Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


VIRTUAL MACHINE TASK OR PROCESS MANAGEMENT

Subclass of:

718 - Electrical computers and digital processing systems: virtual machine task or process management or task management/control

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20110179417VIRTUAL MACHINE, VIRTUAL MACHINE MONITOR AND COMPUTER CONTROL METHOD - A virtual machine monitor for a virtual machine. The virtual machine monitor makes the processor in the virtual machine: receive a timer setting from the guest OS in place of the timer, the timer setting being for making the timer generate a timer interrupt after a lapse of a setting period; change, when the guest OS inputs or outputs data from or to the I/O device via the virtual machine monitor, the setting period set in the timer so that a relation between I/O wait time recognized by the guest OS and I/O process time other than the I/O wait time becomes approximate to a relation between the I/O wait time recognized by the virtual machine monitor and the I/O process time; set the timer setting with the changed setting period in the timer; and notify, when receiving the timer interrupt, the guest OS of occurrence of the timer interrupt.07-21-2011
20110179416Virtual Machine Access to Storage Via a Multi-Queue IO Storage Adapter With Optimized Cache Affinity and PCPU Load Balancing - A method is provided for use in a system that includes a host machine that includes multiple physical CPUs (PCPUs) and at least two cache nodes that are shared by different sets of the PCPUs, comprising: creating in a memory device multiple sets of lanes each lane set associated with a respective PCPU set; tracking levels of processing activity of the PCPUs of each PCPU set; using an MSIX vector value to associate lanes with PCPUs; receiving a IO request from any given PCPU from among the multiple PCPUs; and assigning the IO request to a respective lane based at least in part upon the PCPU set associated with the lane and PCPU processing activity levels.07-21-2011
20110179412INFORMATION SHARING SYSTEM, COMPUTER, PROJECT MANAGING SERVER, AND INFORMATION SHARING METHOD USED IN THEM - A project managing unit 07-21-2011
20130031544VIRTUAL MACHINE MIGRATION TO MINIMIZE PACKET LOSS IN VIRTUALIZED NETWORK - Methods and apparatus are provided for controlling live migration of a virtual machine from a first host to a second host in a data center. A virtual machine manager may distribute to at least one host in a virtual network an updated mapping policy that maps a customer address of the virtual machine to a provider address of the migrated virtual machine. The updated mapping policy enables hosts in the virtual network to communicate with the migrated virtual machine. The updated mapping policy can be a shadow policy. The shadow policy is transmitted to hosts in the virtual network by the virtual machine manager before live migration of the virtual machine completes and is maintained by recipient hosts in an inactive state until triggered. The virtual machine manager notifies hosts in the virtual network to activate the shadow policy when live migration completes.01-31-2013
20130031543Virtual Machines for Aircraft Network Data Processing Systems - A method and apparatus are provided for operating a network data processing system on an aircraft. A number of operations are performed in a virtual machine on the aircraft. The virtual machine runs on a processor unit in the network data processing system on the aircraft to create a simulated computer environment. The virtual machine accesses resources of the processor unit for performing the number of operations using a host operating system on the processor unit. A current state of the aircraft is identified by the network data processing system. Running of the virtual machine is managed based on the current state of the aircraft and a policy for managing the virtual machine for different states of the aircraft.01-31-2013
20130031546METHODS AND SYSTEMS FOR ON-BOARDING APPLICATIONS TO A CLOUD - Methods and arrangements for on-boarding an application to a cloud. An application for hosting in a cloud environment is provided. Metadata related to the application is provided, and metadata related to the cloud is obtained. The application metadata and cloud metadata are compared, and the compatibility of the application with existing offerings of the cloud is ascertained. The application is on-boarded to the cloud.01-31-2013
20130031545SYSTEM AND METHOD FOR IMPROVING THE PERFORMANCE OF HIGH PERFORMANCE COMPUTING APPLICATIONS ON CLOUD USING INTEGRATED LOAD BALANCING - A non-transitory computer-implemented method of load balancing includes calculating an expected cost set associated with an application-specific task of an application executing on a processing resource in a cloud computing environment, and communicating the expected cost set from the processing resource to a cloud management system. Resource mapping of applications currently executing in the cloud computing environment are retrieved, and the application-specific task is assigned to a specific computational resource in the cloud computing environment based on the expected cost set and the resource mapping of applications currently executing in the cloud computing environment. A task to VM (virtual machine) assignment is determined based on the assignment of the application-specific task to the specific computational resource. The task to VM assignment is transferred from the cloud management system to the application executing on the processing resource in the cloud computing environment.01-31-2013
20120174104Techniques for Placing Applications in Heterogeneous Virtualized Systems While Minimizing Power and Migration Cost - N applications are placed on M virtualized servers having power management capability. A time horizon is divided into a plurality of time windows, and, for each given one of the windows, a placement of the N applications is computed, taking into account power cost, migration cost, and performance benefit. The migration cost refers to cost to migrate from a first virtualized server to a second virtualized server for the given one of the windows. The N applications are placed onto the M virtualized servers, for each of the plurality of time windows, in accordance with the placement computed in the computing step for each of the windows.07-05-2012
20090172667METHOD AND COMPUTER SYSTEM FOR SHARING GRAPHICS CARD AMONG MULTIPLE OPERATION SYSTEMS - The present invention provides a method and a computer system for sharing a graphics card among multiple Operation Systems (OSs). The method includes: detecting a first GOS to be displayed, the first GOS being a primary GOS or one of at least one secondary GOS; determining the kind of the first GOS, so that different display control register bank(s) and graphics card memory resources are allocated to the first GOS depending on whether it is a primary GOS or a secondary GOS; controlling the display control register bank(s) allocated to the first GOS to connect to a display output port; obtaining display contents based on the graphics card memory resources allocated to the first GOS; and displaying the display contents based on display mode parameters in the display control register bank(s) connected to the display output port. According to the present invention, it is possible to share the graphics card among the multiple OSs without modifying the drivers of the primary GOS.07-02-2009
20100058339METHOD AND SYSTEM FOR PROVIDING A HOMOGENEOUS VIEW OF A DISTRIBUTED COMMON INFORMATION MODEL (CIM) WITHIN A HETEROGENEOUS VIRTUAL SYSTEM ENVIRONMENT - A method and system for providing a homogeneous view of a distributed common information model (CIM) within a heterogeneous virtual system environment is disclosed. The virtual system environment includes local and remote host systems, each of which includes a CIM Object Model (CIMOM) and a CIM repository of provider applications. The method includes selecting one of the CIMOMs to serve as a single access point to the CIMOMs for all client requests and configuring provider applications of the selected CIMOM to communicate with non-selected CIMOMs. The configuration includes using a discovery or registration process to identify all of the local and remote host systems in the virtual system environment and provide access points between the provider applications of the selected CIMOM and the hosts. In response to a client request, the selected CIMOM uses the access points to retrieve, aggregate, and forward the information to a client application as a homogeneous view.03-04-2010
20100050173Provisioning Virtual Resources Using Name Resolution - A data string including a resource identifier and one or more resource attributes is parsed at a name resolution module and provided to a computing resource provisioning system. The computer resource provisioning system provisions a resource that corresponds to the resource identifier and that has the at least one. A handle is returned to provide access to the resource at a client system.02-25-2010
20120266168DEPLOYMENT SYSTEM FOR MULTI-NODE APPLICATIONS - A deployment system provides the ability to deploy a multi-node distributed application, such as a cloud computing platform application, which has a plurality of interconnected nodes performing specialized jobs. The deployment system includes a deployment director that provisions an infrastructure that includes one or more virtual machines (VMs) for hosting the plurality of nodes of the cloud computing platform application. The deployment director distributes a plurality of jobs (e.g., application packages and configurations) to deployment agents executing on the provisioned VMs, based on a mapping in the deployment manifest between the infrastructure and the plurality of specialized jobs to be performed by the cloud computing platform application. The deployment agents apply the jobs to their respective VM (e.g., launching applications), thereby deploying the cloud computing platform application.10-18-2012
20120266165COMBINED VIRTUAL GRAPHICS DEVICE - A system comprises a guest graphics subsystem with a combined virtual graphics device that combines underlying emulated virtual graphics device and virtual function of a physical graphics device to support virtual machine migration. The VMM in the system may expose to the guest a single combined virtual PCIe graphics device that combines access to the virtual graphics device and the virtual function, and switches between the virtual graphics device and the virtual function for graphics acceleration without triggering a PnP event in the guest OS. In response to the switch, the guest graphics stack and applications may redraw their windows to provide a consistent user experience.10-18-2012
20120266163Virtual Machine Migration - Virtual machine migration, including: monitoring, by a management agent, the utilization of a system resource in a computing system; determining, by the management agent, a rate of change in the utilization of the system resource over a predetermined period of time; comparing, by the management agent, the rate of change in the utilization of the system resource over a predetermined period of time to a predetermined maximum allowable rate of change in the utilization of the system resource over the predetermined period of time; and taking, by the management agent, corrective action upon determining that the rate of change in the utilization of the system resource over the predetermined period of time exceeds the predetermined maximum allowable rate of change in the utilization of the system resource over the predetermined period of time.10-18-2012
20120266162Mechanism for Storing a Virtual Machine on a File System in a Distributed Environment - A mechanism for storing virtual machines on a file system in a distributed environment is disclosed. A method of the invention includes initializing creation of a VM by a hypervisor of a host machine, allocating a logical volume from a logical volume group of a shared storage pool to the VM, and creating a file system on top of the allocated logical volume, the file system to manage all files, metadata, and snapshots associated with the VM.10-18-2012
20090193414Method and System for a Grid-Enabled Virtual Machine with Movable Objects - A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.07-30-2009
20090193413METHODS AND SYSTEMS FOR PROVISIONING A VIRTUAL DISK TO DISKLESS VIRTUAL AND PHYSICAL MAHCINES - Methods and systems are described for provisioning a common virtual disk to both a physical and a virtual computing machine. These methods and systems can include creating a virtual disk that has binding information for both a paravirtual network interface card and a physical network interface card so that, either a virtual machine having a paravirtual network interface card, or a physical machine having a physical network interface card, may boot from the created virtual disk. Creation of the virtual disk can include exposing the paravirtual network interface card to a physical machine so that an installer program may bind to both the paravirtual network interface card and the physical network interface card.07-30-2009
20110197192VIRTUAL COMPUTER SYSTEM AND METHOD OF CONTROLLING THE SAME - In the environment of a virtual server, there is a problem in that the contents in a disk area released correspondingly with the deletion of the virtual server may be read. According to the present invention, in a virtual computer system controlling a disk volume and a virtual server which is connected to the disk volume, to which the area of the disk volume is allocated as a virtual disk and which executes a process using the allocated virtual disk, the virtual computer system erases information stored in the virtual disk allocated to the virtual server to be deleted correspondingly with the deletion of the virtual server. According to another embodiment of the present invention, an administrative serve is provided to select a server system which is low in load from among plural server systems controlling virtual servers as a server system for erasing information stored in the virtual disk allocated to the virtual server to be deleted.08-11-2011
20100083250Virtual machine system, and method for managing thereof - According to an aspect of the embodiment, a host virtual machine operated on the CPU controls the virtual machine system and a guest virtual machine, and has save information of system information which defines a save location to save the system information of the guest virtual machine. The save location is in the storage device used by the host virtual machine. A virtual machine monitor operated on the CPU controls the plurality of virtual machines, and includes monitoring unit which monitors the guest virtual machine to detect occurrence of a failure in the guest virtual machine, and collecting unit which collects the system information from the save location based on the save information of system information when the monitoring unit detects the failure in the guest virtual machine.04-01-2010
20130031552VIRTUAL MACHINE DISPLAY DEVICE, VIRTUAL MACHINE DISPLAY METHOD, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A dummy layer generating/finishing section 01-31-2013
20130031550METHOD FOR IMPROVING THE PERFORMANCE OF HIGH PERFORMANCE COMPUTING APPLICATIONS ON CLOUD USING INTEGRATED LOAD BALANCING - A computer-implemented method of load balancing including calculating an expected cost set associated with an application-specific task of an application executing on a processing resource in a cloud computing environment, and communicating the expected cost set from the processing resource to a cloud management system. Resource mapping of applications currently executing in the cloud computing environment are retrieved, the application-specific task is assigned to a specific computational resource in the cloud computing environment based on the expected cost set and the resource mapping of applications currently executing in the cloud computing environment. A task to VM (virtual machine) assignment is determined based on the assignment of the application-specific task to the specific computational resource. The task to VM assignment is transferred from the cloud management system to the application executing on the processing resource in the cloud computing environment.01-31-2013
20130031549VIRTUAL ACCESS TO NETWORK SERVICES - Methods, systems, and computer readable storage media for providing virtual access to network services. A virtual storage layer contains reference objects configured to reference network services stored in a network computing environment. Network clients access the reference objects through a resource interface based on a resource identifier associated with the virtual storage layer. Initiation of the virtual service by a network client invokes the service in a native computing environment of the service.01-31-2013
20130031548INFORMATION PROCESSING APPARATUS AND STORAGE MEDIUM - According to one embodiment, an information processing apparatus includes a virtual disk management module which manages a first virtual disk, a second virtual disk and a third virtual disk. The first virtual disk is a disk in which disk image data from a disk with various programs installed therein is stored. The second virtual disk is a disk in which the disk image data of the first virtual disk and from which individual information retained by the various programs has been deleted is stored. The third virtual disk is a disk in which the disk image data of the second virtual disk and to which individual information to be retained by the various programs has been added is stored.01-31-2013
20130031547FACILITATING COMPATIBLE INTERACTION, AT LEAST IN PART - An embodiment may include circuitry to determine compatibility, at least in part, of a device with at least one process intended to interact with, at least in part, the device. Such compatibility may be determined by the circuitry based at least in part upon at least one feature set of the device. If the device is incompatible, at least in part, with the at least one process, the circuitry may identify, at least in part, the device in manner that facilitates compatible interaction, at least in part, between the at least one process and at least one portion of the at least one feature set. Many alternatives, variations, and modifications are possible.01-31-2013
20130086578VIRTUAL IMAGE CONSTRUCTION - A requirement graph defined by a user is analyzed. A set of user-defined requirements is identified, based on the analyzing, for constructing a virtual image. A set of models is analyzed based on the set of user-defined requirements that have been identified. Each semantic in the set of models represents at least one capability and one requirement of a virtual image building block in a plurality of virtual image building blocks. A set of virtual image construction solutions is generated based on analyzing the set of models. Each virtual image construction solution includes at least one set of virtual image building blocks from the plurality of virtual image building blocks. The at least one set of virtual image building blocks satisfies the set of user-defined requirements and requirements of each virtual image building block within the at least one set of virtual image building blocks.04-04-2013
20130086585Managing the Persistent Data of a Pre-Installed Application in an Elastic Virtual Machine Instance - A method and apparatus for managing the persistent data of a pre-installed application in an elastic virtual machine instance is disclosed, the method comprising: in response to installing an application into a master virtual machine image, obtaining a persistent data point of a function component of the application, the persistent data point comprising a file directory for storing the persistent data of the function component; in response to launching an elastic virtual machine instance from the master virtual machine, creating a storage volume, attaching the storage volume to the elastic virtual machine instance, and mounting the storage volume to the file directory based on the persistent data point. Other features and aspects may be realized, depending upon the particular application.04-04-2013
20110202920APPARATUS AND METHOD FOR COMMUNICATION PROCESSING - A method includes: judging whether or not a destination address of a received message is a predetermined address of a first virtual switch being operating; upon judging that the destination address of the received message is the predetermined address of the first virtual switch, converting the destination address of the received message to a broadcast address to virtual machines that are under the first virtual switch and belong to the same subnet as a subnet to which the first virtual switch belongs; and outputting a message after the conversion.08-18-2011
20110202919HYPERVISOR AND SERVER APPARATUS - A hypervisor sets all physical areas in an allocation area, which is allocated to a virtual machine from within a physical memory and is configured from a plurality of physical areas, to a write protect mode. In a case where a physical processor identifies that the write-destination area from the virtual machine is in the write protect mode, the hypervisor manages the write-destination area as an updated area, and cancels the write protect mode of the write-destination area. At a certain point in time, the hypervisor copies data inside the updated physical area from within the allocation area to a storage area (a copy area) that differs from the allocation area. In a case where a prescribed failure is detected in the physical area, the hypervisor restores data from the copy area.08-18-2011
20110202918VIRTUALIZATION APPARATUS FOR PROVIDING A TRANSACTIONAL INPUT/OUTPUT INTERFACE - A virtualization apparatus and method for providing a transactional input/output interface to prevent input/output performance from deteriorating are provided. The virtualization apparatus includes hardware, a virtual machine monitor to support a plurality of operating systems to use the hardware, and a transaction device driver that executes transactions for hardware I/O operation and to provide an interface for executing a transaction for input/output operations to/from the hardware.08-18-2011
20110202917Mechanism for Downloading Hypervisor Updates Using Existing Virtual Machine-to-Host Channels - A mechanism for downloading hypervisor updates using existing virtual machine (VM)-to-host channels is disclosed. A method of embodiments of the invention includes receiving one or more updates to the hypervisor from the VM via a hypervisor update component, verifying that the one or more received updates are valid, and installing the one or more received updates if the one or more received updates are valid.08-18-2011
20110202916DISTRIBUTION CONTROL AND TRACKING MECHANISM OF VIRTUAL MACHINE APPLIANCES - A virtual hard disk drive containing a guest operating system is bound to a source computing device through encryption. When the virtual hard drive is moved to a difference computing device, a virtual machine manager instantiates a virtual machine and causing the virtual machine to boot the operating system from the virtual hard disk drive. Because the guest operating system is encrypted by an encryption device on a source computing device, the virtual machine causing the decryption of the guest operating system with a copy of the key. The virtual hard disk is bound to the target computing device through encryption based on a hardware on the target computing device.08-18-2011
20120180051VIRTUAL MACHINE MIGRATION MANAGING METHOD, COMPUTER USING THE METHOD, VIRTUALIZER USING THE METHOD AND COMPUTER SYSTEM USING THE METHOD - In a system including a plurality of physical machines to execute virtual machines (VM07-12-2012
20120180048ALLOCATING RESOURCES TO VIRTUAL FUNCTIONS - A method of assigning resources to an input/output adapter having multiple ports may include determining a first port of the input/output adapter that includes a first bandwidth availability. A first number of resources assigned to the first port may be modified. The method may further include comparing a total count of resources assigned the ports to a maximum number of resources, where the total count includes the modified first number of resources. At least a portion of the modified first number of resources to the first port may be allocated to the first port.07-12-2012
20120180045DETERMINING AN OPTIMAL COMPUTING ENVIRONMENT FOR RUNNING AN IMAGE - Aspects of the present invention provide an approach that evaluates a locally running image (e.g., such as that for a virtual machine (VM)) and determines if that image could run more efficiently and/or more effectively in an alternate computing environment (e.g., a cloud computing environment). Specifically, embodiments of the present invention evaluate the local (existing/target) image's actual and perceived performance, as well as the anticipated/potential performance if the image were to be migrated to an alternate environment. The anticipated/potential performance can be measured based on another image that is similar to the existing/target image but where that image is running in a different computing environment. Regardless, the system would display a recommendation to the end user if it were determined that the image could perform better in the alternate environment (or vice versa). It is understood that performance is just one illustrative metric for which the system would perform a comparison. Other metrics such as cost, reliability, availability, etc. could also be used.07-12-2012
20120180043Mechanism for Memory State Transfer of Virtual Machine-Controlled Peripherals During Migration of the Virtual Machine - A mechanism for memory change tracking during migration of a virtual machine (VM) with VM-controlled assigned peripherals is disclosed. A method of the invention includes interacting with a VM executed by a hypervisor of a origin host machine in order to cause the VM to prevent a state of a peripheral device controlled by the VM from changing, receiving the state of the peripheral device from at least one of the VM, a memory of the VM, or the peripheral device, and transferring the obtained state of the peripheral device to a destination host machine as part of a migration process of the VM.07-12-2012
20080256538Storage configurations for tessellated virtual machines - In a computing environment, an association and layout of virtual machines is provided as a system instantiated for a common computing goal, such as providing a data center with an email system for an enterprise. Irrespective of physical computing devices, a template exists for each of the virtual machines according to a role of the common computing goal, including a definition for external connectivity with other virtual machines. From a template library, certain of the virtual machine templates are selected and tessellated into an application functioning to accomplish the computing goal. Storage configurations contemplate physical storage devices variously arranged over the near and short term relative to each of the virtual machine templates and to the tessellated application as a whole. Managers coordinate, allocate and oversee same.10-16-2008
20080256537Systems and methods of quota accounting - Embodiments of the invention relate generally to incremental computing. Specifically, embodiments of the invention include systems and methods that provide for the concurrent processing of multiple, incremental changes to a data value while at the same time monitoring and/or enforcing threshold values for that data value. For example, a method is provided that implements domain quotas within a data storage system.10-16-2008
20080256536Portable secured computing environment for performing online confidential transactions in untrusted computers - A portable secured computing environment for performing online confidential transactions in an untrusted host computer. The secured computing environment may be loaded from a portable storage device, such as a USB stick, plugged into a peripheral port of the host computer. The secured computing environment may include a virtual machine running under a host operating system of the host computer. A secured operating system may be running in the virtual machine. An online application, such as a web browser in communication with an online service, may be run under the secured operating system. Operation of the online application may be restricted by a security profile. For example, the online application may only access network addresses specifically indicated in a whitelist of the security profile.10-16-2008
20080256535Tessellated virtual machines for common computing goals - In a computing environment, an association and layout of virtual machines exist as a system instantiated for a common computing goal, such as providing a data center with an email system for an enterprise. Irrespective of physical computing devices, a template exists for each of the virtual machines according to a role of the common computing goal, including a definition for external connectivity with other virtual machines. From a template library, certain of the virtual machine templates are selected and tessellated into an application functioning to accomplish the computing goal. Collections of tessellated applications may be reposited in a library so that more than one application may be combined with another to achieve yet another computing goal, for example. Ultimately, tessellated applications provide a new computing paradigm to counter present-day computing complexities and cumbersomeness as systems evolve and become more regulated.10-16-2008
20080256533SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR EVALUATING A VIRTUAL MACHINE - A method for evaluating a virtual machine, the method includes: monitoring, using an out of band monitor, information exchanged between the virtual machine and a hypervisor; and evaluating a state of the virtual machine by applying a statistical classification process to at least a portion of the monitored information.10-16-2008
20120246644VIRTUAL COMPUTER SYSTEM AND CONTROLLING METHOD OF VIRTUAL COMPUTER - A method of controlling a virtual machine of a computer, the computer comprising: a physical machine comprising an I/O adapter having a physical function that creates a virtual function; a virtualization unit that provides computer resources of the physical machine to the virtual machine; and an OS that is executed on the virtual machine, the virtualization unit creating a virtual machine to which the virtual function is assigned, the virtual machine running the OS thereon, the method comprising: a first step of detecting, by the virtualization unit, a state change of the I/O adapter; a second step of identifying, by the virtualization unit, when a state of the I/O adapter becomes a predetermined state, the virtual machine to which the virtual function is assigned; and a third step of notifying, by the virtualization unit, the OS running on the identified virtual machine of the state of the I/O adapter.09-27-2012
20120246643FILE SYSTEM FOR STORAGE AREA NETWORK - Methods and apparatus are disclosed for managing access to data in a data storage system. For example, an apparatus comprises at least one processing platform associated with a distributed virtual infrastructure. The processing platform comprises at least one processing device having a processor coupled to a memory. The processing platform is operative to instantiate a meta data management process that is configured to provide at least one client process with information to allow the client process to perform one or more operations in accordance with one or more data storage devices through a storage area network. The information provided to the client process may comprise one or more data block descriptors. Each of the one or more data block descriptors may comprise path information for at least one of the data storage devices and an offset address in the at least one data storage device. The one or more data block descriptors may correspond to one or more data blocks of a given data file that is stored or storable across the one or more data storage devices.09-27-2012
20120246639CONFIGURATION OF VIRTUAL APPLIANCES - Embodiments of the invention relate to post-install configuration of virtual appliances in a virtual machine. A packaging and distribution format is provided with two tools to support the configuration of the virtual machine. The first tool is employed to support configuration of the virtual machine, and employs an activation script during a boot operation. The second tool is employed by a call from the first tool. The second tool configures a virtual application in communication with the virtual machine with use of a configuration script. The configuration script is separate from the activation script and disassociated from an image binary of the virtual machine. The disassociation of the configuration script from the activation script supports changes to the configuration script without affecting the image binary.09-27-2012
20100077397Input/output (I/O) device virtualization using hardware - According to embodiments of the present invention a computer system that is capable of sharing physical devices among several virtual machines (VM) includes hardware assisted logic to allow requests from guest operating systems (guest OS) to circumvent a virtual machine monitor (VMM) and be processed by the hardware assisted logic.03-25-2010
20100077396PORTABLE STORAGE DEVICE FOR SUPPORTING PORTABLE COMPUTING SYSTEM AND PORTABLE COMPUTING BASED SYSTEM USING THE SAME - Provided are a portable computing system that allows computing operations anywhere an operating system (OS)-installed host computer exists by using a portable storage device storing a virtual machine, an OS image, a portable software image, etc. and a portable computing based system using the portable computing system. The portable storage device for supporting a portable computing system includes: a portable computing system storage storing portable software for running and operating of a portable computing system, wherein a user may not directly access the portable software for deletion and modification; a portable software storage storing portable software images usable in the portable computing system, wherein a user may not directly access the portable software images for deletion and modification; and a portable data storage capable of adding, deleting, and modifying data.03-25-2010
20100077395VIRTUAL MACHINE LIVENESS CHECK - A data center can share processing resources using virtual networks. A hosting program 03-25-2010
20100077394COALESCING PERIODIC TIMER EXPIRATION IN GUEST OPERATING SYSTEMS IN A VIRTUALIZED ENVIRONMENT - Techniques are disclosed for coalescing timer ticks generated by timers used to service guest operating systems executing in virtual machines. By coalescing timer ticks a logical processor can enter a low power mode thereby reducing power consumed by the system.03-25-2010
20090070760Virtual Machine (VM) Migration Between Processor Architectures - A system and method for performing a VM migration which manages a cluster of machines in a pool for live migration to the same feature set or behavior. In certain embodiments, machines within the pool can be configured to emulate a certain feature set to enable a VM migration amongst the similar pools. The emulation can be by either masking reporting of a feature set or enabling/disabling a feature set. The handling of emulation registers within the hardware occurs at a firmware level rather than an operating system or hypervisor level.03-12-2009
20100115513VIRTUAL MACHINE CONTROL METHOD AND VIRTUAL MACHINE SYSTEM - Provided is a virtual machine including a first virtualization module operating on a physical CPU, for providing a first CPU, and a second virtualization module operating on the first CPU, for providing second CPU. The second virtualization module includes first processor control information holding a state of the first CPU obtained at a time of execution of the user program. The first virtualization module includes second processor control information containing a state of the physical CPU obtained at the time of the execution of the second virtualization module, third processor control information containing a state of the physical CPU obtained at the time of the execution of the user program, and prefetch entry information in which information to be prefetched from the third processor control information is set, and, upon detection of a event, the information set in the prefetch entry information is reflected to the first processor control information.05-06-2010
20100115511SYSTEM AND METHOD FOR PROVIDING PERSONALIZATION OF VIRTUAL MACHINES FOR SYSTEM ON DEMAND (SOD) SERVICE - Disclosed is a system for providing personalization of virtual machines for a system on demand (SoD) service includes an SoD server, wherein the SoD server includes an aspect measuring unit that measures user's use habits and aspects with respect to the peripheral devices on the basis of use or not of the peripheral devices; a preference generating unit that calculates preference for each attribute with respect to attributes included in the peripheral devices on the basis of the use habits and aspects measured by the aspect measuring unit; and a configuration unit that calculates satisfaction for each device with respect to peripheral devices which can be used in the virtual machine on the basis of the preference for each attribute calculated by the preference generating unit and configures the peripheral devices of the virtual machine on the basis of the calculated satisfaction for each device.05-06-2010
20100115508PLUG-IN ARCHITECTURE FOR HYPERVISOR-BASED SYSTEM - In a hypervisor-based computing system, each guest operating system (GOS) is associated with multiple plug-in modules, with each module being configured to execute a respective function. The hypervisor also includes plug-in modules mirroring those of the GOS to provide for enhanced functionality on a module-by-module basis.05-06-2010
20130031551ON-BOARDING APPLICATIONS TO A CLOUD - Methods and arrangements for on-boarding an application to a cloud. An application for hosting in a cloud environment is provided. Metadata related to the application is provided, and metadata related to the cloud is obtained. The application metadata and cloud metadata are compared, and the compatibility of the application with existing offerings of the cloud is ascertained. The application is on-boarded to the cloud.01-31-2013
20130086579SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM FOR IMPROVING VIRTUAL DESKTOP INFRASTRUCTURE PERFORMANCE - The present disclosure provides a system, method, and computer readable medium for improved Virtual Desktop Infrastructure (VDI) performance by locally caching at least a part of a common operating environment (COE) gold image to hypervisor-node storage rather than shared data stores. Additionally, the present disclosure enables scheduled and differential synchronization of the gold images in off-hours to reduce loads on the shared data store.04-04-2013
20130086580MIGRATION OF VIRTUAL MACHINE POOL - Migration of a pool of virtual machines to a target physical machine. The virtual machines were all provisioned into an initial state using a master image. Thereafter, changes to the state were reflected in corresponding user delta collections for each of the virtual machines. In preparation for the migration to the target physical machine, a pool is allocated on the target machine. The target pool is associated with the same master image as the source pool. The virtual machines are provisioned within the target pool based on the master image. The virtual machines in the target pool are then connected to the corresponding user delta collection, allowing the virtual machines to continue in the same state in the target machine as when they operated in while last operating in the source machine. The target machine may be as master service provider.04-04-2013
20130086583Method and Computer for Controlling Virtual Machine - A virtual machine booting method for booting a virtual machine, the virtual machine comprising: a physical computer which includes a processor, a memory, and storage; and a virtualization module which assigns computer resources of the physical computer to the virtual machine, the method comprising: setting, by the virtualization module, before the virtual machine is booted, states of a first access path and a second access path which couple the virtual machine and the storage; booting the virtual machine by the virtualization module; determining, by the virtualization module, when to switch between the first access path and the second access path; and switching the first access path to the second access path when the virtualization module determines that it is time to switch between the first access path and the second access path.04-04-2013
20130086584CONTROL DEVICE, CONTROL METHOD, AND CONTROL PROGRAM - A control device includes a memory and a processor coupled to the memory, wherein the processor executes a process comprising determining the order of setting of operating conditions which are set to a plurality of virtual machines and make the virtual machines operate, respectively, in accordance with processing dependency between software executed by the plurality of virtual machines and first setting the respective operating conditions of the virtual machines in the setting order at the determining.04-04-2013
20130086582Network Adapter Hardware State Migration Discovery in a Stateful Environment - An approach is provided in which a discovery system receives a migration request to move a virtual machine that executes on a first system. The discovery system identifies a first network adapter corresponding to the first system, and identifies hardware state data used by the first network adapter to process data packets generated by the virtual machine. In turn, the discovery system identifies a second network adapter that is compatible with a native format of the hardware state data, and migrates the virtual machine to a second system corresponding to the identified second network adapter.04-04-2013
20130086581PRIVILEGE LEVEL AWARE PROCESSOR HARDWARE RESOURCE MANAGEMENT FACILITY - Multiple machine state registers are included in a processor core to permit distinction between use of hardware facilities by applications, supervisory threads and the hypervisor. All facilities are initially disabled by the hypervisor when a partition is initialized. When any access is made to a disabled facility, the hypervisor receives an indication of which facility was accessed and sets a corresponding hardware flag in the hypervisor's machine state register. When an application attempts to access a disabled facility, the supervisor managing the operating system image receives an indication of which facility was accessed and sets a corresponding hardware flag in the supervisor's machine state register. The multiple register implementation permits the supervisor to determine whether particular hardware facilities need to have their state saved when an application context swap occurs and the hypervisor can determine which hardware facilities need to have their state saved when a partition swap occurs.04-04-2013
20130081014BANDWIDTH THROTTLING OF VIRTUAL DISKS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing resources in a computing system. For virtual hard disk drives supported by multiple physic hard disk drives over a network, artificial throttling of the disk access bandwidth is implemented, such that the resulting latency behavior of each virtual hard disk drive resembles the latency behavior of a corresponding physical hard disk drive emulated by the virtual hard disk drive. In various implementations, the artificial throttling simulates both characteristics of sequential access latencies and random access latencies on a physical hard drive.03-28-2013
20130081012Storage drive virtualization - In one embodiment, a method includes defining a plurality of virtual drives in a physical drive in communication with a plurality of servers, assigning virtualization parameters to each of the virtual drives, and communicating the virtualization parameters to a drive manager located at the physical drive and operable to configure the virtual drives on the physical drive. An apparatus is also disclosed.03-28-2013
20130081015STORAGE SYSTEM - The I/O performance measurement unit of Hypervisor measures latencies of I/O process requests to virtual disks, and reports the average value of the latencies to the I/O performance information collection unit of the management server. The provision destination determination unit sets, as a storage unit to which a virtual disk is to be allocated, that is a storage unit having the smallest average value of the latencies among storage units to which virtual disks have been provided.03-28-2013
20130081016VIRTUAL COMPUTER SYSTEM, VIRTUAL COMPUTER CONTROL METHOD AND ACCUMULATION CIRCUIT - The present invention relates to a virtual machine system that includes a plurality of processors and executes a plurality of virtual machines in parallel with use of the plurality of processors. An aim thereof is to suppress power consumption without sacrificing the performance of the virtual machine system. When there are at least two processors that do not have any virtual machines allocated thereto, one of the at least two processors is supplied with power so as to be placed in a standby state, and a remaining one or more of the at least two processors are not supplied with power.03-28-2013
20130081013Memory Coherency Acceleration Via Virtual Machine Migration - A system and method for memory coherency acceleration via virtual machine migration comprises a plurality of processors. A first processor of the plurality of processors is configured to implement at least one virtual machine. A monitor is configured to monitor a number of memory requests between the first processor and at least a second processor of the plurality of processors. A virtual machine manager is configured to migrate at least a portion of the virtual machine from the first processor to the second processor based on the number of memory requests exceeding a threshold.03-28-2013
20090178036Method and Apparatus for Call Stack Sampling Using a Virtual Machine - A computer implemented method, apparatus, and computer usable program code for sampling call stack information. A flag associated with a target thread is set in a memory work area associated with a virtual machine in response to an interrupt. Monitoring for an event during execution of a plurality of threads created by the virtual machine. A determination is made as to whether the flag is set in response to an occurrence of the event. If the flag is set, the virtual machine makes a call out to a profiler which initiates sampling of the call stack information in response to the flag being set.07-09-2009
20130036418In-Place Snapshots of a Virtual Disk Configured with Sparse Extent - A virtualized computer system employs a virtual disk with a space efficient (SE) format to store data for virtual machines running therein. Data within a virtual disk with a SE format is stored in a grain, where multiple grains are included in a storage block. Writes to a grain within shared storage block in a virtual disk with an SE format are serviced by allocating a new grain and storing the write data to the new grain. Metadata associated with the client that transmitted the write request to the virtual disk is then updated to point to the new grain instead of the grain within the shared storage block.02-07-2013
20130036417Virtual Resource Management Method, System, and Apparatus - A virtual resource management method, system, and apparatus are applied in the field of communications technologies. The virtual resource management method includes running an input/output I/O domain on a remote node, if the remote node needs to enter a sleep state, obtaining information of a processor core occupied by running the input/output I/O domain on the remote node; stopping running the I/O domain if the remote node is in the sleep state; and sorting, according to the obtained information of the processor core, a resource of a corresponding processor core to a virtual resource pool, so that the processor core can be used to perform service processing, thereby implementing virtual resource management.02-07-2013
20130036416DETECTING AND CORRECTING NETWORK INTERRUPTIONS USING NETWORK ADDRESS TRANSLATION - Embodiments provide a network address translation (NAT) service for network devices. A network connection from at least one private network device to the NAT service is received and a network connection from at least one remote device to the NAT service is received. The private network device is positioned within a private network and the remote device is positioned within a public network. A network availability of the remote device is determined. If the remote device is unavailable or a network configuration setting associated with the remote device changes, the private network device is notified and a connection reset message is transmitted to the private network device.02-07-2013
20130139160SYSTEM AND METHOD FOR AUTOMATIC STORAGE LOAD BALANCING IN VIRTUAL SERVER ENVIRONMENTS - Methods and systems for periodically analyzing and correcting storage load imbalances in a storage network environment including virtual machines are described. These methods and systems account for various resource types, logical access paths, and relationships among different storage environment components. Load balancing may be managed in terms of input/output (I/O) traffic and storage utilization. The aggregated information is stored, and may be used to identify and correct load imbalances in a virtual server environment in order to prevent primary congestion and bottlenecks.05-30-2013
20130042242Interrupt Handling in a Virtual Machine Environment - A method for computing includes running a plurality of virtual machines on a computer having one or more cores and a memory. Upon occurrence of an event pertaining to a given virtual machine during a period in which the given virtual machine is unable to receive an interrupt, an interrupt message is written to a pre-assigned interrupt address in the memory. When the given virtual machine is able to receive the interrupt, after writing of the interrupt message, a context of the given virtual machine is copied from the memory to a given core on which the given virtual machine is running, and a hardware interrupt is automatically raised on the given core responsively to the interrupt message in the memory.02-14-2013
20130042241DYNAMIC VIRTUAL MACHINE DOMAIN CONFIGURATION AND VIRTUAL MACHINE RELOCATION MANAGEMENT - Dynamic relocation of virtual machines among hypervisors in a domain is provided. A domain management module is executed on a computer processor and is configured to receive a request to add a new hypervisor to a domain. Each hypervisor and each domain comprises an architecture description (ARD). A new canonical ARD is generated for all hypervisors in the domain. A virtual machine executing on a first system is relocated to any other hypervisor in the domain. Virtual machines may also be moved to out-of-domain hypervisors through the use of override masks. In addition, under certain conditions, new hypervisors additions, as well as hypervisor and system updates may be performed without disrupting the virtual machines that are controlled by the hypervisors.02-14-2013
20130042240Optimized Virtual Function Translation Entry Memory Caching - An approach is provided in which a virtual function, which executes on a network adapter, receives a data packet from a first virtual machine. A translation entry is identified that corresponds to sending the data packet from the first virtual machine to a second virtual machine, and a determination is made as to whether an onboard memory partition assigned to the virtual function includes the identified translation. If the onboard memory location includes the translation entry, the data packet is sent to the destination virtual machine using the translation entry retrieved from the onboard memory partition. Otherwise, if the translation entry is not located in the onboard memory partition, the data packet is sent to the destination virtual machine using a translation entry retrieved from an off board memory location.02-14-2013
20130042239SYSTEM AND METHOD FOR USE OF A VIRTUAL ASSEMBLY BUILDER - A virtual assembly builder for use in virtualization environments, which can be used as a tool for virtualizing installed components in a reference environment, modifying those components if necessary, and then deploying them into another/target environment. Using the virtual assembly builder, a user (e.g., an administrator) can capture the configuration and product/component binaries of existing software components into software appliance artifacts. Appliances can be grouped, and their relationships defined, into software assembly artifacts. Logical connections between appliances within an assembly can be reconfigured by a process of assembly editing. When a desired assembly configuration has been achieved, the assembly can be prepared for, and deployed into, the target environment.02-14-2013
20130042236VIRTUALIZATION OF INTERRUPTS - A method for computing includes running a plurality of virtual machines on a computer having one or more cores and a memory. Respective interrupt addresses in the memory are assigned to the virtual machines. Upon occurrence on a device connected to the computer of an event pertaining to a given virtual machine during a period in which the given virtual machine is swapped out of operation, an interrupt message is written from the device to a respective interrupt address that is assigned to the given virtual machine in the memory. Upon activating the given virtual machine on a given core after writing of the interrupt message, a context of the given virtual machine is copied from the memory to the given core, and a hardware interrupt is automatically raised on the given core responsively to the interrupt message in the memory.02-14-2013
20130042234VIRTUAL MACHINE MANAGEMENT - A virtual machine management method and system is provided. The method includes receiving by a computing system, a list of virtual machines deployed within an enterprise. The computing system determines that a specified time period has elapsed during deployment and a list of resources and transactions associated with the virtual machines is retrieved. The computing system calculates a cost value and service value for deploying the virtual machines and a premium value associated with the services. The computing system determines if the premium value is within a policy for the enterprise.02-14-2013
20130042235DYNAMIC BOOTSTRAP LITERAL PROCESSING WITHIN A MANAGED RUNTIME ENVIRONMENT - At least one literal value data structure within a literal pool data structure that is capable of being resolved by run-time initialization within a virtual runtime environment is defined by a processor within a memory storage area. A run-time reference to one of the at least one literal value data structure within the literal pool data structure is detected. A determination is made as to whether a literal value at the one of the at least one literal value data structure is resolved and run-time accessible. The literal value at the one of the at least one literal value data structure within the literal pool data structure is resolved during run-time in response to determining that the literal value is not resolved. The resolved literal value is returned.02-14-2013
20130042237Dynamic Network Adapter Memory Resizing and Bounding for Virtual Function Translation Entry Storage - An approach is provided which a system selects a first virtual function from a plurality of virtual functions executing on a network adapter that includes a memory area. Next, the system allocates, in the memory area, a memory corresponding to the first virtual function. The system then stores one or more translation entries in the allocated memory partition, which are utilized to send data traversing through the first virtual function. As such, the system sends, utilizing one or more of the translation entries, the data packets from the network adapter to one or more destinations. In turn, the system dynamically resizes the memory partition based upon an amount of the memory partition that is utilized to store the one or more translation entries.02-14-2013
20130042238Optimized Virtual Function Translation Entry Memory Caching - An approach is provided in which a virtual function, which executes on a network adapter, receives a data packet from a first virtual machine. A translation entry is identified that corresponds to sending the data packet from the first virtual machine to a second virtual machine, and a determination is made as to whether an onboard memory partition assigned to the virtual function includes the identified translation. If the onboard memory location includes the translation entry, the data packet is sent to the destination virtual machine using the translation entry retrieved from the onboard memory partition. Otherwise, if the translation entry is not located in the onboard memory partition, the data packet is sent to the destination virtual machine using a translation entry retrieved from an off board memory location.02-14-2013
20130139153CONFIGURING A GUEST OS - A host controller system monitors virtual machine hosts for a tuning event. Upon detecting a tuning event, the host controller system identifies at least one virtual machine potentially affected by the tuning event, and determines whether a corresponding guest operating system should be tuned (e.g., whether configuration parameters should be adjusted). If so, the host controller system obtains configuration data for the corresponding guest operating system and provides the configuration data to the corresponding guest operating system.05-30-2013
20090164992Look ahead of links/alter links - A computationally-implemented method comprises retrieving at least a portion of data from a data source, determining an acceptability of an effect of the retrieved at least a portion of the data at least in part via a virtual machine representation of at least a part of an end user's real machine having one or more end-user specified preferences, and providing at least one data display option to the end user's real machine based on the determining acceptability of the effect of the retrieved at least a portion of the data.06-25-2009
20100042994Transportation of a Workspace from One Machine to Another in a Virtualized Computing Environment without Installing an Operating System - The present invention provides methods and systems for transporting a virtual workspace from one computer to another, without installing an operating system on the second computer. The virtual workspace may be embodied as a set of virtual disk images that facilitate the transportation of the workspace to another computer for operating the workspace without necessitating the installation of an operating system.02-18-2010
20100042992Remote Access to Workspaces in a Virtual Computing Environment with Multiple Virtualization Dimensions - The present invention provides methods and systems for virtualization of workspaces in a computer system. The computer system may include an operating system that may abstract the computer's hardware and other applications. Further, the operating system may contain and isolate operating system services from each other and applications and may facilitate virtualized execution of one or more applications. In addition, the virtualization of workspace may contain and isolate user data from the hardware, the operating system and the applications, and may use a server to provide remote access to the virtualized workspace from a client device.02-18-2010
20100107163MOVABLE VIRTUAL MACHINE IMAGE - The present invention provides the movable virtual machine image using the OS level virtualization and the method for creating and utilizing the movable virtual machine image. The movable virtual machine image is independent of the hardware of PCs and easy to attach or detach from the OS, thereby presents easy and quick moving, distributing, sharing and initializing.04-29-2010
20100107162ROUTING ACROSS A VIRTUAL NETWORK - A data center can share processing resources using virtual networks. A virtual machine manager (04-29-2010
20100107161Method of Improving or Managing Performance of Storage System, System, Apparatus, and Program - A computer system including a server computer providing plural virtual servers, a management computer, and a storage system having plural storage controllers, providing plural logical units. The server computer controls I/O processing of each virtual server according to the I/O priorities for the virtual servers to arbitrate I/O processing performance between the virtual servers. Cooperative settings between the server computer and the storage system are made or information about the storage system corresponding to a virtual server with which cooperative configurations are made is displayed.04-29-2010
20100107160Protecting computing assets with virtualization - Methods and apparatus protect computing assets of a hardware platform hosting a plurality of guest virtual machines. One of the virtual machines is configured as a management domain that determines whether other virtual machines comply with a predetermined policy before they can be guested on the hardware platform. In one instance, an open virtual machine format (OVF) for virtual machines has attendant metadata that the management domain examines for the presence of a signature. If authentic, the management domain allows the installation of the virtual machine. If not, the management domain prevents its installation. In this manner, end-users are prevented from installing unapproved guest operating systems on corporate-owned hardware. Still other features contemplate preventing users from installing applications into existing domains by assigning various user and administrative rights. Computer program products for assisting in the foregoing are also disclosed.04-29-2010
20100107159Virtual Machine Scheduling Methods and Systems - A method for managing virtual machines in an information handling system (IHS) is disclosed. The method may include receiving a characteristic of a first virtual machine from a connection broker and hosting the first virtual machine on a virtualization server. The method may further include determining availability of more than one virtual machine and if more than one virtual machine is available, hosting a second virtual machine having the characteristic of the first virtual machine.04-29-2010
20100107158LOW OVERHEAD FAULT TOLERANCE THROUGH HYBRID CHECKPOINTING AND REPLAY - A virtualized computer system provides fault tolerant operation of a primary virtual machine. In one embodiment, this system includes a backup computer system that stores a snapshot of the primary virtual machine and a log file containing non-deterministic events occuring in the instruction stream of the primary virtual machine. The primary virtual machine periodically updates the snapshot and the log file. Upon a failure of the primary virtual machine, the backup computer can instantiate a failover backup virtual machine by consuming the stored snapshot and log file.04-29-2010
20100031252Method And System For Monitoring The Performance Of An Application And At Least One Storage Device For Storing Code Which Performs The Method - A method and system of monitoring the performance of an application running across multiple virtual machines using thread instance data are provided. The application runs or executes in an environment in which a first thread is processed on a first virtual machine in response to an invocation process and a second thread is processed on a second virtual machine in response to a request to invoke from the first thread. The method includes automatically generating first and second sets of thread instance data. The first set of thread instance data is based on the processing of the first thread and the second set of thread instance data is based on the processing of the second thread. The method also includes correlating the first and second sets of thread instance data to tie the invocation and performance of the processing of the first thread to the performance of the processing of the second thread. The invocation process is followed across the threads of execution of the multiple virtual machines.02-04-2010
20120185855IMAGE MANAGEMENT FOR VIRTUAL MACHINE INSTANCES AND ASSOCIATED VIRTUAL STORAGE - A storage management method provides an intermediary between storage subsystems and a virtual machine manager, e.g., a hypervisor. The storage management provides a unified user interface for configuration and unifies handling virtual machine image storage/retrieval, as well as management of virtual disk volumes provided to the operating systems and applications within virtual machine images. The images including the virtualized storage along with the entire state of the virtual machine form snapshots that can be cloned, stored when taking a virtual machine off-line and loaded when the virtual machine is being brought on-line.07-19-2012
20090119665TRANSITIONING OF VIRTUAL MACHINE FROM REPLAY MODE TO LIVE MODE - A backup VM is allowed to enter live execution mode at instruction boundaries but not in the middle of emulation of a single instruction. This is accomplished by having the last log entry of multiple entries generated during emulation of an instruction to have an indication of a “go-live” point and by having the backup VM not replay log entries provided by the primary VM beyond the log entry that indicates the “go-live” point.05-07-2009
20120167083COALESCING VIRTUAL MACHINES TO ENABLE OPTIMUM PERFORMANCE - Virtual machine resources may be monitored for optimal allocation. One example method may include generating a list of virtual machines operating in a network and surveying the virtual machines to determine their current resource usage data. The method may also include ranking the virtual machines based on their current resource usage data to indicate available resources of the virtual machines, and assigning the virtual machines to at least one business application service group (BASG) that requires the available resources of the virtual machines.06-28-2012
20120167081Application Service Performance in Cloud Computing - Methods and apparatuses associated with cloud computing are disclosed herein. In embodiments, a method may include receiving, by a service monitor operating on a computing device, performance information associated with services provided by an application service with instances operating on a plurality of virtual machines deployed on a plurality of servers of a computing cloud. The service monitor, in response, may identify one or more requests of the computing cloud to attempt to improve performance of the services provided by the application service. Other embodiments may be disclosed and claimed.06-28-2012
20120167077Bulk data management in a virtual environment - A system and method for service aware virtualization is disclosed. The system comprises a plurality of virtual instances operating on virtualization software and a plurality of service manager modules operating on the virtualization software. Each service manager module is coupled to a separate virtual instance and configured to interface with an operation of guest software operating within the virtual instance on the virtualization software. A management interface coupled to the service manager modules interfaces with the plurality of virtual instances.06-28-2012
20130047160SYSTEMS AND METHODS FOR MODIFYING AN OPERATING SYSTEM FOR A VIRTUAL MACHINE - Systems, methods, and software are described herein for operating a data management system, including executing an attached application and application data on a first virtual machine running a first operating system, separating the attached application and application data from the first virtual machine, and dynamically attaching the application and application data to a second virtual machine running an updated version of the first operating system.02-21-2013
20130047154METHOD FOR GENERATING SECURE SNAPSHOTS - In a technique for creating a secure snapshot of a virtual machine, a guest operating system of the virtual machine is caused to enter a locked state prior to the snapshot of the virtual machine being created. When the snapshot is subsequently used to restore the virtual machine, the guest operating system of the virtual machine is restored in a locked state and credentials are required to access the guest operating system.02-21-2013
20130047159Preserving, From Resource Management Adjustment, Portions Of An Overcommitted Resource Managed By A Hypervisor - Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest.02-21-2013
20130047158Method and System for Real Time Detection of Resource Requirement and Automatic Adjustments - A method and system for detecting, in real time, resource requirements of a system in virtual environment and automatic scaling of resource parameters to compensate resource requirement in a system. The Virtual machine controller constantly measures resource utilization in the servers and virtual machines associated with it. If a resource requirement is detected with any virtual machine, the automatic resource scaling system detects the type of resource to be scaled and scales the selected resource. Further, the resource may be scaled up or scaled down, based on the requirements. Further, the scaled resource may be CPU, RAM, disk or any such resource. The proposed system helps to save space and power without compromising security, performance and accessibility.02-21-2013
20130047157INFORMATION PROCESSING APPARATUS AND INTERRUPT CONTROL METHOD - An information processing apparatus includes an interrupt control unit and a virtualization control unit. The interrupt control unit specifies a virtual machine serving as a destination of an interrupt request. The virtualization control unit operates multiple virtual machines. The virtualization control unit includes a specifying unit and an execution control unit. The specifying unit specifies a storage destination of an interrupt program corresponding to the virtual machine specified by the interrupt control unit based on information stored in a storage unit which stores information on a storage destination of an interrupt program in association with each of the multiple virtual machines. The execution control unit reads and executes the interrupt program stored in the storage destination specified by the specifying unit.02-21-2013
20130047156METHOD AND APPARATUS OF ASSIGNING VIRTUAL MACHINE RESOURCES - A method of sharing virtual machine resources. The method includes: in response to at least one user logging in to the virtual machine, monitoring file operations taken by the user in the virtual machine; recording the types of file operations; in response to the user logging out from the virtual machine, restoring the virtual machine back to the original state at the time when the user logged in to the virtual machine according to the recorded types of file operations; and in response to receiving a request for virtual machine resources, assigning one of the virtual machines which is idle and restored back to the original state to the requesting user.02-21-2013
20130047155DATA LAYOUT TRANSFORMATION FOR WORKLOAD DISTRIBUTION - Techniques are disclosed relating to data transformation for distributing workloads between processors or cores within a processor. In various embodiments, a first processing element receives a set of bytecode. The set of bytecode specifies a set of tasks and a first data structure that specifies data to be operated on during performance of the set of tasks. The first data structure is stored non-contiguously in memory of the computer system. In response to determining to offload the set of tasks to a second processing element of the computer system, the first processing element generates a second data structure that specifies the data. The second data structure is stored contiguously in memory of the computer system. The first processing element provides the second data structure to the second processing element for performance of the set of tasks.02-21-2013
20130047153METHOD AND APPARATUS TO IMPROVE EFFICIENCY IN THE USE OF RESOURCES IN DATA CENTER - A method of managing use of resources in data center comprises: determining whether first storage subsystem includes a virtual volume or a storage pool that uses a physical volume of second storage subsystem and, if yes, migrating the physical volume to first storage subsystem; determining whether any storage subsystem includes a virtual volume created directly from a physical volume and, if yes, migrating the virtual volume to another virtual volume provisioned from the storage pool of the storage subsystem; and determining whether all virtual volumes satisfy a preset service level objective and, if no, then selecting a virtual machine which has a smallest virtual machine disk file and selecting a storage pool having a largest free space, and then selecting a virtual volume of the storage subsystem which has the selected storage pool and migrating the virtual machine disk file of the selected virtual machine to the selected virtual volume.02-21-2013
20130047152Preserving, From Resource Management Adjustment, Portions Of An Overcommitted Resource Managed By A Hypervisor - Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest.02-21-2013
20130047151VIRTUALIZATION GATEWAY BETWEEN VIRTUALIZED AND NON-VIRTUALIZED NETWORKS - Methods and apparatus are provided for controlling communication between a virtualized network and non-virtualized entities using a virtualization gateway. A packet is sent by a virtual machine in the virtualized network to a non-virtualized entity. The packet is routed by the host of the virtual machine to a provider address of the virtualization gateway. The gateway translates the provider address of the gateway to a destination address of the non-virtualized entity and sends the packet to the non-virtualized entity. The non-virtualized entity may be a physical resource, such as a physical server or a storage device. The physical resource may be dedicated to one customer or may be shared among customers.02-21-2013
20100070972APPARATUS, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING INFORMATION - Port numbers allocated to each HTTP server are registered in association with identification information of the corresponding HTTP server in a port managing table. A worker HTTP server refers to the port managing table and determines unique port numbers as internal ports thereof that do not overlap with port numbers allocated to other HTTP servers.03-18-2010
20090044187Methods And Apparatus For Creating An Isolated Partition For A Virtual Trusted Platform Module - A data processing system isolates a virtual trusted platform module (vTPM) manager in the processing system from other management software in the processing system. In one example process, the processing system launches a virtual machine monitor (VMM) that includes a memory-mapped input/output (MMIO) trap. The processing system also launches a vTPM manager in a first virtual machine (VM). In addition, the processing system launches a second VM to contain virtual machine management programs other than the vTPM manager and the MMIO trap. Other embodiments are described and claimed.02-12-2009
20090044186SYSTEM AND METHOD FOR IMPLEMENTATION OF JAVA AIS API - A computer system includes a cluster of one or more nodes corresponding to a processor and representing a first execution layer, the node being adapted to execute an application component; and an application interface adapted to model a virtual machine as a secondary node of the cluster operating as a second execution layer on the first execution layer; wherein the application interface is adapted to manage one or more non-virtual machine application components as application components executing on the first execution layer and one or more virtual machine application components as application components executing on the second execution layer.02-12-2009
20090307690Managing Assignment of Partition Services to Virtual Input/Output Adapters - Automated management of partition service assignment to a virtual input/output (VIO) adapter is provided. Responsive to creation of a new partition service in a data processing system, a partition priority number is determined for the new partition service, and, for each VIO adapter, the partition priority numbers of the partition services currently assigned to that VIO adapter are summed. For a VIO adapter with a lowest sum of partition priority numbers, logic determines whether assigning the new partition service to that VIO adapter results in its summed partition priority number being above a predefined threshold, and the new partition service is assigned to a VIO adapter based, at least in part, on whether assigning the new partition service to the VIO adapter with the lowest sum of partition priority numbers results in that VIO adapter's summed partition priority number exceeding the predefined threshold.12-10-2009
20090307689VIRTUAL MACHINE COMMUNICATIONS - Apparatus, systems, and methods may operate to emulate a virtual device with bidirectional communication capability using a hypervisor. A virtual machine, started by the hypervisor, is capable of receiving hypervisor information from, and transmitting virtual machine information to the hypervisor via the bidirectional communication capability. Further activity may include detecting the existence of the hypervisor information by detecting a logical connection of the virtual device, and masking the existence of the virtual device from a virtual machine user inside the virtual machine. Additional apparatus, systems, and methods are disclosed.12-10-2009
20090307687Systems and methods for application mobility using virtual real memory services - Systems, methods and media for sharing an application among multiple server systems are disclosed. In one embodiment, the application is stored on a fast disk paging device. The paging device is in communication with each of a plurality of servers so that each server may be given access to the application. Virtual real memory (VRM) is allocated to a first virtual client of the first server. A portion of this VRM is allocated to the application. The application is executed by a virtual client of a first server. During execution a condition may occur that requires taking the first server off line. In that event, VRM is allocated to a second virtual client of a second server. A portion of this VRM is allocated to the application. The application is then executed by the second virtual client of the second server.12-10-2009
20090307686SELECTIVE MEMORY DONATION IN VIRTUAL REAL MEMORY ENVIRONMENT - A method, system, and computer usable program product for selective memory donation in a virtual real memory environment are provided in the illustrative embodiments. A virtual machine receives a request for memory donation. A component of the virtual machine determines whether a portion of a memory space being used for file caching exceeds a threshold. The determining forms a threshold determination, and the portion of the memory space being used for file caching forms a file cache. If the threshold determination is false, the component ignores the request. If the threshold determination is true, a component of the virtual machine releases a part of the file cache that exceeds the threshold. The part of the file cache forms a released file cache. In response to the request, the virtual machine makes the released file cache available to a requester of the request.12-10-2009
20120222027Mechanism for Synchronizing Backend Peripheral Devices with a Virtual Machine Running State - A mechanism for synchronizing backend peripheral devices with a virtual machine (VM) running state is disclosed. A method of the invention includes modifying a running state of a (VM managed by a hypervisor of a host machine, and updating a VM state indication associated with the VM to reflect the change in running state of the VM, wherein a peripheral device associated with the VM accesses the VM state indication to determine whether to continue processing a VM state changing instruction.08-30-2012
20120192185VIRTUAL IMAGE OVERLOADING FOR SOLUTION DEPLOYMENT - At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.07-26-2012
20120192184VIRTUAL IMAGE DEPLOYMENT WITH A WARM CACHE - A cache image including only cache entries with valid durations of at least a configured deployment date for a virtual machine image is prepared via an application server for the virtual machine image. The virtual machine image is deployed to at least one other application server as a virtual machine with the cache image including only the cache entries with the valid durations of at least the configured deployment date for the virtual machine image.07-26-2012
20120192183DYNAMIC NETWORK ADAPTER QUEUE PAIR ALLOCATION - A method of dynamically changing an allocation of queue pair resources to an operating system image running in virtualized environment receives a notification at the operating system image of a change in allocation of queue pair resources to the operating system image. The method queries a physical network adapter through a hypervisor to obtain a new queue pair resource count that will exist in the virtualized system after the change in allocation. The method performs a hashing operation in the operating system image using the new queue pair resource count to distribute transmit traffic among the queue pair resources that will exist in the virtualized system after the change in allocation.07-26-2012
20120192182MIGRATION OF VIRTUAL MACHINES - To migrate two or more virtual machines in a source hypervisor to a target hypervisor, a list of active and connected virtual machines in the source hypervisor is acquired. Connections between the source virtual machines are rerouted to a buffer so that data flowing between the source virtual machines is captured. The source virtual machines are migrated to a target hypervisor and are connected in the same manner as in the source hypervisor. The buffered data is migrated to the respective migrated virtual machines, and the target virtual machines are activated. The virtual machines can be migrated in order of data flow dependency such that the least dependent virtual machine is migrated first.07-26-2012
20120192181CONSENT-BASED VIRTUAL MACHINE MIGRATION - A system, method, and computer program product for controlling migration of a VM operable on a first site and a second site. The system includes an identify component for identifying the second site; a request component for sending a consent request message to a software component, wherein the consent request message comprises at least one of an identifier of the VM and an identifier of the second site; a calculate component, operable on the software component and responsive to receiving the consent request message, for determining consent for the second site; a send component, responsive to a positive determination, for sending a consent message; and a migrate component, responsive to receiving the consent message, for migrating the VM from the first site to the second site.07-26-2012
20120192180PLAYING TELEVISION PROGRAM IN VIRTUAL ENVIRONMENT - In a virtual environment, a virtual machine (VM) host includes a host screen and a first host window displayed in the host screen. A VM guest is instantiated on the VM host. The VM guest includes a guest screen that is presented in the first host window. The VM launches a television player application and instructs the television player application to play a television program in the guest screen. The VM host generates one or more key words according to program information of the television program and sends a query request with the one or more key words to a remote server via a network. After receiving return information from the remote server, the VM host creates a second host window displayed in the host screen and displays the return information in the second host window.07-26-2012
20120192179Method and Apparatus for Distributing a Composite Software Stack as a Virtual Machine Image - Methods and apparatus are provided for distributing a composite software stack as a virtual appliance. A new virtual appliance is published by obtaining a parent virtual appliance; configuring the new virtual appliance; obtaining file level differences between the parent virtual appliance and the new virtual appliance; and publishing the new virtual appliance as a patch comprising the file level differences relative to the parent virtual appliance. The file level differences comprise one or more of additions, deletions and modifications to the parent virtual appliance. An update to a given virtual appliance can be published as a fix pack, wherein the fix pack comprises file level differences relative to the given virtual appliance. An end user obtains a desired virtual appliance is obtained (for example, from a library of virtual appliances) by selecting the desired virtual appliance; obtaining metadata for the desired virtual appliance comprising an identifier of a patch file and a parent virtual appliance; and applying the patch file to the parent virtual appliance to get a modified virtual appliance.07-26-2012
20120192178RESETTING A VIRTUAL FUNCTION THAT IS HOSTED BY AN INPUT/OUTPUT ADAPTER - A computer-implemented method may include selecting a first virtual function that is hosted by a hardware input/output adapter and identifying a first logical partition that is associated with the first virtual function. The computer-implemented method may include retrieving first data corresponding to the first virtual function from a table in response to determining that the first logical partition has initiated a shutdown operation. The computer-implemented method may also include creating a first reset virtual function structure that includes at least a portion of the first data. The computer-implemented method may include sending the first reset virtual function structure to a dispatchable hypervisor.07-26-2012
20120192177FEATURE DRIVEN BACKEND SWITCHING - A method and system for switching backend devices in a virtual machine system based on features of the backend devices. In one embodiment, a computer system includes at least a first device and a second device that function as a backend device. The first device is currently used by a guest of the computer system as the backend device. A hypervisor of the computer system receives an indication from the guest to use a feature of the backend device. The hypervisor determines whether the use of the feature of the backend device triggers a switching condition. In response to a determination that the switching condition is triggered, the guest is switched to use the second device as the backend device. The switching operation can be transparent to the guest.07-26-2012
20120192176Providing Seamless Copy-Paste Operations in a Virtual Machine Environment - A hypervisor running on a host computer system receives data that was requested to be copied on a client device using one of a plurality of copy operations supported by the client device. The hypervisor transfers the data and an identifier of a copy operation used on the client device to a virtual machine hosted by the host computer system to allow a user to paste the data in the virtual machine via a paste operation that corresponds to the copy operation used on the client device.07-26-2012
20120192175Method and System to Accelerate Copying of Virtual Machine Images - A system, program product, and method are provided for copying a virtual machine image. An image library comprising a plurality of system images is provided by a target data processing system. A source image selection is received at the target data processing system. A given image from the image library is selected by the target system based on the received source image. The selected given image is transformed into a copy of the virtual machine image by receiving blocks from a source system that are part of the virtual machine image but not a part of the selected given image, such that only the blocks missing from the selected given image are transferred from the source system to the target system in order to form the copy of the virtual machine image. The source image is preferably a virtual data processing system image.07-26-2012
20090300606VIRTUAL MACHINE MIGRATION WITH DIRECT PHYSICAL ACCESS CONTROL - A data processing system facilitates virtual machine migration with direct physical access control. The illustrative data processing system comprises a software-programmable trap control associated with hardware registers of a computer that selectively vectors execution control of a virtual machine (VM) between a host and a guest. The data processing system further comprises a logic which is configured for execution on the computer that programs the trap control to enable the virtual machine to directly access the hardware registers when the virtual machine is not migrated and to revoke direct access of the hardware registers in preparation for virtual machine migration.12-03-2009
20090094603In-Place Conversion of Virtual Machine State - One embodiment of the present invention includes a method of making a bootable image for a computer, wherein the bootable image corresponds to a first virtual machine but is bootable on a target machine, the method comprising: (a) instantiating the first virtual machine within a virtualization system and executing computations thereof, the computations operating upon an encapsulation of virtual machine state for the instantiated virtual machine; and (b) introducing into the encapsulation, a boot loader that defines at least one transformation to be performed on the encapsulation to allow the target machine to boot from the virtual machine state.04-09-2009
20130185719THROTTLING GUEST WRITE IOS BASED ON DESTINATION THROUGHPUT - This application describes a system and techniques for managing the replication, migration, or backing up of virtual machines (VM) operating on a computing device. The techniques include managing real time or near real replication or migration of VM operations logs between computing devices. The operations logs include information or data that would enable another VM to function or operate in the same manner as the VM that generated the operations logs. Techniques are presented herein to insure the replication or migration process of VMs is not open ended or indefinite. For example, the write rate of the source operations log is managed to insure the replication or migration of the source operations log to destination device terminates within a reasonable amount of time.07-18-2013
20130074071COPYING SEGMENTS OF A VIRTUAL RESOURCE DEFINITION - Segments of a virtual resource definition are copied from an existing virtual resource to create a new virtual resource definition or modifying an existing one to simplify virtualization management. The virtualization manager divides a virtual resource definition into a number of reusable segments. A user may then select one or more segments and place them into a new or existing virtual resource definition. The user can choose to mix and match segments to quickly create or modify a virtual resource definition such as a virtual server, virtual printer or virtual data storage. Any default information in the new virtual resource or old information in the existing resource is replaced by the information in the copied segment. Any dependencies in the existing virtual resource are resolved with user input to break the dependencies or copy dependent data.03-21-2013
20130074070METHODS AND APPARATUS FOR FAST CONTEXT SWITCHING IN A VIRTUALIZED SYSTEM - The present disclosure provides methods and apparatus for fast context switching in a. virtualized system. In the disclosed system, a globally unique application-space identifier is associated with each guest application. No two applications share the same application-space identifier, even if the two applications reside in different virtual machines. Domain identifiers are used to ensure that a guest's mappings are only active when that guest is executing. A unique domain identifier is associated with each virtual machine, and all translation lookaside buffer entries thereby mapping the guests kernel pages with that domain value. All other mappings are tagged with a predefined domain such as zero. In addition, a virtual memory management unit may be configured to support two virtual page table pointers and a configurable boundary between a virtual user page table and a virtual kernel page table. In such an instance, the two virtual page table pointers are presented to a guest operating system, and two physical page table pointers are associated with the two virtual page table pointers.03-21-2013
20130074069SYSTEM AND METHOD FOR CROSS-PLATFORM APPLICATION EXECUTION AND DISPLAY - A method is provided for downloading and running a non-native application designed for a source operating system (OS) on a target device having a target OS, the method includes: connecting the target device to a source device having the application in a paring operation; transferring a shareable provisional profile containing characteristics related to the application, including information on the source OS needed to run the application from the source device to the target device; and obtaining the source OS on the target device. Once the source OS is present on the target device, the method downloads the application from the source device to the target device, executes the source OS as a virtual machine on the target device, and runs the application within the source OS virtual machine.03-21-2013
20130074068Method, System, and Computer Program for Implementing a Customizable Virtual Appliance - A method for managing a virtual image in a cloud environment by implementing a customizable virtual image deployment may be provided. The method may comprise generating a virtual image and a set of configuration parameters related to specific parts of the virtual image, and assigning a set of values to the configuration parameters. Furthermore, the method may comprise deploying the virtual image using the set of values assigned to the parameters, such that parts of the virtual image may be deployed as a customized virtual image depending on the set of values of the parameters.03-21-2013
20130074067MULTIMODAL COMPUTING DEVICE - Technologies described herein generally provide a multimodal device capable of providing at least dual usage. In an example, the multimodal device may include base hardware and a hypervisor that runs on the base hardware. A work virtual machine may include a work operating system that is configured to operate on the hypervisor. A home virtual machine may include a home operating system that is configured to operate on the hypervisor. The work virtual machine may further include an arbitrator operating system that is configured to operate on hypervisor. The arbitrator operating system may be configured to run a smart arbitrator server. The smart arbitrator server may be configured to provide a gateway between the work virtual machine and the home virtual machine The smart arbitrator server may also be configured to enforce various policies between the work virtual machine and the home virtual machine.03-21-2013
20130074066Portable Port Profiles for Virtual Machines in a Virtualized Data Center - Techniques are provided for implementing a portable port profile that is based on a virtual machine (VM) definition file. Properties are specified within the VM definition that allow a virtual switch to look up one or more network policies such as connectivity, firewall, or other enforcement policies, and apply those policies on a customizable basis to the VM's virtual network interface.03-21-2013
20130074065Maintaining Consistency of Storage in a Mirrored Virtual Environment - A method of achieving data consistency in a shared storage accessible by a first and second machine. The method includes, in response to receiving state information of the first machine, configuring the second machine to a mirrored operating state corresponding to an operating state of the first machine, receiving a notification that the first machine will overwrite existing data stored in the shared storage, and, in response to the notification, reading the existing data, storing a copy of existing data in a local storage of the second machine, and sending an acknowledgment to the first machine that the copy has been stored in the local storage, to enable the first machine to overwrite the existing data with newly written data. The method also includes, in response to receiving a failure notification, retrieving the copy of the existing data, overwriting the newly written data with the copy of the existing data.03-21-2013
20130074064AUTOMATED INFRASTRUCTURE PROVISIONING - A mechanism is provided for creating and deploying a user environments for work groups in a cloud computing environment. A user such as an administrator is provided an interface for defining an end user computing environment and a desired IT infrastructure. Based on this information the system creates the infrastructure in the cloud platform. The underlying provisioning of the infrastructure in the cloud is transparent to the administrator.03-21-2013
20130074073VIRTUAL MACHINE - A portable computing system can include a first virtue machine. The portable computing system can connect to a computing system. The computing system can access the virtual machine on the portable computing system.03-21-2013
20130074072METHODS, APPARATUS AND ARTICLES OF MANUFACTURE TO UPDATE VIRTUAL MACHINE TEMPLATES - Example methods, apparatus and articles of manufacture to update virtual machine templates are disclosed. A disclosed example method to update a virtual machine template (03-21-2013
20130061220METHOD FOR ON-DEMAND INTER-CLOUD LOAD PROVISIONING FOR TRANSIENT BURSTS OF COMPUTING NEEDS - A method for provisioning computing resources for handling bursts of computing power including creating at least one auxiliary virtual machine in a first cloud of a first plurality of interconnected computing devices having at least one processor, suspending the at least one auxiliary virtual machine, receiving a burst job requiring processing in a queue associated with at least one active virtual machine, transferring a workload associated with the queue from the at least one active virtual machine to the at least one auxiliary virtual machine, resuming the at least one auxiliary virtual machine, and processing the workload with the at least one auxiliary virtual machine.03-07-2013
20130061221DETERMINING VIRTUAL MACHINE IMAGE PATTERN DISTRIBUTIONS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for determining distributions of virtual machine (VM) patterns across pools of VM instances based upon historical data (e.g., to achieve faster provisioning times). In a typical embodiment, a total pool size for a pool of VM instances is determined (e.g., based on historical data). Then, a distribution of a set of VM instance patterns across the pool is determined (e.g., also based upon historical data). Once the distribution has been determined, the pool of VM instances may be provisioned according to the distribution.03-07-2013
20130061219System and Method for Self-Aware Virtual Machine Image Deployment Enforcement - According to one embodiment of the present disclosure, a method includes receiving a request to instantiate a virtual machine image in a virtualization environment. The method also includes sending a request for verification of the virtualization environment. The method further includes receiving information from the enforcement module in response to the request for verification of the virtualization environment. The method further includes determining whether the virtualization environment is verified based on the information received.03-07-2013
20130061223SYSTEM AND METHOD FOR CACHING OPTIMIZATION OF GUEST OPERATING SYSTEMS FOR DISRIBUTED HYPERVISOR - The disclosed embodiments relate to a method, an apparatus, and computer-readable medium storing computer-readable instructions for optimizing the delivery and/or enablement of guest operating systems to distributed hypervisors.03-07-2013
20130061227PRESERVING CHANGES TO A CONFIGURATION OF A RUNNING VIRTUAL MACHINE - A method is provided for preserving changes to a configuration of a running virtual machine. The method includes reading an initial configuration, starting the virtual machine under application of the initial configuration, modifying the configuration of the virtual machine during runtime, storing the modified configuration of the virtual machine during shutdown, and reading the modified configuration at re-start of the virtual machine and re-starting the virtual machine under application of the modified configuration.03-07-2013
20130061226Method and Apparatus for Distributing a Composite Software Stack as a Virtual Machine Image - A composite software stack is distributed as a virtual appliance. A new virtual appliance is published by obtaining a parent virtual appliance; configuring the new virtual appliance; obtaining file level differences between the parent virtual appliance and the new virtual appliance; and publishing the new virtual appliance as a patch comprising the file level differences relative to the parent virtual appliance. The file level differences comprise additions, deletions and/or modifications to the parent virtual appliance. An update to a given virtual appliance can be published as a fix pack, wherein the fix pack comprises file level differences relative to the given virtual appliance. An end user obtains a desired virtual appliance by selecting the desired virtual appliance; obtaining metadata for the desired virtual appliance comprising an identifier of a patch file and a parent virtual appliance; and applying the patch file to the parent virtual appliance to get a modified virtual appliance.03-07-2013
20130061224MOVEABLE ACCESS CONTROL LIST (ACL) MECHANISMS FOR HYPERVISORS AND VIRTUAL MACHINES AND VIRTUAL PORT FIREWALLS - A computer implemented method of virtual machine migration with filtered network connectivity includes enforcing network security and routing at a hypervisor layer which is independent of guest operating systems via dynamic updating of routing controls initiated by a migration of said virtual machine from a first device to a second device.03-07-2013
20130061225DATA RELAY DEVICE, COMPUTER-READABLE RECORDING MEDIUM, AND DATA RELAY METHOD - A data relay device includes a memory and a processor. The processor executes a data relay process includes determining that determining whether or not a storage device, which stores a virtual machine identifier of a virtual machine operated by the server connected with the computer and a port, stores the received virtual machine identifier in association with another port. The data relay process includes transferring that transfers the setting request of the port profile to a data relay device of an upper level higher than the data relay device in a communication path through which the virtual machine represented by the virtual machine identifier performs communication when it is determined that the received virtual machine identifier is not stored in association with the other port.03-07-2013
20130061222APPARATUS AND METHOD FOR MANAGING OPTIMIZED VIRTUALIZATION MODULE - An apparatus to manage a virtualization module includes a virtualization module managing unit to retrieve a virtualization module corresponding to an application, a verification table retrieving unit to retrieve first verification data corresponding to the virtualization module from a verification table, a verification unit to verify the virtualization module, based on the first verification data and the virtualization module, and a virtual machine unit to execute, using a processor, the virtualization module a virtual machine if the virtualization module is successfully verified. A method for managing a virtualization module includes retrieving a virtualization module corresponding to an application; retrieving first verification data corresponding to the virtualization module from a verification table; verifying the virtualization module, based on the first verification data and the virtualization module; and executing, using a processor, the virtualization module using a virtual machine if the virtualization module is successfully verified.03-07-2013
20090271787LINKING VIRTUALIZED APPLICATION NAMESPACES AT RUNTIME - A method for linking a plurality of virtualized application packages for execution on a computer system is described. A runtime executable of a primary virtualized application package is launched. A secondary virtualized application package to be merged with the primary virtualized application package is identified. In one embodiment, application settings and file data for the first and second virtualized application packages are merged into a single data structure. An execution layer is created by starting execution of one of the application files associated with the primary virtualized application package. Requests from the execution layer to the operating system for configuration settings and contents of application files of either the primary virtualized application package or secondary virtualized application package and providing requested configuration settings are satisfied using configuration settings and file information from both the primary and secondary virtualized application packages.10-29-2009
20090271786SYSTEM FOR VIRTUALISATION MONITORING - A system for virtualization monitoring is provided as a hardware interface provided on a physical machine supporting a virtualization layer. The interface comprises an indication of the state of virtualization on the physical machine to monitor any virtual machines running on the physical machine. The interface also comprises means for interacting with the virtualization layer, for example for activating a maintenance mode by a migration of virtual servers running on a physical machine.10-29-2009
20090271785INFORMATION PROCESSING APPARATUS AND CONTROL METHOD - According to one embodiment, an information processing apparatus capable of controlling a plurality of operating systems, includes an activation module which activates an activation program, a management module which manages the plurality of operating systems to be activated by the activation module, a storage module which stores a main operating system that runs on the management module and a guest operating system that runs on the management module via a virtual activation program, and a notification module which, if a monitoring program that runs on the main operating system activated determines that a configuration of the information processing apparatus has changed, causes a notification program running on the main operating system to notify the guest operating system activated from the storage module via the virtual activation program of change information of the configuration of the information processing apparatus.10-29-2009
20090271784Executing A Distributed Java Application On A Plurality Of Compute Nodes - Methods, systems, and products are disclosed for executing a distributed Java application on a plurality of compute nodes. The Java application includes a plurality of jobs distributed among the plurality of compute nodes. The plurality of compute nodes are connected together for data communications through a data communication network. Each of the plurality of compute nodes has installed upon it a Java Virtual Machine (‘JVM’) capable of supporting at least one job of the Java application. Executing a distributed Java application on a plurality of compute nodes includes: tracking, by an application manager, JVM environment variables for the JVMs installed on the plurality of compute nodes; and configuring, by the application manager, the plurality of jobs for execution on the plurality of compute nodes in dependence upon the JVM environment variables for the JVMs installed on the plurality of compute nodes.10-29-2009
20120227038LIGHTWEIGHT ON-DEMAND VIRTUAL MACHINES - Virtual machines are made lightweight by substituting a library operating system for a full-fledged operating system. Consequently, physical machines can include substantially more virtual machines than otherwise possible. Moreover, a hibernation technique can be employed with respect to lightweight virtual machines to further increase the capacity of physical machines. More specifically, virtual machines can be loaded onto physical machines on-demand and removed from physical machines to make computational resources available as needed. Still further yet, since the virtual machines are lightweight, they can be hibernated and restored at a rate substantially imperceptible to users.09-06-2012
20120227037INSTALLATION SYSTEM AND METHOD FOR INSTALING VIRTUAL MACHINES - A remote computer and method installs a virtual machine and one or more operating systems in cloud servers of a data center. The remote computer determines if each of the cloud servers has been successfully installed the virtual machine. The remote computer obtains the IP address of the cloud servers that have been successfully installed the virtual machine by the virtual machine controlling application. The remote computer sends an operating system image file to each of obtained cloud servers to install an operating system on the virtual machine of each of the obtained cloud servers according to the IP address of the obtained cloud servers.09-06-2012
20130067472ORGANIZATION OF HETEROGENEOUS ENTITIES INTO SYSTEM RESOURCE GROUPS FOR DEFINING POLICY MANAGEMENT FRAMEWORK IN VIRTUAL CLUSTER MANAGED SYSTEMS ENVIRONMENT - Policies are implemented in a virtual cluster managed systems. Heterogeneous entities are organized into system resource group (SRG) hosted on a virtual volume that is accessed via a virtual machine. Each of the heterogeneous entities is visible to an application operable on the virtual cluster managed systems environment. The system resource group is subject to at least one membership requirement, defines a relationship between at least two of the heterogeneous entities, contains at least one policy defining an operation as to be performed on the system resource group for a domain of the virtual cluster managed systems environment, and defines at least a portion of a policy framework between the system resource group and an additional system resource group organized from additional heterogeneous entities. The system resource group expands according to an action performed incorporating the relationship, policy, or policy framework.03-14-2013
20130067471OPERATION TRANSFER FROM AN ORIGIN VIRTUAL MACHINE TO A DESTINATION VIRTUAL MACHINE - Technologies and implementations for transferring operation from an origin virtual machine to a destination virtual machine while the origin virtual machine continues to execute an origin executable are generally disclosed.03-14-2013
20130067466Virtual Switch Extensibility - An extensible virtual switch allows virtual machines to communicate with one another and optionally with other physical devices via a network. The extensible virtual switch includes an extensibility protocol binding, allowing different extensions to be added to the extensible virtual switch. The extensible virtual switch also includes a miniport driver on which the extensions are loaded, tying the lifetimes of the extensions to the lifetime of the extensible virtual switch.03-14-2013
20120117567INFORMATION PROCESSING SYSTEM - An information processing system that maintains balance in the processing loads between processors and that includes operating systems, which each perform execution control on processing tasks by assigning each task to a task group and causing all tasks in the same task group to be executed on the same processor, and a hypervisor that associates each processor with one or more task groups in the operating systems and causes each operating system to perform the execution control so that all tasks in the same task group are executed on the processor associated with the same task group. The hypervisor sequentially acquires load indicators indicating a processing load of each task group in each operating system, refers to the processing loads indicated by the sequentially acquired load indicators, and when determining that the processing loads are not balanced between the processors, re-associates the processors with the task groups.05-10-2012
20120117566INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM DISTRIBUTION SYSTEM - Provided is an information processing device which is capable of preventing data leakage caused by a malicious application or malicious device driver and of allowing cooperation among virtual machines. The information processing device (05-10-2012
20120117564GUEST TIMER FACILITY IN A VIRTUALIZED PROCESSING SYSTEM - A method includes, in a virtualized processing system, generating a local value of a first counter. The local value is accessible while executing in a first mode of the virtualized processing system. The local value is generated based on a value of a second counter and a ratio of a rate of the first counter to a rate of the second counter. The first counter is inaccessible while executing in the first mode of the virtualized processing system and accessible while executing in a second mode of the virtualized processing system. The first mode may be a guest mode and the second mode may be a host mode. The first counter may be an ACPI Power Management Timer. The second counter may be a Time Stamp Counter.05-10-2012
20120117563OVERLOAD CONTROL IN A CLOUD COMPUTING ENVIRONMENT - Provided is a method and devices for overload control in a cloud computing environment. The method includes receiving a first message from a network element associated with the cloud computing environment. The first message includes information associated with a target virtual machine and a list of sessions from the one or more sessions to move from the serving virtual machine to the target virtual machine. Associating one or more client addresses with an address associated with the target virtual machine based on the list of sessions. And, treating the target virtual machine as the serving virtual machine if processing sessions associated with the list of sessions.05-10-2012
