|
Résultats pour
brevets
1.
|
WORKFLOW OPTIMIZATION
Numéro de document |
03106673 |
Statut |
Délivré - en vigueur |
Date de dépôt |
2019-08-15 |
Date de disponibilité au public |
2020-02-20 |
Date d'octroi |
2023-06-13 |
Propriétaire |
- EMC IP HOLDING COMPANY LLC (USA)
- LANDMARK GRAPHICS CORPORATION (USA)
|
Inventeur(s) |
- Dias, Jonas F.
- Ciarlini, Angelo
- Pinho, Romulo D.
- Gottin, Vinicius
- Maximo, Andre
- Pacheco, Edward
- Holmes, David
- Rangarajan, Keshava
- Senften, Scott David
- Winston, Joseph Blake
- Wang, Xi
- Walker, Clifton Brent
- Dev, Ashwani
- Yeleshwarapu, Chandra
- Srinivasan, Nagaraj
|
Abrégé
Managing execution of a workflow has a set of subworkflows. Optimizing the set of subworkflows using a deep neural network, each subworkflow of the set has a set of tasks. Each task of the sets has a requirement of resources of a set of resources; each task of the sets is enabled to be dependent on another task of the sets of tasks. Training the deep neural network by: executing the set of subworkflows, collecting provenance data from the execution, and collecting monitoring data that represents the state of said set of resources. Training causes the neural network to learn relationships between the states of the set of resources, the sets of tasks, their parameters and the obtained performance. Optimizing an allocation of resources to each task to ensure compliance with a user-defined quality metric based on the deep neural network output.
Classes IPC ?
- G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations
- G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
- G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
- G06N 3/02 - Réseaux neuronaux
- G06N 3/12 - Agencements informatiques fondés sur des modèles biologiques utilisant des modèles génétiques
|
2.
|
METHOD AND SYSTEM FOR CLOUD BASED STORAGE
Numéro de document |
02766731 |
Statut |
Délivré - en vigueur |
Date de dépôt |
2012-02-03 |
Date de disponibilité au public |
2012-08-03 |
Date d'octroi |
2019-12-03 |
Propriétaire |
EMC IP HOLDING COMPANY LLC (USA)
|
Inventeur(s) |
- Dumitrescu, Razvan
- Nossik, Misha
- Du, Lejin
- You, Zhengping
- Berfeld, Yuri
|
Abrégé
A method is disclosed wherein a first virtual machine is provided in execution. A storage area network for storing of data of the first virtual machine is also provided. A second virtual machine is executed for receiving first data from the first virtual machine for storage within the storage area network and for securing the first data to form secured first data and for storing the secured first data within the storage area network.
Classes IPC ?
- H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
- G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
- G06F 12/16 - Protection contre la perte de contenus de mémoire
- G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
|
3.
|
METHOD AND SYSTEM FOR SECURING DATA
Numéro de document |
02759612 |
Statut |
Délivré - en vigueur |
Date de dépôt |
2011-11-23 |
Date de disponibilité au public |
2012-05-23 |
Date d'octroi |
2018-10-23 |
Propriétaire |
EMC IP HOLDING COMPANY LLC (USA)
|
Inventeur(s) |
Huapaya, Luis Miguel
|
Abrégé
Disclosed is a method of supporting security policies and security levels associated with processes and applications. A security level is associated with a process independent of a user executing the process. When secure data is to be accessed, the security level of the process is evaluated to determine whether data access is to be granted. Optionally, the security level of a user of the process is also evaluated prior to providing data access.
Classes IPC ?
- G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
|
4.
|
SYSTEM AND METHOD FOR DATA DEDUPLICATION FOR DISK STORAGE SUBSYSTEMS
Numéro de document |
02808516 |
Statut |
Délivré - en vigueur |
Date de dépôt |
2011-07-15 |
Date de disponibilité au public |
2012-01-19 |
Date d'octroi |
2018-11-06 |
Propriétaire |
EMC IP HOLDING COMPANY LLC (USA)
|
Inventeur(s) |
Bates, John W.
|
Abrégé
A method for data deduplication includes the following steps. First, segmenting an original data set into a plurality of data segments. Next, transforming the data in each data segment into a transformed data representation that has a band-type structure for each data segment. The band-type structure includes a plurality of bands. Next, selecting a first set of bands, grouping them together and storing them with the original data set. The first set of bands includes non-identical transformed data for each data segment. Next, selecting a second set of bands and grouping them together. The second set of bands includes identical transformed data for each data segment. Next, applying a hash function onto the transformed data of the second set of bands and thereby generating transformed data segments indexed by hash function indices. Finally, storing the hash function indices and the transformed data representation of one representative data segment in a deduplication database.
Classes IPC ?
- H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
- G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
- G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
|
5.
|
EFFICIENT MANAGEMENT OF CRYPTOGRAPHIC KEY GENERATIONS
Numéro de document |
02539879 |
Statut |
Délivré - en vigueur |
Date de dépôt |
2004-10-13 |
Date de disponibilité au public |
2005-04-28 |
Date d'octroi |
2013-09-24 |
Propriétaire |
- TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) (Suède)
- EMC IP HOLDING COMPANY LLC (USA)
|
Inventeur(s) |
- Selander, Goeran
- Lindholm, Fredrik
- Nystroem, Magnus
|
Abrégé
The invention generally relates to management of cryptographic key generations in an information environment comprising a key-producing side generating and distributing key information to a key-consuming side. A basic concept of the invention is to define, by means of a predetermined one-way key derivation function, a relationship between generations of keys such that earlier generations of keys efficiently may be derived from later ones but not the other way around. A basic idea according to the invention is therefore to replace, at key update, key information of an older key generation by the key information of the new key generation on the key-consuming side. Whenever necessary, the key-consuming side iteratively applies the predetermined one- way key derivation function to derive key information of at least one older key generation from the key information of the new key generation. In this way, storage requirements on the key-consuming side can be significantly reduced.
|
|