Patents Assigned to Dell Products L.P.
  • Publication number: 20240250961
    Abstract: Client initiated cloud-delivered device management check-in allowance and arbitration may include registering an application as a cloud-based unified endpoint management and antimalware eventing-entitled application, assigning an eventing identification to the application, and deploying the application to a client Information Handling System (IHS). A cloud-delivered device management agent on the IHS is enabled to allow local eventing and a maximum number of events per time period(s) from the application are defined. The agent checks in to a cloud-delivered device management service, upon a compliance failure event, keyed by the application, and passes an alert of the compliance failure with a reason and the application's name. The agent reports excess alerting over the maximum number of events per time period as compliance failure by the client IHS, with the application's name. Also, the agent may cease passing alerts from the application in response to triggering such a report of excess alerting.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products, L.P.
    Inventor: Carlton A. Andrews
  • Publication number: 20240251513
    Abstract: A server power rack latch lockout component. The server power rack latch lockout component includes an attachment portion, the attachment portion being configured to be mounted to a side of a server rack and an actuation portion, the actuation portion engaging with a rack ear of a server type information handling system when the server type information handling system is attached to a server rack.
    Type: Application
    Filed: January 25, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Richard W. Guzman, Kevin Garrett, David L. Roper, Matthew B. Gilbert, Jerry W. Haug
  • Publication number: 20240248967
    Abstract: Methods, system, and non-transitory processor-readable storage medium for a design obfuscation system are provided herein. An example method includes a design obfuscation system that receives software code to be compiled on a system running a software compiler. The design obfuscation system generates obfuscated code from at least a portion of the software code, where the obfuscated code, when decompiled, avoids identification of design patterns in the software code. The design obfuscation system provides the obfuscated code to the software compiler for compiling, and the software compiler compiles the obfuscated code.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Surendra Chauhan, Udit Tyagi
  • Publication number: 20240248821
    Abstract: A system, method, and computer-readable medium for performing a data center management and monitoring operation. The data center management and monitoring operation includes: receiving a plurality of system under test (SUT) test plans, each SUT test plan comprising a plurality of SUT test cases; analyzing the plurality of SUT test cases, the analyzing comprising generating a phase component resolution score for each of the plurality of SUT test cases; generating a continuous schedule for the SUT test plan, the generating the continuous schedule taking into account the phase component resolution score for each of the plurality of SUT test cases; and, continuously orchestrating the SUT test plan based upon the continuous schedule for the SUT test plan.
    Type: Application
    Filed: January 24, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventor: Vijay Narayana Reddy Halaharvi
  • Publication number: 20240248835
    Abstract: A system, method, and computer-readable medium for performing a data center management and monitoring operation. The data center management and monitoring operation includes: receiving a plurality of system under test (SUT) test plans, each SUT test plan comprising a plurality of SUT test cases; providing an analysis component, the analysis component analyzing the plurality of SUT test cases; providing a continuous scheduler component, the continuous scheduler component generating a continuous schedule for the SUT test plan; and, providing a continuous execution plan component, the continuous execution plan component continuously orchestrating the SUT test plan based upon the continuous schedule for the SUT test plan.
    Type: Application
    Filed: January 24, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventor: Vijay Narayana Reddy Halaharvi
  • Publication number: 20240248975
    Abstract: An Information Handling System (IHS), such as an IHS supporting workspaces employing subject workspace data, and/or an IHS of a workspace orchestration service may identify each modification to the subject data, identify each trusted entity performing each trusted operation on the data, and identify each unauthorized or undocumented modification to the data, each based, at least in part, on each gap in identification of each trusted entity performing each trusted operation on the data. Whereupon, a security score of the data may be decremented for each identified unauthorized or undocumented modification to the data. A data passport may be implemented, in which each modification to the data is identified. This data passport may be a ledger, such as a blockchain, a log file, such as an Extract, Transform, Load (ETL) server log file, rendered content from layered applications, such as a certificate chain (e.g., a final leaf certificate node).
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Joseph Kozlowski, Nicholas D. Grobelny
  • Publication number: 20240248779
    Abstract: A system, method, and computer-readable medium for performing a data center management and monitoring operation. The data center management and monitoring operation includes: identifying a plurality of process flows; identifying a plurality of microservices associated with each of the plurality of process flows; mapping each of the plurality of microservices associated with each of the plurality of process flows; calculating a centrality value for each of the plurality of microservices associated with each of the plurality of process flows based upon the mapping; and, performing a recovery operation for at least some of the plurality of microservices based upon the centrality value for each of the plurality of microservices.