20120117562METHODS AND STRUCTURE FOR NEAR-LIVE REPROGRAMMING OF FIRMWARE IN STORAGE SYSTEMS USING A HYPERVISOR - Methods and structure for reprogramming firmware in a storage controller using a virtual machine management (VMM) environment. A storage process (current firmware) in the storage controller operates in a current virtual machine (VM) under control of a hypervisor. Reprogrammed (new) firmware is loaded into a new virtual machine under control of the hypervisor. The new firmware initializes and directs the current firmware to quiesce its processing. The new firmware also requests the hypervisor to map data in the memory space of the current virtual machine into the memory space of the new virtual machine and to transfer ownership/control of devices and network addresses from the current virtual machine to the new virtual machine. The new firmware operating on the new virtual machine then takes control of the storage controller and resumes processing of requests.05-10-2012
20130067468APPLICATION ACCELERATION IN A VIRTUALIZED ENVIRONMENT - One embodiment illustrated herein includes a method that may be practiced in a computing environment. The method includes acts for providing direct access to hardware to virtual machines. The method includes determining that a virtual machine should have access to a piece of hardware. The method further includes a virtual machine requesting access to the hardware from the host wherein a host is a special partition that controls the physical hardware of a computing system and manages virtual machines. The method further includes the host configuring the hardware to allow access to the hardware directly by the virtual machine by the host mapping hardware resources into the virtual machine's address space. The method further includes the virtual machine directly accessing the hardware without going through the host once the hardware has been configured by the host.03-14-2013
20130067470Virtual Machine Monitoring Method, System and Computer Readable Storage Medium - A virtual machine monitoring method used in a virtual machine monitoring system is provided. The virtual machine monitoring method includes retrieving a hypercall transmitted from one of a plurality of virtual machines to a hypervisor of a virtual machine monitoring system, wherein the hypercall is used for establishing a channel between a source virtual machine and a target virtual machine. A central control virtual machine ID information in the hypervisor is retrieved. A type of the channel established by the hypercall is determined according to the central control virtual machine ID information and channel-establishing information corresponding to the hypercall. When the channel is a private channel that is not related to a central control virtual machine of the virtual machines, a security module is used to monitor the private channel.03-14-2013
20130067469Load Balancing By Endpoints - A mechanism is provided for In a cloud computing infrastructure, a mechanism is provided for balancing client sessions across virtual machines such that the number of virtual machines is efficiently managed. In some embodiments, the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions. In one embodiment, the sessions in a virtual machine with low activity are migrated to a virtual machine with higher session rates to allow for the shutdown of the low usage virtual machines. In another embodiment, new user sessions are assigned according to a minimum performance standard.03-14-2013
20130067467RESOURCE MANAGEMENT IN A VIRTUALIZED ENVIRONMENT - In a method for managing resources in a virtualized computing environment, a command to initiate execution of an operating system image dump process for a logical partition of the virtualized computing environment is received while the logical partition is in a process of terminating. One or more resources that are allocated to the logical partition that will not be utilized by the logical partition during execution of the operating system image dump process are determined. A notification to a hypervisor program in the virtualized computing environment is sent. The notification identifies the one or more resources. One of the one or more resources is reallocated. The operating system image dump process is executed.03-14-2013
20130067464VIRTUAL MACHINE MOBILITY USING RESOURCE POOLS - In one embodiment, a portable virtual machine may use a generic resource allocation request to access a host resource. A virtualization host may receive a generic resource allocation request 03-14-2013
20110023031SERVER VIRTUALIZED USING VIRTUALIZATION PLATFORM - A data processing system transforms a physical server into multiple virtual servers. The illustrative data processing system comprises a physical server and a virtualization platform integrated into the physical server that is configured to run multiple operating systems simultaneously one or more physical servers. A baseboard management controller integrated into the physical server controls the virtualization platform and the operating systems including physical and virtual resources. The virtualization platform operates according to state data accessed from the baseboard management controller.01-27-2011
20110023030On-Line Replacement and Changing of Virtualization Software - In a virtualized system running one or more virtual machines on a first hypervisor, a second hypervisor is installed and control of the hardware resources of the physical computer supporting the virtualized system is migrated from the first hypervisor to the second hypervisor without interrupting the operation of the first hypervisor and the virtual machines. Initially a minimal set of hardware resources is hot-removed from control by the first hypervisor, and the second hypervisor is launched on the minimal set of hardware resources. Both the remaining hardware resources and the virtual machines are then migrated from the first hypervisor to the second hypervisor until all the virtual machines have been migrated over to the second hypervisor, while the virtual machines and the first hypervisor continue running largely unaffected by the migration process.01-27-2011
20110023029METHOD AND SYSTEM FOR ABSTRACTING VIRTUAL MACHINES IN A NETWORK - One or more processors and/or one or more circuits may be operable to configure one or more virtual machines and a hypervisor for controlling the one or more virtual machines. The virtual machines and the hypervisor may be distributed across a plurality of network devices. A sub-hypervisor may be configured within each of the virtual machines utilizing the hypervisor. Load information of the network devices may be communicated to the hypervisor utilizing the sub-hypervisors. The virtual machines may include threads, may be load balanced utilizing the hypervisor, dynamically configured utilizing the hypervisor based on changes in the network devices, and scaled by the distribution of the virtual machines across the network devices. Information from the processing of data may be received in the virtual machines. The network devices may include a plurality of: servers, switches, routers, racks, blades, mainframes, personal data assistants, smart phones, desktop computers, and/or laptop devices.01-27-2011
20110023028VIRTUALIZATION SOFTWARE WITH DYNAMIC RESOURCE ALLOCATION FOR VIRTUAL MACHINES - In one embodiment, a system has two or more working computers, each running one or more working virtual machines (VMs), and a protection computer running corresponding protection VMs. A management station can change the levels of computer resources specified in resource-configuration files for the protection VMs, and virtualization software can re-read the resource-configuration files and change the allocation of computer resources to the protection VMs without having to shut down and re-launch the protection VMs. By initially launching the protection VMs with reduced levels of computer resources, fast and cost-effective failover protection can be provided to the working computers, where the computer resources allocated to a protection VM are enhanced only after the detection of a failure of the corresponding working VM, without having to shut down and re-launch the protection VM.01-27-2011
20110023027I/O MEMORY MANAGEMENT UNIT INCLUDING MULTILEVEL ADDRESS TRANSLATION FOR I/O AND COMPUTATION OFFLOAD - An input/output memory management unit (IOMMU) configured to control requests by an I/O device to a system memory includes control logic that may perform a two-level guest translation to translate an address associated with an I/O device-generated request using translation data stored in the system memory. The translation data includes a device table having a number of entries. The control logic may select the device table entry for a given request by the using a device identifier that corresponds to the I/O device that generates the request. The translation data may also include a first set of I/O page tables including a set of guest page tables and a set of nested page tables. The selected device table entry for the given request may include a pointer to the set of guest translation tables, and a last guest translation table includes a pointer to the set of nested page tables01-27-2011
20110023026PATTERN-BASED OPERATING SYSTEMS - Apparatus, systems, and methods may operate to monitor operations of at least one processor to define a set of executed applications executed under a first operating system over a selected time period; and to generate an image of a second operating system having sufficient resources to service a subset of the set of executed applications, the subset determined according to a usage pattern defined by at least a portion of the selected time period, the number of resources provided by the second operating system being less than or equal to the number of resources provided by the first operating system. The images may be loaded based on receipt of a menu selection. Additional apparatus, systems, and methods are disclosed.01-27-2011
20110023025Virtualization for Low-Power Networks - Techniques are generally described that relate to a method and system for associating a virtual device operating in a virtual network having a virtual device coordinator with a low-power device. Example methods may include receiving, by the virtual device coordinator, a low-power device descriptor from the low-power device. The virtual device coordinator may be arranged to determine a low-power device classification based on the received low-power device descriptor. The virtual device may be configured, by the virtual device coordinator, based on one or more of the low-power device classification and/or the low-power device descriptor. The virtual device coordinator may be adapted to store an association record indicating that the virtual device is associated with the low-power device.01-27-2011
20090241110VIRTUAL ENVIRONMENT SYSTEM AND METHOD FOR OPERATING THE SAME - A virtual environment system and a method of operating the same, the virtual environment system including: a virtual operating system (OS) unit to operate a virtual OS installed in a mobile storage medium in a host OS installed in a host computer, to attach a virtual resource included in the virtual OS to the host OS, and to perform arbitration so that a virtual process operated in the virtual OS uses the virtual resource; and a user interface unit to provide a virtual desktop screen so that a user can use the virtual process in the virtual environment provided by the virtual OS.09-24-2009
20090241108VIRTUAL COMPUTING INFRASTRUCTURE - A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. Virtual infrastructures of different users share physical resources but are isolated. Each infrastructure has its own infrastructure controller to create and configure the infrastructure. It has a user accessible part (CFC) for configuration of that user's infrastructure, and a user inaccessible part (UFC) able to access the mapping and the physical resources. This increases user control to ease system administration, while maintaining security by limiting access to the mapping.09-24-2009
20090235247APPARATUS AND METHOD FOR CHECKING IDLE PERIOD OF VIRTUAL MACHINE, AND COMPUTER READABLE RECORDING MEDIUM FOR EMBODYING THE METHOD - An apparatus and method for checking an idle period of a virtual machine, and a computer readable recording medium for embodying the method. The apparatus includes a thread counting unit which counts a total number of threads that are under execution and a monitor thread which detects the idle period of the virtual machine based on the total number of threads that are under execution.09-17-2009
20120272244VIRTUAL MACHINE PLACEMENT TO IMPROVE MEMORY UTILIZATION - Virtual machines having a high amount of identical memory pages are grouped under a common hypervisor to enable greater memory savings as the result of transparent page sharing. One method comprises analyzing the software image content of a plurality of virtual machines running on a plurality of hypervisors in a common migration domain, identifying two or more of the virtual machines having greater than a threshold amount of common memory pages, placing the two or more virtual machines under a common hypervisor, and sharing the common memory pages among the two or more virtual machines. Optionally, the identifying of two or more of the virtual machines may include identifying two or more of the virtual machines having the same software image content classifications; thereby, identifying images with a greater affinity for common memory pages.10-25-2012
20120272243PROTECTING HIGH PRIORITY WORKLOADS IN A VIRTUALIZED DATACENTER - A method includes running a plurality of virtual machine workloads across a plurality of servers within a common power domain, and setting an operating level for each of a plurality of hardware resources within the common power domain in response to receiving an early power off warning from a power source that supplies power to the common power domain, wherein the operating level for each of the hardware resources is determined as a function of the priority of the virtual machine workloads that are utilizing each of the hardware resources.10-25-2012
20120272238MECHANISM FOR STORING VIRTUAL MACHINES ON A FILE SYSTEM IN A DISTRIBUTED ENVIRONMENT - A mechanism for storing virtual machines on a file system in a distributed environment is disclosed. A method of the invention includes initializing creation of a VM by a hypervisor of a host machine, allocating a logical volume from a logical volume group of a shared storage pool to the VM, and creating a file system on top of the allocated logical volume, the file system to manage all files, metadata, and snapshots associated with the VM.10-25-2012
20120272237MECHANISM FOR MANAGING QUOTAS IN A DISTRIBUTED VIRTUALZIATION ENVIRONMENT - A computing device assigns a quota to a entity, the quota specifying a total amount of a low level resource that the entity is permitted to use. The computing device divides the quota into quota portions, and assigns each of the quota portions to one of a plurality of high level resources assigned to the entity. Each of the plurality of high level resources may use low level resources of a plurality of targets. The computing device automatically adjusts quota portions for one or more of the plurality of high level resources in response to changes in utilization requirements of the plurality of high level resources.10-25-2012
20120272235CONSOLIDATION OF IDLE VIRTUAL MACHINES - Idle virtual machine partitions in a virtualized computing environment are consolidated onto one or more idle logical processors. A hypervisor monitors the individual utilization of multiple virtual machine partitions in a computing environment and determines which virtual machine partitions are idle. The hypervisor also monitors the individual utilization of multiple logical processors in the computing environment and determines which logical processors are idle. The hypervisor schedules all of the idle virtual machine partitions on one or more of the idle logical processors. This can improve the performance for work-generating partitions and ensure compliance with service level agreements. At the same time, it can provide efficient power management in that is consolidates idle virtual machines onto a smaller subset of logical processors.10-25-2012
20080256534METHOD FOR IMPROVED IMAGE-CUSTOMIZATION BY USE OF EMBEDDED METADATA - The present invention relates to a method for the customization of virtual machine images. The method comprises identifying and retrieving a virtual machine image template. A customized virtual machine image is created from the virtual machine image template. The customized virtual machine image template being created by identifying at least one file-system or memory image that is associated with the virtual machine image template, identifying within the at least one file-system or memory image at least one data set, wherein the at least one data set comprises metadata. The metadata contains information detailing the required execution context customization aspects for at least one specified image subset of the virtual machine. Execution context-specific information that is required to customize the image subset of the virtual machine is retrieved. Further, the image subset of the virtual machine is modified in accordance with the retrieved execution context-specific information.10-16-2008
20100017801PROFILE BASED CREATION OF VIRTUAL MACHINES IN A VIRTUALIZATION ENVIRONMENT - A method of creating a new virtual machine in a hypervisor server using a virtual machine setup profile is disclosed. A virtual machine setup profile method is selected from a plurality of virtual machine setup profiles. Then, system information is retrieved from the hypervisor server. The system information includes available computing resources in the hypervisor server. Thereafter a number of virtual machines that can be hosted in the hypervisor server based on the available computing resources is calculated and a number of new virtual machines are created in the hypervisor server.01-21-2010
20090024995Dynamic service topology - A method and apparatus for a dynamic service topology. One service is assigned to a virtual machine. The virtual machine is assigned to a physical machine on a network. The service of the virtual machine is transferable from the physical machine to another physical machine on the network by moving the virtual machine.01-22-2009
20120233607Establishing Relationships Among Elements In A Computing System - Establishing relationships among elements in a computing system, the computing system including one or more servers, one or more switches, the one or more servers and one or more switches forming one or more local area networks and also forming one or more virtual local area networks, including: identifying, for each server in the computing system, physical topology data; identifying, for each server in the computing system, virtual topology data; and creating, in dependence upon the physical topology data and the virtual topology data, a system map.09-13-2012
20090013321MANAGING VIRTUAL COMPUTERS - Embodiments are disclosed for managing a plurality of virtual computers in a virtual environment. According to one embodiment, a method includes creating a virtual group. The virtual group includes a plurality of virtual computers having a relevant characteristic. An action to perform on the virtual group is received, and the action is performed on each of the virtual computers in the virtual group.01-08-2009
20090013320Runtime Machine Analysis of Applications to Select Methods Suitable for Method Level Caching - A runtime machine manages a selected disk space allocated to the runtime machine by the operating system and manages a separate method cache within the selected virtual disk space. The runtime machine controls caching within the method cache of a separate result of at least one method of the application marked as cache capable. For a next instance of the method detected by the runtime machine, the runtime machine accesses the cached separate result of the method in lieu of executing the method again. The runtime machine marks a method as cache capable by analyzing the types of objects within the argument object graph and result object graph of a method. If the runtime machine detects only primitive type objects, then the runtime machine marks the method so that the result of the method will be stored in the method cache.01-08-2009
20130167144Virtual Machine Persisted Within Itself - A computer-implemented method includes generating an intermediate representation of a virtual machine. The method includes generating an executable for the virtual machine. The method includes persisting at least part of the intermediate representation in the executable. A virtual machine tangibly stored in a computer-readable storage device, and a computer system, are also disclosed.06-27-2013
20130167145SYSTEMS AND METHODS FOR SAFELY MIGRATING TO VIRTUALIZED PLATFORMS - A computer-implemented method for safely migrating to virtualized platforms may include (1) identifying a virtual machine that is a target of a physical-to-virtual conversion from a physical server, (2) determining that the physical-to-virtual conversion includes at least one future step before the physical-to-virtual conversion is complete, (3) based on determining that the physical-to-virtual conversion includes the future step, creating a snapshot of the virtual machine before the future step, and (4) reverting the virtual machine to the snapshot before the future step. Various other methods, systems, and computer-readable media are also disclosed.06-27-2013
20090007112Method for controlling a virtual machine and a virtual machine system - A next-generation OS with a virtualization feature is executed as a user program on a first virtual processor by selecting, in response to a cause of a call for a host VMM, one of a guest status area (01-01-2009
20090007110INTERRUPT PROCESSING METHOD AND SYSTEM - A method for interrupt processing includes setting a buffer for buffering data packets received by a front-end or back-end of the virtual machine and setting a timer for timing data buffering time; determining, after receiving the data packets from the front-end or the back-end, whether the received data packets are interacting data packets and determining whether to enable or postpone the timer, and buffering the received data packets by the buffer and enabling the timer in the case that the data packets are not the interacting data packets; and sending the buffered data packets through a virtual machine manager to the back-end or the front-end of the virtual machine for processing in the case that the buffer reaches a maximum capacity limit or the timer reaches a predetermined time.01-01-2009
20090007109METHOD AND APPARATUS FOR RECOGNIZING PROCESSES IN GOS BY VMM - The present invention provides a method apparatus for recognizing a process in a guest operation system by a virtual machine monitor, and the method comprises: step 01-01-2009
20090007108Arrangements for hardware and software resource monitoring - In one embodiment a method for accounting processing resources expended on an activity is disclosed. The method can include determining a task to be performed by a domain, where the task can utilize at least one hardware resource and at least one software resource. The method can monitor and correlate events that are only visible as hardware events with events that are only visible as software events. In one embodiment, this capability is applied to virtual machine configurations on platform power-managed systems to provided correlated platform performance state characteristics on virtual machine, workload or thread level. The method can also combine an output metric of the hardware monitor with an output metric of the software monitor to provide an accounting of resources utilized by the task.01-01-2009
20090007101OPTIMAL POLICIES FOR LOAD BALANCING FOR DISTRIBUTED AND STRATEGIC AGENTS (MORE TECHNICALLY, OPTIMAL COORDINATION MECHANISMS FOR MACHINE SCHEDULING) - Providing for scheduling tasks in a distributed system based on an inefficiency of each task on a particular machine as compared with available networked machines is described herein. By way of example, a distribution component can receive a plurality of tasks at a machine assigned by at least one independent agent. In addition, an ordering component can schedule each task on a machine as a function of non-decreasing inefficiency. Such a policy can be implemented locally at the machine, minimizing inter-device communication, while only marginally increasing completion time for the set of tasks. In such a manner, the subject disclosure provides for load balancing of distributed systems in a manner that utilizes fewer resources than conventional approaches.01-01-2009
20130167147VIRTUAL MACHINE APPLIANCES FOR JAVA APPLICATION SERVERS - Methods, systems, and computer programs for providing an application server appliance utilizing one or more virtual machines are described. The application server appliance may be a virtual machine having a reduced guest operating system, a runtime environment, and a management agent installed therein. An appliance controller automatically determines one or more configurations and/or settings for the runtime environment based on a variety of factors, including the set up of the virtual machine appliance. The appliance controller generates an application package having the determined settings and transmits the package to the application server appliance, wherein the application package is configured to be executed by the runtime environment.06-27-2013
20130167148COMPUTING DEVICE AND VIRTUAL MACHINE OPERATION CONTROL METHOD - In a virtual machine (VM) operation control method using a computing device, a connection between the computing device and a storage system is established. The computing device receives a user request in relation to a VM. In response to the user request for VM creation or VM update, the computing device downloads a configuration file and a disk image file of the VM from the storage system, and accordingly creates the VM in the computing device. In response to the user request for VM backup, the computing device uploads the configuration file and the disk image file of the VM to the storage system.06-27-2013
20130167149Register Mapping Techniques - A technique for register mapping in a virtual system includes preparing a register pool that includes a plurality of registers for mapping. A mapping table is prepared that has a register identifier (ID) and information related to each of a plurality of parameters that express an operational state of the virtual system for each of the registers. At the time a register access request is issued by a hardware thread, the register ID for an access target and information related to each of the plurality of parameters that express the operational state during operation is acquired. One of the registers, for which the acquired register ID and information related to each of the plurality of parameters match the register ID and information for each of the plurality of parameters within the mapping table, is set as a mapped register to be accessed per the register access request.06-27-2013
20130167146SCHEDULING VIRTUAL CENTRAL PROCESSING UNITS OF VIRTUAL MACHINES AMONG PHYSICAL PROCESSING UNITS - Embodiments of apparatus, computer-implemented methods, systems, and computer-readable media are described herein for a virtual machine monitor. The virtual machine monitor may be configured to determine whether to schedule a virtual central processing unit of one of a plurality of virtual machines on a first physical processing unit of a plurality of physical processing units. Each virtual machine may have one or more virtual central processing units. The determination may be based at least in part on whether a context of the virtual central processing unit suggests a desired cache hit rate on one or more cache units of the apparatus by the first physical processing unit when operating the virtual central processing unit.06-27-2013
20120240112COMPUTER PRODUCT AND INFORMATION PROCESSING APPARATUS - A computer-readable recording medium stores therein a scheduling program that causes a computer to execute a process. The process includes executing multiple virtual computing machines that operate an OS; receiving a change in the number of activations of completely activated software from the OS; updating when the change in the number of activations has been received, a first table that stores software completely activated in the OS; selecting from a second table that stores combinations of a completely activated software group, a combination according to a software group stored in the first table; extracting from the second table and according to the selected combination, priorities of software stored for each of the combinations; and updating the priorities of the software stored in the first table to the extracted priorities.09-20-2012
20080295096DYNAMIC PLACEMENT OF VIRTUAL MACHINES FOR MANAGING VIOLATIONS OF SERVICE LEVEL AGREEMENTS (SLAs)11-27-2008
20080295095METHOD OF MONITORING PERFORMANCE OF VIRTUAL COMPUTER AND APPARATUS USING THE METHOD11-27-2008
20110119666SYSTEM AND APPARATUS FOR SHARING A HOST COMPUTER - A system and apparatus is disclosed for sharing a host computer. The system discloses: a set of USB cables; a set of virtualization devices, a set of USB ports on the host computer, an operating system; and a virtualization module. The apparatus discloses: a hub controller; a graphics display module; and an audio controller.05-19-2011
20110083132Mechanism for Prioritized Scheduling of Virtual Machines - A mechanism for prioritized scheduling of virtual machines is disclosed. A method includes receiving control of a virtual machine (VM) managed by a virtual machine monitor (VMM) on a host machine and executing a prioritization task involving a hardware emulation of the VM, determining an interactivity statistic for the VM based on a hardware type factor of the hardware emulation of the VM, calculating an interactivity rate for the VM based on the determined interactivity statistic for the VM, sending the calculated interactivity rate to a management daemon if the calculated interactivity rate is different than a previous interactivity rate for the VM, re-calculating priority numbers for each of the VM and all other VMs managed by the VMM based on the calculated interactivity rate, and providing the re-calculated priority numbers to a scheduling algorithm of a scheduler of the host machine for the scheduler to utilize in prioritizing the VM process.04-07-2011
20110078682Providing Object-Level Input/Output Requests Between Virtual Machines To Access A Storage Subsystem - A system includes a storage subsystem and a first virtual machine to manage access of the storage subsystem. A second virtual machine is coupled by a virtual machine channel to the first virtual machine. The second virtual machine has software to issue a object-level input/output (I/O) request to the first virtual machine over the virtual machine channel to access data in the storage subsystem.03-31-2011
20120304175NETWORK PERFORMANCE MONITOR FOR VIRTUAL MACHINES - Embodiments of the present invention relate to a method and system to monitor network performance in a computer including at least one physical server having a hardware machine attached via a hypervisor to a set of virtual machines. According to an embodiment of the present invention, the system measures network performance parameters for selected packet flows in transition between the hardware machine and the virtual machines, analyzes the measured performance parameters, and identifies a source of network degradation.11-29-2012
20110072428Nested Virtualization Performance In A Computer System - A virtualization architecture for improving the performance of nested virtualization in a computer system. A virtualization instruction reads or writes data in a control structure used by a virtual machine monitor (VMM) to maintain state on a virtual machine (VM) to support transitions between a root mode of operation of a CPU in which the VMM executes and a non-root mode of operation of the CPU in which the VM executes. A privileged data access is made to a primary control structure according to the virtualization instruction if the CPU is in the root mode. A non-privileged data access is made to a secondary control structure according to the virtualization instruction if the CPU is in the non-root mode and a secondary control structure field in the primary control structure is enabled.03-24-2011
20120159475Acquiring Guest Operating System Instrumentation Information In A Hypervisor - Methods, apparatuses, and computer program products are provided for acquiring guest operating system instrumentation information in a hypervisor. Embodiments include receiving from a platform management application, by a hypervisor communication module of the hypervisor, a platform request for guest operating system instrumentation information associated with at least one guest operating system executing within the hypervisor; in response to receiving the platform request for the guest operating system instrumentation information, retrieving through shared memory between the hypervisor and the guest operating system, by the hypervisor communication module, the guest operating system instrumentation information associated with the at least one guest operating system; and transmitting, by the hypervisor communication module, the guest operating system instrumentation information to the platform management application.06-21-2012
20120284713SYSTEMS AND METHODS FOR ANALYZING PERFORMANCE OF VIRTUAL ENVIRONMENTS - Intelligent monitoring systems and methods for virtual environments are disclosed that understand various components of a virtual infrastructure and how the components interact to provide improved performance analysis to users. In certain examples, a monitoring system assesses the performance of virtual machine(s) in the context of the overall performance of the physical server(s) and the environment in which the virtual machine(s) are running. For instance, the monitoring system can track performance metrics over a determined period of time to view changes to the allocation of resources to virtual machines and their location(s) on physical platforms. Moreover, monitoring systems can utilize past performance information from separate virtual environments to project a performance impact resulting from the migration of a virtual machine from one physical platform to another.11-08-2012
20120324444DECENTRALIZED MANAGEMENT OF VIRTUALIZED HOSTS - One or more embodiments of the present invention provide a technique for effectively managing virtualized computing systems with an unlimited number of hardware resources. Host systems included in a virtualized computer system are organized into a scalable, peer-to-peer (P2P) network in which host systems arrange themselves into a network overlay to communicate with one another. The network overlay enables the host systems to perform a variety of operations, which include dividing computing resources of the host systems among a plurality of virtual machines (VMs), load balancing VMs across the host systems, and performing an initial placement of a VM in one of the host systems.12-20-2012
20120102487CREATING AND DEPLOYING SERVICE-READY VIRTUAL HARD DISKS - A cloud manager controls the deployment and management of machines for an online service. A build system creates deployment-ready virtual hard disks (VHDs) that are installed on machines that are spread across one or more networks in farms that each may include different configurations. The build system is configured to build VHDs of differing configurations that depend on a role of the virtual machine (VM) for which the VHD will be used. The build system uses the VHDs to create virtual machines (VMs) in both test and production environments for the online service. The cloud manager system automatically provisions machines with the created virtual hard disks (VHDs). Identical VHDs can be installed directly on the machines that have already been tested.04-26-2012
20130019240Mechanism for Virtual Machine (VM)-Based Disk RescueAANM Tsirkin; MichaelAACI Yokneam YillitAACO ILAAGP Tsirkin; Michael Yokneam Yillit ILAANM Natapov; GlebAACI RaananaAACO ILAAGP Natapov; Gleb Raanana IL - A mechanism for virtual machine (VM)-based disk rescue is disclosed. A method of the invention includes starting a reboot process of a VM hosted on a host computing machine, controlling an invocation of a recovery media that is used by a recovery process on a disk of the VM and is located separate from the VM disk, and restarting the VM after the recovery process using the recovery media successfully completes.01-17-2013
20080282241Method and Apparatus to Support Virtualization with Code Patches - A processing system executes an emulation patch for a guest virtual machine (VM) of the processing system. In one embodiment, the emulation patch includes data to facilitate identification of a routine to emulate a guest instruction. After executing the emulation patch for the guest VM, the processing system may use the data to find an emulation routine for emulating the guest instruction. The processing system may transfer control from the guest VM to a virtual machine monitor (VMM) in response to execution of the emulation patch, without saving a trap frame. The VMM may then find and execute the emulation routine for the guest instruction without decoding the guest instruction. A break instruction with an immediate value, for example, may be used for the emulation patch. The immediate value may be used for finding the emulation routine. Other embodiments are described and claimed.11-13-2008
20120131578Optimization of Virtual Appliance Deployment - In an embodiment for deploying a new virtual appliance (05-24-2012
20110283279VERIFYING VIRTUAL MACHINES - According to one embodiment, virtual machine attributes are verified. Information (11-17-2011
20110283278USER INTERFACE FOR MANAGING A DISTRIBUTED VIRTUAL SWITCH - A user interface for managing allocations of network resources in a virtualized computing environment provides a graphical overview of the virtual computing environment that allows the user to visualize the virtual network, including the connections between the virtual network adapters and the uplink port groups that provide physical network resources for the virtual machines included in the virtualized computing environment. The user interface also provides graphical elements that allow the user to modify the virtual network, to migrate virtual machines from individual virtual switches to a distributed virtual switch, and/or to modify the arrangement of physical network adapters that provide network backing for the virtual machines. By providing these features, the user interface according to one or more embodiments of the present invention can allow the user to efficiently and safely manage the virtual network in the virtual computing environment.11-17-2011
20110283277VIRTUALIZATION AND DYNAMIC RESOURCE ALLOCATION AWARE STORAGE LEVEL REORDERING - A system and method for reordering storage levels in a virtualized environment includes identifying a virtual machine (VM) to be transitioned and determining a new storage level order for the VM. The new storage level order reduces a VM live state during a transition, and accounts for hierarchical shared storage memory and criteria imposed by an application to reduce recovery operations after dynamic resource allocation actions. The new storage level order recommendation is propagated to VMs. The new storage level order applied in the VMs. A different storage-level order is recommended after the transition.11-17-2011
20130024857METHOD AND SYSTEM FOR FLEXIBLE RESOURCE MAPPING FOR VIRTUAL STORAGE APPLIANCES - Virtual storage methods and systems allow storage software to be used with a variety of systems and resources without the need to write storage software specific to each particular system. The methods and systems described herein render virtual storage flexibly adaptable to hardware platforms. Through use of a dynamic resource mapper and a start-up loader in booting storage systems, the use of virtual storage appliances is simplified in an integrated and transparent fashion. For ease of system configurations, the mapper and start-up loader are available in a different ways and from a variety of media.01-24-2013
20110302579VIRTUAL COMPUTER AND CPU ALLOCATION METHOD - When the number of logical CPUs increases as the number of LPARs increases, a physical CPU amount which a hypervisor uses will increase and thus the physical CPU resource cannot be effectively utilized. Grouping of LPARs and physical CPUs is performed and a logical CPU to which a physical CPU is allocated is selected from logical CPUs of an LPAR within a group.12-08-2011
20110302580NETWORK SYSTEM, MANAGEMENT SERVER, AND VIRTUAL MACHINE DEPLOYMENT METHOD - A network system includes a plurality of cloud systems. Each of the plurality of cloud systems includes a plurality of servers. Each of the plurality of servers allows virtual machines to run thereon. A first cloud system of the plurality of cloud systems includes a first generator and a deployer. The first generator generates, on the basis of first performance information regarding one virtual machine and a first predetermined coefficient predetermined for the first cloud system, second performance information regarding the one virtual machine. The first performance information is included in a first augmented image of the one virtual machine. The first augmented image is created in a second cloud system other than the first cloud system. The deployer deploys the one virtual machine on one of the plurality of servers included in the first cloud system on the basis of the generated second performance information.12-08-2011
20110302581State Separation for Virtual Applications - Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define configurations or uses of the application, including connections to and interactions with other applications. Applications that are virtualized may have state that is defined within a usage context and multiple states or configurations may be stored and recalled based on the usage context. Policies may define the context and what parameters are to be saved, and may be applied when applications are operated in a virtualized manner.12-08-2011
20110302578SYSTEM AND METHOD FOR VIRTUAL MACHINE MULTIPLEXING FOR RESOURCE PROVISIONING IN COMPUTE CLOUDS - A system and method for provisioning virtual machines in a virtualized environment includes determining a relationship between capacity need and performance for virtual machines (VMs) stored in memory storage media. Aggregate capacity needs for a plurality of VMs consolidated on a same physical server are estimated. VM combinations that yield capacity gains when provisioned jointly are identified such that when peaks and troughs are unaligned in capacity needs for a set of VMs, the set of VMs is provisioned together.12-08-2011
20090307688Virtual Cluster Proxy to Virtual I/O Server Manager Interface - An interface is provided between a virtual cluster proxy and a virtual I/O server on a logical partitioned platform. The virtual I/O server is configured to support virtual real memory. A command is received from a virtual cluster proxy. The virtual cluster proxy identifies whether the command is a virtual real memory command or a virtualization command. Virtual real memory commands and virtualization commands are marked by the virtual cluster proxy with a virtualization marker. The virtualization marker indicates that the command is a virtual real memory command or a virtualization command. The command is then forwarded to a logical partitioned platform. A virtual memory manager intercepts the command and identifies whether the command has been marked with the virtualization marker. If the command is marked with the virtualization marker, the virtual memory manager reroutes the command to the virtual I/O server.12-10-2009
20110276964THIN CLIENT SYSTEM, METHOD OF IMPLEMENTING THIN CLIENT, AND PROGRAM FOR THIN CLIENT - In a net boot type thin client system, bottle necks concentrate on specific steps in a previously downloading method and an on-demand downloading method so as to hinder high-speed operation. Specifically, a previously file acquiring section for acquiring a file before the OS operates, an on-demand file acquiring section for acquiring a file while the OS operates, and a file determining section for determining whether or not a file is used in a high frequency. A high use-frequency file is downloaded before an OS operates and a low use-frequency file is downloaded while the OS operates.11-10-2011
20090089781System for and Method of Migrating One or More Virtual Machines - A logical container may be created to facilitate the quick and efficient migration of one or more virtual machines from a source server to a destination server. The logical container may contain all of the files and state information related to the one or more virtual machines. The one or more virtual machines may be migrated by dismounting the logical container from a source server and mounting the logical container to a destination server. A management service may be include to facilitate batch migration of multiple virtual machines from a source server to a destination server.04-02-2009
20110296413METHODS AND SYSTEMS FOR GENERATING A DYNAMIC WORKFLOW IN A MULTI-TENANT DATABASE ENVIRONMENT - Techniques and systems for modifying a virtual machine functionality. Archive files each including at least a class files are received. The archive files are stored within the virtual machine. The virtual machine runs on a host system and neither the virtual machine nor the host system are restarted in response to the receiving or storing of the archive files. Files of the host system are scanned to find class files that are not included in a class path for the virtual machine. The class files are copied to a class path for the virtual machine. Neither the virtual machine nor the host system are restarted in response to the copying of the class files. The classes corresponding to the class files are registered in the virtual machine in response to the copying of the class files to the class path. Neither the virtual machine nor the host system are restarted in response to the registration of the classes.12-01-2011
20110296412APPROACHES FOR SECURING AN INTERNET ENDPOINT USING FINE-GRAINED OPERATING SYSTEM VIRTUALIZATION - Approaches for executing untrusted software on a client without compromising the client using micro-virtualization to execute untrusted software in isolated contexts. A template for instantiating a virtual machine on a client is identified in response to receiving a request to execute an application. After the template is identified, without human intervention, a virtual machine is instantiated, using the template, in which the application is to be executed. The template may be selected from a plurality of templates based on the nature of the request, as each template describe characteristics of a virtual machine suitable for a different type of activity. Selected resources such as files are displayed to the virtual machines according to user and organization policies and controls. When the client determines that the application has ceased to execute, the client ceases execution of the virtual machine without human intervention.12-01-2011
20110296411Kernel Bus System to Build Virtual Machine Monitor and the Performance Service Framework and Method Therefor - Some embodiments concern a kernel bus system for building at least one virtual machine monitor. The kernel bus system is based on kernel-based virtual machine. The kernel bus system is configured to run on a host computer. The host computer comprising one or more processors, one or more hardware devices, and memory. The kernel bus system can include: (a) a hyperbus; (b) one or more user space components; (c) one or more guest space components configured to interact with the one or more user space components via the hyperbus; (d) one or more VMM components having one or more frontend devices configure to perform I/O operations with the one or more hardware devices of the host computer using a zero-copy method or non-pass-thru method; (e) one or more para-virtualization components having (1) a virtual interrupt configured to use one or more processor instructions to swap the one or more processors of the host computer between a kernel space and a guest space; and (2) a virtual I/O driver configured to enable synchronous I/O signaling, asynchronous I/O signaling and payload delivery, and pass-through delivery independent an QEMU emulation; and (f) one or more KVM components. The hyperbus, the one or more user space components, the one or more guest space components, the one or more VMM components, the one or more para-virtualization components, and the one or more KVM components are configured to run on the one or more processors of the host computer. Other embodiments are disclosed.12-01-2011
20110296410System and Method for Fuse Enablement of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system includes a processor to execute code, a non-volatile memory, and a switch. The memory includes code to implement a basic input/output system (BIOS) for the CHVS, and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, authenticate a virtual machine image associated with a virtual machine, and launch the virtual machine on the CHVS. The switch is operable to select one of a first state and a second state. The processor operates to execute the BIOS code when the switch is in the first state and to execute the virtualization manager code when the switch is in the second state.12-01-2011
20110296409System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor to execute code, a component, and a non-volatile memory. The non volatile memory includes BIOS code and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, launch a virtual machine on the CHVS, and assign the component to the virtual machine, such that the virtual machine has control of the component. The CHVS is configurable to execute the BIOS and not the virtualization manager, or to execute the virtualization manager and not the BIOS.12-01-2011
20110296408System and Method for Implementing a Secure Client Hosted Virtualization Service Layer in an Information Handling System - A client hosted virtualization system (CHVS) has a non-volatile memory that includes BIOS code and virtualization manager code that operates to initialize the CHVS and to launch a virtual machine. The CHVS establishes a secure communication channel with a client update system via a network interface, receives an update to the virtualization manager code, authenticates the update and overwrites the non-volatile memory with the update. The CHVS is configurable to execute the BIOS and not virtualization manager, or to execute the virtualization manager and not the BIOS.12-01-2011
20110296407EXPOSURE OF VIRTUAL CACHE TOPOLOGY TO A GUEST OPERATING SYSTEM - In a virtual machine environment, a hypervisor is configured to expose a virtual cache topology to a guest operating system, such that the virtual cache topology may be provided by corresponding physical cache topology. The virtual cache topology may be determined by the hypervisor or, in the case of a datacenter environment, may be determined by the datacenter's management system. The virtual cache topology may be calculated from the physical cache topology of the system such that virtual machines may be instantiated with virtual processors and virtual cache that may be mapped to corresponding logical processors and physical cache.12-01-2011
20110296406HYPERVISOR SCHEDULER - Techniques for configuring a hypervisor scheduler to make use of cache topology of processors and physical memory distances between NUMA nodes when making scheduling decisions. In the same or other embodiments the hypervisor scheduler can be configured to optimize the scheduling of latency sensitive workloads. In the same or other embodiments a hypervisor can be configured to expose a virtual cache topology to a guest operating system running in a virtual machine.12-01-2011
20110173613Virtual Machine Control Structure Identification Decoder - Embodiments of apparatuses, methods, and systems for decoding a virtual machine control structure identification are disclosed. In one embodiment, an apparatus includes a virtual machine control structure to decode a virtual machine control structure identification data. The virtual machine control structure identification data is decoded into an address of a virtual machine control structure field and an offset. The offset is to help identify a micro-operation associated with a virtual machine architecture instruction to be executed.07-14-2011
20110173612SYSTEM AND METHOD FOR SUPPORTING MULTIPLE USERS - Systems and methods that support splitting a compute resource from its input/output and sharing among one or more users are provided. In one embodiment, a system that supports one or more user devices may include, for example, a compute engine, a first user device and a second user device. The compute engine may be adapted to provide virtualization. The virtualization may provide, for example, a first instance of a particular operating system and a second instance of the particular operating system. The first user device may be coupled to the compute engine and may access the first instance of the particular operating system. The second user device may be coupled to the compute engine and may access the second instance of the particular operating system. In one example, the user devices are input/output devices that do not run applications or operating systems.07-14-2011
20110126194SHARED SECURITY DEVICE - A mechanism is provided for sharing one or more security appliances. A trusted system component associated with an application of a plurality of applications in a logically partitioned data processing system sets a destination address of a received packet to an address of a security appliance shared by the plurality of applications. The trusted system component sends the received packet to the security appliance. The trusted system component receives a response from the security appliance. The trusted system component determines whether the response indicates permitting the received packet to proceed to the intended recipient. The trusted system component sends the received packet to the recipient in response to the response indicating permitting the received packet to proceed.05-26-2011
20090007105Updating Offline Virtual Machines or VM Images - Methods and systems for updating a virtual machine image. The virtual machine image may be stored as a collection of one or more virtual hard disk files. The virtual machine image is rendered to file-system data. Rendering the virtual machine image to file-system data may comprise mounting the virtual machine image's virtual hard disk drives. An analysis engine is invoked to scan the exposed file-system data to determine the update status of software constructs of the virtual machine image and data indicative of the scanning may be stored. The virtual machine image may be updated while inactive or may be deployed and activated in a protected environment for updating.01-01-2009
20090037906PARTITION ADJUNCT FOR DATA PROCESSING SYSTEM - A partition adjunct is provided for a logical partition running above a hypervisor of a data processing system. The partition adjunct, which is a separate dispatchable partition from an instantiating logical partition, provides one or more services to the logical partition. A service request received from the logical partition is processed by the partition adjunct utilizing virtual address space donated to the partition adjunct from the logical partition. The partition adjunct and the logical partition share a common virtual address to real address page table, and context switching the current state machine from the logical partition to the partition adjunct occurs without invalidating or modifying state data of selected memory management and address translation hardware of the data processing system. In a hardware multithreaded system, the partition adjunct is dispatched on a single thread, while another thread continues to run in the logical partition initiating the service request.02-05-2009
20090300614VIRTUAL-MACHINE CONTROL SYSTEM AND VIRTUAL-MACHINE MOVING METHOD - A virtual-machine control program includes an operational-status inquiry unit that inquires of another machine about a memory usage status of virtual machines realized on another machine; a swapping-target selecting unit that selects a virtual machine capable of being swapped for a virtual machine realized on a machine from among the virtual machines realized on another machine based on information obtained by the operational-status inquiry unit; and a swapping performing unit that swaps the virtual machine realized on the machine for the virtual machine selected by the swapping-target selecting unit. The virtual-machine control program enables to move the virtual machine to another machine without preparing a free space in advance.12-03-2009
20080301673Information Terminal, Computer Resource Managine Method, and Virtual Machine Execution Switching Method - An in-vehicle terminal (12-04-2008
20090037909Methods and Systems for Running Multiple Operating Systems in a Single Mobile Device - Methods and systems for running multiple operating systems in a single embedded or mobile device (include PDA, cellular phone and other devices) are disclosed. The invention allows a mobile device that normally can only run a single operating system to run another operating system while preserving the state and data of the original operating system. Guest OS is packaged into special format recognizable by the host OS that still can be executed in place by the system. The Methods include: •Change the memory protection bits for the original OS; •Fake a reduced physical memory space for guest OS; •Use special memory device driver to claim memories of host OS; •Backup whole image of the current OS and data to external memory card.02-05-2009
20090083736VIRTUALIZED COMPUTER, MONITORING METHOD OF THE VIRTUALIZED COMPUTER AND A COMPUTER READABLE MEDIUM THEREOF - A virtualized computer includes a CPU which shifts between a host mode and a guest mode. The CPU shifts executes either a guest OS or a virtual machine monitor (VMM) in the guest mode and executes a virtual machine monitor-monitor (VMMM) in the host mode. The VMM monitors the guest OS and the VMMM monitors the VMM.03-26-2009
20100100879METHODS AND SYSTEMS FOR CONVERTING A RELATED GROUP OF PHYSICAL MACHINES TO VIRTUAL MACHINES - A computer implemented method for processing virtualization of physical computers that are part of a group into virtual computers is provided. The method includes obtaining relationship data from the physical computers, where the relationship data identifies parameters used to communicate within the group. Then, the method analyzes utilization parameters for each of the physical computers of the group. A visual model for proposed virtualization of the group of physical computers is then generated. The visual model identifies hosting machines designated to define a virtual computer for each of the physical computers, where the visual model provides a graphical illustration of the group of physical computers once converted to virtual computers. The method enables adjustment of the proposed virtualization of the group of physical computers. Then, an execution sequence of virtualization operations to be carried out is generated, if execution of the proposed virtualization is triggered, and the execution sequence is saved to storage and accessed upon execution.04-22-2010
20090125901Providing virtualization of a server management controller - In one embodiment, the present invention includes a method for creating a virtual machine (VM) in a server platform having a baseboard management controller (BMC) and enabling the VM to virtualize the BMC, receiving a request in the VM for performing a BMC function in the VM, initiating a communication from the VM to the BMC, and trapping the communication in management software of the server platform and routing the communication to a predetermined port of the BMC. Other embodiments are described and claimed.05-14-2009
20090187902Caching Binary Translations for Virtual Machine Guest - In one embodiment, a method comprises in response to an intercept of a first instruction in a guest that is controlled by a virtual machine monitor (VMM), updating first tracking data corresponding to the first instruction in an intercept tracking table; determining, from the first tracking data, that a translation of the first instruction into a first routine is to be performed; and caching the first routine to be executed in response to a subsequent intercept of the first instruction, wherein the first routine is formed from instructions defined in a same instruction set architecture as the first instruction. In some embodiments, a routine for an intercepted instruction that is within a merge window of the first instruction in a guest may be merged into the same routine with the first instruction.07-23-2009
20090178038OPERATION MANAGEMENT SYSTEM, OPERATION MANAGEMENT METHOD, RECORDING MEDIUM STORING OPERATION MANAGEMENT PROGRAM, AND DATA SIGNAL - An operation management system, which includes: a document management device that manages a document; and a document operation device that requests to view or obtains the document, in which the document management device includes: an operation restriction information management section that manages first operation restriction information for restricting an operation of the document for which viewing is requested and which is operated by a user, and second operation restriction information generated from the first operation restriction information, for restricting the operation of the document obtained from the document management device and operated by the user; and an issuance section that issues the second operation restriction information to the document operation device, and the document operation device includes an operation restriction section that restricts the operation based on the second operation restriction information when the document is obtained from the document management device.07-09-2009
20120089982SUPPORTING HETEROGENEOUS VIRTUALIZATION - Machine-readable media, methods, apparatus and system are described. In some embodiments, a virtual machine monitor of a computer platform may comprise a service virtual machine created by the virtual machine monitor partitioning an underlying hardware machine to support execution of a plurality of overlying guest operating systems, wherein the plurality of guest operating systems comprise a guest operating system complying with a non-native guest system architecture different from a host system architecture with which the hardware machine complies. The service virtual machine may further comprise a translation layer to translate instructions from the guest operating system complying with the non-native guest system architecture into instructions complying with the host system architecture.04-12-2012
20110191772METHOD AND SYSTEM FOR IMPROVING STARTUP PERFORMANCE AND INTEROPERABILITY OF A VIRTUAL APPLICATION - A data structure including simple and complex objects. Each simple object includes a content type indicator, a size indicator, and one or more simple data types. Each complex object includes a content type indicator, a size indicator, and one or more child objects. The complex objects include a layer object having first and second child objects. The first child object is a collection of complex objects storing information for configuring a virtual filesystem of a virtual application at application startup. The second child object is a collection of complex objects storing information for configuring a virtual registry of the virtual application at application startup. Reading of selected simple and complex objects may be deferred at startup based on the content type indicator. Deferred objects may be read after startup when access to information stored by the deferred object is request by the virtual application.08-04-2011
20100070970Policy-Based Hypervisor Configuration Management - At least one target configuration of a host at a virtualization software level is automatically assembled based on a source configuration. A policy based profile describing the source configuration is processed. A configuration specification describing the target configuration is automatically created, based on the policy based profile describing the source configuration. The configuration specification is automatically applied to target configurations, such that the target configuration(s) are compliant with the policy based profile.03-18-2010
20130219385BATCH SCHEDULER MANAGEMENT OF VIRTUAL MACHINES - A batch scheduler receives a task. Further, a processor, at the batch scheduler, generates a virtual machine corresponding to the task. In addition, the virtual machine is deployed from the batch scheduler to a compute node. The task is also dispatched from the batch scheduler to the virtual machine at the compute node.08-22-2013
20130219390CLOUD SERVER AND METHOD FOR CREATING VIRTUAL MACHINES - When receiving a notice that a client has logged off the cloud server, a cloud server checks a resource utilization ratio of the cloud server and a resource utilization ratio of a virtual machine (VM) designated to the client. If the resource utilization ratio of the cloud server is not more than a first preset ratio, the cloud server creates a new VM using idle resources of the cloud server. If the resource utilization ratio of the cloud server is more than first preset ratio and the resource utilization ratio of the VM is less than a second preset ratio, the cloud server releases idle resources of the VM, and creates a new VM using the released resources. When receiving a notice that notifies the client is logging back into the cloud server, the cloud server reallocates the released resources to the VM.08-22-2013
20100058337SYSTEMS AND METHODS FOR SHARED OBJECT LOCK UNDER STATE MACHINE CONTROL - Embodiments relate to systems and methods for a shared object lock under state machine control. An operating system or virtual machine environment can host a set of multiple executing threads, and provide those threads with mutual access to one or more objects such as storage objects, memory objects, or others. The threads can independently request that the object be locked or unlocked, and the locked or unlocked state can be shared between the threads. Rather than communicate with the object(s) directly, in embodiments the threads communicate with a state machine that in turn controls the state of the object(s). When a request to change the state of the object(s) is received, the state machine can permit the object(s) to change between locked, unlocked, or other states based on the current state of the machine and the received message. Contention between threads can be reduced or eliminated.03-04-2010
20110219372SYSTEM AND METHOD FOR ASSISTING VIRTUAL MACHINE INSTANTIATION AND MIGRATION - A system and method for instantiation of a virtual machine (VM) in a datacenter includes providing a network appliance in a location for listening to management information traffic. Indices are created for data center images in the network appliance. VM instantiation requests are intercepted in the network appliance. Locations from which blocks for the VM should be fetched based upon network cost are determined. VM image blocks are populated from the locations.09-08-2011
20090187904Redirection Table for Virtual Machine Guest - In one embodiment, a processor comprises a redirect unit configured to detect a match of an instruction pointer (IP) in an IP redirect table, the IP corresponding to a guest instruction that the processor has intercepted, wherein the guest is executed under control of a virtual machine monitor (VMM), and wherein the redirect unit is configured to redirect instruction fetching by the processor to a routine identified in the IP redirect table instead of exiting to the VMM in response to the intercept of the guest instruction.07-23-2009
20100011359METHOD AND APPARATUS FOR MANAGING OWNERSHIP OF VIRTUAL PROPERTY - A method and apparatus for managing ownership of virtual property accessible to users is provided by a computer-implemented system connected to a network. This method and apparatus further comprises maintaining an inventory of virtual properties, managing ownership of virtual properties, and allowing use of virtual properties by corresponding property owners within corresponding network spaces. In particular, virtual properties are purchased from a system by user computers, wherein virtual properties may be accessed by a user and/or sold or traded to other users which may include auction websites01-14-2010
20100011358Virtualization Based Personalizable Consumer Electronics Platform - A simple to customize IT infrastructure architecture. The IT infrastructure architecture includes a general-purpose virtualized architecture platform. The IT infrastructure architecture is well suited for delivering simple pre-packaged software solutions to the small business segment as plug and play type appliances. In certain preferred embodiments, the IT infrastructure architecture includes a virtual appliance memory device such as a virtual appliance universal serial bus (USB) key. The IT infrastructure architecture uses embedded server virtualization technology to host business applications as a virtual appliance.01-14-2010
20100011357SYSTEM AND METHOD FOR GARBAGE COLLECTION IN A VIRTUAL MACHINE - A method includes initializing a virtual machine; and defining a garbage collector configured to perform garbage collection in a process separate from the virtual machine, without a stop-the-world phase. A system and a computer program product are also provided.01-14-2010
20100169885Paging instruction for a virtualization engine to local storage - Embodiments of apparatuses, methods, and systems for paging instructions for a virtualization engine to local storage are disclosed. In one embodiment, an apparatus includes a processor, a physical device controller, a virtualization engine, system memory, and local storage. The physical device controller is to be shared by a plurality of virtual machines created by a virtual machine monitor installed on a processor. The virtualization engine is to represent the physical device controller as a plurality of virtual device controllers available to be allocated to the plurality of virtual machines. The local storage is separate from the physical memory to store instructions transferred from the system memory for execution by the virtualization engine.07-01-2010
20100169883PROVIDING MULTIPLE VIRTUAL DEVICE CONTROLLERS BY REDIRECTING AN INTERRUPT FROM A PHYSICAL DEVICE CONTROLLER - Embodiments of apparatuses, methods, and systems for providing multiple virtual device controllers by redirecting an interrupt from a physical device controller are disclosed. In one embodiment, an apparatus includes a processor, a physical device controller, and virtualization logic. The virtualization logic is to receive a first interrupt from the physical device controller, and in response, send a second interrupt to the processor from one of a plurality of virtual device controllers.07-01-2010
20100169881METHOD AND SYSTEM FOR EFFICIENT IMAGE CUSTOMIZATION FOR MASS DEPLOYMENT - A system and method for creating N customized disk images from N identical disk images. A computing system creates N identical disk images from a master image. The computing system customize a first identical disk image according to a customization written in customization scripts. While customizing the first identical disk image, the computing system monitors block-level operations applied on the first identical disk image. The computing system applies the monitored block-level operations simultaneously to other N−1 identical disk according to similar customizations written in customization scripts. After applying the block-level operations, the N identical disk images become N customized disk images. Identical Virtual Machines (VMs) operating in the N identical disk images become N customized VMs by operating based on the N customized disk images.07-01-2010
20100169880VIRTUAL INPUT-OUTPUT CONNECTIONS FOR MACHINE VIRTUALIZATION - A computing method includes specifying a virtual computer system including at least one virtual or physical compute node, which produces data packets having respective source attributes. At least one Virtual Input-Output Connection (VIOC) that is uniquely associated with the values of the source attributes is defined. A policy specifying an operation to be performed with regard to the VIOC is defined. The virtual computer system is implemented on a physical computer system, which includes at least one physical packet switching element. The physical packet switching element is configured to identify the data packets whose source attributes have the values that are associated with the VIOC and to perform the operation on the identified data packets, so as to enforce the policy on the VIOC.07-01-2010
20110219374INTERRUPT PROCESSING ON VIRTUALIZED PLATFORM - A technique to process interrupts on a virtualized platform. A plurality of virtual machines (VMs) runs on the virtualized platform having at least a processor. The VMs include a power VM. A VM scheduler schedules the VMs for execution on the virtualized platform according a scheduling policy. A virtualized interrupt mask controller controls masking an interrupt from an interrupting source according to the scheduling policy. An interrupt is masked from an interrupting source according to the scheduling policy for at least one of the VMs; and the at least one of the VMs is caused to get the interrupt when the at least one of the VMs is enabled according to the scheduling policy.09-08-2011
20110219371Managing and Reporting Conflicts Between Multiple Users Accessing A Logically Partitioned Computer System - A management system for managing computer resources assigned by a hypervisor to one or more logical partitions and/or one or more appliance partitions in a multi-user computer system receives login information from a new user logging into the computer system through a service interface (e.g. a hardware management console) or a non-service interface, builds a conflict list, and sends the conflict list for presentation to the new user. The new user is notified of any users that are logged into any part of the computer system that could conflict with the new user's actions. Such users may be logged into the computer system through service and/or non-service interfaces. In one embodiment, the new user can choose to continue logging in irrespective of any conflicts shown. After choosing to continue, the new user is preferably requested to input an end-time. This end-time may be displayed, in turn, to all subsequent users that log into any part of the computer system that could cause conflict. The management system is preferably a component of the hypervisor.09-08-2011
20090222816Data processing apparatus and method for controlling access to secure memory by virtual machines executing on processing circuirty - A data processing apparatus and method are provided for controlling access to secure memory by virtual machines executing on processing circuitry. The processing circuitry executes hypervisor software to support the execution of multiple virtual machines on the processing circuitry. A memory system is provided for storing data for access by the processing circuitry, the memory system comprising secure memory for storing secure data and non-secure memory for storing non-secure data, the secure memory only being accessible via a secure access request. Address translation circuitry is responsive to an access request issued by a current virtual machine specifying a virtual address, to perform an address translation process to identify a physical address in the memory, and to cause a modified access request to be issued to the memory system specifying the physical address. A trusted virtual machine identifier is maintained and managed by the hypervisor software, with the hypervisor software setting the trusted virtual machine identifier if the current virtual machine is to be trusted to access the secure memory. Accordingly, in response to the access request issued by the current virtual machine, the address translation circuitry is only able to cause the modified access request to be issued as a secure access request specifying a physical address within the secure memory if the trusted virtual machine identifier is set. By such an approach, the hypervisor software is able to support multiple virtual machines at least some of which have access to secure memory under conditions controlled by the hypervisor software.09-03-2009
20090210873RE-TASKING A MANAGED VIRTUAL MACHINE IMAGE IN A VIRTUALIZATION DATA PROCESSING SYSTEM - Embodiments of the present invention provide a method, system and computer program product for virtualization of application lifecycles. In an embodiment of the invention, a virtualization data processing system can be provided. The system can include a hypervisor configured for execution in a host computing platform, a VM image managed by the hypervisor, and a configuration applied to the VM image. The configuration can specify a set of resources in the host computing platform accessible by applications executing in the VM image. Finally, the system can include re-tasking logic coupled to the hypervisor. The logic can include program code enabled to select a new role for the VM image, to determine a new configuration for the new role, and to apply the new configuration to the VM image.08-20-2009
20090204963Reducing memory usage of a data processing task performed using a virtual machine - A method of performing a processing task in a data processing apparatus is provided that reduces memory usage of the processing task. According to this method a Virtual Machine performs the steps of accessing platform-neutral program code in a function repository, executing the processing task on the Virtual Machine and analysing at a current execution point on a function-by-function basis which functions in the function repository are inactive functions. The Virtual Machine performs software-based unloading from the function repository of at least a portion of platform-neutral program code corresponding to one or more inactive functions. A corresponding virtual machine and data processing apparatus are also provided.08-13-2009
20100005465VIRTUAL MACHINE LOCATION SYSTEM, VIRTUAL MACHINE LOCATION METHOD, PROGRAM, VIRTUAL MACHINE MANAGER, AND SERVER - A virtual machine location system includes a resource conflict detection unit for detecting a resource conflict using measurement data regarding a resource usage state of the entirety of a single server and a resource usage state of virtual machines running on the server, and a virtual machine relocation determination unit for transferring the virtual machine on the server for which a resource conflict has been detected to another server having a lower resource usage rate are included.01-07-2010
20100115512Virtual machine system, management method of virtual machine system, and recording medium - According to an aspect of the embodiment, an agent is provided on a policy management server, and manages update information indicating an update of a guest OS and modification information for modifying the guest OS. The agent is provided on each host OS. The agent migrates a guest OS image stored in a storage device of a virtual machine server VMSA to a storage device of a virtual machine server VMSB, and modifies the migrated guest OS image according to the update information and the modification information.05-06-2010
20120233611Hypervisor-Agnostic Method of Configuring a Virtual Machine - In one embodiment, there is a method for configuring a virtual machine where there are two storage mechanisms available to the virtual machine: a first storage containing virtual machine operating information, and a second storage including virtual machine configuration information. The configuration information in the second storage is used to configure the virtual machine, including changing the information in the operating storage. The configuration information can pertain to the hypervisor, any logical container within the hypervisor, and any operating environment within on of the logical containers. In a further embodiment, the configuration information from the second storage can be saved and provided to another virtual machine, and used to configure the second virtual machine in a similar fashion. Each virtual machine can have an independent copy of the second storage, or the storage can be mounted in the first machine, unmounted, and then mounted in the second machine.09-13-2012
20120233610RUNTIME VIRTUAL PROCESS CREATION FOR LOAD SHARING - Methods and systems for managing execution of processes in virtual environments are disclosed. One method includes creating a virtual process from a process executing on a first virtual machine, and transferring the virtual process from the first virtual machine to a second virtual machine. The method also includes executing the virtual process on the second virtual machine, and, after the virtual process completes, removing the virtual process from the second virtual machine.09-13-2012
20120233609OPTIMIZING VIRTUAL MACHINE SYNCHRONIZATION FOR APPLICATION SOFTWARE - Real-time application metrics of an application executed by a virtual machine are dynamically monitored by a controlling agent and analyzed to determine an optimal configuration of the virtual machine for executing the application. Based on the measured metrics, tunable parameters of the virtual machine may be adjusted to achieve desired application performance.09-13-2012
20120233608Virtualization Support in Platform Management (PLM) Information Model - A method and system for protecting against failure of hardware elements (HEs) in a virtual machine system using an information model with virtualization support. Based on the information model, the method boots virtual machine monitors (VMMs), virtual machines (VMs) and operating systems (OSes). The information model includes a graph of objects representing configured relationships between the hardware elements (HEs), VMMs, VMs, and OSes through parent child relationships between the graph's objects. The graph of objects includes: a domain object, HE objects, VMM objects, VM objects, and OS objects. The VM objects of a migration-enabled type represent those of the VMs that may migrate between the VMMs. Based on the runtime associations between the VMM objects and the VM objects of the migration-enabled type, the method identifies which of the migration-enabled VMs are hosted by a same HE and are therefore vulnerable to hardware failure of the same HE.09-13-2012
20090125904VIRTUAL MACHINE MIGRATION - A source virtual machine (VM) hosted on a source server is migrated to a destination VM on a destination server without first powering down the source VM. After optional pre-copying of the source VM's memory to the destination VM, the source VM is suspended and its non-memory state is transferred to the destination VM; the destination VM is then resumed from the transferred state. The source VM memory is either paged in to the destination VM on demand, or is transferred asynchronously by pre-copying and write-protecting the source VM memory, and then later transferring only the modified pages after the destination VM is resumed. The source and destination servers preferably share common storage, in which the source VM's virtual disk is stored; this avoids the need to transfer the virtual disk contents. Network connectivity is preferably also made transparent to the user by arranging the servers on a common subnet, with virtual network connection addresses generated from a common name space of physical addresses.05-14-2009
20110271279Secure Virtual Machine - An approach to securely distributing and running virtual machines is described that addresses the inherent insecurity of mobile virtual machines by authenticating a user before establishing a specialized virtualization runtime environment that includes a filesystem driver inserted into the host operating system to provide secure access to a virtual machine by authorized hypervisors only. Further described is the creation of a SecureVM package that includes the various components used to perform the operations of installation, user authentication and establishment of the specialized virtualization runtime environment.11-03-2011
20120110578DATA PROCESSING SYSTEM AND METHOD - A data processing system includes a hardware platform, a virtualization platform, a physical machine, and at least two virtual machines. The virtual machines run on the virtualization platform. The physical machine is configured to bear the virtualization platform. The physical machine is connected to the hardware platform through a system bus. The hardware platform is configured to process data sent by a first virtual machine and send the processed data to a second virtual machine. The hardware platform is employed to process data transmission or data exchange between various virtual machines, so that the virtual machines occupy fewer Central Processing Unit (CPU) and memory resources of the physical machine that bears the running of the virtual machines, the system resource consumption is reduced, and the running performance and speed of the system are improved.05-03-2012
20120110576RESOURCE SHARING SYSTEM AND METHOD THEREOF - A resource sharing system for a plurality of user devices accessing at least one resource at the same time is provided. The system comprises a plurality of virtual machines and a connection broker. The virtual machines are established on at least one computer, wherein each user device corresponds to at least one of the virtual machines and each of the at least one resource corresponds to one of the virtual machines. The connection broker connects to the virtual machines and receives login information from each of the virtual machines and joins the virtual machines sending the login information into a group. Through the connection broker, the user devices share and access the resources corresponding to the virtual machines in the group.05-03-2012
20120110575SECURE PARTITIONING WITH SHARED INPUT/OUTPUT - A soft partitioning system for allowing multiple virtual system environments to execute on a single platform may include I/O service partitions (IOSPs). The IOSPs operating in a separate virtual memory space on the platform and service disk and network requests from multiple guests. The IOSPs provide translation from virtual addresses to physical addresses such that from the point of view of the guest the virtual addresses used by the guest appear to be physical addresses. The IOSP may be implemented in a Linux kernel. The address space of the IOSP may be extended to include DMA memory sections such that the Linux kernel does not include all of the guest's memory. The IOSP may operate on hardware that does or does not support virtualization technology for directed I/O.05-03-2012
20120110574METHODS AND SYSTEMS TO CLONE A VIRTUAL MACHINE INSTANCE - In one embodiment, an initialization script including instructions to define a value of a parameter at a cloned virtual machine instance is generated and stored at a virtual disk of a source virtual machine instance. The value of the parameter at the cloned virtual machine instance is different from the value of the parameter at the source virtual machine instance. An image of the virtual disk is then sent to a virtual machine module. The cloned virtual machine instance is instantiated at the virtual machine module based on the image of the virtual disk.05-03-2012
20120110573TRANSFERRING OBJECTS BETWEEN VIRTUAL MACHINES - Object calls for objects not available on a local virtual machine are fulfilled by requesting the object itself from a remote virtual machine and reconstructing a local instance of the requested object on the local virtual machine. The local instance is reconstructed using information about the class, variables, and methods associated with the remote instance of the object communicated to the local virtual machine. Present and future calls to the object are then directed to the local instance of the requested object.05-03-2012
20120110571Inherited Product Activation for Virtual Machines - Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel, and software installed in the guest uses this information to inform its own product activation process. The virtualized (guest) software may then activate without any outside communication when the license requirements for the host are met.05-03-2012
20120110570STATEFUL APPLICATIONS OPERATING IN A STATELESS CLOUD COMPUTING ENVIRONMENT - A cloud computing environment may use a virtualization layer within a stateless cloud computing process to capture, store, and retrieve state information generated by a stateful application executing within the process. The virtualization layer may monitor various state storage systems to identify changes to stateful items and store the stateful items in a state storage mechanism. The virtualization layer may intercept and redirect calls to the stateful items stored in the state storage mechanism. A cloud computing manager may start and stop the stateless cloud computing process, and may recover the state and resume executing the application.05-03-2012
20090150884COMPUTER AND METHOD OF PROVIDING SOFTWARE USER INTERFACE - A computer and method thereof including a first settings changing user interface application running on a first operating system, a second settings changing user interface application running on a second operating system, where the second settings changing user interface application provides an equal function to a part of a user interface function provided by the first settings changing user interface application. The second settings changing user interface application inputs a request of changes of settings the first settings changing user interface application executes the changes of settings based on the request and the second settings changing user interface application outputs a result of the changes of settings executed by the first settings changing user interface application.06-11-2009
20100275200Interface for Virtual Machine Administration in Virtual Desktop Infrastructure - A system includes a plurality of virtualization servers and a virtual desktop interface. The plurality of virtualization servers are configured to be placed in communication with a client. The virtual desktop interface is in communication with the plurality of virtualization servers and with the client. The virtual desktop interface is configured to receive a request for maintenance from the client, and further configured to perform the request for the maintenance on one of the virtualization servers associated with the client.10-28-2010
20100281478MULTIPHASE VIRTUAL MACHINE HOST CAPACITY PLANNING - A virtual machine distribution system is described herein that uses a multiphase approach that provides a fast layout of virtual machines on physical computers followed by at least one verification phase that verifies that the layout is correct. During the fast layout phase, the system uses a dimension-aware vector bin-packing algorithm to determine an initial fit of virtual machines to physical hardware based on rescaled resource utilizations calculated against hardware models. During the verification phase, the system uses a virtualization model to check the recommended fit of virtual machine guests to physical hosts created during the fast layout phase to ensure that the distribution will not over-utilize any host given the overhead associated with virtualization. The system modifies the layout to eliminate any identified overutilization. Thus, the virtual machine distribution system provides the advantages of a fast, automated layout planning process with the robustness of slower, exhaustive processes.11-04-2010
20100122249ON-DEMAND ALLOCATION OF VIRTUAL ASYNCHRONOUS SERVICES INTERFACES - An on-demand allocation of virtual asynchronous services interface adapters is provided. A determination is made as to whether an operation request requires that a set of virtual I/O service partitions have a required number of virtual asynchronous services interface adapters. If a required number of virtual asynchronous services interface adapters is required, a determination is made as to whether the set of virtual I/O service partitions have the required number of virtual asynchronous services interface adapters. Responsive to a failure to have the required number of virtual asynchronous services interface adapters, a set of new virtual asynchronous services interface adapters is defined in partition management firmware and in the set of virtual I/O service partitions. The set of new virtual asynchronous services interface adapters is configured in the set of virtual I/O service partitions and the operation is issued to the set of virtual I/O service partitions.05-13-2010
20100122250Apparatus, System, and Method for Granting Hypervisor Privileges - An apparatus, system, and method are disclosed for granting hypervisor privileges. An installation module installs a monitor hypervisor wherein only the monitor hypervisor is granted the hypervisor privileges by the computer. An authentication module authenticates a second hypervisor. An eviction module evicts the monitor hypervisor if the second hypervisor is authenticated. The installation module further installs the second hypervisor after the monitor hypervisor is evicted so that only the second hypervisor is granted hypervisor privileges by the computer05-13-2010
20120066681SYSTEM AND METHOD FOR MANAGEMENT OF A VIRTUAL MACHINE ENVIRONMENT - A system and method for operating an agent. A policy may be generated based on an analysis of a code segment of an agent, analysis of the execution and/or installation of an agent. An interaction with the agent may be intercepted. The interaction may be analyzed according to the policy. A machine for performing an operation related to the interaction may be selected. A proxy on the selected machine may perform the operation and return a result to the agent. In some embodiments, a request to perform a task may be intercepted. A first portion of the task may be performed by an agent and a second portion of the task may be performed by a proxy.03-15-2012
20120036508FRAMEWORK FOR DOMAIN-SPECIFIC RUN-TIME ENVIRONMENT ACCELERATION USING VIRTUALIZATION TECHNOLOGY - In some embodiments, the invention involves a framework for using virtualization technology to efficiently support a domain-specific run-time environment. In at least one embodiment, a framework is utilized to take advantage of virtualization technology (VT) to partition performance critical and non-performance critical tasks of the same domain-specific application. An embodiment of the invention utilizes a general-purpose operating system to execute non-performance critical aspects of a domain, and uses a privileged VT-root mode to execute performance critical aspects of the domain. Another embodiment uses one or more guest VMs to execute the performance critical aspects of the domain-specific run-time environment. Other embodiments are described and claimed.02-09-2012
20130219384SYSTEM AND METHOD FOR VERIFYING LAYER 2 CONNECTIVITY IN A VIRTUAL ENVIRONMENT - A method is provided in one example embodiment that includes detecting a migration of a virtual machine from an origination host to a destination host and comparing a first root bridge to a second root bridge to verify data link layer continuity of the virtual network on the destination host. The virtual machine is connected to a virtual network, the first root bridge is associated with the virtual network on the origination host and the second root bridge is associated with the virtual network on the destination host. The method may further include blocking the migration if the first root bridge and the second root bridge are not the same.08-22-2013
20130219386DYNAMIC ALLOCATION OF COMPUTE RESOURCES - A resource broker determines availability of a portion of a set of compute resources in real-time. The set of compute resources is assigned as a priority to a master process. Further, the resource broker assigns the portion of the set of compute resources to an auxiliary process if the portion of the set of compute resources is available. In addition, the resource broker determines that the master process is attempting to utilize the portion of the set of compute resources. The resource broker also assigns the portion of the set of compute resources to the master process from the auxiliary process without an interruption that exceeds a predetermined time threshold of processing being performed by the master process.08-22-2013
20130219389METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO VIRTUALIZE PERFORMANCE COUNTERS - Methods, apparatus, and articles of manufacture to virtualize performance counters are disclosed. An example method includes scheduling a virtual machine on a processor, incrementing a virtual performance counter in response to an occurrence of a speculative event during direct execution of guest instructions by the virtual machine on the processor, and incrementing the virtual performance counter in response to an occurrence of the speculative event during execution of emulated instructions by a hypervisor on behalf of the virtual machine on the processor.08-22-2013
20130219391SERVER AND METHOD FOR DEPLOYING VIRTUAL MACHINES IN NETWORK CLUSTER - A server for deploying virtual machines (VMs) in a network cluster is provided. The server sets template information for creating VMs, creates a VM based on the template information, receives an IP address assigned to the VM by a dynamic host configuration protocol (DHCP), and deploys the VM into the network cluster. The server then monitors a resource utilization ratio of the network cluster. When the ratio of the network cluster is more than a first preset ratio, the server creates a new VM based on the template information and deploys the new created VM into the network cluster. When the ratio of the network cluster is less than a second preset ratio , the server decreases available resource of the network cluster by suspending or deleting a created VM in the network cluster.08-22-2013
20100088699VIRTUAL MACHINE OPERATION SYSTEM, VIRTUAL MACHINE OPERATION METHOD AND PROGRAM - It makes possible to accomplish by distributing only a partial disk image to be substituted among three areas in the disk image area of a virtual machine image, i.e., the OS area, the application area, and the user data area. A virtual machine image generation means 04-08-2010
20090094604VIRTUAL DEVICE MANAGEMENT METHOD AND MANAGEMENT APPARATUS - A management apparatus (04-09-2009
20110173616DETERMINATION AND MANAGEMENT OF VIRTUAL NETWORKS - A method for determination of topology of virtual networks comprises the following steps implemented by a physical node, physical nodes being connected by a physical network and designed to support virtual nodes of these virtual networks: determination of resource parameters defining a physical configuration of the physical network and a physical configuration specific to the physical node and determination of request parameters defining service requests relating to the virtual networks. The method further comprises, in the case of modification of at least one parameter belonging to the group comprising the resource parameters and the request parameters between a current point in time and a preceding point in time, the broadcast of at least the modified parameters within the physical network, the updating of the resource and request parameters as a function of the modified parameters and the determination of topologies for the virtual networks by means of the updated parameters.07-14-2011
20110197191CORRECTING PACKET TIMESTAMPS IN VIRTUALIZED ENVIRONMENTS - A network capture element is embodied on a virtual machine, and a utility function is embodied on the actual device, preferably within the virtual machine manager. Both the utility function and the traffic capture element are configured to monitor communication events. To minimize the overhead imposed, the utility function is configured to merely store the time that the event occurred on the actual machine, corresponding to an identifier of the event. The network capture element, on the other hand, performs the time consuming tasks of filtering the communications, selectively storing some or all of the data content of the communications, characterizing the data content, and so on. Instead of storing the virtual time that the communication event occurred at the virtual machine, the network capture element uses the identifier of the communication event to retrieve the actual time that the communication event occurred on the actual machine.08-11-2011
20110197188EXTENDING FUNCTIONALITY OF LEGACY SERVICES IN COMPUTING SYSTEM ENVIRONMENT - Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing device. In a modern environment, virtual machines (VMs) operate as independent guests on processors and memory by way of scheduling control from a virtualization layer (e.g., hypervisor). At least one VM is provisioned to modify standard entry points of the original legacy application for new accessing of various system functions of the hardware platform. Representative functions include network access, processors, and storage. Policy decision points variously located are further employed to ensure compliance with computing policies. Multiple platforms and computing clouds are contemplated as are VMs in support roles and dedicated software appliances. In this manner, continued use of legacy services in modern situations allows participation in more capable environments and application capabilities heretofore unimagined. Other embodiments contemplate computing systems and computer program products, to name a few.08-11-2011
20100083251Techniques For Identifying And Comparing Virtual Machines In A Virtual Machine System - A technique for identifying virtual machines (VMs) in a VM system includes determining a configuration file location on a data store for the VM. A VM manager (for the VM) and an associated VM identification assigned to the VM (by the VM manager) are determined. A unique VM identification is then created based on the configuration file location on the data store, the VM manager, and the associated VM identification.04-01-2010
20100083248OPTIMIZING A PREDICTION OF RESOURCE USAGE OF MULTIPLE APPLICATIONS IN A VIRTUAL ENVIRONMENT - Described herein is a method for optimizing a prediction of resource usage of multiple applications running in a virtual environment, comprising: providing a predetermined set of benchmarks; executing the predetermined set of benchmarks in a native hardware system in which the application natively resides; executing the predetermined set of benchmarks in the virtual environment; collecting first traces of first resource utilization metrics in the native hardware system based on the execution of the predetermined set of benchmarks in the native hardware system; collecting second traces of second 10 resource utilization metrics in the virtual environment based on the execution of the predetermined set of benchmarks in the virtual environment; generating a first prediction model that maps a first selected set of the first traces of a selected one of the first resource utilization metrics to the second traces of resource utilization metrics; generating a second prediction model that maps a second different selected set of the first traces of the selected first resource utilization metric to the second traces of resource utilization metrics; collecting first application traces of resource utilization metrics in the native hardware system based on an execution of a first application in the native hardware system; collecting second application traces of resource utilization metrics in the native hardware system based on an execution of a second application in the native hardware system; aggregating the first application traces of the first application and the second application traces of the second application into combined application traces of resource utilization metrics; and predicting a combined resource usage of the first and second applications running in the virtual environment by applying the first and second prediction models to the combined application traces of resource utilization metrics.04-01-2010
20110202921INFORMATION PROCESSING DEVICE, COMPUTER SYSTEM AND PROGRAM - An information processing device includes: a detecting unit that detects a load of a process performed on the first virtual computer; a load determining unit that determines whether the load detected by the detecting unit is higher than a threshold; and an inhibiting unit that inhibits the process when a second virtual computer to which the first virtual computer is switched operates on the other information processing device and the process that causes the load determined by the load determining unit is performed on the second virtual computer.08-18-2011
20120240109HARDWARE CHARACTERIZATION IN VIRTUAL ENVIRONMENTS - A, system, and computer program product for hardware characterization in a virtual environment are provided in the illustrative embodiments. The hardware resource is allocated to a test virtual machine (VM). A characterization workload is configured to execute in the test VM to characterize a parameter of the hardware resource. The characterization workload is caused to execute on the test VM. A first result of the characterization workload execution is received from the test VM, wherein the result assigns a value to a characteristic of the hardware resource indicative of a behavior of the hardware resource under a set of circumstances.09-20-2012
20090064138APPARATUS, SYSTEM, AND METHOD FOR GATHERING TRANSACTION STATISTICS DATA FOR DELIVERING TRANSACTION STATISTICS DATA AS JAVA OBJECTS VIA JMX NOTIFICATION - An apparatus, system, and method are disclosed for gathering transaction statistics data for a real time transaction system that delegates data persistence of the transaction statistics data to one or more clients by utilizing a JMX notification system. Specifically, transaction statistics data is collected in real time for each transaction executed by a real time transaction system; a JMX notification is generated that includes the transaction statistics data; and an MBean server broadcasts the JMX notification object to listeners, which then capture and persist the transaction statistics data on the client side, thereby minimizing the impact of data logging on the transaction system.03-05-2009
20130067465DISTRIBUTED COMPUTING ARCHITECTURE WITH DYNAMICALLY RECONFIGURABLE HYPERVISOR NODES - A method of dynamically reconfiguring a distributed computing architecture having a plurality of processing nodes, where each processing node hosts a respective plurality of virtual machines, includes detecting a fault condition on a first processing node, assessing the criticality of a software function performed by each of the respective virtual machines on the first processing node, and reassigning at least one of the plurality of virtual machines on the first processing node to a second processing node if the at least one virtual machine is deemed critical.03-14-2013
20100083249Managing diverse hardware using common tools - Methods and apparatus involve managing a plurality of hardware platforms with common tools despite actual or potential non-uniformity of vendor items. Representatively, hardware platforms include a minimalist operating system upon which a management agent and vendor-specific providers are deployed. From a console common to the platforms, local or remote management occurs. In a paradigm shift when initially deploying or redeploying platforms, for example, a “just enough” operating system exists to configure the hardware of different vendors so virtual machines can be thereafter deployed without needing pre-configured operating systems, bundled management packages, etc. A common embedded hypervisor on the platform is but one technique to achieve a minimalist operating system as is a common CIMOM or SNMP agent but one technique to achieve a management agent. Other features include computing systems and computer program products, to name a few.04-01-2010
20090249334RECORDING MEDIUM RECORDING THEREON VIRTUAL MACHINE MANAGEMENT PROGRAM, MANAGEMENT SERVER DEVICE, AND METHOD FOR MANAGING VIRTUAL MACHINE - A virtual machine managing method includes: a dependence relation list generation step of detecting a dependence relation among virtual machines implemented on a physical machine and generating a dependence relation list, based on a detection result; a target management table generation step of reading, when a selection instruction for selecting a target virtual machine to be halted among the plurality of implemented virtual machines is detected; and a halted target presentation step of reading the virtual machine identification information on all of the virtual machines in dependence relation with the target virtual machine to be halted, and visually presenting the read virtual machine identification information on all of the target virtual machines to be halted.10-01-2009
20100125845METHOD FOR DYNAMIC LOAD BALANCING ON PARTITIONED SYSTEMS - Methods, systems and apparatuses to dynamically balance execution loads on a partitioned system among processor cores or among partitions.05-20-2010
20100125843VIRTUAL SERVER SYSTEM, PHYSICAL CPU AND METHOD FOR ALLOCATING PHYSICAL MEMORY - The present invention prevents performance degradation due to memory latency in automatically allocating physical CPUs and memories to logical servers. Having information on arrangement of the physical CPUs and the memories, automatic allocation of physical CPUs to a logical server is implemented in consideration of reduction in memory latency. Moreover, the logical servers and the physicals CPU are grouped. Thereby, to each of the logical servers, a physical CPU in the same group as that of the logical server is allocated, and a memory under the memory controller to which the physical CPU belongs is allocated. In this way, the physical CPUs are allocated in consideration of reduction in memory latency.05-20-2010
20100100881VIRTUAL SYSTEM CONTROL METHOD AND APPARATUS - A virtual system control apparatus includes: a configuration information storage device to store configuration information for an operational system of a virtual system; a first virtual machine image storage device to store first virtual machine images for the operational system of the virtual system; a configuration change information storage device to store configuration change information that represents configuration information concerning difference between the operational system of the virtual system and plural types of test systems; a second virtual machine image storage device to store second virtual machine images for a virtual machine relating to the difference; and a controller. By adopting such data configuration of the operational system and the test system, it becomes possible to switch easily and smoothly between the operational system and the test system.04-22-2010
20100100880VIRTUAL SYSTEM CONTROL METHOD AND APPARATUS - A virtual system control apparatus includes a configuration information storage device that stores configuration information for operational systems of virtual systems; a first virtual machine image storage device that stores virtual machine images for the operational systems of the virtual systems; a configuration change information storage device that stores configuration change information that represents configuration information concerning difference between the operational system and a test system of the virtual system; a second virtual machine image storage device that stores virtual machine images for the virtual machine relating to the difference; and a controller. Thus, by adopting data configuration of the operational system and the test system, it becomes possible to easily and smoothly switch the virtual system between the operational system and the test system.04-22-2010
20100100878METHOD AND APPARATUS FOR RESOURCE PROVISIONING - Embodiments of the invention provide a method and apparatus for resource provisioning for a new virtual machine to be provided in a computer device. In one embodiment, at least one storage subsystem, the computer device, and a storage management server are connected via a network. A unique virtual port name for the new virtual machine is created by one of a first storage subsystem of the at least one storage subsystem or the storage management server. A volume for the new virtual machine is provided in the first storage subsystem. The first storage subsystem includes a unique port name for a port through which the volume for the new virtual machine has I/O connection via the network. The unique virtual port name is assigned to the new virtual machine in the computer device under NPIV (N_Port ID Virtualization).04-22-2010
20100100877STATISTICAL PACKING OF RESOURCE REQUIREMENTS IN DATA CENTERS - A computer-implemented method of managing resources in a virtual machine environment can include determining a specification of provisioning success corresponding to each of multiple jobs in the virtual machine environment, determining a prediction of resource needs corresponding to each of the jobs, and determining a resource specification corresponding to each of the jobs based on the specification of provisioning success and the prediction of resource needs.04-22-2010
20110173614METHOD AND SYSTEM FOR PROVISIONING A VIRTUAL COMPUTER AND SCHEDULING RESOURCES OF THE PROVISIONED VIRTUAL COMPUTER - A method for virtual computing that includes receiving a virtual computer specification, wherein the virtual computer specification defines a plurality of hardware and software configuration requirements for a virtual computer and a duration requirement for use of the virtual computer, requisitioning a plurality of computing resources based on the plurality of hardware and software configuration requirements, provisioning the plurality of computing resources from a pool of computing resources to obtain a provisioned virtual computer, and scheduling the plurality of computing resources of the provisioned virtual computer for use based on the duration requirement.07-14-2011
