Patents by Inventor James R. King
James R. King has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11748162Abstract: Techniques for function execution environment selection for a decomposed application are provided. In one example, an apparatus comprises at least one processing platform configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, determine an execution environment from one or more execution environments specified in the marked code for the second virtual computing element to execute the marked code, when it is decided to execute the portion of the marked code in the second virtual computing element, and cause the portion of marked code identified in the request to be executed.Type: GrantFiled: January 6, 2020Date of Patent: September 5, 2023Assignee: EMC IP Holding Company LLCInventors: Victor Fong, Xuebin He, James R. King, Alex Robbins, Kenneth Durazzo
-
Patent number: 11609829Abstract: Restore operations in containerized environments are disclosed. An ephemeral instance of an application is created and a datastore is mounted to the ephemeral instance. The ephemeral instance is not accessible to users or application. The backup data is restored to the datastore. Once restored, the datastore is then mounted to a production instance and production resumes.Type: GrantFiled: August 26, 2021Date of Patent: March 21, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: James R. King, Ethan A. Kaley, Joseph J. Gorse, III
-
Patent number: 11550383Abstract: One example method includes performing, in an edge device that includes a power source, operations including monitoring a running process and obtaining, based on the monitoring, power consumption information associated with the running process, adjusting, based on the power consumption information, a priority of the running process, and providing, to an entity, the power consumption information and/or information concerning the priority of the running process.Type: GrantFiled: January 23, 2020Date of Patent: January 10, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: James R. King, Amy Seibel
-
Patent number: 11340817Abstract: A data transfer request is received from an application program hosted at a first location in a computing environment for transferring a given data set to a second location in the computing environment. The data transfer request comprises information identifying one or more data types of the given data set and one or more preferences associated with the transfer of the given data set. The second location is notified of the data transfer request. The method causes deployment of one or more data-aware services to optimize the given data set prior to transfer to the second location, wherein optimizing the given data set is performed based on the one or more data types of the given data set and the one or more preferences associated with the transfer of the given data set. For example, the data-aware services at the first location may comprise data deduplication and/or data compression.Type: GrantFiled: July 10, 2019Date of Patent: May 24, 2022Assignee: EMC IP Holding Company LLCInventors: Nicole Reineke, James R. King, Justin A. Kenney, Robert A. Lincourt
-
Patent number: 11341359Abstract: Data points are collected from multiple infrastructure domains of at least one data center in a computing environment. A graphical representation is generated from the collected data points that represents an infrastructure state of the at least one data center, wherein each vertex in the graphical representation corresponds to one of one or more compute components, one or more storage components, and one or more network components of the data center, and an edge connecting two vertices corresponds to a relationship between the components to which the vertices correspond. The graphical representation representing the infrastructure state of the at least one data center is sent to an infrastructure generation engine for composition with one or more other graphical representations respectively representing the infrastructure state of one or more other data centers in the computing environment.Type: GrantFiled: July 22, 2019Date of Patent: May 24, 2022Assignee: EMC IP Holding Company LLCInventors: Valerie Charry, James R. King
-
Patent number: 11310718Abstract: In a computing environment comprising a plurality of compute, storage and network assets, a method initiates at a given asset a join operation for the given asset to become a member of a mesh network formed by the plurality of compute, storage and network assets. A network neighbor data structure associated with the given asset is created/updated based on the join operation. The method initiates at the given asset a route discovery operation to identify one or more routes through the mesh network to enable the given asset to access a remote support gateway. A network routing data structure associated with the given asset is created/updated based on the route discovery operation. The given asset may also advertise at least a portion of its routing data structure to the compute, storage and network assets in the computing environment.Type: GrantFiled: July 26, 2019Date of Patent: April 19, 2022Assignee: EMC IP Holding Company LLCInventors: James R. King, Justin A. Kenney
-
Publication number: 20210382796Abstract: Restore operations in containerized environments are disclosed. An ephemeral instance of an application is created and a datastore is mounted to the ephemeral instance. The ephemeral instance is not accessible to users or application. The backup data is restored to the datastore. Once restored, the datastore is then mounted to a production instance and production resumes.Type: ApplicationFiled: August 26, 2021Publication date: December 9, 2021Inventors: James R. King, Ethan A. Kaley, Joseph J. Gorse, III
