DETAILED ACTION
The instant application having Application No. 18/765,514 filed on 07/08/2024 is presented for examination by the examiner.
Claim 1- is/are pending in the application.
Claims 1, 8 and 15 is/are independent claims.
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Examiner Notes
Examiner cites particular columns and line numbers in the references as applied to the claims below for the convenience of the applicant. Although the specified citations are representative of the teachings in the art and are applied to the specific limitations within the individual claim, other passages and figures may apply as well. It is respectfully requested that, in preparing responses, the applicant fully consider the references in entirety as potentially teaching all or part of the claimed invention, as well as the context of the passage as taught by the prior art or disclosed by the examiner.
Drawings
The applicant’s drawings submitted are acceptable for examination purposes.
Information Disclosure Statement
As required by M.P.E.P. 609, the applicant’s submissions of the Information Disclosure Statement dated 07/08/2024 are acknowledged by the examiner and the cited references have been considered in the examination of the claims now pending.
Specification Objections
The disclosure is objected to because of the following informalities: under “Cross-reference to related applications” section, the status of U.S Patent Application No. 17/508822 now is patented need to be updated.
Appropriate correction is required.
Double Patenting
The nonstatutory double patenting rejection is based on a judicially created doctrine grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or improper timewise extension of the “right to exclude” granted by a patent and to prevent possible harassment by multiple assignees. A nonstatutory obviousness-type double patenting rejection is appropriate where the conflicting claims are not identical, but at least one examined application claim is not patentably distinct from the reference claim(s) because the examined application claim is either anticipated by, or would have been obvious over, the reference claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); and In re Thorington, 418 F.2d 528, 163 USPQ 644 (CCPA 1969).
A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may be used to overcome an actual or provisional rejection based on a nonstatutory double patenting ground provided the conflicting application or patent either is shown to be commonly owned with this application, or claims an invention made as a result of activities undertaken within the scope of a joint research agreement.
Effective January 1, 1994, a registered attorney or agent of record may sign a terminal disclaimer. A terminal disclaimer signed by the assignee must fully comply with 37 CFR 3.73(b).
Initially, it should be noted that the present application and Application No. 17/508822, have the same inventive entity. The assignee for both applications is Commvault System, INC.
Claims 1-20 are rejected on the ground of nonstatutory obviousness-type double patenting as being unpatentable over claims 1-20 of patent #12033004. Although the conflicting claims are not identical, they are not patentably distinct from each other. Claims 1-20 are compared to claim 1-20 of patent #12033004 in the following table:
Instant Application
US patent #12033004
1. A system for providing on-demand computing resources to an information management system that manages backup and restore operations to a plurality of client computing devices, the system comprising:
one or more non-transitory, computer-readable media having computer-executable instructions stored thereon; and
one or more processors that, having executed the computer-executable instructions, configure the system to perform a plurality of operations comprising:
receiving a computing resource request for computing resources from an information management system;
provisioning a plurality of computing pods based on the computing resource request;
selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system;
applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; and
applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods.
2.The system of claim 1, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system.
3. The system of claim 1, wherein the computing pod configuration policy provides
access credentials to the at least one computing pod for accessing the primary data of the particular primary data source.
4.The system of claim 1, wherein the computing pod is instantiated as a virtual
computing device that uses one or more computing resources provided by a computing
resource cluster on which the computing pod is instantiated.
5.The system of claim 1, wherein the plurality of operations further comprises:
monitoring usage of computing resources by the at least one computing pod of the
provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing
pod exceeds one or more usage thresholds; and provisioning one or more additional computing pods for satisfying the computing
resource request based on a determination that the usage of the computing resources by the
at least one computing pod exceeds the one or more usage thresholds.
6.The system of claim 1, wherein the plurality of operations further comprises:
monitoring usage of computing resources by the at least one computing pod of the
provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing
pod does not exceed one or more usage thresholds for a predetermined amount of time; and
deconstructing the at least one provisioned pod, wherein deconstructing the at least
one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods.