    Type: Application
    Filed: January 22, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Boris Shpilyuck, Igor Dubrovsky, Nisan Haimov
  • Publication number: 20240248830
    Abstract: A system, method, and computer-readable medium for performing a data center management and monitoring operation. The data center management and monitoring operation includes: identifying a plurality of process flows; identifying a plurality of microservices associated with each of the plurality of process flows; mapping each of the plurality of microservices associated with each of the plurality of process flows; calculating a centrality value for each of the plurality of microservices associated with each of the plurality of process flows based upon the mapping; and, testing at least some of the plurality of microservices based upon the centrality value for each of the plurality of microservices.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Boris Shpilyuck, Igor Dubrovsky, Nisan Haimov
  • Publication number: 20240248985
    Abstract: A method for use in a storage system, comprising: detecting a first event, the first event being a cyber threat (CT) event, the first event being generated, at least in part, by using security software that is executed in the storage system; in response to the CT event, identifying a secure snapshot of the storage system and performing a first modification of a retention period of the secure snapshot in response to the first event; detecting a second event, the second event being detected after the first modification is performed; and performing a second modification of the retention period in response to the second event.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Deepak Vokaliga, Benjamin A. Randolph, Michael Ferrari
  • Publication number: 20240248834
    Abstract: A system, method, and computer-readable medium for performing a data center management and monitoring operation. The data center management and monitoring operation includes: receiving a plurality of system under test (SUT) test plans, each SUT test plan comprising a plurality of SUT test cases; analyzing the plurality of SUT test cases; generating a continuous schedule for the SUT test plan; and, continuously orchestrating the SUT test plan based upon the continuous schedule for the SUT test plan.
    Type: Application
    Filed: January 24, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventor: Vijay Narayana Reddy Halaharvi
  • Publication number: 20240248699
    Abstract: Systems and methods support updates to an Information Handling System (IHS). A workspace is instantiated on the IHS based upon a received workspace definition, where the workspace identifies an available update to a system operating on the IHS. A request is made for a first credential used for validation of the IHS by a first remote workspace orchestrator. The workspace provides the first credential to a second remote workspace orchestrator that controls access to updates to the system operating on the IHS. The second remote workspace orchestrator uses the first credential to validate the IHS with the first remote workspace orchestrator. The workspace performs the available update to the system operating on the IHS using a second credential provided by the second remote workspace orchestrator upon validation of the IHS by the first remote workspace orchestrator. The IHS maintains separate confidentiality with each remote orchestrator providing credentials for the update.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Carlton A. Andrews, Jason Kolodziej, Girish S. Dhoble, Nicholas D. Grobelny
  • Publication number: 20240248787
    Abstract: A system, method, and computer-readable medium for performing a data center management and monitoring operation.
    Type: Application
    Filed: January 24, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Raja Neogi, Khayam Anjam
  • Publication number: 20240248766
    Abstract: Emulation modules running on a single-board compute node have allocations of cores of a multi-core processor. The emulation modules are configured to donate underutilized cores or available CPU cycle units to a shared pool that can be used by other emulation modules running on the board. Emulation modules that require additional processing resources borrow cores or CPU cycle units from the shared pool. The emulation modules dynamically donate and retract cores or CPU cycle units from the shared pool based on utilization of allocated cores.
    Type: Application
    Filed: January 25, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Ningdong Li, Robert Lucey, James McGillis, Peng Yin, Rong Yu
  • Publication number: 20240248698
    Abstract: Systems and methods support updates peripheral devices that may be coupled to an Information Handling System (IHS), such as provided at shared-use workstations. The IHS reports, to a remote orchestrator, an inventory of peripheral devices that are coupled to the IHS. In response, the remote orchestrator provides the IHS with files for updates to some or all of the coupled peripheral devices. As part of the updates, the remote orchestrator also designates a specific peripheral device as a proxy for making updates to other peripherals of the shared-use workstation. The IHS transmits the files to the proxy peripheral device, where the files are stored in a memory of the proxy peripheral device. The proxy peripheral device uses the files to update the other peripherals of the shared-use workstation, such as when the peripherals are not in use by the IHS, or after the IHS has been disconnected.