-
Patent number: 11172035Abstract: In an edge data management methodology, first information is obtained pertaining to a given data set associated with a computing environment, wherein the computing environment comprises one or more edge computing networks and one or more centralized computing networks. Second information is obtained that is descriptive of processing functionalities available at the one or more edge computing networks. Third information is obtained that is descriptive of processing functionalities available at the one or more centralized computing networks. A processing location decision is generated for at least a portion of the given data set based on the obtained first, second and third information. Time cost information may also be obtained that is associated with processing of at least a portion of the given data set, and used to generate the processing location decision.Type: GrantFiled: July 17, 2019Date of Patent: November 9, 2021Assignee: EMC IP Holding Company LLCInventors: Nicole Reineke, James R. King
-
Patent number: 11106548Abstract: Restore operations in containerized environments are disclosed. An ephemeral instance of an application is created and a datastore is mounted to the ephemeral instance. The ephemeral instance is not accessible to users or application. The backup data is restored to the datastore. Once restored, the datastore is then mounted to a production instance and production resumes.Type: GrantFiled: October 15, 2019Date of Patent: August 31, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: James R. King, Ethan A. Kaley, Joseph J. Gorse, III
-
Patent number: 11107273Abstract: In a computing environment comprising a plurality of equipment racks wherein each equipment rack comprises one or more of compute, storage and network assets, the method captures an image of at least one equipment rack in the computing environment. The method identifies a known object in the image to determine physical characteristics of the equipment rack. The method receives, from a peer-to-peer network, positioning beacon signals respectively associated with at least a portion of the compute, storage and network assets in and around the equipment rack. The method determines a closest asset among the portion of the compute, storage and network assets for which positioning beacon signals are received. The method obtains data indicative of physical characteristics associated with the closest asset, obtains a model of the computing environment based on the obtained data, and then obtains a three-dimensional map of the computing environment based on the model.Type: GrantFiled: August 2, 2019Date of Patent: August 31, 2021Assignee: EMC IP Holding Company LLCInventors: James R. King, Nicole Reineke
-
Publication number: 20210232200Abstract: One example method includes performing, in an edge device that includes a power source, operations including monitoring a running process and obtaining, based on the monitoring, power consumption information associated with the running process, adjusting, based on the power consumption information, a priority of the running process, and providing, to an entity, the power consumption information and/or information concerning the priority of the running process.Type: ApplicationFiled: January 23, 2020Publication date: July 29, 2021Inventors: James R. King, Amy Seibel
-
Publication number: 20210208941Abstract: Techniques for function execution environment selection for a decomposed application are provided. In one example, an apparatus comprises at least one processing platform configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, determine an execution environment from one or more execution environments specified in the marked code for the second virtual computing element to execute the marked code, when it is decided to execute the portion of the marked code in the second virtual computing element, and cause the portion of marked code identified in the request to be executed.Type: ApplicationFiled: January 6, 2020Publication date: July 8, 2021Inventors: Victor Fong, Xuebin He, James R. King, Alex Robbins, Kenneth Durazzo
-
Patent number: 11030066Abstract: Techniques for dynamic decomposition of an application executing in a computing environment are provided. For example, an apparatus comprises at least one processing platform comprising one or more processing devices. The at least one processing platform is configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, and cause the portion of marked code identified in the request to be executed in the second virtual computing element, when it is decided to execute the portion of the marked code in the second virtual computing element.Type: GrantFiled: October 30, 2019Date of Patent: June 8, 2021Assignee: EMC IP Holding Company LLCInventors: Xuebin He, Alex Robbins, James R. King, Amy Seibel, Victor Fong
-
Publication number: 20210133066Abstract: Techniques for dynamic decomposition of an application executing in a computing environment are provided. For example, an apparatus comprises at least one processing platform comprising one or more processing devices. The at least one processing platform is configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, and cause the portion of marked code identified in the request to be executed in the second virtual computing element, when it is decided to execute the portion of the marked code in the second virtual computing element.Type: ApplicationFiled: October 30, 2019Publication date: May 6, 2021Inventors: Xuebin He, Alex Robbins, James R. King, Amy Seibel, Victor Fong
-