7.The system of claim 1, wherein the plurality of operations further comprises:
updating a database of provisioned computing pods to identify those computing pods
that have been provisioned as the provisioned plurality of computing pods;
monitoring a status of one or more computing pods of the provisioned plurality of
computing pods; and
updating the database of provisioned computing pods to identify that a provisioned
computing pod of the provisioned plurality of computing pods has become available based
on a change in the status of the provisioned computing pod.
8.A method for providing on-demand computing resources to an information
management system that manages backup and restore operations to a plurality of client
computing devices, the method comprising:
receiving a computing resource request for computing resources from an information
management system;
provisioning a plurality of computing pods based on the computing resource request;
selecting a pre-configured container image from a plurality of pre-configured container
images based on the computing resource request, wherein the pre-configured container
image configures a computing pod to create secondary copies of primary data from a
particular primary data source of the information management system;
applying the selected pre-configured container image to at least one computing pod
of the provisioned plurality of computing pods; and
applying a computing pod configuration policy to the at least one computing pod of the
provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system.
9.The method of claim 8, wherein each pre-configured container image of the plurality
of pre-configured container images corresponds to a different primary data source of the information management system.
10.The method of claim 8, wherein the computing pod configuration policy provides
access credentials to the at least one computing pod for accessing the primary data of the particular primary data source.
11.The method of claim 8, wherein the computing pod is instantiated as a virtual
computing device that uses one or more computing resources provided by a computing
resource cluster on which the computing pod is instantiated.
12.The method of claim 8, wherein the method further comprises:
monitoring usage of computing resources by the at least one computing pod of the
provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing
pod exceeds one or more usage thresholds; and
provisioning one or more additional computing pods for satisfying the computing
resource request based on a determination that the usage of the computing resources by the
at least one computing pod exceeds the one or more usage thresholds.
13.The method of claim 8, wherein the method further comprises:
monitoring usage of computing resources by the at least one computing pod of the
provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing
pod does not exceed one or more usage thresholds for a predetermined amount of time; and
deconstructing the at least one provisioned pod, wherein deconstructing the at least
one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods.
14.The method of claim 8, wherein the method further comprises:
updating a database of provisioned computing pods to identify those computing pods
that have been provisioned as the provisioned plurality of computing pods;
monitoring a status of one or more computing pods of the provisioned plurality of
computing pods; and
updating the database of provisioned computing pods to identify that a provisioned
computing pod of the provisioned plurality of computing pods has become available based
on a change in the status of the provisioned computing pod.
15.A non-transitory, computer-readable media having computer-executable instructions
stored thereon that, when executed by one or more processors, cause a system to perform
a plurality of operations comprising:
receiving a computing resource request for computing resources an information
management system;
provisioning a plurality of computing pods based on the computing resource request;
selecting a pre-configured container image from a plurality of pre-configured container
images based on the computing resource request, wherein the pre-configured container
image configures a computing pod to create secondary copies of primary data from a
particular primary data source of the information management system;
applying the selected pre-configured container image to at least one computing pod
of the provisioned plurality of computing pods; and applying a computing pod configuration policy to the at least one computing pod of the
provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system.
16. The non-transitory, computer-readable media of claim 15, wherein each pre-
configured container image of the plurality of pre-configured container images corresponds
to a different primary data source of the information management system.
17.The non-transitory, computer-readable media of claim 15, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source.
18.
The non-transitory, computer-readable media of claim 15, wherein the computing pod
is instantiated as a virtual computing device that uses one or more computing resources
provided by a computing resource cluster on which the computing pod is instantiated.
19.The non-transitory, computer-readable media of claim 15, wherein the plurality of
operations further comprises:
monitoring usage of computing resources by the at least one computing pod of the
provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing
pod exceeds one or more usage thresholds; and provisioning one or more additional computing pods for satisfying the computing
resource request based on a determination that the usage of the computing resources by the
at least one computing pod exceeds the one or more usage thresholds.
20.The non-transitory, computer-readable media of claim 15, wherein the plurality of
operations further comprises:
monitoring usage of computing resources by the at least one computing pod of the
provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing
pod does not exceed one or more usage thresholds for a predetermined amount of time; and
deconstructing the at least one provisioned pod, wherein deconstructing the at least
one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods.