20110173610VIRTUAL MACHINE, REMOTE START METHOD, AND VIRTUAL MACHINE SYSTEM - A virtual machine includes an identification information producing unit that produces identification information when a production request for new identification information used for starting a guest operating system (OS) controlled by a host OS is obtained via a network, an identification information storing unit that stores the produced identification information in association with the guest OS that starts by using the identification information, and a guest OS starting unit that, when a start request for starting the guest OS using the identification information is obtained via the network during an off state of the guest OS, compares the obtained identification information with the identification information stored in the identification information storing unit and starts the guest OS for which the start request is made through the host OS based on the comparison result.07-14-2011
20110173609Method and Apparatus for Determining the Identity of a Virtual Machine - A hypervisor preferably provides VM identification, priority and LUN/LBA range information to the HBA when a VM is created. Alternatively, the HBA can determine that a LUN/LBA range is new and request VM identity, priority and LUN/LBA range from the hypervisor. The HBA creates a table containing the VM identification, priority and LUN/LBA range. The HBA then detects operations directed to the LUN/LBA range and does a lookup to determine VM identification and priority. VM identification and priority are then mapped into a field in a frame using a unique identifier. The unique identifier can either be placed using reserved bits on the existing Fibre Channel (FC) header or can use bits in an additional header, such as a modified IFR header.07-14-2011
20110173607METHOD OF CONFIGURING A VIRTUAL APPLICATION - A method of modifying a virtual application configuration to include modifications made at runtime by a virtual application that is implemented by a first virtualized application file that was created previously using the virtual application configuration. At runtime, the virtual application implemented by the first virtualized application file stores modifications to its configuration in a sandbox memory location. The method includes reading the modifications from the sandbox memory location. Then, the modifications are written to the virtual application configuration. The modified virtual application configuration is then used to create a second virtualized application file that includes the modifications stored in the sandbox memory location.07-14-2011
20090276773Multi-Root I/O Virtualization Using Separate Management Facilities of Multiple Logical Partitions - Mechanisms are provided for implementing a multi-root PCI manager (MR-PCIM) in a multi-root I/O virtualization management partition (MR-IMP) to control the shared functionality of an multi-root I/O virtualization (IOV) enabled switch fabric and multi-root IOV enabled I/O adapter (IOA) through the base functions (BF) of the switches and IOAs. A hypervisor provides device-independent facilities to the code running in the I/O Virtualization Management Partition (IMP), Multi-Root (MR)-IMP and client partitions. The MR-IMP may include device specific code without the hypervisor needing to sacrifice its size, robustness, and upgradeability. The hypervisor provides the virtual intermediary functionally for the sharing and control of the switch and IOA's control functions.11-05-2009
20110197190VIRTUALIZATION METHOD AND VIRTUAL MACHINE - There is a need for providing the Xeon CPU with a two-level VM that is independent of VMM types and prevents the throughput from degrading when the OS operates the privilege register. A machine is provided with a processor and memory. The machine includes a first virtual machine manager for managing a virtual machine, a second virtual machine for managing an operating system, first management information, and second management information. The processor is provided with a register and a shadowing function. The machine uses a virtualization method. The first virtual machine manager detects a call from the second virtual machine manager. The first virtual machine manager enables the shadowing function when it is determined that an instruction for enabling the shadowing function caused the call.08-11-2011
20110197189SYSTEMS AND METHODS FOR TRIGGERING SCRIPTS BASED UPON AN ALERT WITHIN A VIRTUAL INFRASTRUCTURE - Embodiments of the present disclosure provide methods and systems for triggering scripts based upon an alert within a virtual infrastructure. Other embodiments may be described and claimed.08-11-2011
20090089780METHOD AND APPARATUS TO CONVEY PHYSICAL RESOURCE RELATIONSHIPS - In general, embodiments of the invention relates to a method for conveying hardware resources from a host (OS) executing on a computer system. The method includes obtaining host hardware information by the host OS, wherein the host hardware information specifies a plurality of physical hardware components of the computer system, sending the host hardware information to a guest OS executing within the host OS, generating, by the guest OS, a resource request using the host hardware information, sending, by the guest OS, the resource request to the host OS, and in response to receiving the resource request, allocating, by the host OS, guest hardware resources, where the guest hardware resources include at least one of the physical hardware components in the resource request.04-02-2009
20090293058VIRTUAL SYSTEM AND METHOD OF RESTRICTING USE OF CONTENTS IN THE VIRTUAL SYSTEM - Provided is a method of restricting use of contents in a virtual system comprising at least one virtual machine implemented by applying virtualization technology to a predetermined device. The method includes: reading a first device identifier from the device in order to identify the device; reading a second device identifier, which is a device identifier allocated to the at least one virtual machine, from the at least one virtual machine; determining whether the first device identifier is identical to the second device identifier; and selectively restricting use of contents in the at least one virtual machine based on a result of the determining.11-26-2009
20120297379VENDOR-INDEPENDENT RESOURCE CONFIGURATION INTERFACE FOR SELF-VIRTUALIZING INPUT/OUTPUT DEVICE - A vendor-independent resource configuration interface automatically maps virtual functions to physical functions in a self-virtualizing IO resource using the concept of a logical port that maps to a particular physical port and protocol in the self-virtualizing IO resource. A user wishing to provide a logical partition access to a self-virtualizing IO resource typically creates or configures a logical port for the logical partition by mapping the logical port to a particular physical port and protocol defined for the self-virtualizing IO resource, and an appropriate virtual function mapped to an appropriate physical function on an appropriate self-virtualizing IO resource is automatically selected, typically without requiring the user to have a detailed understanding of the numbers of supported virtual functions, physical functions and protocols supported by specific resources.11-22-2012
20120297382VIRTUAL SERVER AND VIRTUAL MACHINE MANAGEMENT METHOD FOR SUPPORTING ZERO CLIENT - Disclosed herein are a virtual server and a virtual machine management method for supporting a zero client. The virtual server includes a virtual machine management agent unit and a virtualization unit. The virtual machine management agent unit generates a virtual host interface resource pool and a directly allocatable host interface resource pool by classifying attributes of host interface resources of the virtual server. The virtualization unit provides a host interface of a virtual machine by selectively using any one of emulation mode in which a virtual host interface set corresponding to the virtual host interface resource pool is generated and direct connection mode in which a directly allocatable host interface set corresponding to the directly allocatable host interface resource pool is connected to the zero client.11-22-2012
20100088697Content Distribution System - Distributing content over a network includes providing an information handling system (IHS) with an interface module used to couple to a signal from a content provider. A virtual IHS management engine dynamically creates a virtual IHS. The virtual IHS then receives the signal. An interface for transmitting the signal from the virtual IHS to a network is also provided.04-08-2010
20120297383METHODS AND SYSTEMS FOR VIRTUALIZING AUDIO HARDWARE FOR ONE OR MORE VIRTUAL MACHINES - The present disclosure is directed towards methods and systems for virtualizing audio hardware for one or more virtual machines. A control virtual machine (VM) may translate a first stream of audio functions calls from a first VM hosted by a hypervisor. The translated first stream of audio function calls may be destined for a sound card of the computing device executing the hypervisor. The control VM may detect a second stream of audio functions calls from a second VM hosted by the hypervisor. The control VM may translate the second stream of audio functions calls from the second VM. The control VM may further merge the translated first stream of audio function calls and the translated second stream of the audio function calls in response to the detected second stream. The control VM may transmit the merged stream of audio function calls to the sound card.11-22-2012
20090144731SYSTEM AND METHOD FOR DISTRIBUTION OF RESOURCES FOR AN I/O VIRTUALIZED (IOV) ADAPTER AND MANAGEMENT OF THE ADAPTER THROUGH AN IOV MANAGEMENT PARTITION - The system and method address the situation where an input/output (I/O) fabric is shared by more than one logical partition (LPAR) and where each LPAR can share with the other LPARs an I/O adapter (IOA). In particular, each LPAR is assigned its own separate address space to access a virtual function (VF) assigned to it such that each LPAR's perception is that it has its own independent IOA. Each VF may be shared across multiple LPARs. Facilities are provided for management of the shared resources of the IOA via a Physical Function (PF) of the IOA by assignment of that PF to an I/O Virtualization Management Partition (IMP). The code running in the IMP acts as a virtual intermediary to the VFs for fully managing the VF error handling, VF reset, and configuration operations. The IMP also acts as an interface to the PF for accessing common VF functionality. Furthermore, the functions of resource assignment and management relative to the VFs and the client partitions that use those VFs, which might normally be done by an entity like a hypervisor, are implemented by this IMP.06-04-2009
20080209415METHOD AND SYSTEM FOR REMOTE MONITORING SUBSCRIPTION SERVICE - Embodiments pertain generally to a method of providing a remote monitoring subscription service. The method includes receiving client activity data from at least one of a client virtual machine and a physical machine supporting the client virtual machine at a site of a customer and comparing the client activity data against a set of performance guidelines. The method also includes determining a recommended action in response to the client activity data not falling within the set of performance guidelines and forwarding the recommended action to the customer.08-28-2008
20120144388Database Access for Native Applications in a Virtualized Environment - A database may be accessed by creating a virtualized environment on a computer system and instantiating a driver for a database within the virtualized environment. A first execution thread within the virtualized environment is created and a first unique identifier is associated with the first execution thread within the driver for the database. A first connection to the database is then opened from within the first execution thread using the first unique identifier. A first native program containing embedded structured query language (SQL) statements is executed within the first execution thread and the first native program is provided with access to said database using the first connection to said database.06-07-2012
20120144390CUSTOMIZED COMPUTER IMAGE PREPARATION AND DEPLOYMENT INCLUDING VIRTUAL MACHINE MODE - A computer-implemented technique significantly reduces the time required to configure software images deployed from a golden reference machine to destination machines. Time is saved by applying a priori knowledge of the configuration of the intended destination machines and omitting normally run configuration steps known to be non-essential or irrelevant to the destination machines. This technique is particularly advantageous when the destination machines are virtual machines, as time-consuming commands for configuring hardware on the destination machines can be avoided.06-07-2012
20110173611INFORMATION TERMINAL AND SOFTWARE OPERATION-CONTENT INSTRUCTING METHOD - A master selecting unit selects master software from pieces of software that perform a computing process. A screen control unit displays an operation screen for the master software that is selected by the master selecting unit on a screen. A software search unit searches, when an instruction operation is detected on the operation screen for the master software, for any piece of software that displays an operation screen that receives the same instruction operation that the operation screen for the master software receives. An operation-content instructing unit instructs the master software and each piece of software that is found by the software search unit about operation content corresponding to the instruction operation that has been detected on the operation screen for the master software.07-14-2011
20110173615INTERPRETING I/O OPERATION REQUESTS FROM PAGEABLE GUESTS WITHOUT HOST INTERVENTION - Input/output (I/O) operation requests from pageable storage mode guests are interpreted without host intervention. In a pageable mode virtual environment, requests issued by pageable storage mode guests are processed by one or more processors of the environment absent intervention from one or more hosts of the environment. Processing of the requests includes manipulating, by at least one processor on behalf of the guests, buffer state information stored in host storage. The manipulating is performed via instructions initiated by the guests and processed by one or more of the processors.07-14-2011
20110173608Method and Apparatus for Providing Virtual Machine Information to a Network Interface - A hypervisor preferably provides VM identification, priority and LUN/LBA range information to the HBA when a VM is created. Alternatively, the HBA can determine that a LUN/LBA range is new and request VM identity, priority and LUN/LBA range from the hypervisor. The HBA creates a table containing the VM identification, priority and LUN/LBA range. The HBA then detects operations directed to the LUN/LBA range and does a lookup to determine VM identification and priority. VM identification and priority are then mapped into a field in a frame using a unique identifier. The unique identifier can either be placed using reserved bits on the existing Fibre Channel (FC) header or can use bits in an additional header, such as a modified IFR header.07-14-2011
20090276774Access control for virtual machines in an information system - An information system includes host computers having virtual machine programs running thereon for generating virtual machines. A storage system in communication with the host computers stores an image file corresponding to each virtual machine running on the host computers. In some embodiments, when the storage system receives an access request to a particular image file corresponding to a particular one of the virtual machines running on one of the host computers, the storage system determines whether the access request is authorized based upon an identifier of the particular virtual machine and a location of the particular virtual machine. In some embodiments, the storage system sends an inquiry to a management computer when determining whether the access request is authorized and, based upon the location of the particular virtual machine and the identifier of the particular virtual machine, the management computer sends a reply as to whether the access request is authorized.11-05-2009
20090276772VIRTUALIZATION PLATFORM CONFIGURED WITH VIRTUAL CONNECT CONTROL - A data processing system enables configuration of a virtual connect functioning in combination with a virtualization platform. The illustrative data processing system is used with a virtualization platform which is configured to run multiple operating systems simultaneously on one or more physical servers and a virtual connect device which is communicatively coupled to the virtualization platform. The virtual connect device virtualizes connections between the physical server or servers and a network infrastructure. The data processing system comprises a configuration manager that integrates migration and failover of virtual machines operating under the virtualization platform with migration and failover of physical servers operative under the virtual connect device for management of virtual and physical migration and failover using common commands.11-05-2009
20110126198Methods for Interfacing with a Virtualized Computing Service over a Network using a Lightweight Client - Methods for controlling a virtualized computer service remotely through a client includes receiving a connection request from the client for controlling the virtual service available at a virtual machine. The request includes a plurality of connection parameters that describe the connection requirements of the client and is received at a virtual machine that is equipped with an image processor algorithm. The connection parameters are interrogated using the image processor algorithm to identify a specific virtual machine that provides the requested virtualized computer service. A framebuffer data for the identified virtual machine located in virtual memory is accessed and read directly through a hypervisor. The framebuffer data is processed into a plurality of image data packets using the image processor algorithm and transmitted to the client for presenting on a display device associated with the client. The image data packet grammar is tailored to the client and represents an image of the virtual machine display for the specific virtual machine.05-26-2011
20110126197SYSTEM AND METHOD FOR CONTROLLING CLOUD AND VIRTUALIZED DATA CENTERS IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method for controlling cloud and virtualized data centers described herein may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads, and further to creating cloud images having embedded management agents and identity services for validating the cloud images prior to deployment into the cloud and virtualized data centers and controlling, monitoring, and auditing activity associated with the cloud images following deployment into the cloud and virtualized data centers.05-26-2011
20110126193System and Method for Imaging and Provisioning of Information Handling System - A method includes emulating an information handling system on a virtual machine, allowing users to create and validate an operating environment on the emulation, creating an image based on the validated environment, and loading the image onto an information handling system. The environment includes an operating system and an application from the virtual machine module, and an application from the user. A disk imaging system includes a virtual machine that emulates an information handling system, and a session manager that establishes a session between an interface and the virtual machine. The virtual machine allows users to create an operating environment including an operating system and an application from the virtual machine and an application from the users, and to validate the environment, captures an image of the environment, and loads the image onto an information handling system.05-26-2011
20090282404Provisioning of Computer Systems Using Virtual Machines - A provisioning server automatically configures a virtual machine (VM) according to user specifications and then deploys the VM on a physical host. The user may either choose from a list of pre-configured, ready-to-deploy VMs, or he may select which hardware, operating system and application(s) he would like the VM to have. The provisioning server then configures the VM accordingly, if the desired configuration is available, or it applies heuristics to configure a VM that best matches the user's request if it isn't. The invention also includes mechanisms for monitoring the status of VMs and hosts, for migrating VMs between hosts, and for creating a network of VMs.11-12-2009
20090288084MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants.11-19-2009
20090288083Method and System for Dynamic Virtual Environment Migration - An incompatibility problem during a virtual environment migration from a first host to a second host can be addressed by changing a configuration of the virtual environment and/or by migrating the virtual environment to a host other than the second host. A migration advisor module is configured to take such action automatically upon detection of the incompatibility problem. Alternatively, the migration advisor module may take such action with assistance and/or input from an operator. The migration advisor module can change the configuration of the virtual environment by removing unnecessary components of the virtual environment and causing the reconfigured virtual environment to be migrated to the second host. Alternatively, the migration advisor module can cause the virtual environment to be migrated to a third host with sufficient physical system resources to meet the requirements of the virtual environment.11-19-2009
20090158275Dynamically Resizing A Virtual Machine Container - Embodiments of the present invention pertain to dynamically resizing a virtual machine container. According to one embodiment, an optimal utilization is determined based on a desired performance for a multi-tiered application and transaction mix information that describes a mix of transactions that result from executing the multi-tiered application. Automatic modification of an amount of a physical resource a virtual machine container is entitled to for executing a particular application component associated with the multi-tiered application is enabled where the amount is automatically modified based on the optimal utilization.06-18-2009
20090300613INPUT/OUTPUT EMULATION SYSTEM FOR VIRTUAL MACHINE - An I/O emulation system for a virtual machine includes a command interpretation portion including a programmable logic device that detects completion of a plurality of device operating instructions, which corresponds to a device operating request for the virtual machine, output from the guest device driver included, a device control portion that converts the plurality of device operating instructions, which is notified by a virtual machine monitor, into an I/O command and a host device driver that outputs a device operating instruction for the actual device in accordance with the I/O command.12-03-2009
20120297384Virtual Managed Network - According to one embodiment of the present disclosure, an approach is provided in which a policy module receives data that is initiated by a first virtual machine and has a destination at a second virtual machine. The policy module selects a policy that corresponds to sending the data from the first virtual machine to the second virtual machine. The policy includes one or more logical references to one or more virtual networks, and does not include a physical reference to a physical entity located on a physical network. In turn, the policy module encapsulates the data with a physical path translation that is based upon the selected policy, and sends the encapsulated data over the physical network to a second policy module that corresponds to the second virtual machine.11-22-2012
20120297380COMBINING PROFILES BASED ON PRIORITIES - Combining profiles based on priorities associated therewith to create an effective profile are provided. A plurality of profiles defining one or more rules that are applicable to a functional computing object are identified. A priority corresponding to each applicable profile is determined. The applicable profiles are combined by the computing device based on the corresponding priorities to create an effective profile that includes no conflicting rules.11-22-2012
20080276235VIRTUAL MACHINE MANAGEMENT USING PROCESSOR STATE INFORMATION - A method, system, and apparatus are provided for virtual machine management. According to one embodiment, processor state information associated with a processor is evaluated, and the processor state information is used to manage one or more virtual machines.11-06-2008
20100162236Using Stored State To Instantiate A Virtual Computer - Methods for instantiating virtual operating systems are presented. A virtual operating system can be aggregated from a pool of services as a function of a virtual operating system state. The state comprises a service, a location of the service, and a starting point from which the service should begin to offer services.06-24-2010
20110010711Reliable movement of virtual machines between widely separated computers - This invention describes an improved method of transferring running VMs between servers that would allow them to move between datacenters, even ones that are halfway across the world from each other.01-13-2011
20110010710Image Transfer Between Processing Devices - Methods and devices are provided for copying an image of a medium of a first processing device to a virtual medium of a second processing device. Virtual machine configuration information may be created based on hardware configuration information from the first processing device. The image and the virtual machine configuration information may be copied, or written, to the virtual medium. Instructions may be provided to the second processing device for launching a virtual machine to execute an operating system copied from the image to the virtual medium. At least one executable application copied from the image to the virtual medium may be executed by the virtual machine launched on the second processing device. In some embodiments, the second processing device may provide remote access to the virtual machine for one or more remote processing devices.01-13-2011
20090119663IOMMU WITH TRANSLATION REQUEST MANAGEMENT AND METHODS FOR MANAGING TRANSLATION REQUESTS - Example embodiments of an IOMMU with translation request management and methods for managing translation requests are generally described herein. Other example embodiments may be described and claimed. In some example embodiments, the IOMMU comprises one or more reorder buffers. Each reorder buffer may be associated with one I/O device and may be used to queue pending translation requests for the associated I/O device. A translation request received from a requesting I/O device may be stored in a reorder buffer associated with the requesting I/O device when the translation request is unable to be serviced or when there are one or more pending translation requests in the reorder buffer.05-07-2009
20120297381SYSTEM FOR A MULTI-TENANT STORAGE ARRAY VIA DOMAINS HOSTED ON A VIRTUAL MACHINE - A system for managing a storage array having a set of storage components comprises a storage array controller, the storage array controller including: a first instance of a controller firmware on a virtual machine in a privileged domain, the privileged domain having access to hardware of the storage array; and a second instance of the controller firmware on a separate virtual machine in a first non-privileged array domain. The privileged domain is configured to inspect an I/O request and determine whether a target of the I/O request is an existing non-privileged array domain, to initiate launch of the first non-privileged array domain array when the I/O request does not relate to an existing non-privileged array domain, and to present available storage components to the first non-privileged array domain when the I/O request relates to the first non-privileged array domain.11-22-2012
20090007104PARTITIONED SCHEME FOR TRUSTED PLATFORM MODULE SUPPORT - The subject mater herein relates to processing of sensitive data and, more particularly, to a partitioned scheme for trusted platform module support. Various embodiments provide systems, methods, and software that instantiate one or more emulated trusted platform modules in respective sequestered processor cores. In some embodiments, a trusted platform module in instantiated in a processor core, sequestered for the trusted platform module, for each operating system or virtual machine operating on a computing device. The operating system may then communicate with the appropriate trusted platform module over a secure communication channel, such as an interpartition bridge.01-01-2009
20090007102Dynamically Computing Reputation Scores for Objects - Tools and techniques for dynamically computing reputation scores for objects are described herein. The tools may provide machine-readable storage media containing machine-readable instructions for receiving requests to dynamically compute reputation scores for the objects, for instantiating protected virtual environments in which to execute the objects, and for computing the reputation score based on how the object behaves when executing within the virtual environment.01-01-2009
20090007099MIGRATING A VIRTUAL MACHINE COUPLED TO A PHYSICAL DEVICE - A virtual machine with a directly assigned network device and supported on a host may be migrated to other host without loss of network connectivity. Such migration is enabled by bonding a physical network interface driver (NIC) and a virtual NIC driver of the host. A virtual machine monitor of the host may determine whether the virtual machine is to be migrated to the other host. The virtual machine monitor may allow hot-plug removal of the network device. However, the virtual machine may still maintain network connectivity through the virtual NIC. The virtual machine may be migrated to the other host. After migration, the virtual machine may continue to maintain the network connectivity either through the virtual NIC driver or bond with a physical NIC driver of the network device coupled to the other host.01-01-2009
20100146503SCHEDULER OF VIRTUAL MACHINE MODULE, SCHEDULING METHOD THEREFOR, AND DEVICE CONTAINING COMPUTER SOFTWARE - A scheduler of a virtual machine (VM) module, a scheduling method thereof, and a device containing computer software are provided. The scheduler has a classification module and a scheduling module. The classification module receives at least one VM module and analyzes a resource proportion parameter to generate classification result information. The scheduling module has a first schedule queue and a second schedule queue, sort an immediately resource-required VM module to the first schedule queue and a non immediately resource-required VM module to the second schedule queue, and determine whether the VM module of the first schedule queue exists or not, and if yes, it outputs the VM module of the first schedule queue to a processor; otherwise, outputs the VM module of the second schedule queue to the processor.06-10-2010
20100146501METHOD AND APPARATUS FOR THE SECURE PROCESSING OF CONFIDENTIAL CONTENT WITHIN A VIRTUAL MACHINE OF A PROCESSOR - A secure virtual machine system, method, and computer program product implemented on a processor are provided for processing a third party's content for output. At least one processor is provided. Additionally, at least one secure virtual machine implemented on the processor is provided for interpreting a second party's program that processes and outputs a third party's content. The virtual machine system abstracts the underlying processor hardware allowing implementation variations across products to execute the same program identically. Furthermore, the scope of the programmable operations, the types of input & output variables, and execution of programs within the processor, is deliberately constrained within the virtual machine environment, in order to mitigate potential security leaks by programs, and to ensure confidentiality of second party's secrets, and third party's content as managed by the second party's program.06-10-2010
20100138832APPARATUS AND METHOD FOR PROVIDING SERVICES USING A VIRTUAL OPERATING SYSTEM - Provided are an apparatus and method for providing services using a virtual operating system (OS). The apparatus classifies virtual resources into a plurality of mutually exclusive regions and manages the virtual resources based on the provides services regions. The plurality of provides services regions include a virtual region whose resources are stored in and used on an external storage, and an overlay region whose resources refer to host resources. The apparatus uses the region information for virtual resources and a list of resources accessed for each application process to manage the virtual resources.06-03-2010
20100138831VIRTUAL MACHINE SYSTEM, HYPERVISOR IN VIRTUAL MACHINE SYSTEM, AND SCHEDULING METHOD IN VIRTUAL MACHINE SYSTEM - Attempts are made to reduce the system overhead generated at the time of context save/restore processing to perform process switching in a virtual machine system. In a CPU occupancy mode that a physical CPU is exclusively allocated to virtual machines, a logical CPU process running on the physical CPU is static, so that it is not necessary to save/restore the context every time the processes are switched. When a switching source process is a logical CPU process in a CPU occupancy mode, a context save is temporarily suspended. When switching to the same logical CPU process is made again continuously, save/restore is skipped. When the logical CPU process of a VMM control VM runs in that period, the logical CPU process whose save is delayed is recorded and saved late.06-03-2010
20100138829Systems and Methods for Optimizing Configuration of a Virtual Machine Running At Least One Process - A system for optimizing configuration of a virtual machine running at least one process includes at least one virtual resource in a virtual machine executing on a computing device, an agent executing within the virtual machine, and a hypervisor. The at least one virtual resource has a configuration parameter. The agent identifies a name of at least one process currently executing on the virtual machine. The hypervisor alters, in response to receiving the identified name from the agent, a value of the configuration parameter.06-03-2010
20100138828Systems and Methods for Facilitating Virtualization of a Heterogeneous Processor Pool - A system for facilitating virtualization of a heterogeneous processor pool includes a processor allocation component and a hypervisor, each executing on a host computer. The processor allocation component identifies a plurality of physical processors available for computing and determines a set of flags, each of the set of flags identifying a type of functionality provided by each of a subset of the plurality of physical processors. The hypervisor, in communication with the processor allocation component, allocates, to at least one virtual machine, access to one of the subset of the plurality of physical processors.06-03-2010
20110271277METHOD AND APPARATUS FOR A VIRTUAL SYSTEM ON CHIP - A virtual system on chip (VSoC) is an implementation of a machine that allows for sharing of underlying physical machine resources between different virtual systems. A method or corresponding apparatus of the present invention relates to a device that includes a plurality of virtual systems on chip and a configuring unit. The configuring unit is arranged to configure resources on the device for the plurality of virtual systems on chip as a function of an identification tag assigned to each virtual system on chip.11-03-2011
20110271276AUTOMATED TUNING IN A VIRTUAL MACHINE COMPUTING ENVIRONMENT - Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine.11-03-2011
20080244571VIRTUAL INTERRUPT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses, methods, and systems for processing virtual interrupts in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes virtual machine entry logic, recognition logic, and evaluation logic. The virtual machine entry logic is to transfer control of the apparatus from a host to a guest. The recognition logic is to recognize a virtual interrupt request. The evaluation logic is to determine whether to transfer control from the guest to an intervening monitor in response to the virtual interrupt request.10-02-2008
20080244569System and Method for Reporting the Trusted State of a Virtual Machine - A system, method, and program product is provided that executes a start sequence of an information handling system that includes a hardware based TPM. Multiple PCRs are stored in the TPM and are initialized to a predetermined state when the start sequence commences. During execution of the start sequence, software modules, including a hypervisor, are loaded the system's memory. PCR values resulting from the loading of the software modules are calculated. The resulting PCR values are compared with expected PCR values. If the PCR values match the expected PCR values, then a virtual environment is created under the hypervisor. The virtual environment includes a VM and a virtual trust platform module (vTPM) that is used by the virtual machine to satisfy the virtual machines TPM requests.10-02-2008
20080244576SYSTEM AND METHOD FOR MANAGING RESOURCES OF APPLICATIONS AND THREADS PERFORMED ON JAVA VIRTUAL MACHINE - A method of managing resources related to a Java Virtual Machine (JVM) and an application executed in the JVM is provided. The method includes defining a resource identifier uniquely identifying an arbitrary resource to be; generating a resource consumer for each thread, wherein the resource consumer uses a resource; generating at least one resource manager per resource identifier, wherein the resource manager manages a resource, and storing the at least one resource manager in a resource manager registry; calculating a quantity of resource usage by resource managers generated for all applications and threads in the applications, and storing the calculated quantity of resource usage, wherein the calculating and storing of the quantity are performed by each of the resource managers; and informing about the quantity of resource usage.10-02-2008
20080244575Tessellated virtual machines conditionally linked for common computing goals - In a computing environment, an association and layout of virtual machines exist as a system of multiple applications instantiated for a common computing goal, such as providing a data center with an email system for an enterprise. In that every application need not always be operational or have applicability in every scenario, applications are only instantiated upon actionable requests for various services. Representatively, a communication channel is initialized between at least two applications, but instantiation of one of the applications is delayed until an actionable request between the applications occurs. In this manner, policy or governance can be enforced and/or computing resources can be conserved. Various features relate to defined incoming and outgoing connectors of virtual machines of the applications and their functional interaction to satisfy initial connectivity issues and to later instantiate needed applications. Libraries, software program products, and policy management are other features, to name a few.10-02-2008
20080244574Dynamically relocating devices between virtual machines - A virtual machine monitor may reassign hardware bus devices from one virtual machine to another. The virtual machine monitor may turn a device off, reassign it to a different virtual machine, and then turn the device back on. Device interrupts are remapped from the source virtual machine to the target virtual machine.10-02-2008
20080244572METHOD AND APPARATUS FOR ADAPTIVE INTEGRITY MEASUREMENT OF COMPUTER SOFTWARE - Systems and methods are described herein that discuss how a computing platform executing a virtualized environment, in one example, can be integrity verified adaptively and on demand. This may occur at initial runtime, as well as during continued operations, and allows the platform user to install software from various vendors without sacrificing the integrity measurement and therefore the trustworthiness of the platform.10-02-2008
20080244570FACILITATING COMMUNICATION WITHIN AN EMULATED PROCESSING ENVIRONMENT - Communication between processors and I/O communications processes is facilitated. During the communication, shared control blocks and input/output queues are updated without using locks. Instead, a lockless capability is provided to update the queues and control blocks, thereby enhancing system performance and minimizing the need for recovery processes.10-02-2008
20080250406Virtual Machine Support for Metered Computer Usage - A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring 10-09-2008
20110209146METHODS AND APPARATUS FOR MOVEMENT OF VIRTUAL RESOURCES WITHIN A DATA CENTER ENVIRONMENT - In one embodiment, an apparatus can include a monitoring module configured to send an indicator representing that performance of a virtual resource satisfies a threshold condition. The apparatus can also include a management module configured to move a set of virtual resources including the virtual resource from a first portion of data center hardware resources to a second portion of data center hardware resources mutually exclusive from the first portion of data center hardware resources in response to the indicator. The management module can be configured to define the set of virtual resources based on an operational relationship between the virtual resource and the remaining virtual resources included in the set of virtual resources.08-25-2011
20090265709METHOD AND APPARATUS FOR FACILITATING RECOGNITION OF AN OPEN EVENT WINDOW DURING OPERATION OF GUEST SOFTWARE IN A VIRTUAL MACHINE ENVIRONMENT - In one embodiment, a method includes transitioning control to a virtual machine (VM) upon receiving a request from a virtual machine monitor (VMM), determining that the request to transition control is associated with a request to be informed of an open event window, performing an event window check to determine whether an even window of the VM is open, and transitioning control to the VMM if the event window check indicates that the event window of the VM is open.10-22-2009
20090265708Information Processing Apparatus and Method of Controlling Information Processing Apparatus - According to one embodiment, an information processing apparatus in which virtual machine run under a hypervisor, includes a device manager configured to create a device model including information that is used when assigning an I/O device to the virtual machine in accordance with a device profile and an arrangement of I/O devices, and an address conversion circuit configured to perform address conversion for the virtual machine to make an MMIO access to the assigned I/O device and to perform address conversion to conduct a DMA transfer between the assigned I/O device and the virtual machine, wherein the hypervisor assigns the I/O device to the virtual machine based on the device model, and the virtual machine utilizes, when making the MMIO access to the assigned I/O device or conducting the DMA transfer with the assigned I/O device, the address conversion circuit to make the access or conducts the DMA transfer.10-22-2009
20090265706COMPUTING MACHINE MIGRATION - Systems and methods for migration between computing machines are disclosed. The source and target machines can be either physical or virtual; the source can also be a machine image. The target machine is connected to a snapshot or image of the source machine file system, and a redo-log file is created on the file system associated with the target machine. The target machine begins operation by reading data directly from the snapshot or image of the source machine file system. Thereafter, all writes are made to the redo-log file, and subsequent reads are made from the redo-log file if it contains data for the requested sector or from the snapshot or image if it does not. The source machine continues to be able to run separately and simultaneously after the target machine begins operation.10-22-2009
20080282243Management of Computer Systems by Using a Hierarchy of Autonomic Management Elements - A method and system for managing a computing system by using a hierarchy of autonomic management elements are described. The autonomic management elements operate in a master-slave mode and negotiate a division of management responsibilities regarding various components of the computing system.11-13-2008
20080288942Monitoring performance of a logically-partitioned computer - An apparatus, system, and storage medium that in an embodiment collect a performance metric of a first partition in a logically-partitioned computer. If the difference between the performance metric and an expected performance metric exceeds a threshold, then a job or another partition is shut down or suspended. The expected performance metric is calculated based on the performance that is expected if the first partition is the only partition.11-20-2008
20080288940Dynamic Selection and Application of Multiple Virtualization Techniques - Autonomous selection between multiple virtualization techniques implemented in a virtualization layer of a virtualized computer system. The virtual machine monitor implements multiple virtualization support subsystems that each provide for the comprehensive handling of potential virtualization exceptions. A virtual machine monitor resident performance monitor computes relative virtualization overhead costs that are and would be incurred in using different virtualization support subsystems for virtualization exceptions that occur in executing a guest operating system within a defined interval. Dependent on the relative virtualization overhead costs determined, the virtual machine monitor resident virtualization selection control switches the virtual machine monitor to use the optimal virtualization support subsystem for handling virtualization exceptions that occur over a second defined interval.11-20-2008
200903280373D GRAPHICS ACCELERATION IN REMOTE MULTI-USER ENVIRONMENT - Systems and methods for providing graphics acceleration to one or more terminal systems are disclosed. In one embodiment, a virtual machine session is created and one or more cores of a graphics accelerator with a plurality of cores is assigned to a virtual machine session in order to render a virtual desktop for display at a terminal system.12-31-2009
20090328035Lazy Handling of End of Interrupt Messages in a Virtualized Environment - Techniques enable reducing a number of intercepts performed by a hypervisor by reducing a number of End Of Interrupt (EOI) messages sent from a virtual central processing unit (CPU) to a virtual advanced programmable interrupt controller (APIC). The EOI path of the guest operating system running on the virtual CPU is altered to leave a marker indicating that the EOI has occurred. At some later time the hypervisor inspects the marker and lazily updates the virtual APIC state.12-31-2009
20090328034ESTABLISHING A BI-DIRECTIONAL GRID COMPUTING NETWORK - A method of establishing a bi-directional grid computing network includes submitting a processing job from a job requester to a central repository, querying nodes associated with the job requester to process the processing job, identifying suitable nodes associated with the job requester to process the processing job, transmitting the processing job from the job requester to at least one of the suitable nodes associated with the job requester, processing the processing job on the at least one suitable node associated with the job requester, and returning results from processing the processing job to the job requester.12-31-2009
20100218184Information processing device, method, and computer program product - A setting storage unit stores first setting information that defines an operation of a first application that runs on a guest OS and second setting information that defines an operation of a second application that runs on at least one of another guest OS and a host OS. A correspondence storage unit stores first identification information for identifying the first setting information and second identification information for identifying the second setting information, in association with each other. An alternative access gaining unit reads from the correspondence storage unit the second identification information corresponding to the first identification information of the first setting information for which an access request is received, and accesses the second setting information of the second identification information that is read out, in place of the first setting information for which the access request is received.08-26-2010
20090019437Application management and execution system and method thereof - The invention discloses an application management and execution system and a method thereof. The application management and execution system comprises a virtual machine monitor for managing at least one virtual machine; the at least one virtual machine for processing at least one application, and storing, separately and respectively, application data used by each application and platform data required by the virtual machine for processing the application in one or more storage disk (persistent storage), and reading the application data and the platform data from the one or more storage devices respectively. The at least one application executing on the virtual machine may share the platform data in the one or more storage devices. When the virtual machine executes the at least one application, it may modify the application data in the storage devices.01-15-2009
20080271015VIRTUAL MACHINE CONTROL - A method comprises receiving a request for data from a client computer. The method further comprises obtaining an identifier of a virtual machine. The virtual machine identifier is associated with the requested data. The method further comprises providing the virtual machine identifier to the client computer.10-30-2008
20080250407Network group name for virtual machines - Virtual machine (VM) management using a group name. By associating VM registration information with a group name, all VMs running off a single physical machine image can be managed (e.g., blocked or unblocked) simultaneously. A service component captures registration information (e.g., IP address-VM name pair) between a virtual machine and a name server. The IP address-VM name pair is recorded (or stored) in the name server database. Based on the VM pair, a record component generates a group name, and stores the VM pair in association with the group name in the name server database. Blocking of the group name then blocks all VMs associated with the group name. Moreover, queries against the group name will then expose all operational VMs for that host. Updates to the group name record can be made based on registration and deregistration of VMs for a given host machine.10-09-2008
20080244577SOFTWARE DELIVERY FOR VIRTUAL MACHINES - One embodiment entails delivering a software payload to guest software in a virtual machine so that the software payload is part of a file system accessible by the guest software, wherein delivery avoids a data path involving a network stack of the virtual machine.10-02-2008
20080271019System and Method for Creating a Virtual Assurance System - An assurance system for creating and evaluating a virtual application environment that emulates and evaluates a target system. Information such as network configuration, interface information, and software packages or subsystems are imported into the virtual application environment. The assurance system may be used for purposes of testing, and delivering comprehensive reports of the likely results on the target system based on results from the virtual application environment, including such things as configuration changes to the environment, environment load and stress conditions, environment security, software installation to the environment, and environment performance levels among other things.10-30-2008
20080271020System and method for working in a virtualized computing environment through secure access - A personalized virtual computing system includes a plurality of client personal computers (PCs), each comprising at least a web browser and a communications client, a plurality of virtual machine hosts each comprising a communications server for communicating with the client PCs via said communications client, a web server comprising a client-customized web site, a directory database including identification information of authorized users and a database including a reservation table.10-30-2008
20080271018System and Method for Managing an Assurance System - An assurance system for creating and evaluating a plurality of virtual application environments that emulate and evaluate a plurality of target systems. Information such as network configuration, interface information, and software packages or subsystems are imported into the virtual application environments. The assurance system may be used for purposes of testing, and delivering comprehensive reports of the likely results on the target systems based on results from the virtual application environments, including such things as configuration changes to the environments, environment load and stress conditions, environment security, software installation to the environments, and performance levels of the environments among other things.10-30-2008
20080271017Managing Virtual Machines Using Shared Image - A method for managing a computing system comprises identifying read-only portions of a file system, sharing the read-only portions of the file system among a plurality of virtual machines, and managing the shared read-only portions of the file system as a single unit.10-30-2008
20080271016HYPERVISOR WITH CLONING-AWARENESS NOTIFICATIONS - A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining.10-30-2008
20100146505Multi-monitor, multi-JVM Java GUI infrastructure with layout via XML - A method and system are provided which allows enhanced support to graphical user interface (GUI) displays on multiple monitors. An extended markup language file provides code to configure each GUI. GUI software need not be re-compiled in order to implement changes in the layout of displays or to accommodate additional monitors. Potential display event handling delays are minimized by providing multiple Java Virtual Machines (JVMs) for GUIs. In one aspect, one JVM is provided for each GUI.06-10-2010
20100146504VIRTUAL MOBILE INFRASTRUCTURE AND ITS BASE PLATFORM - The invention published here covers a virtual mobile infrastructure (VMI) and its base platform. The base platform comprises several hosts. On a host OS, a QEMU process is used to virtualize at least one guest cell phone operating system. A data center manages these cell phone OSes generated by this base platform, allocates the OSes to users, and allows communication between cell phone client and server via mobile terminal protocol similar to RDP. A virtual machine (VM) switch contains a method to use the VMI of this published invention, and to acquire adapted cell phone screen and inexpensive cell phone VM. In one embodiment, a VMI product is able to encapsulate the third-party VDI products (such as Citrix XenDesktop, LeoStream, etc.), henceforth to acquire screens from PC VM as well. Moreover, a VM manager allows administrators of enterprises or telcos to manage thousands of VMs.06-10-2010
20130191830Managing Shared Data using a Virtual Machine - Embodiments disclosed herein relate to managing shared data using a virtual machine. A virtual machine 07-25-2013
20100138830MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants.06-03-2010
20100138827HASHING STORAGE IMAGES OF A VIRTUAL MACHINE - Virtual machine images are transferred from a source storage location to a target storage location over a network. In one embodiment, a host at the source storage location computes signature values of a plurality of disk blocks that contain a plurality of virtual machine images. Each computed signature value corresponds to one of the disk blocks. A subset of the disk blocks, all of which have different signature values, is then transferred from the source storage location to the target storage location. Only one copy of duplicate disk blocks is transferred.06-03-2010
20100146507SYSTEM AND METHOD OF DELIVERY OF VIRTUAL MACHINE USING CONTEXT INFORMATION - There is provided a system of delivery of a virtual machine using context information. The system of delivery of a virtual machine includes: a context information manager that receives one or more user context information from a user terminal device; and a virtual machine generator that generates a virtual machine suitable for the user terminal device in accordance with the one ore more received user context information and outputs the generated virtual machine to the user terminal device.06-10-2010
20100146506SYSTEM AND METHOD FOR OFFERING SYSTEM ON DEMAND (SoD) VIRTUAL-MACHINE - There are provided a system for offering a SoD virtual-machine includes a main server that includes: a server communication unit that transmits and receives data to and from a plurality of peripheral devices and a plurality of user terminals; a peripheral device detection unit that detects one or more peripheral devices among peripheral devices around the user terminal on the basis of user information received from the user terminal connected through the server communication unit and peripheral device information around the user terminal; and a server control unit that sets one or more peripheral devices detected by the peripheral device detection unit as IO devices of a virtual machine allocated to the connected user terminal.06-10-2010
20100146502PLATFORM DEPENDENT REPLACEMENT OF DIGITAL CONTENT ASSET COMPONENTS - Systems and methods provide an operation of digital content assemblages such as video games with a digital processor so as to control platform dependent replacement of digital asset components. In an example embodiment, a video game package is operated on a first platform. The video game includes one or more first digital asset components such musical and/or graphical works. Platform association data is accessed to evaluate an association between the first digital asset component and the first platform. The platform association data is checked for a concurrence between the platform association data and platform data. A second digital asset component is substituted for the first digital asset component in accordance with the check of the platform association data to permit the operating of the digital content assemblage with the second digital asset component as a replacement for the first digital asset component.06-10-2010
20110209145SYSTEM AND METHOD FOR MANAGING A VIRTUAL MACHINE ENVIRONMENT - A system and method for providing an abstraction of the VM environment for management and control of one or more VMs without being tied to a particular hardware platform or construct.08-25-2011
20090031304Method and device for scheduling true CPU resources for a virtual machine system - A method and a device for scheduling true CPU resources for a virtual machine system are disclosed. In one aspect a virtual machine monitor (VMM) acquires information about loads on virtual CPUs (VCPUs), and the VMM assigns the true CPU resources based on the information about the loads on the VCPUs in such a manner that more true CPU resources are assigned to a VCPU with a higher load. With the method and device according to certain embodiments, it is possible to assign the true CPU resources based on the information about the loads on the VCPUs in such a manner that more true CPU resources are assigned to a VCPU with a higher load. Further, certain embodiments are implemented directly by the VMM irrespective of types of upper-level GOSs, and thus is versatile.01-29-2009
20120198451PREPROVISIONING VIRTUAL MACHINES - According to one aspect of the present disclosure, a method and technique for preprovisioning virtual machines is disclosed. The method includes analyzing requests for a plurality of different virtual machine (VM) configurations where each VM configuration has a plurality of configuration attributes. The method also includes determining a request frequency corresponding to each requested VM configuration, determining a configuration of each provisioned VM, and responsive to determining the configuration of each provisioned VM, determining a configuration for a preprovisioned VM based on a request frequency of the different VM configurations and the configurations of the provisioned VMs. The method further includes creating the preprovisioned VM.08-02-2012
20120198449Saving Unsaved User Process Data In One Or More Logical Partitions Of A Computing System - Methods, systems, and products are disclosed for saving unsaved user process data in one or more logical partitions (‘LPARs’) of a computing system, the computing system having installed upon it a hypervisor for administering the LPARs, each LPAR supporting an operating system, each operating system supporting one or more user processes, that include: detecting, by the hypervisor, a predefined event that the hypervisor interprets as an indication that unsaved data of user processes for at least one LPAR should be saved; transmitting, by the hypervisor in response to detecting the predefined event, a save instruction to the operating system supported by the LPAR; and instructing, by the operating system in response to receiving the save instruction, each user process supported by the operating system to save any unsaved data.08-02-2012
20120198441Bypass Mechanism for Virtual Computing Infrastructures - In accordance with one embodiment of the present disclosure, a system includes one or more computer systems including a memory, one or more processors, and a bypass switch with an open position and a closed position. The one or more computer systems further include computer-executable program code. The computer-executable program code includes one or more virtual machines modules including computer-executable instructions configured, when executed, to cause the one or more processors to implement one or more virtual machines that host one or more guest operating systems and one or more applications. The computer-executable program code further includes a virtual bypass switch module including computer-executable instructions configured, when executed, to cause the one or more processors to, responsive to the availability of the one or more applications, forward packets received on the first physical network interface to at least one of the one or more virtual machines.08-02-2012
20120198444PLAYING TELEVISION PROGRAM IN VIRTUAL ENVIRONMENT - In a virtual environment, a virtual machine (VM) host includes a host screen and a first host window displayed in the host screen. AVM guest is instantiated on the VM host. The VM guest includes a guest screen that is presented in the first host window. The VM launches a television player application and instructs the television player application to play a television program in the guest screen. The VM host registers a content server with a content receiver via a network. The content receiver receives one or more content items from the content server. The VM host creates a second host window displayed in the host screen and display the one or more content items in the second host window.08-02-2012
20120198452CONTROLLING DEPTH AND LATENCY OF EXIT OF A VIRTUAL PROCESSOR'S IDLE STATE IN A POWER MANAGEMENT ENVIRONMENT - A mechanism is provided in a logically partitioned data processing system for controlling depth and latency of exit of a virtual processor's idle state. A virtualization layer generates a cede latency setting information (CLSI) data. Responsive to booting a logical partition, the virtualization layer communicates the CLSI data to an operating system (OS) of the logical partition. The OS determines, based on the CLSI data, a particular idle state of a virtual processor under a control of the OS. Responsive to the OS calling the virtualization layer, the OS communicates the particular idle state of the virtual processor to the virtualization layer for assigning the particular idle state and wake-up characteristics to the virtual processor.08-02-2012
20120198450Method to Dynamically Provision Additional Computer Resources to Handle Peak Database Workloads - A method to handle peak database workloads may include requesting resources, receiving virtual-machine information in response to the requesting, allocating first and second portions of a workload according to the virtual-machine information, processing the first portion on a virtual machine to generate a first result, creating a cloned virtual machine with a virtualization layer, and cloning with the virtualization layer a storage allocated to the virtual machine to create a cloned storage.08-02-2012
20120198447DETERMINING AN ALLOCATION CONFIGURATION FOR ALLOCATING VIRTUAL MACHINES TO PHYSICAL MACHINES - An information processing apparatus having a prediction section that determines the predicted peak usage amount of physical resources for each time interval for individual clusters each including a plurality of virtual machines having the same function; a setting section sets a constraint that ensures that, for individual combinations of a first physical machine, a second physical machine, and a time interval, the total predicted peak usage amount of a physical resource predicted for the first physical machine if the second physical machine stops during the time interval does not exceed a physical resource amount prepared for the first physical machine; and an allocation-configuration deriving section derives an allocation configuration by calculating, in accordance with the constraint, a solution to an optimization problem for minimizing, as an objective function, the sum total of the physical resource amounts of all of physical machines to which the virtual machines are allocated.08-02-2012
20110209148INFORMATION PROCESSING DEVICE, VIRTUAL MACHINE CONNECTION METHOD, PROGRAM, AND RECORDING MEDIUM - An information processing device includes: a first connection method for logically connecting the first communication unit and the virtual machine to each other, an address notification method for giving notice of first address information indicating a transmission destination of data to be transmitted by the external device and causing the external device to set the first address information, when a connection is established on the basis of the first connection method, a first determination method for determining whether there is an abnormal connection between the first communication unit and the virtual machine, a second connection method for logically connecting the second communication unit and the virtual machine to each other when the first determination method determines that there is an abnormal connection, and a switching method for giving notice of second address information.08-25-2011
20110209147METHODS AND APPARATUS RELATED TO MANAGEMENT OF UNIT-BASED VIRTUAL RESOURCES WITHIN A DATA CENTER ENVIRONMENT - In one embodiment, a processor-readable medium can be configured to store code representing instructions to be executed by a processor. The code can include code to receive a request to change a value representing a number of data center units included in a set of data center units assigned to a user. Each of the data center units from the set of data center units can be associated with hardware resources managed based on a set of predefined hardware resource limit values. The code can include code to determine, in response to the request, whether hardware resources of a data center unit mutually exclusive from hardware resources of the set of data center units and managed based on the set of predefined resource limit values is available for assignment to the user when the request to change is an increase request.08-25-2011
20090183152Method to Dynamically Provision Additional Computer Resources to Handle Peak Database Workloads - A method to handle peak database workloads is disclosed. In one form of the disclosure, the method can include requesting resources, receiving virtual-machine information in response to requesting, and allocating first and second portions of a workload according to the virtual-machine information. The method can also include processing the first portion on a virtual machine to generate a first result, processing the second portion on a cloned virtual machine to generate a second result, and aggregating the first and the second results to form a response.07-16-2009
20090164990Apparatus for and Method for Real-Time Optimization of virtual Machine Input/Output Performance - The present invention implements a mechanism to decide when it is beneficial to switch from the current virtual input/output mechanism to a different one. The present invention determines which input/output mechanism each virtual machine should use based on the available input/output resources of the virtual machines (with their respective available input/output adapters), the number of virtual machines running and their input/output needs, and the input/output needs of the virtual machine being considered. The present invention also provides a mechanism for virtual machine to seamlessly switch input/output mechanisms. When beneficial, the standard hot-plug mechanism of the virtual machine and the hypervisor is used to first remove the existing input/output mechanism and then add the new input/output mechanism.06-25-2009
20090083735HIGH AVAILABILITY SYSTEM AND EXECUTION STATE CONTROL METHOD - A high availability system includes a first computer on which a first virtual computer and a first hypervisor managing the first virtual computer operate, and a second computer on which a second virtual computer and a second hypervisor managing the second virtual computer operate. The first hypervisor includes an acquisition unit which acquires synchronization information associated with an event, wherein the event has occurred in the first virtual computer and accompanies an input to the first virtual computer, and a transmission unit which transmits the acquired synchronization information to the second hypervisor. The second hypervisor includes a reception unit which receives the synchronization information from the first hypervisor, and a control unit which performs control to match an input to the second virtual computer with an input to the first virtual computer in accordance with the received synchronization information.03-26-2009
20090125902ON-DEMAND DISPOSABLE VIRTUAL WORK SYSTEM - An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes.05-14-2009
20120272241COMPUTER SYSTEM AND VIRTUAL MACHINE CONTROL METHOD - Provided is a computer system capable of linking and integrally operating a plurality of virtual machines. In this regard, a memory management mechanism capable of securing a shared memory secured, before the activation of the virtual machines, in a physical address that can be designated and capable of securing local memories corresponding to the number of the virtual machines is realized. In relation to a virtual system realized by a cooperation process by the plurality of virtual machines using part of physical hardware, a fixed area, in which the physical address and the size are determined at the activation of a hypervisor, and a dynamic allocation area, which is managed by the hypervisor, allocated from a memory pool that is shared by virtual machines that execute other functions, and in which the physical address and the size are determined at the activation of the virtual machines, are allocated to the virtual machines constituting the virtual machine group.10-25-2012
20090164994VIRTUAL COMPUTING MANAGEMENT SYSTEMS AND METHODS - Embodiments deliver an operating system and software applications to a personal computer. The operating system and software applications may be managed and configured at a central location prior to delivery. Data that is created or modified on the personal computer may, from time to time, be stored at the central location. When a user switches from one personal computer to another, any and all of the data may be transferred from the central location to the user's current computer. Additionally, the user's current computer may receive suitable versions of the operating system and applications from the central location. In any case, the operating system and software applications may run with a domain of execution that is provided by a hypervisor. Thus, the operating system and software applications may operate within a virtualized machine, perhaps alongside and in isolation from other operating systems and software applications.06-25-2009
20090164993Look ahead of links/alter links - A computationally-implemented method comprises obtaining at least a portion of data from a data source, determining a content of the data, determining an acceptability of an effect of content of the data at least in part via at least two virtual machine representations of at least a part of a real machine having at least one end-user specified preference, at least one of the at least two virtual machine representations operating at least in part on an individual core of a multi-core system, and displaying at least one data display option based on the determining an acceptability of a content of the data.06-25-2009
20090164991COMPUTER VIRTUALIZATION APPARATUS AND PROGRAM AND METHOD THEREFOR - A hypervisor prepares a guest RID-physical RID mapping table for dynamically registering and managing items and performs RID conversion using the guest RID-physical RID mapping table. When the mapping table is used, since it is unnecessary to provide a specific information area representing LPARs corresponding to respective guests in an RID to be converted, there is no limitation concerning the number of LPARs and a problem in operation can be eliminated.06-25-2009
20120272240Virtual Disk Storage Techniques - This document describes techniques for effecting a virtual disk. In an exemplary configuration, a virtual disk file can be associated with a log that acts as both a log and a check point record. When a log entry is generated, information that identifies the tail can be stored therein. This information can be used in the event that virtual disk file is improperly closed, i.e., a crash or power failure occurs, to discover a sequence of log entries to replay. In addition to the foregoing, other techniques are described in the claims, detailed description, and figures.10-25-2012
20090144732COMPUTER AND METHOD FOR CONTROLLING WHETHER OR NOT TO RELEASE ALL REAL STORAGE AREAS ASSIGNED TO VIRTUAL VOLUME - The management server performs a release/non-release selection determining whether or not to release all of the real storage areas assigned to a virtual volume switched from a used target to an unused target. The management server exercises control to determine whether or not to release all of the real storage areas assigned to the specified virtual volume in accordance with the result of the release/non-release selection.06-04-2009
20090187903VIRTUAL MULTIPROCESSOR SYSTEM - A virtual multiprocessor system which does not require a memory apparatus for debugging includes: a physical processor, storage units for storing status information indicating respective statuses of logic processors, a dispatch unit which assigns one of the logic processors by switching the logic processors with respect to a physical processor, and an interrupt unit which suspends the processing currently executed by a current logic processor among the logic processors by issuing a debug interrupt request to the current logic processor; in the virtual multiprocessor system, the dispatch unit stores status information corresponding to the current logic processor into one of the storage units in response to the debug interrupt request issued to the current logic processor that is assigned to the physical processor.07-23-2009
20120072910METHODS AND SYSTEMS FOR MANAGING A VIRTUAL DATA CENTER WITH EMBEDDED ROLES BASED ACCESS CONTROL - Embodiments provide techniques for customers to easily, quickly and remotely manage their virtual data centers. Using, for example, a “single pane of glass” GUI view which shows all of the components (including e.g., machines (cpu and RAM), network services (load balancers, firewalls, network address translation, IP management) and storage) of their virtual data centers, provides a complete overview and a starting point for system or component management. According to embodiments, a Roles Based Access Control (RBAC) system is provided which simulates the organizational structure and workflow of a typical IT department to enable workflow management via the GUI for any component or function of a customer's virtual data center.03-22-2012
20090007111LOGGING AND REPLAYING INPUT/OUTPUT EVENTS FOR A VIRTUAL MACHINE - Methods for logging and replaying input/output (I/O) events for a virtual machine (VM). The I/O events may be asynchronous or synchronous. In particular, one embodiment is a computer-implemented method for logging input/output (I/O) events for a virtual machine, the method including: executing the virtual machine from a checkpoint; and logging external events, including I/O events; wherein logging an I/O event comprises logging the event, and then, logging I/O data relating to the I/O event.01-01-2009
20100005464EFFICIENT RECORDING AND REPLAYING OF NON-DETERMINISTIC INSTRUCTIONS IN A VIRTUAL MACHINE AND CPU THEREFOR - The output of a non-deterministic instruction is handled during record and replay in a virtual machine. An output of a non-deterministic instruction is stored to a buffer during record mode and retrieved from a buffer during replay mode without exiting to the hypervisor. At least part of the contents of the buffer can be stored to a log when the buffer is full during record mode, and the buffer can be replenished from a log when the buffer is empty during replay mode.01-07-2010
20090178039Segmented virtual machine transport mechanism - Providing data to an application running on a segmented virtual machine (VM) is disclosed. Providing data includes opening an interface between the segmented VM and an external data source, transferring data from the external data source to an interface buffer, transferring a first selected amount of data from the interface buffer to a shell VM buffer, transferring a second selected amount of data from the shell VM buffer to a core VM buffer, and providing portions of the data from the core VM buffer to the application in response to read requests from the application.07-09-2009
20120198453VIRTUALIZATION OF STORAGE BUFFERS USED BY ASYNCHRONOUS PROCESSES - The amount of host real storage provided to a large guest storage buffer is controlled. This control is transparent to the guest that owns the buffer and is executing an asynchronous process to update the buffer. The control uses one or more indicators to determine when additional host real storage is to be provided.08-02-2012
20120198443STORAGE RECLAMATION SYSTEMS AND METHODS - Efficient and effective storage reclamation systems and methods are presented. In one embodiment, a storage reclamation method comprises: receiving an indication from a virtual machine that a reclamation opportunity for reclamation of a physical storage resource is available; and performing a reclamation process of the physical storage resource in accordance with the indication from the virtual machine that the reclamation opportunity is available, wherein the reclamation process is performed while the virtual machine is running. The indication can be received from a virtual communication protocol (e.g., can include an in-band communication protocol, out-of band communication protocol, a socket based communication protocol or a serial character device communication protocol).08-02-2012
20090064137Method and Apparatus for Determining a Service Cluster Topology Based on Static Analysis - The service assignment tool analyzes a service to determine whether the service can execute on a cluster. If the service cannot execute on a cluster, the service is assigned to a single virtual machine. The service assignment tool identifies non-cluster friendly services by performing a static analysis on the bytecode of the service. The bytecode of the service is analyzed by comparing each segment of bytecode to a list of known good and bad coding conventions. If each segment of bytecode in a service meets the good coding convention criteria, then the service is cluster friendly. If one segment of bytecode does not meet the good coding convention criteria, then the entire service is considered to be not cluster friendly.03-05-2009
20090055821SYSTEMS, METHODS, AND COMPUTER PRODUCTS FOR JUST-IN-TIME COMPILATION FOR VIRTUAL MACHINE ENVIRONMENTS FOR FAST APPLICATION STARTUP AND MAXIMAL RUN-TIME PERFORMANCE - Systems, methods, and computer products for just-in-time compilation for virtual machine environments for fast applications start-up and maximal run-time performance. Exemplary embodiments include a just in time compilation method for a virtual machine environment coupled to a memory, including identifying a program structure for compilation, creating a low optimization compiled version of the program structure that is relocatable in the memory, storing into a persistent cache the low optimization compiled version of the program structure that is relocatable and relocating the low optimization compiled version of the program structure into a virtual machine address space in the memory, wherein relocating the low optimization compiled version of the program structure includes transforming the low optimization compiled version to a compiled version with fixed addresses in the memory that can be executed.02-26-2009
20090260008VIRTUAL MACHINE MANAGEMENT SYSTEM AND METHOD FOR MANAGING PROCESSOR RESOURCES THEREOF - A virtual machine management system, the system including: at least one virtual machine to request a processor to drive a software application or component, and a virtual machine monitor to determine whether allocating the requested processor is possible, to create a waiting list if the allocating of the requested processor is determined to not be possible, and to allocate an obtained processor according to the waiting list. Accordingly, the processor is dynamically allocated and the processor resources are efficiently utilized.10-15-2009
20090260007Provisioning Storage-Optimized Virtual Machines Within a Virtual Desktop Environment - A computer implemented method, a computer program product, and data processing system clone virtual machines in a virtual desktop environment. A request to clone a new virtual machine is intercepted, wherein the request was initially sent to a virtual management server. Responsive to intercepting the request, the new virtual machine is cloned from a snapshot of a master virtual machine. A delta file is created for the new virtual machine, wherein the delta file includes a base disk reference and a copied delta file. The new virtual machine is configured to read a base disk image from a snapshot of the master virtual machine. The new virtual machine is configured to write data to the copied delta file in the delta file.10-15-2009
20090260006Virtualizing Embedded Systems - This description provides tools and techniques for virtualizing embedded systems. Systems are described for embedding into a vehicle, with the systems including subsystems and centralized physical platforms that include computing resources operating on behalf of the subsystems. Systems may also include shared bus systems that place the centralized physical platforms and the subsystems in communication with one another. The centralized physical platforms may also include virtualization layers for operating virtual machines, with the virtual machines being associated respectively with the subsystems.10-15-2009
20090144733VIRTUAL MACHINE SYSTEM AND CONTROL METHOD OF VIRTUAL MACHINE SYSTEM - A virtual machine system and a control method for the virtual machine system. An instruction causing a protection exception is analyzed by the protection exception process by accessing at least a virtual device, while judging whether the optimum emulated code is executed for each function on the virtual device. If the optimum emulated code is executable, the cause of the protection exception is stored in a memory and the optimum emulated code is executed, while at the same time judging whether the cause stored in the memory is usable for the next and subsequent protection exception processes. If the cause is so usable, the optimum emulated code is executed while omitting process having a large processing amount thereby to reduce the amount of the protection exception process. The stored contents of the cause of the protection exception are compared with the contents of the instruction analyzed, and ife the cause held is not reusable, the cause of the protection exception is deleted.06-04-2009
20120272234Scoring of Computing Equipment for Virtualized Computing Environments - Performance test data of a plurality of virtualization computing equipment configurations is collected and stored for each of a plurality of virtualization computing performance categories. At a computing device, data is received that describes requirements for virtualization computing services. Virtualization computing equipment configurations among the plurality of virtualization computing equipment configurations are identified that are capable of satisfying the requirements. For each identified virtualization computing equipment configuration, a measure of efficiency is determined for each of the plurality of performance categories based on the requirements and the virtualization computing performance test data. From the efficiency measure computed for the plurality of performance categories, a score is generated that represents the overall performance efficiency for each identified virtualization computing equipment configuration.10-25-2012
20090024994Monitoring System for Virtual Application Environments - A monitoring system for virtual application environments comprising: at least one physical machine executing a first operating system; at least one virtual machine operating on at least one of the at least one physical machines, each such virtual machine operating a second operating system; and an agent program operating on each of the at least one physical machines, where, each agent program is operable to obtain a first set of metrics from the first operating system, such first set of metrics including metrics in respect of each virtual machine as viewed by the first operating system, and operable to connect to the second operating system of each virtual machine hosted on the physical machine the agent program operates on and obtain a second set of metrics in respect of the virtual machine from the second operating system, the agent program further operable to communicate the first and second sets of metrics to a manager program.01-22-2009
20110225583VIRTUAL MACHINE MONITOR AND SCHEDULING METHOD THEREOF - A virtual machine monitor and a scheduling method thereof is provided. The virtual machine monitor may operate at least two domains. The virtual machine monitor may include at least one run queue and a plurality of schedulers, at least two of the plurality of schedulers comprising different scheduling characteristics. The virtual machine monitor may insert a task received from the domain into the run queue and may select a scheduler for scheduling the task, which may be inserted into the run queue, from the schedulers, according to an event type.09-15-2011
20090199178Virtual Application Management - A management system for virtual applications may deploy sets of virtual applications to many client devices by defining and distributing policies. The polices may define which client devices and/or users may permitted to access a virtual application from a server and how the virtual application may be used. A client device may include a virtual application management client that may communicate with a management server to retrieve and implement the policies. The management client may add or remove virtual applications to the client device based on a policy received from the management server. In some embodiments, policies may also be distributed and implemented on a virtual application server.08-06-2009
20090199177VIRTUAL COMPUTING INFRASTRUCTURE - A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. The system has a mapping manager to dynamically alter the mapping for balancing, performance, and redundancy. There can be more independence from the underlying physical configuration, compared to known methods of virtualizing only some of the entities. The mapping manager can be distributed across a number of entities on different physical servers arranged to cooperate with each other.08-06-2009
20090083734METHODS AND SYSTEMS FOR PRESERVING CERTIFIED SOFTWARE THROUGH VIRTUALIZATION - A method for reusing certified software applications without recertification is provided. The method includes creating a virtual machine, that includes at least one of the software applications, the virtual machine including an operating system and at least one interface, certifying the virtual machines, and deploying the certified virtual machine in at least one representation of an underlying hardware platform.03-26-2009
20110145818STORAGE VISIBILITY IN VIRTUAL ENVIRONMENTS - Embodiments of the present invention are directed to a method and system for making storage information available to virtual machines in virtual environments. A method includes sending a request, via an electronic system, for a plurality of storage attributes to a virtual storage access module. The virtual storage access module may facilitate access to storage for a virtual machine via a virtual access path. The method further includes receiving the plurality of storage attributes from the virtual storage access module and storing the plurality of storage attributes. In one embodiment, storing is operable to store the plurality of storage attributes such that they are available for use in storage management tasks.06-16-2011
20090055822ON-DEMAND ACCESS TO A VIRTUAL REPRESENTATION OF A PHYSICAL COMPUTER SYSTEM - Various embodiments of a system and method for accessing a virtual representation of a first physical computer system are disclosed. A first backup image of the first physical computer system may be stored on a server computer system, where the first backup image specifies a first state of the first physical computer system. In response to a request to access a virtual representation of the first physical computer system, a virtual computer may be instantiated from the first backup image on the server computer system. A state of the virtual computer may be modified in response to user input to the virtual computer. A second backup image of the virtual computer may be created, where the second backup image specifies the modified state of the virtual computer. The second backup image may be transferring and applied to the first physical computer system.02-26-2009
20120198442Virtual Container - A virtual container includes an application computer program and metadata representing the operating system requirements. The virtual container is stored on a computer-readable storage medium for delivery to an end user for copying to a target computing device. The virtual container is equivalent to a virtual appliance minus an operating system. The virtual container is executable on an existing logical partition (LPAR) of the target computing device that provides a virtual operating system for the application of the virtual container, where the virtual container is specifically executable within a workload partition (WPAR) of the LPAR. The virtual container is also executable on a new LPAR of the target computing device, where the end user provides a guest operating system to run within the new partition for the virtual container, such that addition of the guest operating system to the virtual container renders the virtual container as a virtual appliance.08-02-2012
20080263544Computer system and communication control method - A technology is provided, in which pair information of a virtual machine and a real machine on which the virtual machine operates are made related with each other, and are recorded into a shared memory partition of the virtual machine and a control function of virtual machine infrastructure, from the above-described recorded information, a judgment is made as to whether or not a communication-destination virtual machine exists on the same real machine as that of a communication-source virtual machine, and a technology for changing the multiplicity degree in accordance with this judgment, moreover, the above-described recorded information is written when the virtual machine has displaced to another real machine to implement a reduction in the CPU usage ratio in network processing between the operating virtual machines, and to dynamically control the multiplicity degree of the communication path by making full use of location information between the virtual machines.10-23-2008
20110231843MANAGEMENT APPARATUS, METHOD, AND PRIVILEGED AND CONFIDENTIAL MEDIUM STORING PROGRAM - An apparatus includes: a first requesting unit, when a resource shortage or booting of a virtual machine occurs in a first server apparatus of the server apparatus, requesting each of the other server apparatuses to report a resource usage rate to obtain one or more resource usage rates, a selection unit selecting a second server apparatus having a surplus resource from the other server apparatuses on the basis of the obtained one or more resource usage rates, and a second requesting unit requesting the first server apparatus to perform a live migration to migrate a virtual machine running on the first server apparatus to the second server apparatus.09-22-2011
20110231844DESKTOP DELIVERY FOR A DISTRIBUTED ENTERPRISE - Techniques are provided for desktop delivery in a distributed enterprise. In one embodiment, a system comprises multiple computing devices that are communicatively connected to a data center. The data center comprises a separate virtual disk for each separate computing device. A virtual disk for a computing device comprises an image that includes: an Operating system (OS) for the computing device; one or more applications for a user of the computing device; a machine profile associated with the computing device; and user data and settings that are specific for the user of the computing device. The data center also comprises logic which is stored in a storage medium and which, when executed at the data center, is operable at least to: send the image to the computing device; receive, from the computing device, changes made by the user at the computing device to each of the OS, the one or more applications, and the user data; and update the image for the computing device by applying the changes to each of the OS, the one or more applications, and the user data.09-22-2011
20110231842VIRTUAL CALCULATING MACHINE SYSTEM, VIRTUAL CALCULATING MACHINE CONTROL APPARATUS AND VIRTUAL CALCULATING MACHINE CONTROL METHOD - A first device that implements one or more first virtual machines and a second device that implements one or more second virtual machines are communicatively connected. The first device notifies the second device being a communication-connection-destination of the first appliance that the first appliance has been connected to the first device. The first device transmits first data received from the second device to the first appliance, and transmits second data received from the first appliance to the second device. The second device notifies the second virtual machine that the first appliance has been connected when the connection is permitted. The second device transmits data received from the first device to the second virtual machine and transmits data received from the second virtual machine to the first device.09-22-2011
20110231841METHODS AND APPARATUS FOR PROVIDING HYPERVISOR LEVEL DATA SERVICES FOR SERVER VIRTUALIZATION - A hypervisor virtual server system, including a plurality of virtual servers, a plurality of virtual disks that are read from and written to by the plurality of virtual servers, a physical disk, an I/O backend coupled with the physical disk and in communication with the plurality of virtual disks, which reads from and writes to the physical disk, a tapping driver in communication with the plurality of virtual servers, which intercepts I/O requests made by any one of said plurality of virtual servers to any one of said plurality of virtual disks, and a virtual data services appliance, in communication with the tapping driver, which receives the intercepted I/O write requests from the tapping driver, and that provides data services based thereon.09-22-2011
20110231840TECHNIQUES FOR SHARING VIRTUAL MACHINE (VM) RESOURCES - Techniques for sharing virtual machine (VM) resources are provided. A relative location for a resource within a VM is created; the relative location dynamically resolves to a particular physical location when a principal requests access to the resource at runtime. The principal is located outside an environment associated with the VM. Authentication and access restrictions are dynamically enforced against the requests made by the principal before a connection is permitted between the principal and the resource (the resource located within the environment of the VM).09-22-2011
20110231839VIRTUAL MACHINE HOMOGENIZATION TO ENABLE MIGRATION ACROSS HETEROGENEOUS COMPUTERS - Described is a technology by which a virtual machine may be safely migrated to a computer system with a different platform. Compatibility of the virtual machine may be checked by comparing the virtual machine's capabilities against those of the new platform. To ensure compatibility, when created the virtual machine may have its capabilities limited by the lowest common capabilities of the different platforms available for migration. Computer systems may be grouped into migration pools based upon similar capabilities, and/or a virtual machine may be mapped to certain computer systems based upon capabilities needed by that virtual machine, such as corresponding to needed performance, fault tolerance and/or flexibility.09-22-2011
20090210872METHOD TO ENHANCE THE SCALABILITY OF NETWORK CACHING CAPABILITY IN VIRTUALIZED ENVIRONMENT - A mechanism is provided to enhance the scalability of network caching capabilities. All network client applications running on a partition in a virtualized environment are configured to query information from a single virtual input/output server (VIOS) network caching daemon. Thus, the illustrative embodiments provide a 1:n model where a VIOS partition has a network caching daemon, and each of the n partitions uses the network caching daemon of the VIOS partition. The mechanism of the illustrative embodiments only requires the system administrator to control one copy of the local files on the VIOS server. The system administrator does not need to monitor all of these local files on each individual partition. The system administrator consolidates the entries used by the different individual partitions into one single file on the VIOS server side.08-20-2009
20090100423Creating a Virtual Machine Containing Third Party Code - A Virtual Machine (VM) is created utilizing a virtual Operating System (OS) disk and virtual application disks, each of which may be from disparate third party suppliers. One or more files in the virtual application disk are then linked to a specific file system location (node) in the virtual OS disk.04-16-2009
20090100424Interrupt avoidance in virtualized environments - Various embodiments of a virtualization system and method are provided herein, wherein computer resources are emulated and simulated by a hypervisor system. In order to provide improved signalization within a virtual computer system, various embodiments may use a virtual CPU for signalizing an external event, wherein the virtual CPU is used temporarily by a signalization routine for processing the signalization of the event.04-16-2009
20090204960SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ACCESSING A MEMORY SPACE ALLOCATED TO A VIRTUAL MACHINE - A method for accessing a memory space allocated to a virtual machine, the method includes: receiving a request from the virtual machine to generate, for another virtual machine, a memory credential associated with a certain memory space allocated to the virtual machine; generating, in response to the request, a cryptographically signed credential; sending the cryptographically signed credential to the other virtual machine; receiving from the other virtual machine an access request to access at least one memory entry within the certain memory space; and accessing the at least one memory entry, if the access request complies with the memory credential.08-13-2009
20080271014Lightweight World Switch - In one embodiment, a processor comprises one or more registers coupled to an execution core. The registers are configured to store an intercept configuration that identifies which of a plurality of intercept events are enabled for intercept during guest execution. Additionally, the intercept configuration identifies, for each enabled intercept event, which of at least two exit mechanisms are to be used in response to detection of the enabled intercept event. The execution core is configured to detect one of the enabled intercept events during execution of a guest and to exit the guest using the exit mechanism identified in the intercept configuration for that detected, enabled intercept event.10-30-2008
20090222815Fault tolerant virtual machine - A virtual machine communicates with one or more additional virtual machines to establish membership for a virtual lockstep computing system, wherein each virtual machine is hosted by a node in a network. The virtual machine communicates with the one or more additional virtual machines to determine a membership configuration, wherein a first virtual machine in the membership configuration is an active machine, and all remaining virtual machines in the membership configuration are standby machines. A single step operation is executed by the virtual machine upon obtaining an operational token that includes contents of the single step operation, wherein the operational token is generated by the active machine. The operational token is passed to a next virtual machine in the membership configuration, wherein the operational token is passed between the virtual machine and the additional virtual machines according to the membership configuration.09-03-2009
20120144389OPTIMIZING VIRTUAL IMAGE DEPLOYMENT FOR HARDWARE ARCHITECTURE AND RESOURCES - A method of optimally deploying virtual images in a system of servers having different architectures and resources automatically deploys a first virtual image to each of a plurality of servers in the heterogeneous system of servers. The method monitors performance of the first virtual image on each of the servers. The method calculates a quality of service metric for the first virtual image on each server. The method ranks the servers in terms of said quality of service metric for the first virtual image. The method automatically deploys the first virtual image to a highest ranked server in terms of quality of service metric for the first virtual image.06-07-2012
20090007100Suspending a Running Operating System to Enable Security Scanning - Techniques described herein enable virtualizing a processor into one or more virtual machines and suspending an operating system of one of the virtual machines from outside of the operating system environment. Once suspended, these techniques capture a snapshot of the virtual machine to determine a presence of malware. This snapshot may also be used to determine whether an unauthorized change has occurred within contents of the virtual machine. Remedial action may occur responsive to determining a presence of malware or an unauthorized change.01-01-2009
20090204965USB PORT SHARED CONTROL METHOD - Virtual USB host controllers are arranged in a plurality of virtual machines constructed inside a physical machine; emulation of the unmounting and mounting of a USB device in a used physical USB port and modifications in the allocation of the USB port utilization rights of a virtual machine are carried out by means of an operation from a control terminal to make possible exclusive utilization; and the physical USB port is utilized jointly among the virtual machines.08-13-2009
20090106754Handling a device related operation in a virtualization enviroment - Methods, system and machine-readable medium are described to handle a device related operation in a virtualization environment. In some embodiment, a kernel component of a virtual machine monitor may determine that a device related operation happens in a virtual machine through a operation transition from the virtual machine to the kernel component; and may determine whether the device related operation can be handled by a first virtual hardware device installed inside of the kernel component of the virtual machine monitor. In other embodiment, the kernel components may initiate an interrupt by the first virtual hardware device; and inject the interrupt from the first virtual hardware device to the virtual machine through another operation transition from the kernel component to the virtual machine.04-23-2009
20090249337Running Multiple Workspaces on a Single Computer with an Integrated Security Facility - Embodiments deliver an operating system and software applications to a personal computer. The operating system and software applications may be managed and configured at a central location prior to delivery. Data that is created or modified on the personal computer may, from time to time, be stored at the central location. When a user switches from one personal computer to another, any and all of the data may be transferred from the central location to the user's current computer. Additionally, the user's current computer may receive suitable versions of the operating system and applications from the central location. In any case, the operating system and software applications may run with a domain of execution that is provided by a hypervisor. Thus, the operating system and software applications may operate within a virtualized machine, perhaps alongside and in isolation from other operating systems and software applications.10-01-2009
20090249333RECORDING MEDIUM HAVING VIRTUAL MACHINE MANAGING PROGRAM RECORDED THEREIN AND MANAGING SERVER DEVICE - A virtual machine managing program manages plural physical machines and makes a computer device execute processing through virtual machines developed on each physical machine. Virtual machines are assigned to physical machines on the basis of CPU usage rate and temperature, and are moved among the physical machines as needed, to maintain acceptable operating conditions.10-01-2009
20090254901SYSTEMS AND METHODS FOR USING OPERATING SYSTEM (OS) VIRTUALISATION FOR MINIMIZING POWER CONSUMPTION IN MOBILE PHONES - A mobile phone that uses OS virtualization for minimizing power consumption in mobile phones is provided. A mobile phone according to the invention may include a plurality of application stacks and a plurality of processor cores. Each of the application stacks preferably corresponds to one of the plurality of processor cores. The mobile phone also includes a hypervisor. In a first state, the hypervisor allocates tasks from each of the application stacks to the processor core that corresponds to the respective application stack. In a second state, the hypervisor allocates selected tasks from the plurality of application stacks to a single processor core. The second state may be an idle state and the tasks that are allocated to the single processor core may be periodic tasks.10-08-2009
20090204961SYSTEMS AND METHODS FOR DISTRIBUTING AND MANAGING VIRTUAL MACHINES - An embodiment relates generally to a method of distributing virtual machines. The method includes specifying a set of requirements for a virtual machine and instantiating a virtual machine based on a lightweight reusable profile, based on the set of requirements as described in the profile. The method also includes importing the profile to a distribution server; and distributing the profile to at least one physical machine in response to a request. Software can be added to the at least one physical machine that can manage the deployment of the physical hosts as a farm to hosting the virtual images08-13-2009
20120198445PLAYING TELEVISION PROGRAM IN VIRTUAL ENVIRONMENT - In a virtual environment, a virtual machine (VM) host includes a host screen and a first host window displayed in the host screen. A VM guest includes a guest screen presented in the first host window. The VM launches a television player application and instruct the television player application to play a television program in the guest screen. The VM host registers a VoIP service provider, create a second host window displayed in the host screen, and present a VoIP user interface in the second host window. When the VM host receives a dial-up number input by a user from the VoIP user interface, the VM host establishes a conversation channel between the VM host and a target client associated with the dial-up number input. The VM host and the target client thus may exchange voice data packets over the conversation channel.08-02-2012
20090222814SELECTIVE EXPOSURE TO USB DEVICE FUNCTIONALITY FOR A VIRTUAL MACHINE - A virtual machine (VM) application may run a guest operating system (OS) and allow the guest OS to connect to USB devices connected to a computer. The VM application may filter the functions associated with the USB device so that only some of the functions of the USB device are exposed to the guest OS.09-03-2009
20090249332METHOD AND A COMPUTING DEVICE - The invention relates to a method and a computing device. A first computing device and a second computing device are connected, wherein the first computing device includes a first virtual machine monitor that hosts a first virtual machine. A boot image is provided on the first computing device, wherein the boot image includes a second virtual machine monitor that is adapted to host the first virtual machine. The second computing device is triggered to boot the boot image from the first computing device. A storage network is established between the first computing device and the second computing device, wherein the storage network includes storage space of the first computing device. Lastly, the first virtual machine is migrated from the first computing device to the second computing device, wherein the first virtual machine is executed by the second computing device but still located on the first virtual machine.10-01-2009
20090249331APPARATUS, SYSTEM, AND METHOD FOR FILE SYSTEM SHARING - An apparatus, system, and method are disclosed for file system sharing. A Read-Only File System (ROFS) organization module organizes a single ROFS for a plurality of operating systems. Each operating system executes on a distinct virtual machine. Each virtual machine executes on a computer. A Read/Write File System (RWFS) organization module organizes an RWFS for each operating system. An access module accesses the RWFS and ROFS for each operating system. The RWFS and ROFS appear to each operating system as a single, private file system. Each RWFS comprises at least one pointer to the ROFS.10-01-2009
20090249329LIMITED SERVICE LIFE THROUGH VIRTUALIZED SERVICE IMAGES - Techniques for limited service life through virtualized service images are presented. A software application is embodied as a service within a virtual machine (VM) image. Licensing restrictions for the software application are carried with or accessible from VM image. Each time the VM is instantiated on a target processing environment from the VM image, the licensing restrictions are enforced against the software application to thereby limit the service life of the software application embedded within the VM image.10-01-2009
20090249330METHOD AND APPARATUS FOR HYPERVISOR SECURITY CODE - Disclosed is a computer implemented method, apparatus, and computer program product for regulating received data in a multiple operating system environment on an I/O adapter. The method includes a hypervisor for determining that the I/O adapter indicated a receive completion. The hypervisor, responsive to retrieving the receive completion, determines that the receive completion is associated with a successful status. The hypervisor, determines in hypervisor space whether an at least one data packet satisfies a security criterion. The hypervisor, routes the data packet to at least one selected from a group consisting of an operating system partition of the multiple operating system environment and a network address on a local area network.10-01-2009
20120131574Virtual machine data structures corresponding to nested virtualization levels - A system includes a processor providing hardware virtualization, and a memory to store a first virtual machine data structure corresponding to a first nested virtualization level and a second virtual machine data structure corresponding to a second nested virtualization level. The virtual machine data structures assist management of the hardware virtualization provided by the processor. The system includes a first nested virtual machine located within the first nested virtualization level and a second nested virtual machine located within the second nested virtualization level. The system includes hypervisors to manage the nested virtual machines using the virtual machine data structures. A root hypervisor is to manage the first nested virtual machine using the first virtual machine data structure. A first nested virtualization level hypervisor is to run within the first nested virtual machine and is to manage the second nested virtual machine using the second virtual machine data structure.05-24-2012
