USAGE-BASED OPTIMIZATION OF SOFTWARE CONFIGURATIONS
Granted: May 9, 2024
Application Number:
20240152355
Techniques for configuring a software system include generating a hierarchy of entities representing usage of the software system by a set of users, wherein the hierarchy includes a first set of nodes representing a set of tasks, a second set of nodes representing a set of components that implement the tasks, and a set of edges between the first set of nodes and the second set of nodes. The techniques also include updating the hierarchy based on a first set of configurations for the…
DYNAMIC IP ROUTING IN A CLOUD ENVIRONMENT
Granted: May 9, 2024
Application Number:
20240154904
The present disclosure provides dynamic routing for data flows to a customer network hosted in the cloud. A plurality of compute instances may share a common virtual IP address. Each of the plurality of compute instances may advertise information to a respective network virtualization device (NVD). The information may include the IP address, cost, and/or active/standby status of the compute instance. The NVD may then provide the information to the control plane of a virtual cloud network…
TECHNIQUES FOR ORCHESTRATED LOAD SHEDDING
Granted: May 9, 2024
Application Number:
20240154418
Disclosed techniques relate to orchestrating power consumption reductions across a number of hosts. A number of response levels may be utilized, each having an association to a corresponding set of reduction actions. The impact to customers, hosts, and/or workloads can be computed at run time based on current and/or predicted conditions and workloads, and a particular response level can be selected based on the computed impact. These techniques enable a sufficient, but least impactful…
TECHNIQUES FOR ORCHESTRATED LOAD SHEDDING
Granted: May 9, 2024
Application Number:
20240154417
Disclosed techniques relate to orchestrating power consumption reductions across a number of hosts. Power consumption of power-drawing devices (e.g., hosts, servers, etc.) may be monitored with respect to a power threshold. When the current power consumption corresponding to those devices breaches the power threshold, or at any suitable time, the system may identify a set of reduction actions configured to reduce aggregate power consumption. The power threshold may be updated dynamically…
TECHNIQUES FOR ORCHESTRATED LOAD SHEDDING
Granted: May 9, 2024
Application Number:
20240154415
Disclosed techniques relate to orchestrating power consumption reductions across a number of hosts. A current value for an aggregate power threshold of a plurality of hosts may be identified. During a first time period, an aggregate power consumption of the plurality of hosts may be managed using the current value for the aggregate power threshold. A triggering event indicating a modification to the aggregate power threshold is needed may be detected. A new value for the aggregate power…
TECHNIQUES FOR AN IMAGE AUTO QUALIFICATION SERVICE
Granted: May 9, 2024
Application Number:
20240153060
The present disclosure is directed to devices and techniques for auto-qualifying images on new hardware or infrastructure configurations. The systems and methods include initiating an auto-qualification process for pre-testing one or more images registered within a bare metal system having one or more new infrastructure configurations, discovering all of the one or more images registered for use within the bare metal system, booting each of the one or more registered images into an…
SMART CONTRACT VERIFICATION
Granted: May 9, 2024
Application Number:
20240152915
Techniques for generating smart contract transaction data from a program embedded in the smart contract are disclosed. A distributed ledger system stores a smart contract specifying conditions of a transaction. Based on a user input to initiate the transaction, the system executes the smart contract transaction on the distributed ledger. A node executing the smart contract transaction executes the transaction verification program embedded within the smart contract. The transaction…
ROUTING IN A GPU SUPER-CLUSTER
Granted: May 9, 2024
Application Number:
20240152409
A plurality of GPU clusters are communicatively coupled with one another via a plurality of network devices arranged in a hierarchical structure, wherein the GPU clusters includes at least a first GPU cluster operating at a first speed and a second GPU cluster operating at a second speed that is different than the first speed. A routing policy is configured for each network device, wherein the configuring includes establishing a mapping of each incoming port-link of the network device to…
SUPERCLUSTER NETWORK OF GRAPHICAL PROCESSING UNITS (GPUS)
Granted: May 9, 2024
Application Number:
20240152396
Described herein is a network fabric including a plurality of graphical processing unit (GPU) clusters. The plurality of GPU clusters includes at least a first GPU cluster operating at a first speed and a second GPU cluster operating at a second speed that is different than the first speed. The network fabric includes a plurality of blocks, wherein each block includes: (a) one or more racks that host a GPU cluster, and (b) a plurality of switches arranged in a hierarchical structure that…
DIRECT LAUNCH FOR ASYNCHRONOUS ACTIONS
Granted: May 9, 2024
Application Number:
20240152389
Techniques are disclosed herein for a direct launch for asynchronous actions. An example method can include receiving, by a device, a first workflow request, wherein the device comprises a first launcher in operable communication with a second launcher via a shared queue, and wherein a first duplicate of the first workflow request is stored in the shared queue is to be retrieved by the second launcher upon an elapsing of a threshold time interval. The device can transmit the workflow…
Dynamic Cloud Workload Reallocation Based On Active Security Exploits In Dynamic Random Access Memory (DRAM)
