Patent application number | Description | Published |
20090031303 | METHOD FOR SECURING THE EXECUTION OF VIRTUAL MACHINES - A method for executing a privileged virtual machine (VM) in a secured environment. The method comprises mapping virtual address space of the privileged virtual machine (VM) to start at address zero of a physical memory; configuring memory address space of emulated and real peripheral devices on an interconnect bus; and blocking the privileged VM's operating system from re-configuring the memory address space of the interconnect bus. | 01-29-2009 |
20100138475 | Dynamic loading between a server and a client - The load of a server and its client is balanced during connection setup time and dynamically during operation. In one embodiment, a server that hosts virtual machines for a plurality of clients balances its load with its clients. The server receives a request from a requesting client to establish a connection. The request includes capacity information about the requesting client. The server then negotiates with the requesting client about load allocation based on the capacity information. The negotiated load can be dynamically rebalanced after the connection is established. | 06-03-2010 |
20100138528 | Determining the graphic load of a virtual desktop - The graphics load of a virtual desktop is estimated to determine the capacity of a virtual desktop system. In one embodiment, the graphics load of a physical desktop is measured by a remoting agent installed on the physical desktop. The graphics load can be used as an estimate of the load that would be created by a deployed virtual desktop. The remoting agent on the physical desktop mimics host operations that are necessary to direct graphics data to a remote site. The remoting agent also measures the graphics load incurred by the host operations to determine a capacity of a virtual desktop system prior to deployment of the virtual desktop system. | 06-03-2010 |
20100138744 | METHODS FOR PLAYING MULTIMEDIA CONTENT AT REMOTE GRAPHICS DISPLAY CLIENT - Method and apparatus for playing multimedia content at a remote graphics display client are described herein. According to one embodiment, a stream of data objects is sequentially transmitted to a client over a network. The stream is generated by a desktop application representing a snapshot of a display output of the desktop application. The data objects are to be rendered at the client for graphics remoting purposes. It is detected that a multimedia object is to be rendered by the desktop application. The multimedia object is caused to be rendered remotely at the client without having to render the multimedia object locally and without having to transmit a display result of the rendering to the client over the network. Other methods and apparatuses are also described. | 06-03-2010 |
20100138827 | HASHING STORAGE IMAGES OF A VIRTUAL MACHINE - Virtual machine images are transferred from a source storage location to a target storage location over a network. In one embodiment, a host at the source storage location computes signature values of a plurality of disk blocks that contain a plurality of virtual machine images. Each computed signature value corresponds to one of the disk blocks. A subset of the disk blocks, all of which have different signature values, is then transferred from the source storage location to the target storage location. Only one copy of duplicate disk blocks is transferred. | 06-03-2010 |
20100138924 | Accelerating the execution of anti-virus programs in a virtual machine environment - The execution of anti-virus programs can be accelerated in a virtual desktop environment. In one embodiment, a server hosts a plurality of virtual machines. Before performing a virus scan on a file, the server computes a signature value of the file, compares the signature value with the stored signature values in a central database, and performs virus scan on the file according to the result of the comparison. If the signature value exists in the central database, the virus scan on the file can be skipped. | 06-03-2010 |
20100299495 | METHOD TO SUPPORT SPARSE VOLUMES OR THIN PROVISIONED VOLUMES IN REAL TIME - A storage pool is shared by multiple host computers in a cluster that runs virtual machines. In one embodiment, one of the host computers in the cluster is designated to include a storage pool manager. Each host computer in the cluster monitors its storage consumption and notifies the storage pool manager of its storage consumption. Thus, storage space in the storage pool can be dynamically allocated on demand. | 11-25-2010 |
20100306173 | HANDLING TEMPORARY FILES OF A VIRTUAL MACHINE - A method and system for handling temporary data of a virtual machine are described. In one embodiment, virtual machines are hosted by a server and accessed by remote clients over a network. The server assigns first storage and second storage to each virtual machine, where the first storage is designated for temporary data of a respective virtual machine and the second storage is designated for persistent data of a respective virtual machine. The server monitors events pertaining to the virtual machine. Upon detecting a predefined event pertaining to one of the virtual machines, the server causes at least a subset of the temporary data to be removed from the first storage of this virtual machine. | 12-02-2010 |
20100306770 | METHOD AND APPARATUS FOR SWAPPING VIRTUAL MACHINE MEMORY - A method and system for swapping memory of a virtual machine are described. In one embodiment, virtual machines are hosted by a server and accessed by remote clients over a network. The server assigns first storage and second storage to each virtual machine, where the first storage is designated for swap memory of a respective virtual machine and the second storage is designated for persistent data of a respective virtual machine. The server monitors events pertaining to the virtual machines. Upon detecting a predefined event pertaining to one of the virtual machines, the server causes the contents of the first storage to be wiped out. | 12-02-2010 |
20110055375 | METHODS FOR MONITORING OPERATING STATUS OF REMOTE HOSTS - Methods for monitoring operating statuses of hosts are described herein. Operating statuses for one or more hosts are monitored by a management server over a network using a network management protocol. In response to a failure to obtain an operating status of a first host over the network using the network management protocol, the management server instructs a second host to access a predetermined storage location to obtain the operating status of the first host. The predetermined storage location is specifically allocated for the first host from a storage space shared by all the hosts. Thereafter, the management server is configured to determine an operating condition of the first host based on the operating status obtained via the second host. | 03-03-2011 |