20130219393ZONING DATA TO A VIRTUAL MACHINE - In a method to zone data to a virtual machine, support information is exchanged between a physical controller and an expander, the support information comprising an indication of an ability of the physical controller and the expander to support thereon a set of virtual controllers and a set of virtual physical layers (virtual PHYs), respectively. In response to a positive indication sending a list of SAS addresses to the expander, a list of SAS addresses is sent to the expander. Then, a first SAS address of the list of SAS addresses is assigned to a first virtual PHY of the set of virtual PHYs, wherein the assigning is performed by the expander, and wherein the first virtual PHY at an assigned SAS address corresponds to a first virtual controller of the set of virtual controllers.08-22-2013
20130219392COMPUTER SYSTEM - In a computer system according to the background art, when a request to halt a virtual processor was detected, the virtual processor was blocked. In the blocking method, latency of virtual halt exit of the virtual processor was so long that a problem of performance was caused. A virtual machine monitor selects either of a busy wait method for making repeatedly examination until the virtual halt state exits while the virtual processor stays on the physical processor and a blocking method for stopping execution of the virtual processor and scheduling other virtual processors on the physical processor while yielding the operating physical processor and checking off scheduling of the virtual processor to the physical processor, based on a virtual processor halt duration predicted value of the virtual processor which is an average value of latest N virtual processor halt durations of the virtual processor.08-22-2013
20130219387ESTABLISHING SECURE TWO-WAY COMMUNICATIONS IN A VIRTUALIZATION PLATFORM - In a specific embodiment, a secure two-way multi-message communication channel between a virtualization platform and a guest running on a virtual machine hosted on the virtualization platform is provided using the OVF environment channel. The OVF environment may be used to transmit communication parameters from the platform to the virtual machine during power-on. At runtime, a guest executing on the virtual machine may use the communication parameters to establish a secure two-way communication channel with the virtualization platform.08-22-2013
20100275204COMPUTING MACHINE - According to one embodiment, a computing machine includes virtual machines configured to simultaneously run on a virtual machine monitor, wherein the virtual machines comprises a user virtual machine, a first virtual machine, and a second virtual machine, the user virtual machine is configured to execute an application program and an operating system, the first virtual machine is configured to provide a shared folder to the user virtual machine, the user virtual machine comprises a specific information storage module configured to store specific information includes system data in the second virtual machine, and the user virtual machine comprises setting data for storing use data of the user virtual machine in the shared folder.10-28-2010
20100275202COPYING SEGMENTS OF A VIRTUAL RESOURCE DEFINITION - The disclosure and claims herein are directed to copying segments of a virtual resource definition from an existing virtual resource to create a new virtual resource definition or modifying an existing one to simplify virtualization management. The virtualization manager divides a virtual resource definition into a number of reusable segments. A user may then select one or more segments and place them into a new or existing virtual resource definition. The user can choose to mix and match segments to quickly create or modify a virtual resource definition such as a virtual server, virtual printer or virtual data storage. Any default information in the new virtual resource or old information in the existing resource is replaced by the information in the copied segment. Any dependencies in the existing virtual resource are resolved with user input to break the dependencies or copy dependent data.10-28-2010
20100275201End-to-end mapping from operating system running on virtual machine to storage volume of storage-array network (SAN) - An end-to-end mapping from a file system of an operating system running on a virtual machine to a storage volume of a SAN is determined. The virtual machine reported by the operating system is mapped to a definition of the virtual machine as provided by a management component managing the virtual machine. A storage device reported by the operating system is mapped to a definition of a virtual storage device as provided by the management component, such as by using a SCSI controller number and target identifier of the virtual machine storage device to correlate the virtual machine storage device to the definition. The definition of the virtual storage device is mapped to a storage device on a physical computing device on which the management component and the virtual machine are running. The storage device on the physical computing device is mapped to the storage volume of the SAN.10-28-2010
20100153947INFORMATION SYSTEM, METHOD OF CONTROLLING INFORMATION, AND CONTROL APPARATUS - Provided is an information system including a server apparatus having a virtualization control unit which implements a virtual machine, and a storage apparatus having a virtual logical volume management unit which provides a virtual logical volume (VLU) configured by using a real logical volume (RLU). In the system, the VLU is allocated to each of the virtual machines implemented in the same server apparatus, the RLUs configuring the VLU for each virtual machine differ depending on the virtual machine, an identifier of the virtual machine is added to an I/O request of the virtual machine, the I/O request with the identifier is transmitted to the storage apparatus, and the RLU as a target in the I/O request is identified based on the identifier by the storage apparatus.06-17-2010
20100180275TECHNIQUES FOR PLACING APPLICATIONS IN HETEROGENEOUS VIRTUALIZED SYSTEMS WHILE MINIMIZING POWER AND MIGRATION COST - N applications are placed on M virtualized servers having power management capability. A time horizon is divided into a plurality of time windows, and, for each given one of the windows, a placement of the N applications is computed, taking into account power cost, migration cost, and performance benefit. The migration cost refers to cost to migrate from a first virtualized server to a second virtualized server for the given one of the windows. The N applications are placed onto the M virtualized servers, for each of the plurality of time windows, in accordance with the placement computed in the computing step for each of the windows. In an alternative aspect, power cost and performance benefit, but not migration cost, are taken into account; there are a plurality of virtual machines; and the computing step includes, for each of the windows, determining a target utilization for each of the servers based on a power model for each given one of the servers; picking a given one of the servers with a least power increase per unit increase in capacity, until capacity has been allocated to fit all the virtual machines; and employing a first fit decreasing bin packing technique to compute placement of the applications on the virtualized servers.07-15-2010
20100180274System and Method for Increased System Availability in Virtualized Environments - A method may include a hypervisor instantiating a virtual machine including an initiator client and the hypervisor determining whether a virtualized information handling system is interfaced to an associated storage resource via an offload host bus adapter (HBA). If the virtualized information handling system is interfaced to the associated storage resource via an offload HBA, the hypervisor may execute an adapter driver for the HBA, the adapter driver for communicating input/output communications between the virtual machine and the associated storage resource via the offload HBA. If the virtualized information handling system is interfaced to the associated storage resource via another adapter other than an offload HBA, the hypervisor may execute an emulator, the emulator for emulating the functionality of the adapter driver for the HBA and for communicating input/output communications between the virtual machine and the associated storage resource via the other adapter.07-15-2010
20110107330GENERATION OF OPEN VIRTUALIZATION FRAMEWORK PACKAGE FOR SOLUTION INSTALLATIONS AND UPGRADES - Methods, devices, and systems for creating a virtual machine are provided. In particular, a mechanism is provided which allows the automated creation of a virtual machine based on attributes of an existing physical machine. This allows for an efficient and user-friendly way of transitioning a physical machine or set of machines to a virtual machine architecture.05-05-2011
20100162241ADDRESS ASSIGNMENT METHOD, COMPUTER, AND RECORDING MEDIUM HAVING PROGRAM RECORDED THEREIN - An address assignment method includes a first notification step of selecting a range of use of addresses to be assigned to the virtual network interface card from the set of addresses, and notifying another physical machine of the range of use via a network, the first notification step being carried out by the physical machine that creates the virtual machine; a storage step of storing the range of use, the storage step being carried out by the physical machine notified of the range of use at the first notification step; and a second notification step of selecting the range of use of addresses to be assigned to the virtual network interface card in the virtual machine to be created from the set of addresses excluding the stored range of use, and notifying another physical machine of the range of use via the network.06-24-2010
20080307415Tessellated applications for user computing environments - A computing policy establishes computing rights of multiple users according to their roles, such as workplace job descriptions. Templates, in a library, each define a computing configuration of at least one virtual machine and any computing application to be executed by the virtual machine. A plurality of user applications are defined and configured from the templates and each corresponds to one or more roles of the users. Users select from the applications, according to their role. In this manner, policy or governance can be enforced and/or computing resources conserved. Various other features relate to: tessellating the applications from the templates; loading and configuring startup conditions of the applications; and mapping the applications to user viewing areas, such as a viewing boundary of a monitor or a virtual viewing area within the viewing boundary. Libraries, managers, software program products, and policy management are other features, to name a few.12-11-2008
20080307414CREATING A VIRTUAL MACHINE IMAGE WITH A SOFTWARE DEPLOYMENT SYSTEM - A novel method is disclosed for capturing an installed state of a conventional application and converting the captured state into a virtual application. The novel method starts with a bare machine in a known state, preferably soon after the OS was installed. Installation scripts are used to install one or more software applications along with required components and dependencies. Other artifacts can be added and configured such as files, trees, directories, entries, data, values, among others. These also may include updates to various system databases, such as the Windows registry in which certain metadata is stored. The installed applications are tested and verified to work as desired. Undesired artifacts can be deleted manually or removed by the OS. The state of the virtual machine with the installed applications is captured. The installed applications can be tested on the frozen virtual machine. If the user determines that the installed applications are working properly, a virtual machine image is prepared and then written out. The resulting output is a new populated virtual application container that encapsulates the applications installed and configured by the user. If the user determines that one or more installed applications do not work properly during testing, then the frozen virtual machine can be unfrozen and any deficiencies corrected. The virtual machine image is stored as a launch document and a set of shards. The virtual machine image represents the state of the virtual machine along with the installed applications at the time the preparation virtual machine was frozen.12-11-2008
20100169884INJECTING TRANSACTIONS TO SUPPORT THE VIRTUALIZATION OF A PHYSICAL DEVICE CONTROLLER - Embodiments of apparatuses, methods, and systems for injecting transactions to support the virtualization of a physical device controller are disclosed. In one embodiment, an apparatus includes a processor, system memory, a physical device controller, and a virtualization agent. The physical device controller is to be shared by a plurality of virtual machines created by a virtual machine monitor installed on a processor. The virtualization agent is coupled to the system memory through a first interface and coupled to the physical device controller through a second interface, to represent the physical device controller as a plurality of virtual device controllers available to be allocated to the plurality of virtual machines, and to inject transactions onto the first interface and the second interface on behalf of the plurality of virtual device controllers.07-01-2010
20100153948COMBINED WEB AND LOCAL COMPUTING ENVIRONMENT - A system and method enabling two way communication between a virtual hosted operating system running in a web page and the local operating system and applications in order to allow a user to combine the advantages of both systems.06-17-2010
20100153946DESKTOP SOURCE TRANSFER BETWEEN DIFFERENT POOLS - A method, apparatus, and system of desktop source transfer between different pools are disclosed. In one embodiment, a machine-readable medium includes determining that a transfer request is associated with a desktop source, accessing the desktop source from a source pool, and automatically transferring the desktop source from the source pool to a destination pool.06-17-2010
20100153945SHARED RESOURCE SERVICE PROVISIONING USING A VIRTUAL MACHINE MANAGER - A virtual machine manager (VMM) enables provisioning of services to multiple clients via a single data processing system configured as multiple virtual machines. The VMM performs several management functions, including: configuring/assigning each virtual machine (VM) for/to a specific, single client; scheduling the time and order for completing client services via the assigned client VM; instantiating a client VM at a scheduled time and triggering the execution of services tasks required for completing the specific client services on the client VM; monitoring and recording historical information about the actual completion times of services on a client VM; and updating a scheduling order for sequential instantiating of the multiple client VMs and corresponding client services, based on one or more of (i) pre-established time preferences, (ii) priority considerations, and (iii) historical data related to actual completion times of client services at a client VM.06-17-2010
20090300608METHODS AND SYSTEMS FOR MANAGING SUBSCRIPTIONS FOR CLOUD-BASED VIRTUAL MACHINES - A cloud management system can track the usage of the virtual machines in order to determine the fees associated with the user's subscription to the cloud computing environment. The usage can include the resources consumed to support the virtual machines and can include the utilization of the virtual machines by the user or third parties. The cloud management system can determine the fees charged to the user for utilizing the cloud computing environment based on the tracked usage.12-03-2009
20100180276APPLICATION PARTITIONING ACROSS A VIRTUALIZED ENVIRONMENT - A processor including an execution core for executing instructions. In one embodiment, the instructions cause the core to enable two or more virtual machine guests to execute under the control of a virtual machine monitor. A first virtual machine guest includes a first portion of an application executing in the context of a first guest operating system. The first portion of the application creates a guest virtual machine applet that executes in the context of a second virtual machine guest. The first portion of the application and the guest virtual machine applet are part of a single application. To create a guest virtual machine applet, the first portion of the application executes a call to the first guest operating system and in response to receiving the call from the first portion of the application, the first guest operating system makes a system call to the virtual machine monitor.07-15-2010
20100162238Systems and Methods for Controlling, by a Hypervisor, Access to Physical Resources - A system for controlling, by a hypervisor, access to physical resources during execution of a virtual machine includes a physical disk and a hypervisor. The physical disk is provided by a computing device and stores at least a portion of a virtual disk. The hypervisor executes on the computing device. The hypervisor allocates, to the virtual disk, an amount of access to the physical disk. The hypervisor determines that a level of utilization of the physical disk has exceeded a threshold. The hypervisor limits, in response to the determination, access by the virtual disk to the physical disk.06-24-2010
20100162235VIRTUALIZATION SYSTEM WITH A REMOTE PROXY - A remote proxy provides remote control to a virtualization system. The virtualization system includes a computer having virtualization software executing on the computer, and one or more virtual machines executing on the computer by way of the virtualization software, each of the virtual machines having a guest operating system. The remote proxy receives over a network connection a plurality of logical channels of a multi-channel remote control protocol at a first domain of a plurality of domains of the virtualization system. Each of the logical channels convey information corresponding to one of the domains. For each logical channel, the remote proxy identifies the corresponding domain. Further, for each of the logical channels corresponding to a domain other than the first domain, the remote proxy forwards the logical channel to the corresponding domain.06-24-2010
20090064136UTILIZING SYSTEM CONFIGURATION INFORMATION TO DETERMINE A DATA MIGRATION ORDER - Methods, systems and computer program products for utilizing system configuration information to determine a data migration order. The method includes computer instructions for establishing communication from a source virtual machine to a target virtual machine, the source virtual machine including a memory. The configuration information associated with the source virtual machine is determined and utilized to determine an order of migration for pages in the memory. The pages in the memory are transmitted to the target virtual machine in the order of migration.03-05-2009
20110107329METHOD AND SYSTEM FOR DYNAMIC COMPOSING AND CREATING 3D VIRTUAL DEVICES - The present invention describes a method and system for governing a physical device or application service in a real world through a virtual device in a virtual world. The physical device or application service registers at least one virtual adaptor of the physical device or application service to a virtual device broker. A user creates or composes the virtual device with the at least one virtual adaptor in the virtual device broker. The user commands to the virtual device through a user interface of the virtual device. The at least one virtual adaptor in the virtual device translates the command to a controlling signal to the physical device or application service. The controlling signal operates the physical device or application service according to the command to the virtual device.05-05-2011
20110107328VIRTUAL MACHINE DEVICE AND METHODS THEREOF - A data processing device is configured such that, during a loop executed by a guest, the device executes a PAUSE instruction. In response to executing a PAUSE instruction, the data processing device determines a relationship between the current PAUSE instruction and a previously executed PAUSE instruction. For example, the data processing device can determine the amount of time that has elapsed between the PAUSE instructions. Based on the relationship between the current and previous pause instructions, the data processing device can reset the counter to a reset value, or adjust (i.e. increment or decrement) the counter by a defined amount.05-05-2011
20120304174VIRTUAL SOLUTION COMPOSITION AND DEPLOYMENT SYSTEM AND METHOD - Various embodiments disclose a method and system for creating a virtual part used for composing a virtual solution. In one embodiment, a user's selection of at least one virtual image is received. A set of configurability points is associated with the virtual image. A set of parameters of a virtual part is set as configurable during virtual solution composition. A set of virtual ports is generated. Each virtual port within the set of virtual ports indicates at least one of a set of virtual parts required by a virtual part including the set of virtual ports and a set of virtual parts that is compatible with the virtual part. A set of configuration operations is received. A virtual part including at least the virtual image, the set of configurability points, the set of virtual ports, and the configuration operations is generated.11-29-2012
20100169882Multiple Layers of Virtualization in a Computing System - In accordance with one embodiment, a method of nesting a second virtual machine (VM) on a first VM running on a physical machine is provided. The method comprises receiving a first instruction from the physical machine, wherein the first instruction originates from the first VM, wherein a first control structure is associated with the first VM, and wherein a second control structure is associated with the second VM; creating a secondary control structure based on the second control structure associated with the second VM; providing the first instruction and the secondary control structure to the physical machine, wherein the physical machine executes the first instruction according to information included in the secondary control structure; and updating the secondary control structure to correspond to current state or execution environment of the physical machine.07-01-2010
20100192148USER DEFINED DATA PARTITIONING (UDP) - GROUPING OF DATA BASED ON COMPUTATION MODEL - Methods, systems, and computer program products are provided for generating application-aware data partitioning to support parallel computing. A label for a user defined data partitioning (UDP) key is generated by a labeling process to configure data partitions of original data. The UDP is labeled by the labeling process to include at least one key property excluded from the original data. The data partitions are evenly distributed to co-locate and balance the data partitions and corresponding computations performed by computational servers. A data record of the data partitions is retrieved by performing an all-node parallel search of the computational servers using the UDP key.07-29-2010
20100186012VIRTUAL MACHINE SYSTEM AND VIRTUAL MACHINE CONTROL METHOD - A user interface function for a virtual machine system based on a server or a PC is provided only by applying software without using SVP or the like. A control virtual machine is provided for controlling a virtual machine control screen which is displayed for defining virtual machines and instructing operations to the virtual machines. A virtual machine control program exclusively displays either a screen for each virtual machine or the virtual machine control screen in response to a screen switching instruction from an input device.07-22-2010
20100186011METHODS AND SYSTEMS FOR IMPLEMENTING TRANSCENDENT PAGE CACHING - This disclosure describes, generally, methods and systems for implementing transcendent page caching. The method includes establishing a plurality of virtual machines on a physical machine. Each of the plurality of virtual machines includes a private cache, and a portion of each of the private caches is used to create a shared cache maintained by a hypervisor. The method further includes delaying the removal of the at least one of stored memory pages, storing the at least one of stored memory pages in the shared cache, and requesting, by one of the plurality of virtual machines, the at least one of the stored memory pages from the shared cache. Further, the method includes determining that the at least one of the stored memory pages is stored in the shared cache, and transferring the at least one of the stored shared memory pages to the one of the plurality of virtual machines.07-22-2010
20100186010Dynamic Checking of Hardware Resources for Virtual Environments - Embodiments that dynamically check availability of hardware resources for applications of virtual environments are contemplated. Various embodiments comprise one or more computing devices having various hardware resources available to applications of a virtual environment. Hardware resources may comprise, for example, amounts of memory, amounts or units of processing capability of one or more processors, and various types of peripheral devices. The embodiments may store hardware data pertaining to a specified amount of hardware recommended or required for an application to execute within the virtual environment. The embodiments may generally monitor for changes to the hardware configuration, which may affect amount of hardware available to the virtual environment and/or application. If the changes to the hardware reduce the amount of available hardware to a point beyond the specified amount of hardware, the embodiments may prevent the application from being executed or prevent the changes to the hardware configuration.07-22-2010
20090100425METHOD AND SYSTEM FOR CHANGING EXECUTION ENVIRONMENTS DURING APPLICATION EXECUTION - Some embodiments of the present invention provide a system that executes an application. During operation, the system starts the application using a web browser. Next, the system receives an execution environment change notification from a user of the application, and in response to the notification transitions the application to a second execution environment without interrupting the execution of the application.04-16-2009
20120198446Computer System and Control Method Therefor - A hypervisor records error device information in a virtual PCI bridge, and makes error information in a device consistent with error information in a PCI bridge. A computer system includes a CPU, memory, and physical device PCI tree. In the memory, virtual machines capable of mutually independently acting, and a hypervisor that manages the virtual machines are existent. The physical device PCI tree includes physical bridges and devices. The physical bridge has a register in which information specifying the device is recorded. The virtual machine includes a virtual CPU, virtual memory, and virtual device PCI tree. The virtual device tree includes virtual bridges and virtual devices. The virtual bridge has a virtual memory space in which information specifying the virtual device in which an error has occurred is recorded. The hypervisor includes an interrupt handling program that is a virtual bridge modification program which modifies information in the virtual bridge.08-02-2012
20120198440Mechanism for Communication in a Virtualization System Via Multiple Generic Channels of a Paravirtualized Device - A mechanism for communication in a virtualization system via multiple generic channels of a paravirtualized device is disclosed. A method of the invention includes creating one or more communication devices for each VM managed by a hypervisor of a host machine, exposing a plurality of ports on top of each created communication device to the VM that the communication device is associated with, specifying options for each port to enable the port to be used to establish a communication channel between the hypervisor and the VM, the options including a port name to associate with both of the port and the communication channel of the port, and creating a direct connection between two or more VMs via their associated communication devices in order to enable direct communication between the two or more VMs by utilizing the ports of their associated communication devices.08-02-2012
20110145821METHODS AND SYSTEMS FOR COMMUNICATING BETWEEN TRUSTED AND NON-TRUSTED VIRTUAL MACHINES - The methods and systems described herein provide for establishing a secure communication channel between a non-trusted virtual machine and a trusted virtual machine, in a computing device executing a hypervisor hosting the trusted virtual machine, the non-trusted virtual machine, and a third virtual machine. The method includes writing, by a non-trusted virtual machine, a first string of data to a region of memory of the computing device. The method also includes detecting, by a trusted virtual machine, the first string of data written to the region of memory. The method further includes establishing a communication channel between the trusted virtual machine and the non-trusted virtual machine by locking, by the trusted virtual machine and responsive to the detection, the region of memory for the duration of the communication to prevent a third virtual machine from accessing the region of memory.06-16-2011
20090313620SYNCHRONIZING VIRTUAL MACHINE AND APPLICATION LIFE CYCLES - A virtual environment can be configured to coordinate life cycles of virtual machines and application programs executing therein. In one implementation, the virtual environment includes an application layer and a virtual machine layer. The application layer communicates with the virtual machine layer to coordinate and directs virtual machine creation and deletion in a coordinated fashion with application programs. For example, the application layer receives a request to initiate an application program. The application layer determines from associated application properties the type and/or number of virtual machines to be created. The application layer then directs creation of the appropriate virtual machines (through the virtual machine layer), and further directs installation of the requested application programs therein. When detecting removal of the application program from the created virtual machines, the application layer can automatically direct removal or decommissioning of the corresponding virtual machine.12-17-2009
20110145820METHODS AND SYSTEMS FOR MANAGING INJECTION OF INPUT DATA INTO A VIRTUALIZATION ENVIRONMENT - The methods and systems described herein provide functionality for managing injection of input events to one virtual machine of a plurality of guest virtual machines, in a computing device executing a hypervisor hosting a trusted virtual machine and a non-trusted virtual machine. An input manager receives a first item of input data from an input device communicating with the computing device. The input manager identifies whether the first item of input data includes a predetermined string. The input manager forwards, responsive to the identification, the first item of input data to one of (i) a first virtual machine of a plurality of guest virtual machines executed by the processor of the computing device and (ii) an application executed by the control virtual machine, wherein at least one virtual machine of the plurality of guest virtual machines is a trusted virtual machine.06-16-2011
20100262964Virtual Machine Packing Method Using Scarcity - A method for packing virtual machines onto host devices may calculate scarcity values for several different parameters. A host's scarcity for a parameter may be determined by multiplying the host's capacity for a parameter with the overall scarcity of that parameter. The sum of a host's scarcity for all the parameters determines the host's overall scarcity. Hosts having the highest scarcity are attempted to be populated with a group of virtual machines selected for compatibility with the host. In many cases, several different scenarios may be evaluated and an optimal scenario implemented. The method gives a high priority to those virtual machines that consume scarce resources, with the scarcity being a function of the available hardware and the virtual machines that may be placed on them.10-14-2010
20110145819METHODS AND SYSTEMS FOR CONTROLLING VIRTUAL MACHINE ACCESS TO AN OPTICAL DISK DRIVE - The methods and systems described herein provide for granting a virtual machine exclusive access to an optical disc drive responsive to a determination the virtual machine initiated a transaction with the optical disc drive. A drive manager maps an optical disc drive connected to the computing device to a plurality of virtual machines hosted by a hypervisor executed by the computing device. The drive manager intercepts a transaction stream generated by the optical disc drive and converts the transaction stream to a command stream. The drive manager determines, based on an analysis of the command stream, a first virtual machine of the plurality of virtual machines initiated a transaction with the optical disc drive. Responsive to the determination, the drive manager locks the optical disc drive to grant the first virtual machine exclusive access to the optical disc drive.06-16-2011
20100192149POWER MANAGER FOR VIRTUAL MACHINES - A virtual power manager provides for, when plural virtual machines are running, accessing these virtual machines to determine their respective virtual-machine power settings and determining hardware power settings at least in part as an aggregate function of the virtual-machine power settings.07-29-2010
20100192150EXCLUSIVE ACCESS FOR SECURE AUDIO PROGRAM - Executing a monitor on a platform, the monitor capable of providing exclusive, secure access to an audio I/O device of the platform, executing a first partition on the platform, providing an audio device model in the first partition by directly mapping the audio I/O device from the monitor to the first partition for applications executing in the first partition, and providing exclusive, secure access to the audio I/O device to a program performing an audio function in a secure mode in the first partition.07-29-2010
20110145817ADAPTIVE VIRTUAL ENVIRONMENT MANAGEMENT SYSTEM - Methods and systems for forming a user environment on a computing device are disclosed. One method includes transmitting, from a computing system to an environment server, profile definition data including a manifest of software, a user identifier, and one or more claims. The method also includes receiving, from the environment server, a plurality of blocks of data for storage in a memory of the computing system, the plurality of blocks of data defining a user environment operable at the computing device, the user environment described by the profile definition data and at least partially formed from one or more of the system software blocks.06-16-2011
20110145816MANAGING REMOTE DEPLOYMENT OF A VIRTUAL MACHINE IN A NETWORK ENVIRONMENT - A method for managing remote deployment of a virtual machine (VM) in a network environment is provided. A VM image stored in a second storage medium is copied to a first storage medium. The first storage medium is located in close proximity to a first computing system, and the second storage medium is located remotely from the first computing system and in close proximity to a second computing system. As the VM image is being copied, a first VM is deployed on the first computing system from a partial copy of the VM image stored in the first storage medium, and a second VM is deployed on the second computing system from the VM image stored in the second storage medium. Service requests submitted to the first computing system are managed either locally by the first VM or remotely by the second VM based on type of service requested.06-16-2011
20110145815VIRTUAL HOT PLUGGING OF DEVICES AND VIRTUAL DEVICES - A device list is created for an operating system and/or a virtualized operating system. A bus node is created for each bus. Interface nodes are created as child nodes of the respective bus and a status indicator indicates whether a device connected to the interface is accessible. A device node is created for the device connected to the interface. Virtualized interface nodes are created as child nodes of the device node for each virtual device included in the device and a status indicator indicates whether the respective virtual device is accessible. Then, devices and/or virtual devices may be added and/or removed utilizing the list. After a device and/or virtualized device has been removed for one operating system and/or virtualized operating system, it may then be added to another. In this way, devices and/or virtualized devices can be virtually hot plugged without physically connecting and/or disconnecting devices.06-16-2011
20110145814HYPERVISOR DRIVER MANAGEMENT IN VIRTUAL MACHINE ENVIRONMENTS - Techniques for providing access to physical resources in a virtual machine environment are provided. A virtual machine may access physical resources using device drivers that have been divided. After monitoring a performance of device drivers operating in a virtual machine, the device drivers that are underperforming or that experience a high rate of context switches are identified. These device drivers are adapted dynamically into portions that execute in an untrusted domain and in a trusted domain. Running a portion of the device driver in the trusted domain eliminates context switches and improves performance of the virtual machine.06-16-2011
20100162239Systems and Methods for Optimizing a Process of Determining a Location of Data Identified by a Virtual Hard Drive Address - A system for optimizing a process of determining a location of data identified by a virtual hard drive address includes a virtual hard drive, a hypervisor, a plurality of chained files and a table. The plurality of chained files includes a first file comprising a delta of a master file and each subsequent file comprising a delta of a previous file in the plurality of chained files. The table enumerates associations between each of a plurality of virtual hard drive addresses with one of the master file and a file in the plurality of chained files. The virtual hard drive stores the master file, the plurality of chained files, and the table. The hypervisor intercepts a request to access data at a virtual hard drive address and identifies, based on the table, a file containing the requested data and responds to the request with access to the requested data.06-24-2010
20090300611In-place Shadow Tables for Virtualization - In a computing system having virtualization software including a guest operating system (OS), a method for providing page tables that includes: providing a guest page table used by the guest OS and a shadow page table used by the virtualization software wherein at least a portion of the guest page table and the shadow page table share computer memory.12-03-2009
20090300610Self-replicating machines - A self-replicating machine includes a virtualization tool, a provisioning tool, and a configuration tool, stored in a distributable self-contained repository of the machine. The machine is able to automatically rebuild itself solely from the tools stored in the distributable self-contained repository. The virtualization tool is configured to build one or more virtual machines on the machine. Each virtual machine has a corresponding operating system and environment. The provisioning tool is configured to provision the one or more virtual machines. The configuration tool is to configure the one or more provisioned virtual machines. A custom configuration management tool further customize and configure the physical machine for specific users.12-03-2009
20120198448STORAGE MANAGER FOR VIRTUAL MACHINES WITH VIRTUAL STORAGE - A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host.08-02-2012
20090077552METHOD OF CHECKING A POSSIBILITY OF EXECUTING A VIRTUAL MACHINE - To determine, when a virtual machine is executed by an arbitrary machine, whether the virtual machine can access computer resources required for the virtual machine, provided is a method of checking a possibility of executing a virtual machine including a first physical computer for executing a first virtual machine and a second physical computer capable of executing a virtual machine. The method includes the steps of: acquiring information on first logical resources; acquiring setting information set to a adaptor of the first physical computer so that the first virtual machine accesses the first logical resources; listing second logical resources accessible when the first virtual machine is executed by the second physical computer by setting the setting information to a adaptor of the second physical computer; and determining whether the first virtual machine can be executed by the second physical computer by comparing the first and second logical resources.03-19-2009
20090077551VIRTUAL MACHINE IMAGE BUILDER FOR AUTOMATED INSTALLATION OF FULLY-VIRTUALIZED OPERATING SYSTEM - A customized image can be generated from a specified generic image and modifications. The contents of the generic image can be extracted and modified according to the specified modifications. The modifications can include, among other possibilities, a response file used in automating the installation of the customized image. The customized image can then be generated from the modified contents, and then installed as a guest operating system in a fully-virtualized operating system.03-19-2009
20100162242Virtual Machine Monitor - A method for managing virtual machines, the method comprising providing a virtual Advanced Configuration and Power Interface, ACPI, arranged to interact with the virtual machines, and interacting with a real ACPI based on interaction between the virtual ACPI and the plurality of virtual machines. (FIG. 06-24-2010
20100162240CONSISTENT SECURITY ENFORCEMENT FOR SAFER COMPUTING SYSTEMS - Security can be enforced in a consistent manner with respect to various computing environments that may be operable in a computing system. Consistent security criteria can be generated, based on input security criterion, in a computer readable and storable form and stored in a computer readable storage medium, thereby allowing the consistent security criterion to be effectively provided to a computing system for enforcement of the input security criterion in a consistent manner with respect to, for example, (a) a first executable computer code effectively supported by an Operating System (OS), and (b) a second computer code effectively supported by the Virtual Computing Environment (VCE). A Trusted Component (TC) can effectively provide a consistent security criterion as a part and/or form that is suitable for a particular computing environment. The TC can, for example, be an automated tool that performs various functions including: verifying the consistency of security criteria, generation and deployment of consistent security criteria, and transformation of security criteria to parts and/or forms suitable for various computing environments. In addition, a Virtual Computing Environment (VCE) can obtain from the Operating System (OS) one or more security criteria. The Virtual Computing Environment (VCE) can be operable in a Trusted Computing Environment (TCE) and interface with a Trusted Operating System (TOS) that effectively enforces Mandatory Access Control (MAC), thereby allowing the Virtual Computing Environment (VCE) to leverage the security provided by the OS. The OS can, for example, be a Security-Enhanced Linux (SELinux) Operating System operating as a Trusted Component in a Trusted Environment that includes a Trusted Security Agent (TSA) operable to deploy consistent security criteria.06-24-2010
20090077550VIRTUAL MACHINE SCHEDULAR WITH MEMORY ACCESS CONTROL - A computer system comprises a virtual machine scheduler that dynamically and with computed automation controls non-uniform memory access of a plurality of cells in interleaved and cell local configurations. The virtual machine scheduler maps logical central processing units (CPUs) to physical CPUs according to preference and solves conflicts in preference based on a predetermined entitlement weight and iterative switching of individual threads.03-19-2009
20100251235TIMER ACCESS FROM USER MODE THROUGH A SHARED MEMORY PAGE - A computing system in which a software component executing on a platform can reliably and efficiently obtain state information about a component supported by the platform through the use of a shared memory page. State information may be supplied by the platform, but any state translation information needed to map the state information as supplied to a format as used may be provided through the shared page. In a virtualized environment, the state translation information can be used to map the value of a virtual timer counter or other component from a value provided by a virtual processor to a normalized reference time that will yield the same result, regardless of whether the software component is migrated to or from another virtual processor. Use of a shared page avoids the inefficiency of an intercept into a virtualized environment or a system calls in native mode operation.09-30-2010
20100235835VIRTUAL MACHINE CONTROL APPARATUS, VIRTUAL MACHINE CONTROL METHOD, AND RECORDING MEDIUM THEREFOR - A virtual machine control apparatus that controls operations of a plurality of virtual machines, the virtual machine control apparatus includes a storing part that stores information in a memory used by an application program in a storage unit different from the memory, in association with a virtual machine subject to a suspending command, when the suspending command for the virtual machine in operation; and a selecting part that selects an application program to be preferentially resumed from the storage unit to the memory use area based on the information in the memory used by the application program which is stored in association with the virtual machine subject to the activating command, when the activating command for the virtual machine is accepted.09-16-2010
20100211946METHOD AND SYSTEM FOR NETWORK ABSTRACTION AND VIRTUALIZATION FOR A SINGLE OPERATING SYSTEM (OS) - A device may abstract access to hardware resources in the device to a single operating system (OS) running in the device utilizing an abstraction layer and a software partition. The abstraction layer and the software partition may enable virtualizing the hardware resources during interfacing between the single OS and the hardware resources, such that the actual characteristics and/or number of the hardware resources may be abstracted. The abstraction layer may comprise a hypervisor, which may be optimized to support network abstraction based operations. The software partition may enable managing configuration and/or use of the hardware resources via the abstraction layer. The hardware resources may comprise networking resources. Accordingly, operations of a plurality of virtual drivers within the OS corresponding to each of one or more of the plurality of hardware resources may be supported. Data transfers between the OS and the hardware resources may be performed via the software partition.08-19-2010
20100235834PROVIDING A MANAGEMENT COMMUNICATION CHANNEL BETWEEN A SOFTWARE LAYER AND PLATFORM LAYER FOR HARDWARE MANAGEMENT CONTROL - A system includes hardware, a software layer, a platform layer, and a management communication channel between the software layer and the platform layer. The management communication channel provides an interface to enable the software layer to issue a hardware management command to the platform layer, where the hardware management command is to specify a change of a setting of the hardware, and where the management communication channel allows a hardware management engine of the platform layer to collaborate with the software layer to perform the change of the setting of the hardware.09-16-2010
20100235830PROGRAMMING MODEL FOR APPLICATION AND DATA ACCESS AND SYNCHRONIZATION WITHIN VIRTUAL ENVIRONMENTS - Applications executing on computer systems may execute in a virtual environment, such as a web application executing in a web browser. An application may access the actual computing environment (such as the filesystem), but this accessing may be complicated; e.g., the computing environment may be deployed across many computers and devices, and may be synchronized for offline access via a local cache. A computing environment component may service the complex computing environment (e.g., by managing the cache and retrieving remotely stored data objects) and expose it as a well-organized set of data objects. A virtual environment interface (e.g., a web browser plug-in) may allow applications hosted in the virtual environment to access the computing environment through the computing environment component. Programmatic interfaces may also be implemented to permit such accessing via familiar programming languages and techniques, such as JavaScript libraries exposed to web applications in the web browser.09-16-2010
20110131574METHOD AND SYSTEM FOR INSTANTLY CREATING AN IT ENVIRONMENT - A method to provide instant duplication of the machine images of an IT environment. The method is implemented by a system that includes a management server to oversee all operations, a storage controller, at least one host target machine of the IT Environment and at least one simple storage disk controlled by the storage controller. The method includes configuring each host target machine to access a logical drive as its hard drive, managing by the storage controller of the information inside each logical drive and storing the information on each of the at least one disks. The method also includes implementing the storage controller of two duplication algorithms. A third algorithm is provided for choosing between the first and the second duplication algorithms for each of the at least one disk elements in the IT environment.06-02-2011
20100235837QUERY OPTIMIZATION IN A MULTI-TENANT DATABASE SYSTEM - The present invention provides techniques for managing process space on a multi-tenant database system that features a method that provides to multiple users of two or more organizations, over a network, access to information stored in a database repository shared by the two or more organizations. The database repository implements security protocols to restrict a set of first users to a first sub-portion of the information. The set of first users belongs to one of the two or more organizations. The first sub-portion of the information is different from a second sub-portion accessible by users from another organization. Access of the information by the multiple users is monitored. A first processing space for the set of first users is generated in response to the access of the database repository. The first processing space is distinct from a second processing space for the users from the other organization.09-16-2010
20100242039COMPUTER SYSTEM PROVIDED WITH HYPERVISOR - A hypervisor acquires an I/O command that has been issued from a virtual computer. The hypervisor judges whether or not a target of an I/O that complies with the I/O command is an unassigned port associated device that is a device associated with an I/O port that is coupled to an I/O controller that is not assigned to a virtual computer that is an issuing source of the I/O command. In the case in which the result of the judgment is positive, the hypervisor does no execute an I/O to the unassigned port associated device, and returns a virtual execution result to the virtual computer that is an issuing source of the I/O command.09-23-2010
20100242038Providing a Trusted Environment for Provisioning a Virtual Machine - In one embodiment, a mechanism for providing a trusted environment for provisioning a virtual machine is disclosed. In one embodiment, a method includes beginning an initialization process of a virtual machine (VM) hosted by a VM host server, obtaining by the VM as part of the initialization process a one-time password from the VM host server, the one-time password provided to the VM host server from a management server that created the one-time password, and authenticating the VM with an identity server using the one-time password.09-23-2010
20100251233EMBEDDED COMPUTING SYSTEM USER INTERFACE EMULATED ON A SEPARATE COMPUTING DEVICE - A system for standalone usage of an embedded computing system user interface on a separate heterogeneous computing device. The system may run the same binary software image as the embedded computing device on a PC platform. Because it is virtually the same exact software image as that which is on the device, the PC-hosted version effectively has full fidelity with the device version. Its user interface is virtually identical in appearance and has full navigation and a richer subset of functionality than would be possible with a simulator. Also, it is not necessary to maintain separate simulation and device software since both environments may use the same binary image.09-30-2010
20100251234VIRTUAL NON-UNIFORM MEMORY ARCHITECTURE FOR VIRTUAL MACHINES - Techniques for effectuating a virtual NUMA architecture for virtual machines are disclosed herein.09-30-2010
20100235836 METHOD OF EXTERNAL PERFORMANCE MONITORING FOR VIRTUALIZED ENVIRONMENTS - Embodiments of the present invention provide for performance monitoring of virtualized environments by establishing external performance monitoring (in a primary domain) of a virtual machine manager in whose context a virtual machine operates, and simultaneously capturing information on the virtual machine execution states. In accordance with an embodiment of the present invention, the execution states may comprise any combination of a virtualized processor index, execution address, program (task) identifier, and a timestamp. In one embodiment, a primary domain performance monitoring component may initiate time- or event-based profiling of the virtual machine, and a hypervisor may report the virtualized execution states to the performance monitoring component upon reception of each profiling interrupt. Alternatively, the time-based profiling may be initiated in the virtual machine domain. In this case, the hypervisor or virtual machine manager may enable access from within the virtual machine to performance characteristics collected in the primary domain, or communicate the execution states to the external monitoring component upon reception of each profiling interrupt or upon a change in the virtualized execution states. Performance information collected in the primary domain may then be correlated with the execution states of the virtual machine.09-16-2010
20100235832Storage Virtualization With Virtual Datastores - Computer implemented methods and systems for providing storage virtualization of physical storage include receiving a request for storage from a virtual machine during provisioning of the virtual machine. The request includes a capability and quota requirement for storage as required by the virtual machine. A virtual datastore that satisfies the capability and quota requirements of the request is identified. If not found, one or more volumes, that satisfy the storage requirements, are discovered or created. A virtual datastore is created and maps to one or more volumes which have unique volume identifiers. A unique virtual datastore identifier is generated for the virtual datastore. The virtual datastore identifier is distinct from the volume identifiers of the underlying volumes. The volumes are mapped to the virtual datastore while retaining the virtual datastore identifier for the virtual datastore. The virtual datastore identifier for the virtual datastore is not changed when modifications are made to the physical storage entities mapped to the virtual datastore.09-16-2010
20100211947ZERO-COPY NETWORK I/O FOR VIRTUAL HOSTS - Techniques for virtualized computer system environments running one or more virtual machines that obviate the extra host operating system (0/S) copying steps required for sending and receiving packets of data over a network connection, thus eliminating major performance problems in virtualized environment. Such techniques include methods for emulating network I/O hardware device acceleration-assist technology providing zero-copy I/O sending and receiving optimizations. Implementation of these techniques require a host 0/S to perform actions including, but not limited to: checking of the address translations (ensuring availability and data residency in physical memory), checking whether the destination of a network packet is local (to another virtual machine within the computing system), or across an external network; and, if local, checking whether either the sending destination VM, receiving VM process, or both, supports emulated hardware accelerated-assist on the same physical system. This optimization, in particular, provides a further optimization in that the packet data checksumming operations may be omitted when sending packets between virtual machines in the same physical system.08-19-2010
20100235833METHODS AND SYSTEMS FOR PROVIDING SECURE IMAGE MOBILITY - A system and method allows a virtual server to be assigned to any of a plurality of physical computes hosts in a networked computing system. Each physical compute host includes a motherboard and a secure management controller that includes a secure memory vault for storing virtual server secure profile data and a BIOS switch for loading a BIOS memory with a BIOS image from the secure memory and controlling access to the BIOS memory by the motherboard. The virtual server secure profile data is transmitted to the secure memory under the exclusive control of a secure infrastructure layer including a common system controller a secure network that is distinct from the network over which the operating system and application stack is loaded.09-16-2010
20100235831Method for dynamic configuration of virtual machine - A set of programs enable the start and the efficient and secure operation of an operating system (OS) installed on a virtual hard disk that is stored on an external storage device. When the external storage device is connected to a host system, a user can start the OS in a virtual machine on the host system. The virtual machine execution is controlled by a virtual machine monitor (VMM) installed on the host system. At startup of the program, the type of VMM installed on the host system is autodetected. Host system parameters that are relevant for an optimal configuration of the virtual machine, such as the amount of available physical memory, are captured. Before launch of the virtual machine the OS installed on the virtual hard disk is dynamically modified to support hardware emulated by the selected VMM. Configuration templates and scripts for supported VMM types are stored on the external storage device. The template or script that corresponds to the autodetected VMM is used to create an optimized virtual machine configuration. Virtual machine configuration parameters that depend upon host settings are adapted. The created virtual machine configuration includes a specific storage configuration: The virtual machine is configured to use three virtual hard disks for system, user, and paging data. The virtual hard disks for system and user data are configured to use copy-on-write (COW) functionality supported by the respective VMM. With the COW configuration the virtual machine's write operations are redirected to a location in a file system on an internally attached storage medium. The non-persistent virtual hard disk used for the page data is entirely stored in the temporary location as an expanding virtual hard disk and is erased after shutdown. If data persistence is required for user and/or system data the respective overlay files are merged with the corresponding virtual hard disk base files on the external storage device after shutdown of the virtual machine. When the program managing the configuration and launch process is closed after shutdown of the virtual machine, all temporary files are deleted. The dynamic COW configuration with deferred, consolidated write operations to the external storage device offers the benefits of improved write performance and security and extended lifetime of the external storage device. The latter is particularly important for flash-memory-based devices with a finite number of sustainable write/erase cycles per storage block.09-16-2010
20100251238FACILITATED INTROSPECTION OF VIRTUALIZED ENVIRONMENTS - Some embodiments provide a system that manages the execution of a software component in a virtualized environment. During operation, the system monitors the execution of the software component from an external location to the virtualized environment. Next, the system assesses an integrity of the software component by comparing the monitored execution to an expected operation of the software component, wherein the expected operation is determined based on source code for the software component. Finally, the system uses the assessed integrity of the software component to facilitate the execution of the software component.09-30-2010
20100251237MANAGING ORPHANED REQUESTS IN A MULTI-SERVER ENVIRONMENT - A request server automatically detects, in response to initialization of the request server, if there are previous generations of requests outstanding for the request server, and if so, immunizes itself against those requests. The request server starts one or more threads that are designed to gather messages associated with requests from previous incarnations of the server and handles those messages without affecting the requestors. While the request server is immunized from earlier generations of requests, the request server is capable of processing new requests.09-30-2010
20100251236In-Process Intermediary To Create Virtual Processes - In one embodiment, the tools and techniques can include intercepting with an intermediary module in a running non-virtual process a request from the running non-virtual process to create a requested non-virtual process. In response to the request being intercepted, an appropriate virtual process corresponding to the requested non-virtual process can be identified. In addition, a virtual environment that is configured to host the virtual process can be prepared and the virtual process can be added to the virtual environment. Finally, the request can be fulfilled with the virtual process.09-30-2010
20090249335Delivery of Virtualized Workspaces as Virtual Machine Images with Virtualized Hardware, Operating System, Applications and User Data - Embodiments deliver an operating system and software applications to a personal computer. The operating system and software applications may be managed and configured at a central location prior to delivery. Data that is created or modified on the personal computer may, from time to time, be stored at the central location. When a user switches from one personal computer to another, any and all of the data may be transferred from the central location to the user's current computer. Additionally, the user's current computer may receive suitable versions of the operating system and applications from the central location. In any case, the operating system and software applications may run with a domain of execution that is provided by a hypervisor. Thus, the operating system and software applications may operate within a virtualized machine, perhaps alongside and in isolation from other operating systems and software applications.10-01-2009
20110131577DATA PROCESSOR - This invention is intended to reduce the hypervisor overhead. In the data processor disclosed herein, when a device driver calls for access to a control register to activate a process of a dedicated controlled peripheral device, the access is handled directly without intervention of processing by the hypervisor. When an interrupt is generated from a dedicated controlled peripheral device, a process is directly initiated by the device driver of the operating system governing the peripheral device without intervention of processing by the hypervisor. By implementing this manner of control in the processor, it becomes possible to carry out peripheral device control without intervention of processing by the hypervisor. Thereby, the hypervisor overhead is alleviated.06-02-2011
20130219388COMPONENT FRAMEWORK FOR VIRTUAL MACHINES - Virtual machines may be configured in a complex computing environment having dependencies among themselves and on the virtualization platform they operate on. The present disclosure formalizes these dependencies by defining a component framework that enables a deployer to know about the dependencies at deployment time and allow the platform to ensure that all required dependencies are satisfied at runtime. Disclosed is a set of Open Virtualization Format (OVF) sections that allow an OVF package to express dependencies to services using OVF meta-data. At deployment time, those OVF sections allow the platform to recognize and honor those dependencies, and at runtime provide the virtual machines with appropriate configuration meta-data.08-22-2013
20110113427VIRTUALIZATION METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE - A secure computing environment that prevents malicious code from “illegitimately” interacting with programs and data residing on the computing platform. While the various embodiments restrict certain programs to operate in a virtualized environment, such operation is transparent to the user from the operational point of view. Moreover, any program operating in the virtualized environment is made to believe that it has full access to all of the computing resources. To prevent a user from unknowingly or inadvertently allowing the program to adversely affect the computer, the user is also presented with “feel” that the program is able to perform all operations in the computing environment.05-12-2011
20100042993Transportation of a Workspace from One Machine to Another in a Virtual Computing Environment without Installing Hardware - The present invention provides methods and systems for transporting a virtual workspace from one computer to another, without installing hardware elements on the second computer. The virtual workspace may be embodied as a set of virtual disk images that facilitate the transportation of the workspace to another computer without installation of hardware elements.02-18-2010
20090288082SYSTEM AND METHOD FOR PERFORMING DESIGNATED SERVICE IMAGE PROCESSING FUNCTIONS IN A SERVICE IMAGE WAREHOUSE - System and method for performing processing functions on a warehoused service image. In one embodiment, the system comprises a service image warehouse for storing at least one service image; means for modifying the at least one service image by performing at least one of a plurality of service image processing functions on a service image contemporaneously with a user's checking the at least one service image out of the service image warehouse; means for checking the modified service image back into the service image warehouse; and a plurality of compute nodes connected to the service image warehouse to which the at least one service image may be deployed. Each of the compute nodes comprises one of a physical machine and a virtual machine host.11-19-2009
20100083247System And Method Of Providing Multiple Virtual Machines With Shared Access To Non-Volatile Solid-State Memory Using RDMA - A processing system includes a plurality of virtual machines which have shared access to a non-volatile solid-state memory (NVSSM) subsystem, by using remote direct memory access (RDMA). The NVSSM subsystem can include flash memory and other types of non-volatile solid-state memory. The processing system uses scatter-gather lists to specify the RDMA read and write operations. Multiple reads or writes can be combined into a single RDMA read or write, respectively, which can then be decomposed and executed as multiple reads or writes, respectively, in the NVSSM subsystem. Memory accesses generated by a single RDMA read or write may be directed to different memory devices in the NVSSM subsystem, which may include different forms of non-volatile solid-state memory.04-01-2010
20110113428SCSI Protocol Emulation for Virtual Storage Device Stored on NAS Device - A virtualization technique, in accordance with one embodiment of the present invention, includes emulating the small computing system interface (SCSI) protocol to access a virtual SCSI storage device backed by a file stored on network attached storage (NAS).05-12-2011
20090328036SELECTION OF VIRTUAL COMPUTING RESOURCES USING HARDWARE MODEL PRESENTATIONS - A user can configure and purchase virtual computing resources in much the same way buyers now configure and purchase physical computers. One embodiment allows a user to select various performance parameters that are commonly known and used by the average user of a personal computer. For example, a baseline computer system can be selected and then customized by choosing performance parameter such as a processor brand name, processor clock speed, random-access memory (RAM) capacity, hard disk drive capacity, etc. The performance parameters can then be used to configure virtual computing resources to achieve a virtual computer that substantially meets the performance parameters.12-31-2009
20090328038Computer System and Device Controlling Method for Computer System - According to one embodiment, a computer system configured such that a virtual machine including a guest operating system running on a source computer connected to a network migrates to a destination computer connected to the network, where the virtual machine then running on the destination computer wherein, the source computer comprises first hardware, a first backend driver running in a first hypervisor running on the first hardware, and configured to directly control the device in association with communication performed via a first interface, the virtual machine comprises a frontend driver configured to run in the guest operating system, and to control the device, the destination computer comprises second hardware, the second hypervisor running on the second hardware, and to manage the virtual machine, and a second backend driver configured to run in the second hypervisor and including a second interface which is the same as the first interface.12-31-2009
20090328033SEAMLESS INTEGRATION OF MULTIPLE COMPUTING ENVIRONMENTS - A unification system for integrating multiple computing environments, which are available for simultaneous use by a single user, into a base environment includes a unification supervisor and a plurality of agents, where each agent is associated with a respective computing environment. The unification supervisor monitors information received from the agents regarding the multiple computing environments, and performs centralized direction of the computing environments in accordance with the received information. The centralized direction serves to incorporate the other computing environments into the base environment, and may be guided by policies designed to provide the user with a unified environment. The unification supervisor also issues instructions to the various agents. Each of the agents provides information regarding a respective computing environment to the unification supervisor, and may also manage the respective computing environment as directed by the unification supervisor. The base environment is typically the user's endpoint work environment.12-31-2009
20080320474DYNAMIC, TEMPORARY RESOURCE POOLS FOR USE IN VIRTUALIZATION - A method of implementing virtualization involves dynamic, temporary resource pools. A virtualizing subsystem is capable of partitioning a plurality of physical resources to create resource pools. The virtualizing subsystem is further capable of creating separate environments that logically isolate applications from each other, and assigning a created separate environment to a created resource pool. A separate environment is configured by defining properties of the separate environment. Configuring the separate environment includes specifying at least one resource pool attribute. When the separate environment is started, a temporary resource pool is created from available physical resources and the separate environment is assigned to the temporary resource pool. The temporary resource pool is created in accordance with the at least one resource pool attribute specified when the separate environment was configured. The temporary resource pool may be destroyed when the separate environment is shutdown.12-25-2008
20090265707OPTIMIZING APPLICATION PERFORMANCE ON VIRTUAL MACHINES AUTOMATICALLY WITH END-USER PREFERENCES - A virtual machine management/monitoring service can be configured to automatically monitor and implement user-defined (e.g., administrator-defined) configuration policies with respect to virtual machine and application resource utilization. In one implementation, the monitoring service can be extended to provide user-customized alerts based on various particularly defined events that occur (e.g., some memory or processing threshold) during operation of the virtual machines and/or application execution. The user can also specify particularly tailored solutions, which can include automatically reallocating physical host resources without additional user input on a given physical host, or moving/adding virtual machines on other physical hosts. For example, the monitoring service can be configured so that, upon identifying that a virtual machine's memory and processing resources are maxed out and/or growing, the monitoring service adds memory or processing resources for the virtual machine, or adds a new virtual machine to handle the load for the application program.10-22-2009
20090204962Saving Unsaved User Process Data In One Or More Logical Partitions Of A Computing System - Methods, systems, and products are disclosed for saving unsaved user process data in one or more logical partitions (‘LPARs’) of a computing system, the computing system having installed upon it a hypervisor for administering the LPARs, each LPAR supporting an operating system, each operating system supporting one or more user processes, that include: detecting, by the hypervisor, a predefined event that the hypervisor interprets as an indication that unsaved data of user processes for at least one LPAR should be saved; transmitting, by the hypervisor in response to detecting the predefined event, a save instruction to the operating system supported by the LPAR; and instructing, by the operating system in response to receiving the save instruction, each user process supported by the operating system to save any unsaved data.08-13-2009
20090172666SYSTEM AND METHOD FOR AUTOMATIC STORAGE LOAD BALANCING IN VIRTUAL SERVER ENVIRONMENTS - Methods and systems for periodically analyzing and correcting storage load imbalances in a storage network environment including virtual machines are described. These methods and systems account for various resource types, logical access paths, and relationships among different storage environment components. Load balancing may be managed in terms of input/output (I/O) traffic and storage utilization. The aggregated information is stored, and may be used to identify and correct load imbalances in a virtual server environment in order to prevent primary congestion and bottlenecks.07-02-2009
20090204964Distributed trusted virtualization platform - A platform architecture shifts the networked computing paradigm from PC+Network to a system using trusted mobile internet end-point (MIEP) devices and cooperative agents hosted on a trusted server. The MIEP device can participate in data flows, arbitrate authentication, and/or participate in implementing security mechanisms, all within the context of assured end-to-end security. The MIEP architecture improves platform-level capabilities by suitably (and even dynamically) partitioning what is done at the MIEP nodes, the network, and the server based infrastructure for delivering services.08-13-2009
20090320020Method and System for Optimising A Virtualisation Environment - A mechanism for advising users on how to optimize their virtualisation infrastructure to minimise their software costs. There are two aspects to solution. The first aspect considers the distribution of software in the virtualised environment. The second aspect determines the proper licence types (e.g., sub-capacity or full capacity) for the virtualised environment, based on the usage of the software products therein.12-24-2009
20090178037ACCESSING A NETWORK - An information handling system (IHS) includes a hypervisor and a plurality of virtual machines (VMs). The hypervisor includes hypervisor network information. Each of the VMs includes a virtual processor and a virtual memory that is coupled to the virtual processor. The virtual memory includes VM network information and computer readable instructions to synchronize the VM network information with the hypervisor network information.07-09-2009
20090113420SYSTEM AND METHOD FOR UTILIZING A VIRTUALIZED COMPUTE CLUSTER AS AN EXECUTION ENGINE FOR A VIRTUAL MACHINE OF A STORAGE SYSTEM CLUSTER - A system and method employs one or more clients of a virtualized compute cluster as an execution engine for a portion of a storage operating system implemented as a virtual machine on a storage system node of a storage system cluster. If there is processing bandwidth of a client that is not fully utilized and the load on the storage system node is high, the portion of the storage operating system is ported to the client of the compute cluster in a manner that externally distributes the storage architecture from the storage system cluster. Advantageously, the processing performance of the storage system cluster is improved by, among other things, offloading some of the network processing load from the storage system node.04-30-2009
20090113426VIRTUAL COMPUTER SYSTEM MANAGING SCHEDULE FOR ALLOCATING CPU TO GUEST OSes AND GUEST OS SCHEDULING METHOD - According to one embodiment, a virtual machine manager (VMM) virtualizes hardware including a CPU to construct a plurality of virtual machines. A plurality of guest OSes are executed on the respective virtual machines. A detector included in VMM detects a change in the operating frequency of CPU. A scheduler is included in VMM. If a change in operating frequency is detected, and the operating frequency decreases below a prescribed frequency, the scheduler performs scheduling so as to increase a time for which the CPU is to be allocated to one or more predetermined particular guest OSes of the plurality of guest OSes.04-30-2009
20100223614Mechanism for Implementation of Endpoints as JMX MBeans in an Integrated Media and JAVA EE Application Server - In one embodiment, a mechanism for implementation of endpoints as Java™ Management Extensions (JMX) MBeans in an integrated media and Java™ Enterprise Edition (JAVA EE) application server is disclosed. In one embodiment, a system includes an integrated application server including a media server and Java™ Enterprise Edition (JAVA EE) deployed in a single Java™ virtual machine (JVM), and one or more endpoints in the media server deployed as Java Management Extension (JMX) Mbeans.09-02-2010
20090150885APPLIANCES IN VIRTUAL COMPUTING ENVIRONMENTS - Methods, systems, and apparatus, including computer program products, for reconciling data on a set of virtual machines, generating a virtual machine snapshot of the set of shadow virtual machines, identifying a set of virtual disks and containers of the set of virtual disks, wherein the set of virtual disks operates as storage for the set of shadow virtual machines, producing a set of storage snapshots of the containers of the set of virtual disks, identifying data that has changed within the set of storage snapshots, and reconciling the data back to when the virtual machine snapshot was generated. Using the reconciled data to test a computer application having a first instance, generate a cloned instance of the application, wherein the cloned instance sources storage shared with the first instance, interact with the cloned instance to cause a result without interacting with the first instance, and monitor the result.06-11-2009
20120246647MANAGING SOFTWARE CONTENT IN VIRTUAL DESKTOP ENVIRONMENTS - Software is managed in a virtual desktop environment by discovering virtual appliances contained in the virtual desktop environment, and for each virtual appliance discovering the virtual machines belonging to the virtual appliance. Software is further managed by discovering the standalone virtual machines comprised in the virtual desktop environment, and for each discovered virtual machine, introspecting each virtual machine to detect non-virtual applications and virtualized applications running in the virtual machine. For each detected application, identification is made of the operating system on which the application is running09-27-2012
20110131573Centralized Computer Network Virtualization Environment - A method and system include compatibly interfacing a suitably adapted central switch in a computer network virtualization environment to one or more user-end peripheral device(s) to dispense with a need for a user-end thin client. The method and system also include appropriately routing a data associated with a direct and exclusive communication between a virtual machine on a host server including a number of virtual machines and the one or more user-end peripheral device(s) using the central switch.06-02-2011
20110131572CONTROLLING PERMISSIONS IN VIRTUALIZATION ENVIRONMENT USING HIERARCHICAL LABELING - A host controller associates each virtual machine with at least one label from a hierarchy of labels, where each label represents a distinct virtual machine parameter. The host controller also associates a user with one or more roles and with one or more labels from the hierarchy of labels, where each role defines at least one action permitted to be performed with respect to virtual machines. The host controller further facilitates control over user actions pertaining to virtual machines based on the roles and the labels associated with the user.06-02-2011
20110131569Mechanism for Load Balancing in a Memory-Constrained Virtualization System - A mechanism for load balancing in a memory-constrained virtualization system is disclosed. A method of embodiments of the invention includes determining that one or more collected metrics have triggered a load balancing operation of a host controller machine, wherein the one or more collected metrics include memory-related metrics of one or more host machines managed by the host controller machine and of an overall system of the host controller machine. The method further includes selecting a host machine of the one or more host machines to migrate a virtual machine (VM) from as part of the load balancing operation and selecting a VM of a plurality of VMs hosted by the selected host machine to load balance migrate from the selected host machine, wherein the selecting the host machine and the selecting of the VM includes consideration of the memory-related metrics of the host machine and the VM.06-02-2011
20120246646METHOD, SYSTEM AND APPARATUS FOR CALCULATING CHARGEBACK FOR VIRTUALIZED COMPUTING RESOURCES - Method, system and apparatus for calculating chargeback for virtualized computing resources in a virtualized environment allowing efficient use of computing resources, improving costs recovery including fixed and over-usage cost of utilizing computing resources.09-27-2012
20120246645METHOD FOR MANAGING VIRTUAL MACHINE, INFORMATION PROCESSING APPARATUS, AND MEDIUM FOR VIRTUAL MACHINE MANAGEMENT PROGRAM - A method of managing a virtual machine by an information processing system including one or more information processing apparatuses, the method includes: comparing one or more files used for operation of the virtual machine with one or more template files; and generating configuration information indicating a setting state of the virtual machine based on a result of the comparing.09-27-2012
20120246642Management of File Images in a Virtual Environment - A method, system, and computer program product provides effective management and deployment of image files within a Virtual Input/Output (I/O) Server (VIOS) cluster. An Image Management (IM) utility utilizes a discovery process to establish connections with objects in order to manage these objects. Following discovery of an ICP client, the IM utility enables creation of a virtual server partition and initiates the importing of a captured image to a VIOS cluster Storage Pool (SP). The IM utility creates logical units (LUs) within the Image Management Fileset (IMF) for each file within the captured image. The IM utility maps the LUs to the VIOS Cluster SP using unique image file handles. The IM utility configures the new storage that comprises the created LUs. The IM utility copies image files to the appropriate storage device/LU. When import/copy of the image is completed, the IM utility activates the virtual server partition.09-27-2012
20090113425Transparent Memory-Mapped Emulation of I/O Calls - A virtual-machine-based system provides a mechanism to implement application file I/O operations of protected data by implementing the I/O operations semantics in a shim layer with memory-mapped regions. The semantics of these I/O operations are emulated in a shim layer with memory-mapped regions by using a mapping between a process' address space and a file or shared memory object. Data that is protected from viewing by a guest OS running in a virtual machine may nonetheless be accessed by the process.04-30-2009
20090113423Interchangeable Guest and Host Execution Environments - Embodiments of the present invention include methods, systems, apparati, computer program products and other tangible realizations of techniques to support interchange of role for guest and host operating system instances executed (or executable) within a virtualization system. In particular, one embodiment of the present invention is a method operating a computer system, the method comprising: (a) selecting a first operating system image from amongst plural operating system images accessible to a hardware machine; (b) booting the hardware machine using the first operating system image and executing code thereof as a host operating system; (c) providing a virtualization environment and instantiating therein a virtual machine using configuration data descriptive of a particular system virtualized, wherein the configuration data is stored separately from the first operating system image; and (d) loading from a second one of the operating system images, a guest operating system and executing code thereof in connection with the instantiated virtual machine.04-30-2009
20090113422DYNAMIC ALLOCATION OF VIRTUAL MACHINE DEVICES - Systems and methods for efficient dynamic allocation of virtual machine resources are described herein. At least some illustrative embodiments include a method including executing virtual machine software on a real computer system (the virtual machine software including a hypervisor and a virtual machine including a plurality of virtual devices), associating each of the plurality of virtual devices with a unique subset of a real device within the real computer system, the hypervisor sending to virtual firmware within the virtual machine a request to eject that requires ejecting from the virtual machine one or more of the plurality of virtual devices, a virtual device resource object within the virtual firmware forwarding the request to eject to a virtual device resource driver executing on the virtual machine, and the virtual device resource driver causing individual ejections of each of the one or more virtual devices in response to the forwarded request.04-30-2009
20090113421USING SMART OBJECTS IN A VIRTUAL UNIVERSE TO CONSERVE COMPUTING RESOURCES - Described herein are processes and devices that use smart objects in a virtual universe to conserve computing resources. One of the devices described is a virtual resource conserver. The virtual resource conserver reads data that indicates that a resource conservation setting is to be selected for a virtual object in a virtual universe. The virtual resource conserver selects the resource conservation setting for the displayed virtual object. The resource conservation setting comprises data that describes a displayable characteristic about the virtual object, which can be reduced in display quality. The virtual resource conserver reduces the display quality of the virtual object in accordance with the selected resource conservation setting, thus conserving computing resources.04-30-2009
20120246641Method for Switching Between Virtualized and Non-Virtualized System Operation - A method performed by an embedded system controlled by a CPU and capable of operating as a virtualized system under supervision of a hypervisor or as a non-virtualized system under supervision of an operating system, is provided. The embedded system is executed in a normal mode if no execution of any security critical function is required by the embedded system, where the normal mode execution is performed under supervision of the operating system. If a security critical function execution is required by the embedded system, where protected mode execution is performed under supervision of the hypervisor, the operating system is switching execution of the embedded system from normal mode to protected mode, by handing over the execution of the embedded system from the operating system to the hypervisor, and when execution of the security critical function is no longer required by the embedded system is switched from protected mode to normal mode, under supervision of the hypervisor.09-27-2012
20120246640Replication of Machine Instances in a Computing Environment - Disclosed are various embodiments for replication of machine instances in a computing environment. A clone machine instance is instantiated from a machine image associated with an original machine instance. A stored execution state of the original machine instance is applied to the clone machine instance. At least a portion of a series of stored events received by the original machine instance is applied to the clone machine instance.09-27-2012
20100223615Method and apparatus for distributed processing - There is provided a distributed data processing system comprising: an application server; and a multiplicity of computers. Each computer has a network connection to the application server and is operative to execute at least one host process. The network connection opens when the computer falls idle. The application server is operative to transmit a VM, a data processing algorithm and data to the computer on detecting an open network connection. The VM is operative to execute a virtual process wherein said data are processed by said algorithm and processed data from the virtual process are transmitted to the server. The network connection is configured to close and the VM is configured so as to be destroyed when a host process interrupts the virtual process.09-02-2010
20100223613PER PROCESS VIRTUAL MACHINES - A system and method for isolating processes executing within a computing device. A process is loaded into a virtual machine operating under the control of a hypervisor communicatively interfaced with an operating system kernel. A subset of an application programming interface (API) is exposed to the virtual machine enabling the process to interface with the operating system kernel via the subset of the API. The process is then executed in the virtual machine.09-02-2010
20100223612VIRTUALIZATION OF STORAGE BUFFERS USED BY ASYNCHRONOUS PROCESSES - The amount of host real storage provided to a large guest storage buffer is controlled. This control is transparent to the guest that owns the buffer and is executing an asynchronous process to update the buffer. The control uses one or more indicators to determine when additional host real storage is to be provided.09-02-2010
20100223611REDUCING THE LATENCY OF VIRTUAL INTERRUPT DELIVERY IN VIRTUAL MACHINES - The latency of virtual interrupt delivery in virtual machines is reduced by normalizing and exposing the virtual interrupt routing information of each VM to a privileged domain such as the VMkernel in an organized manner to enable virtual interrupt delivery that minimizes the number of VCPU hops. A computer implemented method of processing the virtual I/O request comprises receiving the virtual I/O request, responsive to completing a physical I/O corresponding to the virtual I/O request, referring to a virtual CPU set including information on a destination virtual CPU designated by the guest operating system for handling a virtual interrupt corresponding to the virtual I/O request, and generating the virtual interrupt corresponding to the virtual I/O request to the destination virtual CPU determined by referring to the virtual CPU set.09-02-2010
20120246638FORECASTING BASED SERVICE ASSIGNMENT IN CLOUD COMPUTING - A mechanism is provided for reassigning virtual machines to resources in a computing environment. Monitoring data is collected about virtual machine request history and resource usage in a form of time series for measured indicators. Forecasted time series are computed for the measured indicators over a time window by utilizing time series forecasting. A new assignment is computed by executing a snapshot based assignment algorithm on the forecasted time series. The new assignment is used for reassignment of virtual machines on the resources in the computing environment.09-27-2012
20120246637Distributed load balancer in a virtual machine environment - In one embodiment, a method includes receiving a request packet at a flow director in communication with a plurality of servers, each server comprising a virtual load balancer module and one or more virtual machines and forwarding the request packet to one of the virtual load balancer modules at one of the servers. The virtual load balancer module is configured to select one of the virtual machines to receive the request packet and transmit a response packet. The response packet is transmitted without passing through the flow director. An apparatus for load balancing in a virtual machine environment is also disclosed.09-27-2012
20120144391PROVISIONING A VIRTUAL MACHINE - An information processing system which includes: a storage controlling module in any of computer apparatuses that runs a clone origin virtual machine, where the storage controlling module controls: booting up the clone origin virtual machine when the clone origin virtual machine is detached from a virtual network interface; acquiring running state information indicating a running state of the clone origin virtual machine; and storing an image including the running state information and virtual disk information in a storage apparatus; and a boot controlling module in any of computer apparatuses that creates a clone virtual machine, where the boot controlling module controls: resuming at least one of the clone virtual machines with the image when each of the clone virtual machines is detached from the virtual network interface; and attaching the virtual network interface to the at least one clone virtual machine.06-07-2012
20080244573METHOD AND APPARATUS FOR MANAGING PAGE TABLES FROM A NON-PRIVILEGED SOFTWARE DOMAIN - A virtual machine monitor; and an executive virtual machine to manage page tables in place of the virtual machine monitor are described. Other embodiments may be described and claimed.10-02-2008
20110119671On-The-Fly Replacement of Physical Hardware With Emulation - Various aspects are disclosed herein for replacing the hardware backing the memory locations associated with a virtual machine with a backing mechanism. The backing mechanism may have the memory locations appear to contain data convenient to the driver in the virtual machine, typically containing what the hardware would have returned if the hardware had been read from. The data image being returned from the memory locations may travel with the virtual machine even if the virtual machine moves to a different physical machine that does not contain hardware equivalent to the hardware that was recently removed from the virtual machine.05-19-2011
20110119669HYPERVISOR FILE SYSTEM - In general, the present invention provides a computer-implemented hypervisor file system (HVFS) comprising (among other things): a HVFS Manager, a Source File System Implementation, Hypervisor API, and HVFS Driver implemented in conjunction with a set (e.g., one or more) of virtual machines. Running a virtual machine on top of complex software systems like hypervisors allows the virtual machine to be presented with virtual storage devices which operate in the file system abstraction layer, instead of the block device layer traditionally presented by hardware. Doing so allows the file system abstraction to be implemented in the hypervisor, and not in the individual virtual machines, giving the hypervisor much greater access and control over the file system elements used by virtual machines, as well as giving it new capabilities such as sharing file system elements across virtual machines.05-19-2011
20110119668MANAGING VIRTUAL HARD DRIVES AS BLOBS - Cloud computing platforms having computer-readable media that perform methods to manage virtual hard drives as blobs are provided. The cloud computing platform includes fabric computers and blob stores. The fabric computers execute virtual machines that implement one or more applications that access virtual hard drives. The data in the virtual hard drives is accessed, via a blob interface, from blobs in the blob stores. The blob stores interface with a driver that translates some application input/output (I/O) requests destined to the virtual hard drives to blob commands when accessing data in the virtual hard drives.05-19-2011
20110119667MONITORING SPIN LOCKS IN VIRTUAL MACHINES IN A COMPUTING SYSTEM ENVIRONMENT - Methods and apparatus involve monitoring spin locks for guest devices. Fully virtualized guests have multiple virtual processors configured under the scheduling control of a hypervisor on a physical hardware platform. The hypervisor posts On CPU and CR05-19-2011
20110119665Switching between direct mode and indirect mode for virtual machine I/O requests - A first virtual machine is implemented on one or more computing devices to generate input/output (I/O) requests to a hardware device. A second virtual machine is also implemented on the computing devices. A mechanism is to switch between a direct mode and an indirect mode without switching between a first context and a second context of the hardware device. In the direct mode, the I/O requests generated by the first virtual machine are to be sent to the hardware device without being redirected to the second virtual machine. In the indirect mode, the I/O requests generated by the first virtual machine are to be redirected to the second virtual machine for processing. The second virtual machine is to, after processing the I/O requests redirected to the second virtual machine, send the I/O requests to the hardware device.05-19-2011
20100306771METHOD AND APPARATUS FOR DISPLAY DEVICE CONFIGURATION IN A VIRTUAL MACHINE ENVIRONMENT - A method and system for display device configuration in a VM environment are disclosed. In one embodiment, the method includes determining one or more display devices of a client and transmitting client display information to a host running one or more VMs. Further, a notification is received by the client from the host indicating that display settings of the VM were configured based on the client display information.12-02-2010
20090037908PARTITION ADJUNCT WITH NON-NATIVE DEVICE DRIVER FOR FACILITATING ACCESS TO A PHYSICAL INPUT/OUTPUT DEVICE - Dedicated access is provided to a physical input/output (I/O) device which is non-configurable by an initiating logical partition. Access is established by: initiating, by the logical partition, creation of a partition adjunct; invoking a hypervisor of the data processing system to instantiate the partition adjunct with resources donated from the initiating logical partition, the donated resources including a donated virtual address space of the logical partition and the physical I/O device; creating, by the hypervisor, the partition adjunct and assigning the donated virtual address space and donated physical I/O device to the created partition adjunct; and interfacing, by the hypervisor, the logical partition and the created partition adjunct, the interfacing including providing the logical partition with a virtual I/O device which replaces the donated physical I/O device, and which is configurable by the logical partition.02-05-2009
20090037905METHOD FOR TRANSFERRING INVENTORY BETWEEN VIRTUAL UNIVERSES - The present invention provides a computer implemented method for transferring an item from a source virtual universe to a target virtual universe. A target virtual universe host opens a session between a source virtual universe host and itself. Next, it determines that the source virtual universe host is authorized to transmit the item to the target virtual universe host. Next, it receives a command from a client computer to transfer the item from the source virtual universe host to the target virtual universe host. Next, it receives item data in the target virtual universe host.02-05-2009
20090119664Multiple virtual machine configurations in the scalable enterprise - A system and method are disclosed for using directory services to manage resources in a virtual execution environment. A directory repository is populated with resource, administration, roles, policy, and service level agreement (SLA) objects. A service request is received by a virtual machine manager (VMM) administrator, which determines its requirements. The directory repository is queried with a directory service to identify available resources to fulfill the service request. The service request is routed to the VMM of the virtual machine (VM) host comprising the available resources. If an active VM comprises the available resources, then its roles, policy, and SLA objects are retrieved from the directory repository. The objects are then used to respectively determine if the service request has sufficient authentication and authorizations, if the VM's configuration meets the service request's resource requirements, and if service levels requirements can be maintained. If so, then the service request is fulfilled by the target VM. If the resources are available, but not on a currently executing VM, then an administration object is created to execute a new VM and roles, policy, and SLA objects are created that match the requirements of the service request. The newly created objects are then stored in the directory repository and the service request is fulfilled by the new VM.05-07-2009
20090070761System and method for data communication with data link backup - According to one embodiment of the invention, there is provided a data communication device for processing a data stream, including a runtime virtual machine (VM) and a mirror VM. The two VMs are independently running on the same physical hardware of the data communication device. The runtime VM is operable for receiving the data stream and establishing a plurality of data links to process the data stream. The mirror VM is operable for backing up the data links established by the runtime VM. The data stream is switched from the runtime VM to the mirror VM for processing if a predetermined condition occurs in the runtime VM.03-12-2009
20100306769METHOD AND AN APPARATUS TO MIGRATE FUNCTIONALITIES ACROSS SYSTEMS - Some embodiments of a method and an apparatus to migrate functionalities across systems have been presented. In one embodiment, a system call from an application running on a first system is detected. The first system has a first version of an operating system, but the system call requires a functionality that is not available in the first version of the operating system. The functionality is available in a second version of the operating system running on a second system. Therefore, the system call is reflected from the first system to the second system.12-02-2010
20100306768Methods for Managing Performance States in an Information Handling System - An information handling system (IHS) is disclosed wherein the system includes a processor associated with at least one performance state (P-state), and a memory in communication with the processor. The memory is operable to store a virtualization software and a basic input/out system (BIOS). The BIOS is configured to report a parameter of the P-state to the virtualization software. In addition, the BIOS is configured to transition the processor into a desired P-state. A method for managing performance states in an information handling system (IHS) is further disclosed wherein the method includes providing a basic input/output system (BIOS) in communication with a processor, the processor associated with an at least one performance state (P-state) and reporting a parameter of the at least one P-state to a virtualization software via the BIOS. The method further includes transitioning the processor to a desired P-state via the BIOS.12-02-2010
20110126196CORE-BASED VISUALIZATION - Techniques for providing core-based virtualization based upon cores provided by one or more processors of a system. A device such as a network device comprising multiple processor cores provides for core-based virtualization.05-26-2011
20130132944Methods and Apparatus for Binding Applications to a Cloud Computing Environment - Methods and apparatus for binding an application to a virtual computing instance within a multi-tenant virtual computing environment. In one embodiment, an application binding system may include, among other elements, creating a dependence between at least some functionality of an application to a kernel-level component within the virtual computing instance.05-23-2013
20130132945VIRTUAL MACHINE UPDATES - Various systems, processes, and products may be used to update virtual machines. In particular implementations, a system, process, and product for updating virtual machines may include the ability to determine whether a change to a portion of an operating system for a virtual machine is available and identify a virtual machine using the operating system. The system, process, and product may also include the ability to determine when the virtual machine is modifiable and update the portion of the operating system for the virtual machine when it is modifiable.05-23-2013
20130132946SYNCHRONIZED FAILOVER FOR ACTIVE-PASSIVE APPLICATIONS - The present invention extends to methods, systems, and computer program products for synchronized active-passive application failover. A data connection to a single data source can be used as a synchronizations point. Interoperating instance side and data source side algorithms coordinate to transition a passive instance to an active instance within a specified period of time when a prior active instance fails. An active-passive controller can operate as an active-active module within an active-active environment to provide active-passive failover to active-passive modules. Application virtual names can be mapped to application instance electronic addresses to assist external modules in establishing application connections to active-passive applications.05-23-2013
20130132948PERSONAL CLOUD COMPUTING AND VIRTUAL DISTRIBUTED CLOUD COMPUTING SYSTEM - An exemplary cloud computing apparatus includes at least one compute device controller. A digital data storage of the controller includes a chief management virtual machine program for running a chief management virtual machine. A processor associated with the digital data storage is configured to run the chief management virtual machine. The chief management virtual machine is useful to control first user communications between at least one first user and a first virtual machine and to control second user communications between at least one second user and a second virtual machine. The first virtual machine and the second virtual machine are run by at least one compute resource distinct from the compute device controller. The chief management virtual machine is also useful for isolating the first user communications from the second user communications.05-23-2013
20130132949MECHANISM FOR VIRTUAL DEVICE INTERRUPT HINTING IN A VIRTUALIZATION SYSTEM - A mechanism for virtual device interrupt hinting in virtualization systems is disclosed. A method of the invention includes receiving a virtual device event from a host central processing unit (CPU) of a multi-CPU host machine, the virtual device event directed to a virtual machine (VM) managed by the hypervisor on the host machine, identifying one or more virtual CPUs (VCPUs) of the VM that are running on the host CPU, and providing the identified one or more VCPUs of the VM as a hint to the VM, the hint sent to the VM with the virtual device event, wherein the VM programs a virtual device associated with the event to deliver interrupts to a VCPU of the VM identified in the hint.05-23-2013
20130132950AUTOMATION OF VIRTUAL MACHINE INSTALLATION BY SPLITTING AN INSTALLATION INTO A MINIMAL INSTALLATION AND CUSTOMIZATION - A server computing system receives a request to instantiate a virtual machine in a cloud. The request is associated with a template that specifies the operating system and software packages to be installed on the virtual machine. The system splits the installation of the virtual machine into creating a minimal operating system installation, customizing the minimal installation, and generating a disk image of the customized minimal installation. The system creates a minimal installation of the specified operating system, executes the minimal operating system in a virtual machine guest, and customizes the minimal installation of the operating system as specified in the template. The system generates a virtual machine disk image of the customized minimal installation that is a cloud generic virtual machine disk image an is configurable to instantiate the virtual machine in clouds provided by different cloud providers.05-23-2013
20130132951Network Port Profile Representation in Open Virtualization Format Package - A method for providing network port profiles in open virtualization format includes embedding content of the network port profiles in an open virtualization format file, referencing the network port profiles inside an open virtualization format package, or referencing the network port profiles outside of the OVF package.05-23-2013
20130132952Network Port Profile Deployment in a Pre-Provisioned or Dynamically Provisioned Network Infrastructure - A system for open virtualization format includes a virtualization platform to run a virtual machine and a network infrastructure to accommodate the virtualization platform. The network infrastructure includes a deployed network port profile associated with the virtual machine.05-23-2013
20130132954Image Deployment in a Cloud Environment - The invention relates to a mechanism for image deployment in a cloud environment comprising at least two hosts coupled to at least one disk, and at least one virtual machine created in at least one host of the at least two hosts by deploying an additional image to the at least one disk. The method is characterized in that the at least one host for deploying an additional image is selected according to a deployment factor representing a communality relationship between one or more existing base images in the cloud environment and the additional image.05-23-2013
20130132956VIRTUAL IMAGE OVERLOADING FOR SOLUTION DEPLOYMENT - An instantiable virtual machine part definition and part configuration metadata of an instantiable virtual machine capable of deployment as at least a portion of a service solution is received from a master overloaded virtual image. A determination is made as to whether to configure the instantiable virtual machine to reuse, using virtual image sharing, at least one portion of the master overloaded virtual image during deployment of the instantiable virtual machine within a service solution. A minimal executable virtual machine part core of the instantiable virtual machine that reuses, using the virtual image sharing, the at least one portion of the master overloaded virtual image during execution is identified. A minimal executable virtual machine part instantiable from the identified minimal executable virtual machine part core as the instantiable virtual machine is configured to utilize, using the virtual image sharing, a shared resource within the master overloaded virtual image during execution.05-23-2013
20100306774Instant-On Computing System - A hypervisor loads a saved virtual machine image to provide an instant-on computing environment. A request may be received to switch from the instant-on computing environment to a native operating system. In response to such a request, the native operating system is executed and a hypervisor is executed on the native operating system. The saved virtual machine image is then loaded by the operating system based hypervisor to thereby provide the instant-on computing environment in conjunction with execution of the native operating system.12-02-2010
20100306773Instant on Platform - A method and apparatus allows multiple computer operating systems (OS) and/or personalities to run concurrently. An instant-on platform includes a resource management service, a caching service, a profile manager, a network stack which provides TCP/IP communication to the OS, and at least one appliance. The instant-on platform can be placed in the path of network and disk traffic between said user OS and actual system hardware. User selectable profiles and personalities are also provided.12-02-2010
20100306765METHODS AND SYSTEMS FOR ABSTRACTING CLOUD MANAGEMENT - A cloud management system can utilize an abstraction library for management of clouds. The abstraction library can abstract out the differences between different cloud management schemes. The cloud management system can utilize the abstraction library to perform various processes associated with the virtual machines regardless of the cloud management scheme of the virtual machine. The cloud management system can format, configure, and convert virtual machines to the cloud management scheme of the cloud in which the virtual machine will be instantiated. The cloud management system can utilize the abstraction library to enable communication with virtual machines that are formated according to a different cloud management scheme than the communication.12-02-2010
