Patent application number | Description | Published |
20100318991 | Virtual Machine Fault Tolerance - In a computer system running a primary virtual machine (VM) on virtualization software on a primary virtualized computer system (VCS) and running a secondary VM on virtualization software on a secondary VCS, a method for the secondary VM to provide quasi-lockstep fault tolerance for the primary VM includes: as the primary VM is executing a workload, virtualization software in the primary VCS is: (a) causing predetermined events to be recorded in an event log, (b) keeping output associated with the predetermined events pending, and (c) sending the log entries to the virtualization software in the secondary VCS; as the secondary VM is replaying the workload, virtualization software in the secondary VCS is: (a) sending acknowledgements indicating that log entries have been received; (b) when the virtualization software encounters one of the predetermined events, searching the log entries to determine whether a log entry corresponding to the same event was received from the primary VCS, and if so, comparing data associated with the predetermined event produced by the secondary VM with that of the primary VM; if there is a match, the virtualization software in the secondary VCS transmitting an acknowledgement to the virtualization software in the primary VCS; one of the virtualization software in the primary or secondary VCS dropping the event and the other dispatching the output; and if there is no match, performing a checkpoint resynchronization. | 12-16-2010 |
20120284714 | VIRTUAL MACHINE FAULT TOLERANCE - In a computer system running at least a first virtual machine (VM) and a second VM on virtualization software, a computer implemented method for the second VM to provide quasi-lockstep fault tolerance for the first VM. The method includes enabling operations of the second VM to diverge from being in lockstep with operations with the first VM without resynchronizing the second VM with the first VM, if output of the second VM is not diverging from output of the first VM. The output of the second VM is compared with the output of the first VM to determine whether the output of the second VM has diverged from the output of the first VM. In response to a determination that the output of the second VM has diverged from the output of the first VM, a resynchronization of the second VM is executed. | 11-08-2012 |
Patent application number | Description | Published |
20100250750 | CONSISTENT CLUSTER OPERATIONAL DATA IN A SERVER CLUSTER USING A QUORUM OF REPLICAS - A method and system for increasing server cluster availability by requiring at a minimum only one node and a quorum replica set of replica members to form and operate a cluster. Replica members maintain cluster operational data. A cluster operates when one node possesses a majority of replica members, which ensures that any new or surviving cluster includes consistent cluster operational data via at least one replica member from the immediately prior cluster. Arbitration provides exclusive ownership by one node of the replica members, including at cluster formation, and when the owning node fails. Arbitration uses a fast mutual exclusion algorithm and a reservation mechanism to challenge for and defend the exclusive reservation of each member. A quorum replica set algorithm brings members online and offline with data consistency, including updating unreconciled replica members, and ensures consistent read and update operations. | 09-30-2010 |
20110238813 | CONSISTENT CLUSTER OPERATIONAL DATA IN A SERVER CLUSTER USING A QUORUM OF REPLICAS - A method and system for increasing server cluster availability by requiring at a minimum only one node and a quorum replica set of replica members to form and operate a cluster. Replica members maintain cluster operational data. A cluster operates when one node possesses a majority of replica members, which ensures that any new or surviving cluster includes consistent cluster operational data via at least one replica member from the immediately prior cluster. Arbitration provides exclusive ownership by one node of the replica members, including at cluster formation, and when the owning node fails. Arbitration uses a fast mutual exclusion algorithm and a reservation mechanism to challenge for and defend the exclusive reservation of each member. A quorum replica set algorithm brings members online and offline with data consistency, including updating unreconciled replica members, and ensures consistent read and update operations. | 09-29-2011 |
20110238842 | CONSISTENT CLUSTER OPERATIONAL DATA IN A SERVER CLUSTER USING A QUORUM OF REPLICAS - A method and system for increasing server cluster availability by requiring at a minimum only one node and a quorum replica set of replica members to form and operate a cluster. Replica members maintain cluster operational data. A cluster operates when one node possesses a majority of replica members, which ensures that any new or surviving cluster includes consistent cluster operational data via at least one replica member from the immediately prior cluster. Arbitration provides exclusive ownership by one node of the replica members, including at cluster formation, and when the owning node fails. Arbitration uses a fast mutual exclusion algorithm and a reservation mechanism to challenge for and defend the exclusive reservation of each member. A quorum replica set algorithm brings members online and offline with data consistency, including updating unreconciled replica members, and ensures consistent read and update operations. | 09-29-2011 |
Patent application number | Description | Published |
20100076807 | METHOD AND APPARATUS FOR CONTROLLING AN ELECTRONIC DEVICE - A method and apparatus for controlling an electronic device is provided, the electronic device having a processing unit interconnecting a memory and a display module, the processing unit configured to control the display module. The method comprises receiving, at the processing unit, first data representative of a meeting request. The method further comprises retrieving, at the processing unit, second data representative of an existing schedule, from the memory. The method further comprises generating at the processing unit a proposed schedule by merging the first data with the second data. The method further comprises, via the processing unit, controlling the display module to generate a representation of the proposed schedule on the display module. | 03-25-2010 |
