Patent application number | Description | Published |
20090049453 | IN-BAND COMMUNICATION WITH VIRTUAL MACHINES VIA A HYPERVISOR MESSAGE BUS - A method, system, and computer program product for in-band communication with virtual machines via a hypervisor message bus are provided. The method includes establishing communication between a hypervisor and a plurality of virtual machines via a hypervisor message bus, where the hypervisor manages resources in a shared system. The method further includes transmitting a message from the hypervisor to the virtual machines using the hypervisor message bus. The method also includes translating the message within the virtual machines into a display-formatted message for in-band display on one or more user systems, and relaying the display-formatted message from the virtual machines to the one or more user systems to provide in-band communication of the message to one or more users. | 02-19-2009 |
20090055805 | Method and System for Testing Software - A method and system are disclosed for testing the cpu scalability of a software application. The method comprises the steps of running the software application a plurality of times on a computer system such that each time the software application is ran on the computer system, a different number of processors are used to run the software application. The method further comprises the steps of storing the resultant outputs of the computer system, and using those outputs to determine the cpu scalability of the software application. In a preferred embodiment of the invention, a software tool, referred to as (he harness, is loaded onto the computer system to perform the running, storing and using steps. For instance, each time that the software application is run on (he computer system, the software tool may configure a different subset of the processors to run the software application. | 02-26-2009 |
20090063749 | TRACKING DATA UPDATES DURING MEMORY MIGRATION - Methods, systems, and computer program products for tracking updates during memory migration. The method includes computer instructions for establishing communication from a source virtual machine to a target virtual machine, the source virtual machine including a memory. Contents of the memory on the source virtual machine are transmitted to the target virtual machine. The contents include a plurality of pages. Pages in the memory that are modified subsequent to being transmitted to the target virtual machine are tracked. The tracking includes creating a data structure having a plurality of bits corresponding to the pages in the memory, the bits indicating if the corresponding pages have been modified subsequent to being transmitted to the target virtual machine. The data structure also includes a first bit location index to identify the location of the first bit in the data structure that corresponds to a modified page. Bits in the data structure are updated in response to detecting that the corresponding pages have been modified subsequent to being transmitted to the target virtual machine. The data structure is scanned starting at the first bit location index to identify pages that have been modified subsequent to being transmitted to the target virtual machine. The identified pages are transmitted to the target virtual machine. | 03-05-2009 |
20090063750 | MIGRATING CONTENTS OF A MEMORY ON A VIRTUAL MACHINE - A system and computer program product for migrating contents of a memory on a virtual machine. The system includes a source virtual machine executing on a host system, the source virtual machine including a memory. The system also includes a hypervisor executing on the host system. The hypervisor is in communication with the source virtual machine and includes instructions. The instructions facilitate establishing communication from the source virtual machine to a target virtual machine, the source virtual machine including a memory. The contents of the memory on the source virtual machine are transmitted to the target virtual machine. The contents of the memory on the source virtual machine include a plurality of pages. It is determined if all or a subset of the pages have been modified on the source virtual machine subsequent to being transmitted to the target virtual machine. If it is determined that all or a subset of the pages have been modified, then the modified pages, including a page location and page content for each of the modified pages, are transmitted to the target virtual machine. The determining and transmitting the modified pages continues until the number of remaining pages that have been modified is less than a threshold. The virtual machine is then paused the remaining pages are transmitted to the target virtual machine. | 03-05-2009 |
