Patent application number | Description | Published |
20080209445 | METHODS AND SYSTEMS FOR AUTOMATICALLY DETERMINING CONFIGURATION PARAMETERS - Techniques are disclosed for automatically determining one or more configuration parameters associated with one or more programs executable by a computing system. For example, in a system including at least one application and at least one parameter which affects a behavior of the at least one application, a method for determining a frequency for invoking the at least one application includes the following steps. The method estimates a cost which includes overhead resulting from invoking the at least one application. The method estimates an improvement in the behavior resulting from modifying the at least one parameter based on invoking the at least one application. The method selects the frequency based on the cost and the improvement. | 08-28-2008 |
20080256356 | SECURE MEDIA BROADCASTING USING TEMPORAL ACCESS CONTROL - Improved key management techniques are disclosed for temporal access control of one or more services in a computer network. For example, a method for providing access control in a client-server system includes the following steps. A client obtains an authorization key for a time interval. A server derives an encryption key corresponding to a given time and uses the encryption key to encrypt a message. The client derives a decryption key corresponding to the given time and decrypts the message. | 10-16-2008 |
20080256357 | METHODS AND APPARATUS FOR ACCESS CONTROL IN SERVICE-ORIENTED COMPUTING ENVIRONMENTS - Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. At least one service of the plurality of services is invoked. State information is associated with the at least one service invoked. The state information is used to authenticate a client with at least one service. Further, a method for access control in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. A rule specification language is provided. At least one rule is specified using the rule specification language. A verification is performed to determine whether or not the client satisfies the at least one rule. The client is granted access to a service when the client satisfies the at least one rule. | 10-16-2008 |
20080256534 | METHOD FOR IMPROVED IMAGE-CUSTOMIZATION BY USE OF EMBEDDED METADATA - The present invention relates to a method for the customization of virtual machine images. The method comprises identifying and retrieving a virtual machine image template. A customized virtual machine image is created from the virtual machine image template. The customized virtual machine image template being created by identifying at least one file-system or memory image that is associated with the virtual machine image template, identifying within the at least one file-system or memory image at least one data set, wherein the at least one data set comprises metadata. The metadata contains information detailing the required execution context customization aspects for at least one specified image subset of the virtual machine. Execution context-specific information that is required to customize the image subset of the virtual machine is retrieved. Further, the image subset of the virtual machine is modified in accordance with the retrieved execution context-specific information. | 10-16-2008 |
20080271016 | HYPERVISOR WITH CLONING-AWARENESS NOTIFICATIONS - A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining. | 10-30-2008 |
20080275646 | METHOD AND SYSTEM FOR MINIMAL DETOUR ROUTING WITH MULTIPLE STOPS - The present invention provides a system and method for optimizing routes that include multiple stops. This is accomplished by allowing users to identify a starting point, a destination, and types of businesses or other locations to be visited along the way. A route processor then provides users with a list of stores or other requested detour choices yielding a trip of optimal itinerary. The detour choices may be either an ordered sequence or an unordered set of points to be visited and may include constraints that make it possible to optimize utility functions according to user preferences. | 11-06-2008 |
20090037879 | METHOD AND SYSTEM FOR INTEGRATING MODEL-BASED AND SEARCH-BASED AUTOMATIC SOFTWARE CONFIGURATION - Techniques are disclosed for integrating a model-based approach with a search-based approach for automatic configuration of a computer system. For example, in one such technique, a method for automatically configuring at least one computer system includes obtaining at least one model describing one or more effects of at least one configuration parameter on a behavior of the computer system, and modifying a process for searching for at least one acceptable value for the configuration parameter based on the model. | 02-05-2009 |
20090077090 | METHOD AND APPARATUS FOR SPECIFYING AN ORDER FOR CHANGING AN OPERATIONAL STATE OF SOFTWARE APPLICATION COMPONENTS - A computer implemented method, apparatus, and computer usable program product for managing a distributed software application. The process identifies metadata describing a set of dependencies of a set of software components in the distributed software application from data associated with the set of software components. The process then identifies a sequence for changing an operational state of the set of software components of the distributed software application from the metadata to form an identified sequence. Thereafter, the process changes the operational state of the set of software components using the identified sequence. | 03-19-2009 |
20090106748 | METHOD AND SYSTEM FOR UPGRADING VIRTUAL RESOURCES - A system for upgrading a multi-tiered application. In response to receiving a request to upgrade a multi-tiered application, wherein components of the multi-tiered application are deployed across a plurality of virtual machines, an appropriate integrated patch is selected for the upgrade. The selected integrated patch includes an integrated set of patches for the components of the multi-tiered application, state update data, and order constraints. The components of the multi-tiered application specified in the selected integrated patch are upgraded by using the integrated set of patches and order constraints. In addition, the state of the components of the multi-tiered application are updated by using the state update data. Then, the updated state of the multi-tiered application is saved to storage. | 04-23-2009 |
20100235632 | PROTECTING AGAINST DENIAL OF SERVICE ATTACKS USING TRUST, QUALITY OF SERVICE, PERSONALIZATION, AND HIDE PORT MESSAGES - According to an embodiment of the invention, a system for processing a plurality of service requests in a client-server system includes a challenge server for: presenting a cryptographic challenge to the client; initializing a trust cookie that encodes a client's initial priority level after the client correctly solves the cryptographic challenge; computing a trust level score for the client based on a service request wherein said trust level score is associated with an amount of resources expended by the server in handling the service request such that a higher trust level score is computed for service requests consuming less system resources; assigning the trust level score to the client based on the computation; and embedding the assigned trust level score in the trust cookie included in all responses sent from the server to the client. The system further includes an application server coupled with a firewall. | 09-16-2010 |
20110047133 | Systems and Methods Involving Virtual Machine Images - A method comprises receiving a first virtual machine image, processing the first virtual machine image with a Mirage transformation, and generating a first manifest including a mapping of hierarchical names of content of the first virtual machine image to content identifiers. | 02-24-2011 |