Patents by Inventor Ricardo Noriega De Soto

Ricardo Noriega De Soto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11977907
    Abstract: Events to be executed by one or more serverless functions are received from an events queue. A determination that a first set of the events are to be executed by one or more serverless functions at a local host system and a second set of the events are to be executed at one or more serverless functions at a remote host system is made. The first set of the events are directed to the one or more serverless functions at the local host system and the second set of the events are directed to the one or more serverless functions at the remote host system.
    Type: Grant
    Filed: March 16, 2021
    Date of Patent: May 7, 2024
    Assignee: Red Hat, Inc.
    Inventors: Roland Ludwig Huss, Huamin Chen, Ricardo Noriega De Soto
  • Patent number: 11924031
    Abstract: Systems and methods for providing a container network interface (CNI) specification that has been modified with a set of annotations, a set of operations, and a set of policies to provide network configuration reuse, network configuration replication, and database management (garbage collection) functionality are described. In response to receiving a request to initiate a function, whether the function is to be reused or replicated may be determined. In response to determining that the function is to be reused, calling a container network interface (CNI) plugin with a first operation that decouples database functions from network functions, so that the database can cache and reuse a network configuration generated for the function. In response to determining that the function is to be replicated, calling the CNI plugin with a second operation to create the network configuration and generate and store a template of the network configuration in the database.
    Type: Grant
    Filed: September 7, 2021
    Date of Patent: March 5, 2024
    Assignee: Red Hat, Inc.
    Inventors: Douglas Smith, Huamin Chen, Ricardo Noriega De Soto
  • Publication number: 20230376335
    Abstract: A request is received over a network. The request is directed to a service provided by an application of a cluster infrastructure. The cluster infrastructure includes the application and a control plane to schedule execution of the application. Responsive to receiving the request, the control plane of the cluster infrastructure is transitioned from a stopped state to an active state. The request is transferred to the cluster infrastructure.
    Type: Application
    Filed: May 19, 2022
    Publication date: November 23, 2023
    Inventors: Huamin Chen, Chen Wang, Ricardo Noriega De Soto
  • Patent number: 11783070
    Abstract: Sensitive information can be managed using a trusted platform module. For example, a system can encrypt target information using a cryptographic key to generate encrypted data. The system can also receive an encrypted key from a trusted platform module, where the encrypted key is a version of the cryptographic key that is encrypted using a public key stored in the trusted platform module. The system can then transmit the encrypted data and the encrypted key to a remote computing system, for example to store the encrypted data and the encrypted key on the remote computing system. Using these techniques, the target information may be secured and stored in remote locations.
    Type: Grant
    Filed: April 19, 2021
    Date of Patent: October 10, 2023
    Assignee: Red Hat, Inc.
    Inventors: Ricardo Noriega De Soto, Michael Bursell, Huamin Chen
  • Publication number: 20230186143
    Abstract: Training nodes can be selected for use in training a machine-learning model according to some aspects described herein. In one example, a system can receive performance-metric values generated by training nodes, where the training nodes are configured to generate the performance-metric values by implementing an evaluation phase in which the training nodes partially train models using first training data. The system can select a subset of the training nodes based on the performance-metric values. The system can then transmit commands to the subset of training nodes for causing the subset of training nodes to implement a training phase in which the subset of training nodes further train the models using second training data.
    Type: Application
    Filed: December 9, 2021
    Publication date: June 15, 2023
    Inventors: Huamin Chen, Ricardo Noriega De Soto
  • Publication number: 20230156004
    Abstract: A method includes initiating, by a device manager associated with a cluster manager proxy, a connection with a cluster of computing devices, wherein initiating the connection includes providing first credentials to the cluster of computing devices to access the cluster manager proxy. The method further includes receiving, at the cluster manager proxy, a first request to register the cluster of computing devices with a cluster manager, the first request including the first credentials to access the cluster manager proxy and sending, from the cluster manager proxy to the cluster manager, a second request to register the cluster of computing devices with the cluster manager, the second request including second credentials to access the cluster manager.
    Type: Application
    Filed: November 15, 2021
    Publication date: May 18, 2023
    Inventors: Jonathan Hal Cope, Huamin Chen, Ricardo Noriega De Soto, Frank Alexander Zdarsky
  • Publication number: 20230070242
    Abstract: Systems and methods for providing a container network interface (CNI) specification that has been modified with a set of annotations, a set of operations, and a set of policies to provide network configuration reuse, network configuration replication, and database management (garbage collection) functionality are described. In response to receiving a request to initiate a function, whether the function is to be reused or replicated may be determined. In response to determining that the function is to be reused, calling a container network interface (CNI) plugin with a first operation that decouples database functions from network functions, so that the database can cache and reuse a network configuration generated for the function. In response to determining that the function is to be replicated, calling the CNI plugin with a second operation to create the network configuration and generate and store a template of the network configuration in the database.