20090063751 | METHOD FOR MIGRATING CONTENTS OF A MEMORY ON A VIRTUAL MACHINE - A method for migrating contents of a memory on a virtual machine. The method includes computer instructions for establishing communication from a source virtual machine to a target virtual machine, the source virtual machine including a memory. The contents of the memory on the source virtual machine are transmitted to the target virtual machine. The contents of the memory on the source virtual machine include a plurality of pages. It is determined if all or a subset of the pages have been modified on the source virtual machine subsequent to being transmitted to the target virtual machine. If it is determined that all or a subset of the pages have been modified, then the modified pages, including a page location and page content for each of the modified pages, are transmitted to the target virtual machine. The determining and transmitting the modified pages continues until the number of remaining pages that have been modified is less than a threshold. The virtual machine is then paused the remaining pages are transmitted to the target virtual machine. | 03-05-2009 |
20090063752 | UTILIZING DATA ACCESS PATTERNS TO DETERMINE A DATA MIGRATION ORDER - Systems and computer program products for utilizing data access patterns to determine a data migration order. A system includes a source virtual machine executing on a host system, the source virtual machine including a memory. The system also includes a hypervisor executing on the host system, the hypervisor in communication with the source virtual machine and executing instructions. The instructions facilitate establishing communication with a target virtual machine. Access information for pages in the memory is collected and utilized to determine an order of migration for pages in the memory. The pages in the memory are transmitted to the target virtual machine in the order of migration. | 03-05-2009 |
20090063753 | METHOD FOR UTILIZING DATA ACCESS PATTERNS TO DETERMINE A DATA MIGRATION ORDER - A method for utilizing data access patterns to determine a data migration order. The method includes computer instructions for establishing communication from a source virtual machine to a target virtual machine, the source virtual machine including a memory. The access information for pages in the memory is collected and utilized to determine an order of migration for pages in the memory. The pages in the memory are transmitted to the target virtual machine in the order of migration. | 03-05-2009 |
20090064136 | UTILIZING SYSTEM CONFIGURATION INFORMATION TO DETERMINE A DATA MIGRATION ORDER - Methods, systems and computer program products for utilizing system configuration information to determine a data migration order. The method includes computer instructions for establishing communication from a source virtual machine to a target virtual machine, the source virtual machine including a memory. The configuration information associated with the source virtual machine is determined and utilized to determine an order of migration for pages in the memory. The pages in the memory are transmitted to the target virtual machine in the order of migration. | 03-05-2009 |
20090106518 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR FILE RELOCATION ON A DATA STORAGE DEVICE - A method, system, and computer program product for file relocation on a data storage device are provided. The method includes initiating file relocation in response to invoking a cleaner function for a data storage device. The method also includes examining metadata associated with a file on the data storage device to determine an access frequency of the file, and classifying the file as a function of the access frequency. The method further includes relocating the file to a fast region of the data storage device when the file is classified as frequently accessed, and relocating the file to a slow region of the data storage device when the file is classified as infrequently accessed. | 04-23-2009 |
20090144545 | COMPUTER SYSTEM SECURITY USING FILE SYSTEM ACCESS PATTERN HEURISTICS - A system for computer system security using file system access pattern heuristics is provided. The system includes access patterns to establish nominal read and write frequencies to a file system using heuristics, dynamic policies, and a policy manager. The policy manager monitors accesses to the file system to determine read and write access frequencies to the file system. The policy manager also compares the read and write access frequencies to the access patterns, and determines whether the read and write access frequencies exceed the access patterns per the dynamic policies. The policy manager further identifies an attack on the file system in response to exceeding the dynamic policies, where the identified attack is associated with a communication path to the file system. The policy manager additionally modifies an aspect of access via the communication path in accordance with the attack response in the dynamic policies to mitigate the attack. | 06-04-2009 |
20090177854 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PREEMPTIVE PAGE EVICTION - A method, system, and computer program product for preemptive page eviction in a computer system are provided. The method includes identifying a region in an input file for preemptive page eviction, where the identified region is infrequently accessed relative to other regions of the input file. The method also includes generating an output file from the input file, where the identified region is flagged as a page for preemptive page eviction in the output file. The method further includes loading the output file to a memory hierarchy including a faster level of memory and a slower level of memory, wherein the flagged page is preemptively written to the slower level of memory. | 07-09-2009 |
