Patent application number | Description | Published |
20110082929 | PROVIDER PRESENCE INFORMATION - In some embodiments, a client computer includes a memory, a client presence program adapted to be located in the memory, and a processor. The processor is coupled to the memory and is adapted to execute the client presence program to receive provider presence information from an instant messaging (IM) server and to store the provider presence information in the memory. The provider presence information includes at least a provider status for at least one service provider. | 04-07-2011 |
20110087778 | PROVIDER PRESENCE INFORMATION - In some embodiments, a client computer includes a memory, a client presence program adapted to be located in the memory, and a processor. The processor is coupled to the memory and is adapted to execute the client presence program to receive provider presence information from an instant messaging (IM) server and to store the provider presence information in the memory. The provider presence information includes at least a provider status for at least one service provider. | 04-14-2011 |
20140096235 | Method and Apparatus for Dishonest Hardware Policies - A system implements dishonest policies for managing unauthorized access requests. The system includes memory management hardware to store a set of dishonest policy bits, each dishonest policy bit that is configured to a predetermined value indicating disallowed access for one of a set of memory ranges. When a processor receives an access request for a location in a memory range to which access is not allowed as indicated by a set dishonest policy bit, the processor returns a false indication according to a dishonest policy that the requested access has been performed. | 04-03-2014 |
Patent application number | Description | Published |
20080276235 | VIRTUAL MACHINE MANAGEMENT USING PROCESSOR STATE INFORMATION - A method, system, and apparatus are provided for virtual machine management. According to one embodiment, processor state information associated with a processor is evaluated, and the processor state information is used to manage one or more virtual machines. | 11-06-2008 |
20140095896 | EXPOSING CONTROL OF POWER AND CLOCK GATING FOR SOFTWARE - A processor includes at least one power domain, each power domain including at least one core that switchably receives power supply from a voltage regulator and switchably receives a clock signal from a clock source, a cache, and at least one control registers having stored thereon data indicating power management states of the at least one power domain and the cache. | 04-03-2014 |
20140172906 | TIME-SHIFTING IMAGE SERVICE - Methods and systems may provide for obtaining a query image of a scene, wherein the query image includes embedded information and represents the scene at a time of capture. The embedded information may include location data and perspective data. Additionally, user input may be received, wherein the user input identifies a different time than the time of capture. A time-shifted image of the scene may be obtained based on the user input and the embedded information in the query image. Crowd sources and/or other public information sources may also be used to obtain the time-shifted image. In one example, the time-shifted image represents the scene at the different time. | 06-19-2014 |
20150067683 | VIRTUAL ENVIRONMENT MANAGER - A virtual environment manager (“VEM”) simplifies the usability of virtual machines and provides users with an enhanced design for creating and/or for managing virtual machines (“VMs”). For example, a user can select description information and management information to be included in descriptors and according to which a VEM will create and manage various VM environments for various host environments. The VEM automatically creates the VM environments and host environments by sending descriptor description information and data files associated with the description information to virtual machine monitors (VMMs), which create the VM environments according to the description information. A VEM at each host may manage VM environments executed by the VMM, according to the descriptor management information. Thus, a set of descriptors to create and manage a set of VMs for a home computer may be easily modified by a user to create and manage a set of VMs for a work or laptop computer. | 03-05-2015 |
20150067684 | VIRTUAL ENVIRONMENT MANAGER - A virtual environment manager (“VEM”) simplifies the usability of virtual machines and provides users with an enhanced design for creating and/or for managing virtual machines (“VMs”). For example, a user can select description information and management information to be included in descriptors and according to which a VEM will create and manage various VM environments for various host environments. The VEM automatically creates the VM environments and host environments by sending descriptor description information and data files associated with the description information to virtual machine monitors (VMMs), which create the VM environments according to the description information. A VEM at each host may manage VM environments executed by the VMM, according to the descriptor management information. Thus, a set of descriptors to create and manage a set of VMs for a home computer may be easily modified by a user to create and manage a set of VMs for a work or laptop computer. | 03-05-2015 |
20150074663 | VIRTUAL ENVIRONMENT MANAGER - A virtual environment manager (“VEM”) simplifies the usability of virtual machines and provides users with an enhanced design for creating and/or for managing virtual machines (“VMs”). For example, a user can select description information and management information to be included in descriptors and according to which a VEM will create and manage various VM environments for various host environments. The VEM automatically creates the VM environments and host environments by sending descriptor description information and data files associated with the description information to virtual machine monitors (VMMs), which create the VM environments according to the description information. A VEM at each host may manage VM environments executed by the VMM, according to the descriptor management information. Thus, a set of descriptors to create and manage a set of VMs for a home computer may be easily modified by a user to create and manage a set of VMs for a work or laptop computer. | 03-12-2015 |