    Type: Application
    Filed: January 19, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Carlton A. Andrews, Nicholas D. Grobelny, Girish S. Dhoble, Joseph Kozlowski
  • Publication number: 20240248786
    Abstract: A system, method, and computer-readable medium for performing a data center management and monitoring operation. The data center management and monitoring operation includes: receiving data center data from a plurality of data center assets within a data center, the data center data comprising data center asset data; assigning the data center data to a vectorized input space; reducing a dimension of the vectorized input space to a latent space, the latent space providing an operational status analysis (OSA) model dimension; decoding the latent space to provide a vectorized decoded output space; and, performing a data center asset operational status forecasting operation using the vectorized decoded output space, the data center asset operational status forecasting operation generating data center asset operational status forecasting data.
    Type: Application
    Filed: January 24, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Raja Neogi, Khayam Anjam
  • Publication number: 20240250813
    Abstract: An information handling system may include at least one processor and a memory. The information handling system may be configured to: receive a password reset request associated with a machine identifier of a target information handling system; and in response to the password reset request, provide a payload, wherein the payload includes: an encrypted reset command encrypted with a first key; a wrapped version of the first key, wherein the wrapped version of the first key is encrypted with a public key associated with the target information handling system; and a cryptographic signature; wherein in response to receiving the payload, the target information handling system is configured to verify the cryptographic signature, unwrap the wrapped version of the first key with a private key associated with the public key, decrypt the encrypted reset command, and allow a password reset.
    Type: Application
    Filed: January 24, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Chandrasekhar REVURI, Rama Rao BISA, Bala Balaji GUPTA M., Mini Thottunkal THANKAPPAN
  • Publication number: 20240250953
    Abstract: Systems and methods are provided for managing capabilities of workspaces operating on an Information Handling System (IHS). A request is received from a user of the IHS for access to a protected resource. A security context and a productivity context are determined for operation of a primary workspace on the IHS. Two or more applications are identified for operation within the primary workspace, where the applications provide access to the protected resource, and where the applications include overlapping capabilities. Based on the security context and the productivity context for the primary workspace deployment, two or more of the applications with overlapping capabilities are selected for operation within the primary workspace.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Charles D. Robison, Girish S. Dhoble, Nicholas D. Grobelny, Jason Kolodziej
  • Publication number: 20240248606
    Abstract: Techniques can include: configuring a federation to have a volume as active from only a first storage system so that hosts only sends I/O operations, directed to the first volume, to the first storage system; configuring a second storage system of the federation as inactive with respect to volume; determining, in accordance with criteria, to allow I/O operations directed to the volume to be sent to both the first and second storage systems; transitioning the second storage system, with respect to the volume, from inactive to active; and receiving, from a host at the first and second storage systems, I/O operations directed to the volume while the first and second storage systems are configured as active. The I/O operations can include a first I/O operation received at the second storage system which is redirected, by the second storage system, to the first storage system for servicing.
    Type: Application
    Filed: January 25, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Amitai Alkalay, Vladimir Shveidel, Lior Kamran
  • Publication number: 20240248996
    Abstract: An Information Technology Decision Maker (ITDM) defines a user workspace to be received and orchestrated by a workspace orchestration Information Handling System (IHS) on a host IHS. The orchestration IHS also receives specifications of the host, scans the user workspace definition for vulnerabilities, analyzes the vulnerabilities, and generates (an) attack parameter(s) and/or (a) pattern(s) of threat(s) to the user workspace. The orchestration IHS defines a model workspace definition that includes baseline protection for workload deployment against the attack parameter(s) and/or pattern(s) of threat(s), for orchestration, with the host, on the host. The same or another orchestration IHS (local to the host IHS) traces drift in the workload on the host, generates further attack parameter(s) and/or further pattern(s) of threat(s) from the drift.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products, L.P.
    Inventor: Jason Kolodziej
  • Publication number: 20240249219
    Abstract: A system, method, and computer-readable medium for performing a data center management and monitoring operation. The data center management and monitoring operation includes: receiving a plurality of system under test (SUT) test plans, each SUT test plan comprising a plurality of SUT test cases; analyzing the plurality of SUT test cases, the analyzing comprising generating a test case intelligence score for each of the plurality of SUT test cases; generating a continuous schedule for the SUT test plan, the generating the continuous schedule taking into account the test case intelligence score for each of the plurality of SUT test cases; and, continuously orchestrating the SUT test plan based upon the continuous schedule for the SUT test plan.
    Type: Application
    Filed: January 25, 2023
    Publication date: July 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Vijay Narayana Reddy Halaharvi, Mark J. Keating, Sunil A. Vyas, Christian M. Stiba, Gong-Jer Yeh