Patents Assigned to Dell Products L.P.
  • Publication number: 20240134517
    Abstract: An information handling system may include a processor, a touchpad communicatively coupled to the processor, and non-transitory computer-readable media communicatively coupled to the processor and having stored thereon a program of instructions configured to, when read and executed by the processor in response to a trigger for enabling logical segmentation of the touchpad, logically segment the touchpad into a plurality of zones and map each zone to a respective corresponding feature displayed on one or more displays communicatively coupled to the processor such that user interaction with each of the plurality of zones manipulates the respective corresponding feature of such zones on the one or more displays.
    Type: Application
    Filed: October 31, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Jiahui DING, Kai WANG
  • Publication number: 20240134531
    Abstract: In a multi-tiered system, a read temperature classification and write temperature classification per virtual block (VLB) can be determined based on the content referenced by each VLB. The temperature classifications of VLBs can be determined using temperature scales which map read and write activity levels to corresponding temperature classifications. The temperature scales can have classification boundaries adjusted based on feedback of operations performed including down-tiering, garbage collection, and compaction and appending. In one use case, a number of free blocks in a high-performance first tier can be below a minimum and processing can be performed to locate a source block of the first tier partially filled with hot content, store the hot content contiguously on a target block of the first tier, flush write data from a log, and store the write data on the target block by appending the write data to the existing hot content.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Vamsi K. Vankamamidi, Ajay Karri
  • Publication number: 20240134863
    Abstract: A system of managing data, comprising a streaming data storage system operating on a processor that causes the processor to receive streaming data and to process the streaming data in response to an append command, a long-term storage system operating on a processor that causes the processor to receive the processed streaming data from the streaming data storage system and to generate a chunk of data, an object storage system operating on a processor that causes the processor to receive the processed streaming data from the streaming data storage system and to generate an object of data and a tables system operating on a processor that causes the processor to receive the processed streaming data from the streaming data storage system and to generate a table of data.
    Type: Application
    Filed: October 24, 2022
    Publication date: April 25, 2024
    Applicant: DELL PRODUCTS L.P.
    Inventors: Lu Lei, Flavio Paiva Junqueira, Raúl Gracia Tinedo, Yurun Wu
  • Publication number: 20240134619
    Abstract: Systems and methods for integrating an embedded controller (EC) into a heterogenous computing platform. In an embodiment, an Information Handling System (IHS) includes a heterogeneous computing platform having a Reduced Instruction Set Computer (RISC) processor and a plurality of devices coupled to an interconnect, and an EC coupled to the interconnect. These systems and methods may provide an EC with access to an internal System-on-Chip (SoC)'s fabric, whether in a fully internal, partially internal/external, or fully external implementation (e.g., via an enhanced serial peripheral interface or “SPI”). These systems and methods may also provide voltage segregation factor and power sequencing, as well as various possible architectural variations on General Purpose I/O (GPIO) handling.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventor: Adolfo S. Montero
  • Publication number: 20240134999
    Abstract: Systems and methods provided vulnerability proofing of an IHS (Information Handling System) while it is being provisioned for deployment, such as upon receipt at a datacenter. An initial provisioning of the IHS is detected, where no provisioning of the IHS has been conducted other than the factory provisioning of the IHS. A profile is identified that is to be used in provisioning the IHS, where the profile includes configurations for one or more hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. For each of the hardware configurations in the profile, configurations that are vulnerable are identified based on the catalogs of known vulnerabilities. If vulnerabilities are identified, further provisioning of the IHS is blocked until the profile is modified to include no hardware configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240134632
    Abstract: An information handling system may include at least one processor and a memory. The information handling system may be configured to perform a maintenance operation involving a plurality of hosts of an information handling system cluster by: determining a score for each host based on a sum of working memory sizes for all active virtual machines executing on such host plus a sum of persistent storage sizes for all virtual machines stored on such host; based on the determined scores, selecting a first host for upgrading; migrating at least a portion of all virtual machines stored on the first host from the first host to one or more other hosts; and causing the first host to perform the maintenance operation.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Kai CHEN, Jun ZHAN, Stéphane MENG, HongGang LIU, Yuyan CHEN, Carl SHI, Michael G. VARTERESIAN
  • Publication number: 20240135001