Granted: May 2, 2024
Application Number:
20240146764
The present embodiments relate to identifying and mitigating memory bit flips in a cloud infrastructure service. The cloud infrastructure service can provide a monitoring system to monitor low level memory space to detect bit flips by the DRAM instances in the cloud infrastructure service. The bit flips detected in various DRAM computing instances can be processed to verify that the bit flips are sustained (e.g., and possibly relating to a Rowhammer attack) rather than transitory bit…
OBTAINING A DOMAIN CERTIFICATE UTILIZING A PROXY SERVER
Granted: May 2, 2024
Application Number:
20240146543
According to certain implementations, a certificate management service of a cloud service provider requests a certificate for a domain from a certificate authority utilizing an HTTP-based challenge. The certificate authority responds with a challenge string and a subdirectory within the domain. The challenge string and subdirectory within the domain are sent from the certificate management service to a proxy server of the cloud service provider that manages a flow of data to a host that…
USING A GENERATIVE ADVERSARIAL NETWORK TO TRAIN A SEMANTIC PARSER OF A DIALOG SYSTEM
Granted: May 2, 2024
Application Number:
20240144923
Disclosed herein are techniques for using a generative adversarial network (GAN) to train a semantic parser of a dialog system. A method described herein involves accessing seed data that includes seed tuples. Each seed tuple includes a respective seed utterance and a respective seed logical form corresponding to the respective seed utterance. The method further includes training a semantic parser and a discriminator in a GAN. The semantic parser learns to map utterances to logical forms…
CONTINUAL LEARNING TECHNIQUES FOR TRAINING MODELS
Granted: May 2, 2024
Application Number:
20240144081
Continual learning techniques are described for extending the capabilities of a base model, which is trained to predict a set of existing or base classes, to generate a target model that is capable of making predictions for both the existing or base classes and additionally for making predictions for new or custom classes. The techniques described herein enable the target model to be trained such that the model can make predictions involving both base classes and custom classes with high…
MULTI-TASK MODEL WITH CONTEXT MASKING
Granted: May 2, 2024
Application Number:
20240143934
A method includes accessing document including sentences, document being associated with configuration flag indicating whether ABSA, SLSA, or both are to be performed; inputting the document into language model that generates chunks of token embeddings for the document; and, based on the configuration flag, performing at least one from among the ABSA and the SLSA by inputting the chunks of token embeddings into a multi-task model. When performing the SLSA, a part of token embeddings in…
REPLICATING RESOURCES BETWEEN REGIONAL DATA CENTERS
Granted: May 2, 2024
Application Number:
20240143459
In response to a request to replicate resources from a primary region data center to a secondary region data center, an executable configuration file that describes the resources and their configuration is created utilizing information about the resources at the primary region data center. A correspondence table is also updated to include entries for to such resources. Utilizing the correspondence table, the executable configuration file is transformed to create a transformed executable…
TIME-BOUND LIVE MIGRATION WITH MINIMAL STOP-AND-COPY
Granted: May 2, 2024
Application Number:
20240143370
A computing system may access a source device configured to store device traffic in a source device queue. The computing system may launch, by one or more worker nodes of a control plane of the computing device, a destination device. The computing system may transmit a source device state to the destination device. The control plane worker nodes may configure the destination device from the source device state. The computing system may instruct the source device to pause storing the…
INITIALIZING A CONTAINER ENVIRONMENT
Granted: May 2, 2024
Application Number:
20240143365
Techniques are described for creating a container environment that implements direct communications between pods. This includes the creation of a management component (such as a control plane) of the container environment, the creation of nodes within an implementation component (such as a data plane) of the container environment, and the attaching of virtualized network interface cards (VNICs) to each node. This also includes creating a custom resource for each node, where the custom…
Perspective-Preserving Seamless Application Switching
Granted: April 25, 2024
Application Number:
20240133705
Techniques for perspective-preserving seamless application switching are disclosed. A system may display a first interface using a first application. The first interface includes interface elements representing a plurality of objects. The system may detect a zoom-in command, received by the first application, requesting a particular zoom level for a first interface element, corresponding to a first object in the first plurality of objects. The system may determine that the requested zoom…
TECHNIQUES FOR EFFICIENT ENCRYPTION AND DECRYPTION DURING FILE SYSTEM CROSS-REGION REPLICATION
Granted: April 25, 2024
Application Number:
20240134828
Techniques are described for a hierarchical caching mechanism enabling efficient cross-region replications. In some embodiments, replication-related information (e.g., key-value pairs) is stored in a particular layout in a binary tree (B-tree) of a file system for replication processing. A hierarchy of caches storing a first type of information (e.g., crypto keys associated with iNodes) may be arranged to match the particular layout in the B-tree to enable efficient parallel processing…