1. A system for providing on-demand computing resources to an information management system that manages backup and restore operations to a plurality of client computing devices, the system comprising:
one or more non-transitory, computer-readable media having computer-executable instructions stored thereon; and
one or more processors that, having executed the computer-executable instructions, configure the system to perform a plurality of operations comprising:
receiving a computing resource request for computing resources from a storage manager of an information management system;
provisioning a plurality of computing pods based on the computing resource request;
selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system;
applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods;
applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system; and
communicating a response to the storage manager that informs the storage manager of availability of the provisioned plurality of computing pods.
2. The system of claim 1, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system.
3. The system of claim 1, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source.
4. The system of claim 1, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated.
5. The system of claim 1, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds;
provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds; and communicating to the storage manager that the one or more additional computing pods are available for satisfying the computing resource request.
The system of claim 1, wherein the plurality of operations further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and
deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods.
7. The system of claim 1, wherein the plurality of operations further comprises:
updating a database of provisioned computing pods to identify those computing pods that have been provisioned as the provisioned plurality of computing pods;
monitoring a status of one or more computing pods of the provisioned plurality of computing pods;
updating the database of provisioned computing pods to identify that a provisioned computing pod of the provisioned plurality of computing pods has become available based on a change in the status of the provisioned computing pod; and
communicating a message to the storage manager that the provisioned computing pod is available for performing one or more operations assignable by the storage manager.
8. A method for providing on-demand computing resources to an information management system that manages backup and restore operations to a plurality of client computing devices, the method comprising: receiving a computing resource request for computing resources from a storage manager of an information management system;
provisioning a plurality of computing pods based on the computing resource request;
selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system;
applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods;
applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system; and
communicating a response to the storage manager that informs the storage manager of availability of the provisioned plurality of computing pods.
9. The method of claim 8, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system.
10. The method of claim 8, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source.
11. The method of claim 8, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated.
12. The method of claim 8, wherein the method further comprises:
monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods; determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds;
provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds; and communicating to the storage manager that the one or more additional computing pods are available for satisfying the computing resource request.
13. The method of claim 8, wherein the method further comprises: monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and
deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods.
14. The method of claim 8, wherein the method further comprises:
updating a database of provisioned computing pods to identify those computing pods that have been provisioned as the provisioned plurality of computing pods;
monitoring a status of one or more computing pods of the provisioned plurality of computing pods;
updating the database of provisioned computing pods to identify that a provisioned computing pod of the provisioned plurality of computing pods has become available based on a change in the status of the provisioned computing pod; and
communicating a message to the storage manager that the provisioned computing pod is available for performing one or more operations assignable by the storage manager.
15. A non-transitory, computer-readable media having computer-executable instructions stored thereon that, when executed by one or more processors, cause a system to perform a plurality of operations comprising:
receiving a computing resource request for computing resources from a storage manager of an information management system;
provisioning a plurality of computing pods based on the computing resource request;
selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system;
applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods;
applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods, wherein the computing pod configuration policy establishes a communication pathway between the at least one computing pod and the information management system; and
communicating a response to the storage manager that informs the storage manager of availability of the provisioned plurality of computing pods.
16. The non-transitory, computer-readable media of claim 15, wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system.
17. The non-transitory, computer-readable media of claim 15, wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source.
18. The non-transitory, computer-readable media of claim 15, wherein the computing pod is instantiated as a virtual computing device that uses one or more computing resources provided by a computing resource cluster on which the computing pod is instantiated.
19. The non-transitory, computer-readable media of claim 15, wherein the plurality of operations further comprises:
monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds;
provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds; and
communicating to the storage manager that the one or more additional computing pods are available for satisfying the computing resource request.
20. The non-transitory, computer-readable media of claim 15, wherein the plurality of operations further comprises:
monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods;
determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time; and
deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods.
