Patents by Inventor Peng Hui Jiang

Peng Hui Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11977922
    Abstract: Reusing containers is provided. It is communicated to a pipeline workload manager that a particular container has finished running a step of a pipeline workload using an agent daemon of the particular container. Pipeline workload information corresponding to the pipeline workload is checked using the pipeline workload manager to determine whether the particular container can be reused to run a particular step in a different pipeline workload. The particular container is provided to be reused to run the particular step in the different pipeline workload without having to perform a prepare container environment sub-step of that particular step based on determining that the particular container can be reused to run that particular step in the different pipeline workload according to the pipeline workload information.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: May 7, 2024
    Assignee: International Business Machines Corporation
    Inventors: Guang Han Sui, Jin Chi JC He, Peng Hui Jiang, Jun Su
  • Publication number: 20240134805
    Abstract: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Inventors: Naijie Li, Dong Hui Liu, Jing Lu, Peng Hui Jiang, Xiao Yan Tang, Bao Zhang, Yong Yin, Jun Su, Jia Yu
  • Publication number: 20240134852
    Abstract: An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Inventors: Jia Tian Zhong, Peng Hui Jiang, Ming Lei Zhang, Ting Ting Zhan, Le Chang, Zhen Liu, Xiao Yan Tian
  • Publication number: 20240134853
    Abstract: A computer-implemented method dynamically switches access plans for a query during concurrent query execution. The method includes receiving a first query configured to be processed by a database system. The method also includes generating, for the first query, an access plan for each of identified resource sets. The method includes determining a first set of available resources that represent an available capacity for the database system. The method further includes selecting a first resource set of the one or more resource sets, where the selecting is based on the first set of available resources being closest to the first resource set. The method also includes selecting, based on the first set of available resources, a first access plan of the one or more access plans. The method includes executing the first query and returning results of the first query to a source of the first query.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Inventors: Xiao Xiao Chen, Sheng Yan Sun, Peng Hui Jiang, YING ZHANG
  • Patent number: 11968233
    Abstract: A trust rule between a first service and a second service in a plurality of services deployed in a distributed system is received; the trust rule defines whether the first service is allowed to access the second service. A trust tree is obtained for the distributed system, and the trust tree comprises a plurality of certificates for accessing the plurality of services. A first group of certificates is selected for the first service based on the trust rule and the trust tree, and the first group of certificates enables the first service to access the second service.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: April 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Hui Zhao, Li Wen, Guang Yi Xu
  • Patent number: 11966387
    Abstract: Method, computer program product, and computer system are provided. Traffic is collected against a NoSQL database by an activity collector. A database transaction log is periodically extracted and analyzed. The collected traffic and the analyzed database transaction log are input to building a knowledge base of database access patterns. Current traffic is captured and used to compute an activity threshold. Traffic is directed to a workload processor based on the activity threshold. Traffic is directed to an intensive insert/update/delete (IUD) processor in response to the activity threshold exceeding a configured threshold. A plurality of temporary shards is generated along with an adaptive key and adaptive index in the plurality of temporary shards. The intensive IUD processor traffic is re-directed to the plurality of temporary shards while the activity threshold exceeds the configured threshold.
    Type: Grant
    Filed: September 20, 2022
    Date of Patent: April 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Jun Su, Guang Han Sui, Di Li Hu
  • Publication number: 20240111511
    Abstract: A computer implemented method, apparatus, system, and computer program product manages updates to images. A computer system determines shared layers present between the images selected for update management. The images comprise executable code that are run to create containers. The computer system detects a change in a shared layer in the shared layers for an image in the images. The computer system updates the shared layer in the shared layers in a set of the images having the shared layer in response to detecting the change to the shared layer for the image. According to other illustrative embodiments, a computer system and a computer program product for managing updates to images are provided.
    Type: Application
    Filed: September 30, 2022
    Publication date: April 4, 2024
    Inventors: Guang Han Sui, Jin Chi He, Peng Hui Jiang, Jun Su, Gang Tang
  • Patent number: 11947498
    Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
    Type: Grant
    Filed: May 12, 2022
    Date of Patent: April 2, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
  • Patent number: 11947561
    Abstract: An embodiment for analyzing and tracking data flow to determine proper schemas for unstructured data. The embodiment may automatically use a sidecar to collect schema discovery rules during conversion of raw data to unstructured data. The embodiment may automatically generate multiple schemas for different tenants using the collected schema discovery rules. The embodiment may automatically use ETL to export unstructured data to SQL databases with the generated multiple schemas for the different tenants. The embodiment may automatically monitor usage data of the SQL databases and collect the usage data. The embodiment may automatically optimize schema discovery using the collected usage data. The embodiment may automatically discover schemas with hot usage and apply the discovered schemas with hot usage to other tenants for consumption and further monitoring.
    Type: Grant
    Filed: June 21, 2022
    Date of Patent: April 2, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peng Hui Jiang, Jun Su, Sheng Yan Sun, Hong Mei Zhang, Meng Wan
  • Publication number: 20240103896
    Abstract: A computer-implemented method, system and computer program product for scaling a resource of a Database as a Service (DBaaS) cluster in a cloud platform. User service requests from a service cluster to be processed by the DBaaS cluster are received. A first set of tracing data is generated by a service mesh, which facilitates service-to-service communication between the service cluster and the DBaaS cluster, from the user service requests. A second set of tracing data is generated by the DBaaS cluster from handling the user service requests. A dependency tree is then generated to discover application relationships to identify potential bottlenecks in nodes of the DBaaS cluster based on these sets of tracing data. The pod(s) of a DBaaS node are then scaled based on the dependency tree, which is used in part, to predict the utilization of the resources of the DBaaS node identified as being a potential bottleneck.