20110055602 | MECHANISM FOR MANAGING POWER IN A VIRTUAL MACHINE SYSTEM - A mechanism for managing power in a virtual machine system is disclosed. A method for a host-based power management system may include monitoring a plurality of VMs in a VM system to detect user activity associated with each of the plurality of VMs, identifying a VM of the plurality of VMs that is inactive based on the user activity associated with the VM, and applying a power reduction policy to the VM. | 03-03-2011 |
20110055830 | MECHANISM FOR REDUCING THE POWER CONSUMPTION OF VIRTUAL DESKTOP SERVERS - A mechanism for reducing the power consumption of virtual machine host servers is disclosed. A method for a virtual machine (VM) power reduction agent (PRA) hosted by a VM may include identifying a user activity associated with the VM, determining that the VM is inactive based on the user activity associated with the VM, and notifying a host of the VM that the VM is inactive to facilitate application of a power reduction policy to the VM based on specific power reduction settings associated with the VM. | 03-03-2011 |
20110131443 | Mechanism for Automatic Adjustment of Virtual Machine Storage - A mechanism for automatic adjustment of virtual machine (VM) storage is disclosed. A method of embodiments of the invention includes stopping, by a host computing device, a virtual machine (VM) hosted by the host computing device from running upon detecting a write error due to lack of storage on the VM, communicating, by the host computing device, an out-of-storage notification from a hypervisor of the host computing device to a host management agent, and sending, by the host computing device, data associated with the out-of storage notification and the VM to a host controller that manages the host computing device, wherein the host controller causes storage for the VM to be increased. | 06-02-2011 |
20120124282 | SCALABLE BLOCK DATA STORAGE USING CONTENT ADDRESSING - A device for scalable block data storage and retrieval uses content addressing. Data storage devices store data blocks, and are connected over a network to computing modules. The modules comprise control modules and data modules and carry out content addressing for both storage and retrieval. The network defines separate control paths via the control modules and data paths via the data modules. | 05-17-2012 |
20120216299 | Server-Side Security Mechanism for Untrusted Clients Using Directory Hiding - A security mechanism provided by a server protects files in data storage from untrusted clients. In one embodiment, the server generates a filename in response to a request from a client for creating a filename. The filename is associated with a file to be stored in the data storage managed by the server. The server manages a directory that contains the filename, and hides the directory contents from the client. The client is granted access to the file when the client provides the filename associated with the file. | 08-23-2012 |
20120317353 | REPLICATION TECHNIQUES WITH CONTENT ADDRESSABLE STORAGE - A CAS data storage system with one or more source CAS data storage spaces and one or more destination CAS data storage spaces, and a communication line therebetween, receives input data at the source storage space for local storage and for replication to the destination CAS storage space. CAS metadata is used in the replication procedure between the two separate CAS storage spaces. Thus, data at the source storage space is used to form an active buffer for transfer to the destination storage space, the active buffer holding a hash result of the respective data item and a storage address. The system detects whenever there is more than one data item in said active buffer sharing a same storage address and upon such detection transfers a respective hash result of only the last of the data items. | 12-13-2012 |
20120317395 | LOW LATENCY REPLICATION TECHNIQUES WITH CONTENT ADDRESSABLE STORAGE - A CAS data storage method and apparatus comprising: receiving input data including a succession of data items with corresponding logical addresses at a source CAS data storage space for storage therein and for replication at a destination CAS data storage space, generating a hash key for each data item at the source storage space, comparing respective hash keys with hash keys stored at a hash key storage table, to determine whether respective further data items are already present at the destination storage device; transferring respective data items to the destination storage space if no match is made to a hash key stored at the hash key storage table, but not transferring respective further data items if a match is made to a hash key stored at the hash key storage table, thereby transferring to the destination storage space only unique data items. | 12-13-2012 |
20130305002 | SNAPSHOT MECHANISM - A memory management system for a thinly provisioned memory volume in which a relatively larger virtual address range of virtual address blocks is mapped to a relatively smaller physical memory comprising physical memory blocks via a mapping table containing entries only for addresses of the physical memory blocks containing data. The memory management system comprises a snapshot provision unit to take a given snapshot of the memory volume at a given time, the snapshot comprising a mapping table and memory values of the volume, the mapping table and memory values comprising entries only for addresses of the physical memory containing data. The snapshot is managed on the same thin provisioning basis as the volume itself, and the system is particularly suitable for RAM type memory disks. | 11-14-2013 |
20140223433 | HASHING STORAGE IMAGES OF A VIRTUAL MACHINE - Virtual machine images are transferred from a source storage location to a target storage location over a network. In one embodiment, a host at the source storage location computes signature values of a plurality of disk blocks that contain a plurality of virtual machine images. Each computed signature value corresponds to one of the disk blocks. A subset of the disk blocks, all of which have different signature values, is then transferred from the source storage location to the target storage location. Only one copy of duplicate disk blocks is transferred. | 08-07-2014 |
20140258493 | DETERMINING THE GRAPHIC LOAD OF A VIRTUAL DESKTOP - The graphics load of a virtual desktop is estimated to determine the capacity of a virtual desktop system. In one embodiment, the graphics load of a physical desktop is measured by a remoting agent installed on the physical desktop. The graphics load can be used as an estimate of the load that would be created by a deployed virtual desktop. The remoting agent on the physical desktop mimics host operations that are necessary to direct graphics data to a remote site. The remoting agent also measures the graphics load incurred by the host operations to determine a capacity of a virtual desktop system prior to deployment of the virtual desktop system. | 09-11-2014 |