Patent application number | Description | Published |
20080235658 | CODE GENERATION FOR REAL-TIME EVENT PROCESSING - A method for information processing includes determining respective execution times for a plurality of operations on a selected computing platform. When a definition of a rule is received, including a complex event and an action to be performed upon occurrence of the complex event, software code is automatically generated to implement the rule on the selected computing platform by invoking a sequence of the operations responsively to the occurrence of the complex event. A worst-case estimate of a duration of execution of the software code is computed, based on the respective execution times of the operations in the sequence. When the worst-case estimate is no greater than a predetermined limit, the software code is run on the selected computing platform so as to cause the action to be performed when the rule is satisfied. | 09-25-2008 |
20090138857 | DEVICE, SYSTEM, AND METHOD OF TESTING COMPUTER PROGRAMS - Device, system, and method of testing computer programs. For example, an apparatus for testing computer programs includes: a debugger to detect a breakpoint in a computer program, and to issue an event indicating one or more properties of the breakpoint; and an event processing engine to control the operation of the debugger based on event processing analysis that takes into account the event issued by the debugger. | 05-28-2009 |
20100145749 | METHOD AND SYSTEM FOR AUTOMATIC CONTINUOUS MONITORING AND ON-DEMAND OPTIMIZATION OF BUSINESS IT INFRASTRUCTURE ACCORDING TO BUSINESS OBJECTIVES - A computer implemented method and system for optimizing performance of a business IT infrastructure, wherein business objectives are obtained as input and the IT business infrastructure and/or business level components associated therewith are optimized according to the business objectives. In one embodiment, an objectives definition is created that defines business objectives and business rules determining how IT level metrics affect the business objectives and, optionally, service level agreements or other contract definitions based on the objectives definition. A runtime performance of the business objectives is determined during runtime of the business IT infrastructure by monitoring the business IT infrastructure, its compliance with the contract definitions, and the business objectives achieved by the business IT infrastructure. If a statistically significant change is detected between the runtime performance and a reference optimization of the business objectives, the business model is updated and the reference optimization of the business objectives is redetermined. | 06-10-2010 |
20110004538 | MULTI-LEVEL TRANSACTION FLOW MONITORING - An apparatus for monitoring transactions in a computer system includes monitoring events reported by components of the computer system responsively to a flow of the transactions through the system. A state machine model and a rule-based model are jointly applied to the monitored events, so as to identify respective transaction-level events and business-level events. A status of the flow of the transactions is assessed responsively to the transaction-level events and the business-level events. | 01-06-2011 |
20120192149 | CODE GENERATION FOR REAL-TIME EVENT PROCESSING - A method for information processing includes defining a set of abstract operators for use in implementing computing operations, including iterative operations. Respective execution times are determined for the operations implemented by the abstract operators. Given a definition of a rule, including a complex event and an action to be performed upon occurrence of the complex event, software code to implement the rule is automatically generated by generating concrete instances of the abstract operators so as to invoke a sequence of computing steps that includes iterations of the iterative operations. A worst-case estimate of a duration of execution of the software code is computed based on the respective execution times. | 07-26-2012 |
Patent application number | Description | Published |
20140282813 | SECURED LOGICAL COMPONENT FOR SECURITY IN A VIRTUAL ENVIRONMENT - A system and method for providing security in a virtual environment are provided. An example system includes a link module that links a secured logical component to a logical entity including a set of virtual machines. The example system also includes a security module that identifies a set of security policies for one or more communications to the logical entity or one or more communications from the logical entity. The example system further includes a control module that controls, based on the set of security policies, the one or more communications to the logical entity or the one or more communications from the logical entity. | 09-18-2014 |
20150100742 | COMPATIBLE VIRTUAL MACHINE JOINER - A method, system and computer readable medium for joining multiple virtual machines (VMs). The method includes identifying a first virtual machine (VM) executing a first operating system (OS) for joining with a second VM executing a second OS, wherein the first OS and the second OS are compatible. A new VM having a new disk is created, wherein the new disk includes the contents of a first existing disk of the first VM and a second existing disk of the second VM. | 04-09-2015 |
20150100957 | VIRTUAL MACHINE JOINER - A method, system and computer readable medium for joining multiple virtual machines (VMs). The method includes identifying a first VM executing a first operating system (OS) for joining with a second VM executing a second OS, wherein the first OS and the second OS are incompatible. A new VM having a first new disk and a second new disk is created. The method includes creating a first image of a first disk associated with the first VM and a second image of a second disk associated with the second VM, installing the first image into the first new disk and the second image into the second new disk, and configuring the new VM to include a dual boot function enabling boot up of the new VM with either the first OS or the second OS. | 04-09-2015 |
20150106728 | REMOTE DASHBOARD CONSOLE - A method, system and computer readable medium for remote control of a remote device by a remote dashboard console of a client device. The method includes identifying the remote device for management via the remote dashboard console of the client device. The remote dashboard console receives a set of plug-ins associated with multiple remote device applications installed on the remote device from a remote dashboard agent of the remote device. The remote dashboard console of the client device executes a target application of the multiple remote device applications device using a corresponding plug-in of the set of plug-ins. | 04-16-2015 |
20150227381 | TRANSMITTING ENCAPSULATED SNMP COMMANDS TO VIRTUAL MACHINES - Systems and methods for transmitting encapsulated SNMP commands to virtual machines. An example method may comprise: receiving, from a network device, a first Simple Network Management Protocol (SNMP) request, the first SNMP request being directed to a virtual machine executing on a host device; encapsulating the SNMP request with a virtualization manager executing on the host device; and providing the encapsulated SNMP request to the virtual machine. | 08-13-2015 |
20150227382 | MONITORING VIRTUAL MACHINE PROTOCOLS, SERVICES, AND OPERATIONS - Systems and methods for monitoring virtual machine protocols, services, and operations. An example method may comprise: initiating a connection to a virtual machine; receiving service data, the service data pertaining to one or more services installed on the virtual machine, and protocol data pertaining to one or more protocols utilized by the virtual machine; generating, with a processing device and in view of at least one of the service data or the protocol data, one or more configuration commands, the one or more configuration commands corresponding to at least one of the one or more services or the one or more protocols; and transmitting the one or more configuration commands to the virtual machine. | 08-13-2015 |