    Type: Application
    Filed: September 24, 2022
    Publication date: March 28, 2024
    Inventors: Peng Hui Jiang, Yue Wang, Jun Su, Su Liu, Sheng Yan Sun
  • Publication number: 20240104000
    Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.
    Type: Application
    Filed: September 28, 2022
    Publication date: March 28, 2024
    Inventors: Bao Zhang, Jin Hong Fu, Peng Hui Jiang, Shi Chong Ma, He Huang, Jia Yu
  • Patent number: 11940991
    Abstract: An indication to remove one or more data in a time series database is received. A metadata index associated with the time series database is updated to indicate a soft removal of each data of the one or more data. A data hole index associated with the time series database is updated to indicate a data hole at a location of each data of the one or more data in the time series database. Responsive to an input/output rate for the time series database being below a threshold, the data hole of each data of the one or more data is optimized.
    Type: Grant
    Filed: March 22, 2021
    Date of Patent: March 26, 2024
    Assignee: International Business Machines Corporation
    Inventors: Huai Long Zhang, Peng Hui Jiang, Jin Shan Li, Rui Liu, Ming Lei Zhang
  • Patent number: 11940900
    Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.
    Type: Grant
    Filed: September 28, 2022
    Date of Patent: March 26, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bao Zhang, Jin Hong Fu, Peng Hui Jiang, Shi Chong Ma, He Huang, Jia Yu
  • Patent number: 11940975
    Abstract: A computer-implemented method that includes receiving an ingestion request to ingest data to a database comprising physical shards and detecting that the ingestion request is directed to a first hotspot shard. The first hotspot shard has a contention level over a threshold value. The method also detects context characteristics within the data and generates a first virtual shard based on a first virtual shard key selected from the detected context characteristics. The first virtual shard virtually duplicates at least a portion of the first hotspot shard. The method also includes ingesting the data to the first virtual shard.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: March 26, 2024
    Assignee: International Business Machines Corporation
    Inventors: Shuo Li, Peng Hui Jiang, Xiaobo Wang, Sheng Yan Sun
  • Publication number: 20240095234
    Abstract: Method, computer program product, and computer system are provided. Traffic is collected against a NoSQL database by an activity collector. A database transaction log is periodically extracted and analyzed. The collected traffic and the analyzed database transaction log are input to building a knowledge base of database access patterns. Current traffic is captured and used to compute an activity threshold. Traffic is directed to a workload processor based on the activity threshold. Traffic is directed to an intensive insert/update/delete (IUD) processor in response to the activity threshold exceeding a configured threshold. A plurality of temporary shards is generated along with an adaptive key and adaptive index in the plurality of temporary shards. The intensive IUD processor traffic is re-directed to the plurality of temporary shards while the activity threshold exceeds the configured threshold.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Inventors: Peng Hui Jiang, Jun Su, Guang Han Sui, Di Li Hu
  • Publication number: 20240095359
    Abstract: An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Applicant: International Business Machines Corporation
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Jia Yu, Jun Su, Xiao Yan Tang, Yong Yin
  • Patent number: 11934359
    Abstract: A method, computer system, and a computer program product is provided for computer log management. In one embodiment, in response to receiving a log request from a user, an input content is analyzed and adjusted according to input contents and user's previous activities. A similarity analysis and a fairness analysis is performed to determine similarities between the input content, as adjusted, and a plurality of log records in an object library. The similarity analysis includes analyzing any patterns and attributes. The attributes have a dimension, and each dimension has a predefined weight (W). The fairness analysis ensures that one type of log is not favored over others. A best possible match is then determined, and one or more logs are presented to the user providing the best possible match.
    Type: Grant
    Filed: November 18, 2022
    Date of Patent: March 19, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sheng Yan Sun, Peng Hui Jiang, Meng Wan, Hong Mei Zhang
  • Publication number: 20240086333
    Abstract: A computer-implemented method, computer program product and computer system are provided. A processor receives an indication of sensitive data in one or more files. A processor updates at least one bit in the virtual address space for the one or more files indicated to have sensitive data. A processor, in response to a program accessing the one or more files, evaluates a respective virtual address for the one or more files. A processor, in response to the at least one bit in the respective virtual address for the one or more files, marks intermediate data generated by the program as sensitive data.
    Type: Application
    Filed: September 8, 2022
    Publication date: March 14, 2024
    Inventors: He Huang, Jin Hong Fu, Shi Chong Ma, Bao Zhang, Jia Yu, Peng Hui Jiang
  • Publication number: 20240086306
    Abstract: One or more computer processors generate a debug chain from one or more similar resource bound breakpoints, wherein the debug chain provides dynamic code flow. The one or more computer processors distribute the generated debug chain to one or more tenants.
    Type: Application
    Filed: September 13, 2022
    Publication date: March 14, 2024
    Inventors: Peng Hui Jiang, Jun Su, Sheng Yan Sun, Hong Mei Zhang, Meng Wan
  • Patent number: 11928082
    Abstract: File system performance enhancement is provided. Information related to a container of the computer accessing a file in a layer of a file system of an image corresponding to the container is recorded to form recorded file system layer access information. The recorded file system layer access information is shared with another file system of a container image corresponding to a different container on the computer. The container image is a same image as the image corresponding to the container that accessed the file to perform an operation associated with a cloud application.
    Type: Grant
    Filed: November 18, 2022
    Date of Patent: March 12, 2024
    Assignee: International Business Machines Corporation
    Inventors: Guang Han Sui, Jin Chi He, Peng Hui Jiang, Gang Tang