of data blocks which are managed using a first storage service and a second storage service, where the first storage service has a lower storage cost and a higher input-output cost than the second storage service. The data blocks stored using the second storage service have associated therewith respective expected storage durations indicative of respective lengths of time for which the data blocks are to be stored using the second storage service (which may be the same or different across the ones of the data blocks stored using the second storage service). The expected storage durations of the data blocks are modified based on a comparison of an expected hit rate of the second storage service and a current hit rate of the second storage service or current hit rates of the data blocks. | 07-16-2015 |
20150332191 | REDUCING COSTS RELATED TO USE OF NETWORKS BASED ON PRICING HETEROGENEITY - A capability is provided for reducing the costs of data transfers for networks using pricing heterogeneity. For data to be transferred between an application of a first network and a user device, the data may be transferred directly without using a second network or indirectly using a second network including a transfer of the data between the first network and the second network. In a network-based file system, a first network is primarily used for write requests and a second network is primarily used for read requests, and a data block is transferred from the first network to the second network based on a determination that a threshold number of read requests for the data block have been received. The determination as to when to transfer data between networks may be determined based on various costs associated with the networks. | 11-19-2015 |
Patent application number | Description | Published |
20130247134 | Method And Apparatus For A Distributed Security Service In A Cloud Network - Various embodiments provide a method and apparatus of providing a distributed security service that runs light instances in a number of security devices and central instances of the security services in select security devices. A received or transmitted client content segment is directed to a light instance which either applies a security policy corresponding to the client content segment if the client content segment has been previously analyzed and has a valid security policy, or else, the light instance sends the client content segment to a central instance to be analyzed. The central instance may then provide a complete security analysis on the client content segment, determine a security policy corresponding to the client content segment and push the determined security policy to one or more of the light instances. Advantageously, a distributed security service delivery may provide highly secure, network efficient and cost effective security service delivery. | 09-19-2013 |
20130305037 | Method And Apparatus For Accelerating Connections In A Cloud Network - Various embodiments provide a method and apparatus of providing accelerated encrypted connections in a cloud network supporting transmission of data including per-user encrypted data. Transmission of encrypted data from an application server uses an encryption scheme that encrypts static data using a first encryption scheme that derives keys from the content itself and encrypts dynamic data, such as dynamic website content with personalized user data, using a second encryption scheme. | 11-14-2013 |
20140052973 | Method And Apparatus For Providing Traffic Re-Aware Slot Placement - Various embodiments provide a method and apparatus of providing an RE-aware technique for placing slots based on redundancy across and within slot communication pairs. | 02-20-2014 |
20140067994 | REDUCING COSTS RELATED TO USE OF NETWORKS BASED ON PRICING HETEROGENEITY - A capability is provided for reducing the costs of data transfers for networks using pricing heterogeneity. For data to be transferred between an application of a first network and a user device, the data may be transferred directly without using a second network or indirectly using a second network including a transfer of the data between the first network and the second network. In a network-based file system, a first network is primarily used for write requests and a second network is primarily used for read requests, and a data block is transferred from the first network to the second network based on a determination that a threshold number of read requests for the data block have been received. The determination as to when to transfer data between networks may be determined based on various costs associated with the networks. | 03-06-2014 |
20140089506 | SECURING SOFTWARE DEFINED NETWORKS VIA FLOW DEFLECTION - A flow deflection capability is provided for deflecting data flows within a Software Defined Network (SDN) in order to provide security for the SDN. A flow forwarding rule is generated for a first network element of the SDN based on detection of a condition (e.g., TCAM utilization condition, CPU utilization condition, or the like) associated with the first network element. The flow forwarding rule is generated by a control element of the SDN or the first network element of the SDN. The flow forwarding rule is indicative that at least a portion of new flow requests received at the first network element are to be forwarded from the first network element to a second network element of the SDN. The flow forwarding rule may specify full flow deflection or selective flow deflection. | 03-27-2014 |
20150278146 | Method And Apparatus For Providing Traffic Re-Aware Slot Placement - Various embodiments provide a method and apparatus of providing an RE-aware technique for placing slots based on redundancy across and within slot communication pairs. | 10-01-2015 |
Patent application number | Description | Published |
20150261804 | ORGANIZING, JOINING, AND PERFORMING STATISTICAL CALCULATIONS ON MASSIVE SETS OF DATA - A system, method, and apparatus are provided for organizing and joining massive sets of data (e.g., tens or hundreds of millions of event records). A dataset is Blocked by first identifying a partition key, which comprises one or more columns of the data. Each Block will contain all dataset records that have partition key values assigned to that Block. A cost constraint (e.g., a maximum size, a maximum number of records) may also be applied to the Blocks. A Block index is generated to identify all Blocks, their corresponding (sequential) partition key values, and their locations. A second dataset that includes the partition key column(s) and that must be correlated with the first dataset may then be Blocked according to the same ranges of partition key values (but without the cost constraint). Corresponding Blocks of the datasets may then be Joined/Aggregated, and analyzed as necessary. | 09-17-2015 |
20150302020 | MULTI-TENANCY STORAGE NODE - A multi-tenancy storage node is provided. The storage node hosts partitions of multiple databases accessed by multiple applications. Each database is governed by a corresponding service-level agreement (SLA) or policy that specifies a maximum load or level of operation of the database in terms of one or more metrics (e.g., number or frequency of reads/writes, maximum size of reads/writes). To determine whether another database can be hosted by the node, a snapshot of the node's database operations is replayed on a test node, along with operations that exercise the other database. If maximum thresholds of the node for the metrics are not exceeded, the other database can be added to the storage node. An SLA is generated for it automatically, based on the metrics it exhibited during the operations on the test node. The storage node may enforce the SLA by rate-limiting activity of one or more applications. | 10-22-2015 |