    Abstract: Systems and methods are provided for vulnerability proofing the use of machine learning recommendations by an IHS. A machine learning recommendation is detected that provides configurations for one or more of the hardware components of the IHS. Catalogs specifying known vulnerabilities of hardware components are accessed to determine whether any of the hardware configurations from the machine learning recommendations are identified as vulnerable in one or more of the catalogs. If a machine learning recommendation is identified as vulnerable, use of the machine learning recommendation by the IHS is blocked until the recommendation is modified to include no recommended hardware configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240134989
    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include a Baseboard Management Controller (BMC) having computer-executable instructions to, during a boot sequence of the BMC, determine a type of a firmware that is to be booted on the BMC, and selectively restrict access to the resources based upon the determined type of firmware.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Sreeram Veluthakkal, Marshal F. Savage, Eugene David Cho
  • Publication number: 20240134985
    Abstract: A disaster recovery site storage array causes an instance of a host application or selected executables running on a host server to validate changes to an asynchronously updated replica of a storage object. Snapshots of the replica are generated before and after each set of changes to the replica are received from a remote storage array. Validation is performed by mounting snapshots to the instance of the associated host application and causing the host application instance to validate the data. If a snapshot is determined to be invalid, then the replica to recovered with the most recent known-valid snapshot. Alternatively, if each set of changes is validated prior to being applied to the replica, invalid changes are not applied to the replica. Unvalidated snapshots may be accumulated and validated independently from application of sets of changes to the replica, thereby decoupling validation from replication.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: DELL PRODUCTS L.P.
    Inventors: Yaron Dar, Arieh Don, Krishna Deepak Nuthakki
  • Publication number: 20240134992
    Abstract: Systems and methods provide vulnerability proofing procedures for booting of an IHS (Information Handling System). A request to boot the IHS is detected. One or more boot configurations are determined that include configurations for operation of one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The boot configurations are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the boot configuration, further booting of the IHS may be disabled until the boot configuration is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240134671
    Abstract: Disclosed systems and methods may register a first plugin server as a primary server of a cluster management plugin (CMP) for a user interface (UI) of a virtualization platform client and a second plugin server as an auxiliary server of the CMP. The first plugin server may be associated with a first cluster of the virtualization platform and the second plugin server is associated with a second cluster of the visualization platform. The clusters may include one or more multi-node hyperconverged infrastructure (HCI) clusters. The first cluster may be managed by a first instance of a cluster manager while the second cluster may be managed by a second instance of the cluster manager. A CMP manifest, indicative of user interface extension points defined by the CMP, is loaded into a browser from the primary server.
    Type: Application
    Filed: October 30, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Shengli LING, Yuan LI, Wei ZHANG, Zhijing HU
  • Publication number: 20240134465
    Abstract: Aspects of this disclosure implement at least one sensor in a user input device with an identifiable user input on an information handling system. A method may include receiving, by an information handling system, an indication that at least one sensor, located on an outward facing surface of a frame housing a user input device, is actuated; comparing, by the information handling system, the indication to an active profile configuration; and identifying, by the information handling system, the indication as an input based on the active profile configuration. Other aspects are also disclosed.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Wong Hin Loong Justin, Kai Leong Wong
  • Publication number: 20240134993
    Abstract: Systems and methods are provided for vulnerability proofing updates to an IHS. An update package is detected that includes configurations for one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The updated configurations of the hardware component that are included in the update package are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the updated configurations, further booting of the IHS may be disabled until the update package is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240134765
    Abstract: Disclosed methods and system feature or perform operations including monitoring, within an operating system (OS) environment of an information handling system, telemetry data indicative of values for one or more hardware status parameters and generating any of one or more anomaly alerts responsive to identifying any of one or more anomalous conditions. Responsive to detecting an anomaly alert, an OS-context configuration may be determined based on the hardware status parameters monitored during a timebox associated with the anomaly alert. Responsive to detecting a reset of the information handling system, preboot operations may be performed wherein the pre-boot operations may include configuring the information handling system in accordance with the OS-context configuration and performing one or more hardware diagnostic routines while the information handling system is configured in accordance with the OS-context configuration.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Jacob MINK, Balasingh P. SAMUEL, Travis C. NORTH
  • Publication number: 20240134768
