Patents by Inventor Ricardo Noriega De Soto
Ricardo Noriega De Soto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11977907Abstract: Events to be executed by one or more serverless functions are received from an events queue. A determination that a first set of the events are to be executed by one or more serverless functions at a local host system and a second set of the events are to be executed at one or more serverless functions at a remote host system is made. The first set of the events are directed to the one or more serverless functions at the local host system and the second set of the events are directed to the one or more serverless functions at the remote host system.Type: GrantFiled: March 16, 2021Date of Patent: May 7, 2024Assignee: Red Hat, Inc.Inventors: Roland Ludwig Huss, Huamin Chen, Ricardo Noriega De Soto
-
Patent number: 11924031Abstract: Systems and methods for providing a container network interface (CNI) specification that has been modified with a set of annotations, a set of operations, and a set of policies to provide network configuration reuse, network configuration replication, and database management (garbage collection) functionality are described. In response to receiving a request to initiate a function, whether the function is to be reused or replicated may be determined. In response to determining that the function is to be reused, calling a container network interface (CNI) plugin with a first operation that decouples database functions from network functions, so that the database can cache and reuse a network configuration generated for the function. In response to determining that the function is to be replicated, calling the CNI plugin with a second operation to create the network configuration and generate and store a template of the network configuration in the database.Type: GrantFiled: September 7, 2021Date of Patent: March 5, 2024Assignee: Red Hat, Inc.Inventors: Douglas Smith, Huamin Chen, Ricardo Noriega De Soto
-
Publication number: 20230376335Abstract: A request is received over a network. The request is directed to a service provided by an application of a cluster infrastructure. The cluster infrastructure includes the application and a control plane to schedule execution of the application. Responsive to receiving the request, the control plane of the cluster infrastructure is transitioned from a stopped state to an active state. The request is transferred to the cluster infrastructure.Type: ApplicationFiled: May 19, 2022Publication date: November 23, 2023Inventors: Huamin Chen, Chen Wang, Ricardo Noriega De Soto
-
Patent number: 11783070Abstract: Sensitive information can be managed using a trusted platform module. For example, a system can encrypt target information using a cryptographic key to generate encrypted data. The system can also receive an encrypted key from a trusted platform module, where the encrypted key is a version of the cryptographic key that is encrypted using a public key stored in the trusted platform module. The system can then transmit the encrypted data and the encrypted key to a remote computing system, for example to store the encrypted data and the encrypted key on the remote computing system. Using these techniques, the target information may be secured and stored in remote locations.Type: GrantFiled: April 19, 2021Date of Patent: October 10, 2023Assignee: Red Hat, Inc.Inventors: Ricardo Noriega De Soto, Michael Bursell, Huamin Chen
-
SELECTING TRAINING NODES FOR TRAINING MACHINE-LEARNING MODELS IN A DISTRIBUTED COMPUTING ENVIRONMENT
Publication number: 20230186143Abstract: Training nodes can be selected for use in training a machine-learning model according to some aspects described herein. In one example, a system can receive performance-metric values generated by training nodes, where the training nodes are configured to generate the performance-metric values by implementing an evaluation phase in which the training nodes partially train models using first training data. The system can select a subset of the training nodes based on the performance-metric values. The system can then transmit commands to the subset of training nodes for causing the subset of training nodes to implement a training phase in which the subset of training nodes further train the models using second training data.Type: ApplicationFiled: December 9, 2021Publication date: June 15, 2023Inventors: Huamin Chen, Ricardo Noriega De Soto -
Publication number: 20230156004Abstract: A method includes initiating, by a device manager associated with a cluster manager proxy, a connection with a cluster of computing devices, wherein initiating the connection includes providing first credentials to the cluster of computing devices to access the cluster manager proxy. The method further includes receiving, at the cluster manager proxy, a first request to register the cluster of computing devices with a cluster manager, the first request including the first credentials to access the cluster manager proxy and sending, from the cluster manager proxy to the cluster manager, a second request to register the cluster of computing devices with the cluster manager, the second request including second credentials to access the cluster manager.Type: ApplicationFiled: November 15, 2021Publication date: May 18, 2023Inventors: Jonathan Hal Cope, Huamin Chen, Ricardo Noriega De Soto, Frank Alexander Zdarsky
-
Publication number: 20230070242Abstract: Systems and methods for providing a container network interface (CNI) specification that has been modified with a set of annotations, a set of operations, and a set of policies to provide network configuration reuse, network configuration replication, and database management (garbage collection) functionality are described. In response to receiving a request to initiate a function, whether the function is to be reused or replicated may be determined. In response to determining that the function is to be reused, calling a container network interface (CNI) plugin with a first operation that decouples database functions from network functions, so that the database can cache and reuse a network configuration generated for the function. In response to determining that the function is to be replicated, calling the CNI plugin with a second operation to create the network configuration and generate and store a template of the network configuration in the database.Type: ApplicationFiled: September 7, 2021Publication date: March 9, 2023Inventors: Douglas Smith, Huamin Chen, Ricardo Noriega De Soto
-