20100306763Virtual Serial Concentrator for Virtual Machine Out-of-Band Management - A system and method for providing dynamic access through which I/O access such as serial ports, and thus administrators who manage servers, can see, obtain health, state or interact concurrently with multiple VMs on a given physical server. More specifically, in certain embodiments, the system and method includes a dynamic port count virtual serial concentrator coupled with a virtualization device to map emulated serial ports to virtual machines along with a remote plugin that provide dynamic concurrent serial access to many virtual machine serial consoles under a secure and collaborative friendly environment.12-02-2010
20100306770METHOD AND APPARATUS FOR SWAPPING VIRTUAL MACHINE MEMORY - A method and system for swapping memory of a virtual machine are described. In one embodiment, virtual machines are hosted by a server and accessed by remote clients over a network. The server assigns first storage and second storage to each virtual machine, where the first storage is designated for swap memory of a respective virtual machine and the second storage is designated for persistent data of a respective virtual machine. The server monitors events pertaining to the virtual machines. Upon detecting a predefined event pertaining to one of the virtual machines, the server causes the contents of the first storage to be wiped out.12-02-2010
20100306772VIRTUAL SOLUTION COMPOSITION AND DEPLOYMENT SYSTEM AND METHOD - A method and information processing system are provided for creating a virtual part and for composing and deploying a virtual solution with one or more virtual parts. The virtual part includes: a virtual image including a set of compatible software components; a set of configurability points, each configurability point defining at least one parameter of the virtual part that is configurable; a set of virtual ports, wherein each virtual port indicates at least one of a set of virtual parts required by the virtual part and a set of virtual parts that are compatible with the virtual part; and a set of configuration scripts adapted to reconfigure the virtual image.12-02-2010
20100306764TECHNIQUES FOR MANAGING VIRTUAL MACHINE (VM) STATES - Techniques for managing virtual machine (VM) states are provided. Applications executing within a processing context of a VM communicate outside that processing context with a hypervisor or VM Monitor (VMM) to have the hypervisor perform host operations for the VM.12-02-2010
20100306767METHODS AND SYSTEMS FOR AUTOMATED SCALING OF CLOUD COMPUTING SYSTEMS - A cloud management system can receive rules for altering the virtual machines based on demands on the virtual machines and/or computing resources supporting the virtual machines. The cloud management system can receive data from the internal monitoring agents and/or external monitoring agents and to determine when the conditions of the rules are met. Once the conditions are met, the cloud managements system can take the appropriate action to alter the instantiated virtual machines.12-02-2010
20100306766ADDING ASPECTS TO VIRTUAL MACHINE MONITORS - A software generated trap is received by a virtual machine monitor running on a computer system, wherein the software generated trap was caused by a process or a guest operating system of a virtual machine hosted by the computer system. The virtual machine monitor performs a service in response to receiving the software generated trap.12-02-2010
20130139152CLOUD PROVISIONING ACCELERATOR - High level characteristics are extracted from a virtual machine provisioning request stream for a cloud computing environment. A plurality of prediction models are generated for a plurality of different types of virtual machines. A regression-correlation ensemble is applied to appropriate ones of the prediction models to predict future virtual machine demand for the cloud computing environment.05-30-2013
20130139154MODIFYING AN OS INSTALLER TO ALLOW FOR HYPERVISOR-SPECIFIC ADJUSTMENT OF AN OS - An installer installing an operating system on a host computer system detects that the operating system is to be run under a hypervisor, and causes at least one configuration parameter of the operating system to be adjusted based on the hypervisor. A migration tool migrating a virtual machine from one hypervisor to another hypervisor, identifies the types of the two hypervisors, the operating system used by the virtual machine, and causes at least one configuration parameter of the operating system to be adjusted based on the target hypervisor.05-30-2013
20130139155Adjustment During Migration to a Different Virtualization Environment - An installer installing an operating system on a host computer system detects that the operating system is to be run under a hypervisor, and causes at least one configuration parameter of the operating system to be adjusted based on the hypervisor. A migration tool migrating a virtual machine from one hypervisor to another hypervisor, identifies the types of the two hypervisors, the operating system used by the virtual machine, and causes at least one configuration parameter of the operating system to be adjusted based on the target hypervisor.05-30-2013
20130139156APPLICATION-DRIVEN SHARED DEVICE QUEUE POLLING IN A VIRTUALIZED COMPUTING ENVIRONMENT - Methods and systems for application-driven polling of shared device queues are provided. One or more applications running in non-virtualized or virtualized computing environments may be adapted to enable methods for polling shared device queues. Applications adapted to operate in a polling mode may transmit a request to initiate polling of shared device queues, wherein operating in the polling mode disables corresponding device interrupts. Applications adapted to operate in a polling mode may be regulated by one or more predefined threshold limitations.05-30-2013
20130139157APPARATUS AND METHOD FOR AUTOMATIC PARA-VIRTUALIZATION OF OS KERNEL - An automatic para-virtualization apparatus of an OS kernel is provided. The automatic para-virtualization apparatus includes a kernel profiler that detects profile information from a native OS kernel, and a virtualization unit that automatically generates a para-virtualized OS kernel that operates on a para-virtualization virtual machine monitor by combining the native OS kernel and the profile information.05-30-2013
20130139159APPARATUS AND METHOD THEREOF FOR EFFICIENT EXECUTION OF A GUEST IN A VIRTUALIZED ENVIRONMENT - A method for efficient execution of a guest in a virtualized computing environment is provided. The method comprises causing an execution of at least one virtual machine on a computing hardware, the virtual machine executes a hypervisor in a first security ring; and causing an execution of a single guest program on one of the at least one virtual machines, the single guest program comprises a kernel being executed in the first security ring and at least one application being executed in a second security ring.05-30-2013
20130139161VIRTUAL MACHINE SYSTEM, MEMORY MANAGEMENT METHOD, MEMORY MANAGEMENT PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A virtual machine system for duplicating a first virtual machine to generate one or more second virtual machines is provided with a management unit that manages each memory area accessible by the first virtual machine so that after generation of the second virtual machines, every virtual machine is permitted to perform a read access to the memory area until any virtual machine performs a write access to the memory area, a determination unit that determines whether each memory area is a specific memory area, a detection unit that detects, after detecting a write access to a specific memory area, that a virtual machine other than the virtual machine performing the write access is attempting access to the specific memory area, and a memory allocation unit that acquires and allocates a new memory area to the virtual machine detected to be attempting access to the specific memory area.05-30-2013
20100325629Apparatus, System and Method for a User Profiled-Based OS for Mobile Devices - A tile bar for use in association with a graphical user interface associated with at least one operating system is disclosed. The tile bar includes a plurality of tiles indicative of one or more of an application, a file, a window, a data, and an outcome, an identifying tile among the plurality of tiles, wherein the identifying tile is uniquely indicative of at least one of a user preference and user information of a user logged in to the graphical user interface, and wherein the identifying tile is adjacent to at least one tile of the plurality of tiles, and a scroll for presenting ones of the plurality of tiles not immediately viewable to the user. The tile bar further includes each of said plurality of tiles comprises at least one of rotating about an axis, focused by a magnifying cursor, increased vividness, and blurring upon placement of a cursor provided by the graphical user interface at a predetermined proximation to each tile.12-23-2010
20110131576VIRTUAL MACHINE MIGRATION MANAGING METHOD, COMPUTER USING THE METHOD, VIRTUALIZER USING THE METHOD AND COMPUTER SYSTEM USING THE METHOD - In a system including a plurality of physical machines to execute virtual machines (VM06-02-2011
20130145365METHOD FOR MANAGING GREEN POWER OF A VIRTUAL MACHINE CLUSTER - A method for managing green power determines if how many physical machines should run or be shut off with the gross occupied resource weight ratio of the virtual machine cluster. The standby physical machine in the non-running physical machines is elected and woke up to join as one of the running physical machines; one of the running physical machines is elected as a migration physical machine with the virtual machines therein being moved to other running physical machines, and then shut off. The resource allocation process is conducted to distribute loads of the running physical machines such that the total numbers of the running physical machines are capable of being dispatched flexibly to achieve the object of green power management.06-06-2013
20130145367VIRTUAL MACHINE (VM) REALM INTEGRATION AND MANAGEMENT - A hardware and operating system independent platform and/or run time architecture that implements a configuration and algorithmic based application and process for enabling multiple virtual machines or internal networked physical servers (hosts) to be organized into groups or “realms” in real time and against specific configurable metrics. The configurable metrics include one or more of the following; load or processing capacity availability, cost of CPU processing, location based on risk, importance to business continuity priority requirements, disaster recovery strength and priority, geographic location of host aligned to IP, and any other client specific or custom requirements. A realm manager balances all of these configurable metrics and creates an algorithm to address allocation. The algorithm is fully elastic, allowing for automatic opening and closing of virtual machines to accommodate any internal or external changes.06-06-2013
20130145368OPTIMIZED PLACEMENT OF VIRTUAL MACHINES IN A NETWORK ENVIRONMENT - Systems and methods for reducing risk of service interruptions for one or more virtual machines (VMs) in a computing environment are provided. The method comprises computing a placement scheme for placing at least one VM on one or more hosts according to a set of placement constraints defined for the VM, wherein the set of placement constraints comprises at least one availability constraint defined for the VM, wherein the availability constraint designates a N resiliency level, wherein N corresponds to number of host failures that may occur before the services provided by the VM are interrupted.06-06-2013
20110004875Method and System for Performance Isolation in Virtualized Environments - A method, a system, an apparatus, and a computer program product for allocating resources of one or more shared devices to one or more partitions of a virtualization environment within a data processing system. At least one user defined resource assignment is received for one or more devices associated with the data processing system. One or more registers, associated with the one or more partitions are dynamically set to execute the at least one resource assignment, whereby the at least one resource assignment enables a user defined quantitative measure (number and/or percentage) of devices to operate when the one or more transactions are executed via the partition. The system enables the one or more devices to execute one or more transactions at a bandwidth/capacity that is less than or equal to the user defined resource assignment and minimizes performance interference among partitions.01-06-2011
20100333088VIRTUALIZED MOBILE DEVICES - One embodiment is a virtualized mobile device including virtualization software that supports one or more virtual machines and further includes: (a) device emulation software that communicates with device driver software in the one or more virtual machines; (b) device driver software that communicates with one or more physical devices of the mobile device; and (c) transformer stack software that interacts with the device emulation software and the device driver software.12-30-2010
20100333089COORDINATED RELIABILITY MANAGEMENT OF VIRTUAL MACHINES IN A VIRTUALIZED SYSTEM - A system and methods for reliability management of virtual machines in a host system. The reliability of the host system is monitored and compared with a reliability threshold level for a virtual machine. If the reliability of the host system drops below the reliability threshold level, the virtual machine is migrated to another host system having an appropriate level of reliability.12-30-2010
20110010713COMPUTER SYSTEM, VIRTUAL MACHINE MONITOR AND SCHEDULING METHOD FOR VIRTUAL MACHINE MONITOR - In a computer system according to the background art, when a request to halt a virtual processor was detected, the virtual processor was blocked. In the blocking method, latency of virtual halt exit of the virtual processor was so long that a problem of performance was caused. A virtual machine monitor selects either of a busy wait method for making repeatedly examination until the virtual halt state exits while the virtual processor stays on the physical processor and a blocking method for stopping execution of the virtual processor and scheduling other virtual processors on the physical processor while yielding the operating physical processor and checking off scheduling of the virtual processor to the physical processor, based on a virtual processor halt duration predicted value of the virtual processor which is an average value of latest N virtual processor halt durations of the virtual processor.01-13-2011
20100333090METHOD AND APPARATUS FOR PROTECTING TRANSLATED CODE IN A VIRTUAL MACHINE - One embodiment provides a system that protects translated guest program code in a virtual machine that supports self-modifying program code. While executing a guest program in the virtual machine, the system uses a guest shadow page table associated with the guest program and the virtual machine to map a virtual memory page for the guest program to a physical memory page on the host computing device. The system then uses a dynamic compiler to translate guest program code in the virtual memory page into translated guest program code (e.g., native program instructions for the computing device). During compilation, the dynamic compiler stores in a compiler shadow page table and the guest shadow page table information that tracks whether the guest program code in the virtual memory page has been translated. The compiler subsequently uses the information stored in the guest shadow page table to detect attempts to modify the contents of the virtual memory page. Upon detecting such an attempt, the system invalidates the translated guest program code associated with the virtual memory page.12-30-2010
20110010714FAST BOOTING A COMPUTING DEVICE TO A SPECIALIZED EXPERIENCE - Described is a technology by which independent computing functions such as corresponding to separate operating systems may be partitioned into coexisting partitions. A virtual machine manager, or hypervisor, manages the input and output of each partition to operate computer system hardware. One partition may correspond to a special purpose operating system that quickly boots, such as to provide appliance-like behavior, while another partition may correspond to a general purpose operating system that may load while the special purpose operating system is already running. The computer system that contains the partitions may transition functionality and devices from one operating system to the other. The virtual machine manager controls which computer hardware devices are capable of being utilized by which partition at any given time, and may also facilitate inter-partition communication.01-13-2011
20110010712Methods for Improving Atomicity of Runtime Inspections - A method for achieving atomicity while inspecting a running computer process using a copy-on-write process in a supervisor to generate a copy of a target's memory page being written to, prior to executing the write, the copy along with any unwritten to memory pages in the target being mapped to a measurement agent (MA) and used to reflect the state of the target at a particular moment in time which state when observed by the MA provides an atomic runtime inspection.01-13-2011
20110010706System and Method for Providing Redundancy for Management Controller - Systems and methods for reducing problems and disadvantages associated with traditional approaches to providing redundancy for a management controller are provided. A method may include executing, by a hypervisor executing on a management controller, a first guest OS and second guest OS. The method may additionally include executing, by the first guest OS, one or more first management applications for managing one or more information handling resources communicatively coupled to the management controller. The second guest OS may: (i) execute one or more second management applications for managing the one or more information handling resources communicatively coupled to the management controller; (ii) execute one or more monitoring applications for monitoring redundancy status of the first guest OS and the second guest OS; (iii) sleeping the one or more second management applications; and (iv) monitoring, by the one or more monitoring applications, the operability of the first guest OS.01-13-2011
20110010707VIRTUAL MACHINE DEVICE AND METHODS THEREOF - A data processing device includes one or more state registers to store state information associated with an execution core of the device. Each state register includes an associated “dirty” bit. When a guest program is executed at the execution core, a dirty bit is set in response to a change in the state information at the associated state register. In response to a world switch from the guest program to a VMM, the state information at each state register is stored to memory only if the associated dirty bit is set. In addition, if the VMM changes any stored state information, it clears a “clean” bit associated with the changed information. In response to a world switch from the VMM to a guest, the state information associated with cleared clean bits is retrieved from memory.01-13-2011
20110029972SYSTEMS AND METHODS FOR PROVIDING A FILE SYSTEM VIEW OF A STORAGE ENVIRONMENT - A data identification system and method for operating the data identification system are provided. The method comprises identifying processing elements contained within the storage environment, identifying virtual processing elements contained within the processing elements, identifying virtual storage elements contained within the virtual processing elements, identifying contents of the virtual storage elements, generating the file system view of the storage environment, wherein the file system view comprises the processing elements, the virtual processing elements, the virtual storage elements, and the contents of the virtual storage elements arranged in a hierarchical order. The file system view of the storage environment is then provided.02-03-2011
20110029971INFORMATION PROCESSING APPARATUS, IMAGE PROCESSING METHOD AND COMPUTER PROGRAM - A plurality of VMs work in a PC 02-03-2011
20110029974Virtual Machine Manager System And Methods - Embodiments of the disclosure describe system and methods for virtualized system. In this regard, the virtualized system comprises a virtual machine manager (VMM), the virtual machine manager comprising policy settings that are directly configurable by an administrator, wherein the policy settings are measured as part of a measured launch of the virtual machine manager; and at least one virtual machine that is managed by the virtual machine manager.02-03-2011
20110029973METHOD AND APPARATUS FOR MANAGING VIRTUAL PORTS ON STORAGE SYSTEMS - A storage system is configured to create and manage virtual ports on physical ports. The storage system can transfer associations between virtual ports and physical ports when a failure occurs in a physical port or a link connected to the physical port so that a host can access volumes under the virtual ports through another physical port. The storage system can also change associations between virtual ports and physical ports by taking into account the relative loads on the physical ports. When a virtual machine is migrated from one host computer to another, the loads on the physical ports in the storage system can be used to determine whether load balancing should take place. Additionally, the storage system can transfer virtual ports to a remote storage system that will take over the virtual ports, so that a virtual machine can be migrated to remote location.02-03-2011
20110029969ALTRUISTIC DEPENDABLE MEMORY OVERCOMMIT FOR VIRTUAL MACHINES - This disclosure describes, generally, methods and systems for implementing memory overcommit of virtual machines. The method includes establishing a plurality of virtual machines on a physical machine, broadcasting, from each of the plurality of virtual machines to a central scheduler, resource usage requirements, and then based at least in part on the resource usage requirements broadcasted from each of the plurality of virtual machines, determining a resource requirements schedule for each of the plurality of virtual machines. The method further includes receiving at least one resource request from at least one of the plurality of virtual machines, based on the resource requirements schedule, un-assigning resources from at least one of the plurality of virtual machines, and assigning the un-assigned resources to the at least one of the plurality of virtual machines which initiated the resource request.02-03-2011
20110010709Optimizing System Performance Using Spare Cores in a Virtualized Environment - A mechanism for optimizing system performance using spare processing cores in a virtualized environment. When detecting a workload partition needs to run on a virtual processor in the virtualized system, a state of the virtual processor is changed to a wait state. A first node comprising memory that is local to the workload partition is determined. A determination is also made as to whether a non-spare processor core in the first node is available to run the workload partition. If no non-spare processor core is available, a free non-spare processor core in a second node is located, and the state of the free non-spare processor core in the second node is changed to an inactive state. The state of a spare processor core in the first node is changed to an active state, and the workload partition is dispatched to the spare processor core in the first node for execution.01-13-2011
20110246988HYPERVISOR FOR STARTING A VIRTUAL MACHINE - A hypervisor obtains an agent with an obtaining device. A file for implementing an agent of the virtual machine is obtained in response to an instruction to start the virtual machine. An agent replacing device stores the obtained file to a specified location in a file system of the virtual machine. A virtual machine starting device starts the virtual machine.10-06-2011
20100180277Platform Independent Replication - Methods and apparatus, including computer program products, for platform independent replication. Methods can include capturing a virtualized software application residing on a virtual machine, capturing a guest operating system residing on the virtual machine, and storing the captured virtualized software application including the guest operating system as a virtualization image in a flat file on a physical computing device.07-15-2010
20100180273Virtualized operating system - Multiple operating systems that run at the same time. A virtualization layer can run on a multiple core operating system to run the different operating systems. The cores can be powered down, for example, when one of the operating systems is not running.07-15-2010
20110119670METHOD FOR DYNAMIC LOAD BALANCING ON PARTITIONED SYSTEMS - Methods, systems and apparatuses to dynamically balance execution loads on a partitioned system among processor cores or among partitions.05-19-2011
20110113426APPARATUSES FOR SWITCHING THE RUNNING OF A VIRTUAL MACHINE BETWEEN MULTIPLE COMPUTER DEVICES BELONGING TO THE SAME COMPUTER PLATFORM AND THE ASSOCIATED SWITCHING METHODS - An apparatus for managing a running virtual machine on a desktop or laptop platform includes a first computer device, a second computer device and a shared memory. The first computer device has a first switching hypervisor on which a virtual machine runs. The second computer device has a second switching hypervisor, wherein the second switching hypervisor is in communication with the first switching hypervisor. The shared memory is coupled to the first and second computer devices, and is accessible by the first and second switching hypervisors, wherein the first switching hypervisor stores status information of the virtual machine into the shared memory. When receiving a switching notification for switching the virtual machine to run on the second computer device, the first switching hypervisor halts its running of the virtual machine, and then the second switching hypervisor obtains the stored status information of the virtual machine from the shared memory and resumes the running of the virtual machine on the second computer device according to the obtained status information of the virtual machine.05-12-2011
20100153949LIVE STREAMING MEDIA AND DATA COMMUNICATION HUB - A method for delivering multimedia services by providing a virtual machine having preconfigured components unique for a client and saving software image of the virtual machine under a special code that serves as a tag that uniquely identifies a networking site of the client. A local partition on the client's physical machine such as a laptop is isolated and the isolate local partition is virtualized to one or many virtual machines to allow the transport of media to a web server of choice that has the capability of streaming back to the interface constantly and instantly for full round trip interactions. The isolated partition of a user can become a live T.V. or radio station via a virtual channel.06-17-2010
20110055829Mechanism for Virtual Synchrony Total Order Messaging for Virtual Machines - A mechanism for virtual synchrony total order messaging for virtual machines is disclosed. A method of embodiments of the invention includes receiving a request to reserve a block of memory in a shared memory segment, reserving the block of memory, and providing a start address of the reserved block of memory to a virtual machine (VM) that sent the request in order for the VM to copy a message from an application of the VM into the reserved block of memory, wherein the application communicates with other applications on other VMs using virtual synchrony. The method may further include sending a new message available request to all of the other VMs, wherein the new message available request includes the start address of the reserved block of memory and a length of the message, and tracking the VMs that access the reserved block of memory.03-03-2011
20110078680SYSTEM AND METHOD TO RECONFIGURE A VIRTUAL MACHINE IMAGE SUITABLE FOR CLOUD DEPLOYMENT - A system and method that can be used to reconfigure a virtual server image that is suitable for cloud deployment. In accordance with an embodiment, the system and method comprises providing a virtual server image, which can be executed on the one or a plurality of hypervisors, and which provides a virtual machine environment for a software application, wherein the virtual server image contains a bootable part of the virtual machine, a non-bootable part of the virtual machine, a software application code for the software application, and a software application data for the software application; and receiving a virtual server image patch, and using information in the virtual server image patch to reconfigure the contents of the virtual server image from its original content to a reconfigured content, to create a reconfigured virtual server image. In a particular embodiment, the virtual server image can be compatible with any hypervisor for server virtualization, and the application virtual machine can be a Java Virtual Machine (JVM).03-31-2011
20110083130DYNAMIC EXECUTION CONTEXT MANAGEMENT IN HETEROGENEOUS COMPUTING ENVIRONMENTS - Method, apparatus, and computer program product embodiments are disclosed for an adaptive computing platform that provides execution-in-place capability for a mobile computing device to enhance the processing power of the device as it moves from one external processor to another. In embodiments of the invention, a mobile wireless device stores one or more execution contexts in a memory of the mobile wireless device resulting from execution by a processor in the mobile wireless device of program code of an application stored in the memory. A transceiver or input/output device in the mobile wireless device detects that a stationary wireless device is within wireless communications range or detects a secure communication link with the stationary wireless device. The transceiver shares the execution context over a wireless communications medium to the stationary wireless device for continued execution-in-place of the application by the stationary wireless device. Later, the transceiver detects an external event that results in voluntary/involuntary closing of the secure communication link with the stationary wireless device. In response, the transceiver receives one or more execution contexts from the stationary wireless device over the wireless communications medium for continued execution-in-place of the application by the processor in the mobile wireless device. The continued execution-in-place of the application includes shared execution sessions between the mobile wireless device and the stationary wireless device.04-07-2011
20110214124SYSTEMS AND METHODS FOR GENERATING CROSS-CLOUD COMPUTING APPLIANCES - Embodiments relate to systems and methods for generating cross-cloud computing appliances. A vendor, developer, or other user can generate one or more sets of computing appliances, comprising special-purpose pre-configured physical or virtual machines. The vendor can register an image of the one or more appliances to an image generation service, which can store that image along with the subscription model desired for that set of appliances. The image generation service can generate, test, and install a set of cloud-based images of the underlying appliances to a cloud environment including multiple, diverse clouds. The image generation service can adjust the cloud-based images as well as the subscription model to match the services and other resources of individual clouds, and ensure compatibility across multiple clouds. The image generation service can also track usage data for billing or other purposes.09-01-2011
20110214123Mechanism for Optimal Placement of Virtual Machines to Reduce Memory Consumption Based on Shared Images - A mechanism for optimal placement of VMs based on shared images is disclosed. A method of embodiments of the invention includes identifying a virtual machine (VM) image of a new VM to be placed by a host controller on one of a plurality of candidate host machines, for each candidate host machine of the plurality of candidate host machines, identifying a VM image for each VM hosted by the candidate host machine, and determining the candidate host with the most VMs having identical VM images to the new VM.09-01-2011
20110214122Mechanism for Optimizing Initial Placement of Virtual Machines to Reduce Memory Consumption Based on Similar Characteristics - A mechanism for optimizing initial placement of virtual machines (VMs) to reduce memory consumption based on similar characteristics is disclosed. A method of embodiments of the invention includes identifying characteristics of a new virtual machine (VM) to be placed by a host controller on one of a plurality of candidate host machines and, for each candidate host machine of the plurality of candidate host machines, communicating with one or more VM agents each associated with a VM of one or more VMs hosted by the candidate host machine to identify characteristics of the one or more VMs. The method further includes identifying the candidate host with the most VMs having similar characteristics to the new VM.09-01-2011
20090313621INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, RECORDING MEDIUM, AND PROGRAM - An information processing apparatus, an information processing method, a recording medium, and a program that can run an application for playing an optical disc and an application that provides a unique function of the apparatus in cooperation with each other. A JVM converts JAVA™ bytecode into native code and executes the native code. An API library is a set of commands and functions that can be used when developing a navigation program and a set of protocols defining procedures. The navigation program is a program that reproduces data recorded on an optical disc and can control hardware of a reproducing apparatus only within the range of the API library. An application program provides a function unique to the reproducing apparatus. The navigation program and the application program execute a process in cooperation with each other using IXC.12-17-2009
20100162237NETWORK ADMINISTRATION IN A VIRTUAL MACHINE ENVIRONMENT THROUGH A TEMPORARY POOL - A method, apparatus, and system of network administration in a virtual machine environment through a temporary pool are disclosed. In one embodiment, a method includes determining that a desktop source requires maintenance, creating a temporary pool, accessing the desktop source requiring maintenance, automatically transferring the desktop source requiring maintenance from a source pool to the temporary pool, determining that an issue with the desktop source transferred to the temporary pool is rectified and automatically transferring the desktop source from the temporary pool to the source pool when the issue is rectified.06-24-2010
20120174100PLUGGABLE ACTIVATION ENGINE EXTENSIONS VIA VIRTUAL DISKS - A computer-implemented method configures an extended virtual machine. A virtual image is executed to initialize a virtual machine. An activation engine is activated to search for special extensions in the virtual image. The virtual machine scans at least one virtual disk for script to implement the special extensions as virtual machine extensions, such that the virtual machine reads and executes the extensions prior to being available for use.07-05-2012
20120174103COMPUTER SYSTEM, DEVICE SHARING METHOD, AND DEVICE SHARING PROGRAM - In a storage system provided with a plurality of storage modules, the rated power consumption can be reduced. The storage system is provided with a charge control unit. The charge control unit stops, when detecting that a predetermined number of a plurality of battery modules are during battery charging, the battery charging in the remaining battery modules.07-05-2012
20120174102SYSTEM AND METHOD FOR ACCELERATING INPUT/OUTPUT ACCESS OPERATION ON A VIRTUAL MACHINE - A system and method for accelerating input/output (IO) access operation on a virtual machine, The method comprises providing a smart IO device that includes an unrestricted command queue (CQ) and a plurality of restricted CQs and allowing a guest domain to directly configure and control IO resources through a respective restricted CQ, the IO resources allocated to the guest domain. In preferred embodiments, the allocation of IO resources to each guest domain is performed by a privileged virtual switching element. In some embodiments, the smart IO device is a HCA and the privileged virtual switching element is a Hypervisor.07-05-2012
20120174101Detection and Management of Dynamic Migration of Virtual Environments - A mechanism is provided to detect that a dynamic migration of a virtual environment is in progress or has been executed during a hardware or software scan without requiring instrumentation of applications running within the virtual machine. The mechanism relies on a particular sequencing and usage of application programming interfaces and commands that scanning technology provides, associated with the modularity of the scans and on the external virtual machine enabler component running on the host. The mechanism may detect a dynamic migration and take proper actions based on the system configuration. The actions may include discarding the output of the scan executed across a dynamic migration and repeat the scan. The actions may also include notifying the initialization subsystem of the non-migration-safe application to execute a script or program to address migration safety issues. One particular program or script may be an agent ID regeneration program or script.07-05-2012
20120174099AUTOMATED TUNING IN A VIRTUAL MACHINE COMPUTING ENVIRONMENT - Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine.07-05-2012
20120174097METHODS AND SYSTEMS OF MANAGING RESOURCES ALLOCATED TO GUEST VIRTUAL MACHINES - A method of managing one or more resources allocated to a plurality of guest virtual machines. The method comprises executing a plurality of guest virtual machines in a host platform managing at least one resource, allocating the at least one resource among the plurality of guest virtual machines, separately collecting, from each the guest virtual machine, resource usage data by locally monitoring at least one of an operating system operation, an executed procedure, and an executed tread in each the guest virtual machine, gathering the resource usage data from each the guest virtual machine, and reallocating the at least one resource among the plurality of guest virtual machines according to an analysis of the gathered resource usage data from the plurality of guest virtual machines.07-05-2012
20110078679PROVISIONING VIRTUAL MACHINE PLACEMENT - Virtual machines are provisioned computers in a computer environment based on input/output (I/O) requirements of software tasks. A workload request, requesting the execution of a software task on a virtual machine, is received. The I/O requirements of the software task are matched to an optimal computer, in the computer environment, that has an I/O bandwidth capability that best matches the I/O requirements of the software task. The software task is then routed to a virtual machine, on the optimal computer, for execution of the software task.03-31-2011
20100218183POWER-SAVING OPERATING SYSTEM FOR VIRTUAL ENVIRONMENT - Principles for enabling power management techniques for virtual machines. In a virtual machine environment, a physical computer system may maintain management facilities to direct and control one or more virtual machines executing thereon. In some techniques described herein, the management facilities may be adapted to place a virtual processor in an idle state in response to commands from a guest operating system. One or more signaling mechanisms may be supported such that the guest operating system will command the management facilities to place virtual processors in the idle state.08-26-2010
20110246990VIRTUAL MACHINE ASSIGNING METHOD AND STORAGE MEDIUM THEREOF, INFORMATION PROCESSING DEVICE HAVING VIRTUAL MACHINE ENVIRONMENT - In a system 10-06-2011
20100070971METHOD FOR ENABLING THE INSTALLATION OF SOFTWARE APPLICATIONS ON LOCKED-DOWN COMPUTERS - A method for enhancing functionality of locked-down computers by allowing installation of software applications on the locked-down computers operated by users having limited administrator permissions. The method comprises detecting an attempt for installation of a software application on a locked-down computer; generating a virtual software application corresponding to the software application, wherein the virtual software application is generated in a virtual environment; and enabling the execution of the virtual software application in the virtual environment.03-18-2010
20100058336ASSIGNMENT, AT LEAST IN PART, OF AT LEAST ONE VIRTUAL MACHINE TO AT LEAST ONE PACKET - In an embodiment, an apparatus is provided that may include circuitry to be comprised in a platform. The circuitry may be to determine, at least in part, at least one virtual machine (VM) resident in the platform to be assigned to process, at least in part, at least one packet. The circuitry may determine, at least in part, the at least one VM based at least in part upon (1) comparison, at least in part, of at least one destination of the at least one packet to at least one predetermined destination, and (2) at least one value based at least in part upon both at least one port associated with the at least one packet and at least one source of the at least one packet. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.03-04-2010
20090031302METHOD FOR MINIMIZING RISKS OF CHANGE IN A PHYSICAL SYSTEM CONFIGURATION - Risks of change to a physical configuration are minimized. A request for a change to the physical system included in the physical configuration is detected, and all applications the physical systems that would be affected by the requested change are identified. All the applications and physical systems that would be affected by the requested change are replicated on a virtual system, including applications and the physical system to which the requested change is targeted and applications and physical systems that are dependent on the applications and the physical system to which the requested change is targeted. The requested change is applied to the virtual system. The virtual system is tested to determine whether the applied change produces desired results. If the applied change products the desired results, the requested change is applied to the physical system.01-29-2009
20090031303METHOD FOR SECURING THE EXECUTION OF VIRTUAL MACHINES - A method for executing a privileged virtual machine (VM) in a secured environment. The method comprises mapping virtual address space of the privileged virtual machine (VM) to start at address zero of a physical memory; configuring memory address space of emulated and real peripheral devices on an interconnect bus; and blocking the privileged VM's operating system from re-configuring the memory address space of the interconnect bus.01-29-2009
20100037220System and Method for Creating and Associating a Virtual Pseudo TTY with a Running Process - Creating and associating a virtual pseudo tty device with a running process. A pool of virtual pseudo tty devices composed of a number of special character-oriented device files is created and associated with a sub-directory in the device file system. In response to receiving a process id (PID) of a running process, an unassociated virtual pseudo tty device in the pool of virtual pseudo tty devices is assigned to the running process. The association of the running process and the virtual pseudo tty device is accomplished by locating and modifying the running process's controlling tty in the running process's u-block to point to the assigned unassociated virtual pseudo tty device. Following which, the running process id and the associated virtual pseudo tty device are saved in a virtual pseudo tty mapping table thus allowing the running process to be disassociated from a physical console or pseudo tty device.02-11-2010
20100031256METHOD FOR ESTABLISHING VIRTUAL OPERATING SYSTEM - The present invention provides a method for establishing a virtual operating system (VOS). The method comprises: obtaining an instruction message for loading a VOS, wherein the instruction message comprises identification information of application programs corresponding to the VOS to be loaded; obtaining configuration information of a VOS plug-in required for executing each application program corresponding to the identification information from a virtual environment database; and establishing a link between the VOS plug-ins required for executing an application program and a VOS core part according to the configuration information, and loading the VOS plug-ins into user-mode memory space. The present invention decompose a VOS into one core and many plug-ins, for code sharing, which is a great flexibility because independent functions can be combined on demand. The present invention facilitates followed-up dynamic updating and upgrading of the VOS, enables every application program to have fittest VOS and dynamically adjusts the functionality of the VOS according to requirements so as to fulfill the current situation.02-04-2010
20090037907CLIENT PARTITION SCHEDULING AND PRIORITIZATION OF SERVICE PARTITION WORK - A method in a data processing system is provided for processing a service request of a client partition. The method includes: obtaining by a service partition of the data processing system the service request from the client partition, wherein both the client and service partitions execute above a hypervisor of the data processing system; and processing the service request by the service partition utilizing a processor quantum assigned to the client partition and donated by the client partition to the service partition. The client partition controls scheduling of the service partition by queuing the service request at the client partition until the client partition decides to proceed with execution of the service request by the service partition. In one implementation, the service partition is a partition adjunct of the data processing system, which utilizes donated virtual address space of the client partition.02-05-2009
20110252419DYNAMIC NETWORK ADAPTER QUEUE PAIR ALLOCATION - A method of dynamically changing an allocation of queue pair resources to an operating system image running in virtualized environment receives a notification at the operating system image of a change in allocation of queue pair resources to the operating system image. The method queries a physical network adapter through a hypervisor to obtain a new queue pair resource count that will exist in the virtualized system after the change in allocation. The method performs a hashing operation in the operating system image using the new queue pair resource count to distribute transmit traffic among the queue pair resources that will exist in the virtualized system after the change in allocation.10-13-2011
20100058334METHOD AND SYSTEM FOR POLICY BASED LIFECYCLE MANAGEMENT OF VIRTUAL SOFTWARE APPLIANCES - A system and method for managing dynamically allocated resources assigned to a service includes providing a service to be used by a plurality of sites in a federation. Usage information associated with the service is communicated to each of the plurality of sites. A disposition of the service is determined based on local policies and the usage information received from other sites by a service owner. The disposition of the service is updated across a plurality of sites in accordance with messages sent by the service owner to reduce resource usage.03-04-2010
20100058335METHODS AND SYSTEMS FOR INTEGRATED STORAGE AND DATA MANAGEMENT USING A HYPERVISOR - Methods and systems for integrated data management and block level storage management in a storage system having a controller with a multi-core processor. A hypervisor manages the multi-core processor such that at least one processor is used in a first virtual machine on which a block level storage management process is operable. The first virtual machine may also operate under the control of a real-time operating system. The hypervisor also defines a second virtual machine using one or more other processor cores and operates a data management application process optionally under control of a general purpose operating system. The optional general purpose operating system and the data management application process access storage devices by communicating through the hypervisor with the block level storage management process operable in the first virtual machine.03-04-2010
20100037221METHOD AND SYSTEM FOR BUILDING VIRTUAL ENVIRONMENT - The present invention relates to a method and a system for building a virtual environment. The method for building a virtual environment includes: a virtual environment sever obtaining the number of virtual environments to be built; and building the virtual environments with the corresponding number according to the number. Through obtaining the number of the virtual environments to be built and building the virtual environments with the corresponding number by calling directly operating system resources, the system resources occupied by a plurality of heavyweight virtual machines are reduced and the execution efficiency of application programs and the whole efficiency of the operating system are improved.02-11-2010
20100058341APPARATUS AND METHOD FOR SETTING INPUT/OUTPUT DEVICE IN VIRTUALIZATION SYSTEM - A server in the virtualization system includes a plurality of virtual machines (VM) to construct a computing environment for every user, and allocates any one of the plurality of virtual machines to a user, when the user has access to the server. At this time, a plurality of peripheral apparatuses that are adjacent to the user are set as input/output devices of the virtual machines. According to an embodiment of the present invention, it is possible to construct an input/output computing environment of a virtual machine provided in a virtualization system by dynamically connecting a plurality of peripheral apparatuses around a user, thereby constructing a computing environment that is suitable for a peripheral situation of the user.03-04-2010
20090217265INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THEREFOR, AND PROGRAM - A virtual machine is transferred between an information processing apparatus and another information processing apparatus via a communication unit which communicates with the other information processing apparatus via a network. For a virtual machine which operates in the virtual machine operating environment of the information processing apparatus, correspondence relationship information representing the correspondence relationship between the virtual machine and a storage unit which stores a virtual disk file to be accessed by the virtual machine is managed using a storage correspondence table. Access from the virtual machine which has issued an access request to the virtual disk file is controlled by looking up the storage correspondence table.08-27-2009
20090217264METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR PROVIDING FILTERING OF GUEST2 QUIESCE REQUESTS - A method, system and computer program product for providing filtering of level two guest (G2) quiesce requests. The method includes receiving a G2 quiesce interruption request at a processor currently or previously executing a G2 running under a level two hypervisor in a logical partition. The G2 includes a current zone and G2 virtual machine (VM) identifier. The quiesce interruption request specifies an initiating zone and an initiating G2 VM identifier. It is determined if the G2 quiesce interruption request can be filtered by the processor. The determining is responsive to the current G2 VM identifier, the current zone, the initiating zone and the initiating G2 VM identifier. The G2 quiesce interruption request is filtered at the processor in response to determining that the G2 quiesce interruption request can be filtered. Thus, filtering between G2 virtual machines running in the logical partition is provided.08-27-2009
20090217263VIRTUAL APPLIANCE FACTORY - Methods and apparatus, including computer program products, are provided for generating virtual appliances. In one aspect, there is provided a computer-implemented method. The method may include receiving, from a user interface, information representative of one or more selections of solutions. The one or more solutions may represent a configuration of a virtual appliance. The virtual appliance may be generated based on the received information. The generated virtual appliance may be provided to another machine to enable the other machine to execute the virtual machine. Related apparatus, systems, methods, and articles are also described.08-27-2009
20090217262PLUGGABLE EXTENSIONS TO VIRTUAL MACHINE MONITORS - The functionality of a virtualization layer interposed between computer system hardware and a plurality of applications can be altered by pluggable extensions. According to one embodiment of the present invention, a virtualization layer is divided into a privileged portion and an unprivileged portion. While the privileged portion remains untouched, the functionality of the unprivileged portion can be modified by one or more pluggable extensions. Furthermore, file images operating on top of the virtualization layer, and in some cases unaware of the virtual nature of the virtualization layer, can be supplemented using pluggable extensions.08-27-2009
20100050174HEAP ORGANIZATION FOR A MULTITASKING VIRTUAL MACHINE - A heap organization for a multitasking virtual machine is described. The heap organization may comprise an execution engine to concurrently execute a plurality of tasks and a plurality of heaps coupled to the execution engine. In some embodiments, the plurality of heaps may comprise a system heap and a task heap separated from the system heap. The system heap may store system data accessible by the plurality of tasks. The task heap may store task data only accessible by one task of the plurality of tasks.02-25-2010
20110154329METHOD AND SYSTEM FOR OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk.06-23-2011
20110154327METHOD AND APPARATUS FOR DATA CENTER AUTOMATION - A method and apparatus is disclosed herein for data center automation. In one embodiment, a virtualized data center architecture comprises: a buffer to receive a plurality of requests from a plurality of applications; a plurality of physical servers, wherein each server of the plurality of servers having one or more server resources allocable to one or more virtual machines on said each server, wherein each virtual machine handles requests for a different one of a plurality of applications, and local resource managers each running on said each server to generate resource allocation decisions to allocate the one or more resources to the one or more virtual machines running on said each server; a router communicably coupled to the plurality of servers to control routing of each of the plurality of requests to an individual server in the plurality of servers; an admission controller to determine whether to admit the plurality of requests into the buffer, and a central resource manager to determine which server of the plurality of servers are active, wherein decisions of the central resource manager depends on backlog information per application at each of the plurality of servers and the router.06-23-2011
20100058338CALLBACKS IN VIRTUAL MACHINES - The use of callback functions when executing intermediate instructions in a virtual machine is described. The virtual machine receives and evaluates intermediate instructions. The virtual machine evaluates the instructions based a function table referencing definitions of the functions. A callback is loaded into the virtual machine platform, and a callback loader modifies the function table to cause a function in the table to point to the callback instead of the standard definition. Thus, when the intermediate code is evaluated, it is evaluated based on the modified functionality of the callback rather than the standard definition.03-04-2010
20110252421Allocation of Processor Resources in an Emulated Computing Environment - In an emulated computing environment, a method is provided for allocating resources of the host computer system among multiple virtual machines resident on the host computer system. On the basis of the proportional weight of each virtual machine, a proportional share of resources is allocated for each virtual machine. If, for a particular virtual machine, the calculated share is less than a reserved minimum share, the virtual machine is allocated its reserved minimum share as its share of computing device resources. An emulation program modulates the access of each virtual machine to the resources of the host computer system.10-13-2011
20110252418HOST CONTROLLER USING REDUCED NETWORK RESOURCES TO MONITOR HOSTS - A host controller sends a request for first status information to a host. The host controller receives first status information from the host along with a unique identifier that is associated with the first status information. After a time period, the host controller sends a new request for second status information to the host, the new request including the unique identifier. When second status information and the first status information are associated with the same unique identifier, the host controller receives a response from the host indicating that the second status information is the same as the first status information. When the second status information and first status information are not associated with the same unique identifier, the host controller receives the second status information and a new unique identifier from the host.10-13-2011
20110154328Virtualization Apparatus and Method - An apparatus and method for providing an integrated user interface for a variety of operating systems are provided. When a user request execution of an application included in a second operating system an application of a first operating system is in the foreground of a display, the apparatus switches the application included in the second operating system to the foreground of the display without the need for a separate window. One of a server operating system and client operating systems may be set as a main domain that provides an integrated graphic user interface with respect to applications executed on a plurality of operating systems. The operating systems not set to the main domain may be set as sub-domains each of which provides application information to the main domain in response to a request from the main domain. In response to an application execution request, the server operating system may switch an operating system in which the corresponding application is present to the foreground of the display.06-23-2011
20110154319IPv4/IPv6 Bridge - A virtual machine host may provide IPv4 connections to IPv4 virtual machine guests and map the connections to IPv6 networks. The IPv6 addressed exposed by the virtual machine host may be used in an IPv6 environment to communicate with the virtual machine guests, enabling various IPv6 connected scenarios for the IPv4 virtual machines. The virtual machine host may receive IPv6 communications, and translate those communications to IPv4 to communicate with the virtual machine guests. Similarly, the outbound IPv4 communications may be translated into IPv6 for communications to the IPv6 network.06-23-2011
20110083131Application Profile Based Provisioning Architecture For Virtual Remote Desktop Infrastructure - A system, method, and computer-readable medium are disclosed for automatically allocating resources to a virtual machine. Expected workload profile data and application utilization data corresponding to a software application associated with a virtual machine (VM) is collected by an application profiling agent. Resource utilization data corresponding to the utilization of resources associated with the execution of the software application is collected by a system resource monitor. The expected workload profile data, the application utilization data, and the resource utilization data are then processed to determine a virtual machine workload class, which is then used to determine a corresponding VM policy. Data associated with the VM policy then processed to generate VM resource allocation instructions, which are in turn processed to provision the VM.04-07-2011
20110154321VIRTUAL-CPU BASED FREQUENCY AND VOLTAGE SCALING - Frequency and voltage scaling are performed for each virtual processor in a virtual environment. The characteristics of the workload performed by each virtual processor are dynamically profiled and a scaling algorithm determines a scale factor for that virtual processor as a function of the profiled characteristics. The profiled characteristics may include virtualization events associated with the workload being performed. In addition, a particular scaling algorithm and profiling technique may be selected based on which virtual processor is currently running.06-23-2011
20110154333MACHINE SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD OF OPERATING VIRTUAL MACHINE, AND PROGRAM - An information processing apparatus includes: a first virtual machine part to operate by being allocated to another information processing apparatus; a monitoring-application information storing part to store an application for monitoring the operation of the virtual machine part; a determining part to determine, in the virtual machine part, whether the application stored in the monitoring-application information storing part is operating by accessing an auxiliary storage device connected to the other information processing apparatus; a status storing part to store application information related to an operating status of the application when the determining part determines that the application is operating; an application exiting part to exit the application when the application information is stored; and a transmitting part to transmit virtual-machine information related to an operating status of the virtual machine part, together with the stored application information, to the other information processing apparatus when the application is exited.06-23-2011
20110154332OPERATION MANAGEMENT DEVICE AND OPERATION MANAGEMENT METHOD - When hardware failure occurs in an operation device, a provisional job executing unit of a virtual machine is allowed to temporarily execute a job until setup of a spare device as an alternative job execution device is completed. Start of operation of the virtual machine is performed in a short time by shift from a suspending state to an operating state. Therefore, execution of the job is not stopped by the hardware failure of the operation device and it is possible to improve continuity of the job and improve reliability of a redundant configuration of the job execution device in which the spare device is associated with the operation device.06-23-2011
20110154331CLONING VIRTUAL MACHINES IN A VIRTUAL COMPUTER ENVIRONMENT - A virtual machine belonging to a virtual computer environment is selectively cloned by retrieving information about applications available in a parent virtual machine to be cloned, and for each application, further retrieving information about a virtual disk associated with the application. Cloning is further performed by identifying a target environment on which the clone is to run, retrieving information about the target environment and calculating a clone of the virtual machine based at least in part, upon retrieved information. Calculating a clone further includes introspecting the virtual disks of the virtual machine. Cloning a virtual machine further comprises generating the clone to the target environment, based on the calculated clone.06-23-2011
20110154326SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR MANAGING MULTIPLE VIRTUAL MACHINES - A system according to an embodiment of the present invention includes at least two virtual machines running on a hardware platform using either a hosted or a bare metal hypervisor. The virtual machines may communicate with an agent-server resident in the host operating system or in one of the virtual machines to switch control of the hardware component, such as graphics hardware, from one virtual machine to another.06-23-2011
20110154324Virtual Machine Administration For Data Center Resource Managers - Virtual machine administration for data center resource managers including discovering resources of the datacenter to be managed by a resource manager; determining, in dependence upon attributes of the resources, processing capabilities of the discovered resources; determining, in dependence upon attributes of the resources of the datacenter to be managed, memory capabilities of the discovered resources; determining, in dependence upon attributes of the resources, minimum memory requirements for managing the discovered resources; determining, in dependence upon attributes of the resources of the datacenter to be managed, minimum processing requirements for managing the discovered resources; deploying, in dependence upon the determined processing capabilities and memory capabilities upon one or more of the resources of the datacenter to be managed, a virtual machine having at least the minimum memory requirements and the minimum processing requirements; and deploying the resource manager on the virtual machine.06-23-2011
20110154323Controlling Depth and Latency of Exit of a Virtual Processor's Idle State in a Power Management Environment - A mechanism is provided in a logically partitioned data processing system for controlling depth and latency of exit of a virtual processor's idle state. A virtualization layer generates a cede latency setting information (CLSI) data. Responsive to booting a logical partition, the virtualization layer communicates the CLSI data to an operating system (OS) of the logical partition. The OS determines, based on the CLSI data, a particular idle state of a virtual processor under a control of the OS. Responsive to the OS calling the virtualization layer, the OS communicates the particular idle state of the virtual processor to the virtualization layer for assigning the particular idle state and wake-up characteristics to the virtual processor.06-23-2011
20110154322Preserving a Dedicated Temporary Allocation Virtualization Function in a Power Management Environment - A mechanism is provided for temporarily allocating dedicated processors to a shared processor pool. A virtual machine monitor determines whether a temporary allocation associated with an identified dedicated processor is long-term or short-term. Responsive to the temporary allocation being long-term, the virtual machine monitor determines whether an operating frequency of the identified dedicated processor is within a predetermined threshold of an operating frequency of one or more operating systems utilizing the shared processor pool. Responsive to the operating frequency of the identified dedicated processor failing to be within the predetermined threshold, the virtual machine monitor either increases or decreases the frequency of the identified dedicated processor to be within the predetermined threshold of the operating frequency of the one or more operating systems utilizing the shared processor pool and temporarily allocates the identified dedicated processor to the shared processor pool.06-23-2011
20110154320AUTOMATED VIRTUAL MACHINE DEPLOYMENT - A client device receives a first request to create a number of virtual devices, where the first request includes specification information corresponding to the number of virtual devices; receives a selection of two or more virtual devices resulting in two or more selected virtual devices; receives a second request to perform a bulk deployment operation on the two or more selected virtual devices; and causes, in response to the second request, the two or more selected virtual devices to be automatically and concurrently deployed, resulting in two or more deployed virtual devices, in accordance with the specification information associated with the two or more selected virtual devices. The client device receives a third request to perform a production operation on a deployed virtual device of the two or more deployed virtual devices; and causes, in response to the third request, the deployed virtual device to be automatically powered up, resulting in a production virtual device.06-23-2011
20110154318VIRTUAL STORAGE TARGET OFFLOAD TECHNIQUES - A virtual machine storage service can be use a unique network identifier and a SR-IOV compliant device can be used to transport I/O between a virtual machine and the virtual machine storage service. The virtual machine storage service can be offloaded to a child partition or migrated to another physical machine along with the unique network identifier.06-23-2011
20110258624Virtual machine based secure operating system - Improved computer operating system which is impervious to attack by viruses, hackers and the like and which allow only the operating system to operate on the processor and which creates a virtual machine on which all application software is run.10-20-2011
20100125844RESOURCE BROKER SYSTEM FOR DEPLOYING AND MANAGING SOFTWARE SERVICE IN A VIRTUAL ENVIRONMENT - A system and method can deploy and manage software services in virtualized and non-virtualized environments. The system provides an enterprise application virtualization solution that allows for centralized governance and control over software and Java applications. The system includes a plurality of resource broker agents. Each resource broker agent resides on one of the plurality of virtualized and non-virtualized machines in the computing environment and can be used to manage the software processes and compute resources running in the computing environment. Each resource broker agent is responsible for starting a set of Virtual Machines running on a specific compute resource and performing resource metering control. The system also includes a virtual machine pool that communicates with the plurality of resource broker agents to create and manage the set of virtual machines for each resource broker agent and collect data.05-20-2010
20120304173SYSTEM AND METHOD FOR SYNCHRONIZING TRANSIENT RESOURCE USAGE BETWEEN VIRTUAL MACHINES IN A HYPERVISOR ENVIRONMENT - A system and method for synchronizing transient resource usage between virtual machines, e.g. Java Virtual Machines (JVMs), running within a hypervisor. In accordance with an embodiment, the system allows for synchronizing garbage collection and code optimization to reduce transient processor (cpu) and memory usage. In accordance with an embodiment, the system comprises a computer; a hypervisor for executing virtual servers running JVMs; a communication channel between the virtual servers; wherein each virtual server further comprises non-transient and transient memory and a synchronization module. In accordance with an embodiment the synchronization modules schedule garbage collects and code optimizations to minimize overlaps, thereby reducing the peak transient memory and cpu usage and the resulting volatility of transient resource usage within a computer. In accordance with another embodiment, a cloud manager can move virtual servers between computers to optimize computer volatility within a cloud.11-29-2012
20120304172Method and System for Transaction Controlled Sampling of Distributed Hetereogeneous Transactions without Source Code Modifications - A system and method for tracing individual transactions at the granularity of method calls uses instrumentation based transaction tracing mechanisms to enhance thread call stack sampling mechanisms by a) only sampling threads executing monitored transactions while execution is ongoing; and b) tagging sampled call stacks with a transaction ID for correlation of sampled call stacks with instrumentation based tracing data. The combination of instrumentation based tracing with thread call stack sampling reduces sampling generated overhead by only sampling relevant threads, and reduces instrumentation generated overhead because it allows reducing instrumentation.11-29-2012
20120304171Managing Data Input/Output Operations - Systems and methods for managing data input/output operations are described that include virtual machines operating with a shared storage within a host. In such a system, a computer-implemented method is provided for dynamically provisioning cache storage while operating system applications continue to operate, including stalling the virtual machine's local cache storage operations, changing the provision of cache storage size; and resuming the operations of the virtual machine.11-29-2012
20120304170SYSTEMS AND METHODS FOR INTROSPECTIVE APPLICATION REPORTING TO FACILITATE VIRTUAL MACHINE MOVEMENT BETWEEN CLOUD HOSTS - Embodiments relate to systems and methods for introspective application reporting to facilitate virtual machine movement between cloud hosts. A set of aggregate usage history data can record consumption of processor, software, or other resources subscribed to by one or more users in a or clouds. A cloud management system can host a cloud-based operating system which can support a set of virtual machines via a set of guest operating systems that are virtualized in the operating system. One or more of the virtual machines can be configured with an introspection daemon which is configured to inspect the application set and configuration state of the associated virtual machine. The introspection daemon can generate an introspection report containing application inventories, execution states, and other information and transmit that report to the kernel of the cloud-based operating system. The kernel can receive that report and generate a set of migratable virtual machine images via a virtual machine image manager or other logic. Migrations of the encoded virtual machines and/or applications can be initiated at kernel level.11-29-2012
20120304168SYSTEM AND METHOD FOR GENERATING A VIRTUAL DESKTOP - A technique for composing a virtual desktop associated with one or more applications in a virtualized computing environment. The technique includes generating file system level metadata in the desktop image for applications that create a perception that data blocks in the desktop image have been allocated to applications, but not actually copying any of the application data into the allocated blocks. Instead, the technique builds a mapping table between disk block numbers and the application data, which can be stored in a separate application store. The disclosed techniques provide a more efficient way to compose a virtual desktop, compared to current virtual desktop adoption techniques.11-29-2012
20110072431SYSTEM AND METHOD FOR USAGE-BASED APPLICATION LICENSING IN A HYPERVISOR VIRTUAL EXECUTION ENVIRONMENT - A system and method for usage-based application licensing in a hypervisor virtual execution environment. In accordance with an embodiment, the system comprises one or more computers, each with a hypervisor operating thereon and forming a hypervisor environment, together with one or more virtual machine images executing within that hypervisor environment. Each hypervisor aggregates usage statistics by each image instance for physical resources, and reports the statistics to a management framework. The management framework uses the statistics to ensure the system is adequately licensed with usage units. An initial allocation of usage units is recorded in the image and accessed during execution by the hypervisor. As the usage units near expiration, the hypervisor can signal that a particular image is about to become unlicensed. The management framework can then either allocate more usage units, shut down the image, or audit the unlicensed usage for later compensation.03-24-2011
20110072427SYSTEM AND METHOD FOR SYNCHRONIZING TRANSIENT RESOURCE USAGE BETWEEN VIRTUAL MACHINES IN A HYPERVISOR ENVIRONMENT - A system and method for synchronizing transient resource usage between virtual machines, e.g. Java Virtual Machines (JVMs), running within a hypervisor. In accordance with an embodiment, the system allows for synchronizing garbage collection and code optimization to reduce transient processor (cpu) and memory usage. In accordance with an embodiment, the system comprises a computer; a hypervisor for executing virtual servers running JVMs; a communication channel between the virtual servers; wherein each virtual server further comprises non-transient and transient memory and a synchronization module. In accordance with an embodiment the synchronization modules schedule garbage collects and code optimizations to minimize overlaps, thereby reducing the peak transient memory and cpu usage and the resulting volatility of transient resource usage within a computer. In accordance with another embodiment, a cloud manager can move virtual servers between computers to optimize computer volatility within a cloud.03-24-2011
20110078681METHOD AND SYSTEM FOR RUNNING VIRTUAL MACHINE IMAGE - A computer-implemented methods and systems for a running virtual machine image in a host machine. One method includes: receiving a virtual machine image provisioning request; sending to a storage server a request to copy a virtual machine image related to the virtual machine image provisioning request; receiving a portion of the virtual machine image; starting a virtual machine in the host machine by running the received portion of the virtual machine image; intercepting a file operation request of a program running in the virtual machine; and acquiring a file related to the file operation request.03-31-2011
20110061050METHODS AND SYSTEMS TO PROVIDE PLATFORM EXTENSIONS FOR TRUSTED VIRTUAL MACHINES - Methods and systems to authenticate a privileged virtual machine (VM), such as a monitoring VM, at a computing platform. Once authenticated, the privileged VM may access privileged resources, including data from the computing platform, via a VM manager or via defined instructions. Such data may include state information of other VMs. The state information may include performance counters of the other VMs. Such instructions may include ones that are not available to non-privileged VMs.03-10-2011
20110072429VIRTUAL MACHINE RELOCATION SYSTEM AND ASSOCIATED METHODS - A system to address virtual machine relocation may include a computer system and a host operating system executing on the computer system. The system may also include a second computer system and a second host operating system executing on the second computer system. The system may further include a virtual machine executing on the host operating system. The system may additionally include a tool to relocate the virtual machine to the second host operating system based upon the host operating system's needs, the second host operating system's availability, and/or the virtual machine's relocation eligibility.03-24-2011
20110072426Speculative Notifications on Multi-core Platforms - A computer system having a plurality of processor cores utilizes a device driver running in a driver virtual machine to handle I/O with the corresponding device for other virtual machines. A hypervisor in the computer system receives an interrupt from the corresponding device and identifies a virtual machine that best correlates to the received interrupt prior to forwarding the interrupt for handling by the driver virtual machine. The hypervisor then speculatively transmits a notification to the identified virtual machine to wake up and poll a memory shared between the identified virtual machine and the driver virtual machine. Once the driver virtual machine completes handling of the forwarded interrupt, it copies data made available by the corresponding device to the shared memory for access by the polling identified virtual machine.03-24-2011
20110061049Storage system, and remote copy control method therefor - A storage system includes an information apparatus in which a virtualization mechanism is implemented to build a virtual machine, a storage apparatus which is coupled to the information apparatus, which includes a first logical volume proving a storage area to be used by the virtual machine, and which includes a virtual disk area and a virtual disk management area on the first logical volume, the virtual disk area used by the virtual machine to store data, the virtual disk management area storing management data for managing the virtual disk area; and a management computer which is coupled to the information apparatus and the storage apparatus, and which includes a remote copy controller configured to copy the virtual disk area and the virtual disk management area on the first logical volume of the storage apparatus to a storage area on a second logical volume included in a second storage device coupled to the storage apparatus. The remote copy controller determines whether, on the second logical volume, there is the virtual disk management area used by the virtual machine. When determining that there is not, the remote copy controller transmits, to the storage apparatus, an instruction to copy the virtual disk management area and the virtual disk area to the second logical volume.03-10-2011
20110029970OPTIMIZING ON DEMAND ALLOCATION OF VIRTUAL MACHINES USING A STATELESS PREALLOCATION POOL - A method, computer system, and computer program product for allocating virtual machines in a stateless preallocation pool on a computing device is provided. In response to determining that a virtual machine is to be removed from an active pool in a computing device, it is determined whether the virtual machine is to be moved to a preallocation pool of the computing device. In response to determining that the virtual machine is to be moved to the preallocation pool, the virtual machine is cleansed of stateful data by removing unique information about the virtual machine's prior allocation while in the active pool. The virtual machine is moved to the preallocation pool. In response to determining that the virtual machine is needed in the active pool, the virtual machine is moved from the preallocation pool to the active pool.02-03-2011
20110035745RISC PROCESSOR APPARATUS AND METHOD FOR SUPPORTING X86 VIRTUAL MACHINE - A RISC processor apparatus and method for supporting an X86 virtual machine. The RISC processor includes: an instruction module for storing a virtual machine instruction set that supports the X86 virtual machine; a decoder for, during the decoding of an instruction of the virtual machine instruction set, distinguishing the virtual machine instruction set mode of the instruction, decoding the instruction according to the distinguished virtual machine instruction set mode, and outputting the decoded instruction to a fixed-point operation component or a floating-point operation component according to the distinguished virtual machine instruction set mode; the fixed-point operation component for processing the fixed-point instruction of the virtual machine instruction set according to the output of the decoder and outputting the execution result; the floating-point operation component for processing the floating-point instruction of the virtual machine instruction set according to the output of the decoder and outputting the execution result.02-10-2011
20110016466VIRTUAL MEDIA WITH FOLDER-MOUNT FUNCTION - A virtual media (VM) method for mounting a folder stored in a storage device of a client for accessed by a server as a virtual drive. The client assigns virtual cluster indices to each file in the folder, and creates a file-cluster index table to store the assigned virtual cluster indices. The client also creates a VM file system complying with the FAT file system standard except that only subdirectories and no data files are stored in the VM FAT file system. The VM FAT table uses virtual cluster indices rather than actual cluster indices. Data written by the server are stored in a temporary data area without modifying the actual file system of the storage device. The virtual sectors requested to be written are “dirty”, and the dirty sector numbers and corresponding temporary sector numbers are stored in a dirty sector index table for use in a write-back step.01-20-2011
20110016467System And Method For Managing Virtual Machines - In some embodiments, a method for virtual machine management includes receiving a request for a first virtual machine from a virtual host. The method also includes comparing the request for the first virtual machine to a policy. The policy includes rules that govern access to a plurality of virtual machines. In addition, the method includes providing the virtual host access to a second virtual machine in response to comparing the request for the first virtual machine to the policy.01-20-2011
20110010708SYSTEM AND METHOD FOR TRANSPORTING CONFIGURATION PARAMETERS - Configuration settings can be transferred from one machine by executing a first client application on a source machine to retrieve the configuration settings of the source machine. The configuration settings may be transformed into a platform and application independent format before being transferred to a target machine where a second client application transforms the configuration settings into platform or application dependent parameters appropriate for the target machine. In one example, the configuration parameters include a power policy that can be applied across a network.01-13-2011
20130160007ESTIMATING MIGRATION COSTS FOR MIGRATING LOGICAL PARTITIONS WITHIN A VIRTUALIZED COMPUTING ENVIRONMENT BASED ON A MIGRATION COST HISTORY - Responsive to a hypervisor determining that insufficient local resources are available for reservation to meet a performance parameter for at least one resource specified in a reservation request for a particular logical partition managed by the hypervisor in a host system, the hypervisor identifies another logical partition managed by the hypervisor in the host system that is assigned at the least one resource meeting the performance parameter specified in the reservation request. The hypervisor estimates a first cost of migrating the particular logical partition and a second cost of migrating the another logical partition to at least one other host system communicatively connected in a peer-to-peer network based on at least one previously recorded cost stored by the host system of migrating a previous logical partition to the at least one other host system.06-20-2013
20130160008APPLICATION INITIATED NEGOTIATIONS FOR RESOURCES MEETING A PERFORMANCE PARAMETER IN A VIRTUALIZED COMPUTING ENVIRONMENT - A hypervisor negotiates to reserve at least one available local resource in a host system that meets a performance parameter for at least one resource specified in a reservation request by a particular logical partition from among one or more logical partitions of virtualized pools of resources managed by the hypervisor in the host system, wherein the at least one performance parameter is specified by a particular application initiating the reservation request. The hypervisor, responsive to determining that the at least one available resource is not available in the host system, negotiates for offers to migrate the particular logical partition to at least one other host system comprising at least one available remote resource that meets the performance parameter, wherein the at least one other host system is managed by at least one other hypervisor that manages one or more other logical partitions of virtualized pools of resources.06-20-2013
20100313201METHODS AND APPARATUS FOR FAST CONTEXT SWITCHING IN A VIRTUALIZED SYSTEM - The present disclosure provides methods and apparatus for fast context switching in a virtualized system. In the disclosed system, a globally unique application-space identifier is associated with each guest application. No two applications share the same application-space identifier, even if the two applications reside in different virtual machines. Domain identifiers are used to ensure that a guest's mappings are only active when that guest is executing. A unique domain identifier is associated with each virtual machine, and all translation lookaside buffer entries thereby mapping the guest's kernel pages with that domain value. All other mappings are tagged with a predefined domain such as zero. In addition, a virtual memory management unit may be configured to support two virtual page table pointers and a configurable boundary between a virtual user page table and a virtual kernel page table. In such an instance, the two virtual page table pointers are presented to a guest operating system, and two physical page table pointers are associated with the two virtual page table pointers.12-09-2010
20120204172PROCESSOR EXCLUSIVITY IN A PARTITIONED SYSTEM - A computer system including a plurality of physical processors (CPs) having physical processor performances (PCPs), a plurality of logical processors (LCPs), a plurality of logical partitions (LPARs) where each partition includes one or more of the logical processors (LCPs), and a system assist processor having a control element. The control element controls the virtualization of the physical processors (CPs), the logical partitions (LPARs) and the logical processors (LCPs) and allocates the physical processor performances (PCPs) to the logical partitions (LPARs). The control element operates to exclusively bind logical processors (LCPs) to the physical processors (CPs). For a logical processor (LCP) exclusively bound to a physical processor (CP), the logical processor (LCP) has exclusive use of the underlying physical processor (CP) and no other logical processor (LCP) can be dispatched on the underlying physical processor (CP) even if the underlying physical processor (CP) is otherwise available.08-09-2012
20110258625GENERATING AND USING CHECKPOINTS IN A VIRTUAL COMPUTER SYSTEM - To generate a checkpoint for a virtual machine (VM), first, while the VM is still running, a copy-on-write (COW) disk file is created pointing to a parent disk file that the VM is using. Next, the VM is stopped, the VM's memory is marked COW, the device state of the VM is saved to memory, the VM is switched to use the COW disk file, and the VM begins running again for substantially the remainder of the checkpoint generation. Next, the device state that was stored in memory and the unmodified VM memory pages are saved to a checkpoint file. Also, a copy may be made of the parent disk file for retention as part of the checkpoint, or the original parent disk file may be retained as part of the checkpoint. If a copy of the parent disk file was made, then the COW disk file may be committed to the original parent disk file.10-20-2011
20110258622PLUGGABLE ACTIVATION ENGINE EXTENSIONS VIA VIRTUAL DISKS - A computer-implemented method, system and/or computer program product configure an extended virtual machine. A virtual image is executed to initialize a virtual machine. An activation engine is activated to search for special extensions in the virtual image. The virtual machine scans at least one virtual disk for script to implement the special extensions as virtual machine extensions, such that the virtual machine reads and executes the extensions prior to being available for use.10-20-2011
20110258621Autonomic Scaling Of Virtual Machines In A Cloud Computing Environment - Autonomic scaling of virtual machines in a cloud computing environment, the cloud computing environment including virtual machines (‘VMs’), the VMs installed upon cloud computers disposed within a data center, also including a cloud operating system and a data center administration server operably coupled to the VMs, including deploying, by the cloud operating system, an instance of a VM, flagging the instance of a VM for autonomic scaling; monitoring, by the cloud operating system, one or more operating characteristics of the instance of the VM; deploying, by the cloud operating system, an additional instance of the VM if a value of an operating characteristic exceeds a first predetermined threshold value, including executing a portion of the data processing workload on the additional instance of the VM; and terminating operation of the additional instance of the VM if a value of an operating characteristic declines below a second predetermined threshold value.10-20-2011
20120151472VIRTUALIZATION OF HARDWARE QUEUES IN SELF-VIRTUALIZING INPUT/OUTPUT DEVICES - Hardware transmit and/or receive queues in a self-virtualizing IO resource are virtualized to effectively abstract away resource-specific details for the self-virtualizing IO resource. By doing so, a logical partition may be permitted to configure and access a desired number of virtual transmit and/or receive queues, and have an adjunct partition that interfaces the logical partition with the self-virtualizing IO resource handle the appropriate mappings between the hardware and virtual queues.06-14-2012
20120151482SYSTEM AND METHOD FOR PROCESSING VIRTUAL MACHINE - Disclosed are a system and a method for efficiently managing virtual machine images that are varied for ever user, which generates a personal virtual machine image based on a shared virtual machine image using a copy on write method and processes the requested virtual machine through the generated image to support multi users. According to exemplary embodiments of the present invention, it is possible to integratively manage the same virtual machine and reduce the capacity of the virtual machine image in a data center, which reduces the cost for building the data center.06-14-2012
20100088698TECHNIQUES FOR MANAGING COMMUNICATION SESSIONS - Techniques for managing communication sessions are provided. Secure communication sessions are authenticated via a third-party service and the authenticated responses are broadcasts to multiple virtual machines within a secure network. Each session associated with a principal that is accessing a protected resource of the secure network. The virtual machines assume ownership roles and backup roles for managing the communication session to provide failover support for the communication sessions and in some instances load balancing of the communication sessions.04-08-2010
20100058342PROVISIONING SYSTEM, METHOD, AND PROGRAM - A shared server 03-04-2010
20120204174MANAGING ASSIGNMENT OF PARTITION SERVICES TO VIRTUAL INPUT/OUTPUT ADAPTERS - Automated management of partition service assignment to a virtual input/output (VIO) adapter is provided. Responsive to creation of a new partition service in a data processing system, a partition priority number is determined for the new partition service, and, for each VIO adapter, the partition priority numbers of the partition services currently assigned to that VIO adapter are summed. For a VIO adapter with a lowest sum of partition priority numbers, logic determines whether assigning the new partition service to that VIO adapter results in its summed partition priority number being above a predefined threshold, and the new partition service is assigned to a VIO adapter based, at least in part, on whether assigning the new partition service to the VIO adapter with the lowest sum of partition priority numbers results in that VIO adapter's summed partition priority number exceeding the predefined threshold.08-09-2012
20120204177METHOD, SYSTEM AND PROGRAM PRODUCT FOR CAPTURING CENTRAL PROCESSING UNIT (CPU) UTILIZATION FOR A VIRTUAL MACHINE - The present invention allows CPU utilization for a virtual machine (VM) to be captured from a perspective of a host. Specifically, under the present invention, a work request having a set (e.g., one or more) of jobs is received by a host and allocated to a virtual machine on a node. The work request is typically accompanied by an account identifier such as a multi-value billing code. Once the work request is allocated to a particular VM on the node, a “startacct” script is issued, and a first account record is created. Thereafter, the work request is processed and the CPU utilization needed to complete the set of jobs is monitored. Once the set of jobs is completed, an “endacct” script is issued and a second account record is created. Among other things, the second account record includes the monitored CPU utilization and the account identifier.08-09-2012
20120204176METHOD AND DEVICE FOR IMPLEMENTING LOAD BALANCE OF DATA CENTER RESOURCES - The present disclosure relates to a method and a device for implementing load balance of data center resources, and the method includes: obtaining current utilization ratios of properties of each physical machine in a scheduling domain, and determining, according to the current utilization ratios, physical machines that have residual capability satisfying a current allocation task, where the properties include a CPU load, a memory load and a network load;predicting a load degree of each of the physical machines on the assumption that the virtual machine is allocated by each of the physical machines; selecting, according to the predicted load degree of each of the physical machines, a physical machine from the physical machines to allocate the virtual machine. By adopting the solutions of the present disclosure, the problem of the load imbalance caused by the inconsistency of specification requirements of users and specifications of physical servers is solved.08-09-2012
20120204175VIRTUAL COMPUTER SYSTEM AND CONTROL METHOD THEREOF - When a failure occurs in an LPAR on a physical computer under an SAN environment, a destination LPAR is set in another physical computer to enable migrating of the LPAR and setting change of a security function on the RAID apparatus side is not necessary. When a failure occurs in an LPAR generated on a physical computer under an SAN environment, configuration information including a unique ID (WWN) of the LPAR where the failure occurs is read, a destination LPAR is generated on another physical computer, and the read configuration information of the LPAR is set to the destination LPAR, thereby enabling migrating of the LPAR when the failure occurs, under the control of a management server.08-09-2012
20120204173VIRTUAL MACHINE CONFIGURATION SYSTEM - A computing device configures virtual machines using configuration commands. Each of the virtual machines may boot from a corresponding virtual machine image file. As a virtual machine boots or executes, the virtual machine may read from or write to application and operating system files included in the corresponding virtual machine image file. Prior to the virtual machine booting, the computing device may get or set configuration properties of the operating system and applications to be booted in a respective virtual machine by reading from or writing to the application and operating system files included in the corresponding virtual machine image file. The computing device may execute configuration commands to get or set the configuration properties of the operating system and the applications.08-09-2012
20100269109Methods and Systems for Evaluating Historical Metrics in Selecting a Physical Host for Execution of a Virtual Machine - A method for evaluating historical metrics in selecting a physical host for execution of a virtual machine includes receiving, by a host recommendation service, an identification of a virtual machine and a request for an identification of a physical host on which to execute the virtual machine. The method includes retrieving, by an analysis engine in communication with the host recommendation service, a plurality of metrics for each of a plurality of physical hosts available for executing the virtual machine, the plurality of metrics including a first metric identifying a current level of load on each of the plurality of physical hosts and including a second metric identifying a level of load on each of the plurality of physical hosts during a time period prior to the current time period. The method includes retrieving, by the analysis engine, a plurality of metrics associated with the virtual machine, the plurality of metrics including at least one metric identifying a level of load placed on a physical host by the virtual machine during a time period prior to the current time period. The method includes determining, by the analysis engine, a level of priority associated with at least one of the first metric identifying a current level of load on each of the plurality of physical hosts and the second metric identifying a level of load on each of the plurality of physical hosts during a time period prior to the current time period. The method includes assigning, by the analysis engine, a score to each of the plurality of physical hosts, responsive to the retrieved pluralities of metrics and to the determined level of priority. The method includes transmitting, by the host recommendation service, an identification of one of the plurality of physical hosts on which to execute the virtual machine.10-21-2010
20090293057System and method for managing code isolation - A computing system is configured to use a trampoline to isolate sensitive code in a virtual environment and in other applications. An import table may describe the entry points of a privileged code module or driver that generates privileged code. A system and method loads a shadow kernel to facilitate isolating the linkage between drivers and the rest of the system. The shadow kernel may be a copy of the operating system kernel that does not have the same integral position in the operation of the computing device. The shadow kernel may be used as a template for creating a jump table to redirect more critical privileged resource access requests from specially loaded kernel mode drivers to the PVM. All requests may pass through the PVM, which redirects non-critical functions to the original kernel. Multiple copies of a given driver or code module may be loaded in a given session.11-26-2009
20120124572VIRTUALIZATION OF VENDOR SPECIFIC NETWORK INTERFACES OF SELF-VIRTUALIZING INPUT/OUTPUT DEVICE VIRTUAL FUNCTIONS - A vendor independent partition interface between a logical partition and an adjunct partition associated with a self-virtualizing IO resource is used to effectively abstract away vender-specific interface details for the self-virtualizing IO resource. By doing so, vender-specific implementation details may be isolated from the operating systems resident in logical partitions, thus requiring only changes in vendor specific firmware in order to support new or revised self-virtualizing IO resources.05-17-2012
20090249336Facility for Centrally Managed and Locally Managed Workspaces on the Same Computer - Embodiments deliver an operating system and software applications to a personal computer. The operating system and software applications may be managed and configured at a central location prior to delivery. Data that is created or modified on the personal computer may, from time to time, be stored at the central location. When a user switches from one personal computer to another, any and all of the data may be transferred from the central location to the user's current computer. Additionally, the user's current computer may receive suitable versions of the operating system and applications from the central location. In any case, the operating system and software applications may run with a domain of execution that is provided by a hypervisor. Thus, the operating system and software applications may operate within a virtualized machine, perhaps alongside and in isolation from other operating systems and software applications.10-01-2009
20090241114INFORMATION PROCESSING APPARATUS AND METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND EXTERNAL STORAGE MEDIUM - There is realized such a method for safely using and storing secret data that electronic copies of the secret data do not flow out of a particular external storage medium. In the present invention, a special format area which cannot be recognized from an ordinary PC is created in an external storage medium, and secret data is stored therein. By making a configuration in which a function of mounting the special format area is provided, and secret data in the special format area is edited and used on a work OS on which network access is inhibited and writing to a secondary storage device is inhibited, the destination of storing the secret data after it is used is limited to the special format area on the external storage medium so that outflow of the secret data from the external storage medium is prevented.09-24-2009
20090241111RECORDING MEDIUM HAVING INSTRUCTION LOG ACQUIRING PROGRAM RECORDED THEREIN AND VIRTUAL COMPUTER SYSTEM - A computer-readable medium on which is recorded a program for causing an information processing device to execute, a holding process, in a judgment information holder, judgment information indicating an instruction from which log information may be acquired; a acquiring process for instructions of instruction addresses in a range determined on the basis of the instruction addresses of instructions which were finally executed by a plurality of virtual computers when control rights of a plurality of real CPUs is returned from the virtual computers to the virtual computer monitor; a judging process for whether the acquired instruction is an instruction indicated by the held judgment information; and a recording process, in a log information holder, log information containing the instruction address of an acquired instruction and a acquiring frequency at which the instruction concerned is acquired in the acquiring step when the acquired instruction is judged as the indicated instruction.09-24-2009
20090241113METHOD AND SYSTEM FOR SUPPORTING WAKE-ON-LAN IN A VIRTUALIZED ENVIRONMENT - A method and system for supporting Wake-on-LAN technology in a virtualized environment is described. An improved virtual switch comprises a listener, which receives a power-on message on behalf of virtual machines, extracts addresses of the virtual machines to be powered on, which are embedded in the power-on message, compares the extracted addresses with addresses of the virtual machines stored in a database, and selectively powers on those virtual machines for which the extracted and stored addresses match.09-24-2009
20090241112RECORDING MEDIUM RECORDING VIRTUAL MACHINE CONTROL PROGRAM AND VIRTUAL MACHINE SYSTEM - A computer-readable medium on which is recorded a program for causing an information processing device to execute, setting each of the plurality of physical CPUs as a physical CPU for first process or a physical CPU for second process; setting a first CPU time and a second CPU time to different values; and when the control right of a physical CPU for the first process is assigned to any one of the plurality of virtual machines, setting the first CPU time for the virtual machine and assigning the control right to the virtual machine, and, when the control right of a physical CPU for the second process is assigned to any one of the plurality of virtual machines, setting the second CPU time for the virtual machine and assigning the control right to the virtual machine.09-24-2009
20090241109Context Agent Injection Using Virtual Machine Introspection - A computer implemented method, apparatus, and computer usable program code for executing a process within a virtual machine. A module is injected into an operating system for the virtual machine to form an injected module. The injected module is executed to load an agent process within an application space within the virtual machine. Execution of the agent process is initiated by the injected module.09-24-2009
20090210875Method and System for Implementing a Virtual Storage Pool in a Virtual Environment - A system and method for implementing distributed data storage. In particular, the system includes a plurality of virtualization servers, each of which is associated with available data resources. Each virtualization server supports one or more application virtual machines through a virtualization layer. In addition, a plurality of storage virtual machines is included in the system. Each storage virtual machine is associated with a corresponding and participating virtualization server. A virtual storage pool is included in the system, wherein each storage virtual machine allows the export and aggregation of available data resources within a corresponding virtualization server into the virtual storage pool.08-20-2009
20090150883Method and system for controlling network traffic in a blade chassis - In general, embodiments of the invention relates to a method for controlling network traffic in a chassis. The method includes assigning control of a network express manager located in the chassis to a control virtual machine selected from a number of virtual machines. The method further includes configuring the network express manager, by the control virtual machine, where the network express manager is configured to route network traffic in the chassis. The method further includes implementing a virtual network path using the network express manager, where the virtual network path includes a virtual wire between a first VNIC and a second VNIC, where the first VNIC is located in a first computer and the second VNIC is located in a second computer.06-11-2009
20090007107Leveraging transactional memory hardware to accelerate virtualization emulation - Various technologies and techniques are disclosed for using transactional memory hardware to accelerate virtualization or emulation. One or more central processing units are provided with transactional memory hardware that is operable to accelerate virtualization. The transactional memory hardware has a facility to maintain private state, a facility to render memory accesses from other central processing units visible to software, and support for atomic commit of the private state. The transactional memory hardware can be used, for example, to facilitate emulation of precise exception semantics. The private state is operable to enable an emulated state to remain inconsistent with an architectural state and only synchronized on certain boundaries. An optimized sequence of instructions is executed using chunk-accurate simulation to try and achieve a same end effect.01-01-2009
20080295094INTEGRATED PLACEMENT PLANNING FOR HETEROGENOUS STORAGE AREA NETWORK DATA CENTERS11-27-2008
20090125903Center management apparatus, method, and computer readable storage medium storing program thereof - A duplicator duplicates a specified guest program to create a guest copy. A virtual machine activation requester selects a center apparatus for maintenance and requests the selected center apparatus for maintenance to activate a virtual machine based on the guest copy. A maintenance requester requests the activated virtual machine to perform a maintenance process. After the maintenance process, when the guest copy has been changed, a maintenance reflector replaces with the guest copy the guest program, among data stored in a guest program storage, associated with a specified program ID.05-14-2009
20110179415ENABLEMENT AND ACCELERATION OF LIVE AND NEAR-LIVE MIGRATION OF VIRTUAL MACHINES AND THEIR ASSOCIATED STORAGE ACROSS NETWORKS - A virtual machine is migrated between a source cloud and a destination cloud. A temporary storage is mounted to a partition management firmware of the source cloud and to a partition management firmware of the destination cloud. A first storage location migration migrates the virtual machine from the source cloud to the at least one temporary storage. A second storage location migration migrates the virtual machine from the at least one temporary storage to final destination storage of the destination cloud. The temporary storage is then unmounted from the partition management firmware of the source cloud and from the partition management firmware of the destination cloud.07-21-2011
20110161957Virtualized Eco-Friendly Remote Presentation Session Role - Systems, methods, and computer-readable storage media are disclosed for virtualized eco-friendly remote presentation session roles. In an embodiment, a connection broker monitors the servers of a server farm, and, based upon characteristics of remote presentation sessions served by VMs executing on those servers, directs VMs on those servers to be migrated between servers, changed from sleeping to running or vice versa, or other operations that may improve the performance of the server farm as a whole.06-30-2011
20110161956HEAP DUMP OBJECT IDENTIFICATION IN A HEAP DUMP ANALYSIS TOOL - Embodiments of the present invention provide a method, system and computer program product for heap dump object identification in a heap dump analysis tool. In an embodiment of the invention, a method for heap dump object identification in a heap dump analysis tool can be provided. The method can include instrumenting an object with a uniquely identifiable marker, instantiating the instrumented object in a virtual machine executing in memory by a processor of a host computer and triggering a heap dump in the virtual machine. The method also can include parsing a heap dump file resulting from the triggered heap dump to locate a reference to the uniquely identifiable marker. Finally, the method can include displaying an association between the object and the heap dump file in a heap dump analysis tool executing in the memory by the processor of the host computer.06-30-2011
20120311579SYSTEM AND METHOD FOR UPDATING VIRTUAL MACHINE TEMPLATE - A remote computer and method deploys a first or a second virtual machine template in the cloud servers at the time interval. The remote computer sets the first virtual machine template power-off state, and deploys the first virtual machine template in each of the cloud servers. The remote computer sets the second virtual machine template power-off state, and deploys the second virtual machine template in the cloud server, in response to a determination that update of the second virtual machine template completes. The remote computer replaces the first virtual machine template with the second virtual machine template.12-06-2012
20120311578INFORMATION TERMINAL APPARATUS AND METHOD THEREOF - An information terminal apparatus includes a memory and a processor. The memory stores information indicating a front operating system. The processor runs a first virtual machine that executes a first operating system. The processor runs a second virtual machine that executes a second operating system. The processor controls user interface of the information terminal apparatus by executing the front operating system. The processor detects, by referring to the information stored in the memory, that the front operating system is changed from the first operating system to the second operating system. The processor notifies, upon the detection, the first virtual machine of a first notification indicating that the user interface stops. The processor notifies, upon the detection, the second virtual machine of a second notification indicating that the user interface restarts.12-06-2012
