Patent application number | Description | Published |
20130019016 | PRE-PROVISIONING VIRTUAL MACHINES IN A NETWORKED COMPUTING ENVIRONMENTAANM Anderson; Jason L.AACI San JoseAAST CAAACO USAAGP Anderson; Jason L. San Jose CA USAANM Boss; Gregory J.AACI SaginawAAST MIAACO USAAGP Boss; Gregory J. Saginaw MI USAANM Coveyduc; Jeffrey L.AACI San JoseAAST CAAACO USAAGP Coveyduc; Jeffrey L. San Jose CA USAANM Roach; Christopher W.AACI San JoseAAST CAAACO USAAGP Roach; Christopher W. San Jose CA US - In general, embodiments of the present invention provide an approach for pre-provisioning cloud computing resources such as virtual machines (VMs) in order to achieve faster and more consistent provisioning times. Embodiments of the present invention describe an approach to generate a pre-provisioned pool of virtual machines that are utilized when one or more consumers start to initiate a large volume of requests (e.g., instantiate/populate multiple e-commerce ‘shopping carts’). In a typical embodiment, a selection of an operating system to be associated with a VM is received in a computer data structure. A provisioning of the VM will then be initiated based on the selection of the operating system. Thereafter, at least one selection of at least one software program to be associated with the VM will be received in the computer data structure. The provisioning of the VM can then be completed based on the at least one selection of the at least one software program in response to a provisioning request received in the computer data structure. | 01-17-2013 |
20130036226 | OPTIMIZATION OF RESOURCE PROVISIONING IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide an approach for pre-provisioning computing resource sub-components in order to achieve improved overall provisioning times. In a typical embodiment, when a workload request is received, a set/sequence of tasks needed to complete the workload request is identified. Based on the set of tasks, a set of corresponding computing resources is determined. Rather than provision each computing resource as a whole, embodiments of the present invention break each computing resource into its individual sub-components. Once the sub-components are identified, the time required to provision (i.e., provisioning time) each sub-component is determined (e.g., based on historical data). Based on these provisioning times, an optimal order in which the sub-components should be provisioned is determined, and the sub-components are then provisioned in this order. | 02-07-2013 |
20130055239 | PROVISIONING OF VIRTUAL MACHINE POOLS BASED ON HISTORICAL DATA IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention generally describe how to utilize a pool of raw computing resources to dynamically resize environments due to workloads. Specifically, embodiments of the invention provide an approach for generating a partially pre-provisioned pool of virtual machines (VMs). The pool is typically derived from a history of patterns weighted by a potential state of a corresponding VM image to fulfill a workload request. For each VM instance, this approach determines/calculates the number of times that an instance represents a possible starting point for a VM request. The starting points are then normalized to create a probability distribution of the resulting partially pre-provisioned pool of virtual machines. | 02-28-2013 |
20130055251 | SELECTION OF VIRTUAL MACHINES FROM POOLS OF PRE-PROVISIONED VIRTUAL MACHINES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a set of algorithmic methods that can be used to select which partially and/or pre-provisioned virtual machines (VMs) should be used as a base platform to satisfy a new workload (e.g., provisioning) request received in a networked computing environment (e.g., a cloud computing environment). Specifically, when a workload request is received, a set (e.g., at last one) of software programs needed to process the workload request is identified. Then, a set of VMs is selected from a pool of pre-provisioned VMs having the set of software programs. In general, multiple methods and/or factors can be followed to select the set of VMs. Examples include a length of time to install the set of VMs, a probability of the set of VMs being in demand, and/or or a quantity of the set of VMs having the set of software programs. Once the set of VMs has been selected, the set of VMs may be installed, and the workload request can be processed using the set of software programs. | 02-28-2013 |
20130061221 | DETERMINING VIRTUAL MACHINE IMAGE PATTERN DISTRIBUTIONS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for determining distributions of virtual machine (VM) patterns across pools of VM instances based upon historical data (e.g., to achieve faster provisioning times). In a typical embodiment, a total pool size for a pool of VM instances is determined (e.g., based on historical data). Then, a distribution of a set of VM instance patterns across the pool is determined (e.g., also based upon historical data). Once the distribution has been determined, the pool of VM instances may be provisioned according to the distribution. | 03-07-2013 |
20130103219 | PROTECTING ELECTRONIC DEVICES FROM ELECTRICAL SUPPLY DISTURBANCES - Embodiments of the present invention provide an approach for monitoring electrical disturbance (e.g., surges, outages, etc.) possibilities, and then automatically isolating electronic devices (also referred to herein as electronics) for the duration of the disturbance (or threat thereof). In a typical embodiment, a probability of an electrical disturbance occurring at a specified location will be determined. Then, a set of device protection profiles will be accessed. The set of device protection profiles comprises a set of thresholds and a corresponding set of device topologies associated with a set of electronic devices positioned. The set of thresholds in the set of device protection profiles will then be compared to the probability to identify a matching device topology from the set of device topologies. According to the matching device topology, at least one electronic device will be isolated from an electrical power source. | 04-25-2013 |