    Type: Application
    Filed: September 7, 2021
    Publication date: March 9, 2023
    Inventors: Douglas Smith, Huamin Chen, Ricardo Noriega De Soto
  • Patent number: 11513737
    Abstract: Data overflows can be prevented in edge computing systems. For example, an edge computing system (ECS) can include a memory buffer for storing incoming data from client devices. The ECS can also include a local storage device. The ECS can determine that an amount of available storage space in the local storage device is less than a predefined threshold amount. Based on determining that the amount of available storage space is less than the predefined threshold amount, the ECS can prevent the incoming data from being retrieved from the memory buffer. And based on determining that the amount of available storage space is greater than or equal to the predefined threshold amount, the ECS can retrieve the incoming data from the memory buffer and store the incoming data in the local storage device. This may prevent data overflows associated with the local storage device.
    Type: Grant
    Filed: April 16, 2021
    Date of Patent: November 29, 2022
    Assignee: RED HAT, INC.
    Inventors: Yehuda Sadeh-Weinraub, Huamin Chen, Ricardo Noriega De Soto
  • Publication number: 20220377148
    Abstract: Resource utilization in edge-computing clusters and other computing clusters can be improved according to some aspects described herein. For example, an event handler can detect an event involving a state change to a data object. In response to detecting the event, the event handler can access an event registry storing relationships between a group of controllers and a group of events that are to be handled by the group of controllers. The event handler can determine, using the event registry, a controller that is configured to handle the event. The event handler can then transmit a command over a network to a computing cluster that includes a reconciler associated with the controller, where the command is for causing the reconciler to perform a reconciliation operation with respect to the data object. Separating the event-handling logic from the reconciliation logic in this way may improve resource utilization.
    Type: Application
    Filed: May 21, 2021
    Publication date: November 24, 2022
    Inventors: Sebastien Han, Ricardo Noriega De Soto, Huamin Chen
  • Patent number: 11503124
    Abstract: Resource utilization in edge-computing clusters and other computing clusters can be improved according to some aspects described herein. For example, an event handler can detect an event involving a state change to a data object. In response to detecting the event, the event handler can access an event registry storing relationships between a group of controllers and a group of events that are to be handled by the group of controllers. The event handler can determine, using the event registry, a controller that is configured to handle the event. The event handler can then transmit a command over a network to a computing cluster that includes a reconciler associated with the controller, where the command is for causing the reconciler to perform a reconciliation operation with respect to the data object. Separating the event-handling logic from the reconciliation logic in this way may improve resource utilization.
    Type: Grant
    Filed: May 21, 2021
    Date of Patent: November 15, 2022
    Assignee: RED HAT, INC.
    Inventors: Sebastien Han, Ricardo Noriega De Soto, Huamin Chen
  • Publication number: 20220334764
    Abstract: Data overflows can be prevented in edge computing systems. For example, an edge computing system (ECS) can include a memory buffer for storing incoming data from client devices. The ECS can also include a local storage device. The ECS can determine that an amount of available storage space in the local storage device is less than a predefined threshold amount. Based on determining that the amount of available storage space is less than the predefined threshold amount, the ECS can prevent the incoming data from being retrieved from the memory buffer. And based on determining that the amount of available storage space is greater than or equal to the predefined threshold amount, the ECS can retrieve the incoming data from the memory buffer and store the incoming data in the local storage device. This may prevent data overflows associated with the local storage device.
    Type: Application
    Filed: April 16, 2021
    Publication date: October 20, 2022
    Inventors: Yehuda Sadeh-Weinraub, Huamin Chen, Ricardo Noriega De Soto
  • Publication number: 20220335142
    Abstract: Sensitive information can be managed using a trusted platform module. For example, a system can encrypt target information using a cryptographic key to generate encrypted data. The system can also receive an encrypted key from a trusted platform module, where the encrypted key is a version of the cryptographic key that is encrypted using a public key stored in the trusted platform module. The system can then transmit the encrypted data and the encrypted key to a remote computing system, for example to store the encrypted data and the encrypted key on the remote computing system. Using these techniques, the target information may be secured and stored in remote locations.
    Type: Application
    Filed: April 19, 2021
    Publication date: October 20, 2022
    Inventors: Ricardo Noriega De Soto, Michael Bursell, Huamin Chen
  • Publication number: 20220318065
    Abstract: Computer workloads can be managed across distributed computing clusters according to some aspects of the present disclosure. In one example, a system can receive a request from a workload manager for identifying a computing cluster to which to assign a workload. The system can determine that the workload is to be assigned to a particular computing cluster among a plurality of computing clusters based on historical information about replica deployment by the particular computing cluster. The system can then transmit a response to the workload manager for causing the workload manager to assign the workload to the particular computing cluster.
    Type: Application
    Filed: April 2, 2021
    Publication date: October 6, 2022
    Inventors: Huamin Chen, Ricardo Noriega De Soto
  • Publication number: 20220300312
    Abstract: Events to be executed by one or more serverless functions are received from an events queue. A determination that a first set of the events are to be executed by one or more serverless functions at a local host system and a second set of the events are to be executed at one or more serverless functions at a remote host system is made. The first set of the events are directed to the one or more serverless functions at the local host system and the second set of the events are directed to the one or more serverless functions at the remote host system.
    Type: Application
    Filed: March 16, 2021
    Publication date: September 22, 2022
    Inventors: Roland Ludwig Huss, Huamin Chen, Ricardo Noriega De Soto