Patent number: 11513737Abstract: Data overflows can be prevented in edge computing systems. For example, an edge computing system (ECS) can include a memory buffer for storing incoming data from client devices. The ECS can also include a local storage device. The ECS can determine that an amount of available storage space in the local storage device is less than a predefined threshold amount. Based on determining that the amount of available storage space is less than the predefined threshold amount, the ECS can prevent the incoming data from being retrieved from the memory buffer. And based on determining that the amount of available storage space is greater than or equal to the predefined threshold amount, the ECS can retrieve the incoming data from the memory buffer and store the incoming data in the local storage device. This may prevent data overflows associated with the local storage device.Type: GrantFiled: April 16, 2021Date of Patent: November 29, 2022Assignee: RED HAT, INC.Inventors: Yehuda Sadeh-Weinraub, Huamin Chen, Ricardo Noriega De Soto
-
Publication number: 20220377148Abstract: Resource utilization in edge-computing clusters and other computing clusters can be improved according to some aspects described herein. For example, an event handler can detect an event involving a state change to a data object. In response to detecting the event, the event handler can access an event registry storing relationships between a group of controllers and a group of events that are to be handled by the group of controllers. The event handler can determine, using the event registry, a controller that is configured to handle the event. The event handler can then transmit a command over a network to a computing cluster that includes a reconciler associated with the controller, where the command is for causing the reconciler to perform a reconciliation operation with respect to the data object. Separating the event-handling logic from the reconciliation logic in this way may improve resource utilization.Type: ApplicationFiled: May 21, 2021Publication date: November 24, 2022Inventors: Sebastien Han, Ricardo Noriega De Soto, Huamin Chen
-
Patent number: 11503124Abstract: Resource utilization in edge-computing clusters and other computing clusters can be improved according to some aspects described herein. For example, an event handler can detect an event involving a state change to a data object. In response to detecting the event, the event handler can access an event registry storing relationships between a group of controllers and a group of events that are to be handled by the group of controllers. The event handler can determine, using the event registry, a controller that is configured to handle the event. The event handler can then transmit a command over a network to a computing cluster that includes a reconciler associated with the controller, where the command is for causing the reconciler to perform a reconciliation operation with respect to the data object. Separating the event-handling logic from the reconciliation logic in this way may improve resource utilization.Type: GrantFiled: May 21, 2021Date of Patent: November 15, 2022Assignee: RED HAT, INC.Inventors: Sebastien Han, Ricardo Noriega De Soto, Huamin Chen
-
Publication number: 20220334764Abstract: Data overflows can be prevented in edge computing systems. For example, an edge computing system (ECS) can include a memory buffer for storing incoming data from client devices. The ECS can also include a local storage device. The ECS can determine that an amount of available storage space in the local storage device is less than a predefined threshold amount. Based on determining that the amount of available storage space is less than the predefined threshold amount, the ECS can prevent the incoming data from being retrieved from the memory buffer. And based on determining that the amount of available storage space is greater than or equal to the predefined threshold amount, the ECS can retrieve the incoming data from the memory buffer and store the incoming data in the local storage device. This may prevent data overflows associated with the local storage device.Type: ApplicationFiled: April 16, 2021Publication date: October 20, 2022Inventors: Yehuda Sadeh-Weinraub, Huamin Chen, Ricardo Noriega De Soto
-
Publication number: 20220335142Abstract: Sensitive information can be managed using a trusted platform module. For example, a system can encrypt target information using a cryptographic key to generate encrypted data. The system can also receive an encrypted key from a trusted platform module, where the encrypted key is a version of the cryptographic key that is encrypted using a public key stored in the trusted platform module. The system can then transmit the encrypted data and the encrypted key to a remote computing system, for example to store the encrypted data and the encrypted key on the remote computing system. Using these techniques, the target information may be secured and stored in remote locations.Type: ApplicationFiled: April 19, 2021Publication date: October 20, 2022Inventors: Ricardo Noriega De Soto, Michael Bursell, Huamin Chen
-
Publication number: 20220318065Abstract: Computer workloads can be managed across distributed computing clusters according to some aspects of the present disclosure. In one example, a system can receive a request from a workload manager for identifying a computing cluster to which to assign a workload. The system can determine that the workload is to be assigned to a particular computing cluster among a plurality of computing clusters based on historical information about replica deployment by the particular computing cluster. The system can then transmit a response to the workload manager for causing the workload manager to assign the workload to the particular computing cluster.Type: ApplicationFiled: April 2, 2021Publication date: October 6, 2022Inventors: Huamin Chen, Ricardo Noriega De Soto
-
Publication number: 20220300312Abstract: Events to be executed by one or more serverless functions are received from an events queue. A determination that a first set of the events are to be executed by one or more serverless functions at a local host system and a second set of the events are to be executed at one or more serverless functions at a remote host system is made. The first set of the events are directed to the one or more serverless functions at the local host system and the second set of the events are directed to the one or more serverless functions at the remote host system.Type: ApplicationFiled: March 16, 2021Publication date: September 22, 2022Inventors: Roland Ludwig Huss, Huamin Chen, Ricardo Noriega De Soto