20100208625 | METHOD OF JOINING A CONFERENCE CALL - In a computer-implemented method of joining a user to a conference call event an interface associated with a time management software application is displayed. The interface displays information relating to the conference call event including a date for a conference call which is subject of the conference call event and a start time of the conference call. While displaying the interface, a menu offering one or more options is displayed; these one or more options include an option to join the conference call. When an indication of a selection of the option to join the conference call is received, information associated with the conference call is located; this information includes a telephone number for a conference call bridge. A connection with the conference call bridge using the telephone number is initiated. | 08-19-2010 |
20100211911 | METHOD OF ALTERING A USER INTERFACE - In a computer-implemented method of altering an interface, an interface associated with an application having time-dependent events is displayed. The interface displays at least one activatable component. At a pre-set time relative to a time for one of said time-dependent events, the interface is altered to add an added activatable component, or to set a pre-determined one of the activatable components of the interface as a selected component. | 08-19-2010 |
20100223321 | DATA HUB SERVER - Apparatus and methods to engage in accessing informational content in a data hub server, where the informational content is identified as public or partially public to a group registered in the data hub server with permission to access the informational content made public or partially public in the data hub server by another entity, provide a mechanism to enhance the communication capabilities among mobile electronic devices. Additional apparatus, systems, and methods are disclosed. | 09-02-2010 |
20100223359 | DEVICE-TO-DEVICE TRANSFER - Apparatus and methods to engage in a transfer of informational content between a first mobile electronic device and a second mobile electronic device using directed transmission between a first server and a second server. Additional apparatus, systems, and methods are disclosed. | 09-02-2010 |
20100228753 | INTELLIGENT HYPERLINKING OF DATES IN TEXT - A method, handheld electronic device and computer program product for allowing a user to view calendar data related to text the user is reading are provided. The method comprises: receiving an instruction to display a specified text; identifying at least one string in the specified text indicating date information; displaying the specified text with the date string presented as a hyperlink; and receiving user input activating the hyperlink and displaying calendar information related to the date indicated by the date string in response to the user input. | 09-09-2010 |
20150023222 | METHOD OF JOINING A CONFERENCE CALL - In a computer-implemented method of joining a user to a conference call event an interface associated with a time management software application is displayed. The interface displays information relating to the conference call event including a date for a conference call which is subject of the conference call event and a start time of the conference call. While displaying the interface, a menu offering one or more options is displayed; these one or more options include an option to join the conference call. When an indication of a selection of the option to join the conference call is received, information associated with the conference call is located; this information includes a telephone number for a conference call bridge. A connection with the conference call bridge using the telephone number is initiated. | 01-22-2015 |
Patent application number | Description | Published |
20090100112 | Method and System for Replicating Objects - A method and system for method for replicating object consisting of creating a group of objects at a first location; transmitting the group of objects from a first location to a second location over a network coupling the first location to the second location, such that the number of transmissions is minimized receiving the group of objects at the second location; and storing the group of objects at the second location. The objects are preferably data objects and are collated into group based on a probability score is computed for each data object centered on an access pattern. Advantages include minimizing the number of transmission of the group of objects thereby reducing network traffic and failure of operation during replication of the objects. | 04-16-2009 |
20090150456 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR DISASTER RECOVERY PLANNING - Formulating an integrated disaster recovery (DR) plan based upon a plurality of DR requirements for an application by receiving a first set of inputs identifying one or more entity types for which the plan is to be formulated, such as an enterprise, one or more sites of the enterprise, the application, or a particular data type for the application. At least one data container representing a subset of data for an application is identified. A second set of inputs is received identifying at least one disaster type for which the plan is to be formulated. A third set of inputs is received identifying a DR requirement for the application as a category of DR Quality of Service (QoS) class to be applied to the disaster type. A composition model is generated specifying one or more respective DR QoS parameters as a function of a corresponding set of one or more QoS parameters representative of a replication technology solution. The replication technology solution encompasses a plurality of storage stack levels. A solution template library is generated for mapping the application to each of a plurality of candidate replication technology solutions. The template library is used to select a DR plan in the form of a replication technology solution for the application. | 06-11-2009 |
20090150712 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR DISASTER RECOVERY PLANNING - Formulating an integrated disaster recovery (DR) plan based upon a plurality of DR requirements for an application by receiving a first set of inputs identifying one or more entity types for which the plan is to be formulated, such as an enterprise, one or more sites of the enterprise, the application, or a particular data type for the application. At least one data container representing a subset of data for an application is identified. A second set of inputs is received identifying at least one disaster type for which the plan is to be formulated. A third set of inputs is received identifying a DR requirement for the application as a category of DR Quality of Service (QoS) class to be applied to the disaster type. A composition model is generated specifying one or more respective DR QoS parameters as a function of a corresponding set of one or more QoS parameters representative of a replication technology solution. The replication technology solution encompasses a plurality of storage stack levels. A solution template library is generated for mapping the application to each of a plurality of candidate replication technology solutions. The template library is used to select a DR plan in the form of a replication technology solution for the application. | 06-11-2009 |