20120311577SYSTEM AND METHOD FOR MONITORING VIRTUAL MACHINE - A remote computer and method monitors a resource utilization rate of a cloud server of a datacenter. The remote computer obtains a resource utilization rate of each of virtual machines installed in the cloud server. The remote computer calculates the resource utilization rate of the cloud server according to the resource utilization rate of each of the virtual machines. The remote computer transfers one or more virtual machines from the cloud server to other cloud servers until the resource utilization rate of the cloud server is equal to or less than the predetermined resource utilization rate.12-06-2012
20120311576SYSTEM AND METHOD FOR RESTARTING A WORKLOAD BASED ON GLOBAL LOAD BALANCING - A method for restarting a virtual machine in a virtual computing system having a plurality of hosts and a resource scheduler for the plurality of hosts includes writing a placement request for the virtual machine to a shared channel that is accessible by the resource scheduler. The method further includes reading a placement result from the shared channel, wherein the placement result is generated by the resource scheduler responsive to the placement request; and restarting the virtual machine in accordance with the placement result.12-06-2012
20120311575SYSTEM AND METHOD FOR ENFORCING POLICIES FOR VIRTUAL MACHINES - In accordance with some embodiments of the present disclosure, a method for enforcing a policy associated with a user of a cloud computing service comprises determining a policy associated with a user of a cloud computing service. The method further comprises determining whether an information technology (IT) resource complies with the policy. The method additionally comprises determining that the IT resource is to launch a virtual machine to perform a computing service requested by the user if the IT resource complies with the policy.12-06-2012
20120311574SYSTEM AND METHOD FOR PROVIDING EVIDENCE OF THE PHYSICAL PRESENCE OF VIRTUAL MACHINES - In accordance with some embodiments of the present disclosure a method for providing evidence of a physical location of a virtual machine comprises launching, by an information technology (IT) resource, a virtual machine from a virtual machine image. The method further comprises generating, by the IT resource, a chain entry in a physical presence chain of the virtual machine image, the chain entry including an identifier of the IT resource indicating that the IT resource launched the virtual machine.12-06-2012
20120311573ISOLATION OF VIRTUAL MACHINE I/O IN MULTI-DISK HOSTS - Embodiments of the present invention relate to systems, methods, and computer storage media for concurrently maintaining a spanned virtual hard drive across two or more computer-storage media and a non-spanned virtual hard drive on one of computer-storage media. The method includes storing data of the spanned virtual hard drive across the computer-storage media utilizing volume spanning. While the spanned virtual hard drive is maintained on the computer storage media, the method includes storing data of the non-spanned virtual hard drive on one of the computer-storage media.12-06-2012
20120311572METHOD AND APPARATUS FOR IMPLEMENTING VIRTUAL PROXY TO SUPPORT HETEROGENOUS SYSTEMS MANAGEMENT - A computer system apparatus includes a first virtual machine hosted by a first physical machine. A target machine is communicatively coupled to the first virtual machine. The target machine is one of another physical machine and another virtual machine. The first virtual machine serves as a virtual proxy for the target machine.12-06-2012
20120311571SYSTEMS AND METHODS FOR TRACKING CLOUD INSTALLATION INFORMATION USING CLOUD-AWARE KERNEL OF OPERATING SYSTEM - Embodiments relate to systems and methods for tracking cloud installation information using a cloud-aware kernel of operating system. A guest operating system can be hosted in a cloud-based network which to support a set of virtual machines operating in that set of host clouds. The guest operating system can be configured with resources in the kernel to detect and manage the identity of the cloud in which the operating system is installed, as well as the duration of operation of the operating system and potentially, usage and other details of the set of virtual machines and their associated guest operating systems. Because the cloud identification and other data capture occurs directly in a cloud-aware kernel of the guest operating system, security and responsiveness are enhanced. The resulting set of kernel hosting data can be securely exported to a metering system or other platform for billing or other purposes.12-06-2012
20120311570DISTRIBUTED COMPUTING FRAMEWORK - Embodiments are directed to distributing processing tasks from the reduced-performance computer system to at least one other computer system, to processing, at one computer system, a distributed task received from a reduced-performance computer system, and to establishing a simulation environment for testing distributed computing framework functionality. In an embodiment, a reduced-performance computer system monitors computing tasks to determine a processing resource usage level for each task. The computing tasks are part of a software application that is running on the reduced-performance computer system. The reduced-performance computer system determines that one of the monitored tasks is using processing resources beyond a specified threshold level. The reduced-performance computer system sends the task to another computer system that receives, processes and returns the results of the tasks to the reduced-performance computer system. The reduced-performance computer system presents the processed results received from the other computer system within the running software application.12-06-2012
20120311569TEST SUITES FOR VIRTUALIZED COMPUTING ENVIRONMENTS - A method and system for performing tests in a virtualized computing environment. A test suite includes test code for testing emulation of a device associated with a guest hosted by a computer system. The computer system sets an input parameter of a migration command in the test code to a first value to turn off the migration command. The computer system executes the test code to produce a first result. The computer system also sets the input parameter of the migration command to a second value to turn on the migration command, and executes the test code to produce a second result. Turning on the migration command causes the guest to migrate to a second hypervisor. Based on the first result and the second result, the computer system determines whether an error occurs in migration of the guest or in the emulation of the device.12-06-2012
20120311568Mechanism for Inter-Cloud Live Migration of Virtualization Systems - A mechanism for inter-cloud live migration of virtualization systems is disclosed. A method of the invention includes receiving notification that live migration of a virtual machine (VM) has completed, wherein the VM is migrated from a source host computing machine on a source cloud to a target host computing machine on a target cloud, receiving requests sent to a previous IP address of the VM associated with the source cloud, the requests routed over a layer-2 (L2) network tunnel established between the source cloud and the target cloud, configuring a new network interface with a new Internet Protocol (IP) address for the VM to receive requests directly via a communication connection of the target cloud, and simultaneously handling the requests at both of the previous IP address received via the L2 network tunnel and the new IP address via the communication connection of the target cloud.12-06-2012
20120311567VIRTUAL MEDIA SHELF - A method and system for providing a guest with virtual media that can be read by the guest with an emulated media drive. A hypervisor hosted by a computer system presents a guest-to-host channel to a guest in the computer system. The hypervisor receives content from the guest via the guest-to-host channel, and then receives a request from the guest indicating that the guest is to read the content. The hypervisor provides the content for the guest to read by emulating a media drive and an insertion of removable virtual media. The removable virtual media contains the content and is readable by the guest with the emulated media drive.12-06-2012
20120311566COMPUTER SYSTEM AND ITS EVENT NOTIFICATION METHOD - If a failure occurs in physical resources constituting a virtual volume, a management server device is notified of information required by a user.12-06-2012
20120311565HOST-TO-GUEST CHANNEL FOR GUEST DEVICE IDENTIFICATION - A method and system for providing a descriptive name of a device in a virtual machine system. A computer system hosts a hypervisor, a management component and a guest. The hypervisor receives from the management component a descriptive name of a device available to the guest. The descriptive name defines at least one of the functionality of the device, the content of the device, or a user of the device. The hypervisor then passes the descriptive name to the guest via a host-to-guest channel, which is a shared storage location writable by the hypervisor and readable by the guest.12-06-2012
20120311564System and method to support subscription based Infrastructure and software as a service - A mini-cloud system has been described to enable subscription or service model for computing infrastructure, software and Digital content. The mini-cloud system work as a pipe line for information delivery connecting end user, infrastructure provider, content provider, and retailer offering automatic provisioning of infrastructure, content lifecycle management, automatic upgrade, servicing, license managements based on subscription model. Mini-cloud system uses a subscription management component, virtualization host to back computing environment, then add routing component to connect to backend cloud infrastructure along with a digital content delivery framework. The system allow a user to subscribe a computing environment, preferred software applications, and digital content like move and pay a monthly utility bill.12-06-2012
20090007103INJECTING VIRTUALIZATION EVENTS IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses, methods, and systems for injecting virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes virtual machine entry logic, recognition logic, and evaluation logic. The virtual machine entry logic is to initiate a transfer of control of the apparatus from a host to a guest running on a virtual machine. The recognition logic is to recognize a request from the host to inject a virtualization event into the virtual machine. The evaluation logic is to identify an intervening monitor to handle the virtualization event.01-01-2009
20080282242SIMULATION MANAGEMENT WITHIN A GRID INFRASTRUCTURE - A solution for managing a set of simulations within a grid infrastructure is provided. In particular, a solution is provided in which distinct simulations (e.g., virtual worlds, distributed simulations, and/or the like) and/or simulation instances (e.g., virtual world instances) can be concurrently managed in a single grid infrastructure.11-13-2008
20110047548Systems and Methods for a Disaster Recovery System Utilizing Virtual Machines Running on at Least Two Host Computers in Physically Different Locations - The present invention is directed to systems and methods for providing disaster recovery services using virtual machines. The invention provides an inexpensive and minimally intrusive way to provide disaster recovery services including recovery of the state of computer processors and devices. The system includes a production host and a backup host that communicate via a communications link. The state of the processor and devices on the production host are periodically stored onto backup host and can be restored in the event of an emergency. Additionally, the invention includes two business methods for utilizing the system and methods for providing disaster recovery services.02-24-2011
20110047547VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event.02-24-2011
20110047546Mechanism for Out-of-Synch Virtual Machine Memory Management Optimization - In one embodiment, a mechanism for out-of-synch virtual machine memory management optimization is disclosed. In one embodiment, a method for out-of-synch virtual machine memory management optimization includes receiving a memory management unit (MMU) synchronization event issued from a VM virtualized by a VM monitor (VMM) of a host server device, and synchronizing one or more unsynchronized page tables (PTs) of a shadow PT hierarchy maintained by the VMM with one or more corresponding guest PTs of a guest PT hierarchy maintained by the VM, wherein the one or more unsynchronized PTs include an unlimited number of unsynchronized PTs in a visible address space of the shadow PT hierarchy that is determined by a current CR3 register address of the shadow PT hierarchy.02-24-2011
20110047545Entropy Pools for Virtual Machines - In the host operating system of a computing device, entropy data is collected based at least in part on each of one or more hardware components of the computing device. An entropy pool is updated based at least in part on the collected entropy data, and data from the entropy pool is provided to a guest operating system running as a virtual machine of the computing device. The guest operating system maintains a guest operating system entropy pool based on the data from the entropy pool provided by the host operating system. The guest operating system accesses the guest operating system entropy pool and uses the guest operating system entropy pool as a basis for generating values including random numbers.02-24-2011
20110047544PARA-VIRTUALIZATION IN A NESTED VIRTUALIZATION ENVIROMENT - A para-virtualization method is provided. The method comprises implementing a virtual machine (VM) for guest software running on first host software. In response to a privileged instruction, the guest software causes a first VM exit. If the first host software is not running directly on hardware, the privileged instruction is managed without causing a second VM exit. Otherwise, the privileged instruction is managed normally.02-24-2011
20110047543System and Method for Providing Address Protection in a Virtual Environment - A method in one example implementation includes identifying an address space in a memory element of a system configured to operate in a virtual environment. The address space includes at least one system address, and the address space is provided to a virtual machine monitor. The method also includes generating a page table entry for the system address in a shadow page table stored in the virtual machine monitor in response to a guest operating system initiating a process. The page table entry is marked as a page not being present in order to trigger a page fault for a system address access from the guest operating system. In more specific embodiments, the method may include evaluating a page fault to determine access to the address space, where access to a writeable area of the memory element is denied.02-24-2011
20110047542System and Method for Enforcing Security Policies in a Virtual Environment - A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems. The method also includes verifying an authorization of the object by computing a checksum for the object and comparing the checksum to a plurality of stored checksums in a memory element. The execution of the object is denied if it is not authorized. In other embodiments, the method can include evaluating a plurality of entries within the memory element of the computer, wherein the entries include authorized binaries and kernel modules. In other embodiments, the method can include intercepting an attempt from a remote computer to execute code from a previously authorized binary.02-24-2011
20110047541SECURITY MANAGEMENT DEVICE AND METHOD - In a case where a master virtual machine, which is constructed on the basis of master information for configuring either part or all of a virtual machine, and an individual virtual machine, which is constructed on the basis of individual information that is configured partially or entirely in accordance with the master information, exist as the types of virtual machines that a physical client provides to a user terminal, a security check of a plurality of virtual machines is selectively executed, with respect to each check item, for a virtual machine of the type corresponding to the contents of the check item.02-24-2011
20110055827Cache Partitioning in Virtualized Environments - A mechanism is provided in a virtual machine monitor for providing cache partitioning in virtualized environments. The mechanism assigns a virtual identification (ID) to each virtual machine in the virtualized environment. The processing core stores the virtual ID of the virtual machine in a special register. The mechanism also creates an entry for the virtual machine in a partition table. The mechanism may partition a shared cache using a vertical (way) partition and/or a horizontal partition. The entry in the partition table includes a vertical partition control and a horizontal partition control. For each cache access, the virtual machine passes the virtual ID along with the address to the shared cache. If the cache access results in a miss, the shared cache uses the partition table to select a victim cache line for replacement.03-03-2011
20100333087Allocation and Regulation of CPU Entitlement for Virtual Processors in Logical Partitioned Platform - A system, method, and computer program product for managing processor entitlement of virtual processors in logical partitioned data processing system. One embodiment of the invention provides a method of managing processing resources in a data processing system. The method involves creating a resource set comprising a grouping of virtual processors, and allocating a processing resource entitlement the resource set. The method also includes assigning the resource set to a workload, receiving a request by the workload for utilization of processing resources, and in response to receiving the workload request dispatching the assigned resource set. The method further includes determining whether the dispatched virtual processors of the resource set have exceeded the assigned processing resource entitlement, and in response to determining that the processing resource entitlement has been exceeded, undispatching the resource set.12-30-2010
20080244568METHOD TO CAPTURE HARDWARE STATISTICS FOR PARTITIONS TO ENABLE DISPATCHING AND SCHEDULING EFFICIENCY - A method, system and computer program product enables the granular collection and utilization of hardware statistical samples for the efficient scheduling and allocation of data processing resources. In particular, a Partition Statistics Capture and Analysis (PSCA) utility utilizes special purpose registers to collect statistical samples, such as: (1) instructions completed; (2) Level2 (L2) cache misses; (3) cycles per instruction (CPI); and/or (4) other statistics selected based on the programming of the PSCA utility. Further, these statistical samples are utilized for the several purposes, including: (1) determining how long (time) the footprint of a partition takes to become established during the “cold start” period, i.e., during system instantiation; (2) detecting movement of the CPI curve in order to determine the (shifted) location of the onset of steady state (i.e., the knee) on the CPI curve; and (3) utilizing the statistical samples to guide dispatch decisions and make tuning recommendations.10-02-2008
20110167421Dynamic Scaling of Management Infrastructure in Virtual Environments - Methods, systems, and computer programs for performing management tasks in a virtual infrastructure are presented. The method includes detecting an increase, beyond a predetermined threshold, in the number of tasks waiting to be processed by a first virtual center (VC), which executes as a virtual machine (VM) in the virtual infrastructure. Further, the method includes operations for spawning one or more additional VCs executing as VMs in the virtual infrastructure and for distributing the managed objects handled by the first VC among the additional VCs. The tasks waiting to be processed are reallocated among the first VC and the additional VCs, and the reallocated tasks are then processed by the corresponding VC.07-07-2011
20100281479Systems and Methods for Input/Output Isolation - Systems and methods for providing virtual stacks are described. A kernel driver is installed and loaded. Then, a virtual stack is created, the virtual stack having a virtual file system, a virtual physical disk, and one or more virtual mounted volume devices. The virtual file system is configured to mimic characteristics of a host file system. The virtual physical disk is configured for providing an interface of a memory storage device to which the virtual file system device binds. The one or more virtual mounted volume devices are configured for allowing the one or more virtual processes to access data in stored memory through the virtual stack.11-04-2010
20110258626NOTIFYING SOFTWARE COMPONENTS USING A SHARED PHYSICAL STORAGE MEDIUM - Techniques for updating a cached version of data in a computer system upon a change of the data as stored in a shared storage system networked to the computer system are described. In accordance with such techniques, a notification from the shared storage system is received at the computer system upon attempting to access the shared storage system. The computer system then determines that the notification occurred due to an unregistering of the computer system's access to the shared storage system by a second computer system that has updated the data stored in the shared storage system. As such, the computer system re-registers its access to the shared storage system and updates the cached version of the data with the data in the shared storage system that was updated by the second computer system.10-20-2011
20110258623REAL TIME FLASH BASED USER INTERFACE FOR MEDIA PLAYBACK DEVICE - Common clients for consumer electronics devices that include natively implemented virtual machines are described. One embodiment of the invention includes audio and video decoders, a natively implemented host process, a natively implemented virtual machine, a common client including natively implemented processes configured to coordinate playback of audio and video using the playback device's audio and video decoders, a VM framework configured to execute within the virtual machine and to enable scripts executing within the virtual machine to initiate playback of audio and video using the natively implemented processes, and a user interface implemented as a script configured to be executed within the virtual machine.10-20-2011
20110265082VIRTUAL IMAGE OVERLOADING FOR SOLUTION DEPLOYMENT - At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines.10-27-2011
20110041126MANAGING WORKLOADS IN A VIRTUAL COMPUTING ENVIRONMENT - Methods and apparatus involve continuous management of workloads, including regular monitoring, profiling, tuning and fault analysis by way of instrumentation in the workloads themselves. Broadly, features contemplate collecting current state information from remote or local workloads and correlating it to predefined operational characteristics to see if such defines an acceptable operating state. If so, operation continues. If not, remediation action occurs. In a virtual environment with workloads performing under the scheduling control of a hypervisor, state information may also come from a hypervisor as well as any guest user and kernel spaces of an attendant operating system. Executable instructions in the form of probes gather this information from items of the stack available for control and deliver it to the management system. Other features contemplate supporting/auditing third party cloud computing services, validating service level agreements, and consulting independent software vendors. Security, computing systems and computer program products are other embodiments.02-17-2011
20100293543VIRTUAL MACHINE IMPLEMENTATION OF MULTIPLE USE CONTEXTS - Methods, devices, and systems for dynamically changing between contexts running simultaneously on a single communication device, such as a mobile communication device. More particularly, each context can be run as a virtual machine on the same communication device and context-related parameters can be used to determine which context or combination of contexts should be applied at a particular time.11-18-2010
20120151484Virtual Machine and Programming Language for Event Processing - A virtual machine supports execution of compiler-generated code and provides an execution environment for code that may correspond to any of several different event-driven or message-driven programming models (such as state machines, rules for complex event processing and event correlation, monitoring contexts, processes, and mediations). The programming models may be used in business monitoring and/or business integration environments. A programming language is defined for execution using the virtual machine, which contains a relatively small number of instructions and which is preferably generated by a compiler from a higher-level, event-driven or message-driven model.06-14-2012
20120151480PRESERVING CHANGES TO A CONFIGURATION OF A RUNNING VIRTUAL MACHINE - A method is provided for preserving changes to a configuration of a running virtual machine. The method includes reading an initial configuration, starting the virtual machine under application of the initial configuration, modifying the configuration of the virtual machine during runtime, storing the modified configuration of the virtual machine during shutdown, and reading the modified configuration at re-start of the virtual machine and re-starting the virtual machine under application of the modified configuration.06-14-2012
20110138385TRACING VALUES OF METHOD PARAMETERS - Implementations of the present disclosure provide methods including receiving one or more specifications at a virtual machine that is executed using one or more processors, each specification indicating one or more methods and one or more parameters to be traced, the one or more parameters corresponding to the one or more methods, executing an application, the application calling a method of the one or more methods using the virtual machine, determining a subset of the one or more received specifications, the subset corresponding to specifications that are applicable to the method, generating an entry event corresponding to the method based on the subset, the entry event comprising event data including values of the one or more parameters, and reporting the entry event.06-09-2011
20110138387Dynamic Utilization of Power-Down Modes in Multi-Core Memory Modules - Various embodiments of the present invention are directed to methods that enable a memory controller to choose a particular operation mode for virtual memory devices of a memory module based on dynamic program behavior. In one embodiment, a method for determining an operation mode for each virtual memory device of a memory module includes selecting a metric (06-09-2011
20110138386PATIENT MONITORING SYSTEM AND METHOD OF SAFE OPERATION WITH THIRD PARTY PARAMETER APPLICATIONS - The system and method of the present application includes a functional software stack including a type 1 hypervisor running on a single hardware platform. One embodiment of the hardware platform includes a processor and storage media, as well as network and video hardware. The hypervisor includes a network driver and a display driver, and executes directly on the hardware and abstracts the hardware from any guest operating systems (OS). To the OS, the hypervisor appears to be the base hardware platform and the network and display drivers appear to be similar hardware as well. The guest OS includes the resident patient monitoring application as well as third party applications, both of which execute independently on the virtualized hardware of the hypervisor. The network and display drivers manage the monitoring network and display regions in a monitoring display that are available to the guest operating systems.06-09-2011
20110138384DYNAMICALLY PROVISIONING VIRTUAL MACHINES - Virtual machines are managed on the basis of data obtained from a management information database of a network switch having a plurality of Ethernet links coupled to compute nodes running a plurality of virtual machines. A management entity, such as a provisioning manager, determines the amount of network bandwidth being utilized through each of the first and second Ethernet links and the amount of network bandwidth being utilized by the Internet Protocol addresses attributable to each of the virtual machines. Accordingly, one of the virtual machines may be migrated from one compute node to another compute node coupled to an Ethernet link having a greater amount of unutilized network bandwidth. Virtual machines may be dynamically migrated in order to provide each virtual machine with a required amount of network bandwidth.06-09-2011
20110138383Space Efficient Virtual Machines - A method and a system of making a virtual machine space efficient are disclosed. The virtual machine includes a virtual disk. The method includes creating a temporary virtual disk and adding the temporary virtual disk to the virtual machine. The temporary virtual disk works in conjunction with the virtual disk. The virtual machine is configured to store temporary files in the temporary virtual disk rather than the virtual disk.06-09-2011
20110138382SYSTEM AND METHOD FOR LOADING RESOURCES INTO A VIRTUAL MACHINE - In a heterogeneous environment of virtual machines, an agent can migrate between virtual machines of different types. During migration, classes of the mobile agent may need to be instantiated on the new virtual machine. To support classes across all virtual machine types, a resource server is provided that can provide virtual machine type specific instances of the classfile. The resource server receives a resource request from a resource loader of a virtual machine. The resource request specifies the resource and the virtual machine type, thereby enabling the resource server to retrieve the correct instance of the classfile to return to the resource loader.06-09-2011
20110072430ENHANCED SOLID-STATE DRIVE MANAGEMENT IN HIGH AVAILABILITY AND VIRTUALIZATION CONTEXTS - The present invention is directed to a virtualization system using a solid-state drive for disaster recovery.03-24-2011
20090210874Non-native program execution across multiple execution environments - A data processing system 08-20-2009
20110016468APPARATUS AND COMPUTER-IMPLEMENTED METHOD FOR CONTROLLING MIGRATION OF A VIRTUAL MACHINE - Migration of a virtual machine from a source host to a destination host is controlled by referring to a graph data structure wherein one or more hosts are associated with at least some of the nodes of the graph data structure, a source node being associated with the source host and a destination node being associated with the destination host, and in which each link of the graph data structure is ascribed at least a permission value associated with the virtual machine, to determine if traversal of a path from the source node to the destination node is permitted by the permission values of the links in the path. Migration of said virtual machine is allowed if traversal from said source node to said destination node along the path is permitted.01-20-2011
20110088031VIRTUAL COMPUTER DEVICE, VIRTUAL COMPUTER SYSTEM, VIRTUAL COMPUTER PROGRAM, AND CONTROL METHOD - Lack of freedom in the operation of terminals has been a problem. On the other hand, there has been concern that allowing freedom of operation would negatively impact systems. A virtual computer device is provided with a memory unit and a CPU. The CPU executes an access program, which has the CPU input from or output to the memory unit in accordance with a received input/output request, and a VM monitor which implements a virtual computer in the CPU. Under the control of the VM monitor, the CPU executes a VM program which sends a input/output request to the access program, and via the access program, has the CPU input from or output to the storage device.04-14-2011
20110088030Efficient Virtualization of Input/Output Completions for a Virtual Device - Completion interrupts corresponding to I/O requests issued by a virtual machine guest, which runs on a host platform, are virtualized in such a way that I/O completion interrupts to the requesting guest are delivered no faster than it can stably handle them, but, when possible, faster than the nominal speed of a virtual device to which a virtual machine addresses the I/O request. In general, completion events received from the host platform in response to guest I/O requests are examined with respect to time. If enough time has passed that the virtual device would normally have completed the I/O request, then the completion interrupt is delivered to the guest. If the nominal time has not elapsed, however, the invention enqueues and time-stamps the event and delivers it at the earliest of a) the normal maturity time, or b) at a safepoint.04-14-2011
20100115510VIRTUAL GRAPHICS DEVICE AND METHODS THEREOF - An information handling system is disclosed that is configured to execute multiple virtual machines simultaneously. The information handling system can assign graphical processing resources to each virtual machine based on the estimated workload for each machine. In addition, the information handling system can change the amount of graphical resources assigned to each virtual machine in response to changing workload estimations.05-06-2010
20110138381SYSTEM AND METHOD FOR REQUESTING RESOURCES INTO A VIRTUAL MACHINE USING CONNECTION INFORMATION - In a heterogeneous environment of virtual machines, an agent can migrate between virtual machines of different virtual machine types. During migration, objects of the serialized stream, e.g. representing a mobile agent, may need to be instantiated on the new virtual machine. Where the resources required to instantiate an object are missing on the virtual machine, the virtual machine may use connection information recorded when the serialized stream was received to connect to the source machine and request the required resources (e.g. the type for the object) from the source machine. A resource request to the source machine may specify a virtual machine type of the requesting virtual machine, thereby enabling the source machine to retrieve the correct instance of the type to return to the virtual machine.06-09-2011
20110093847Application Hosting Service for Cloud Environments Using Dynamic Machine Images - Systems, methods, and computer-readable storage media are disclosed for executing applications in a computing cloud. At least one computer in the cloud receives input from a client computer specifying a dynamic machine image (DMI) that includes a first program configured to dynamically deploy applications, and receives input from the client computer specifying one or more applications. The at least one computer deploys the specified DMI on one or more computers in the cloud in response to the input from the client computer specifying the DMI, thereby generating a corresponding virtual machine instance (VMI). The first program deploys at least a portion of each of the one or more requested applications to the VMI in response to the input from the client computer specifying the one or more applications, and the VMI executes at least one of the at least a portion of each of the one or more requested applications.04-21-2011
20110093848SYSTEM FOR IMPROVING A USER-SPACE ENVIRONMENT - A system to improve a user-space environment may include a user-space configured to execute on an operating system-level virtualization. The system may also include a boot module configured to boot up the user-space on the operating system-level virtualization without disrupting the operating system-level virtualization even if the operating system-level virtualization is already running.04-21-2011
20110093850DYNAMIC AND AUTOMATIC COLOCATION AND COMBINING OF SERVICE PROVIDERS AND SERVICE CLIENTS IN A GRID OF RESOURCES - A method for providing a servicing operation in a computing environment includes providing a plurality of resources including at least a client resource requiring a periodic servicing operation, a service provider resource capable of providing that servicing operation. At least one of the client resource and the service provider resource are defined by virtual machines. The client resource and the service provider resource are transparently co-located by transferring the resource defined by a virtual machine, and the service provider resource performs the servicing operation. Methods, computer systems, and computer programs available as a download or on a computer-readable medium for installation according to the invention are provided.04-21-2011
20110093849System and Method for Reconfigurable Network Services in Dynamic Virtualization Environments - A method includes configuring a host system to instantiate a virtual machine using server configuration information from a virtual machine monitor (VMM) and configuring a switch network to provide the virtual machine with access to resources on the switch network using network configuration information from the VMM. A VMM includes a workload with a server configuration module that configures a host system to include a virtual machine, and a network configuration module that configures a switch network coupled to the host system, such that the virtual machine obtains access to resources on the switch network.04-21-2011
20120174096SYSTEMS AND METHODS TO LOAD APPLICATIONS AND APPLICATION DATA INTO A VIRTUAL MACHINE USING HYPERVISOR-ATTACHED VOLUMES - Systems, methods, and software are described herein for operating a data management system, including a virtual machine agent running within a virtual machine responding to an attach-triggering event, determining selected storage volumes to be attached to the virtual machine based on a request generated by the virtual agent in response to the attach-triggering event, and dynamically attaching the selected storage volumes to the virtual machine.07-05-2012
20120174095AUTOMATICALLY AND SECURELY CONFIGURING AND UPDATING VIRTUAL MACHINES - A method and program product for automatically and securely updating software on a virtual machine (VM). A VM coming online in a virtualized server is detected. A current version of the software that is installed on the VM is determined. The current version is determined to not match an updated version of the software available from a remote update server via a network. The updated version of the software is received from the remote update server and via the network without the VM being connected to the network. A confirmation is received indicating that the updated version of the software is installed on the VM. In response to receiving the confirmation, the VM is connected to the network.07-05-2012
20120174094VIRTUAL APPLIANCE DEPLOYMENT - A method, article of manufacture, and apparatus for efficiently processing information. In some embodiments, this includes determining a physical appliance to virtualize, creating a virtual appliance based on the physical appliance, and storing the virtual appliance in a storage array. In some embodiments, creating the virtual appliance includes creating the virtual appliance from a template07-05-2012
20110179414CONFIGURING VM AND IO STORAGE ADAPTER VF FOR VIRTUAL TARGET ADDRESSING DURING DIRECT DATA ACCESS - A method is provided for use in a system that includes a host computing machine configured to implement a virtualization intermediary and that includes a physical storage adapter, the configures a virtual machine (VM) and a virtual function (VF) to support IO operations to physical storage through a direct IOV path to the VF of the physical storage adapter, the method comprises: creating by the virtualization intermediary mapping information that includes a first mapping between virtual disks and physical regions of physical storage and that includes a second mapping between virtual disks and virtual disk addresses; transmitting the mapping information from the virtualization intermediary over the physical storage adapter from a physical function (PF) of the physical storage adapter to the VF; associating a virtual port with the mapping information within the virtualization intermediary; binding the virtual port to the VF; communicating virtual disk addresses indicated within the second mapping within the transmitted mapping information for the allocated virtual disks to the VM.07-21-2011
20100122248CLONING VIRTUAL MACHINES - While current solutions for cloning virtual machines can involve copying and duplicating files associated to a virtual machine (VM), systems and techniques can be devised to create thin clones of a VM using the VM's associated storage system to copy and deduplicate storage for the VMs. One can create a base VM in a directory of a storage container attached to a hypervisor, and then map the storage container to a volume on a storage system. One can clone the base VM using a snapshot of respective files associated to the base VM, which can comprise creating metadata that identified a physical storage location of the files. Further, the metadata can then be copied to a desired location on the storage container, to create a VM clone. Once copied, the cloned VM can be customized and registered within the hypervisor.05-13-2010
20120151481SYSTEM FOR MANAGING PERSONALIZATION INFORMATION OF VIRTUAL MACHINE BASED ON CLOUD COMPUTING AND METHOD THEREOF - Disclosed are a system and method for managing personalization information of a virtual machine based on cloud computing.06-14-2012
20120151479HORIZONTAL SPLITTING OF TASKS WITHIN A HOMOGENOUS POOL OF VIRTUAL MACHINES - Horizontal splitting of tasks within a homogenous pool of virtual machines. A primary virtual machine is provided to service requests from a request source during a session. The primary virtual machine services requests having a first priority received during the session. A secondary virtual machine is provided to service requests from the request source during the session. The secondary virtual machine services requests having a second priority received during the session. The first virtual machine and the second virtual machine run on a single physical computing platform.06-14-2012
20120151475Virtualizing Baseboard Management Controller Operation - Virtualizing baseboard management controller operation in a host computer that includes a base BMC, where virtualizing BMC operation includes executing, by the host computer, a virtual BMC; registering, by the virtual BMC, with the base BMC of the host computer; and processing BMC requests by the virtual BMC.06-14-2012
20120151474DOMAIN MANAGEMENT AND INTERGRATION IN A VIRTUALIZED COMPUTING ENVIRONMENT - Systems and methods for domain management in a virtualized computing environment are provided. In one embodiment, the method comprises collating advice received from one or more domain advisors connected in the virtualized computing environment; resolving any conflicts among the advice received from said one or more domain advisors; utilizing the collated advice to generate a placement plan comprising a plurality of operations for virtual machines in said virtualized computing environment; and executing the one or more operations in the placement plan, wherein one or more domain handlers may be called to update the virtualized computing environment before, during or after execution of one or more operations from among said plurality of operations in the plan.06-14-2012
20120151477TEMPLATE VIRTUAL MACHINES - There is provided a method of providing a template virtual machine. An exemplary method comprises creating a template virtual machine comprising an image of an operating system and software running on the operating system. The template virtual machine does not include machine-specific identifiers. The template virtual machine is booted into a virtual machine environment. Subsequently, machine-specific identifiers for the template virtual machine are updated. The template virtual machine may then be booted with machine-specific identifiers into a service instance to perform a function determined by the software running on the operating system such that uniform code pages representing the operating system and software running on the operating system are shared among virtual machines in the virtual machine environment.06-14-2012
20120151476VIRTUAL MACHINE MORPHING FOR HETEROGENEOUS MIGRATION ENVIRONMENTS - Virtual machines may migrate between heterogeneous sets of implementation resources in a manner that allows the virtual machines to efficiently and effectively adapt to new implementation resources. Furthermore, virtual machines may change types during migration without terminating the virtual machines. Migration templates may be established to manage migration of sets of virtual machines between sets of implementation resources and/or virtual machine types. Migration templates may be established based at least in part on information provided by migration agents added to the virtual machines under consideration for migration. The migration agents may detect and augment relevant virtual machine capabilities, as well as trigger reconfiguration of virtual machine components in accordance with migration templates.06-14-2012
20120151473SIMPLIFIED DMA MAPPINGS FOR SELF-VIRTUALIZING INPUT/OUTPUT DEVICE VIRTUAL FUNCTIONS - Multiple TCE entries at the same indices in multiple, same size TCE tables are mapped to facilitate data communication between a self-virtualizing IO resource and a logical partition. First and second TCE tables used by an adjunct partition that interfaces a self-virtualizing IO resource with a logical partition may be identically sized, so that whenever a DMA operation between the self-virtualizing IO resource and the logical partition is desired the same TCE entries in the first and second TCE tables may be used to perform a redirected DMA operation, and without the need to perform hashing or other mapping algorithms to map to the respective TCE entries in the respective TCE tables.06-14-2012
20120151471ADDRESS TRANSLATION TABLE TO ENABLE ACCESS TO VIRTUALIZED FUNCTIONS - A computer-implemented method may include assigning an address translation table to a peripheral component interconnect host bridge and determining that an input/output adapter accessible to the peripheral component interconnect host bridge is configured as a virtualized adapter to provide a plurality of virtual functions to a plurality of logical partitions. In response to determining that the input/output adapter is configured as the virtualized adapter, the address translation table may be subdivided to enable the plurality of virtual functions to access the memory of at least one logical partition of the plurality of logical partitions.06-14-2012
20090300612Distributing Virtualization Software Address Space in Guest OS Address Space - In a computing system having virtualization software including a guest operating system (OS), a method for operating wherein virtualization software address space is distributed in guest OS address space that includes: granting the guest OS execute, but not read or write, access, to pages in the virtualization software address space.12-03-2009
20090300609Combining system blueprints, functional layer, and software bits in parallel development of machines - A self-replicating machine includes a virtualization tool, a provisioning tool, and a configuration tool, stored in a distributable self-contained repository of the machine. The machine is able to automatically rebuild itself solely from the tools stored in the distributable self-contained repository. The virtualization tool is configured to build one or more virtual machines on the machine. Each virtual machine has a corresponding operating system and environment. The provisioning tool is configured to provision the one or more virtual machines. The configuration tool is to configure the one or more provisioned virtual machines. A custom configuration management tool further customize and configure the physical machine for specific users. A source code management tool stored in the distributable self-contained repository is configured to develop each virtual machine independently from each other in parallel, and to merge back the developments to a corresponding parent virtual machine.12-03-2009
20090300607SYSTEMS AND METHODS FOR IDENTIFICATION AND MANAGEMENT OF CLOUD-BASED VIRTUAL MACHINES - Embodiments relate to systems and methods for identification and management of cloud-based virtual machines. A user requests the instantiation of a set of virtual machines from a cloud computing environment. A cloud management system requests the resources necessary to build the machines from a set of resource servers. After populating the set of virtual machines from the cloud, the cloud management system inserts a token ID into one of the virtual machines to designate that machine as a management instance. An image of that machine can be stored in the cloud management system to represent the configuration of the set of virtual machines, even when the cloud itself lacks permanent storage. When the user wishes to update the set of virtual machines, the cloud management system can insert another token ID into another virtual machine, reconfigure the software, processing, or other resources of that machine as a revised management instance.12-03-2009
20090300605VIRTUAL COMPUTING INFRASTRUCTURE - A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. Each virtual infrastructure can be passivated by suspending applications, stopping operating systems, and storing state, to enable later reactivation. This is simpler for a complete virtual infrastructure than for groups of virtual entities and physical entities. It enables cloned virtual infrastructure to be created for testing, upgrading or sharing without risk to the parent. On failure, reversion to a previous working clone is feasible.12-03-2009
20090293056METHODS AND SYSTEMS FOR AUTOMATIC SELF-MANAGEMENT OF VIRTUAL MACHINES IN CLOUD-BASED NETWORKS - A cloud management system can insert a self-management module in virtual machines. The self-management module can be configured to automatically perform management functions on the virtual machine in which it is inserted. The management functions can include activation, suspension, or termination of the virtual machine. The management functions can also include tracking and monitoring the virtual machine. The management functions can also include providing messages to the cloud management system regarding the status and usage of the virtual machine.11-26-2009
20090293055Central Office Based Virtual Personal Computer - A virtual personal computer is implemented in a communication system comprising a plurality of central offices each of which communicates with a plurality of client devices over a corresponding access network. A given one of the central offices comprises at least one compute server and at least one storage server. The virtual personal computer is configured by allocating physical processing resources of the compute server and physical storage resources of the storage server to that virtual personal computer. User access is provided to the virtual personal computer via one of the client devices. The virtual personal computer can be dynamically reconfigured by altering the allocation of at least one of the physical processing resources and the physical storage resources to the given virtual personal computer responsive to particular applications selected by the user to run on the given virtual personal computer.11-26-2009
20090293054Streaming Virtual Disk for Virtual Applications - A sparsely populated, streaming virtual disk may be used with a virtual application to enable fast launching of a virtual application from a network server. The virtual disk may be configured and populated in blocks, enabling those blocks that are used at a particular time to be downloaded and stored in the virtual disk. As other blocks are requested by the virtual application, those blocks may be fetched from the network server. Each block may be validated using a hash tree or some other function so that the recipient may verify authenticity and completeness. In some embodiments, a virtual application may be configured and deployed as a single file, enabling simple version control among other things.11-26-2009
20090204959METHOD AND APPARATUS FOR VIRTUAL PROCESSOR DISPATCHING TO A PARTITION BASED ON SHARED MEMORY PAGES - The present invention provides a computer implemented method, data processing system, and computer program product for mapping and dispatching virtual processors in a data processing system having at least a first partition and a second partition. The data processing system runs a first partition on a virtual processor during a first timeslice. The data processing system identifies an at least one physical page used by the first partition and the second partition. The data processing system maps the at least one physical page to the first partition and the second partition. The data processing system determines a fitness value based on the mapping. The data processing system dispatches the Virtual processor to the second partition on a second timeslice based on the fitness value, wherein the second timeslice immediately succeeds after the first timeslice, whereby the at least one physical page remains in cache during at least the first timeslice and the second timeslice.08-13-2009
20110265084CROSS ARCHITECTURE VIRTUAL MACHINE MIGRATION - A system, method and computer program for transferring a running virtual machine from a first to a second physical machine, where each of the physical machines has a different instruction set architecture. The system may comprise a receiver for receiving a transfer request; responsive to receiving the transfer request, means for pausing the virtual machine; and means for collecting a state of the virtual machine. The system may include means for stopping a first interface component operable on the first physical machine; means for starting a second interface component operable on the second physical machine; and means for transferring the state to the second interface component. The system may further comprise means for starting the virtual machine on the second physical machine in response to the state transfer.10-27-2011
20100058340Access Controlling System, Access Controlling Method, and Recording Medium Having Access Controlling Program Recorded Thereon - An access controlling system include a managing domain which generates a virtual file for each domain and each resource, determines whether a label can be provided to the generated virtual file, and determines contents of the labels provided to the domain 03-04-2010
20100031259ESTIMATING POWER CONSUMPTION OF A VIRTUAL SERVER - Embodiments of the invention disclose a system and a method for estimating the power consumption of virtual servers that operate in various hardware configurations and making a charge. The system consists of a resource utilization measurement unit that measures utilization of a hardware resource by an operation of a virtual server. The system also includes a conversion unit that converts the utilization of the hardware resource measured by the resource utilization measurement unit to utilization of a hardware resource in a case where the operation of the virtual server is performed in a reference server including a preset hardware configuration. The system further includes a virtual power consumption calculation unit that calculates, on the basis of the utilization in the reference server obtained by the conversion by the conversion unit, as power that can be assumed to be consumed by the operation of the virtual server, power consumption in a case where a similar operation is performed in the reference server. The system further has an accounting unit that makes a charge for the operation of the virtual server on the basis of the power consumption calculated by the virtual power consumption calculation unit. Other embodiments are also provided.02-04-2010
20100031258VIRTUAL MACHINE SYSTEM AND CONTROL METHOD OF THE VIRTUAL MACHINE SYSTEM - In a control method of a virtual machine system, when a virtual machine operating in a physical machine is transferred to another physical machine, a management server stops the virtual machine of transfer source and defines a virtual machine of transfer destination in the other physical machine. A virtual network address and a virtual storage interface address of the virtual machine of transfer source is exchanged with a virtual network address and a virtual storage interface address defined in the virtual machine of transfer destination in the state that the virtual machine is prevented from being activated and then prevention of activation of the virtual machine of transfer destination is canceled, so that transfer processing can be made safely by simple procedure.02-04-2010
20100031257COMPUTER SYSTEM, VIRTUAL COMPUTER SYSTEM, COMPUTER ACTIVATION MANAGEMENT METHOD AND VIRTUAL COMPUTER ACTIVATION MANAGMENT METHOD - A computer system, a virtual computer system and a computer activation management method for each system are disclosed. In the virtual computer system, a virtualization mechanism includes a WWN management table for storing the correspondence between a virtual HBA assignable to each virtual computer and the WWN, and a LPAR activation unit for checking the WWN corresponding to the virtual HBA assigned to the virtual computer based on the WWN management table at the time of activating the virtual computer and in the case where the WWN assumes a value indicating the activation suppression, suppressing the activation of the virtual computer. The virtual computer or the computer with the device identification information changeable, if triggered at a timing not intended by the user, can be prevented from being activated.02-04-2010
20100031255Modular Virtual Machine Server - A simple to customize IT infrastructure architecture. The IT infrastructure architecture includes a general-purpose virtualized architecture platform. The IT infrastructure architecture is well suited for delivering simple pre-packaged software solutions to the small business segment as plug and play type appliances. In certain preferred embodiments, the IT infrastructure architecture includes a virtual appliance memory device such as a virtual appliance universal serial bus (USB) key. The IT infrastructure architecture uses embedded server virtualization technology to host business applications as a virtual appliance.02-04-2010
20100031254Efficient detection and response to spin waits in multi-processor virtual machines - Various aspects are disclosed herein for attenuating spin waiting in a virtual machine environment comprising a plurality of virtual machines and virtual processors. Selected virtual processors can be given time slice extensions in order to prevent such virtual processors from becoming de-scheduled (and hence causing other virtual processors to have to spin wait). Selected virtual processors can also be expressly scheduled so that they can be given higher priority to resources, resulting in reduced spin waits for other virtual processors waiting on such selected virtual processors. Finally, various spin wait detection techniques can be incorporated into the time slice extension and express scheduling mechanisms, in order to identify potential and existing spin waiting scenarios.02-04-2010
20100031253SYSTEM AND METHOD FOR A VIRTUALIZATION INFRASTRUCTURE MANAGEMENT ENVIRONMENT - A secure network architecture. The secure network architecture includes a plurality of data processing system servers connected to communicate with a physical switch block, each of the data processing system servers executing a virtual machine software component. The secure network architecture also includes a data processing system implementing a virtualized logical compartment, connected to communicate with the plurality of data processing system servers via the physical switch block. The virtualized logical compartment includes a plurality of virtual components each corresponding to a different one of the virtual machine components.02-04-2010
20120210319NETWORK COMMUNICATIONS OVER SHARED LINKS IN A VIRTUALIZED ENVIRONMENT - A method of data processing includes a physical host executing a virtual machine monitor (VMM) that instantiates a plurality of virtual machines (VMs). The VMM supports processing of a virtual link manager (VLM) that deploys and configures a plurality of Layer 2 virtual links sharing bandwidth of a Layer 2 physical link between the physical host and an access switch. The VMM communicates parameters of the plurality of virtual links with the access switch.08-16-2012
20100023943INTERFACE FOR PROCESSING CLIENT-SERVER METHOD CALLS WITHIN A SINGLE VIRTUAL MACHINE - The present invention concerns a method and system for enabling a server application to be executed in the same Java Virtual Machine (VM) as a client application using direct Java method calls without the need for remote communications protocol processing of the method calls. This is achieved by providing an application program interface (API) that exposes objects comprising the server application program to the client application program, whereby a client application method call is reduced by the interface to a Plain Old Java Objects (POJO) method call.01-28-2010
20100023942ACCELERATING VIRTUAL MACHINE RESUME TIME USING A PRE-CACHED WORKING SET - A client transitions between a suspended virtual machine (VM) state and an active VM state by employing a working set comprising a VM state file and a working set index file. The VM state file serializes each of the VM components that is saved to storage. The working set index file contains indirect information that records the offset, length, and region of various pieces of the VM state and contains a VM working set. The VM suspend state serialization is implemented as either a monolithic or an incremental process.01-28-2010
20100023941VIRTUAL MACHINE MONITOR - A mapping data generator determines a virtual page number of a virtual page where an executable code in an object file is mapped. A virtual page manager manages a virtual page record containing the virtual page number, a first object ID corresponding to the virtual page number, and a detection flag indicative of existence of another virtual page record containing a second object ID identical with the first object ID. A machine page manager manages a machine page record containing the first object ID, and a machine page number to which the virtual page number is mapped. A sharable page detector determines whether a detection flag indicates existence of another virtual page record containing the first object ID and determines whether a machine page number has been set. A page mapper maps a set machine page number to the virtual page number of the access page.01-28-2010
20100023940VIRTUAL MACHINE SYSTEM - A virtual machine system includes a virtual battery manager, a discharge calculator, and a discharger. The virtual battery manager manages a virtual battery for running a virtual machine. The virtual battery holds electric energy used by the virtual machine. The virtual battery is capable of discharging and being charged. The discharge calculator calculates a discharged amount of the virtual battery by calculating energy consumption of the virtual machine with reference to a consumption policy and a consumption allocation table when a resource quota for the virtual machine satisfies a predefined condition for discharging. The consumption policy defines a maximum amount of total energy consumption of the plurality of virtual machines. The consumption allocation table contains an allocated ratio of energy consumption for each of the plurality of virtual machines. The discharger decreases a battery level of the virtual battery.01-28-2010
20100023939Virtual-machine generating apparatus, virtual-machine generating method, and virtual-machine generation program - A virtual-machine generating apparatus includes a configuration-information storage unit that stores hardware resources and hardware configuration information in association with unique information of virtual machines. When accepting resources as many as the number of virtual machines to be newly introduced, the apparatus determines whether the resources identical to the accepted resources are stored in the configuration-information storage unit. When it is determined that the identical hardware resources are stored, the apparatus performs a process of copying an OS of the virtual machines having the identical resources, as many times as the number of those having the resources determined as being stored in the configuration-information storage unit.01-28-2010
20100017802NETWORK SYSTEM AND METHOD FOR CONTROLLING ADDRESS SPACES EXISTING IN PARALLEL - The present invention relates to a network system having a large number of network elements which are connected via network connections and also to a method for controlling address spaces which exist in parallel. Network systems and methods of this type are required in order to organise distributed memories in an efficient manner which are connected via network connections, in particular in order to accelerate the memory access in the case of parallel distributed computing.01-21-2010
20100017800METHOD, COMPUTER PROGRAM PRODUCT, AND HARDWARE PRODUCT FOR SUPPORTING VIRTUAL MACHINE GUEST MIGRATION OVERCOMMIT - Virtual machine guest migration overcommit is supported by providing a virtual machine with an unschedulable resource that is not available for system scheduling. The unschedulable resource may, but need not, be provided in the form of a memory buffer, or one or more network resources, or one or more resources that are accessible from a network. The unschedulable resource is utilized in one or more domains to temporarily conceal one or more user environments that do not fit into a set of currently available resources, such that the one or more temporarily concealed user environments are not terminated or paged out.01-21-2010
20110154330METHOD, DATA PROCESSING PROGRAM, AND COMPUTER PROGRAM PRODUCT TO COMPENSATE FOR COUPLING OVERHEAD IN A DISTRIBUTED COMPUTING SYSTEM, AND CORRESPONDING OVERHEAD CALCULATOR FOR A DISTRIBUTED COMPUTING SYSTEM AND CORRESPONDING COMPUTER SYSTEM - An improved method to compensate for coupling overhead in a distributed computing system offering a raw processing capacity, comprising an effective processing capacity (06-23-2011
20110154325VIRTUAL MACHINE SYSTEM, SYSTEM FOR FORCING POLICY, METHOD FOR FORCING POLICY, AND VIRTUAL MACHINE CONTROL PROGRAM - A virtual machine system that builds one or more virtual machines on a real machine has a hypervisor for realizing access to virtualized hardware by a guest OS that is an operating system running on the virtual machines or an application running on the guest OS by means of a physical device that the real machine has. The hypervisor includes a setting item information holding unit that holds setting item information in which a security policy is indicated by the setting value of a setting item; a setting detecting unit that monitors an instruction executed by the guest OS and the output of the physical device to detect the setting value that is set in the setting item of the setting item information holding unit or a setting value that is about to be changed therein; and a setting applying unit that, when the detected setting value and the setting value indicated by the setting item information differ from each other, applies the setting value indicated by the setting item information to the guest OS or application that is the setting target of the setting item.06-23-2011
20110307888PROTECTION OF VIRTUAL MACHINES EXECUTING ON A HOST DEVICE - Technology is described for protection of virtual machines executing on a host device having host processors and host memory. The system can include a hypervisor configured to enable the virtual machines to execute concurrently on the host device. An emancipated partition can be provided with a communication channel to the hypervisor. A primary partition can be configured to interface with the emancipated partition through the communication channel via the hypervisor. In addition, an emancipated memory space and virtual register state for the emancipated partition can be protected from direct access by the primary partition.12-15-2011
20110307885Enhanced Software License Management - Systems, methods, computer program product embodiments are provided for enhanced license management. An embodiment includes providing an asset management module for managing software license utilization in a computer processing environment, and allowing configuration of the asset management module to designate software license utilization based upon a containment level associated with virtualization capabilities of one or more computer processing systems within the computer processing environment.12-15-2011
20110307889VIRTUAL MACHINE SYSTEM, NETWORKING DEVICE AND MONITORING METHOD OF VIRTUAL MACHINE SYSTEM - A method of monitoring a virtual computer system including a network device coupled to a client computer, sever computers each coupled to the network device, and a performance degradation source locator apparatus coupled to the network device and the server computer, obtaining, by the performance degradation source locator apparatus, performance information on physical computer resources and performance information on virtual computer resources of extracted virtual machines and server computers and the virtual machine and the server computer in which the latency has increased to locate a part in which the latency has increased.12-15-2011
20110307887DYNAMIC VIRTUAL MACHINE SHUTDOWN WITHOUT SERVICE INTERRUPTIONS - Techniques for dynamically managing a sleep state of a virtual machine are provided. The techniques include detecting idleness of a virtual machine, putting the idle virtual machine into a sleep state, implementing a virtual machine surrogate, wherein the virtual machine surrogate listens to network traffic, enabling the virtual machine to handle network traffic that is capable of being handled by the virtual machine, and enabling the virtual machine to queue network traffic and wake-up the virtual machine in the sleep state for network traffic that the virtual machine surrogate is incapable of handling.12-15-2011
20110307886METHOD AND SYSTEM FOR MIGRATING THE STATE OF A VIRTUAL CLUSTER - The administrative work needed to configure a virtual cluster is a major obstacle that limits its adoption by customers. Moreover, an organization can spend much time and effort testing a cluster configuration and would like to deploy this cluster configuration at many sites. To address these problems, the disclosed embodiments provide a mechanism that facilitates migrating a virtual cluster from a first computer system to a second computer system. During operation, the system captures the virtual cluster configuration state, including application configuration state and executables. The system then instantiates this captured state on a second computer system, thus re-creating the virtual cluster state of the first computer system on the second computer system.12-15-2011
20090138877METHODS AND APPARATUS FOR LOCATING AN UNAUTHORIZED VIRTUAL MACHINE - Methods and apparatus of locating an unauthorized virtual machine are disclosed. A virtual machine is registered with a management system. When the virtual machine is requested to start, the system determines whether the virtual machine is in an authorized environment. In an authorized environment, the virtual machine is enabled to operate normally. In an unauthorized environment, the virtual machine is disabled. The disabled virtual machine gathers information about the unauthorized environment and transmits the information to the virtual machine owner.05-28-2009
20090172665Reducing latency in a segmented virtual machine - Providing data to an application running on a segmented virtual machine (VM) is disclosed. Providing data includes opening an interface between the segmented VM and an external data source, transferring data from the external data source to an interface buffer, transferring a first selected amount of data from the interface buffer to a shell VM buffer, transferring a second selected amount of data from the shell VM buffer to a core VM buffer, and providing portions of the data from the core VM buffer to the application in response to read requests from the application.07-02-2009
20090172664ADDING A PROFILING AGENT TO A VIRTUAL MACHINE TO PERMIT PERFORMANCE AND MEMORY CONSUMPTION ANALYSIS WITHIN UNIT TESTS - The present invention discloses a solution for adding a profiling agent to a virtual machine (VM), which permits unit test programs to access information relating to memory and performance from runtime data areas of the VM. Operations permitted by the agent can include starting/stopping VM monitor, getting objects from the heap, retrieving an invocation count, determining a size of an instantiated object, getting a current thread time, and the like. Memory and performance information gathered during a test can be stored for later analysis under a test version identifier. A comparison engine can create reports that use the stored performance and memory data, which can help developers compare memory/performance deltas among different unit versions. In one embodiment, the VM can be a JAVA VIRTUAL MACHINE (JVM) and the unit test programs can be JUNIT programs.07-02-2009
20090172663METHOD AND APPARATUS FOR TAMPER RESISTANT COMMUNICATION IN A VIRTUALIZATION ENABLED PLATFORM - A method to communicate information between components in a virtualization enabled platform. In one embodiment, a component exchanges data via a communication page which only integrity protected components can access. In another embodiment, an integrity protected communication broker exchanges data from a communication page of one component to another communication page of another component.07-02-2009
20090172662VIRTUAL MACHINE CONFIGURATION SYSTEM - A computing device configures virtual machines using configuration commands. Each of the virtual machines may boot from a corresponding virtual machine image file. As a virtual machine boots or executes, the virtual machine may read from or write to application and operating system files included in the corresponding virtual machine image file. Prior to the virtual machine booting, the computing device may get or set configuration properties of the operating system and applications to be booted in a respective virtual machine by reading from or writing to the application and operating system files included in the corresponding virtual machine image file. The computing device may execute configuration commands to get or set the configuration properties of the operating system and the applications.07-02-2009
20090172661METHOD AND SYSTEM FOR ESTABLISHING A ROBUST VIRTUALIZED ENVIRONMENT - A method and system for establishing a virtualized environment includes booting a first virtual machine monitor to establish a first virtual machine and booting a second virtual machine monitor in the first virtual machine. The first and second virtual machine monitors may be hypervisors. The method may also include directing management interrupts, such as system management interrupts and/or platform management interrupts, to the first virtual machine monitor.07-02-2009
20090172660NEGOTIATED ASSIGNMENT OF RESOURCES TO A VIRTUAL MACHINE IN A MULTI-VIRTUAL MACHINE ENVIRONMENT - A system and method are disclosed. In one embodiment the system includes a physical resource that is capable of generating I/O data. The system also includes multiple virtual machines to utilize the physical resource. Among the virtual machines are a resource source virtual machine that is capable of owning the physical resource. The resource source virtual machine is also capable of sending a stream of one or more I/O packets generated from the I/O data that targets a resource sink virtual machine. The resource sink virtual machine is designated as a termination endpoint of the I/O data from the physical device. Also among the virtual machines are one or more resource filter virtual machines. Each of the resource filter virtual machines is capable of filtering I/O packets of a particular type from the stream prior to the stream reaching the resource sink virtual machine.07-02-2009
20120042312PROCESS DEMAND PREDICTION FOR DISTRIBUTED POWER AND RESOURCE MANAGEMENT - Methods and systems for allocating resources in a virtual desktop resource environment are provided. A method includes making a prediction on the future demand for processes running on a distributed environment with several hosts. The prediction is based on the process demand history and includes the removal of historic process demand glitches. Further, the prediction is used to perform a cost and benefit analysis for moving a candidate process from one host to another, and the candidate process is moved to a different host when the cost and benefit analysis recommends such move. In another embodiment, the predictions on future process demand are used for distributed power management by putting hosts in stand-by mode when the overall demand decreases or by adding hosts to the distributed environment when the load increases.02-16-2012
20120042311OPTIMIZED PLACEMENT PLANNING FOR VIRTUAL MACHINES IN A NETWORK - Methods and systems for generating a placement plan for one or more virtual machines (VMs) in a computing environment are provided. The method comprises providing, to a computing system, input parameters comprising a current placement for the one or more VMs on one or more hosts in a computing network; a target placement that assigns at least one of the one or more VMs to at least another host in said one or more hosts; and a set of constraints with which both the current placement and the target placement comply.02-16-2012
20120151483MIGRATING VIRTUAL MACHINES CONFIGURED WITH DIRECT ACCESS DEVICE DRIVERS - In one or more embodiments of the invention, migration of a virtual machine includes identifying a hardware resource which is accessed directly by a device driver of the virtual machine and generating an emulation of the hardware resource to simulate the hardware resource as experiencing an error. The current state of the virtual machine can then be transmitted to the destination host computer, wherein the current state includes the emulation which simulates the hardware resource as experiencing an error. In at least one embodiment, generating the emulation includes defining the error as one that triggers a reset of the hardware resource after migration of the virtual machine from the source host computer to the destination host computer.06-14-2012
20100125842EFFICIENT VOLUME MANAGER HOT SWAPPING - Methods of hot-swapping a logical volume manager (LVM) and updating an associated extent map are presented. Methods for migrating a virtual machine running an application using an LVM from one physical machine to another physical machine are also presented. The LVM can be used by a database application or other applications in a single-node or multi-node environment. The LVM is shut down, version numbers for each segment of its associated extent map are saved, and a new LVM is started. The new LVM's extent map is compared with the old extent map, and segments in the LVM which have changed are selectively updated.05-20-2010
20120066678CLUSTER-AWARE VIRTUAL INPUT/OUTPUT SERVER - In a data processing system having a plurality of virtualized operating system (OS) partitions, a first cluster-aware virtual input/output server (VIOS) is provided within an OS partition by execution of a cluster-aware (CA) OS on a virtual processor resource of the first VIOS. The CA OS establishes the VIOS as a cluster-aware VIOS by registering the first VIOS with a VIOS cluster comprising a second VIOS. Registering the first VIOS to the VIOS cluster enables the first VIOS to receive VIOS cluster configuration data and status data, which provides the first VIOS with information about the other VIOSes within the VIOS cluster. The first VIOS is thus able to communicate with other VIOSes within the VIOS cluster and share I/O resources with the other VIOSes within the VIOS cluster. Relevant cluster information is stored within a local storage of the first VIOS.03-15-2012
20110321041METHOD AND SYSTEM FOR MIGRATING A VIRTUAL MACHINE - An exemplary embodiment of the present invention provides a method of migrating a virtual machine. The method comprises replicating a source storage device corresponding to the virtual machine to a target storage device through replication links. The method also comprises receiving a migration state that indicates initiation of a migration of the virtual machine from a source server to a target server. The method also comprises collecting storage system status information of the source storage device and storing the storage system status information to a persistent store accessible to the target server. The method also comprises sending memory states and central processing unit (CPU) states to the target server through a communications network. The method also comprises performing a failover of the virtual machine from the source server to the target server and from source storage device to target storage device.12-29-2011
20100115514Mechanism for managing resources shared among virtual machines - According to one embodiment, a system is disclosed. The system includes a virtual machine monitor (VMM) having a vector of memory addresses to monitor one or more virtual machines, and a virtual machine to perform an operating environment and to access the vector of memory addresses associated with the VMM upon receiving an interrupt in order to service the interrupt.05-06-2010
20100115509POWER OPTIMIZATION VIA VIRTUALIZATION OPPORTUNITY - Embodiments of the present invention provide a method, system and computer program product for power optimization via virtualization opportunity determination. In an embodiment of the invention, a method for power optimization via virtualization opportunity determination can be provided. The method can include monitoring power utilization in individual server hosts in a cluster and determining a set of the server hosts in the cluster demonstrating low power utilization. The method also can include selecting a subset of server hosts in the set and migrating each VM in non-selected server hosts in the set to the subset of server hosts. Finally, the method can include powering down the non-selected server hosts.05-06-2010
20120210318VIRTUAL SWITCH INTERCEPTOR - Application management is facilitated by observing messages communicated amongst virtual applications external to application-hosting virtual machines. In one instance, the messages can be observed from within a virtual switch outside hosting virtual machines. One or more actions can subsequently be performed as a function of the messages such as but not limited to application monitoring as well as message routing, filtering, and/or transformation.08-16-2012
20120047503METHOD FOR VIRTUALIZING A PERSONAL WORKING ENVIRONMENT AND DEVICE FOR THE SAME - The present invention is directed to a method for virtualizing a personal working environment and a device for the same, relating to the information security field. The method comprises the steps of: installing a Virtual Machine (VM) environment on a device; upon virtualizing the personal working environment, connecting the device to a host, loading the VM environment into the host; and responding to a user operation and saving data of the user operation to the device by the VM environment. The device comprises a communication interface module, a VM environment storage module, and a control module. The present invention provides a means for secure and convenient mobile work.02-23-2012
20120047502COMPUTER SYSTEM, CONTROL APPARATUS, STORAGE SYSTEM AND COMPUTER DEVICE - The computer system includes a server being configured to manage a first virtual machine to which a first part of a server resource included in the server is allocated and a second virtual machine to which a second part of the server resource is allocated. The computer system also includes a storage apparatus including a storage controller and a plurality of storage devices and being configured to manage a first virtual storage apparatus to which a first storage area on the plurality of storage devices is allocated and a second virtual storage apparatus to which a second storage area on the plurality of storage devices is allocated. The first virtual machine can access to the first virtual storage apparatus but not the second virtual storage apparatus and the second virtual machine can access to the second virtual storage apparatus but not the first virtual storage apparatus.02-23-2012
20120047501METHODS AND APPARATUS FOR DATA CENTER MANAGEMENT INDEPENDENT OF HYPERVISOR PLATFORM - In some embodiments, an apparatus can include a memory configured to store a first hypervisor message and a second hypervisor message. The apparatus can further include a hypervisor interface module. The hypervisor interface module can retrieve, from the memory, the first hypervisor message and the second hypervisor message. The hypervisor interface module can define a first signal, the first signal being based at least in part on the first hypervisor message and having a first format associated with a first hypervisor platform. The hypervisor interface module can define a second signal, the second signal being based at least in part on the second hypervisor message and having a second format associated with a second hypervisor platform. The hypervisor interface module can send the first signal to a first virtual machine instantiated according to the first hypervisor platform. The hypervisor interface module can send the second signal to a second virtual machine instantiated according to the second hypervisor platform.02-23-2012
20120005670DISTRIBUTED CLOUD COMPUTING ARCHITECTURE - Availability of processing resources of client computing systems can be registered by a client virtual machine on each of the plurality of client computing systems with a cloud controller. Thereafter, the cloud controller selectively dispatches tasks to at least one of the client virtual machines based on availability of corresponding processing resources and a level of workload in at least one datacenter coupled to the cloud controller. Related apparatus, systems, techniques and articles are also described.01-05-2012
20120005677Computing Machine and Method for Controlling Computing Machine - According to one embodiment, a computing machine includes an activation module configured to activate, in a first mode, a virtual machine using a first virtual storage includes a basic virtual storage file, an update differential virtual storage file, and a change differential virtual storage file, a allocating module configured to allocate a second virtual storage includes a data storage virtual storage file to the virtual machine, and a changing module configured to change the updating portion data in the update differential virtual storage file to unchanged portion data indicating a unchanged portion of the basic virtual storage file when the virtual machine is terminated, and to delete the updating data from the differential information in the update differential virtual storage file.01-05-2012
20120005678ACCELERATOR AND ITS METHOD FOR REALIZING SUPPORTING VIRTUAL MACHINE MIGRATION - A computer-implemented method, an accelerator hardware unit, and an article of manufacture for supporting virtual machine migration. The method includes: acquiring a task request from a task queue of an accelerator hardware unit; extracting identification information of a related virtual machine from the task request; determining whether the identification information of the related virtual machine matches the identification information of a virtual machine to be migrated, where the identification information of a virtual machine to be migrated is recorded in a virtual machine identification information table; and deleting the task request from the task queue if the extracted identification information matches the identification information of a virtual machine to be migrated.01-05-2012
20120005676Computing Machine and Method of Updating Virtual Machine - According to one embodiment, a computing machine for executing a virtual machine, includes a restriction module. The restriction module is configured to restrict, in an update mode in which an operating system and/or an application program in the virtual machine are updated, an I/O device recognized by the virtual machine to a first I/O device which is necessary for executing the operating system and/or the application program.01-05-2012
20120005675APPLYING PEER-TO-PEER NETWORKING PROTOCOLS TO VIRTUAL MACHINE (VM) IMAGE MANAGEMENT - A method to establish a peer-to-peer network connection between two physical machines for distributing virtual machine images between the machines based on users' end user roles is provided. A first physical machine receives, from a second physical machine, a first virtual machine image corresponding to a first end user role and subsequently the first physical machine receives a second virtual machine image corresponding to a second end-user role from the second physical machine. Another method provides for partitioning a virtual machine image file into a plurality of blocks, each identified with a corresponding hash code where the corresponding hash/block pairs are stored in a distributed hash table. A list of the hash codes is sent to a target machine and the unique hash codes are maintained until the complete virtual machine image file is received by the target machine.01-05-2012
20120005674METHOD AND SYSTEM FOR PROFILING VIRTUAL APPLICATION RESOURCE UTILIZATION PATTERNS - A method and system for profiling execution of an application implemented by an application file comprising a plurality of data blocks. The application is executed in response to an execute command from a management process. Read messages are sent to the management process each time the application reads one or more of the plurality of data blocks of the application file. The management process records information about the read operations in one or more transcripts which may be used to create a streaming model for the application allowing the application to be downloaded using a conventional download protocol without using a specialized streaming protocol.01-05-2012
20120005673STORAGE MANAGER FOR VIRTUAL MACHINES WITH VIRTUAL STORAGE - A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host.01-05-2012
20120005669MANAGING PROTECTED AND UNPROTECTED DATA SIMULTANEOUSLY - A first virtual device is created including every logically addressable unit of a data storage server that utilizes data protection. A second virtual device is created including no logically addressable unit of the data storage server that utilizes data protection. Data transfers are disabled within all command phases of the first virtual device.01-05-2012
20120005668STORAGE CONTROLLER COUPLED TO STORAGE APPARATUS - A storage controller comprises a cache storage used as a cache of an external storage and a control processor coupled to the cache storage. The control processor comprises an internal access function and an external access function. The internal access function transmits a read command to the cache storage. The cache storage determines whether the read target data complying with the read command is stored in a physical storage device or not. If the result of the determination is negative, the external access function is executed while, if the result of the determination is positive, the external access function is not executed because the cache storage transmits the read target data to the internal access function without issuing a request to the external access function.01-05-2012
20120005671Hypervisor-Based Data Transfer - In a computer system having memory, at least one processor and a physical input-output adapter, the at least one processor generates logical partitions, including local logical partitions and an input-output logical partition. The logical partitions have respective local virtual adapters. The input-output logical partition has a shared virtual adapter configured to communicate with the physical input-output adapter, such that a plurality of the local logical partitions share the physical input-output adapter via the shared virtual adapter. The at least one processor provides communication for ones of the local virtual adapters of the local logical partitions directly with the physical input-output adapter by a hypervisor.01-05-2012
20090007106Virtual Machine Smart Migration - Migration mechanisms are disclosed herein that smartly transfer data among virtual machines, minimizing the down time of migration of such machines but maximizing the consistent state of data stored thereon. Specifically, data can be classified into three types: low volatility data (such as hard disk data), high volatility data (such a random access memory data), and immutable data (such as read only data). This data can be migrated from a source virtual machine to a target virtual machine by sending the immutable data along with the low volatility data first—before the source virtual machine has stopped itself for the migration process. Then, after the source virtual machine has stopped, high volatility data and (again) low volatility data can be sent from the source to the target. In this latter case, only differences between the low volatility data may be sent (or alternatively, new low volatility data may be sent).01-01-2009
20110167422VIRTUALIZATION APPARATUS - A virtualization apparatus includes one or more guest machines each comprised of a guest kernel and a guest user process, a hypervisor module installed in a host kernel and handling a request of the guest machine with regard to the virtualization apparatus, and a virtual processor supporting the guest machine to serve as a host user process and handling an interrupt and a switching of the guest machine, wherein address spaces of the guest kernel and the guest user process are designed to be separated from each other.07-07-2011
20120011508MULTIPLE TIME GRANULARITY SUPPORT FOR ONLINE CLASSIFICATION OF MEMORY PAGES BASED ON ACTIVITY LEVEL - Activity level of memory pages is classified in virtual machine environment, so that processes such as live VM migration and checkpointing, among others, can be carried out more efficiently. Because each such hypervisor-based service may desire classification of activity levels of memory pages at different frequencies and different time granularities, the hypervisor supports methods to classify activity levels of memory pages for a plurality of time intervals.01-12-2012
20120011509Migrating Session State of a Machine Without Using Memory Images - Embodiments of a system and method for migrating session state from a first machine to a second machine without using memory images are disclosed. State information for components of a first computer is determined and stored in a structured human and machine readable file, and does not include a memory image, a disk image, register status, or register contents for the first computer. A second computer is set to a state corresponding to the state of the first computer based on the stored state information, including parsing one or more sections of the structured file to determine actions for restoring state of one or more of the corresponding components, and for each component of the one or more components, performing the actions, including instantiating or invoking the component on the second computer, and performing multiple steps to configure the component in accordance with the state information.01-12-2012
20120011510METHOD AND SYSTEM FOR CONTROLLING COMPUTER RESOURCES - A computer resource control system for running business applications on virtual computers within a business computer by using computer, virtual computer, network, and storage resources, the system comprises a collection process section for periodically collecting the dynamically changing information about the use of each resource when business applications run on the virtual computers within the business computer; a resource recovery process section for calculating the amounts of resources required for the operations of the business applications periodically in accordance with the dynamically changing information about the use of each resource, which is gathered by the collection process section, allocating the calculated amounts of resources to the resources of each virtual computer, and recovering any extra resources; and a resource allocation process section for allocating the extra resources, which are recovered by the resource recovery process section, to the virtual computers in accordance with the priorities of the business applications.01-12-2012
20120011504ONLINE CLASSIFICATION OF MEMORY PAGES BASED ON ACTIVITY LEVEL - Activity level of memory pages is classified in virtual machine environment, so that processes such as live VM migration and checkpointing, among others, can be carried out more efficiently. The method includes the steps of scanning page table entries of hypervisor-managed page tables continuously over repeating scan periods to determine whether memory pages have been accessed or not, and for each memory page, determining an activity level of the memory page based on whether the memory page has been accessed or not since a prior scan and storing the activity level of the memory page. The activity level of the memory page may be represented by one or more bits of its page table entry and may be classified as having at least two states ranging from hot to cold.01-12-2012
20120011507MAINTENANCE SYSTEM, MAINTENANCE METHOD AND PROGRAM FOR MAINTENANCE - A maintenance system in which a user work made during a maintenance work is not lost is provided. Specifically, a user computing machine includes: a user data determination section determining, in a case that a name of a file received from a software update service is the same as a name of a file included in a VM that a user uses, whether the file included in the VM that the user uses is data created by the user; and a VM merge section copying a file except user data into the VM that the user uses in the received files by calling the user data determination section.01-12-2012
20120011500MANAGING A MEMORY SEGMENT USING A MEMORY VIRTUAL APPLIANCE - In a method for managing a memory segment through use of a memory virtual appliance, data is encapsulated with the memory virtual appliance, in which the memory virtual appliance comprises a virtual machine configured to manage a memory segment in a physical memory. In addition, the memory virtual appliance is implemented using a virtualization wrapper comprising computer readable code enabling the encapsulated data to be shared among a plurality of clients. Moreover, the encapsulated data is stored in the memory segment controlled by the memory virtual appliance.01-12-2012
20120011501TRACKING LOADING AND UNLOADING OF KERNEL EXTENSIONS IN ISOLATED VIRTUAL SPACE - Some embodiments of the inventive subject matter are directed to receiving a request from a first instance of an operating system (e.g., a virtual operating system) to load a kernel extension that extends functionality of a kernel, where the kernel and the first instance of the operating system are managed by a second instance of the operating system (e.g., a global operating system), and where the first and second instances of the operating system share the kernel. Some embodiments are further directed to recording an indicator that indicates that the first of the plurality of the instances of the operating system requested to load the kernel extension, where the indicator is accessible only to the second instance of the operating system. In some embodiments, the method is further directed to loading the kernel extension, where loading the kernel extension extends functionality of the kernel. In some embodiments, the method is further directed to receiving a request by the first instance of the operating system to remove the functionality from the kernel and determining, based on the indicator, that the first instance of the operating system had previously requested to load the kernel extension. In some embodiments, the method is further directed to removing the functionality from the kernel in response to the determining, based on the indicator, that the first instance of the operating system had previously requested to load the kernel extension.01-12-2012
20120011502MANAGING UNIQUE ELECTRONIC IDENTIFICATION FOR KERNEL EXTENSIONS IN ISOLATED VIRTUAL SPACE - Some embodiments of the inventive subject matter are directed to detecting a file that a first instance of an operating system is configured to load where the file is configured to extend functionality of a kernel when loaded. In some embodiments, the first instance of the operating system is managed by a second instance of the operating system (e.g., the first instance of the operating system is a virtual operating system and the second instance is a global operating system). The first and second instances of the operating system share the kernel. Some embodiments are further directed to generating a unique electronic identifier based on properties of the file. The unique electronic identifier uniquely identifies the file. Some embodiments are further directed to providing a copy of the file to the first instance of the operating system, and some time later, receiving a request from the first instances of the operating system to load the copy of the file. Some embodiments are further directed to determining, using the unique electronic identifier, that the copy of the file from the first instance of the operating system is equivalent to the file. Some embodiments are further directed to loading the copy of the file in response to determining, using the unique electronic identifier, that the copy of the file is equivalent to the file. The loading extends the functionality of the kernel.01-12-2012
20120011499TECHNIQUES FOR INTERACTION WITH A GUEST VIRTUAL MACHINE - Techniques for inter-virtual machine communication are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for interaction with a guest virtual machine comprising monitoring image loads into electronic memory of a guest virtual machine using a secure virtual machine, identifying a memory structure having a specified format, and performing, using the secure virtual machine, at least one of reading one or more portions of the identified memory structure and setting a value in the identified memory structure.01-12-2012
20120011505Computer system and recording medium - A disclosed computer system having a virtual computer management mechanism realizing a virtual computer includes a user virtual computer that communicates with a device via a virtual computer for a device driver under a control of the virtual computer management mechanism, an input receiving unit that receives a signal of an input operation from the device, a reset level determination unit that determines a reset level based on the received signal of the input operation, a reset target specifying unit that specifies a virtual computer to be a target of a reset process based on the determined reset level, and a reset signal transmission unit that transmits a reset signal to perform the reset process on the specified virtual computer.01-12-2012
20130185720USER-MODE SYSTEM-LEVEL MOBILE VIRTUALIZATION - One embodiment of the present invention provides a system that facilitates user-mode system-level virtualization in a mobile device. During operation, a hypervisor intercepts a virtual machine's attempt to access a privileged resource. The hypervisor manages the virtual machine and runs on a host system in a user mode. Furthermore, the hypervisor emulates the privileged resource using a user-mode system call provided by the host system. In addition, the hypervisor provides access to the emulated privileged resource to the virtual machine, thereby allowing the virtual machine to operate with the emulated privileged resource without directly accessing actual privileged resources on the host system.07-18-2013
20120011506INFORMATION PROCESSOR, CONTROL METHOD, AND COMPUTER-READABLE RECORDING MEDIUM RECORDING CONTROL PROGRAM - A computer is provided with a measuring unit that measures elapsed time at a non-access state between one of the guest virtual machines and the devices as a non-access time with respect to each of the guest virtual machines accessing the devices via the device driver virtual machine; a storage unit that stores the operation profile information that matches the non-access time with the operation mode information representing the operation modes of the devices; a decision unit that decides the operation mode with reference to the operation profile information on the basis of the measured access time; and a transition control unit that transits the devices to the operation mode, so that this makes it possible to appropriately carry out power saving management of the devices not depending on a power saving function of the guest OS.01-12-2012
20120017210Real Time Verification of Web Applications - A software verification system including a cloud service, a plurality of test nodes, a client manager, and an expediter is disclosed. The cloud service is a commercially available shared resource service having two or more physical machines, each of which is configured to host a plurality of virtual machines. Each test node is one virtual machine running a platform. The client manager manages a verification session between one of the clients and the verification system. The expediter recognizes the available platforms for use by the test nodes in a cloud service pool of servers and a local pool of servers. When a clients requests the verification session to use a specific platform, the expediter obtains a network address of an available test node running the specified platform and connects the requesting client to the available test node running the requested platform. If the requested platform is not available, a new virtual machine, located in the local pool of servers, having the requested platform is started and connected with the requesting client.01-19-2012
20120117565VIRTUAL-MACHINE-BASED APPLICATION-SERVICE PROVISION - Embodiments of the present invention are directed to application-service provision by application-service-provider centers to remote application-service consumers, including small businesses, medium-sized businesses, and other similarly-sized institutions and organizations, as well as to users of individual computers, such as home computers. Rather than executing applications at an application-service-provider center, the applications are instead distributed to remote client sites for execution by virtual machines controlled and managed by an application-service-provider center. Execution of the applications by virtual machines at remote client sites alleviates constraints and bottlenecks associated with communications between client computers and remotely executing applications, while providing management capabilities and security that allow the application-service center to manage application execution as if the remotely executing applications were executing within the application-service center.05-10-2012
20120017212NETWORK COMMUNICATIONS OF APPLICATION RUNNING ON DEVICE UTILIZING ROUTING OF DATA PACKETS USING VIRTUAL NETWORK CONNECTION - A method of routing a data packet using a virtual network connection includes steps of detecting a request for a network connection from an application running on a device, spawning a virtual machine that virtualizes network capabilities of the device such that a virtual network connection is provided, selecting a routing protocol from among a plurality of available routing protocols for communicating data using the virtual network connection, determining a first node to which to communicate data from the application using the virtual network connection and the selected routing protocol, said determination being based on network information stored at the device, and communicating data from the application to the first node using the virtual network connection and the selected routing protocol.01-19-2012
20120017209OPTIMIZING A FILE SYSTEM INTERFACE IN A VIRTUALIZED COMPUTING ENVIRONMENT - Systems and methods for optimizing read operations from a storage device in a virtualized computing environment are provided. One method comprises monitoring read operations issued by an application running on a virtual machine's (VM) operating system, wherein the VM is hosted by a hypervisor providing access to a storage device in a virtualized computing environment; and causing a virtual file system (VFS) supported by the operating system to call on a first para-virtualized file system (PVFS FE) supported by the operating system to execute a read operation, in response to determining that the read operation is for reading target data from the storage device.01-19-2012
20120023494VIRTUALIZED MIGRATION CONTROL - A method includes executing a hypervisor (01-26-2012
20120023493JUDGING APPARATUS, METHOD, AND RECORDING MEDIUM OF PROGRAM - A judging apparatus including an obtaining unit to obtain a first value which indicates a capacity of a resource assigned to a virtual machine of a plurality of virtual machines deployed in a first computer, a first rate which indicates a rate of a resource used by the plurality of virtual machines in the first computer, a second value which indicates a capacity of a resource, assigned to processing of an application, in a second computer, and a second rate which indicates a rate of a resource used by the processing of the application, and a judging unit to judge whether or not a sum of the first rate and the second rate that is corrected based on a ratio between the first value and the second value is over a certain value corresponding to the amount of the resource of the first computer.01-26-2012
20120023492WORKLOAD INTERFERENCE ESTIMATION AND PERFORMANCE OPTIMIZATION - Architecture that facilitates the estimation of interference among workloads (e.g., virtual machines) due to sharing of a shared resource (e.g., a shared cache of a computer processor), and optimization of a desired performance objective such as power or energy use in the presence of the interference. Estimation is to the extent of interference by characterizing the nature of shared resource usage and its effect on performance. Performance optimization is accomplished using metrics based on the above estimation, or alternatively, an explicit measurement of the interference effects. Methods are employed to estimate interference on the workload's performance with changes in availability of the shared resource or with combinations of other workloads sharing the same resource and allocating workloads to one or more physical computers or resources to workloads such that a desired performance objective is optimized. The methods can include allocating workloads on demand.01-26-2012
20120023495REJUVENATION PROCESSING DEVICE, REJUVENATION PROCESSING SYSTEM, COMPUTER PROGRAM, AND DATA PROCESSING METHOD - In a rejuvenation processing device (01-26-2012
20120060154COMPUTER SYSTEM, STORAGE DEVICE AND DATE UPDATING METHOD - Computer system including: a computer with first processor managing first and second virtual computers; and a storage system with second processor providing first and second virtual volumes to the virtual computers, an original data volume shared by the virtual volumes, and a differential data volume storing first and second differential data of the virtual volumes; wherein if receiving a first request to update a first data stored in a first virtual area of the first virtual volume, the first processor requests storage of the first data in a first area of the original data volume, corresponding to the first virtual area, wherein if receiving a second request to update a second data stored in a second virtual area of the first virtual volume, the first processor requests storage of the second data in a second area of the differential data volume, corresponding to the second virtual area.03-08-2012
20120060153Virtual Machine Rapid Provisioning System - A rapid provisioning method for connecting to a cloud, copying blocks of a virtual machine image to the cloud and booting the virtual machine image in the cloud, wherein some aspects of copying the blocks and booting the virtual machine are contemporaneous or overlap. The method may include starting with copying the blocks of the virtual machine and continuing to copy the blocks of the virtual machine image while the virtual machine image boots in the cloud. The method may also include starting with booting the virtual machine in the cloud from the customer computer and continuing to boot while copying the blocks transferred during boot to cloud storage.03-08-2012
20130014111Optimization of Virtual Appliance Deployment - In an embodiment for deploying a new virtual appliance (01-10-2013
20130014110CREATING A VIRTUAL MACHINE CONTAINING THIRD PARTY CODE - A Virtual Machine (VM) is created utilizing a virtual Operating System (OS) disk and virtual application disks, each of which may be from disparate third party suppliers. One or more files in the virtual application disk are then linked to a specific file system location (node) in the virtual OS disk.01-10-2013
20130014109VIRTUAL COMPUTER SYSTEM AND CONTROL METHOD THEREOF - When a failure occurs in an LPAR on a physical computer under an SAN environment, a destination LPAR is set in another physical computer to enable migrating of the LPAR and setting change of a security function on the RAID apparatus side is not necessary. When a failure occurs in an LPAR generated on a physical computer under an SAN environment, configuration information including a unique ID (WWN) of the LPAR where the failure occurs is read, a destination LPAR is generated on another physical computer, and the read configuration information of the LPAR is set to the destination LPAR, thereby enabling migrating of the LPAR when the failure occurs, under the control of a management server.01-10-2013