It is clear that all the elements of the application claim 1-20 are to be found in patent claim 1-20. The difference between the application claim 1-20 and the patent claim 1-20 lies in the fact that the patent claim includes many more elements and is thus much more specific. Thus the invention of claim 1-20 of the patent is in effect a “species” of the “generic” invention of the application claim 1-20. It has been held that the generic invention is “anticipated” by the “species”. See In re Goodman, 29 USPQ2d 2010 (Fed. Cir. 1993). Since application claim 1-20 is anticipated by claim 1-20 the patent, it is not patentably distinct from claim 1-20 of the patent.
Claim Rejections - 35 USC §101
35 U.S.C. 101 reads as follows:
Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.
Claims 1-20, the claims are within at least one of the four categories of patent eligible subject matter as it is directing to a system/method/non-transitory computer readable media claims under Step 1. However, claim 1-3, 5-10, 12-17 and 19-20 are/is rejected under 35 USC 101 because the claims are/is directed to an abstract idea without being integrated into a practical application nor being significantly more.
Per claims 1, 8 and 15, the limitations “selecting a pre-configured container image …”, as drafted, recite functions that, under its broadest reasonable interpretation, covers functions that could reasonably be performed in the mind, including with the aid of pen and paper, but for the recitation of generic computer components. That is, the limitation “selecting a pre-configured container image …” as drafted, are functions that, under its broadest reasonable interpretation, recite the abstract idea of a mental process. The limitations encompass a human mind carrying out the functions through observation, evaluation, judgment and /or opinion, or even with the aid of pen and paper. Thus, these limitations recite and fall within the “Mental Processes” grouping of abstract ideas under Prong 1 Step 2A.
Under Prong 2 Step 2A, this judicial exception is not integrated into a practical application. The claim recites the following additional elements “one or more non-transitory computer readable media”, “one or more processors”, “providing on-demand resources”, “receiving a computing resource request …”, “provisioning a plurality or computing pods …”, “applying the selected pre-configured container image …” and “applying a computing pod …” “one or more non-transitory computer readable media”, and “one or more processors” are recited at a high-level of generality such that it amounts no more than mere instructions to apply the exception using a generic computer component, or merely a generic computer or generic computer components to perform the judicial exception. The addition element providing on-demand resources”, “receiving a computing resource request …”, and “provisioning a plurality or computing pods …” amount to a data gathering step and a mere generic transmission and presentation of collected and analyzed data which is considered to be insignificant extra solution activity (see MPEP 2106.05(g)). The additional limitations “applying the selected pre-configured container image …” and “applying a computing pod …” fails to meaningfully limit the claim because it does not require any particular application of the recited “applying” and is at best the equivalent of merely adding the words “apply it” to the judicial exception. Accordingly, the additional elements do not integrate the recited judicial exception into a practical application, and the claim is therefore directed to the judicial exception. See MPEP 2106.05(f).
Under Step 2B, the claims do not include additional elements that are sufficient to amount to significantly more than the judicial exception. As discussed above with respect to integration of the abstract idea as discussed above, the additional limitations “providing on-demand resources”, “receiving a computing resource request …”, “provisioning a plurality or computing pods …”, “applying the selected pre-configured container image …” and “applying a computing pod …” which do not amount to significantly more, thus, not an inventive concept, and the courts have identified gathering data, storing data, and outputting the result is well-understood, routine and conventional activity (Berkheimer v. HP, Inc., 881 F.3d 1360, 1368, 125 USPQ2d 1649, 1654 (Fed. Cir. 2018)), thus, cannot amount to an inventive concept.. Accordingly, the claim does not appear to be patent eligible under 35 USC 101. See MPEP 2106.05(d).
Regarding claims 2, 9 and 16, under prong 2, the “wherein each pre-configured container image of the plurality of pre-configured container images corresponds to a different primary data source of the information management system” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above.
Regarding claims 3, 10, and 17, under prong 2, the “wherein the computing pod configuration policy provides access credentials to the at least one computing pod for accessing the primary data of the particular primary data source” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above.
Regarding claims 5, 12, and 19, the limitation “monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods”, and “determining whether usage of the computing resources by the at least one computing pod exceeds one or more usage thresholds” is an additional metal process under prong 1. Under prong 2, the “provisioning one or more additional computing pods for satisfying the computing resource request based on a determination that the usage of the computing resources by the at least one computing pod exceeds the one or more usage thresholds” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above.