20130103542 | PROVIDING PERSONALIZED RESULTS FOR GIFT GIVING UTILIZING A DATABASE - An approach for providing personalized results for gift giving utilizing a database is provided. The approach includes reviewing, by a processor, an item list of a recipient, determining an item to provide to the recipient that is not on the item list, and sending the item to the recipient. The item list is stored in one or more databases of at least one of a recipient device, a merchant server, and a third party server, for querying of the item list. | 04-25-2013 |
20130185380 | System and Method for Transferring Applications and Session State to a Secondary Device - A first device transfers a running application to a second device. A first device sends a request to transfer a running application to a second device. The second device determines whether the application is presently installed on the second device. The second device determines whether the application is an application designed to run on a platform of the second device. The second device then receives state information for the application from the first device. In response to receiving the state information, the second device executes a counterpart application utilizing the state information received from the first device. | 07-18-2013 |
20130185383 | Transferring Applications and Session State to a Secondary Device - A first device transfers a running application to a second device. A first device sends a request to transfer a running application to a second device. The second device determines whether the application is presently installed on the second device. The second device determines whether the application is an application designed to run on a platform of the second device. The second device then receives state information for the application from the first device. In response to receiving the state information, the second device executes a counterpart application utilizing the state information received from the first device. | 07-18-2013 |
20130254360 | POLICY IMPLEMENTATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to an approach for resolving and/or implementing policies based on layers of a network stack (e.g., cloud computing stack). Specifically, for a given policy that is being resolved, the system first evaluates the applicability of the policy to each layer in the network stack. For a given policy, the system then evaluates the relative effectiveness of applying the policy to achieve the overall goal of the policy. Based on the best fit evaluation of the relative comparison, the system then decides how and where the policy is enacted (e.g., determines a protocol for implementing the policy). | 09-26-2013 |
20130262189 | ANALYZING METERED COST EFFECTS OF DEPLOYMENT PATTERNS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for analyzing operating costs (e.g., metered cost effects) for deployment patterns (and changes thereto) in a networked computing environment. In a typical embodiment, a deployment pattern for the networked computing environment is identified. The deployment pattern may comprise a set of components arranged in a network topology. Moreover, the set of components may be associated with a set of policies (e.g., stored in a computer memory medium and/or computer storage device). A cost analysis algorithm(s) may then be selected for the deployment pattern. The selected algorithm(s) may then be applied (e.g., to the deployment pattern and/or network computing environment) to analyze the operating costs of the deployment pattern. | 10-03-2013 |
20130262643 | VALIDATING DEPLOYMENT PATTERNS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for validating deployment patterns/topologies (e.g., prior to being deployed) against existing patterns that have already been determined to be compliant (e.g., against a set of policies/standards). In a typical embodiment, individual components of a proposed deployment pattern are identified and then evaluated against previously approved deployment patterns (e.g., based on standards and/or policies). Components of the proposed deployment patterns that are deemed non-compliant are identified, and corrective action(s) may be determined to address any non-compliance (e.g., to put the non-compliant components into compliance, to remove the non-compliant components, etc.). | 10-03-2013 |
20130268638 | MAPPING REQUIREMENTS TO A SYSTEM TOPOLOGY IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for mapping requirements (e.g., functional and/or non-functional requirements) to components and/or policies of a system topology in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of functional requirements is mapped to a set of components. A set of dependencies between the set of functional requirements is then indentified so that a set of interrelationships between the set of components may be identified. A set of non-functional requirements is then mapped to a set of policies that are then applied to the set of components. Based on the set of components, the set of interrelationships, and the set of policies, a system topology is generated. Upon implementation of the system topology, runtime metrics may be collected as feedback that is utilized for refinement of the system topology, as well as a system topology deployed in the future. | 10-10-2013 |