    Abstract: An information handling system may include a processor and a program of instructions embodied in non-transitory computer-readable media, the program of instructions configured to, when read and executed by the processor: receive a touch temperature limit parameter indicative of a temperature limit; receive an acoustic noise limit parameter indicative of an acoustic noise limit; determine an estimated power capacity limit parameter indicative of an estimated power limit based on the touch temperature limit parameter and the acoustic noise limit parameter; and determine an estimated performance capability parameter based on the estimated power capacity limit parameter.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Qinghong HE, Balasingh Ponraj SAMUEL, Travis C. NORTH
  • Publication number: 20240134997
    Abstract: Systems and methods provided for vulnerability proofing updates to an IHS (Information Handling System). Upon receipt of an update to hardware component configurations of the IHS, vulnerability proofing requirements for modifications to the hardware component configurations are retrieved, including requirements for modifications that are validated for operation of a computational workload by the IHS. Based on the vulnerability proofing requirements, catalogs specifying known vulnerabilities of hardware components are consulted to determine whether the modifications are identified as vulnerable in the catalogs and whether remediations to the identified vulnerabilities are validated for operation of the workload. If the modifications are not identified as vulnerable in the catalogs, the update is transmitted to the IHS. If the modifications are identified as vulnerable in the catalogs and remediations to the identified vulnerabilities are not validated for operation of the workload, the update is terminated.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore, Muniswamy Setty K S
  • Publication number: 20240134991
    Abstract: Systems and methods are provided for vulnerability proofing the installation of new hardware components in an IHS (Information Handling System). The coupling of a new hardware component to the IHS is detected. A profile is identified that is to be used in provisioning the new hardware component that has been coupled to the IHS. The profile may include various configurations for the coupled hardware component. One or more catalogs are accessed that specify known vulnerabilities of hardware components. Configurations from the profile for the coupled hardware component are used to identify any configuration that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the configuration for the new hardware component, further use of the new hardware component by the IHS is disabled until the profile is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 11966782
    Abstract: Techniques described herein relate to a method for performing state management services for composed information handling systems. The method includes determining that at least one control resource set is not associated with a distributed state storage system; instantiating the distributed state storage system using first additional computing resources; registering the at least one control resource set with the distributed state storage system; preparing the at least one control resource set to perform a first portion of the state management services using the distributed state storage system; determining that the at least one control resource set is not associated with an audit storage; instantiating the audit storage using second additional computing resources; registering the at least one control resource set with the audit storage; and preparing the at least one control resource set to perform a second portion of the state management services using the audit storage.
    Type: Grant
    Filed: September 24, 2021
    Date of Patent: April 23, 2024
    Assignee: Dell Products L.P.
    Inventors: Douglas L. Farley, John S. Harwood, Jimmy Doyle Pike, Gaurav Chawla, Tommi Salli, Robert Anthony Lincourt, Jr., Sumedh Wasudeo Sathaye
  • Patent number: 11966490
    Abstract: An information handling system may receive, from a first sensor of the information handling system, first sensor data. The information handling system may receive, from a second sensor of the information handling system, second sensor data. Based, at least in part, on the first sensor data and the second sensor data, the information handling system may generate a plurality of security profiles for the information handling system. Based, at least in part, on the first sensor data and the second sensor data, the information handling system may apply a security profile of the plurality of security profiles to the information handling system.
    Type: Grant
    Filed: December 2, 2020
    Date of Patent: April 23, 2024
    Assignee: Dell Products L.P.
    Inventors: Fnu Jasleen, Joseph Paul Marquardt, Rocco Ancona
  • Patent number: 11966767
    Abstract: A system application, such as a cloud tethering subsystem, is instantiated to execute in an embedded environment of a storage system. Errors of the system application that require external support such as memory overflows, daemon errors, etc., are collected and posted using an error reporting system call to an operating system of the storage system in which the virtualized environment is executing. The storage system operating system posts the errors to an error system reporting system as a dial home service request on behalf of the system application. In this manner, the system application can issue dial home service requests without having direct access to the external error resolution system. In some embodiments, a guest operating system utility uses a SCSI mechanism to post errors to the storage system operating system.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: April 23, 2024
    Assignee: Dell Products, L.P.
    Inventors: Deepak Vokaliga, William Hatstat, Gopalakrishna Manjunatha