20130014108VIRTUAL MACHINE - The present invention is directed to various systems and/or methods relating to a software platform that provides for authentication of a requestor. Preferably, this authentication happens before there is an opportunity for any resource intensive request to harm operation of the system. Preferably, a reliability level is based on authentication so that the amount and/or type of resource access is controlled based, at least in part, on the authentication information. Preferably, heap usage is controlled by this reliability level. Preferably, the software platform is a virtual machine, preferably the Java Virtual Machine.01-10-2013
20130014107AUTOMATIC MONITORING AND JUST-IN-TIME RESOURCE PROVISIONING SYSTEM - A method and apparatus for automatic provisioning steps using a physical computing block-based infrastructure platform and a virtualized environment is discussed to provide automatic elasticity. Running applications may be monitoring for increased workload, which may trigger a proactive and/or reactive response. The triggered proactive or reactive response includes executing a remediation action upon workloads exceeding set thresholds, as set by a pre-determined monitoring policy. The remediation actions may include the provisioning of additional virtual or physical computing resources to reduce the workload below the set threshold.01-10-2013
20120159479PROVIDING A PERSONA-BASED APPLICATION EXPERIENCE - Technologies are described herein for providing; a persona-based application experience. A query for a location of a persona package is received from a virtualization client. When the query is received, a current persona of a user requesting execution of a virtualized application is determined. The location of the persona package corresponding to the current persona of the user is determined The location of the persona package is sent to the virtualization client in response to the query. The virtualization client is configured to execute the virtualized application adapted to the persona package.06-21-2012
20120159478VIRTUAL MACHINE BRANCHING AND PARALLEL EXECUTION - A state branching system is described herein that allows parallel execution of complex state transitions while leveraging time invested to setup a starting state. By allowing branching at the virtual machine level, the state branching system allows setup of a particular condition or state in a virtual machine, then copying and branching to parallel instances of the virtual machine to explore different possible subsequent states. Upon detecting a large state change with unknown outcome, the state branching system instructs the hypervisor to copy the executing virtual machine into one or more separate virtual machines. The system then allows divergent branching between the two or more virtual machines to explore different states from a similar starting point. Once the executions have reached the next state, the system coordinates to determine which copies will continue execution. Thus, the state branching system allows faster exploration of complex state changes.06-21-2012
20120159477SYSTEM AND METHOD FOR PROVIDING DIRECT SOCKET I/O FOR JAVA IN A VIRTUAL MACHINE - A system and method for providing direct socket input/output (I/O) for Java in a Java Virtual Machine (JVM) environment. During runtime, the system periodically garbage collects software objects in the Java memory space or heap. In accordance with an embodiment, the system provides a means to change the state of a thread performing the I/O which temporarily disallows garbage collection from taking place, thus guaranteeing that a receiving object in the heap does not move. The use of safepoints to prohibit GC from happening during the I/O call means that a global GC lock is not required. Non-blocking I/O is utilized, while prohibiting a thread from entering a GC safepoint during an I/O system call. The technique addresses disadvantages of previous methods by removing contended locks and by removing restrictions on allocation. In accordance with an embodiment, a special thread state can be used to prevent the thread from entering a GC safepoint.06-21-2012
20120159474SYSTEM AND METHOD OF I/O PATH VIRTUALIZATION BETWEEN A RAID CONTROLLER AND AN ENVIRONMENT SERVICE MODULE IN A STORAGE AREA NETWORK - A system and method of I/O path virtualization between a RAID controller and an environment service module (ESM) in a storage area network (SAN) is disclosed. In one embodiment, a type of I/O request is identified by an input/output (I/O) control engine upon receiving an I/O request from a host computer via a RAID controller. Further, a priority is assigned to the received I/O request based on the type of I/O request by the I/O control engine. Furthermore, the processing of the prioritized I/O request is interrupted by the I/O control engine. In addition, the prioritized I/O request is separated into a command I/O request or a status request. Also, the separated command I/O request or the status request is sent to an associated queue in a plurality of solid state drive (SSD) buffer queues (SBQ) in the I/O control engine.06-21-2012
20120159473EARLY NETWORK NOTIFICATION IN LIVE MIGRATION - A method and system for sending early notification when a guest migrates in a virtual machine system. A guest hosted by a computer system is migrating from a source hypervisor to a target hypervisor. During the migration, the source hypervisor stops transmission of outbound packets from the guest. A signal is sent to the target hypervisor after stopping the transmission and before completing migration of the guest. The signal requests that a notification containing network addresses of the guest be sent to network devices associated with the target hypervisor.06-21-2012
20120159485OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk.06-21-2012
20120159484SCHEDULING THE TIMELINES OF VIRTUAL MACHINES - A method for scheduling timelines of virtual machines (VMs) is presented. The method includes determining, by a host controller device, a time span based on configurable timelines recorded in a plurality of timers stored in memory of the host controller device, wherein the time span comprises a time interval when a plurality of virtual machines (VMs) are started and does not include a run time of the plurality of VMs. The method further includes starting, by the host controller device during the determined time span, the plurality of VMs on a plurality of host machines managed by the host controller device, wherein start times of each of the plurality of VMs are distributed across the determined time span.06-21-2012
20120159483Searching Virtual Resources - A mechanism is provided for searching a virtual resource in a large scale computing system environment. The virtual resource is deployed on at least one server. Each server is coupled to a sensor and communicates with the sensor. The sensors communicate with each other and consist of a communication network. Each sensor stores an identifier of a virtual resource deployed in a server connected with the sensor and the location information of the sensor itself. The mechanism receives a searching request for a virtual resource by the at least one sensor, the searching request containing an identifier of the virtual resource being searched; forwards the searching request in the communication network of the sensors; and returns a location information of a sensor storing the identifier of the virtual resource by the sensor itself.06-21-2012
20120159482SEAMLESS APPLICATION INTEGRATION APPARATUS AND METHOD - A seamless application integration apparatus and method are provided. The seamless application integration apparatus includes a seamless integration server that is installed in a host virtual machine so as to provide a seamless application integration (SAI) environment in a virtualization system that comprises the host virtual machine and at least one guest virtual machine. The apparatus also includes a dynamic reconfiguration unit determines whether a seamless integration client that corresponds to the seamless integration server has been installed in the guest virtual machine, and that may install the seamless integration client in the guest virtual machine according to the determination result.06-21-2012
20120159481BEST FIT MAPPING OF SELF-VIRTUALIZING INPUT/OUTPUT DEVICE VIRTUAL FUNCTIONS FOR MOBILE LOGICAL PARTITIONS - A virtual function mapping process, which is capable of being used in connection with the migration of a logical partition to a target system, creates candidate lists for virtual functions assigned to the logical partition, which are populated with candidate physical ports from a target system that are capable of being mapped to such virtual functions. Candidate physical ports are assigned weights based upon their suitability to be mapped to a particular virtual function, and as candidate physical ports are selected for virtual functions, weights for other candidate physical ports for other virtual functions are recalculated to reflect the impact of the selection of candidate physical ports on the suitability of the remaining physical ports for other virtual functions.06-21-2012
20120159480DATA PROCESSING METHOD AND APPARATUS FOR REMOTE STORAGE SYSTEM - In an information system which includes a local site including a cache file server coupled with a host computer, and a remote site including a remote file server coupled with a surrogate processing computer, a method determines whether each of one or more files of data for a data processing request is cached or not. If yes, the method executes data processing for each cached file to produce results in local site. If no, the method includes creating a file list of files to be processed in remote site; sending the file list and processing program to the surrogate computer; if the processing is sufficiently effective to be done by the surrogate computer, receiving results of the processing executed in remote site, and, if not, then receiving an unprocessed file list from remote site and executing data processing in local site and receiving any results already executed in remote site.06-21-2012
20120159486SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ACCESSING A MEMORY SPACE ALLOCATED TO A VIRTUAL MACHINE - A method for accessing a memory space allocated to a virtual machine, the method includes: receiving a request from the virtual machine to generate, for another virtual machine, a memory credential associated with a certain memory space allocated to the virtual machine; generating, in response to the request, a cryptographically signed credential; sending the cryptographically signed credential to the other virtual machine; receiving from the other virtual machine an access request to access at least one memory entry within the certain memory space; and accessing the at least one memory entry, if the access request complies with the memory credential.06-21-2012
20120072907PROXY TOOL FOR GUEST MACHINE RELOCATION - A system tool, method and program product for relocating an original guest from a first host to a second host in a z/VM environment. A method is disclosed that includes: bringing the original guest down at the first host, wherein the original guest includes a predetermined virtual internet protocol address (VIPA); bringing up a new guest at the second host, wherein the new guest has the predetermined VIPA; autologging on a first virtual machine (VM) at the second host that provides a VM TCP/IP stack to an interface with a virtual switch; launching a second VM to provides a VM multiprotocol server configured for OSPF to run with the VM TCP/IP stack to generate a host route for the new guest, wherein the second VM is launched by the first VM; and launching a third VM for determining a status of the virtual switch and advertising to the network a host route of the new guest, wherein the third VM is launched by the first VM.03-22-2012
20120072911TRACE ASSISTED PREFETCHING OF VIRTUAL MACHINES IN A DISTRIBUTED SYSTEM - The disclosed implementations are related to trace-assisted prefetching of a virtual machine from a network resource to improve interactive performance of the virtual machine on a host device. Trace patterns can be automatically uploaded to a network resource, which aggregates the patterns, and serves the patterns back to the host device, or a different host device, when the host device downloads a virtual machine for the first time.03-22-2012
20120072909AUTOMATED ORCHESTRATION BETWEEN PHYSICAL AND VIRTUAL COMPUTING SYSTEMS - Changes to a virtual system, such as a set of virtual machines in a data center, may be automatically synchronized with the corresponding physical system. In one implementation, an application may receive information regarding changes made to a virtual system. The application may determine whether the information regarding the changes necessitates a change in the configuration of one or more physical switches, and may reconfigure affected ones of the physical switches for compatibility with the changes made to the virtual system.03-22-2012
20120072908SYSTEM AND METHOD FOR AFFINITY DISPATCHING FOR TASK MANAGEMENT IN AN EMULATED MULTIPROCESSOR ENVIRONMENT - The disclosure relates generally to managing assignment of tasks among instruction processors (IPs) within a computer system having multiple IPs, and more particularly to binding emulated IPs with a host system's IPs (e.g., processor cores) for facilitating control over affinity-based assignment of tasks among the host system's IPs by a task manager (e.g., OS) that is executing on the emulated IPs, rather than running directly on the host system's IPs. Certain embodiments provide techniques for binding emulated IPs with actual IPs of a computing system that is hosting the emulated IPs, thereby enabling better control of management of the system by a task manager executing on the emulated IPs. For instance, in certain embodiments, a dispatcher (e.g., of an OS running on emulated IPs) performs affinity-based management of task assignment for tasks performed for an application program among IPs of a host system that is hosting the emulated IPs.03-22-2012
20120072906Memory Overcommit by Using an Emulated IOMMU in a Computer System without a Host IOMMU - A method and system for managing direct memory access (DMA) in a computer system without a host input/output memory management unit (IOMMU). The computer system hosts virtual machines and allows memory overcommit. The computer receives, from a guest operating system that runs on a virtual machine, a request for mapping a guest address to a bus address. The computer translates the guest address to a host address and pins a memory page containing the host address to keep the memory page in host memory. The host address is then returned to the guest operating system to allow a device to use the host address as the bus address for direct memory access (DMA) to a buffer managed by the guest operating system.03-22-2012
20120110577CONTROLLING MEMORY CONDITIONS IN A VIRTUAL MACHINE - A method of managing host physical memory using a balloon application executing within a guest virtual machine (GVM) running on a host platform is described. The balloon application receives allocation parameters from an entity outside the GVM, the allocation parameters identifying an amount of memory for the balloon application to allocate. The balloon application adjusts the allocated amount of memory according to the allocated amount. Physical memory backing up the allocated memory can then be assigned by virtualization software for use by another virtual machine running on the host platform.05-03-2012
20120110572Dynamic Allocation and Assignment of Virtual Environment - A mechanism for enabling enterprise data centers to allocate portions of their infrastructure and assign them to specific line of business unit IT organizations. The mechanism allows the business unit to dynamically and rapidly provision virtual infrastructure as needed to run line of business applications. This can also enable the business unit to focus more on the development and management of the applications rather than invest significant resources in managing the infrastructure layer. In various embodiments, data center administrators may be enabled to allocate and assign a portion of their physical infrastructure (Storage, Network and Compute) and expose them as a virtualized environment to different business unit organizations.05-03-2012
20110088032METHOD AND APPARATUS FOR CONFIGURING A HYPERVISOR DURING A DOWNTIME STATE - In one embodiment, a computer system comprises a host machine comprising a plurality of compute resources, at least one management processor, a hypervisor, at least one persistent state data store location coupled to the host machine, wherein the persistent state data store location stores configuration data for the hypervisor, and a persistent state module coupled to a management processor coupled to the host machine, wherein the persistent state module maps hypervisor configuration data to a persistent state data store.04-14-2011
20110088029SERVER IMAGE CAPACITY OPTIMIZATION - Embodiments of the invention provide a solution to optimize/minimize the total capacity of Gold Image within the entire datacenter which utilizes a scale-out type of storage systems. A method of server image provisioning comprises checking whether a gold image exists in a first storage system, the gold image being one of a real gold image or a virtual gold image; if no gold image exists in the first storage system, searching a remainder of the storage systems until a real gold image is found in a second storage system; after finding the real gold image in the second storage system, creating a virtual gold image in the first storage system, the virtual gold image in the first storage system being associated with the real gold image in the second storage system; and creating a snapshot volume in the first storage system based on the virtual gold image.04-14-2011
20120254861METHOD AND APPARATUS OF DATA CENTER FILE SYSTEM - Embodiments of the invention provide a capability to validate volume status on the host and storage system stored virtual machine image in the datacenter management server. In one embodiment, a server system includes a storage system having a plurality of volumes, a plurality of host systems, and a management server coupled with the storage system and the host systems via a network. A method of managing the server system comprises: generating a golden image in the storage system corresponding to a virtual machine image file; copying virtual machine data from the golden image to some of the plurality of volumes in the storage system; and keeping track, by the management server, of status of the volumes which have copied virtual machine data by monitoring activity of the virtual machines.10-04-2012
20120254860VIRTUAL MACHINE PLACEMENT TO IMPROVE MEMORY UTILIZATION - Virtual machines having a high amount of identical memory pages are grouped under a common hypervisor to enable greater memory savings as the result of transparent page sharing. One embodiment provides a computer program product including computer usable program code for performing a method that comprises analyzing the software image content of a plurality of virtual machines running on a plurality of hypervisors in a common migration domain, identifying two or more of the virtual machines having greater than a threshold amount of common memory pages, placing the two or more virtual machines under a common hypervisor, and sharing the common memory pages among the two or more virtual machines. Optionally, the identifying of two or more of the virtual machines may include identifying two or more of the virtual machines having the same software image content classifications; thereby, identifying images with a greater affinity for common memory pages.10-04-2012
20120254863AGGREGATING SHARED ETHERNET ADAPTERS IN A VIRTUALIZED ENVIRONMENT - In a method for managing shared Ethernet adapters in a virtualized computer environment, a computer programmed with a hypervisor program receives a first request from a virtual client to transmit data. In response to receiving the first request, the computer programmed with the hypervisor program selects a first active virtual server from a first plurality of concurrently active virtual servers of the virtualized computer environment. The computer programmed with the hypervisor program copies the data from a memory of the virtual client to a trunk adapter of a first shared Ethernet adapter of the selected first active virtual server.10-04-2012
20120254862EFFICENT MIGRATION OF VIRTUAL FUNCTIONS TO ENABLE HIGH AVAILABILITY AND RESOURCE REBALANCE - A computing platform (source) supporting virtualization comprises a plurality of virtual machines each including a virtual function driver and a guest operating system, and a hardware block including a plurality of virtual functions and visible states and invisible states. The virtual function driver or a guest OS or a virtual machine monitor further includes a self-emulation layer to create a shadow state, which emulates the invisible states of the virtual function, which is to be migrated. The virtual function driver uses contents of the shadow state to migrate one or more of the plurality of virtual functions to a target virtual machine. The source and the target virtual machines are included in a cloud data center and the virtual functions, migrated to the target virtual machine is highly available to provide services.10-04-2012
20120254868Optimizing Virtual Graphics Processing Unit Utilization - Methods, systems, and computer program products are provided for optimizing virtual graphics processing unit utilization. Embodiments include assigning a computing intensity level to each virtual machine of a plurality of virtual machines; assigning a priority level to each virtual machine of the plurality of virtual machines; determining for each server of a plurality of servers whether the server includes a virtual graphics processing unit (VGPU) that is available to perform compute intensive tasks for the plurality of virtual machines; and assigning one or more VGPUs to a virtual machine of the plurality of virtual machines in dependence upon the computing intensity level and the priority level of the virtual machine and the number of VGPUs available to perform the compute intensive tasks.10-04-2012
20120254867JAVA VIRTUAL MACHINE HAVING INTEGRATED TRANSACTION MANAGEMENT SYSTEM - A computing system is configured to deploy a JAVA application for execution in a distributed manner. The computing system includes a plurality of computing nodes including a domain manager node, the plurality of computing nodes forming a computing domain configured as an administrative grouping of the nodes administered by the domain manager node. The domain manager node is configured to provide, to each of the computing nodes, a main portion of the JAVA application. The main portion defines, for each computing node, a portion of the behavior of the JAVA application to be accomplished by that computing node. Furthermore, each computing node is configured to receive at least one class file having classes appropriate for the portion of the behavior of the JAVA application defined, by the main portion, to be accomplished by that computing node.10-04-2012
20120159476COMPUTER WORKLOAD CAPACITY ESTIMATION - A proximity table is generated for a first of a group of hosts for one or more computer workloads. Workloads are assigned to the host by applying proximity rules to the proximity table. The generating of proximity tables and the assignment of workloads is iterated for other hosts until all workloads have been assigned. Once all workloads have been assigned, an opportunity estimate is calculated06-21-2012
20120079481OPTIMIZING PROCESSOR-MANAGED RESOURCES BASED ON THE BEHAVIOR OF A VIRTUAL MACHINE MONITOR - In one embodiment, a predefined behavior of a virtual machine monitor (VMM) with respect to one or more virtual machines (VMs) is identified, and processor-managed resources associated with the one or more VMs are utilized based on the predefined behavior of the VMM.03-29-2012
20120079479MICROPROCESSOR SYSTEM FOR VIRTUAL MACHINE EXECUTION - A processor includes guest mode control registers supporting guest mode operating behavior defined by guest context specified in the guest mode control registers. Root mode control registers support root mode operating behavior defined by root context specified in the root mode control registers. The guest context and the root context are simultaneously active to support virtualization of hardware resources such that multiple operating systems supporting multiple applications are executed by the hardware resources.03-29-2012
20120079478Network Interface Controller for Virtual and Distributed Services - In one embodiment a method and apparatus that support virtual services including virtual network interface control functionality for virtual machines running on a server. A method includes receiving a packet at a network interface card from a data communication network, classifying, within the network interface card, the packet to select one of multiple flow tables to which the packet should be assigned to obtain a selected flow table, the classifying being based, at least, on a logical interface with which the packet is associated, processing the packet based on information stored in the selected flow table, and passing the packet to a virtual machine operating on a computer to which the network interface card is communicatively connected, the virtual machine being associated with the logical interface.03-29-2012
20110107332Virtual Machine Migration According To Environmental Data - Embodiments are directed to virtual machine migration according to environmental data in a data center. One embodiment is a method that analyzes environmental data for a data center having plural servers and migrates virtual machines among the servers to increase cooling efficiency in the data center.05-05-2011
20110107331Endpoint-Hosted Hypervisor Management - A client hypervisor comprises a virtual agent that runs outside of a system OS and that allows device management independent of the OS and user. The virtual agent is tied to a device and not a specific instance of the OS. Such client hypervisors expose new functionality to ease managing systems. Some of these capabilities come from the persistence and privileges outside the OS. In some embodiments of the invention, this new management functionality is exposed to allow device management via new virtualization concepts, such as multiple VMs per system, VM replacement, snapshot/rollback, etc.05-05-2011
20100095297METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SOLUTION REPLICATION - A configuration model for an existing software solution, which is distributed over a plurality of existing machines, is discovered. The model includes a plurality of configuration items, which in turn include a plurality of independent attributes and a plurality of dependent attributes, with the plurality of dependent attributes being derivable from the plurality of independent attributes based on a plurality of constraints. The configuration model is stored in a repository, together with disk images, resource configuration details, and logical names of pertinent ones of the existing machines. Specifications of new values of the independent attributes are obtained, and new values of the dependent attributes are computed from the new values of the independent attributes, based on executing the constraints on the configuration model. The images are deployed onto a plurality of new machines for operation in accordance with the new values of the independent attributes and the new values of the dependent attributes, to obtain a re-deployed solution. The machines can be virtual machines or physical machines.04-15-2010
20110099548METHOD, APPARATUS AND SYSTEM FOR MAKING A DECISION ABOUT VIRTUAL MACHINE MIGRATION - A method, an apparatus, and a system for making a decision about virtual machine migration includes a source host platform, configured to send a migration request to a Migration Authority (MA), and to migrate the virtual machine to a target host platform according to a received migration decision-making result. The MA is configured to perform security checks on the source host platform and the target host platform, to obtain a first evaluation result of the source host platform and a second evaluation result of the target host platform, acquire a third evaluation result of the virtual machine, and return a corresponding migration decision-making result to the source host platform. The corresponding migration decision-making result indicates whether the virtual machine is permitted to be migrated; and the target host platform of the virtual machine to be migrated, is configured to accept the virtual machine to be migrated.04-28-2011
20120137286RESOURCE ALLOCATION FOR SOFTWARE DEVELOPMENT - Software development data indicative of a development activity is accessed. A component parameter of a component of a software development platform is set, in which the component parameter is based upon, at least in part, an anticipated component workload associated with the development actively. At least one system resource is allocated for the component of the software development platform based upon, at least in part, the component parameter.05-31-2012
20120137287OPTIMIZED GAME SERVER RELOCATION ENVIRONMENT - A system is provided for migrating a VM over a WAN. A first server has a VM. The first and second servers are operatively connected over the WAN by a virtual private local area network service. The first server migrates the VM to the second server by coping files and state of the VM to the second server without interrupting the interactive software on the VM. During a last round of migrating the VM, for packets intended for the VM on the first server, the first server buffers the packets in a buffer as buffered packets. Instead of delivering the buffered packets to the VM, the first server transmits the buffered packets to the second server. The second server plays the buffered packets to the VM migrated to and operating on the second server, such that buffered packets are played before current packets currently received from the clients are played.05-31-2012
20090133017ENVIRONMENT MANAGERS VIA VIRTUAL MACHINES - Methods and apparatus enforce computing policies of an enterprise in a distributed manner so that idiosyncratic services to a computing device can be minimized or altogether eliminated. Pluralities of virtual machines are arranged on one or more computing devices and define, for example, applications specified by a user and shared services approved by the enterprise. A central library stores the virtual machines and each is available for check-out by users. A manager evaluates the virtual machines for satisfactory compliance with the computing policies at a time when the virtual machines are resident in the library. Upon confirmation of satisfactory compliance, the applications and shared services are available for deployment to users. Otherwise, the virtual machines are centrally serviced for compliance and/or tested before redeployment. Libraries, managers, software program products, threat assessment, and policy management are other features, to name a few.05-21-2009
20090133016System and Method for Management of an IOV Adapter Through a Virtual Intermediary in an IOV Management Partition - The system and method address the situation where an input/output (I/O) fabric is shared by more than one logical partition (LPAR) and where each LPAR can share with the other LPARs an I/O adapter (IOA). In particular, each LPAR is assigned its own separate address space to access a virtual function (VF) assigned to it such that each LPAR's perception is that it has its own independent IOA. Each VF may be shared across multiple LPARs. Facilities are provided for management of the shared resources of the IOA via a Physical Function (PF) of the IOA by assignment of that PF to an I/O Virtualization Management Partition (IMP). The code running in the IMP acts as a virtual intermediary to the VFs for fully managing the VF error handling, VF reset, and configuration operations. The IMP also acts as an interface to the PF for accessing common VF functionality.05-21-2009
20120124574VIRTUAL COMPUTER SYSTEM AND METHOD OF INSTALLING VIRTUAL COMPUTER SYSTEM - The user needs to install an OS every LPAR on a virtual computer. Simultaneous OS installing in a plurality of LPARs is implemented by generating a first LPAR (special LPAR), a second LPAR (install mode LPAR), and a third LPAR (normal LPAR) on the basis of LPAR configuration information, copying an OS image to an MMIO space of the first LPAR, allocating the MMIO space of the first LPAR to an MMIO space of the second LPAR, and converting access to the MMIO space of the second LPAR to access to the MMIO space of the first LPAR05-17-2012
20120124581VIRTUAL COMPUTER SYSTEM AND CONTROL METHOD OF VIRTUAL COMPUTER SYSTEM - It is provided a virtual computer system, comprising a physical computer, a virtualization unit and a storage apparatus. The storage apparatus includes a first storage unit and a second storage unit. The virtualization unit includes file link information containing a correspondence relation, and a file control unit. The file control unit receives an access from the virtual computer to a file stored in the first storage unit, determines whether absence or presence of a correction file to be applied to the file by referring to the file link information, provides the file for which the access has been received from the first storage unit in a case where there is no correction file to be applied to the file, and provides a correction file in the second storage unit as the file in a case where there is the correction file to be applied to the file.05-17-2012
20120124580CONTROLLING A VIRTUAL MACHINE - A system is operatively coupled to a remote computer via a network. The system comprises service processing logic and a server executing a virtual machine. The service processing logic controls the virtual machine as directed by the remote computer.05-17-2012
20120124579METHOD AND APPARATUS FOR ADAPTIVE INTEGRITY MEASUREMENT OF COMPUTER SOFTWARE - Systems and methods are described herein that discuss how a computing platform executing a virtualized environment, in one example, can be integrity verified adaptively and on demand. This may occur at initial runtime, as well as during continued operations, and allows the platform user to install software from various vendors without sacrificing the integrity measurement and therefore the trustworthiness of the platform.05-17-2012
20120124577MANAGING RESOURCES FOR VIRTUAL MACHINES BASED ON IDENTIFIERS - A method of managing resources in a virtual environment based on identifiers is disclosed. The method includes detecting an instantiation of a virtual machine and determining a delay value based on a unique identifier. The method also includes delaying an initiation of at least one support process for the virtual machine by the delay value.05-17-2012
20120124576Managing Virtual Machines Based on Business Priority - According to one embodiment, a method for managing one or more virtual machines includes generating a request for at least one performance characteristic for at least one virtual machine, the at least one virtual machine being associated with a processing group, the processing group including one or more processing modules; receiving a response to the generated request for at least one performance characteristic for the at least one virtual machine; automatically determining whether an increase in the number of processing modules included in the processing group is required, by analyzing the received response to the generated request; and, in response to a determination that an increase in the number of processing modules included in the processing group is required, automatically adding at least one processing module to the processing group.05-17-2012
20120167079METHOD AND SYSTEM FOR REDUCING POWER LOSS TO BACKUP IO START TIME OF A STORAGE DEVICE IN A STORAGE VIRTUALIZATION ENVIRONMENT - A method and controller device for supplying battery power to a virtualized storage environment having a storage controller with a virtual machine manager and a second virtual machine. In response to a battery engaged event, the first virtual machine manager enables the image of the second virtual machine to be shared with a new instance of the second virtual machine so that the image does not have to be loaded therein. The first virtual machine manager then creates the new virtual machine. The old virtual machine shuts down non-necessary hardware devices and sets necessary hardware devices to low power mode. During this time, the new virtual machine executes a backup specific start-of-day (SOD) initialization sequence. The method also synchronizes the new and old virtual machines. The method also initiates a cache memory backup operation upon synchronization of the new and old virtual machines and then shuts down the old virtual machine.06-28-2012
20120317570SYSTEM AND METHOD FOR VIRTUAL PARTITION MONITORING - A method is provided in one example embodiment that includes receiving in an external handler an event notification associated with an event in a virtual partition. A thread in the process in the virtual partition that caused the event can be parked. Other threads and processes may be allowed to resume while a security handler evaluates the event for potential threats. A helper agent within the virtual partition may be instructed to execute a task, such as collecting and assembling event context within the virtual partition, and results based on the task can be returned to the external handler. A policy action can be taken based on the results returned by the helper agent, which may include, for example, instructing the helper agent to terminate the process that caused the event.12-13-2012
20120317569MULTI-DOMAIN INFORMATION SHARING - The present disclosure includes methods and systems for multi-domain information sharing. One or more embodiments can include a computing device with a VMM hosting a first information domain VM, a second information domain VM, and a cross-domain solution VM that controls information transfer between the first information domain VM and the second information domain VM. One or more embodiments can also include a hypervisor to enforce an isolation policy within the system.12-13-2012
20120317572VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event.12-13-2012
20120317571SUPER OPERATING SYSTEM FOR A HETEROGENEOUS COMPUTER SYSTEM - A super operating system for a heterogeneous computer system for executing tasks of software that has at least one performance processor, a processor supporting logic, and a hypervisor processor. The super operating system has a performance operating system for the performance processor; a hypervisor operating system for the hypervisor processor and a heterogeneous hypervisor software layer on top of the performance and hypervisor processors and below the performance and hypervisor operating systems. Under the super operating system, the hypervisor processor executes tasks that the hypervisor processor has sufficient processing power to handle and puts the performance processor to a power-conserving state. The hypervisor processor brings the performance processor out of power-conserving state to execute tasks that the hypervisor processor has insufficient processing power to handle. The performance and hypervisor processors simultaneously execute tasks that require combined processing power of all processors.12-13-2012
20120124578CLASSIFYING WORKLOAD FOR A SERVICE - In one example embodiment, a machine implemented method is provided. The method comprises sampling a plurality of values of a parameter associated with a software service by monitoring said parameter; determining a workload signature for the software service based on statistical analysis performed during a first sampling period; and classifying the workload of said software service by selecting, based on said plurality of values, a first workload classification from a plurality of predefined workload classifications, wherein the workload of the software service is reclassified to a second workload classification, based on a workload signature calculated during a second sampling period.05-17-2012
20120124575VIRTUAL MACHINE CONTROL PROGRAM AND VIRTUAL MACHINE SYSTEM - The program attains compatibility of suppression of an overhead accompanying page exception handling in the case of operating a program whose amount of memory use is large on a virtual machine and suppression of the overhead accompanying page exception handling in the case of operating a first OS that has a function of making another OS run on a virtual machine. A VMM creates a shadow PT (Page Table) for prohibiting reading-writing of privileged memory that requires emulation of reading/writing by using a RSV-bit, and registers the shadow PT and the second PT that a second OS operating on the first OS has in an x86 compatible CPU equipped with page exception detecting function using two PT's. When a page exception occurs, the VMM refers to cause code of the page exception and, when a P field of the cause code is 0, determines immediately that emulation is unnecessary.05-17-2012
20120317573DETERMING AN ALLOCATION CONFIGURATION FOR ALLOCATING VIRTUAL MACHINES TO PHYSICAL MACHINES - A computer-executable method for determining an allocation configuration for allocating virtual machines to physical machines. The method includes the steps of determining a predicted peak usage amount of physical resources for each time interval for individual clusters wherein the clusters include a plurality of virtual machines; setting a constraint that ensures the total predicted peak usage amount of the physical resource predicted for the first physical machine does not exceed the physical resource amount for the first physical machine; and deriving an allocation configuration by calculating, in accordance with the constraint, a solution to an optimization problem for minimizing, as an objective function, the sum total of the physical resource amounts of the plurality of physical machines to which the virtual machines are allocated.12-13-2012
20120317568OPERATING SYSTEM DECOUPLED HETEROGENEOUS COMPUTING - A heterogeneous processing system is described herein that provides a software hypervisor to autonomously control operating system thread scheduling across big and little cores without the operating system's awareness or involvement to improve energy efficiency or meet other processing goals. The system presents a finite set of virtualized compute cores to the operating system to which the system schedules threads for execution. Subsequently, the hypervisor intelligently controls the physical assignment and selection of which core(s) execute each thread to manage energy use or other processing requirements. By using a software hypervisor to abstract the underlying big and little computer architecture, the performance and power operating differences between the cores remain opaque to the operating system. The inherent indirection also decouples the release of hardware with new capabilities from the operating system release schedule.12-13-2012
20120317566VIRTUAL MACHINE PACKET PROCESSING - Packet processing for packets from a virtual machine includes receiving a packet from an external switch at a computer system hosting a plurality of virtual machines. If the received packet is a learning packet, storing a packet signature determined from the learning packet. For a packet to be transmitted from a virtual machine in the computer system, determining if the packet's signature matches the stored packet signature. If the packet's signature matches the stored packet signature, performing an action associated with the packet signature.12-13-2012
20120317567VIRTUAL NETWORK CONFIGURATION AND MANAGEMENT - A Hardware Management Console (HMC) configures virtual networks. The HMC extends Internal Queued Direct I/O to an intra-ensemble data network (IEDN) within a cluster of virtual servers to define a single channel path identifier, and to define a channel parameter. The HMC defines at least one virtual network. The HMC defines a bridge port within each CPC that supports at least one of the virtual servers. The HMC defines a network interface for each virtual server within each cluster. The HMC grants access to a corresponding virtual network for each virtual server.12-13-2012
20120222029METHOD OF MONITORING PERFORMANCE OF VIRTUAL COMPUTER AND APPARATUS USING THE METHOD - Provided are a method and an apparatus for monitoring performance of a virtual computer. In a method of controlling a computer system including a computer, the computer executes a virtualization program for causing logically divided resources of the computer to operate as first and second virtual computers, the first virtual computer executes a first OS, and the second virtual computer executes a second OS. In the method, information regarding the resources allocated to the first virtual computer and the second virtual computer by the virtualization program is obtained from the virtualization program, information indicating performance of the first virtual computer is obtained from the first OS, information indicating performance of the second virtual computer is obtained from the second OS, the obtained information and information indicating a time of obtainment of the information are stored in a storage system, and stored information is output.08-30-2012
20120222028VIRTUAL COMPUTER MANAGEMENT METHOD AND VIRTUAL COMPUTER MANAGEMENT SYSTEM - It is an object of the present invention to provide a technique that can comprehensively manage plural kinds of network addresses allocated to virtual computers.08-30-2012
20120167076Service aware virtualization - A system and method for service aware virtualization is disclosed. The system comprises a plurality of virtual instances operating on virtualization software and a plurality of service manager modules operating on the virtualization software. Each service manager module is coupled to a separate virtual instance and configured to interface with an operation of guest software operating within the virtual instance on the virtualization software. A management interface coupled to the service manager modules interfaces with the plurality of virtual instances.06-28-2012
20120131577PROVIDING A VIRTUAL MACHINE - A software element database stores software element definitions according to a software element hierarchy. A score is assigned to at least one of the software element based at least in part upon the software element's hierarchy level. Further, virtual machine templates are stored in a library. The virtual machine templates include at least one software element associated with a software element from the software element database. A user enters a specification that specifies desired software elements to be included in the virtual machine via a user interface. After the specification is entered, the a score value is calculated for at least one virtual machine template from the library, based on the scores assigned to the software elements. Using the calculated score, the virtual machine template having the highest score value is selected and the selected virtual machine template is delivered as the virtual machine to a hypervisor.05-24-2012
20120167082DIRECT SHARING OF SMART DEVICES THROUGH VIRTUALIZATION - In some embodiments devices are enabled to run virtual machine workloads directly. Isolation and scheduling are provided between workloads from different virtual machines. Other embodiments are described and claimed.06-28-2012
20120167080GUEST FILE SYSTEM INTROSPECTION AND DEFRAGMENTABLE VIRTUAL DISK FORMAT FOR SPACE EFFICIENCY - A virtualized computer system employs a virtual disk with a space efficient (SE) format to store data for virtual machines running therein. The SE format allows for defragmentation at a fine-grained level, where unused, stale, and zero blocks are moved to the end of the virtual disk so that the virtual disk may be truncated and space reclaimed by the underlying storage system as part of a special defragmentation process.06-28-2012
20120167078Obtaining diagnostic information in a virtual environment - A system and method for service aware virtualization is disclosed. The system comprises a plurality of virtual instances operating on virtualization software and a plurality of service manager modules operating on the virtualization software. Each service manager module is coupled to a separate virtual instance and configured to interface with an operation of guest software operating within the virtual instance on the virtualization software. A management interface coupled to the service manager modules interfaces with the plurality of virtual instances.06-28-2012
20120131579METHOD AND SYSTEM FOR DEPLOYING AT LEAST ONE VIRTUAL NETWORK ON THE FLY AND ON DEMAND - The invention relates to a method for generating, on the fly and on demand, at least one virtual network (05-24-2012
20120131576VIRTUAL COMPUTER SYSTEM AND MIGRATION METHOD OF VIRTUAL COMPUTER - When LPAR in a physical computer is migrated to LPAR in another in the state that OS operates, OS in LPAR can access disk which the OS has accessed before migration just after migration. FC-HBA's connected to the physical computers of the source and destination are constructed redundantly and one FC port is set to logging-out state in migration source before resumption of OS on the way of migration. After logging-in processing of FC is performed beforehand in migration destination by means of WWN of FC logged out in migration source, processing is performed so that path between FC logged and disk is viewed as being on-line from only OS. Path between FC not logged at destination and disk is processed to be viewed as being off-line from OS just after OS operation at destination, so that OS at destination can access the disk.05-24-2012
20120131573METHODS, SYSTEMS, AND APPARATUS TO PRIORITIZE COMPUTING DEVICES FOR VIRTUALIZATION - In one embodiment, a virtualization analysis tool defines a classification weight value for each physical computing device from a plurality of physical computing devices, defines an effective utilization value for that physical computing device, and associates a virtual migration priority with that physical computing device based on the effective utilization value. The virtualization analysis tool defines the effective utilization value based on the classification weight value, a first utilization weight value, and a second utilization weight value. The first utilization weight value is associated with a first resource of that physical computing device, and the second utilization weight value associated with a second resource of that physical computing device. The virtual migration priority has a first value if the effective utilization value is within a first range of utilization weight values and a second value if the effective utilization value is within a second range of utilization weight values.05-24-2012
20120131572Method for Specification of Environment Required for Crowdsourcing Tasks - Embodiments of the invention are associated with crowdsourcing, wherein a computing environment comprising all of the tools and other resources required to perform a specified task can be made available to all prospective participants, as a virtual machine image. One embodiment of the invention is directed to a method associated with a particular task that is provided by a task requester, wherein the particular task is to be performed by means of a crowdsourcing process. The method comprises the steps of selecting a plurality of participants, wherein each participant of the plurality is qualified to perform the particular task, and specifying a computing environment that comprises a set of resources, wherein each resource is required to perform the particular task. A virtual machine image that contains each of the resources of the set is constructed, and is then made available for use by each selected participant of the plurality.05-24-2012
20120131571PERFORMANCE IN A NESTED VIRTUALIZED ENVIRONMENT - Methods and systems for improving performance in a virtualization environment. The method comprising: detecting, by a first software, a first set of features supported by a hardware device, wherein the first software runs on the hardware device; detecting a second set of features with which to run a second software, wherein the second software is launched by the first software with the second set of features; exposing one or more features in the second set of features to the second software, wherein the second software detects and enables the exposed features for a third software launched by the second software; and emulating a first feature without causing a trap such that control is transferred to the second software, in response to determining that the first feature is an exposed feature not included in the first set of features, wherein one or more sensitive events are associated with the first feature.05-24-2012
20120167090HYPERVISOR FOR STARTING A VIRTUAL MACHINE - A hypervisor obtains an agent with an obtaining device. A file for implementing an agent of the virtual machine is obtained in response to an instruction to start the virtual machine. An agent replacing device stores the obtained file to a specified location in a file system of the virtual machine. A virtual machine starting device starts the virtual machine.06-28-2012
20120167088SYSTEM FOR MOVING INDIVIDUAL VIRTUAL MACHINE AMONG CLOUD COMPUTING ENVIRONMENT AND METHOD THEREOF - Disclosed is a method for moving a personal virtual machine among clouds in a cloud computing environment, including: requesting metadata for driving a virtual machine allocated to a user and an updated file in a first cloud; generating a virtual machine image in a second cloud based on the metadata and the updated file; and reproducing the virtual machine by using the generated virtual machine image.06-28-2012
20120167087APPARATUS AND METHOD FOR DRIVING VIRTUAL MACHINE, AND METHOD FOR DEDUPLICATION OF VIRTUAL MACHINE IMAGE - Disclosed herein is a method for deduplication of virtual machine images, including: generating a plurality of chunks by dividing the virtual machine images into predetermined units; determining chunks corresponding to identifiers previously stored in a repository as chunks previously stored in the repository using identifiers for each of the plurality of chunks; storing chunks that have not been stored in the repository among the plurality of chunks in the repository using the chunks previously stored in the repository; and storing inner position information on each of the plurality of chunks for the virtual machine images in image specifications corresponding to the virtual machine images.06-28-2012
20120167086OPERATING METHODS FOR VIRTUAL MACHINE SERVER AND NODE AND APPARATUSES THEREOF - Disclosed are operating methods of a server and a node, and apparatuses thereof, and more particularly, to operating methods of a virtual machine server and a virtual machine node, and apparatuses thereof. The operating method of the virtual machine server according to the exemplary embodiment of the present invention includes: generating index information of blocks for booting a virtual machine in a virtual machine image; generating list information of neighboring nodes for a target node; and transferring the index information and the list information to the target node.06-28-2012
20120167085SHARING MULTIPLE VIRTUAL FUNCTIONS TO A HOST USING A PSEUDO PHYSICAL FUNCTION - A method is provided comprising: enumerating a group of available virtual functions corresponding to the physical function; mapping the group of available virtual functions to a non-transparent port of the switch by creating a copy of a configuration space for the physical function while assigning unique vendor and device identifications for different classes of devices, wherein the mapping creates a pseudo physical function exposing a subset of the SR-IOV capability from the configuration space for the physical function; receiving a request to access the physical function from the single host; and providing the pseudo physical function to the single host for loading on the single host, in response to the receiving of the request, wherein the pseudo physical function is designed to call management functions of the single host to enable the group of available virtual functions in a local hierarchy of the single host.06-28-2012
20120167084AUTOMATIC SIMULATION OF VIRTUAL MACHINE PERFORMANCE - A method and apparatus of simulating performance characteristics of a virtual machine are disclosed. An example method may include selecting and inserting a virtual machine into a business application service group that includes a plurality of enterprise network devices, initiating a simulation sequence for a predetermined amount of time, recording results of the simulation sequence, and storing the results in memory.06-28-2012
20120131575DEVICE EMULATION IN A VIRTUALIZED COMPUTING ENVIRONMENT - Systems and methods for optimizing operation of a physical device in a virtualized computing environment are provided. The method comprises monitoring instructions issued by an application running on a virtual machine's (VM) operating system, wherein the VM is hosted by a hypervisor providing access to a physical device connected to a virtualized computing environment; wherein a device driver supported by the operating system issues one or more instructions to an emulated device supported by the hypervisor to control the physical device according to the issued instructions, wherein the emulated device's registers are implemented in memory of the hypervisor and the instructions issued by the device driver are stored in said registers, wherein the hypervisor handles the instructions, in response to learning that the instructions are stored in said registers.05-24-2012
20120216188EXPOSING A DMA ENGINE TO GUESTS IN A VIRTUAL MACHINE SYSTEM - A method and system for copying data within a guest using a direct memory access (DMA) engine. A computer system hosts a hypervisor and a guest. The hypervisor detects an inquiry of the guest about a DMA engine. In response to the inquiry, the hypervisor indicates to the guest that a DMA engine is available. The hypervisor then receives a DMA request from the guest, the DMA request indicating a source address and a target address for copying data. Both the source address and the target address are within an address space allocated to the guest. Based on one or more data transfer policies, the hypervisor determines whether to direct the DMA engine to copy the data for the guest.08-23-2012
20120216192TRIGGERING OPERATION MODE IN VIRTUAL ENVIRONMENT - In a computer system, a virtual machine (VM) guest is instantiated on a VM host. The VM host detects a plurality of successive universal serial bus (USB) events occurring in the computer system and compares the plurality of successive USB events to a preset criterion. When the plurality of successive USB events meets the preset criterion, the VM host transmits a request for triggering an operation mode to the VM guest. The VM guest executes a control program for initiating the operation mode in response to the request.08-23-2012
20120216199PROVIDING A VIRTUAL MACHINE - A software element database stores software element definitions according to a software element hierarchy. A score is assigned to at least one of the software element based at least in part upon the software element's hierarchy level. Further, virtual machine templates are stored in a library. The virtual machine templates include at least one software element associated with a software element from the software element database. A user enters a specification that specifies desired software elements to be included in the virtual machine via a user interface. After the specification is entered, the a score value is calculated for at least one virtual machine template from the library, based on the scores assigned to the software elements. Using the calculated score, the virtual machine template having the highest score value is selected and the selected virtual machine template is delivered as the virtual machine to a hypervisor.08-23-2012
20120216197VIRTUALIZING THE EXECUTION OF HOMOGENEOUS PARALLEL SYSTEMS ON HETEROGENEOUS MULTIPROCESSOR PLATFORMS - An embodiment of the invention is a virtual machine monitor that is executable by computer processor. The virtual machine monitor runs a virtual processor. When the virtual processor encounters a faulting instruction the virtual processor is unmapped from the physical processor, and generates a list of other physical processors that could execute the instruction. The virtual machine monitor determines if one of the other of the physical processors in the list is currently idle, and when one of the other of the physical processors in the list is determined to be currently idle, the virtual processor is mapped to a second physical processor, which is the one of the other of the physical processors in the list that was determined to be currently idle.08-23-2012
20120216196Administration Of Virtual Machine Affinity In A Data Center - Administration of virtual machine affinity in a data center, where the data center includes a plurality of virtual machines (VMs), each VM being a module of automated computing machinery installed upon a computer in the data center and characterized by a Universally Unique Identifier (UUID), at least two of the VMs having an affinity requirement to be installed on separate computers, the data center further including a data center administration server operably coupled to the VMs, including communicating, by at least one of the VMs having an affinity requirement to the data center administration server, the UUIDs of the VMs having an affinity requirement; and moving by the data center administration server the VMs having an affinity requirement to separate computers in the data center.08-23-2012
20120216195DIAGNOSE INSTRUCTION FOR SERIALIZING PROCESSING - A system serialization capability is provided to facilitate processing in those environments that allow multiple processors to update the same resources. The system serialization capability is used to facilitate processing in a multi-processing environment in which guests and hosts use locks to provide serialization. The system serialization capability includes a diagnose instruction which is issued after the host acquires a lock, eliminating the need for the guest to acquire the lock.08-23-2012
20120216193APPARATUS AND METHOD FOR CONTROLLING VIRTUAL MACHINE SCHEDULE TIME - A virtualization apparatus is provided. The virtualization apparatus includes a plurality of virtual machines (VMs), a process scheduler configured to schedule processes to be executed on the respective virtual machines, a virtual machine monitor (VMM) configured to provide each of the virtual machine with a virtualized execution environment, a virtual machine scheduler configured to schedule the virtual machines to run in the virtual machine monitor, and a synchronization unit configured to synchronize a process schedule time which is scheduled by the process scheduler and a virtual machine schedule time which is scheduled by the virtual machine scheduler, or to change the virtual machine schedule time in consideration of the process schedule time.08-23-2012
20120216189Methods, Devices and Computer Program Products for Emulating a Physical Hard Drive as Multiple Virtual Hard Drives - A virtual machine includes a virtual operating system operating in multiple modes. A hypervisor emulates a physical hard drive to the virtual operating system as multiple virtual hard drives. The hypervisor controls access to the multiple virtual hard drives by the virtual operating system. Each of the multiple virtual hard drives is dedicated to a different one of the multiple modes of operation. Each virtual hard drive is allocated a portion of storage space by the hypervisor that is a subset of a total amount of storage space available in the physical hard drive. Changes to a subset of the storage space allocated to a virtual hard drive dedicated to one mode of operation do not affect changes to a subset of the storage space allocated to another virtual hard drive dedicated to another mode of operation.08-23-2012
20100205602Mechanism for Scheduling Execution of Threads for Fair Resource Allocation in a Multi-Threaded and/or Multi-Core Processing System - A thread scheduling mechanism is provided that flexibly enforces performance isolation of multiple threads to alleviate the effect of anti-cooperative execution behavior with respect to a shared resource, for example, hoarding a cache or pipeline, using the hardware capabilities of simultaneous multi-threaded (SMT) or multi-core processors. Given a plurality of threads running on at least two processors in at least one functional processor group, the occurrence of a rescheduling condition indicating anti-cooperative execution behavior is sensed, and, if present, at least one of the threads is rescheduled such that the first and second threads no longer execute in the same functional processor group at the same time.08-12-2010
20100205601RUNTIME ENVIRONMENT FOR VIRTUALIZING INFORMATION TECHNOLOGY APPLIANCES - A system for virtualizing information technology (IT) appliances can include an IT appliance hosting facilities software. The IT appliance hosting facilities software can be implemented at a layer of abstraction above a virtual machine host, which is implemented in a layer of abstraction above a hardware layer of a computing system. The IT appliance hosting facilities software can include programmatic code functioning as virtualized hardware upon which a set of IT appliance software modules are able to concurrently run. The IT appliance hosting facilities software can provide caching, application level security, and a standardized framework for running the IT appliance software modules, which are configured in conformance with the standardized framework.08-12-2010
20100205600SIMULATION METHOD FOR REALIZING LARGE BATCHES AND DIFFERENT KINDS OF BASEBOARD MANAGEMENT CONTROLLERS USING A SINGLE SERVER - A simulation method for realizing large batches and different kinds of baseboard management controllers using a single server includes providing a virtual baseboard management controller by a target terminal according to different customized virtual baseboard management controller resources correspondingly. The simulation method includes initializing large batches and different kinds of virtual baseboard controller programs according to a customizable virtual baseboard controller resource. If a client requests to access one baseboard controller or multiple baseboard controllers, which virtual baseboard controller will provide a service is determined according to the information of the accessing request of the client. Then an output result is generated according to the behaviors defined in the customized resource. Finally, the output result is transferred to the client. Therein, the client may connect to the target terminal through Internet or a bus.08-12-2010
20110179418CLIENT SYSTEM, CLIENT CONTROL METHOD, AND COMPUTER-READABLE RECORDING MEDIUM CONFIGURED TO STORE CLIENT CONTROL PROGRAM USING VIRTUAL MACHINE - A client system using a virtual machine includes: a physical server that includes a CPU, a memory, a bus, and a plurality of bus adapters, manages a plurality of guest OS by a host OS, and operates as a virtual machine. A plurality of input and output units are coupled to the plurality of bus adapters of the physical server respectively. A host OS of the physical server includes a configuration definition table that stores identification numbers of the input and output units in correspondence to guest OSs used by the input and output units. The host OS notifies a guest OS corresponding to an input unit of input instruction information from the input units with reference to the configuration definition table and outputs a processing result of a guest OS to an output unit corresponding to the guest OS.07-21-2011
20110179413Guest/Hypervisor Interrupt Coalescing for Storage Adapter Virtual Function in Guest Passthrough Mode - A system and method are provided that involve a host computing machine and an SR IOV storage adapter in which the host machine hosts a virtual machine having a guest operating system (guest) coupled for direct passthrough IOV data path and also hosts a virtualization intermediary; a guest operating system (guest) and a virtualization intermediary exchange information concerning IO completions through a shared memory space; the guest writes information to a shared memory space that is indicative of whether an IO completion queue has reached a fill level since the most recently dispatched interrupt at which it is unsafe to coalesce an interrupt; the virtualization intermediary writes information to the shared memory space that is indicative of the interrupt most recently delivered to the guest; the virtualization intermediary reads the information written by the guest to the shared memory space that is indicative of whether an IO completion queue has reached a fill level since the most recently dispatched interrupt at which it is unsafe to coalesce an interrupt; the guest reads the information written to the shared memory space that is indicative of the interrupt most recently delivered to the guest; virtual interrupt coalescing determinations are made based upon the information shred through the shared memory space.07-21-2011
20120137293Dynamic migration of virtual machine computer programs upon satisfaction of conditions - A system includes a number of server computing devices and a management server computing device. Each server computing device has a virtual host computer program running thereon to support one or more virtual machine computer programs. Each virtual machine computer program is able to execute an instance of an operating system on which application computer programs are executable. The management server computing device monitors the server computing devices, and causes the virtual machine computer programs supported by the virtual host computer program of a first server computing device to dynamically migrate to the virtual host computer program of a second server computing device, upon one or more conditions being satisfied. The conditions may include the first server being predicted as failure prone, the first server consuming power less than a threshold, and the first server having resource utilization less than a threshold.05-31-2012
20120137292VIRTUAL MACHINE MIGRATING SYSTEM AND METHOD - A virtual machine migration method conducted in a virtual machine migration system that includes a virtual machine of a migration source computer and a migrating target computer. The migration source computer conducts processing to send host physical address information of an MMIO region corresponding to a device used by the virtual machine through directed I/O to a migration target computer, and to cause a connection target of the device to be switched to the migration target computer by a switching device that connects the device to the computers. The migration target computer conducts processing to allocate an MMIO region corresponding to the host physical address information sent by the migration source computer, to the device connected to the computers by the switching device.05-31-2012
20120137291PLACING A VIRTUAL MACHINE ON A TARGET HYPERVISOR - A method is provided for placing a virtual machine on a target virtual machine manager out of multiple virtual machine managers. System management software is connected to the virtual machine managers and selects the target virtual machine manager for placing the virtual machine. The method includes: the system management software creating a memory profile for all virtual machines hosted on the multiple virtual machine managers, the system management software evaluating probabilities for samepage mapping of the virtual machine to be placed on the multiple virtual machine managers based on the memory profiles of the virtual machines, the system management software selecting under consideration of the probabilities for samepage mapping a most appropriate virtual machine manager as the target virtual machine manager, and the system management software placing the virtual machine on the target virtual machine manager.05-31-2012
20120137290MANAGING MEMORY OVERLOAD OF JAVA VIRTUAL MACHINES IN WEB APPLICATION SERVER SYSTEMS - The invention relates to memory overload management for Java virtual machines (JVMs) in Web application sever systems. Disclosed is a method and system of memory overload management for a Web application sever system, wherein the Web application sever system comprises multiple JVMs, the method comprising: determining one or more replica shards for which replacement shall be performed; determining one or more target JVMs for storing a corresponding replica shard set including at least one replica shard from the one or more replica shards; and for each target JVM, performing the following: judging whether the free memory of the target JVM is adequate for storing the corresponding replica shard set; if the judging result is negative, performing the following: causing the target JVM to suspend the creation of session until the free memory of the target JVM becomes adequate for storing the corresponding replica shard set.05-31-2012
20120137289PROTECTING HIGH PRIORITY WORKLOADS IN A VIRTUALIZED DATACENTER - A computer program product is provided, including computer usable program code for running a plurality of virtual machine workloads across a plurality of servers within a common power domain, and computer usable program code for setting an operating level for each of a plurality of hardware resources within the common power domain in response to receiving an early power off warning from a power source that supplies power to the common power domain, wherein the operating level for each of the hardware resources is determined as a function of the priority of the virtual machine workloads that are utilizing each of the hardware resources.05-31-2012
20120137285PLANNING A RELIABLE MIGRATION IN A LIMITED STABILITY VIRTUALIZED ENVIRONMENT - Systems and methods for reliably migrating a virtual machine (VM) are provided. The method comprises receiving overhead and reliability factors for hosts in a hosting fabric; determining a plurality of viable migration paths for migrating a source VM from a source host to a target host in the hosting fabric, wherein the migration is accomplished through a series of migration phases, wherein a phase involves migration of the source VM from one host to another host in a migration path; determining total overhead costs associated with each migration path; and selecting a migration path from among said plurality of migration paths according to the overhead costs and reliability factors, wherein the reliability of the migration over the selected path is monitored and controlled by dynamically allocating and de-allocating one or more replicas of the source VM on one or more hosts in the migration fabric.05-31-2012
20120167089SOFTWARE COMPONENT AND DEVICE FOR THE AUTOMATED PROCESSING OF MULTI-PURPOSE DATA, EMPLOYING FUNCTIONS REQUIRING DIFFERENT SECURITY LEVELS OR RESPONSIBILITY LIMITS - A software component for automated processing of multi-usage data, implementing functions requiring various levels of security or limits of responsibility. The software component includes a plurality of virtual machines, each virtual machine being adapted for executing at least one function requiring a level of security or a limit of responsibility which is predetermined and a hypervisor adapted for controlling execution of the plurality of virtual machines.06-28-2012
20110185357Method and Apparatus for Management Between Virtualized Machines and Virtualized Storage Systems - To manage physical paths between a server system and a storage system and information about routing between virtual machines and virtual storage systems in an integrated fashion. A computer system of the present invention includes: a computer and a storage system that stores data, in which the computer includes first information for managing the first resource relating to the computer; and the storage system includes second information for managing the second resource provided in the storage system, and in which a relation between the virtual machine and the virtual storage system is defined based on the first information and the second information.07-28-2011
20110185356System and Method to Enable Power Related Decisions in a Virtualization Environment - A virtualization system includes an information handling system with a power detector that detects a power level of the information handling system and another power detector that detects another power level of the information handling system, a power status module, and a virtual machine manager that starts workloads on the information handling system. The power status module receives the power levels and sends the power levels to the virtual machine manager. The virtual machine manager apportions a first portion of the first power level to the first workload, apportions a second portion of the first power level to the second workload, apportions a first portion of the second power level to the first workload, and apportions a second portion of the second power level to the second workload.07-28-2011
20110185355Accessing Virtual Disk Content of a Virtual Machine Without Running a Virtual Desktop - Methods, systems, and techniques for facilitating access to content stored remotely, for example, as part of a virtual machine infrastructure or elsewhere in a networked environment, using a uniform mechanism are provided. Example embodiments provide an Enhanced Virtual Desktop Management Server/System with a Content Abstraction Layer which enables users to access their data stored as part of a virtual machine environment, or replicated otherwise on a network, using a generic API. The API can be incorporated into a web browser or other third party interface to provide access to the users' data without needing to remote a bitmap representation of a virtual desktop display. Accordingly, users can access their data, applications, and settings regardless of the type of access device and regardless of whether the corresponding virtual desktop is running in the data center, provisioned in the datacenter but running on a client device, or not running at all.07-28-2011
20120137288VIRTUALIZATION OF VENDOR SPECIFIC CONFIGURATION AND MANAGEMENT OF SELF-VIRTUALIZING INPUT/OUTPUT DEVICE - A vendor independent interface is provided between a hypervisor and an adjunct partition associated with a self-virtualizing IO resource to effectively abstract away vendor-specific interface details for the self-virtualizing IO resource and its adjunct partition. By doing so, vendor-specific implementation details may be isolated from the configuration and management functionality in a hypervisor, thus minimizing the changes to vendor specific firmware in order to manage new or revised self-virtualizing IO resources.05-31-2012
20120216198INTERPRETING I/O OPERATION REQUESTS FROM PAGEABLE GUESTS WITHOUT HOST INTERVENTION - Input/output (I/O) operation requests from pageable storage mode guests are interpreted without host intervention. In a pageable mode virtual environment, requests issued by pageable storage mode guests are processed by one or more processors of the environment absent intervention from one or more hosts of the environment. Processing of the requests includes manipulating, by at least one processor on behalf of the guests, buffer state information stored in host storage. The manipulating is performed via instructions initiated by the guests and processed by one or more of the processors.08-23-2012
20120216194HYPERVISOR APPLICATION OF SERVICE TAGS IN A VIRTUAL NETWORKING ENVIRONMENT - A physical host executes a virtual machine monitor (VMM) in communication with a plurality of consumer virtual machines (VMs). In response to receipt of a packet, the VMM determines whether a service is to be performed for the packet by a service virtual machine (VM) in communication with the VMM. In response to determining that the service is to be performed for the packet by the service VM, the VMM applies a tag to the packet that differentiates the packet from any other packet sharing a common address with the packet but having a different associated consumer, passes the packet to the service VM for performance of the service, and thereafter removes the tag from the packet in response to receipt of the packet from the service VM following performance of the service. In response to receipt of the packet from the service VM, the VMM forwards the packet.08-23-2012
20120216191CONFIGURING UNIVERSAL SERIAL BUS DEVICE IN VIRTUAL ENVIRONMENT - In a computer system, virtual machine (VM) guests are concurrently instantiated on a VM host. When a USB device is plugged in to the computer system, the VM host loads a backend driver associated with the USB device, which controls the USB device. The VM host provides a user interface to presenting a list of VM guests, in which a user can select a VM guest to be bound with the USB device. Then the VM host allocates the control of the USB device to the selected VM guest.08-23-2012
20120216190On Demand Scan Engine Deployment - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for on-demand scan engine deployment. In one aspect, a method includes obtaining parameters of a scheduled scan, the parameters defining computer assets to be scanned and performance requirements. The method includes obtaining historical data describing prior scans that were performed according to similar parameters. The method includes determining performance measures of the prior scans using the historical data. The method includes calculating resource requirements based on the parameters and the performance measures, the resource requirements being requirements that are determined to be needed to meet the performance requirements of the scheduled scan. The method includes determining a number of scan engines required to meet the performance requirements based on the resource scan requirements. The method includes adjusting a number of scan engines in virtual machines so that the number of scan engines are available.08-23-2012
20120216187MULTILEVEL SUPPORT IN A NESTED VIRTUALIZATION ENVIRONMENT - A method of handling an event occurring in a nested virtualization computing environment is provided, wherein N hypervisors are executed nestedly, with a first hypervisor running at level zero (L0) directly over a host machine, and other hypervisors nestedly running at levels L1 to Ln, respectively. The method comprises trapping an event generated by software running at level Ln; determining a hypervisor x at level Lx designated for handling the trapped event; and wherein the hypervisor x emulates features needed for performing the trapped event for the software running at the level Ln.08-23-2012
20100175064SYSTEM AND METHOD FOR RAW DEVICE MAPPING IN TRADITIONAL NAS SUBSYSTEMS - A method is provided for data storage management in a virtualized information handling system that includes a first and second network storage resource, a hypervisor allowing multiple virtual machines to run on the virtualized information handling system, and a data access agent. The data access agent may intercept a data access request initiated by a virtual machine and intended for the first network storage resource. In response to intercepting the data access request, the data access agent may establish a connection with the first network storage resource, and retrieve from the first network storage resource metadata associated with the data access request. The retrieved metadata may identify a location of the second network storage resource. Additionally, the data access may establish a connection with the second network storage resource using the location of the second network storage resource identified by the retrieved metadata. The virtual machine may complete the intercepted data access request via the established connection with the second network storage resource.07-08-2010
20100175063Detection and Management of Dynamic Migration of Virtual Environments - A mechanism is provided to detect that a dynamic migration of a virtual environment is in progress or has been executed during a hardware or software scan without requiring instrumentation of applications running within the virtual machine. The mechanism relies on a particular sequencing and usage of application programming interfaces and commands that scanning technology provides, associated with the modularity of the scans and on the external virtual machine enabler component running on the host. The mechanism may detect a dynamic migration and take proper actions based on the system configuration. The actions may include discarding the output of the scan executed across a dynamic migration and repeat the scan. The actions may also include notifying the initialization subsystem of the non-migration-safe application to execute a script or program to address migration safety issues. One particular program or script may be an agent ID regeneration program or script.07-08-2010
20120254864METHOD, APPARATUS AND SYSTEM FOR LIMITING ACCESS TO VIRTUALIZATION INFORMATION IN A MEMORY - Techniques for limiting access to virtualization information which is stored in a memory region allocated to a virtual machine instance. In an embodiment, virtualization information is written over in response to an indication of a close event which is to change an allocation of the memory region to the virtual machine instance. In another embodiment, the virtualization information is written over before the memory region is made available for a subsequent allocation.10-04-2012
20120174098COMPUTER SYSTEM - A computer system enables two virtual machines 07-05-2012
20100299666Live Migration of Virtual Machines In a Computing environment - A method for migrating a virtual machine (VM) in a computing environment is provided. The method comprises receiving a request to migrate a VM executing on a source host to a destination host; defining a recovery point to which the VM is restored during recovery from a fault; and iteratively copying a memory of the source host associated with the VM to the destination host. During the copying, the original state of each page in the memory is preserved. At some point, the VM suspends executing on the source host, copies state information associated with the VM to the destination host, and resumes executing on the destination host. If a fault is detected on the source host, the VM is restored to the recovery point using preserved information.11-25-2010
20100299665INTERPOSITION METHOD SUITABLE FOR HARDWARE-ASSISTED VIRTUAL MACHINE - One embodiment of the present invention is a method of interposing operations in a computational system that includes a virtualization system executable on an underlying hardware processor that natively supports one or more instructions that transition between host and guest execution modes. The method includes introducing a hooked vector into a supervisor register block of the hardware processor, wherein the hooked vector displaces a system call handler vector otherwise set by a guest computation; read and write protecting at least the hooked vector containing portion of the supervisor register block; initiating execution of a code sequence of the guest computation on the hardware processor using one of the instructions that transition between the host and guest execution modes thereof, wherein the code sequence includes a system call and wherein upon initiation of the system call, the hardware processor transfers execution to a substitute handler in accordance with the hooked vector; and responsive to execution of the substitute handler, initiating a hooked operation and transferring control to the guest system call handler.11-25-2010
20100050172METHODS AND SYSTEMS FOR OPTIMIZING RESOURCE USAGE FOR CLOUD-BASED NETWORKS - A cloud marketplace system can be configured to communicate with multiple cloud computing environments in order to ascertain the details for the resources and services provided by the cloud computing environments for optimizing resources utilized by virtual machines. The cloud marketplace system can be configured to determine the resource and service data for the cloud computing environments and select a set of resource servers for instantiating the virtual machines based specifications of the virtual machines and parameters of the instantiation. The cloud marketplace system can be configured to periodically monitor the cloud's resources and migrate the virtual machines if resources become available that more closely match the parameters of the virtual machines.02-25-2010
20100050171RESOURCE MANAGEMENT SYSTEM AND APPARATUS - A computer implemented method for efficiently allocating resources for an enterprise server system through a proportional integral derivative scheme is provided. The method includes defining a set point parameter for a resource being allocated and defining a proportional gain parameter, a proportional integral (PI) gain parameter and a proportional integral derivative (PID) gain parameter in terms of the proportional gain parameter. The method further includes calculating an initial maximum allocation for the resource based on a product of the proportional gain parameter with a difference of an initial operating parameter and the set point parameter and adjusting the initial operating parameter to the initial maximum allocation. A next allocation of the resource is calculated based on a product of the proportional gain parameter with the difference of an initial operating parameter and the set point parameter and a difference of the set point with a current operating parameter. The initial maximum allocation is adjusted with a next allocation.02-25-2010
20100050170Access to Data for Virtual Devices - One embodiment of the present invention is a method for a virtual machine to access data from a virtual device, the method including: (a) attaching the virtual device to the virtual machine with a backing store that is a virtual image of a file system conforming to a predetermined file system format, wherein: (i) file system data is stored in one or more files, (ii) the virtual image includes metadata stored apart from the file system data, which metadata corresponds to the predetermined file system format, (iii) the metadata includes one or more directory records, and (iv) the one or more directory records include information that points directly or indirectly to the file system data; (b) issuing a read request for a block of data from the file system as if stored in the predetermined file system format; (c) accessing the metadata and determining the location of the requested block of data in the file system data; and (d) retrieving the requested block of data from the file system data.02-25-2010
20120180046ADJUNCT PARTITION WORK SCHEDULING WITH QUALITY OF SERVICE ATTRIBUTES - Operating system-directed workload scheduling of an adjunct partition in a logically partitioned computer is selectively overridden to handle platform work requiring a Quality of Service (QoS) guarantee. Firmware may track outstanding requests for platform work for an adjunct partition, and in response to a request for platform work that requires a QoS guarantee, the firmware may assume or take over scheduling decisions for the adjunct partition from the operating system of an associated logical partition and schedule execution of the adjunct partition to ensure that the adjunct partition will be allocated sufficient execution resources to perform the platform work independent of the scheduling desires of the operating system. As a result, any platform work that potentially impacts the platform work of other adjunct partitions will not be held up as a result of an unwillingness or inability of the operating system to schedule execution of the adjunct partition.07-12-2012
20100275205COMPUTER MACHINE AND ACCESS CONTROL METHOD - According to one embodiment, a computer machine includes a client virtual machine and a file server virtual machine configured to simultaneously run, a virtual machine manager configured to control booting of the client and file server virtual machines, a monitoring module configured to monitor whether a communication with an external file server is possible, an access control module configured to access to a duplicate file which is a duplicate of the file and is stored in a part of a local disk or a part of a memory which are managed by the monitoring module when the monitoring module determines that the communication is impossible after determining that the communication is possible, and a file deletion module configured to delete the duplicate file when the monitoring module detects the communication is impossible in a preset time.10-28-2010
20100275203STORAGE MANAGEMENT SYSTEM AND STORAGE MANAGEMENT METHOD IN VIRTUALIZATION ENVIRONMENT - The management computer creates a connection between a virtual computer and a logical volume of a storage apparatus based on the application management information that stores a connection relationship between an application program and an I/O adapter, before a server computer provided with a hypervisor that logically divides the computer resources that include a CPU, a memory, and an I/O adapter and that operates them as an independent virtual computer starts an application program that has been stored into the storage apparatus on the virtual computer.10-28-2010
20100275199Traffic forwarding for virtual machines - In one embodiment, an apparatus configured for communication with a plurality of virtual machines includes a virtual switch in communication with one or more of the virtual machines, an interface in communication with one or more of the virtual machines and configured for communication with a hardware implemented switch, and a mode selector for assigning to each of the virtual machines, a mode of operation for forwarding data from the virtual machine and switching the assigned mode of operation at one or more of the virtual machines. The mode of operation is selected from a first mode wherein the data is forwarded by the hardware implemented switch and a second mode wherein the data is forwarded by the virtual switch.10-28-2010
20100275198System and apparatus for utilizing a virtual machine to support redundancy in a virtual machine manager pair - A storage array controller may include a virtual machine manager for managing a storage array application virtual machine and a dedicated multiplexer virtual machine. The storage array application virtual machine and the dedicated multiplexer virtual machine may be communicatively coupled via a plurality of virtual machine manager coupling drivers. The storage array controller may also include a dedicated inter controller link for communicatively coupling the storage array controller with a second storage array controller. The dedicated multiplexer virtual machine may be configured for coupling with a second dedicated multiplexer virtual machine included with the second storage array controller via a device driver communicating across the dedicated inter controller link.10-28-2010
20120180052Application Performance with Support for Re-Initiating Unconfirmed Software-Initiated Threads in Hardware - A method, system and computer-usable medium are disclosed for managing prefetch streams in a virtual machine environment. Compiled application code in a first core, which comprises a Special Purpose Register (SPR) and a plurality of first prefetch engines, initiates a prefetch stream request. If the prefetch stream request cannot be initiated due to unavailability of a first prefetch engine, then an indicator bit indicating a Prefetch Stream Dispatch Fault is set in the SPR, causing a Hypervisor to interrupt the execution of the prefetch stream request. The Hypervisor then calls its associated operating system (OS), which determines prefetch engine availability for a second core comprising a plurality of second prefetch engines. If a second prefetch engine is available, then the OS migrates the prefetch stream request from the first core to the second core, where it is initiated on an available second prefetch engine.07-12-2012
20120180050METHOD AND SYSTEM FOR COORDINATING HYPERVISOR SCHEDULING - A method for executing an application on multiple nodes includes synchronizing a first clock of a first node and a second clock of a second node, configuring a first hypervisor on the first node to execute a first application domain and a first privileged domain, and configuring a second hypervisor on the second node to execute a second application domain and a second privileged domain. Configuring the hypervisor includes allocating a first number of cycles of the first clock to the first privileged domain. Configuring the second hypervisor includes allocating the first number of cycles of the first clock to the second privileged domain. The method further includes executing the application in the first application domain and the second application domain. The first application domain and the second application domain execute semi-synchronously and the first privileged domain and the second privileged domain execute semi-synchronously.07-12-2012
20120180044Communications Between Virtual Machines That Have Been Migrated - A method, apparatus, and computer program product for managing communications between a plurality of applications are presented. A determination is made as to whether an address in a message is a prior address for a second application in the plurality of applications in response to receiving a message from a first application in the plurality of applications. The message is sent onto a virtual network configured to handle prior addresses for the plurality of applications in response to the address in the message being the prior address for the second application being located on another virtual machine from the first application.07-12-2012
20120180042Mechanism for Memory State Restoration of Virtual Machine (VM)-Controlled Peripherals at a Destination Host Machine During Migration of the VM - A mechanism for memory change tracking during migration of a virtual machine (VM) with VM-controlled assigned peripherals is disclosed. A method of the invention includes receiving a state of a VM-controlled peripheral device running on a destination host machine from an origin host machine, wherein the VM is executed by a hypervisor of the destination host machine, providing the received state of the peripheral device to at least one of the VM, a memory of the VM, or the peripheral device in order to cause the peripheral device to be restored to that state on the destination host machine, and interacting with the VM in order to cause the VM to start the peripheral device in the restored state.07-12-2012
20120180041TECHNIQUES FOR DYNAMICALLY DISCOVERING AND ADAPTING RESOURCE AND RELATIONSHIP INFORMATION IN VIRTUALIZED COMPUTING ENVIRONMENTS - A technique for dynamically discovering and adapting resource and relationship information in virtualized computing environments including receiving, by a discovery manager, a discovery request for a virtual machine image that was created within a virtualized computing environment. The technique also includes using the discovery manager to discover resource and relationship information for the virtual machine image in response to the discovery request. The technique also includes invalidating, using the discovery manager, the resource and relationship information in response to receipt of an invalidate request for the virtual machine image. The resource and relationship information is then stored in a database using the discovery manager.07-12-2012
20120180040TECHNIQUES FOR PERSONALIZING FEED CONTENT IN VIRTUALIZED COMPUTING ENVIRONMENTS - A technique for personalizing feed content in virtualized computing environments includes accessing, using a data processing system, metadata associated with a virtual machine instance that is stored in a database. The technique also includes prioritizing, using the data processing system, feed content delivered to a client associated with the virtual machine instance based on the metadata.07-12-2012
20120180047PRESERVING TRAFFIC CLASS PRIORITY QoS WITH SELF-VIRTUALIZING INPUT/OUTPUT DEVICE - Frame wrapping such as Q-in-Q frame wrapping is used to enforce QoS prioritization with a converged or multi-function self-virtualizing IO resource such as a converged SRIOV network adapter. Frame wrapping may be used to avoid conflicting priorities from frames associated with virtual functions for which ACLs are not enforced, and thereby preserve QoS prioritization for lossless traffic classes.07-12-2012
20120180049LAUNCHING SOFTWARE APPLICATION IN VIRTUAL ENVIRONMENT - In a virtual environment, a virtual machine (VM) host creates and displays one or more application shortcuts in the VM host. An application shortcut correlates to a software application that is installed in a VM guest. When the VM host receives an execution command for the application shortcut from the VM host, the VM host establishes a connection channel between the VM host and the VM guest and transmits a launch request to the VM guest via the connection channel. The VM guest launches the software application in response to the launch request.07-12-2012
20120284715COMPLIANCE-BASED ADAPTATIONS IN MANAGED VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing.11-08-2012
20120124573SYSTEM AND METHOD FOR SECURELY HOSTING APPLICATIONS - A computer-implemented system for providing a virtualized application hosting environment comprising: a plurality of application/game servers each having a memory for storing application program code and data and a processor for executing the application program code and processing the data on behalf of a client; a virtualization service executed on each of the application/game servers, the virtualization service comprising a file redirection module for redirecting file read/write operations generated by the application program code to one or more virtualized file locations; and a registry redirection module for intercepting registry operations generated by the application program code and executing the registry operations on behalf of the application program code at one or more virtualized registry locations.05-17-2012
20100011356INTELLIGENT DISTRIBUTED CONTROLLER - A network of intelligent distributed controls adapted to appear to a programmer as a single virtual device for controlling a system having a pool of all of the inputs and outputs of the various intelligent distributed controllers in the network.01-14-2010
20100011355Apparatus for Facilitating Control of a Target Computer by a Remote Computer - A device for permitting control of a target computer by a remote computer is operatively connectable to the remote computer so as to receive remote computer mouse and keyboard signals and transmit video update data to the remote computer. The device is operatively connectable to the target computer so as to provide the remote computer keyboard and mouse signals as control inputs to the target computer and so as to receive a target computer video signal for generation of video update data. The device includes a virtual memory disk, wherein the virtual floppy disk includes a memory space associated with the device. The device is configured to permit a user of the remote computer to mount the device to the remote computer, transfer data to the virtual memory disk, and unmount the virtual memory disk.01-14-2010
20120260250INFORMATION PROCESSING DEVICE, VIRTUAL MACHINE CREATION METHOD, AND APPLICATION DISTRIBUTION SYSTEM10-11-2012
20130174146DYNAMICALLY SCALING MULTI-TIER APPLICATIONS IN A CLOUD ENVIRONMENT - A predicted workload of a multi-tier application is determined for a defined period of time. A change in application capacity is determined for the predicted workload. A scaling strategy is dynamically selected for the change in application capacity, in which the scaling strategy including vertical scaling and horizontal scaling.07-04-2013
20130174147Low Latency Virtual Machine Page Table Management - Various embodiments of this disclosure may describe method, apparatus and system for reducing system latency caused by switching memory page permission views between programs while still protecting critical regions of the memory from attacks of malwares. Other embodiments may be disclosed and claimed.07-04-2013
20120185853Virtual Input-Output Connections for Machine Virtualization - A computing method includes specifying a virtual computer system including at least one virtual or physical compute node, which produces data packets having respective source attributes. At least one Virtual Input-Output Connection (VIOC) that is uniquely associated with the values of the source attributes is defined. A policy specifying an operation to be performed with regard to the VIOC is defined. The virtual computer system is implemented on a physical computer system, which includes at least one physical packet switching element. The physical packet switching element is configured to identify the data packets whose source attributes have the values that are associated with the VIOC and to perform the operation on the identified data packets, so as to enforce the policy on the VIOC.07-19-2012
20120185849IDENTITY MANAGEMENT METHOD AND SYSTEM - An identity management method and system is disclosed. The method includes identity context management (ICM) clients monitoring access to Internet resources using dedicated Virtual Machines (VM). An ICM server monitors associations between Internet resource identifiers (IDs) and the Internet resources accessed by the VMs. The VMs register context for the ICM clients with the ICM server. An ICM client enables access to Internet resources and presentation of Webpages and Internet contents associated with the Internet resources within the associated Virtual Machine context.07-19-2012
20120185851CALCULATING VIRTUAL MACHINE RESOURCE UTILIZATION INFORMATION - A system and method are provided for estimating physical resource utilization information for virtual machines. The system includes a model which indicates how virtual resource activities are transformed into physical resource activities for each virtual machine running on a server. A run-time calibrator utilizes the model to estimate physical resource utiliation information for each individual virtual machine on the server.07-19-2012
20120185854SYSTEM AND METHOD TO IMPROVE MEMORY USAGE IN VIRTUAL MACHINES RUNNING AS HYPERVISOR GUESTS - A system and method to improve memory usage in virtual machines running as hypervisor guests. In accordance with an embodiment, the invention provides a system for changing the memory usage of a virtual machine on request from a hypervisor, comprising: a hypervisor; a guest operating system executing inside the hypervisor; a communication channel between the hypervisor and the guest operating system; a balloon driver in the guest operating system; a virtual machine for executing a software application; a communication channel between the balloon driver and the virtual machine; a memory space or heap for use by the virtual machine in storing software objects and pointers as part of the software application; and a compacting garbage collector for use by the virtual machine.07-19-2012
20120185856COMPUTER SYSTEM AND MIGRATION METHOD OF VIRTUAL MACHINE - A computer system of the present invention is provided with an open flow controller 07-19-2012
20120185852STORAGE AREA NETWORK ACCESS FOR VIRTUAL MACHINES - Techniques for enabling a virtual machine (VM) executing on a physical node to access a partition of a storage system are described. One embodiment associates an identifier with the VM for use when communicating with the storage system, wherein the identifier differs from a default identifier of a host bust adapter (HBA) usable by the physical node to communicate with the storage system.07-19-2012
20120185850CODE REARRANGER AND METHOD FOR REARRANGING CODE FOR A VIRTUAL MACHINE - Provided is an code rearranger and method for a virtual machine that uses a just-in-time-compiler (JITC) to manage a location of machine code stored in a code cache. The apparatus may rearrange consecutively-executable machine codes from among those stored in the code cache to be placed successively.07-19-2012
20120185846NETWORK COMMUNICATIONS OVER SHARED LINKS IN A VIRTUALIZED ENVIRONMENT - A method of data processing includes a physical host executing a virtual machine monitor (VMM) that instantiates a plurality of virtual machines (VMs). The VMM supports processing of a virtual link manager (VLM) that deploys and configures a plurality of Layer 2 virtual links sharing bandwidth of a Layer 2 physical link between the physical host and an access switch. The VMM communicates parameters of the plurality of virtual links with the access switch.07-19-2012
20090113424Transparent VMM-Assisted User-Mode Execution Control Transfer - A virtual-machine-based system provides a control-transfer mechanism to invoke a user-mode application handler from existing virtual hardware directly, without going through an operating system kernel running in the virtual machine. A virtual machine monitor calls directly to the guest user-mode handler and the handler transfers control back to the virtual machine monitor, without involving the guest operating system.04-30-2009
20100293545 RISC PROCESSOR DEVICE AND ITS INSTRUCTION ADDRESS CONVERSION LOOKING-UP METHOD - An RISC processor and a method for converting and looking-up instruction address in the RISC processor. The device comprises a decoder, which includes a look-up table module for realizing the conversion from an X86 source instruction address to an MIPS target instruction address by using a look-up table. The look-up table module includes: a looking-up sub-module for indexing the look-up table based on content, wherein if looking-up is hit, the corresponding content will be stored in a target register, and if not, an entry address of the not-hit service program will be stored in the target register; and an indexing sub-module for indexing the look-up table based on content and getting an index of the table entry in which the content resides.11-18-2010
20120185847SYSTEM AND METHOD FOR LOCKING MEMORY AREAS IN A JVM TO FACILITATE SHARING BETWEEN VIRTUAL SERVERS - A system and method for locking memory areas in a Java Virtual Machines (JVM) to facilitate sharing between virtual servers. In accordance with an embodiment, the system comprises a computing/virtual execution environment, which includes one or more physical computers, computer systems, server computers, or similar computing devices, a hypervisor, and a virtual machine or JVM. The JVM allows one or more application images to be run on the computer, wherein the application images can include application server instances. The application server uses a first large page in memory during its startup process, and is configured so that it signals to the JVM when the application server has completed its startup and has potentially pre-optimized important code. When the JVM receives this signal, it internally write-protects or locks the page used for application server code memory, so that any new JITed code or re-optimized code is subsequently written into a new large page. The original page will therefore be undisturbed and will always be shareable between the virtual servers running within the hypervisor.07-19-2012
20120185848TASK PRIORITIZATION MANAGEMENT IN A VIRTUALIZED ENVIRONMENT - A method, computer program product, and system for managing tasks for a virtual machine are presented. An amount of resources to perform a task for the virtual machine are identified in response to receiving a request to perform the task for the virtual machine in a set of data processing systems. A set of resources in the set of data processing systems available to complete the task for the virtual machine are identified. A set of priorities for a set of phases of the task are identified. Operations are scheduled on the set of resources to perform the task for the virtual machine based on the set of priorities identified for the set of phases of the task.07-19-2012
20120084778MANAGING EXECUTION OF MIXED WORKLOADS IN A SIMULTANEOUS MULTI-THREADED (SMT) ENABLED SYSTEM - A kernel of a SMT enabled processor system facilitates construction of an exclusive set of processors to simulate an ST mode for handling the tasks of the ST workload, wherein the ST workload runs more efficiently on single threaded processors. The kernel schedules the ST workload on the exclusive set of processors by selecting one hardware thread per processor within said exclusive set of processors to handle a separate one of the tasks of the ST workload, while requiring the remaining hardware threads per processor within the exclusive set to idle. As a result, the ST workload is executed on the SMT enabled processor system as if the exclusive set of processors run in ST mode, but without actually deactivating the remaining idle hardware threads per processor within the exclusive set of processors.04-05-2012
20120084777Virtual Machine and/or Multi-Level Scheduling Support on Systems with Asymmetric Processor Cores - Different processor cores in a computing device can support different features. In one or more embodiments, the features supported by each of multiple physical processor cores of a computing device are identified. A set of one or more features of the multiple physical processor cores to make available to virtual processor cores of the virtual machine are determined based at least in part on both the one or more features supported by each of the multiple physical processor cores and a number of virtual processor cores of the virtual machine. In additional embodiments, a multi-level scheduling model is used. An operating system level scheduler of an operating system schedules multiple applications for execution on multiple processor cores, and a user level scheduler of an application schedules application threads of that application for execution on one or more of the multiple processor cores.04-05-2012