Regarding claims 6, 13, and 20, the limitation “monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods”, and “determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time” is an additional metal process under prong 1. Under prong 2, the “deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above.
Regarding claims 7, and 14, the limitation “monitoring usage of computing resources by the at least one computing pod of the provisioned plurality of computing pods”, and “determining whether usage of the computing resources by the at least one computing pod does not exceed one or more usage thresholds for a predetermined amount of time” is an additional metal process under prong 1. Under prong 2, the “deconstructing the at least one provisioned pod, wherein deconstructing the at least one provisioned pod removes the at least one provisioned pod from the provisioned plurality of computing pods” limitations are additional elements that recite insignificant extra solution activity which do not amount to a practical application, nor amount to significantly more under step 2B as explained above.
Allowable Subject Matter
Claims 1-20 would be allowable if rewritten to overcome the rejection(s) under 101, set forth in this Office action.
The following prior art made of record and not relied upon is cited to establish the level of skill in the applicant’s art and those arts considered reasonably pertinent to applicant’s disclosure. See MPEP 707.05(c).
Prior arts:
US 2021/0311762 to Shepheard
Image service 218 is configured to download and extract container images to shared storage 170 such that the container images can be mounted by pod VMs 130. Image service 218 is also responsible for managing the storage available for container images within shared storage 170. This includes managing authentication with image registry 190, assuring providence of container images by verifying signatures, updating container images when necessary, and garbage collecting unused container images.
US 2018/0341449 to Yoshimura
The control unit 12 includes an image registration unit 121, a container association unit 122, a container-usage recording unit 123, an image transmission unit 124, an image changing unit 125, and an analysis unit 126. The container association unit 122 is an example of a reception unit. A container management table 131 is an example of a storage unit. The image transmission unit 124 and the image changing unit 125 are examples of a display unit.
US 2020/0320189 to Zhang
When publishing the container image to the container repository, the first computer may send an identifier of the container image to the container repository. After receiving the container image, the container repository stores the container image, and records a mapping relationship between the identifier of the container image and a storage address of the container image in the container repository.
US 2021/0326658 to Swaroop
this algorithm, the moving RSV that is slowing down in front of the container 130 records a video, which can include a sequence of images, which are pre-processed at 406K. In some implementations, the sequence of images can be a video stream. Training at 408K on sampled sequences of such images, with different resolutions, can enable better recognition of the type, depth and shape of objects in the image.
US 2022/0114392 to Chen
the target data 331 related to each target image 120 within each training image TI in the training image database 33 through the target-recording module 51. The target data 331 may include the target category and/or the target position of the target image in the container image.
US 2023/0066058 to Yadav
a register or store of a plurality of different pre-configured container images may be created. When an author creates a new guided project, the image configuration controller 128 may select an appropriate, corresponding container image to use in conjunction therewith.
US 2024/0028382 to Tang
when a container image is added into a secure container, the container image is mounted on an image directory of the secure container by means of a file system or a block device, and a path of an image directory of the container image is recorded. During aggregation, a path of a read-write layer of a first container is merged with the path of the image directory of the container image to obtain a path of a file system of the first container.
The prior art of record does not disclose and/or fairly suggest at least claimed limitations recited in such manners in independent claim 1 "... selecting a pre-configured container image from a plurality of pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system; applying the selected pre-configured container image to at least one computing pod of the provisioned plurality of computing pods; and applying a computing pod configuration policy to the at least one computing pod of the provisioned plurality of computing pods.” and similarly recited in such manners in other independent claims 8 and 15.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to Tuan Dao whose telephone number is (571) 270 3387. The examiner can normally be reached on Monday to Friday from 09am to 05pm. The examiner can also be reached on alternate Fridays.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Pierre Vital, can be reached at telephone number (571) 272 4215. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) Form at https://www.uspto.gov/patents/uspto-automated- interview-request-air-form.
/TUAN C DAO/ Primary Examiner, Art Unit 2198