20090187788 | METHOD OF AUTOMATIC REGRESSION TESTING - A method of automatic regression testing includes loading binary code representing a first version of a program, extracting a second version of the program embedded within the binary code of the first version of the program, executing a standalone model of the second version of the program based on the extracted second version, wherein executing includes executing a set of instructions to identify at least one error, determining if the standalone model causes the at least one error, and storing results based on the determining. | 07-23-2009 |
20090196456 | METHOD FOR CONFIGURING CAMERA-EQUIPPED ELECTRONIC DEVICES USING AN ENCODED MARK - A wide range of digital devices either have or are provided with imaging devices which are capable of imaging externally provided information in the form of special codes that contain setup and/or configuration information. Processors within these devices, which include cell phones, cameras, PDAs and personal computers, to name just a few, recognize the image and convert it to the desired configuration and/or setup information. | 08-06-2009 |
20090271841 | METHODS, HARDWARE PRODUCTS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING ZERO-TRUST POLICY IN STORAGE REPORTS - A zero-trust policy is implemented in storage reports to provide a preventative measure against potential attack vectors. Introspection of a guest memory having a guest memory layout is performed. An operating system (OS) memory map is accepted. The guest memory layout is compared with the OS memory map. When the guest memory layout matches the OS memory map, the OS memory map is used to obtain one or more interested memory segments, and data processing is performed. | 10-29-2009 |
20090276200 | NON-DESTRUCTIVE SIMULATION OF A FAILURE IN A VIRTUALIZATION ENVIRONMENT - A method for simulating a hardware failure in a virtualization environment includes determining a location of an instruction pointer for a particular operating system operating in the virtualization environment; determining an address of a memory location containing an invalid instruction; and writing the address of the memory location containing the invalid instruction in the location of the instruction pointer. | 11-05-2009 |
20090282481 | METHODS, HARDWARE PRODUCTS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING INTROSPECTION DATA COMPARISON UTILIZING HYPERVISOR GUEST INTROSPECTION DATA - Introspection data comparison is implemented utilizing hypervisor guest introspection data. A hypervisor shim on a hypervisor is used to construct one or more workload management components that are independent from a participating pool member of a pool comprising a guest having a guest memory and a guest operating system. The hypervisor collects a first set of data. The guest sends a second set of data comprising guest memory data from the guest memory. The first set of data is compared with the second set of data to detect at least one of a potential security intrusion or an anomalous deviation between the first set of data and the second set of data. A policy manager takes action based upon a result of the comparison of the first and second sets of data. | 11-12-2009 |
20100017800 | METHOD, COMPUTER PROGRAM PRODUCT, AND HARDWARE PRODUCT FOR SUPPORTING VIRTUAL MACHINE GUEST MIGRATION OVERCOMMIT - Virtual machine guest migration overcommit is supported by providing a virtual machine with an unschedulable resource that is not available for system scheduling. The unschedulable resource may, but need not, be provided in the form of a memory buffer, or one or more network resources, or one or more resources that are accessible from a network. The unschedulable resource is utilized in one or more domains to temporarily conceal one or more user environments that do not fit into a set of currently available resources, such that the one or more temporarily concealed user environments are not terminated or paged out. | 01-21-2010 |
20100023944 | Suspend Profiles and Hinted Suspending - Methods, systems and computer program products for suspend profiles and hinted suspending. Exemplary embodiments include a suspend mode management method, including determining a task to perform in the computer system during a suspend period of the computer system, detecting a suspend event in the computer system, the suspend event initiating the suspend period and performing the task during the suspend period. | 01-28-2010 |
20100177047 | DYNAMICALLY RECONFIGURABLE TOUCH SCREEN DISPLAYS - A dynamically reconfigurable touch screen system includes a first display having a first touch screen, a second display having a second touch screen, the second display being operatively connected to the first display, at least one sensor operatively associated with one of the first and second displays. The at least one sensor detects a physical orientation of the one of the first and second touch screens. The dynamically reconfigurable touch screen system further includes a controller linked to the at least one sensor. The controller sets a display of the other of the first and second touch screens based on the physical orientation of the one of the first and second touch screens. | 07-15-2010 |