Publication number: 20210109823Abstract: Restore operations in containerized environments are disclosed. An ephemeral instance of an application is created and a datastore is mounted to the ephemeral instance. The ephemeral instance is not accessible to users or application. The backup data is restored to the datastore. Once restored, the datastore is then mounted to a production instance and production resumes.Type: ApplicationFiled: October 15, 2019Publication date: April 15, 2021Inventors: James R. King, Ethan A. Kaley, Joseph J. Gorse, III
-
Publication number: 20210035358Abstract: In a computing environment comprising a plurality of equipment racks wherein each equipment rack comprises one or more of compute, storage and network assets, the method captures an image of at least one equipment rack in the computing environment. The method identifies a known object in the image to determine physical characteristics of the equipment rack. The method receives, from a peer-to-peer network, positioning beacon signals respectively associated with at least a portion of the compute, storage and network assets in and around the equipment rack. The method determines a closest asset among the portion of the compute, storage and network assets for which positioning beacon signals are received. The method obtains data indicative of physical characteristics associated with the closest asset, obtains a model of the computing environment based on the obtained data, and then obtains a three-dimensional map of the computing environment based on the model.Type: ApplicationFiled: August 2, 2019Publication date: February 4, 2021Inventors: James R. King, Nicole Reineke
-
Publication number: 20210027091Abstract: Data points are collected from multiple infrastructure domains of at least one data center in a computing environment. A graphical representation is generated from the collected data points that represents an infrastructure state of the at least one data center, wherein each vertex in the graphical representation corresponds to one of one or more compute components, one or more storage components, and one or more network components of the data center, and an edge connecting two vertices corresponds to a relationship between the components to which the vertices correspond. The graphical representation representing the infrastructure state of the at least one data center is sent to an infrastructure generation engine for composition with one or more other graphical representations respectively representing the infrastructure state of one or more other data centers in the computing environment.Type: ApplicationFiled: July 22, 2019Publication date: January 28, 2021Inventors: Valerie Charry, James R. King
-
Publication number: 20210029614Abstract: In a computing environment comprising a plurality of compute, storage and network assets, a method initiates at a given asset a join operation for the given asset to become a member of a mesh network formed by the plurality of compute, storage and network assets. A network neighbor data structure associated with the given asset is created/updated based on the join operation. The method initiates at the given asset a route discovery operation to identify one or more routes through the mesh network to enable the given asset to access a remote support gateway. A network routing data structure associated with the given asset is created/updated based on the route discovery operation. The given asset may also advertise at least a portion of its routing data structure to the compute, storage and network assets in the computing environment.Type: ApplicationFiled: July 26, 2019Publication date: January 28, 2021Inventors: James R. King, Justin A. Kenney
-
Publication number: 20210021676Abstract: In an edge data management methodology, first information is obtained pertaining to a given data set associated with a computing environment, wherein the computing environment comprises one or more edge computing networks and one or more centralized computing networks. Second information is obtained that is descriptive of processing functionalities available at the one or more edge computing networks. Third information is obtained that is descriptive of processing functionalities available at the one or more centralized computing networks. A processing location decision is generated for at least a portion of the given data set based on the obtained first, second and third information. Time cost information may also be obtained that is associated with processing of at least a portion of the given data set, and used to generate the processing location decision.Type: ApplicationFiled: July 17, 2019Publication date: January 21, 2021Inventors: Nicole Reineke, James R. King
-
Publication number: 20210011648Abstract: A data transfer request is received from an application program hosted at a first location in a computing environment for transferring a given data set to a second location in the computing environment. The data transfer request comprises information identifying one or more data types of the given data set and one or more preferences associated with the transfer of the given data set. The second location is notified of the data transfer request. The method causes deployment of one or more data-aware services to optimize the given data set prior to transfer to the second location, wherein optimizing the given data set is performed based on the one or more data types of the given data set and the one or more preferences associated with the transfer of the given data set. For example, the data-aware services at the first location may comprise data deduplication and/or data compression.Type: ApplicationFiled: July 10, 2019Publication date: January 14, 2021Inventors: Nicole Reineke, James R. King, Justin A. Kenney, Robert A. Lincourt