ServiceMesh, Inc. Patent applications |
Patent application number | Title | Published |
20140280978 | SYSTEMS AND METHODS FOR EVALUATING COMPUTING RESOURCES - Systems, methods, and non-transitory computer-readable media can receive information about requested resources from a computational resource consumer. The information about the requested resources can be analyzed to generate a first multi-dimensional array including a first set of name-value pairs associated with the requested resources. Information about offered resources can be received from a computational resource provider. The information about the offered resources can be analyzed to generate a second multi-dimensional array including a second set of name-value pairs associated with the offered resources. The first multi-dimensional array and the second multi-dimensional array can be evaluated based on an evaluation algorithm. | 09-18-2014 |
20140280977 | SYSTEMS AND METHODS FOR EVALUATING COMPUTING RESOURCES - Systems, methods, and non-transitory computer-readable media can receive information about requested resources from a computational resource consumer. The information about the requested resources can be analyzed to generate a first multi-dimensional array including a first set of name-value pairs associated with the requested resources. Information about offered resources can be received from a computational resource provider. The information about the offered resources can be analyzed to generate a second multi-dimensional array including a second set of name-value pairs associated with the offered resources. The first multi-dimensional array and the second multi-dimensional array can be evaluated based on an evaluation algorithm. | 09-18-2014 |
20140201218 | SYSTEMS AND METHODS FOR PROVIDING RANKED DEPLOYMENT OPTIONS - Systems, methods, and non-transitory computer-readable media can receive information about an application design plan. The application design plan can be associated with at least one deployment criterion. One or more available infrastructure resources can be identified based on the information about the application design plan. A plurality of deployment options can be determined based on the one or more available infrastructure resources. The plurality of deployment options can be determined to be compliant with the at least one deployment criterion. The plurality of deployment options can be ranked to produce an ordered set of deployment options. | 07-17-2014 |
20140201017 | SYSTEMS AND METHODS FOR PROVIDING REPEATED USE OF COMPUTING RESOURCES - Systems, methods, and non-transitory computer-readable media can provide access to a first-level computing resource via a service catalog. In some instances, the first-level computing resource can be created by a first entity. Moreover, a second-level computing resource can be received. In some cases, the second-level computing resource can be created by a second entity based, at least in part, on the first-level computing resource. Access to the second-level computing resource can be provided via the service catalog. Relational information associated with the first-level computing resource and the second-level computing resource can be tracked. | 07-17-2014 |
20120185913 | SYSTEM AND METHOD FOR A CLOUD COMPUTING ABSTRACTION LAYER WITH SECURITY ZONE FACILITIES - In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload. This allows a developer to define a security zone and to apply at least one type of security policy with respect to the security zone including the type of security zone policy in the metamodel framework such that the type of security zone policy can be associated with the software workload upon development of the software workload, and if the type of security zone policy is associated with the software workload, automatically applying the security policy to the software workload when the software workload is deployed within the security zone. | 07-19-2012 |
20100027552 | CLOUD COMPUTING GATEWAY, CLOUD COMPUTING HYPERVISOR, AND METHODS FOR IMPLEMENTING SAME - Embodiments of the present invention provide a cloud gateway system, a cloud hypervisor system, and methods for implementing same. The cloud gateway system extends the security, manageability, and quality of service membrane of a corporate enterprise network into cloud infrastructure provider networks, enabling cloud infrastructure to be interfaced as if it were on the enterprise network. The cloud hypervisor system provides an interface to cloud infrastructure provider management systems and infrastructure instances that enables existing enterprise systems management tools to manage cloud infrastructure substantially the same as they manage local virtual machines via common server hypervisor APIs. | 02-04-2010 |