20100229167 | TESTING OPERATING SYSTEM ISOLATION USING ERROR INJECTION - A continuously operating system is provided and includes a processor and a computer readable medium to which the processor is operatively coupled, the computer readable medium having executable instructions stored thereon which, when executed, cause the processor to continuously load an operating system and to simultaneously operate as at least first and second mechanisms. The first mechanism loads a new module, which is a new version of an in-memory module of the operating system, into the operating system, and the second mechanism isolates and interrupts current access to the in-memory module such that subsequent access is to the new module. | 09-09-2010 |
20100262966 | MULTIPROCESSOR COMPUTING DEVICE - A computing device includes a first processor configured to operate at a first speed and consume a first amount power and a second processor configured to operate at a second speed and consume a second amount of power. The first speed is greater than the second speed and the first amount of power is greater than the second amount of power. The computing device also includes a scheduler configured to assign processes to the first processor only if the processes utilize their entire timeslice. | 10-14-2010 |
20100299540 | COMPUTING SYSTEM WITH POWER REQUIREMENT EVALUATION - A computing system is provided and includes recording media relative to which input/output (I/O) operations are executable, and a processor, disposed in signal communication with the recording media, which is configured to execute the I/O operations and to evaluate power requirements associated with executions of the I/O operations relative to each individual recording medium. The processor includes a computer-readable medium having a set of instructions stored thereon, which, when executed, cause the processor to schedule the executions of the I/O operations relative to each individual recording medium or to refuse the executions of the I/O operations in accordance with the evaluated power requirements. | 11-25-2010 |
20100318965 | COMPUTING SYSTEM WITH COMPILE FARM - A computer readable medium is provided and has instructions stored thereon, which, when executed cause a processor of a computing system to execute a method of controlling the computing system. The method includes iteratively running a workload over a period of time, the workload being defined by software components of a software repository of the computing system, measuring power consumption associated with the running of the workload with each iteration and storing data indicative of the power consumption, analyzing the data and identifying, from a result of the analysis, power consumption changes over the period of time, generating a regression profile based on the power consumption changes, and managing the software components in accordance with the regression profile. | 12-16-2010 |
20110119427 | SYMMETRIC LIVE MIGRATION OF VIRTUAL MACHINES - A first least recently used map is generated for a set of memory pages of a first virtual machine. The first least recently used map includes metadata including memory page physical address location information. A first of the memory pages of the first virtual machine and the metadata for the first memory page is sent from the first virtual machine to a second virtual machine while the first virtual machine is executing. A first memory page and meta data associated therewith of the second virtual machine is received from the second virtual machine at the first virtual machine. The memory pages of the first virtual machine are ordered from a first location of the first least recently used map to a last location of the first least recently used map based on how recently each of the memory pages of the first virtual machine has been used. | 05-19-2011 |
20110140991 | MULTI-MONITOR CONFIGURATION SYSTEM - A multi-monitor configuration system may include a plurality of monitors and a sensor carried by each of the plurality of monitors. The system may also include a controller to detect and/or configure the plurality of monitors to display at least one video signal image based upon individual monitor parameters provided by each respective sensor to the controller. | 06-16-2011 |
20110143581 | INTELLIGENT ELECTRICAL CONNECTOR SYSTEM - An intelligent electrical connector system may include an electrical connector, and a transceiver carried by the electrical connector. The system may also include a second electrical connector, and a second transceiver carried by the second electrical connector. The second transceiver may relay interface information to the transceiver regarding the second electrical connector's parameters. | 06-16-2011 |