20120084776VIRTUAL MACHINE STAGE DETECTION - A computer implemented method, system and computer program product for categorizing a virtual machine stage. A data processing system starts a virtual machine. It sets factor-stage ranges, wherein for each combination factor and stage, a corresponding range is present, and wherein each range is as broad as a reset range. It sets a frequency for sampling virtual machine metrics and samples virtual machine metrics to form a plurality of virtual machine metrics for each factor. It applies a value to each range satisfied by each virtual machine metric, to form a plurality of stage-qualifying values corresponding to a range, and sums all stage-qualifying values for each stage, to form a stage likelihood. The data processing system further selects a stage corresponding a highest stage likelihood. The data processing system determines if the current range is different from a former range. The system expands each range corresponding to the current stage.04-05-2012
20120084775Techniques for Streaming Virtual Machines from a Server to a Host - Techniques for configuring a commodity server to host virtual hard disks are disclosed herein. In an exemplary embodiment, a virtual hard disk file can be split into a plurality of differencing VHD files and one or more of the files can be downloaded to a virtualization host as it runs off the VHD files stored on the server. After the one or more VHD files are downloaded, the virtualization host can be configured to use the local copy instead of the copy on the commodity server. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures.04-05-2012
20120084774Techniques For Load Balancing GPU Enabled Virtual Machines - Exemplary techniques for balancing 3D graphical processor unit use among virtual machines are herein disclosed. In an exemplary embodiment, a virtualization platform can load an instance of a graphics rendering module for a virtual machine; select a GPU for the graphics rendering module to run on; and configure the virtual machine to render to the selected GPU. In addition to the foregoing, other aspects are described in the detailed description, claims, and figures.04-05-2012
20120227040Hybrid Operating System - A hybrid operating system may allocate two sets of resources, one to a first operating system and one to a second operating system. Each operating system may have a memory manager, process scheduler, and other components that are aware of each other and cooperate. The hybrid operating system may allow one operating system to provide one set of services and a second operating system to provide a second set of services. For example, the first operating system may have monitoring applications, user interfaces, and other services, while the second operating system may be a lightweight, high performance operating system that may not provide the same services as the first operating system.09-06-2012
20120227042MECHANISM FOR SCHEDULING EXECUTION OF THREADS FOR FAIR RESOURCE ALLOCATION IN A MULTI-THREADED AND/OR MULTI-CORE PROCESSING SYSTEM - A thread scheduling mechanism is provided that flexibly enforces performance isolation of multiple threads to alleviate the effect of anti-cooperative execution behavior with respect to a shared resource, for example, hoarding a cache or pipeline, using the hardware capabilities of simultaneous multi-threaded (SMT) or multi-core processors. Given a plurality of threads running on at least two processors in at least one functional processor group, the occurrence of a rescheduling condition indicating anti-cooperative execution behavior is sensed, and, if present, at least one of the threads is rescheduled such that the first and second threads no longer execute in the same functional processor group at the same time.09-06-2012
20120227041MANAGEMENT OF DISTRIBUTED VIRTUAL SWITCH AND DISTRIBUTED VIRTUAL PORTS - A method creates a distributed virtual switch (DVswitch) and distributed virtual ports (DVports) for the DVswitch. The DVswitch binds virtual switches in a collection of hosts together in a software abstraction. Also, the DVports are available for connection by virtual network interface cards (VNICs) of virtual machines in the collection of hosts. A request is received for a connection of a virtual network interface card (VNIC) of a virtual machine for a host in the collection of hosts to a DVport. If the requested DVport is available, the method provides connection information for the requested DVport to the host to allow the host to connect the requested DVport to the VNIC. The DVport stores a runtime state for a virtual port associated with a virtual switch for the host and the virtual switch forwards network frames between the VNIC and a physical network interface card (NIC).09-06-2012
20120227039METHOD FOR EXECUTING VIRTUAL APPLICATION DELIVERY CONTROLLERS HAVING DIFFERENT APPLICATION VERSIONS OVER A COMPUTING DEVICE - A method for executing virtual application delivery controllers (vADCs) having different application versions over a computing device. The method comprises installing a virtualization infrastructure in the computing device; creating by the virtualization infrastructure a plurality of vADCs having different application versions, wherein each vADC is created from a software image maintained in a hardware infrastructure of the computing device; gathering version information associated with each of the plurality of vADCs; independently executing the plurality of vADCs over an operating system of the computing device; and controlling the execution of the plurality of the vADCs over an operating system of the computing device using the virtualization infrastructure using in part the version information. In one embodiment, each of the plurality of vADCs does not execute its own guest operating system.09-06-2012
20120260249SOFTWARE TOOL AND METHOD FOR UPDATING A VIRTUAL APPLIANCE - A virtual appliance update mechanism detects when an update to a corresponding workload is made, and makes automatic corresponding changes to the virtual appliance to reflect the update to the workload. In one specific implementation, the virtual appliance update mechanism determines that configuration units corresponding to the update to the workload are present in a knowledge base of configuration units, and automatically updates the virtual appliance with the configuration units corresponding to the update. In this manner a virtual appliance may be automatically updated based on an update to a workload, thereby assuring the virtual appliance reflects the current state of the workload.10-11-2012
20120260248AUTOMATED COST CALCULATION FOR VIRTUALIZED INFRASTRUCTURE - In one embodiment, a method includes storing a cost assigned to a physical computing device in a storage device. The physical computing device is found in a physical infrastructure of a data center. The method determines an instantiation of a virtual machine in a virtual infrastructure. Information for a provisioning of the virtual machine with the physical computing device in the physical infrastructure of the data center is then received. The cost assigned to the physical computing device from the storage device is determined where the cost is used to determine a charge for the virtual machine based on usage of the physical computing device.10-11-2012
20110126195ZERO COPY TRANSMISSION IN VIRTUALIZATION ENVIRONMENT - A system for providing a zero copy transmission in virtualization environment includes a hypervisor that receives a guest operating system (OS) request pertaining to a data packet associated with a guest application, where the data packet resides in a buffer of the guest OS or a buffer of the guest application and has at least a partial header created during the networking stack processing. The hypervisor further sends, to a network device driver, a request to transfer the data packet over a network via a network device, where the request identifies the data packet residing in the buffer of the guest OS or the buffer of the guest application, and the hypervisor refrains from copying the data packet to a hypervisor buffer.05-26-2011
20120233606AUTONOMIC CUSTOMIZATION OF A VIRTUAL APPLIANCE - A customizer autonomically customizes a virtual appliance by retrieving customization values for various customizable properties of a virtual machine from various providers to customize the virtual appliance in order to simplify deployment of the virtual appliance. The customization properties may include CPU properties, memory properties, storage properties, network properties and properties specific to the software in the virtual appliance. The customizer allows an end user to initiate autonomic customization of the virtual appliance at various times prior to deployment of the virtual appliance. The customizer also allows the user to provide additional customization upon execution.09-13-2012
20120233613INFORMATION PROCESSOR APPARATUS, VIRTUAL MACHINE MANAGEMENT METHOD AND VIRTUAL MACHINE MANAGEMENT PROGRAM - An information processing apparatus that controls a resource allocation amount for one or a plurality of virtual machines run by a computer, the information processing apparatus includes a memory that stores an allowable index upper limit and index information indicating an association between the resource allocation amount and an index and a processor that, when a virtual machine lacking resources is detected from a resource usage status, increases the resource allocation amount allocated to the virtual machine lacking resources such that an index value calculated according to the index information and the resource allocation amount for the one or a plurality of virtual machines does not exceed the upper limit.09-13-2012
20120233612CODE INJECTION AND CODE INTERCEPTION IN AN OPERATING SYSTEM WITH MULTIPLE SUBSYSTEM ENVIRONMENTS - Systems, methods, and apparatuses are provided for code injection and code interception in an operating systems having multiple subsystem environments. Code injection into a target process can rely on generation of a virtual process that can permit analysis of information loaded in a memory image of the target process regardless of the host environment in which the target process is executed. Based at least on information collected via the analysis, code can be injected into the target process while preserving integrity of the target process. Code interception also can exploit the analysis for suitable hooking that preserves integrity of target process. Code interception can utilize relocatable tokenized code that can be parameterized through token replacement.09-13-2012
20130174159FACILITATING PROCESSING WITHIN COMPUTING ENVIRONMENTS SUPPORTING PAGEABLE GUESTS - Processing within a computing environment that supports pageable guests is facilitated. Processing is facilitated in many ways, including, but not limited to, associating guest and host state information with guest blocks of storage; maintaining the state information in control blocks in host memory; enabling the changing of states; and using the state information in management decisions. In one particular example, the guest state includes an indication of usefulness and importance of memory contents to the guest, and the host state reflects the ease of access to memory contents. The host and guest state information is used in managing memory of the host and/or guests.07-04-2013
20130174157METHOD AND SYSTEM FOR VIRTUAL MACHINE NETWORKING - Aspects of a method and system for networking are provided. In this regard, one or more circuits and/or processors in a network adapter of a first network device may determine whether to communicate traffic between virtual machines running on the first network device via a path that resides solely within the first network device, or via a path that comprises a second network device that is external to the first network device. The determination may be based, at least in part, on characteristics of the traffic. The determination may be based, at least in part, on capabilities and/or available resources of the network adapter. The determination may be based, at least in part, on management information exchanged between the one or more circuits and/or processors and one or more of: software running on the first network device, the second network device, and a third network device.07-04-2013
20130174158METHODS AND SYSTEMS FOR PROVISIONING A VIRTUAL DISK TO DISKLESS VIRTUAL AND PHYSICAL MACHINES - Methods and systems are described for provisioning a common virtual disk to both a physical and a virtual computing machine. These methods and systems can include creating a virtual disk that has binding information for both a paravirtual network interface card and a physical network interface card so that, either a virtual machine having a paravirtual network interface card, or a physical machine having a physical network interface card, may boot from the created virtual disk. Creation of the virtual disk can include exposing the paravirtual network interface card to a physical machine so that an installer program may bind to both the paravirtual network interface card and the physical network interface card.07-04-2013
20130174156Measuring Transaction Performance Across Application Asynchronous Flows - A mechanism modifies a deployment descriptor of each application component including at least one producer application component or consumer application component, by adding, for each producer application component or consumer application component, an application component identifier, a producer or consumer type, and a recipient identifier of a recipient the application component uses. Responsive to determining a match exists and the given application component is of producer type, the application server virtual machine logs an identifier of a recipient containing a message sent by the given application component, a correlation identifier of the given application component, and an execution start time. Responsive to determining a match exists and the given application component is of consumer type, the application server virtual machine logs an identifier of the recipient resource containing a message processed by the given application component, a correlation identifier of the given application component, and an execution end time.07-04-2013
20130174155VIRTUALIZATION PROCESSING METHOD AND APPARATUSES, AND COMPUTER SYSTEM - A virtualization processing method and apparatuses, and a computer system are provided. Where a computing node includes: a hardware layer, a Host running on the hardware layer, and at least one virtual machine (VM) running on the Host, the hardware layer includes an I/O device, several corresponding virtual function (VF) devices are virtualized from the I/O device, the Host has several VF software instances, the several VF software instances and the several VF devices are in one-to-one correspondence; the Host further has a back-end instance (BE) of an I/O virtual device having the same type with the I/O device, the VM has a front-end instance (FE) of the I/O virtual device; the BE in the Host is bound with an idle VF software instance. The solutions of the embodiments of the present invention are beneficial to optimization of the performance and compatibility of a virtualization system.07-04-2013
20130174154Java Virtual Machine Embedded in a Native Mobile Application - A native application built for a mobile device can embed non-native JAVA code that may be executed by a JAVA virtual machine also embedded as a library within the native application. Enterprise applications may be extended for use by mobile devices. Business logic for an application may be constructed just once and then used in both enterprise applications and mobile device applications.07-04-2013
20130174153PLAYBACK APPARATUS AND PLAYBACK METHOD - A playback apparatus includes a storage unit and a processor. The storage unit stores therein, for each of a plurality of playback environments, information indicating suitability for playback of a content in association with an identifier of the content. The processor receives a content via a network. The processor selects a playback environment based on an identifier of the received content and the information stored in the storage unit. The processor starts a first virtual machine that includes the selected playback environment. The first virtual machine is one of a plurality of virtual machines each including a playback environment. The playback environments included in the plurality of virtual machines are different from one another. The processor requests the first virtual machine to play back the received content.07-04-2013
20130174152METHOD, APPARATUS, AND SYSTEM FOR VIRTUAL CLUSTER INTEGRATION - Embodiments of the present invention relate to a virtual machine integration technology, and in particular, to a method, an apparatus, and a system for virtual cluster integration. The method includes: performing a calculation through a search algorithm to obtain the minimum number of physical machines which are capable of accommodating all virtual machines in a virtual cluster, and obtaining all virtual integration solutions satisfying the minimum number of physical machines; then calculating CPU voltage consumption of each virtual integration solution, and selecting a solution with lowest CPU voltage consumption from these virtual integration solutions; and formulating a virtual integration migration policy according to the virtual integration solution with the lowest CPU voltage consumption. Therefore, through the embodiments of the present invention, a virtual integration solution with lower CPU voltage energy consumption can be obtained, thereby greatly improving an energy saving and emission reduction effect of a virtual cluster integration solution.07-04-2013
20130174151INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING VIRTUAL MACHINE - According to one embodiment, an apparatus includes a controller. The controller is configured to control an operation environment of a virtual machine which runs on a hypervisor. The controller includes a change module configured to change the virtual machine from an operating state to a sleep state, in response to a logout request for an operating system in the virtual machine, a storing module configured to store first image data indicating contents of a memory in a storage as an operation environment, a restoration module configured to restore the contents of the memory to contents based on second image data, and a return module configured to return the virtual machine to the operating state after the contents of the memory is restored to the contents based on the second image data.07-04-2013
20130174150INFORMATION PROCESSING APPARATUS AND COMMUNICATION CONTROL METHOD - According to one embodiment, an apparatus is configured to carry out a 1st virtual machine and a 2nd virtual machine. The 1st virtual machine includes a notifying module configured to notify a 1st port number to the 2nd virtual machine, and a 1st transmitter configured to transmit, to a network, a 1st packet including a source port number indicating port number other than the 1st port number. The 2nd virtual machine includes a 2nd transmitter configured to transmit, to the network, a 2nd packet including a source port number indicating the 1st port number. The apparatus includes a sorting module configured to sort a received packet to the 1st virtual machine or the 2nd virtual machine.07-04-2013
20130174145VIRTUAL RESOURCES MANAGEMENT METHODS - A virtual resources management method for a plurality of physical machines, includes: obtaining temperature values for the physical machines respectively; determining whether the temperature value exceeds a threshold value; categorizing the physical machines having temperature values exceeding the threshold value as an overheating group; selecting one of the physical machines as a candidate physical machine; determining whether the candidate physical machine belongs to the overheating group, wherein the virtual machine is assigned to the candidate physical machine when the candidate physical machine does not belong to the overheating group, and the virtual machine is assigned to one of the physical machines other than the candidate physical machine when the candidate physical machine belongs to the overheating group; and performing the virtual machine by the physical machine that is assigned the virtual machine.07-04-2013
20130174148ENHANCING INTERRUPT HANDLING IN A VIRTUAL ENVIRONMENT - Systems and methods for enhancing the handling of interrupts in a virtual computing environment are disclosed. A CPU is configured such that the CPU, when in a virtual machine (VM) mode, directs an interrupt to a VM. When in the VM context, a guest in the VM is run with a hypervisor interrupt descriptor table (hypervisor IDT) to determine how the interrupt should be handled. The hypervisor IDT directs an interrupt that is to be handled by the VM to an interrupt handler in a guest IDT without causing a transition to the hypervisor. If an interrupt is to be handled by the hypervisor, the hypervisor IDT causes a transition to the hypervisor.07-04-2013
20130174149DYNAMICALLY SCALING MULTI-TIER APPLICATIONS IN A CLOUD ENVIRONMENT - A predicted workload of a multi-tier application is determined for a defined period of time. A change in application capacity is determined for the predicted workload. A scaling strategy is dynamically selected for the change in application capacity, in which the scaling strategy including vertical scaling and horizontal scaling.07-04-2013
20130174144HARDWARE BASED VIRTUALIZATION SYSTEM - A method for changing between virtual machines on a graphics processing unit (GPU) includes requesting to switch from a first virtual machine (VM) with a first global context to a second VM with a second global context; stopping taking of new commands in the first VM; saving the first global context; and switching out of the first VM.07-04-2013
20100325628INFORMATION PROCESSING DEVICE - A terminal having a plurality of virtual machines in one-to-one correspondence with a plurality of stakeholders is enabled to activate in compliance with the trust dependency relation among the virtual machines and a virtual machine monitor. The terminal includes: the plurality of virtual machines in one-to-one correspondence with the plurality of stakeholders; a plurality of tamper-resistant modules in one-to-one correspondence with the virtual machines, and a management unit controlling the virtual machines and the tamper-resistant modules in mutually related manner. Each virtual machine securely boots with reference to a certificate having a trust dependency with one or other virtual machines.12-23-2010
20080301675System and Method for Graphics Remapping in Hypervisor - A hypervisor operating system instantiates a virtual video driver to a main operating system that supports only one type of graphics adapter. The virtual driver handles graphics remapping among plural different display drivers associated with plural different display monitors to enable a computer to output data on multiple different monitors even though the main O.S. supports only one type of display driver.12-04-2008
20080301676Method for Delivering, Testing, and Applying Software Patches or Other Changes to a Conventionally Installed Application in Virtual Application Containers - A method for updating an application on a host system includes steps or acts of: installing an application on the host system; installing a virtual machine monitor on the host system, installing a first virtual container on the host system, wherein the first virtual container comprises at least one update to the installed application; and instantiating the first virtual container under the virtual machine monitor in a mode wherein the host system can be accessed but not modified and wherein instantiating the first virtual container includes updating the installed application in the first virtual computer and running the updated application in the first virtual container. The method may also include a step of confirming that the updated application runs properly. Optionally, the virtual container may be devirtualized. A system for updating an application on a host system includes: at least one virtual machine monitor, at least one virtual container; at least one application; at least one update to the application contained within the at least one virtual container; and a processor configured for carrying out the above method steps. The system may also include an input multiplexer configured for mediating access to the at least one virtual container; and an output analyzer configured for confirming that the updated application performed as expected in at least one virtual container.12-04-2008
20080301674SYSTEMS AND METHODS FOR VIRTUAL DEPLOYMENT - An embodiment relates generally to a method of providing computer services. The method includes receiving at least one user-specified requirements for a computer system instantiation and developing a configuration file base on the at least one user-specified requirements. The method also includes instantiating a virtual machine based on the configuration file and providing the virtual machine as the instantiation of the computer system for remote access.12-04-2008
20090133018VIRTUAL MACHINE SERVER SIZING APPARATUS, VIRTUAL MACHINE SERVER SIZING METHOD, AND VIRTUAL MACHINE SERVER SIZING PROGRAM - It is an object to improve accuracy of estimation of CPU load by calculating the CPU load necessary for performing I/O emulation under the virtualized environment based on disk load and/or network load. In case of estimating CPU load of a server X which operates servers 05-21-2009
20120266161Mechanism For Host Machine Level Template Caching In Virtualization Environments - A computing device receives a command to start a virtual machine, the virtual machine having a read-only layer and a copy-on-write (COW) layer. The computing device accesses the COW layer of the virtual machine from a network storage. The computing device determines whether the read-only layer of the virtual machine is cached in a local storage. Upon determining that the read-only layer of the virtual machine is cached in the local storage, the computing device starts the virtual machine based on a combination of the downloaded COW layer and the cached read-only layer of the virtual machine.10-18-2012
20120266160DISTRIBUTING DATA VIA A NETWORK INCLUDING TIMING INFORMATION - A method and apparatus for timely delivery of classes and objects is provided. A header comprising timing information is attached to said classes and/or objects. A “start loading” time and a “load by” time are specified in the header. Other classes and/or objects to be loaded are also specified in the header. Optional compression, security, and/or error resilience schemes are also specified in the header. A process for creating the header and attaching it to a class or object is provided. A process for receiving and processing a class or object with an attached header is provided. Embodiments of the invention allow timely delivery of classes and/or objects over a wide variety of transport mechanisms, including unreliable transport mechanisms and those lacking any guarantees of timely delivery.10-18-2012
20120266173MANAGING ASSIGNMENT OF PARTITION SERVICES TO VIRTUAL INPUT/OUTPUT ADAPTERS - Automated management of partition service assignment to a virtual input/output (VIO) adapter is provided. Responsive to creation of a new partition service in a data processing system, a partition priority number is determined for the new partition service, and, for each VIO adapter, the partition priority numbers of the partition services currently assigned to that VIO adapter are summed. For a VIO adapter with a lowest sum of partition priority numbers, logic determines whether assigning the new partition service to that VIO adapter results in its summed partition priority number being above a predefined threshold, and the new partition service is assigned to a VIO adapter based, at least in part, on whether assigning the new partition service to the VIO adapter with the lowest sum of partition priority numbers results in that VIO adapter's summed partition priority number exceeding the predefined threshold.10-18-2012
20120266172APPARATUS AND METHOD FOR CONTROLLING A VIRTUAL MACHINE - The present disclosure relates to an apparatus for controlling a virtual machine in a device. The apparatus comprises a virtualization requesting part and a controlling part. The virtualization requesting part is configured to transmit a first instruction word for controlling the virtual machine to an independent virtualization apparatus. The controlling part is configured to execute an operation corresponding to a second instruction word received from the virtualization apparatus.10-18-2012
20110004878METHODS AND SYSTEMS FOR SELECTING A DESKTOP EXECUTION LOCATION - Described are methods and systems for dynamically determining to execute a virtual machine on one of a local computing machine and a remote computing machine. A system can include a local computing machine, a remote computing machine and an execution manager that executes on a processor. The execution manager can obtain the characteristics of a local computing machine, and of a network between the local computing machine and the remote computing machine. The execution manager can then apply a policy to the local computing machine characteristics and the network characteristics to determine whether to execute a virtual machine on the local computing machine or the remote computing machine. Responsive to applying this policy, the execution manager can forward an execution instruction to one of either a hypervisor executing on the local computing machine and the remote computing machine, to execute the virtual machine.01-06-2011
20110004877Maintaining Virtual Machines in a Network Device - Network devices include hosted virtual machines and virtual machine applications. Hosted virtual machines and their applications implement additional functions and services in network devices. Network devices include data taps for directing network traffic to hosted virtual machines and allowing hosted virtual machines to inject network traffic. Network devices include unidirectional data flow specifications, referred to as hyperswitches. Each hyperswitch is associated with a hosted virtual machine and receives network traffic received by the network device from a single direction. Each hyperswitch processes network traffic according to rules and rule criteria. A hosted virtual machine can be associated with multiple hyperswitches, thereby independently specifying the data flow of network traffic to and from the hosted virtual machine from multiple networks. The network device architecture also enables the communication of additional information between the network device and one or more virtual machine applications using an extended non-standard network protocol.01-06-2011
20110004876Network Traffic Processing Pipeline for Virtual Machines in a Network Device - Network devices include hosted virtual machines and virtual machine applications. Hosted virtual machines and their applications implement additional functions and services in network devices. Network devices include data taps for directing network traffic to hosted virtual machines and allowing hosted virtual machines to inject network traffic. Network devices include unidirectional data flow specifications, referred to as hyperswitches. Each hyperswitch is associated with a hosted virtual machine and receives network traffic received by the network device from a single direction. Each hyperswitch processes network traffic according to rules and rule criteria. A hosted virtual machine can be associated with multiple hyperswitches, thereby independently specifying the data flow of network traffic to and from the hosted virtual machine from multiple networks. The network device architecture also enables the communication of additional information between the network device and one or more virtual machine applications using an extended non-standard network protocol.01-06-2011
20110131575RECORDING/REPRODUCING APPARATUS - A recording/reproducing apparatus, for producing a virtual disc independent upon a host PC, and for managing virtual discs with an easy operation, comprises a CPU 06-02-2011
20110131571Mechanism for Shared Memory History Optimization in a Host Selection Algorithm for Virtual Machine Placement - A mechanism for shared memory history optimization in a host selection algorithm for VM placement is disclosed. A method of embodiments of the invention includes determining candidate hosts to place a target virtual machine (VM), obtaining memory sharing history of the target VM with one or more VMs hosted by each of the candidate hosts, determining an average memory sharing history amount for each of an optimized number of the candidate hosts based on the obtained memory sharing history of the target VM with one or more VMs hosted by each of the optimized number of candidate hosts, and adjusting a score in a general selection algorithm for a candidate host with the highest average memory sharing history amount.06-02-2011
20110131570Mechanism for Target Host Optimization in a Load Balancing Host and Virtual Machine (VM) Selection Algorithm - A mechanism for target host optimization in a load balancing host and virtual machine (VM) selection algorithm is disclosed. A method of embodiments of the invention includes determining that one or more collected metrics have triggered a load balancing operation of a host controller machine, identifying a plurality of source host machines and a plurality of virtual machines (VMs) hosted by the plurality of source host machines as candidates for selection by the load balancing operation for migration, and adjusting a selection score for at least one of a candidate source host machine and a candidate VM based on one or more metrics of the candidate source host and of the candidate VM, wherein the one or more metrics are associated with one or more candidate target host machines to which a candidate VM could be migrated.06-02-2011
20110131568Mechanism for Live Migration of Virtual Machines with Memory Optimizations - A mechanism for live migration of virtual machines (VMs) with memory optimizations is disclosed. A method of embodiments of the invention includes receiving a hash value for each of one or more memory pages of a migrating VM from a source host machine, obtaining a hash value for each of one or more memory pages hosted by a target host machine, and comparing the received hash values with the obtained hash values for matches. The method further comprises for each of the received hash values that do not match any of the obtained hash values, sending a negative acknowledgment to the source host machine for that hash value, and for each of the received hash values that do match any of the obtained hash values, using a memory page associated with the matching hash value at the target host machine for the migrating VM.06-02-2011
20120240118TERMINAL AND COMPUTER FOR OPERATION WITH AN ASSEMBLY FOR VIRTUAL DATA PROCESSING, ASSEMBLY AND METHOD FOR VIRTUAL DATA PROCESSING - A terminal for operation with an assembly for virtual data processing includes a controller, an adaptation unit coupled to the controller, a virtualization interface linked to the controller which accesses data processing resources, a display coupled to the virtualization interface via the adaptation unit which displays information, a communication unit coupled to the controller and to the virtualization interface, and an energy supply coupled to the controller which provides energy to operate the terminal, wherein the controller, the energy supply, the adaptation unit, the virtualization interface and the communication unit are integrated in a housing of the display.09-20-2012
20120240117Virtual Machine Management Among Networked Servers - Virtual machine management among networked servers coupled for data communications with a data communications network that includes a network device and a Virtual Machine Management Module (‘VMMM’), where VM management includes: monitoring, by the network device, network traffic of applications executing in virtual machines of the servers; determining, in dependence upon the monitored network traffic, whether a particular application's network traffic exceeds a predetermined threshold, the particular application executing in a particular virtual machine of a particular server; if the particular application's network traffic exceeds the predetermined threshold, allocating, by the VMMM, an additional virtual machine in a different server; and instantiating, by the VMMM, in the additional virtual machine at least one application.09-20-2012
20120240116Performance In A Virtualization Architecture With A Processor Abstraction Layer - Embodiments of apparatuses and methods for improving performance in a virtualization architecture are disclosed. In one embodiment, an apparatus includes a processor and a processor abstraction layer. The processor abstraction layer includes instructions that, when executed by the processor, support techniques to improve the performance of the apparatus in a virtualization architecture.09-20-2012
20120240115HARDWARE CHARACTERIZATION IN VIRTUAL ENVIRONMENTS - A method for hardware characterization in a virtual environment is provided in the illustrative embodiments. The hardware resource is allocated to a test virtual machine (VM). A characterization workload is configured to execute in the test VM to characterize a parameter of the hardware resource. The characterization workload is caused to execute on the test VM. A first result of the characterization workload execution is received from the test VM, wherein the result assigns a value to a characteristic of the hardware resource indicative of a behavior of the hardware resource under a set of circumstances.09-20-2012
20120240114Method and System for Managing Virtual and Real Machines - Managing virtual and real machines through a provisioning system. The provisioning system allows a user to create and manage machines through a “self-service” approach. The provisioning system interacts with one or more agents that manage the lifecycle of a machine. The system may provide templates that enable a user to readily create a virtual machine. The system may also include interfaces for administrators to manage virtual and real machine resources.09-20-2012
20120240113CONTROLLING AND SELECTING CLOUD CENTER - Provided are apparatus and method for managing a plurality of cloud centers that provide a virtual computing environment to a client. The method may include selecting a target cloud center from the plurality of cloud centers based on electricity costs and carbon emission costs of the plurality of cloud centers, and controlling the selected target cloud center so as to manage at least one virtual machine to provide the virtual computing environment to the client. For the selecting the target cloud center, a cloud center having a lowest electric cost and a lowest carbon emission cost may be selected from the plurality of cloud center as the target cloud center. Then, the selected target cloud center may be controlled so as to create a virtual machine.09-20-2012
20120240111STORAGE MEDIUM STORING PROGRAM FOR CONTROLLING VIRTUAL MACHINE, COMPUTING MACHINE, AND METHOD FOR CONTROLLING VIRTUAL MACHINE - A computer executes processes of: setting the upper limit of an available processing capacity for each user; setting a plurality of virtual machines for each of the users; and distributing the processing capacity to the plurality of virtual machines for each of the users within the upper limit of the processing capacity set for each of the users.09-20-2012
20120240110OPTIMIZED DEPLOYMENT AND REPLICATION OF VIRTUAL MACHINES - Systems and methods for deploying a virtual machine (VM) on a host are provided. An exemplary method comprises notifying a host to download a master copy of a VM image from a remotely located network storage device, in response to a service provider providing a definition manifest for a service request supported by the VM, wherein the host deploys the VM directly from the VM image downloaded to a storage medium locally connected to the host machine, wherein deployment of the VM allows the host to locally service the service request associated with the definition manifest, wherein the host replicates copies of the VM image, in response to receiving additional service requests to create one or more VM clones; wherein the host customizes the one or more VM clones based on the definition manifest.09-20-2012
20120266167Tenant Data Center for Establishing a Virtual Machine in a Cloud Environment - Apparatuses, computer readable media, methods, and systems are described for generating a first measurement of a virtualization platform, receiving a create measured virtual machine request comprising authentication information, in response to the request, creating a measured virtual machine based on the authentication information, generating a second measurement of the measured virtual machine, and communicating a quote generated based on the first measurement and the second measurement for attesting to authenticity of the virtualization platform and of the measured virtual machine.10-18-2012
20120266166HOST SELECTION FOR VIRTUAL MACHINE PLACEMENT - In one embodiment, a method for placing virtual machines in a collection is provided. A plurality of equivalence sets of hosts is determined prior to placing virtual machines in the collection. The hosts in an equivalence set of hosts are considered similar. An equivalence set of hosts in the plurality of equivalence sets is selected to place the virtual machines in the collection. The method then places at least a portion of the virtual machines in the collection on one or more hosts in the selected equivalence set of hosts.10-18-2012
20120266164DETERMINING STARTING VALUES FOR VIRTUAL MACHINE ATTRIBUTES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for determining starting values of attributes for a requested virtual machine. Specifically, in a typical embodiment, a request for a virtual machine is received from a requester. An image corresponding to the virtual machine is then obtained. A set of statistics pertaining to at least one previous operation of a related virtual machine is analyzed and used to recommend starting values for a set of attributes of the virtual machine (e.g., a processor speed, a memory capacity, a disk capacity, a network capacity, etc.). The starting values can be determined by selecting a graphical curve, which depicts attribute values versus time, pertaining to a particular attribute and then providing recommended the starting values for the attribute based on a position along the graphical curve as determined based upon the analysis of the set of statistics. Thereafter, an instance of the virtual machine that has the starting values can be generated based on the image.10-18-2012
20120266171APPARATUS AND METHOD FOR CARRYING OUT A MIGRATION PROCESS OF A VIRTUAL MACHINE IN A DEVICE - A device carries out virtualization technology. An apparatus and a method in which an operating system or a program migrates a virtual machine during implementing in the device to a different type of device. The apparatus for migrating the virtual machine in the device may comprise an input unit for requesting the migration of the virtual machine, a display for displaying the migration process of the virtual machine, a virtualization processing unit for creating the virtual machine to run an application corresponding to a plural of operating system and for collecting the data related to the application run through the virtual machine and a controller for transmitting the data related to the application run through the virtual machine to a peripheral device using a different instruction set architecture.10-18-2012
20120266170Virtual Machine Image Management System and Methods - A computer-implemented method for managing virtual machine information in a cloud computing environment includes receiving, at a web server, an indication from a user to import an image of a virtual machine to a cloud in the cloud computing environment. The image may be uploaded to storage isolated to the user. At least one descriptor in the image may be parsed in a computer process to identify information (e.g., image meta-data) associated with an infrastructure service to be provided to the user. An infrastructure service item may be created in a computer process, corresponding to an instance of the infrastructure service. The service item is created based on the information identified by the parsing, e.g., by storing the image meta-data. The infrastructure service item may be inserted into an infrastructure service catalog of the user.10-18-2012
20120266169SYSTEM AND METHOD FOR CREATING OR RECONFIGURING A VIRTUAL SERVER IMAGE FOR CLOUD DEPLOYMENT - A system and method to convert a software application, such as a Java application into a virtual server image that is suitable for cloud deployment. In accordance with an embodiment, the system and method allows for building a hypervisor appliance containing a virtual machine running an application. In particular, the hypervisor appliance can be compatible with any hypervisor for server virtualization and the application virtual machine can be a Java Virtual Machine (JVM).10-18-2012
20120324451VIRTUALIZATION PLANNING SYSTEM - The embodiments related to systems and methods for virtualization planning. A set of target machines may employ one or more virtualization technologies to divide resources of the given target computer system into multiple execution environments for virtual machines. Overhead profiles are determined based on a configuration of a given target computer system, the virtualization technology, and work performed by the virtual machines. The overhead consumed by the virtualization technologies is estimated for the proposed allocation of virtual machines. Performance of the proposed allocation of virtual machines is then modeled and various performance measures are provided.12-20-2012
20120324452HIGH AVAILABILITY SYSTEM AND EXECUTION STATE CONTROL METHOD - A high availability system includes a first computer on which a first virtual computer and a first hypervisor managing the first virtual computer operate, and a second computer on which a second virtual computer and a second hypervisor managing the second virtual computer operate. The first hypervisor includes an acquisition unit which acquires synchronization information associated with an event, wherein the event has occurred in the first virtual computer and accompanies an input to the first virtual computer, and a transmission unit which transmits the acquired synchronization information to the second hypervisor. The second hypervisor includes a reception unit which receives the synchronization information from the first hypervisor, and a control unit which performs control to match an input to the second virtual computer with an input to the first virtual computer in accordance with the received synchronization information.12-20-2012
20120324450COMPUTER SYSTEM, VIRTUAL COMPUTER SYSTEM, COMPUTER ACTIVATION MANAGEMENT METHOD AND VIRTUAL COMPUTER ACTIVATION MANAGEMENT METHOD - A virtualization mechanism in a first computer of the plurality of computers generates at least one virtual computer on the first computer. The virtualization mechanism in the first computer executes at least one of a first judgment and a second judgment when a request for activating a first virtual computer of the at least one virtual computer is received, the first judgment being for judging whether or not the activation of the first virtual computer is prohibited based on first information stored in a memory of the virtualization mechanism, and the second judgment being for judging whether or not an identifier included in a logic I/O adapter device assigned to the first virtual computer is invalid based on second information stored in the memory of the virtualization mechanism. The activation of the first virtual computer is permitted or prohibited based on the executed judgment.12-20-2012
20120324449SOFTWARE VIRTUAL MACHINE FOR DATA INGESTION - In general, this disclosure is directed to a software virtual machine that provides high-performance transactional data acceleration optimized for multi-core computing platforms. The virtual machine utilizes an underlying parallelization engine that seeks to maximize the efficiencies of multi-core computing platforms to provide a highly scalable, high performance (lowest latency), virtual machine. In some embodiments, the virtual machine may be viewed as an in-memory virtual machine with an ability in its operational state to self organize and self seek, in real time, available memory work boundaries to automatically optimize maximum available throughput for data processing acceleration and content delivery of massive amounts of data.12-20-2012
20120324448SOFTWARE VIRTUAL MACHINE FOR CONTENT DELIVERY - In general, this disclosure is directed to a software virtual machine that provides high-performance transactional data acceleration optimized for multi-core computing platforms. The virtual machine utilizes an underlying parallelization engine that seeks to maximize the efficiencies of multi-core computing platforms to provide a highly scalable, high performance (lowest latency), virtual machine. In some embodiments, the virtual machine may be viewed as an in-memory virtual machine with an ability in its operational state to self organize and self seek, in real time, available memory work boundaries to automatically optimize maximum available throughput for data processing acceleration and content delivery of massive amounts of data.12-20-2012
20120324447SOFTWARE VIRTUAL MACHINE FOR ACCELERATION OF TRANSACTIONAL DATA PROCESSING - In general, this disclosure is directed to a software virtual machine that provides high-performance transactional data acceleration optimized for multi-core computing platforms. The virtual machine utilizes an underlying parallelization engine that seeks to maximize the efficiencies of multi-core computing platforms to provide a highly scalable, high performance (lowest latency), virtual machine. In some embodiments, the virtual machine may be viewed as an in-memory virtual machine with an ability in its operational state to self organize and self seek, in real time, available memory work boundaries to automatically optimize maximum available throughput for data processing acceleration and content delivery of massive amounts of data.12-20-2012
20120324446VIRTUAL MACHINE IMAGE COMPOSITION AND SIGNING - Techniques are described for composing virtual machine images, generating signatures thereof, and verifying virtual machine images. A virtual machine image may be generated by installing or inserting software to a base virtual machine image. A signature may be computed using hash values of blocks of the base virtual machine image; blocks of the base image that are unchanged need not be hashed to generate the signature. A copy of the new virtual machine image can be verified at a computer hosting virtual machines by computing hashes only for modified or new blocks (relative to the base image). Block verification can take place in the background when a virtual machine starts; all of the blocks are verified (hashed and compared) in some order, and at the same time, unverified blocks are verified on demand as needed by the virtual machine.12-20-2012
20120324445IDENTIFICATION OF OVER-CONSTRAINED VIRTUAL MACHINES - A method for virtual machine management that includes establishing a first virtual machine on a hardware platform, performing a selected task on the first virtual machine and recording a first data set indicating a characteristic of the first virtual machine performing the selected task. The method also includes establishing a second virtual machine on the hardware platform, performing the selected task on the first and second virtual machines, recording a second data set indicating the characteristic of the first and second virtual machines performing the selected task and indicating acceptable data and unacceptable data within the first and second data sets. The method also includes creating and training a decision tree based on the acceptable and unacceptable data from the first and second data sets and inputting a third data set from a third virtual machine into the decision tree to determine if the third virtual machine is over-constrained.12-20-2012
20120331464VIRTUAL MACHINE SYSTEM AND VIRTUAL MACHINE SYSTEM CONTROL METHOD - A virtual machine system is provided with a processor having only two privileged modes, a low privileged mode and a high privileged mode, and achieves both a security function for protecting digital copyrighted works or the like and an operating system switching function that guarantees system reliability. The virtual machine system is provided with a first and a second processor and executes a hypervisor on the first processor in the high privileged mode. An operating system on the second processor is executed by cooperation between the hypervisor running on the first processor and a program running on the second processor in low privileged mode. This eliminates the need for running the hypervisor on the second processor in the high privileged mode, thus allowing for execution on the second processor in the high privileged mode of a program for implementing the security function.12-27-2012
20120331468DYNAMICALLY PROVISIONING VIRTUAL MACHINES - Virtual machines are managed on the basis of data obtained from a management information database of a network switch having a plurality of Ethernet links coupled to compute nodes running a plurality of virtual machines. A management entity, such as a provisioning manager, determines the amount of network bandwidth being utilized through each of the Ethernet links. Accordingly, an additional virtual machine may be provisioned to the compute node that is coupled to an Ethernet link identified as having the greatest amount of unutilized network bandwidth.12-27-2012
20120331467Delivering Interrupts Directly To A Virtual Processor - Embodiments of apparatuses, methods, and systems for delivering an interrupt to a virtual processor are disclosed. In one embodiment, an apparatus includes an interface to receive an interrupt request, delivery logic, and exit logic. The delivery logic is to determine, based on an attribute of the interrupt request, whether the interrupt request is to be delivered to the virtual processor. The exit logic is to transfer control to a host if the delivery logic determines that the interrupt request is not to be delivered to the virtual processor.12-27-2012
20120331465VIRTUAL MACHINE SYSTEM, VIRTUAL MACHINE CONTROL METHOD, VIRTUAL MACHINE CONTROL APPLICATION, AND SEMICONDUCTOR INTEGRATED CIRCUIT - A memory protection unit controls access by virtual machines to memory areas. By having a hypervisor executed by a processor and the memory protection unit cooperate, access to memory areas by each virtual machine is controlled such that access to designated areas is forbidden. Accordingly, each virtual machine is unable to access programs, data, and so on stored in areas forbidden thereto.12-27-2012
20120272239SHARING CLASS DATA - This docucment descirbes techniques for sharing Java class information in virtualized computing environments. In some embodimetns, an apparatus includes hardware components including one or more central processing units and main memory, wherein a portion of the main memory is configured to store shared Java classes. The apparatus can also include a hypervisor configured to control access to the hardware components, and to host a plurality of operating systems. Each of the operating systems can include a character device driver configured to write directly to the portion of main memory configured to store the shared Java classes. The apparatus can also include one or more Java virtual machines configured to execute the shared Java classes and modify the shared Java classes using the character device driver.10-25-2012
20120272236MECHANISM FOR HOST MACHINE LEVEL TEMPLATE CACHING IN VIRTUALIZATION ENVIRONMENTS - A computing device receives a command to start a virtual machine, the virtual machine having a read-only layer and a copy-on-write (COW) layer. The computing device accesses the COW layer of the virtual machine from a network storage. The computing device determines whether the read-only layer of the virtual machine is cached in a local storage. Upon determining that the read-only layer of the virtual machine is cached in the local storage, the computing device starts the virtual machine based on a combination of the downloaded COW layer and the cached read-only layer of the virtual machine.10-25-2012
20120272242PROVISIONING VIRTUAL SERVER - Provided are method and system for provisioning a virtual server. The method may include receiving a request to create a virtual server from a client, determining a client purpose of the requested virtual server, obtaining a previous virtual server usage pattern associated with the client, and creating a virtual server provision based on the client purpose and the previous virtual server pattern.10-25-2012
20110055830MECHANISM FOR REDUCING THE POWER CONSUMPTION OF VIRTUAL DESKTOP SERVERS - A mechanism for reducing the power consumption of virtual machine host servers is disclosed. A method for a virtual machine (VM) power reduction agent (PRA) hosted by a VM may include identifying a user activity associated with the VM, determining that the VM is inactive based on the user activity associated with the VM, and notifying a host of the VM that the VM is inactive to facilitate application of a power reduction policy to the VM based on specific power reduction settings associated with the VM.03-03-2011
20110055828Mechanism for Virtual Time Stamp Counter Acceleration - A mechanism for virtual time stamp counter acceleration is disclosed. A method of embodiments of the invention includes setting a virtual machine (VM) time stamp counter (TSC) to a hyper-fast rate, receiving control of the VM due to a VM exit caused by the VM issuing an instruction that reads the VM TSC, and adjusting the VM TSC with a value of an offset counter associated with the VM.03-03-2011
20120324443REDUCING DATA TRANSFER OVERHEAD DURING LIVE MIGRATION OF A VIRTUAL MACHINE - A computer-implemented method is provided for reducing network traffic associated with live migration. The method comprises selecting a virtual machine on a first physical host for migration to a second physical host, and providing each application running in the selected virtual machine with notification that the migration has started. In response to receiving the notification that the migration has started, each application reducing the number of memory pages in use during the migration. The selected virtual machine and each application is then migrated from the first physical host to the second physical host, wherein the migration of each application includes migration of the reduced number of memory pages. Non-limiting examples of methods that may be used to reduce the number of memory pages includes identifying memory that contains garbage, reducing the size of the heap, increasing the pause time used for garbage collection, deferring just-in-time compilation of hot methods, and releasing caches and buffers.12-20-2012
20120324442System and Method for an In-Server Virtual Switch - In accordance with an embodiment, a data processing system includes a processor, a memory, and an interface port configured to be coupled to a hardware network interface device. The processor is configured to run a process that maps network switching functions of each of a plurality of virtual machines to the hardware network interface device.12-20-2012
20110239216SERVICE PROVIDING SYSTEM, A VIRTUAL MACHINE SERVER, A SERVICE PROVIDING METHOD, AND A PROGRAM THEREOF - A service providing system has a virtual machine server and one or more client terminals. The virtual machine server has one or more virtual machines and a virtual machine system unit which controls the virtual machines. The virtual machine system unit classifies the client terminals into groups. Each of the virtual machines provides a service to each of the terminals in a group in response to receiving a request for the service from one of the client terminals in the group of terminals.09-29-2011
20110239214Mechanism for Utilizing a Virtual Machine Cloud for Automated Test System Deployment - A mechanism for utilizing a virtual machine cloud for automated test system deployment is disclosed. A method of embodiments of the invention includes selecting a master image used to initialize one or more virtual machines (VMs), providing a list of repository definitions and test packages to the one or more VMs, and receiving test results from executing the test packages on a computer system of the VM defined by the master image, wherein the computer system includes an operating system and one or more software applications.09-29-2011
20110239213VIRTUALIZATION INTERMEDIARY/VIRTUAL MACHINE GUEST OPERATING SYSTEM COLLABORATIVE SCSI PATH MANAGEMENT - A method of direct access by a virtual machine (VM) running on a host machine to physical storage via a virtual function (VF) running on an input/output (IO) adapter comprising: providing by a virtualization intermediary running on the host machine an indication of an active path associated with a virtual storage device; obtaining by a guest driver running within a guest operating system of the VM the stored indication of the active path from the shared memory region; dispatching an IO request by the guest driver to the VF that includes an indication of the active path; and sending by the VF an IO request that includes the indicated active path.09-29-2011
20120324441DECENTRALIZED MANAGEMENT OF VIRTUALIZED HOSTS - One or more embodiments of the present invention provide a technique for effectively managing virtualized computing systems with an unlimited number of hardware resources. Host systems included in a virtualized computer system are organized into a scalable, peer-to-peer (P2P) network in which host systems arrange themselves into a network overlay to communicate with one another. The network overlay enables the host systems to perform a variety of operations, which include dividing computing resources of the host systems among a plurality of virtual machines (VMs), load balancing VMs across the host systems, and performing an initial placement of a VM in one of the host systems.12-20-2012
20120278800Virtual Processor Allocation Techniques - In an exemplary embodiment, one or more virtual processors can be added or removed from a virtual machine based on CPU pressure measured within the virtual machine. In addition to the foregoing, other techniques are described in the detailed description, claims, and figures that form a part of this document.11-01-2012
20120278803Hardware Assisted Inter Hypervisor Partition Data Transfers - An invention is disclosed for effectuating direct memory access (DMA) transfers by a guest operating system of a child partition. A guest operating system is presented with virtualized resources rather than physical resources—e.g. a virtualized processor, virtualized memory, and a virtualized DMA controller. When the guest OS attempts to initiate a DMA transfer using the virtualized DMA controller, the child partition detects this, and directs the physical DMA controller to conduct the DMA transfer.11-01-2012
20120278807VIRTUAL NETWORK CONTROL PROGRAM, VIRTUAL NETWORK CONTROL METHOD AND INFORMATION PROCESSING APPARATUS - A virtual network control program includes allowing a physical port of a destination server device, which is a destination of a virtual machine to be transferred by migration, to use a virtual network used by the virtual machine to be transferred when the physical port of the destination server device does not belong to the virtual network; determining whether or not the virtual network, which has been used by the virtual machine in a source server device, is used by another virtual machine running on the source server device when the virtual machine to be transferred has been transferred onto the destination server device; and inhibiting, when it is determined that the another virtual machine does not use the virtual network, that a physical port of the source server device uses the virtual network which has been used by the virtual machine to be transferred.11-01-2012
20120278806DATA CONTROL SYSTEM FOR VIRTUAL ENVIRONMENT - Embodiments disclosed herein provide systems, methods, and computer readable media for controlling data in a virtual environment. In a particular embodiment, a method of operating a data control system comprises providing a file system interface to a virtual machine environment, wherein the virtual machine environment comprises a plurality of data volumes. The method further provides receiving a request to import a target data volume into the virtual machine environment and transferring the target data volume into the virtual machine environment.11-01-2012
20120278805DISPLAY APPARATUS HAVING VIRTUAL MACHINE AND METHOD OF CONTROLLING THE SAME - A display apparatus having a virtual machine includes a reception module configured to receive an application written in a specific programming language, a detector configured to detect a first data format included in the application, a translator configured to translate the detected first data format into a second data format capable of being processed by an enhanced virtual machine, the enhanced virtual machine configured to process the translated second data format, a video processor configured to translate the second data format processed by the enhanced virtual machine into outputtable data, and a display module configured to output the translated data.11-01-2012
20120278804VIRTUAL MACHINE AND APPLICATION MOVEMENT OVER A WIDE AREA NETWORK - Long distance cloud migration (LDCM) to overcome the limitations faced by the cloud migration techniques over long distance, high speed WAN infrastructures. LDCM overcomes the negative effects of existing TCP/IP mechanisms on the efficient use of available bandwidth. LDCM also acts as an acceleration engine to optimize various hypervisor, storage and security applications.11-01-2012
20120278801MAINTAINING HIGH AVAILABILITY OF A GROUP OF VIRTUAL MACHINES USING HEARTBEAT MESSAGES - Embodiments maintain high availability of software application instances in a fault domain. Subordinate hosts are monitored by a master host. The subordinate hosts publish heartbeats via a network and datastores. Based at least in part on the published heartbeats, the master host determines the status of each subordinate host, distinguishing between subordinate hosts that are entirely inoperative and subordinate hosts that are operative but partitioned (e.g., unreachable via the network). The master host may restart software application instances, such as virtual machines, that are executed by inoperative subordinate hosts or that cease executing on partitioned subordinate hosts.11-01-2012
20120278802SYSTEM AND METHOD FOR AUTOMATED VIRTUAL NETWORK CONFIGURATION - A method of automatically configuring a data network, the data network including a controller and a virtualization host with a hypervisor installed thereon, the method including creating a virtual switch in the hypervisor and communicatively coupling the virtual switch to a first physical network interface in the virtualization host. Further, the method includes receiving a request to boot an operating system image in a virtual machine in the hypervisor, the operating system image having network connectivity requirements. The method also includes creating a first virtual port in the virtual switch based upon the network connectivity requirements of the operating system image and creating a first virtual network adapter in the virtual machine in the hypervisor. Further, the method includes communicatively coupling the first virtual network adapter to the first virtual port in the virtual switch and configuring networking attributes of the first virtual network adapter in the virtual machine.11-01-2012
20120278799Virtual Disk Storage Techniques - In an exemplary embodiment, a virtual disk file can be assigned an identifier and a virtual disk files that is dependent on the virtual disk file can include a copy of the identifier. In the instance that the virtual disk file is opened and data is modified that causes the contents of a virtual disk extent to change the identifier can be changed. If the virtual disk file and the dependent virtual disk file are used to instantiate a virtual disk the difference between identifiers can be detected, which is indicative of the fact that the virtual disk may be corrupted. Other techniques are described in the detailed description, claims, and figures that form a part of this document.11-01-2012
20110252420CLOUD REFERENCE MODEL FRAMEWORK - A computing device implemented method, in one embodiment, can include a cloud transformation module transforming content for a compute platform. Additionally, the method can include a cloud control module receiving the content from the cloud transformation module. The method can also include the cloud control module provisioning a virtual machine appliance to form the compute platform. Furthermore, the method can include a cloud instantiation module executing the provisioning of the cloud control module. In addition, the method can include a cloud appliance module adding middleware to a virtual machine to create the virtual machine appliance. Moreover, the method can include a cloud virtualization module producing a virtualized representation of the compute platform.10-13-2011
20120089981METHOD AND SYSTEM FOR POWER MANAGEMENT IN A VIRTUAL MACHINE ENVIRONMENT WITHOUT DISRUPTING NETWORK CONNECTIVITY - A method for power management. The method includes gathering resource usage data for a first blade and a second blade on a blade chassis, migrating each virtual machine (VM) executing on the first blade to the second blade based on the resource usage data and a first migration policy, wherein the first migration policy defines when to condense the number of blades operating on the blade chassis, and powering down the first blade after each VM executing on the first blade is migrated from the first blade.04-12-2012
20120089980ALLOCATING VIRTUAL MACHINES ACCORDING TO USER-SPECIFIC VIRTUAL MACHINE METRICS - The performance monitoring system allocates virtual machines to users or user sessions according to a user categorization that is determine using user session information and virtual machine metrics. A session monitor of the performance monitoring system is notified that a user session terminated, where the user session accessed a virtual machine. The session monitor responsively records the user session information and obtains virtual machine metrics for the virtual machine from a virtual machine performance monitor. The performance monitoring system updates a user workload profile using the user session information and the virtual machine metrics, and categorizes the user of the user session according to the user workload profile. Upon receiving a request from a user for a virtual machine, a virtual desktop infrastructure requests a virtual machine from a virtual machine manager. The virtual machine manager responsively allocates a virtual machine to the user according to the user's categorization.04-12-2012
20120089979Performance Monitor Design for Counting Events Generated by Thread Groups - A number of hypervisor register fields are set to specify which processor cores are allowed to generate a number of performance events for a particular thread group. A plurality of threads for an application running in the computing environment to a plurality of thread groups are configured by a plurality of thread group fields in a plurality of control registers. A number of counter sets are allowed to count a number of thread group events originating from one of a shared resource and a shared cache are specified by a number of additional hypervisor register fields.04-12-2012
20120331466Secure Recursive Virtualization - A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM) or an operating system (OS) to a new domain. An initial program for the new domain is loaded into the portion of memory. Secure recursive virtualization firmware (SVF) in the data processing system is called to request that the new domain be generated. A determination is made as to whether the call is from a privileged domain or a non-privileged domain. Responsive to the request being from a privileged domain, all access to the new domain is removed from any other domain in the data processing system. Responsive to receiving an indication that the new domain has been generated, an execution of the initial program is scheduled.12-27-2012
20120331463METHOD FOR PROVIDING AN ON-DEMAND SOFTWARE EXECUTION SERVICE - A method for providing an on-demand software execution service comprising the following steps: receiving from at least one terminal, at least one request for executing at least one software package, by a virtual machine launched on a virtual machine launching server from files from a set of files for launching virtual machines, and selecting from a set of servers at least one server to which the request will be directed, according to a rule for distributing the execution load of virtual machines by servers of said set of servers.12-27-2012
20120331462SYSTEMS AND METHODS FOR DELETION OF UNTRACKED DATASTORE PATHS - In an embodiment, first and second lists of virtual machine datastore paths are obtained. The first list includes datastore paths on a datastore. The second list includes datastore paths that are associated with existing virtual machines. The first and second lists are compared and non-matching datastore paths are deleted from the datastore, thereby freeing up disk space on the datastore.12-27-2012
20110276965INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND ENCRYPTION INFORMATION MANAGEMENT METHOD - According to one embodiment, an encryption information management method for an information processing apparatus that includes a user virtual machine and a management virtual machine running at the same time is described. The method comprises the following operations by the management virtual machine: (i) receiving information for decrypting data, the data being encrypted using a cryptographic key from the user virtual machine; (ii) dividing the information for decrypting data into information blocks; (iii) constructing information items based on the information blocks, each of the information blocks being included in the information items in a multiplexed manner, each of the information items comprises two or more information blocks of the information blocks; (iv) transmitting the information items to management virtual machines in other information processing apparatuses that are communicatively coupled with the management virtual machine for storage; and (v) deleting the decrypting information in the management virtual machine.11-10-2011
20110276963Virtual Data Storage Devices and Applications Over Wide Area Networks - A virtualization system provides virtualized servers at a branch network location. Virtualized servers are implemented using virtual machine applications within the virtualization system. Data storage for the virtualized servers, including storage of the virtual machine files, is consolidated at a data center network location. The virtual disks of the virtualized servers are mapped to physical data storage at the data center and accessed via a WAN using storage block-based protocols. The virtualization system accesses a storage block cache at the branch network location that includes storage blocks prefetched based on knowledge about the virtualized servers. The virtualization system can include a virtual LAN directing network traffic between the WAN, the virtualized servers, and branch location clients. The virtualized servers, virtual LAN, and virtual disk mapping can be configured remotely via a management application. The management application may use templates to create multiple instances of common branch location configurations.11-10-2011
20110276962PARALLEL PROCESSING OF DATA - An untrusted application is received at a data center including one or more processing modules and providing a native processing environment. The untrusted application includes a data parallel pipeline. Secured processing environments are used to execute the untrusted application.11-10-2011
20120331461HOST ENABLED MANAGEMENT CHANNEL - A logical communication path is provided between a target virtual machine (VM) and a host or application communicating with the VM. The target VM runs on a hypervisor host that has a hypervisor and a proxy agent. The hypervisor manages execution of the VM. A mapping is maintained indicating which VMs execute on which hosts. When the host or application is to send a message or packet to the target VM, the mapping is consulted and the hypervisor host hosting the target VM is identified. The message or packet, which may identify the target VM, is transmitted to the hypervisor host. A proxy agent at the hypervisor host selects a communication channel between the hypervisor and the target VM. The hypervisor then passes the message or packet through the selected channel to the target VM.12-27-2012
20100229171MANAGEMENT COMPUTER, COMPUTER SYSTEM AND PHYSICAL RESOURCE ALLOCATION METHOD - A management computer to allocate a physical resource in a virtual system includes a section to create a physical source management table including physical resource managing data, a section to create an allocation policy table to manage allocation policies for physical resources, a section to create a configuration information management table to manage Logical PARtition (LPAR) configuration information, and a physical resource allocation judge section to select, based on these tables, an appropriate physical resource be allocated to an LPAR.09-09-2010
20100229170HOST COMPUTER, MULTIPATH SYSTEM, PATH ASSIGNMENT METHOD, AND PROGRAM PRODUCT - In a multipath system whereby a host computer having multiple logical partitions is connected to a system resource via multiple paths, and the multiple logical partitions share the system resource, I/O responsiveness is ensured even for the logical partition with less amount of I/O. A host computer of the present invention that is connected to the system resource via n (n>=2) number of paths includes multiple logical partitions that are accessible to the system resource and an assignment unit for assigning paths to the multiple logical partitions. The assignment unit assigns at least m (1<=m09-09-2010
20100229169Methods and Systems for Merging Virtualization Sublayers - A computer-implemented method may include identifying first and second sublayers of a virtualized application. The first and/or second virtualization sublayers may include a read-write sublayer, a read-only sublayer, a virtual-reset-point sublayer, and/or a patch sublayer. The computer-implemented method may also include merging an instance of the first virtualization sublayer with an instance of the second virtualization sublayer. Various other methods, systems, and computer-readable media are also disclosed.09-09-2010
20100229168DATA PROCESSING DEVICE, DATA PROCESSING METHOD, DATA PROCESSING PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - When notifying virtual machines of a change to shared data, it is impossible to realize power saving for the apparatus if always notifying a virtual machine in the power-saving state.09-09-2010
20120096462DYNAMIC VIRTUALIZATION TECHNIQUE FOR MULTICORE PROCESSOR SYSTEM - Disclosed is a method of allocating OS resources in a multicore processor system, including: setting a common operating system (OS) layer serving to process a common resource; setting a partitioned OS layer allocating one or more partitioned OSs to each of multiple cores; and reallocating the partitioned OSs allocated to the multiple cores in the partitioned OS layer on the basis of system resources required to drive each OS.04-19-2012
20110321045SYSTEM AND METHOD OF MANAGING VIRTUAL MACHINE, AND CONTROL APPARATUS, METHOD AND PROGRAM - A virtual machine management system includes an image capturing unit (12-29-2011
20110321044CLIENT HYPERVISOR-BASED TERMINAL DEVICE AND OPERATING METHOD THEREOF - A client hypervisor-based terminal device includes an advertisement module that provides an advertisement, an advertisement time controlling part that monitors a user time of a user module, and a client hypervisor part which operates the advertisement module based on a result of monitoring by the advertisement time controlling part. Accordingly, an advertisement is provided, satisfying both an advertiser and a user of the terminal device.12-29-2011
20110321043System, Method and Program Product for Native Interface Optimization of Read-Only Arrays - A computer-implemented process, system and program product for remote array processing receives a requested array in a remote execution container, generates a fingerprint of the requested array, bundles the fingerprint with the requested array and returns a pointer to array elements of the requested array to a caller. The computer-implemented process further receives a call to release the requested array from the caller to form a received release, determines, using the fingerprint, whether the requested array has been modified and responsive to a determination that the array has been modified, sending a call to release the requested array to a virtual machine and responsive to a determination that the array has not been modified, not sending a call to release the requested array to a virtual machine.12-29-2011
20110321042Methods and Systems to Permit Multiple Virtual Machines to Separately Configure and Access a Physical Device - Methods and systems to permit multiple virtual machines (VMs) to separately configure and access a physical resource, substantially outside of a virtual machine monitor (VMM) that hosts the VMs. Each of a plurality of virtual machines (VMs) may access and configure the physical device through corresponding instances of a device driver that exposes controllable functions of the physical device within the VMs. VM-specific configuration parameters and connection information may be maintained for each of the VMs, outside of a VMM, to reconfigure or virtualize the physical device for each of the VMs with the corresponding VM-specific configuration parameters and connection information. Physical device virtualization augmentation features may be implemented within a combination of a physical device controller and a host device driver that executes outside of the VM.12-29-2011
20110321040Systems and Methods for Sharing the Results of Analyses Among Virtual Machines - A computer-implemented method may include performing a first analysis on at least one file of a master virtual machine and inserting, into the master virtual machine, information that indicates at least one result of the first analysis. The computer-implemented method may also include maintaining at least one additional virtual machine that is based on the master virtual machine. The computer-implemented method may further include directing the additional virtual machine to reference the information in the master virtual machine instead of performing a second analysis on at least one file of the additional virtual machine. Various other systems, methods, and computer-readable media are also disclosed.12-29-2011
20110321039VIRTUAL NETWORK PACKET TRANSFER SIZE MANAGER - The method determines whether a particular virtual adapter of a virtual network IHS may perform enhanced packet communication transfer of larger sizes than those of physical network IHSs. The method registers each virtual adapter maximum receive unit (MRU) value in an MRU attribute table within a hypervisor virtual switch. The hypervisor virtual switch provides communication pathways for packet transfers between virtual network IHS virtual adapters and also between physical adapters. The method determines if a sending virtual adapter is sending a packet to a receiving virtual adapter that is local or a remote virtual trunk adapter. The method determines if the receiving virtual adapter exhibits a registered MRU value. If the receiving virtual adapter exhibits a registered MRU value, the method provides for larger sizes of packet transfers for those particular packets.12-29-2011
20120102492POWER SUPPLY AND CONTROL METHOD THEREOF - A power supply for feeding power to a computer comprises an instruction acquisition unit configured to acquire an identifier of a virtual machine and an instruction for the virtual machine, the virtual machine being run in emulation by a virtual host executed on the computer; and a virtual machine management unit configured to input an operation instruction for the virtual machine to the virtual machine on the basis of the acquisition by the instruction acquisition unit.04-26-2012
20120102491VIRTUAL FUNCTION BOOT IN SINGLE-ROOT AND MULTI-ROOT I/O VIRTUALIZATION ENVIRONMENTS - A method for virtual function boot in a system including a single-root I/O virtualization (SR-IOV) enabled server includes loading a PF driver of the PF of a storage adapter onto the server utilizing the virtual machine manager of the server; creating a plurality of virtual functions utilizing the PF driver, detecting each of the virtual functions on an interconnection bus, maintaining a boot list associated with the plurality of virtual functions, querying the storage adapter for the boot list utilizing a VMBIOS associated with the plurality of VMs, presenting the detected boot list to a VM boot manager of the VMM, and booting each of the plurality of virtual machines utilizing each of the virtual functions, wherein each VF of the plurality of VFs is assigned to a VM of the plurality of VMs via an interconnect passthrough between the VMM and the plurality of VMs.04-26-2012
20120102490RETAINING OWNERSHIP OF A VIRTUAL FUNCTION WHILE AN ADAPTER IS REPLACED - In an embodiment, a power off command is received that specifies a slot in a computer that connects to a first adapter. The first adapter comprises a physical and virtual functions. Data transfer from a logical partition to the virtual function is stopped, a lock of the virtual function held by the logical partition is released, and the slot is powered off. Ownership of the virtual function is retained by the logical partition while the lock is released and the slot is powered off. A power on command is received that specifies the slot that connects to a second adapter. The second adapter comprises the physical and virtual functions. In response to the power on command, the slot is powered on, and the lock is obtained of the virtual function for the logical partition.04-26-2012
20120102489ENTITLEMENT LIFECYCLE MANAGEMENT IN A RESOURCE MANAGEMENT SYSTEM - An entitlement management system is described herein that models each entitlement as a resource within a resource management system. In a resource management system that applies policy to all requests to create, update, and delete a resource, this approach allows rich application of policy to the creation, delegation, renewal, expiration, and deletion of entitlements. A resource management system that can synchronize data to connected systems can thereby grant or revoke these permissions in those systems. This approach also facilitates role mining, attestation, and compliance reporting. Entitlements stored as resources may also include properties, such as workflows and policies related to the entitlements. Thus, the entitlement management system provides a more formal and automated facility for managing entitlements in organizations.04-26-2012
20120102488PROFILING INPUT / OUTPUT OPERATIONS - Implementations of the present disclosure provide methods including executing a virtual machine configured to execute a plurality of applications and perform a plurality of I/O operations; storing meta information for a first I/O operation performed by the virtual machine in an I/O information holder for the virtual machine; receiving a request to begin an I/O profiling session on the virtual machine after storing the meta information; and reporting an I/O event record for a second I/O operation performed by the virtual machine using the meta information for the first I/O operation, wherein the second I/O operation is performed after beginning an I/O profiling session on the virtual machine.04-26-2012
20120291024Virtual Managed Network - According to one embodiment of the present disclosure, an approach is provided in which a policy module receives data that is initiated by a first virtual machine and has a destination at a second virtual machine. The policy module selects a policy that corresponds to sending the data from the first virtual machine to the second virtual machine. The policy includes one or more logical references to one or more virtual networks, and does not include a physical reference to a physical entity located on a physical network. In turn, the policy module encapsulates the data with a physical path translation that is based upon the selected policy, and sends the encapsulated data over the physical network to a second policy module that corresponds to the second virtual machine.11-15-2012
20120291030COMPLIANCE-BASED ADAPTATIONS IN MANAGED VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing.11-15-2012
20120291026METHOD FOR PROVIDING LOCATION INDEPENDENT DYNAMIC PORT MIRRORING ON DISTRIBUTED VIRTUAL SWITCHES - Techniques for providing location independent dynamic port mirroring on distributed virtual switches is disclosed. A controller is provided to configure one or more virtual switches within a group of physical machines to appear as a set of distributed virtual switches. In response to the receipt of a data packet at a port of a physical machine, a determination is made whether or not the port has a monitor port located on the physical machine. If the port has a monitor port located on the same physical machine, a copy of the data packet is sent to the monitor port of the physical machine. If the port has a monitor port located on a different physical machine, a copy of the data packet along with an identification (ID) of the port and an ID of the monitor port are encapsulated, and the encapsulated information are sent to a controller.11-15-2012
20120291029OPERATING VIRTUAL SWITCHES IN A VIRTUALIZED COMPUTING ENVIRONMENT - A technique for operating a virtual switch includes determining network connection requirements for virtual machines controlled by a virtual machine monitor. Resources available, for processing data traffic of the virtual machines, are also determined. Finally, based on the network connection requirements and the resources available, a port of a virtual switch is selected to operate as a virtual Ethernet bridge or a virtual Ethernet port aggregator.11-15-2012
20120291031METHOD AND DEVICE FOR LOCALIZING JAVA EDIT BOXES - A method and device for localizing Java edit boxes are provided. The method includes: when a user selects a Java edit box from a Java Platform 2 Micro Edition (J2ME) client interface, a Java virtual machine creates a local edit box for the Java edit box and presents the local edit box to the user; and the Java virtual machine replaces any new Java edit box which is selected by the user with the local edit box and presents the local edit box to the user. The number of the local input box controlled by the virtual machine is only one, therefore the technical solution solves the problem of localizing the Java edit box individually, localization can be realized more simply with the method of the disclosure compared to the method using multiple local edit boxes controls to implement the localization, and the user experience and feelings are also improved.11-15-2012
20120291025TECHNIQUES FOR OPERATING VIRTUAL SWITCHES IN A VIRTUALIZED COMPUTING ENVIRONMENT - A technique for operating a virtual switch includes determining network connection requirements for virtual machines controlled by a virtual machine monitor. Resources available, for processing data traffic of the virtual machines, are also determined. Finally, based on the network connection requirements and the resources available, a port of a virtual switch is selected to operate as a virtual Ethernet bridge or a virtual Ethernet port aggregator.11-15-2012
20100199277Processor Control Register Virtualization to Minimize Virtual Machine Exits - A processor includes a processor control register with a control flag that determines an operating mode of the processor. A pointer to a guest virtual machine context in a portion of a random access memory (RAM) is coupled to the processor. An execution control unit tests a first flag in the guest virtual machine context, the first flag to indicate whether the control flag is owned by a guest virtual machine associated with the guest virtual machine context. The execution control unit maintains the control flag in the processor control register if the control flag is owned by the guest virtual machine and maintains the control flag in a shadow location in the guest virtual machine context if the control flag is not owned by the guest virtual machine.08-05-2010
20100199276Methods and Systems for Dynamically Switching Between Communications Protocols - A method for dynamically switching between communications protocols used in communicating with each of a plurality of physical computing devices includes configuring, by a storage delivery management service, a storage system in a storage area network, to communicate, according to a first communications protocol with a first physical computing device executing a virtual machine, the storage system providing, to the virtual machine, access to a virtual storage resource. The storage delivery management service receives a request to migrate the virtual machine from the first physical computing device to a second physical computing device. The storage delivery management service configures the storage system to communicate with the second physical computing device according to a second communications protocol. The storage delivery management service transmits, to the second physical computing device, an identification of the storage system providing access to the virtual storage resource for the virtual machine.08-05-2010
20100199275SERVER SWITCH INTEGRATION IN A VIRTUALIZED SYSTEM - A switch, a system and operational method for packet switching between virtual machines running in a server and a network. The server comprises a switch with swappable, virtual ports. The switch routes packets to and from the various virtual machines resident in the server memory.08-05-2010
20130014101Offering Network Performance Guarantees in Multi-Tenant Datacenters - Methods of offering network performance guarantees in multi-tenant datacenters are described. In an embodiment, a request for resources received at a datacenter from a tenant comprises a number of virtual machines and a performance requirement, such as a bandwidth requirement, specified by the tenant. A network manager within the datacenter maps the request onto the datacenter topology and allocates virtual machines within the datacenter based on the available slots for virtual machines within the topology and such that the performance requirement is satisfied. Following allocation, stored residual capacity values for elements within the topology are updated according to the new allocation and this updated stored data is used in mapping subsequent requests onto the datacenter. The allocated virtual machines form part of a virtual network within the datacenter which is allocated in response to the request and two virtual network abstractions are described: virtual clusters and virtual oversubscribed clusters.01-10-2013
20130014104METHODS AND APPARATUS FOR PROVIDING HYPERVISOR LEVEL DATA SERVICES FOR SERVER VIRTUALIZATION - A hypervisor virtual server system, including a plurality of virtual servers, a plurality of virtual disks that are read from and written to by the plurality of virtual servers, a physical disk, an I/O backend coupled with the physical disk and in communication with the plurality of virtual disks, which reads from and writes to the physical disk, a tapping driver in communication with the plurality of virtual servers, which intercepts I/O requests made by any one of said plurality of virtual servers to any one of said plurality of virtual disks, and a virtual data services appliance, in communication with the tapping driver, which receives the intercepted I/O write requests from the tapping driver, and that provides data services based thereon.01-10-2013
20130014102PLANNED VIRTUAL MACHINES - A planned virtual machine, for use in staging the construction of a virtual machine. Such a planned virtual machine may be used as part of a method for migrating virtual machines. The method may include creating a planned virtual machine based on a first realized virtual machine or a template, performing a configuration operation on the planned virtual machine, and converting the planned virtual machine to a second realized virtual machine. The configuration operation may comprise interaction with a virtualization platform managing the planned virtual machine and may be based on input provided by a user.01-10-2013
20130014106INFORMATION PROCESSING APPARATUS, COMPUTER-READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM, AND MANAGEMENT METHOD - A storage unit stores a correspondence between information indicating one or more services executable on one or more virtual machines and information indicating one or more users who use the services, and one or more communication monitoring rules to be used by one or more virtual routers. The rules are defined for each of the services. A control unit specifies, when a rule stored in the storing unit is changed, one or more of the users who use a service corresponding to the changed rule by referring to the storing unit. The control unit transmits the changed rule to one or more of the virtual routers which relay communication of one or more of the virtual machines assigned to the specified users so as to cause the one or more of the virtual routers, to which the changed rule is transmitted, to perform monitoring based on the changed rule.01-10-2013
20130014105VIRTUAL MACHINE STAGE DETECTION - A computer implemented method for categorizing a virtual machine stage. A data processing system starts a virtual machine. It sets factor-stage ranges, wherein for each combination factor and stage, a corresponding range is present, and wherein each range is as broad as a reset range. It sets a frequency for sampling virtual machine metrics and samples virtual machine metrics to form a plurality of virtual machine metrics for each factor. It applies a value to each range satisfied by each virtual machine metric, to form a plurality of stage-qualifying values corresponding to a range, and sums all stage-qualifying values for each stage, to form a stage likelihood. The data processing system further selects a stage corresponding a highest stage likelihood. The data processing system determines if the current range is different from a former range. The system expands each range corresponding to the current stage.01-10-2013
20130014103COMBINED LIVE MIGRATION AND STORAGE MIGRATION USING FILE SHARES AND MIRRORING - Migration of a virtual machine and associated files to a destination host may be performed. A source host may initiate establishment of a temporary network file share at a destination location of the destination host to provide the source host and the destination host with access to the file share. While the virtual machine is running at the source host, a storage migration and a live migration may be initiated. Using the network file share, the source host may copy the associated files to the destination location. A runtime state of the virtual machine may be copied to the destination host. In a final phase of the migration, the virtual machine at the source host may be stopped, the storage migration may be completed, the copying of the runtime state may be completed, and the virtual machine may be started at the destination host.01-10-2013
20100131950STORAGE SYSTEM AND VIRTUAL INTERFACE MANAGEMENT METHOD - Identifiers of a plurality of physical HBAs disposed in a real host are grouped into a virtual HBA(s) for each work application executed in the real host. A storage device of a management server manages a virtual HBA ID which is an identifier of the virtual HBA and physical HBA IDs which are identifiers of the grouped physical HBAs, which are associated with each other. A display device of the management server displays information on a virtual host in which the virtual HBA is virtually disposed.05-27-2010
20100131949METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO USER-CONTROLLED RESOURCES IN A CLOUD COMPUTING ENVIRONMENT - A cloud computing environment can be configured to allow third party, user-controlled resources to be included in the pool of resources available in the cloud. The user-controlled resources can include a cloud application to communicate with a cloud management system to coordinate access to the user-controlled resources. The cloud application allows the user to specify the specific set of resources that the cloud can access, such as specific hardware and software resources.05-27-2010
20100131948METHODS AND SYSTEMS FOR PROVIDING ON-DEMAND CLOUD COMPUTING ENVIRONMENTS - A cloud management system can be configured to provide a cloud computing environment in response to a request for an execution platform. The cloud management system can be configured to determine a set of resources from non-dedicated cloud controlled resources or third-party resources that meet specifications of the requested execution platform. The cloud management system can be configured to create the on-demand cloud from the determined set of resources to serve as the execution platform.05-27-2010
20100131947System and method for enabling a local user of a real-life simulation environment to interact with a remote user of a corresponding virtual environment - Disclosed are systems and methods for enabling a local user of a real-life simulation environment to interact with a remote user of a corresponding virtual environment. In one embodiment, such a system comprises a venue including the real-life simulation environment for use by the local user, a venue management system configured to control real events occurring within the real-life simulation environment, and a multi-user experience server interactively linked to the venue management system. The multi-user experience server includes a virtual environment generator configured to produce the virtual environment corresponding to the real-life simulation environment, and the system further comprises a communication network enabling the local user and the remote user to access the multi-user experience server concurrently. The multi-user experience server is configured to enable the local user to perceive the remote user and to affect virtual events in the virtual environment corresponding to the real-life simulation environment.05-27-2010
20100131946SYSTEMS AND METHODS FOR HEALTH BASED SPILLOVER - The present solution provides a spillover management technique for virtual servers of an appliance based on health. Using a health based spillover technique, a network appliance may direct requests to a backup or second virtual server upon determining that a predetermined percentage of services being load balanced are down. In this manner, the spillover will occur based on a user controlled determination of a level of services being down to the number of services enabled. Instead of waiting for a last service of a virtual server to be marked down to spillover to another virtual server, the spillover may occur based on a user specified percentage. For example, the appliance may spillover from one virtual server to another virtual server when the number of services marked down relative to the number of enabled services falls below a specified percentage.05-27-2010
20100131945SYSTEM AND METHOD OF IMPLEMENTING A CONCURRENCY PROFILER - In one embodiment the present invention includes a computer-implemented method of measuring bottlenecks in a computer program implemented in a hardware client-server environment. The method includes defining an execution parameter to measure of the hardware client-server environment. The method further includes modifying code blocks to include instrumentation code. The instrumentation code relates to the execution parameter. The method further includes executing, in the hardware client-server environment, the code blocks having been modified. The method further includes generating instrumentation data, related to the execution parameter, that result from executing the code blocks. The method further includes outputting the instrumentation data having been generated. In this manner, the bottlenecks may be measured; the measured bottlenecks may be sorted; noteworthy bottlenecks may be identified; and the aspects of the hardware client-server environment may be adjusted to address the bottlenecks. Sorting is helpful because thousands of synchronization points may be detected and measured, but many of them do not represent a problem that requires correction.05-27-2010
20100131944Graphics Hardware Resource Usage In A Fully Virtualized Computing Environment - Methods, systems and computer program products for graphics hardware resource usage in a fully virtualized computing environment. Exemplary embodiments include a method in a virtual data center having a first host and a second host, a graphics hardware resource usage the method including receiving a request for graphics hardware features that are unavailable on the first host, generating a first request to a provisioning broker to migrate a virtual machine residing on the first host to the second host having the graphics hardware features, migrating the virtual machine and a client connection to the second host, generating a second request to the provisioning broker to find a suitable host to which the virtual machine can migrate and migrating the virtual machine to the suitable host.05-27-2010
20120151478Communication redirection where primary machine images are cloned to secondary machine images - Prior to a first primary machine image being cloned to a first secondary machine image and a second primary machine image being cloned to a second secondary machine image, a controller determines that the first primary machine image communicates with the second primary machine image. Cloning of the first primary machine image to the first secondary machine image and of the second primary machine image to the second secondary machine image is such that communication from the first secondary machine image to the second primary machine image is not directed to the second secondary machine image. Afterwards, a software agent running on the first secondary machine image changes a global machine image-wide hostname file at the first secondary machine image, so that the communication from the first secondary machine image to the second primary machine image is now directed to the second secondary machine image.06-14-2012
20130019242Cloud-Based Test System and Method and Computer-Readable Storage Medium with Computer Program to Execute the MethodAANM Chen; Shiang-JiunAACI Yunlin CountyAACO TWAAGP Chen; Shiang-Jiun Yunlin County TWAANM Chiang; Shang-LunAACI Taipei CityAACO TWAAGP Chiang; Shang-Lun Taipei City TWAANM Lee; Han-ChaoAACI Taipei CityAACO TWAAGP Lee; Han-Chao Taipei City TW - A cloud-based test system is disclosed. The cloud-based test system utilizes several cloud systems for testing. Each cloud system includes several cloud servers for providing a cloud resource to simulate several virtual test machines. The cloud-based test system includes several slave servers and a main server. Each slave server corresponds to one of the cloud systems for controlling the corresponding virtual test machines. The main server receives a test instruction, which is utilized to execute a target test item for a target electrical device, from a client, and generates a test environment condition corresponding to the test instruction. The main server determines the virtual test machines for executing the target test item and the at least one server to control the virtual test machines. The main server transmits the test instruction and the corresponding test environment condition to the server slave servers for testing.01-17-2013
20130019243EXECUTING A MULTICOMPONENT SOFTWARE APPLICATION ON A VIRTUALIZED COMPUTER PLATFORM - A virtualized computer platform is established and maintained by virtualization software on one or more physical computers. A multicomponent software application may execute on the virtualized computer platform, with different components of the application executing in different virtual machines, which are supported by the virtualization software. The virtualization software may also provide the provision of one or more services that may be beneficial to the operation of the multicomponent software application, such as automated provisioning, resource allocation, VM distribution, performance monitoring, resource management, high availability, backup, disaster recovery, alarms, security, etc. In some embodiments of the invention, some of these services are provided through coordinated efforts of a system resource manager, a VM manager, an application monitor and an application resource manager. In some of these embodiments, an application monitor and an application manager may be included with a multicomponent software application in a single installation package.01-17-2013
20130019241System And Method For Working In A Virtualized Computing Environment Through Secure AccessAANM Leitz; Raymond FrancisAACI Treasure IslandAAST FLAACO USAAGP Leitz; Raymond Francis Treasure Island FL USAANM Elowson; Thomas JohnAACI BradentonAAST FLAACO USAAGP Elowson; Thomas John Bradenton FL USAANM Naples; Russell ScottAACI Boca RatonAAST FLAACO USAAGP Naples; Russell Scott Boca Raton FL USAANM Solberg; HelgeAACI Boca RatonAAST FLAACO USAAGP Solberg; Helge Boca Raton FL US - A personalized virtual computing system includes a plurality of client personal computers (PCs), each comprising at least a web browser and a communications client, a plurality of virtual machine hosts each comprising a communications server for communicating with the client PCs via said communications client, a web server comprising a client-customized web site, a directory database including identification information of authorized users and a database including a reservation table.01-17-2013
20110161955HYPERVISOR ISOLATION OF PROCESSOR CORES - Techniques for utilizing processor cores include sequestering processor cores for use independently from an operating system. In at least one embodiment of the invention, a method includes executing an operating system on a first subset of cores including one or more cores of a plurality of cores of a computer system. The operating system executes as a guest under control of a virtual machine monitor. The method includes executing work for an application on a second subset of cores including one or more cores of the plurality of cores. The first and second subsets of cores are mutually exclusive and the second subset of cores is not visible to the operating system. In at least one embodiment, the method includes sequestering the second subset of cores from the operating system.06-30-2011
20130024855Check-point Based High Availability: Network Packet Buffering in Hardware - A method, system, and computer program product enhances resource/process availability by providing hardware based buffering of network packets during checkpointing in a virtualized environment. A High Availability Checkpoint (HAC) utility pre-configures a physical network adapter to buffer outgoing network packets from virtual machines that employ a checkpointing technology. In response to receiving an outgoing network packet from a virtual machine and determining that the virtual machine employs a pre-specified checkpointing technology, the physical network adapter buffers the outgoing network packet. In addition, a primary host performs/facilitates checkpoint operations (associated with the virtual machine) with a secondary host. When checkpoint operations are successfully completed, the HAC utility triggers the transmission of the buffered network packets from the network adapter to a network destination. The physical network adapter minimizes checkpointing network latency by pre-assigning a higher priority to a buffered network packet from a checkpointing virtual machine than to a new network packet that originates from a non-checkpointing virtual machine.01-24-2013
20130024856METHOD AND APPARATUS FOR FLEXIBLE BOOTING VIRTUAL STORAGE APPLIANCES - Virtual storage methods and systems allow storage software to be used with a variety of systems and resources without the need to write storage software specific to each particular system. The methods and systems described herein render virtual storage flexibly adaptable to hardware platforms. Through use of a dynamic resource mapper and a start-up loader in booting storage systems, the use of virtual storage appliances is simplified in an integrated and transparent fashion. For ease of system configurations, the mapper and start-up loader are available in a different ways and from a variety of media.01-24-2013
20130024861Virtualization Event Processing in a Layered Virtualization Architecuture - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event.01-24-2013
20130024860CONTROL COMPUTER AND METHOD FOR MANAGING POWER USING THE SAME - In a method for managing power of host computers using a control computer, the method generates a power management command, groups virtual machines installed in the host computers at a first time if the power management command is a first type, to obtain a first group of the virtual machines. The method further relocates the virtual machines in the host computers based on the first group of the virtual machines, and closes idle host computers. Closed host computers are powered on if the power management command is the second type, all the virtual machines at a second time are grouped, to obtain a second group of the virtual machines. The virtual machines are relocated into each host computer based on the second group of the virtual machines.01-24-2013
20130024862On-Line Replacement and Changing of Virtualization Software - In a virtualized system running one or more virtual machines on a first hypervisor, a second hypervisor is installed and control of the hardware resources of the physical computer supporting the virtualized system is migrated from the first hypervisor to the second hyperv