20130268913 | MANAGING APPLICATION TEMPLATE ARTIFACTS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for managing application template artifacts throughout an application's lifecycle in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload template is assigned to each phase of a set of successive phases of the application's lifecycle. Each template typically refers to a template in a preceding phase of the lifecycle. Moreover, the templates may contain pointers to artifacts used in the phases assigned thereto. Any changes occurring in the artifacts/phases are propagated to the corresponding templates so as to automatically manage application lifecycle operations. | 10-10-2013 |
20140001961 | INTELLIGENT AND COORDINATED LIGHTING OF A LIGHTING DEVICE | 01-02-2014 |
20140128022 | PROVIDING NETWORK ACCESS - A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device. | 05-08-2014 |
20140129385 | BANDWIDTH MANAGEMENT - A computer identifies a plurality of available network connections, wherein at least one of the identified network connections is contractually available to the computer under terms of a monthly data plan. The computer determines, based, at least in part, on characteristics of each network connection of the plurality of network connections and anticipated bandwidth consumption of the computer, a network connection to connect to from the plurality of network connections. The computer connects to the determined network connection. The computer determines, based, at least in part, on anticipated bandwidth consumption of the computer and contractual terms of the monthly data plan, an amount of excess bandwidth available for sale. | 05-08-2014 |
20140248851 | PROVIDING NETWORK ACCESS - A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device. In response to a third party computing device agreeing to the terms, the wireless service provider indicates to the mobile computing device to allow the third party computing device to access the cellular network via the mobile computing device. | 09-04-2014 |
20140298337 | OPTIMIZING THE CONFIGURATION OF VIRTUAL MACHINE INSTANCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for optimizing a configuration of virtual machine (VM) instances. In a typical embodiment, such optimization comprises either the splitting of a single VM instance into multiple VM instances or the consolidation of multiple VM instances into fewer (e.g., a single) VM instance. Along these lines, it will first be determined which VM instances would be good candidates for reconfiguration. Under one approach, VM instances that are candidates for reconfiguration are identified based upon an analysis of applicable/associated service level agreement (SLA) terms versus the performance of the VM instances. For example, VM instances can be reconfigured if such reconfiguration will maximize a benefit provided by the applicable SLA terms (e.g., if the splitting of a single VM instance into multiple VM instances would cause a workload to be processed more efficiently, resulting in a more favorable cost/benefit ratio). In another embodiment, candidate VM instances can be identified based upon a commonality of an entity (e.g., a consumer) associated therewith. For example, if a single entity is utilizing multiple VM instances, such VM instances could be considered candidates for consolidation to avoid unnecessary computing resource consumption. | 10-02-2014 |
20140373011 | GENERATING A DEPLOYMENT PATTERN FOR REUSE IN A NETWORKED COMPUTING ENVIRONMENT - An approach for generating a deployment pattern for reuse after the deployment of a set of virtual machines and related application artifacts in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, information associated with one or more previously provisioned application environments is derived and, after analyzing the information, a deployment pattern is created in the form of tangible artifacts which may be reuse for further deployments without the need to trace back the original procedures used to deploy the previously previsioned application environment. | 12-18-2014 |
20150040125 | ALLOWING MANAGEMENT OF A VIRTUAL MACHINE BY MULTIPLE CLOUD PROVIDERS - Embodiments of the present invention provide approaches for allowing management of a virtual machine (VM) by multiple cloud providers in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a system identifies a set of provisioned resources of a VM managed by a first cloud provider, generates a set of artifacts containing information for a second cloud provider to allow co-management of the VM by the first cloud provider and the second cloud provider, and provides access to the set of provisioned resources of the VM to the second cloud provider. As such, a single virtual machine may be managed by multiple (e.g., geographically distinct) cloud providers to cooperatively and selectively execute VM operations because the end product (i.e., VM) from the first and second cloud providers is the same. | 02-05-2015 |
20150046595 | PRE-PROVISIONING VIRTUAL MACHINES IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide an approach for pre-provisioning cloud computing resources such as virtual machines (VMs) in order to achieve faster and more consistent provisioning times. Embodiments of the present invention describe an approach to generate a pre-provisioned pool of virtual machines that are utilized when one or more consumers start to initiate a large volume of requests (e.g., instantiate/populate multiple e-commerce ‘shopping carts’). In a typical embodiment, a selection of an operating system to be associated with a VM is received in a computer data structure. A provisioning of the VM will then be initiated based on the selection of the operating system. Thereafter, at least one selection of at least one software program to be associated with the VM will be received in the computer data structure. The provisioning of the VM can then be completed based on the at least one selection of the at least one software program in response to a provisioning request received in the computer data structure. | 02-12-2015 |