20110145525 | Method and System for Storing and Operating on Advanced Historical Access Data - Storing and operating an information object. An indicator associated with the information object is read. The indicator indicates that a historical information is stored for the information object. Responsive to determining from the historical information that the information object has been historically accessed, (a) future access time based on the historical information is determined; (b) a trigger for placing the information object in a storage device at a predetermined time before the future access of the information object is scheduled, the trigger being associated with a scheduled time; and (c) responsive to the scheduled time elapsing, the trigger is executed. When the trigger is executed, the information object is placed in said storage device. | 06-16-2011 |
20120117546 | Run-time Module Interdependency Verification - A method for determining intermodule dependency in software having a plurality of modules, at least a portion of the modules, executing calls to other modules, comprising loading the software modules into a memory, preferably in a contiguous extent, with the modules being logically separated; executing instructions of the software step-by-step with threading disabled; determining whether when an instruction is executed, a module other than the current modules is being called; and if a module other than the current module is being called, storing data sufficient to identify the calling instruction, the calling module, the called instruction and the called module. A computer readable medium, to which a processor of a system is operatively coupled, having executable instructions stored thereon for executing the method on a computer. A computer programmed to execute the method. | 05-10-2012 |
20120221338 | AUTOMATICALLY GENERATING AUDIBLE REPRESENTATIONS OF DATA CONTENT BASED ON USER PREFERENCES - A custom-content audible representation of selected data content is automatically created for a user. The content is based on content preferences of the user (e.g., one or more web browsing histories). The content is aggregated, converted using text-to-speech technology, and adapted to fit in a desired length selected for the personalized audible representation. The length of the audible representation may be custom for the user, and may be determined based on the amount of time the user is typically traveling. | 08-30-2012 |
20120272077 | GPS INPUT FOR POWER CONSUMPTION POLICY - A portable computing device is provided. The portable computing device includes a power source for providing a power supply in accordance with a power consumption policy, a processing unit operably coupled to the power source and a storage unit. The storage unit is operably coupled to the power source and the processing unit and configured to cause the processing unit to access geo-location data and to adjust the power consumption policy based on the geo-location data. | 10-25-2012 |
20120324073 | VIRTUAL MACHINE LOAD BALANCING - A method for load balancing virtual machines includes accessing current consumption data and historical consumption data for a first virtual machine running on a host hardware platform, wherein the host hardware platform is coupled to a network and accessing specification and utilization information for networked hardware platforms published on the network by each networked hardware platform, wherein the networked hardware platforms each include a hardware platform configured to run virtual machines. The method also includes selecting a target platform from the networked hardware platforms to receive the first virtual machine based on the published specification and utilization information for the networked hardware platforms and consumption data for the first virtual machine, wherein the first virtual machine will operate on the target platform in a condition that is not over-constrained. | 12-20-2012 |
20120324112 | VIRTUAL MACHINE LOAD BALANCING - A method for load balancing virtual machines includes accessing specification and utilization information for selected networked hardware platforms published on a network, the networked hardware platforms configured to run virtual machines and scoring the selected networked hardware platforms based on parameters from the utilization information to indicate resource availability for each of the selected networked hardware platforms. The method also includes removing a networked hardware platform from the selected networked hardware platforms based on a collocation policy to produce candidate platforms to receive a first virtual machine, wherein the collocation policy prohibits placement of the first virtual machine on the networked hardware platform based on at least one of consumer rules, provider rules, and industry rules. | 12-20-2012 |
20120324445 | IDENTIFICATION OF OVER-CONSTRAINED VIRTUAL MACHINES - A method for virtual machine management that includes establishing a first virtual machine on a hardware platform, performing a selected task on the first virtual machine and recording a first data set indicating a characteristic of the first virtual machine performing the selected task. The method also includes establishing a second virtual machine on the hardware platform, performing the selected task on the first and second virtual machines, recording a second data set indicating the characteristic of the first and second virtual machines performing the selected task and indicating acceptable data and unacceptable data within the first and second data sets. The method also includes creating and training a decision tree based on the acceptable and unacceptable data from the first and second data sets and inputting a third data set from a third virtual machine into the decision tree to determine if the third virtual machine is over-constrained. | 12-20-2012 |