Patent application number | Description | Published |
20120240135 | HIGH-LEVEL LANGUAGE FOR SPECIFYING CONFIGURATIONS OF CLOUD-BASED DEPLOYMENTS - A high-level object-oriented specification language allows configurable components of a cloud-based deployment to be modeled by a class definition that includes a group of configurable class parameters. The object-oriented specification language supports extension of an existing base class definition to create new class definitions, and supports inheritance of class parameters from the existing base class definition by the new class definitions. A cloud-based deployment can be customized based on class definitions used in configuring one or more generic deployments, such as by modifying class parameter values of the class definitions, varying interrelationships between the classes, and supplementing existing class parameters with new class parameters. The high-level object-oriented specification language supports class definitions that model hardware and virtual resources as well as software roles and service roles served by software applications and services in a cloud-based deployment. Syntax for specifying dependency and connectivity between classes is also provided. | 09-20-2012 |
20120266159 | Selection of Ranked Configurations - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for selection of ranked configurations. In one aspect, a method includes providing a plurality of class definitions for selection, each class definition modeling a respective data or functional component of a cloud-based environment using a group of configurable class parameters, each class definition supporting instantiation and inheritance of the class definition in a configuration specification for a cloud-based deployment; deriving respective performance metrics associated with each of the plurality of class definitions based on aggregated performance of multiple cloud-based deployments, wherein the multiple cloud-based deployments had been carried out according to respective configuration specifications that require instantiation of the class definition or a new class definition derived from the class definition; and utilizing the respective performance metrics associated with each of the plurality of class definitions in ranking the plurality of class definitions. | 10-18-2012 |
20140123129 | HIGH-LEVEL LANGUAGE FOR SPECIFYING CONFIGURATIONS OF CLOUD-BASED DEPLOYMENTS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for high-level language for specifying configurations of cloud-based deployments. In one aspect, a method includes receiving a configuration specification for configuring a cloud-based deployment, the configuration specification being written in a specification language and requiring instantiation of respective class definitions of one or more classes, each class modeling a respective data or functional component of the cloud-based deployment using a group of configurable class parameters, and the respective class definition of each class representing a requested state of the data or functional component modeled by the class; deriving a plurality of application programming interface (API) calls for configuring the cloud-based deployment based on the class definitions of the one or more classes; causing the plurality of API calls to be executed to configure the cloud-based deployment. | 05-01-2014 |
Patent application number | Description | Published |
20130085953 | Assessing Social Risk Due To Exposure From Linked Contacts - An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network. | 04-04-2013 |
20130086254 | Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. | 04-04-2013 |
20130179970 | Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. | 07-11-2013 |
20130179977 | Assessing Social Risk Due To Exposure From Linked Contacts - An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network. | 07-11-2013 |
Patent application number | Description | Published |
20150026116 | MANAGING SPARSITY IN AN MULTIDIMENSIONAL DATA STRUCTURE - Embodiments of the present invention relate to a method, program product, and system for managing the percentage of unpopulated cells in a multidimensional data structure during the servicing of multidimensional analytical queries. In an embodiment, a multidimensional data structure is stored in a memory location of a computing device, wherein the multidimensional data structure includes a dimension that is a subset of a plurality of dimensions included in a relational database. The computing device determines a frequency of utilization of a dimension to service a multidimensional query request. The computing device combines the dimension with the multidimensional data structure responsive to the frequency of utilization. | 01-22-2015 |
20150026207 | MANAGING SPARSITY IN AN MULTIDIMENSIONAL DATA STRUCTURE - Embodiments of the present invention relate to a method, program product, and system for managing the percentage of unpopulated cells in a multidimensional data structure during the servicing of multidimensional analytical queries. In an embodiment, a multidimensional data structure is stored in a memory location of a computing device, wherein the multidimensional data structure includes a dimension that is a subset of a plurality of dimensions included in a relational database. The computing device determines a frequency of utilization of a dimension to service a multidimensional query request. The computing device combines the dimension with the multidimensional data structure responsive to the frequency of utilization. | 01-22-2015 |
20150066803 | QUANTITATIVE PRODUCT FEATURE ANALYSIS - Providing product review related information to a product review user by: (i) determining a plurality of products having a common product type; (ii) determining a plurality of product features of the plurality of products of the common product type; and (iii) determining, independently of any input from the product review user, a plurality of feature clusters, with each feature cluster including at least two features of the plurality of product features. This software-defined clustering of product features can help review users find the most suitable products and/or services. | 03-05-2015 |
20150066806 | QUANTITATIVE PRODUCT FEATURE ANALYSIS - Providing product review related information to a product review user by: (i) determining a plurality of products having a common product type; (ii) determining a plurality of product features of the plurality of products of the common product type; and (iii) determining, independently of any input from the product review user, a plurality of feature clusters, with each feature cluster including at least two features of the plurality of product features. This software-defined clustering of product features can help review users find the most suitable products and/or services. | 03-05-2015 |