20130003531 | VIRTUAL MACHINE DYNAMIC ROUTING - Dynamic network routing in a virtual machine environment. The dynamic network routing includes receiving an indication that a network outage has occurred and receiving a network communication to a guest or from the guest executing on a hypervisor. It is then determined if the guest that is the source or destination for the network communication is configured to use a revised network route. In response to determining that the guest is not configured to use the revised network route, then the transmission of the network communication is prevented and the guest is provided with network routing information. Once the guest has received the updating routing information the transmission of the network communication on the new route is allowed. | 01-03-2013 |
20130060988 | METHOD FOR SYMMETRIC LIVE MIGRATION OF VIRTUAL MACHINES - A method is provided for symmetric live migration of virtual machines. According to the method, a first least recently used map is generated for a set of memory pages of a first virtual machine. The first least recently used map includes metadata including memory page physical address location information. A first memory page of the first virtual machine and the metadata for the first memory page is sent from the first virtual machine to a second virtual machine while the first virtual machine is executing. A first memory page and meta data associated therewith of the second virtual machine is received from the second virtual machine. The memory pages of the first virtual machine are ordered from a first location of the first least recently used map to a last location of the first least recently used map based on how recently each of the memory pages of the first virtual machine has been used. | 03-07-2013 |
20130104227 | ADVANCED AUTHENTICATION TECHNOLOGY FOR COMPUTING DEVICES - Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern. | 04-25-2013 |
20130191497 | Storage and Transmission of Log Data In a Networked System - A method for storing log data in a networked storage system includes receiving one or more log data streams and storing the log data streams in a local memory location. The method also includes accessing the log data streams from the local memory location by a communications adapter and transmitting the log data streams to a storage system over a communications network by the communications adapter. The communications adapter is configured for one way communication with the storage system. | 07-25-2013 |
20140095648 | Storage and Transmission of Log Data In a Networked System - A method for storing log data in a networked storage system includes receiving one or more log data streams and storing the log data streams in a local memory location. The method also includes accessing the log data streams from the local memory location by a communications adapter and transmitting the log data streams to a storage system over a communications network by the communications adapter. The communications adapter is configured for one way communication with the storage system. | 04-03-2014 |
20140215073 | COMPUTING OPTIMIZED VIRTUAL MACHINE ALLOCATIONS USING EQUIVALENCE COMBINATIONS - A method for determining allocation of virtual machines includes: at least one of generating and accessing a list of virtual machines (VMs) configured to run on a network, each VM having at least one network resource requirement, each VM in the list associated with a size of the at least one network resource requirement; selecting at least one equivalence set of VMs having a resource requirement size that is at least substantially identical; generating a plurality of meta-combinations from the at least one equivalence set of VMs, each meta-combination representing all possible combinations of a selected number of individual VMs from the equivalence set; determining a maximum resource capacity of a node in the network; and providing a meta-combination assignment to the node, the meta-combination assignment including a group of meta-combinations having a cumulative resource requirement size value that is less than or equal to the maximum resource capacity. | 07-31-2014 |
20140351610 | COMPUTING SYSTEM WITH POWER REQUIREMENT EVALUATION - A computing system is provided and includes recording media relative to which input/output (I/O) operations are executable, and a processor, disposed in signal communication with the recording media, which is configured to execute the I/O operations and to evaluate power requirements associated with executions of the I/O operations relative to each individual recording medium. The processor includes a computer-readable medium having a set of instructions stored thereon, which, when executed, cause the processor to schedule the executions of the I/O operations relative to each individual recording medium or to refuse the executions of the I/O operations in accordance with the evaluated power requirements. | 11-27-2014 |