Patent application number | Description | Published |
20080263553 | Dynamic Service Level Manager for Image Pools - An embodiment of the present invention relates to the field of computer technology, in particular it relates to a method for provisioning images for virtual machines, wherein for a predefined application type a pool of at least one image of a virtual machine performing said application is loaded in the main memory of the computer. | 10-23-2008 |
20090063673 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 03-05-2009 |
20090293064 | SYNCHRONIZING SHARED RESOURCES IN AN ORDER PROCESSING ENVIRONMENT USING A SYNCHRONIZATION COMPONENT - An order processing system including an order processing container, a factory registry, a relationship registry, and synchronization function component. The order processing system can handle orders, which are build plans including a set of tasks. The tasks can specify programmatic actions which may include creation, deletion, and modification of resources and resource topologies. The order processing container can be central engine that programmatically drives order processing actions. The factory registry can support a creation and deletion of resource instances in a resource topology defined by at least one order. The relationship registry can maintain relationships among resources. The synchronization function component can permit transparent usage of shared resources in accordance with shared usage resource topology parameters specified within processed orders. | 11-26-2009 |
20110125914 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 05-26-2011 |
Patent application number | Description | Published |
20100114977 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR ENABLING FILE SYSTEM TAGGING BY APPLICATIONS - A method for enabling file system tagging by an application includes creating tag associations for the file system by associating a tag with a file object. The association includes allocating a file association structure (FAS) in the storage device, which FAS has attributes including a pointer to a file handle of the file object and a list of names of tags associated with the file object. Associating the tag with a file object also includes allocating a tag structure for each tag in the file system. The tag structure includes a tag name and file associations for the tag. In response to a request for a read directory operation, the method includes retrieving the tag associations to identify the file object, dynamically assembling a directory entry structure that includes a hierarchical view of tags identified from the tag associations and corresponding file object, and returning the directory entry structure to the application. | 05-06-2010 |
20120254370 | METHOD FOR DISTRIBUTING A PLURALITY OF DATA PORTIONS - A method and computer system are provided for distributing a plurality of data portions from a server system to one or more client systems. The method includes receiving one or more first requests at the server, each first request being submitted by a client system and including a portion identifier, wherein a portion identifier is assigned to each data portion; in response to receiving the first request(s), transmitting a list of chunk identifiers to the requesting client systems, wherein the list of chunk identifiers specifies the data chunks whose meta-data includes the portion identifier contained in the first request; and transmitting some or all data chunks of a data chunk library to each of the requesting client systems. At the requesting client system, the client specifically selects the data chunks of the transmitted data chunks which are specified by the received list of chunk identifiers. | 10-04-2012 |
20140047012 | METHOD FOR DISTRIBUTING A PLURALITY OF DATA PORTIONS - A method and computer system are provided for distributing a plurality of data portions from a server system to one or more client systems. The method includes receiving one or more first requests at the server, each first request being submitted by a client system and including a portion identifier, wherein a portion identifier is assigned to each data portion; in response to receiving the first request(s), transmitting a list of chunk identifiers to the requesting client systems, wherein the list of chunk identifiers specifies the data chunks whose meta-data includes the portion identifier contained in the first request; and transmitting some or all data chunks of a data chunk library to each of the requesting client systems. At the requesting client system, the client specifically selects the data chunks of the transmitted data chunks which are specified by the received list of chunk identifiers. | 02-13-2014 |
20140149635 | WORKLOAD MIGRATION BETWEEN VIRTUALIZATION SOFTWARES - A virtual machine (VM) migration from a source virtual machine monitor (VMM) to a destination VMM on a computer system. Each of the VMMs includes virtualization software, and one or more VMs are executed in each of the VMMs. The virtualization software allocates hardware resources in a form of virtual resources for the concurrent execution of one or more VMs and the virtualization software. A portion of a memory of the hardware resources includes hardware memory segments. A first portion of the memory segments is assigned to a source logical partition and a second portion is assigned to a destination logical partition. The source VMM operates in the source logical partition and the destination VMM operates in the destination logical partition. The first portion of the memory segments is mapped into a source VMM memory, and the second portion of the memory segments is mapped into a destination VMM memory. | 05-29-2014 |
20150106952 | PROVIDING ISOLATED ENTROPY ELEMENTS - Embodiments of the invention relate to providing isolated entropy elements for a virtual machine to increase entropy in a computing environment. At least one virtual machine is deployed on a hypervisor. The hypervisor generates entropy elements based on triggers related to a virtual machine. Identifiers are assigned to the entropy elements based on the triggers and the virtual machine. Use of the entropy elements is restricted for the virtual machine based on the assigned identifiers. The increase in entropy through providing isolated entropy elements for a virtual machine deployed on a hypervisor reduces the success of external attacks on data residing within the computing environment. | 04-16-2015 |
20150160962 | SCHEDULING OF PROCESSES USING A VIRTUAL FILE SYSTEM - A process can be scheduled between first and second hosts that using a virtual file system that is shared between the hosts can be used. The process, running on a first hypervisor of the first host, can be scheduled to run on a second hypervisor of the second host. A file can be created that includes the data content of the process address space for the file. The file can be mapped address space of the virtual file system. Data from the physical memory of the first host can be transferred to physical memory of the second host using page fault routines. | 06-11-2015 |
20150160963 | SCHEDULING OF PROCESSES USING A VIRTUAL FILE SYSTEM - A process can be scheduled between first and second hosts that using a virtual file system that is shared between the hosts can be used. The process, running on a first hypervisor of the first host, can be scheduled to run on a second hypervisor of the second host. A file can be created that includes the data content of the process address space for the file. The file can be mapped address space of the virtual file system. Data from the physical memory of the first host can be transferred to physical memory of the second host using page fault routines. | 06-11-2015 |
20150234684 | WORKLOAD MIGRATION BETWEEN VIRTUALIZATION SOFTWARES - A virtual machine (VM) migration from a source virtual machine monitor (VMM) to a destination VMM on a computer system. Each of the VMMs includes virtualization software, and one or more VMs are executed in each of the VMMs. The virtualization software allocates hardware resources in a form of virtual resources for the concurrent execution of one or more VMs and the virtualization software. A portion of a memory of the hardware resources includes hardware memory segments. A first portion of the memory segments is assigned to a source logical partition and a second portion is assigned to a destination logical partition. The source VMM operates in the source logical partition and the destination VMM operates in the destination logical partition. The first portion of the memory segments is mapped into a source VMM memory, and the second portion of the memory segments is mapped into a destination VMM memory. | 08-20-2015 |
Patent application number | Description | Published |
20120137045 | EFFICIENTLY DETERMINING IDENTICAL PIECES OF MEMORY USED BY VIRTUAL MACHINES - Efficiently determining identical pieces of memory within a computer memory area, which is occupied by a virtual machine manager hosting multiple guests and the computer memory area being logically separated into memory pages of a unique size. Each guest is inspected for its structural characteristics by the virtual machine manager. The structural characteristics of each guest are compared by the virtual machine manager, wherein memory regions of guests having a similar structure are identified; and the identical memory pages are identified by the virtual machine manager by comparing hash values of memory pages located within memory regions of guests having a similar structure, wherein identical memory pages are determined by comparing hash values calculated over the contents of the memory pages. | 05-31-2012 |
20120137291 | PLACING A VIRTUAL MACHINE ON A TARGET HYPERVISOR - A method is provided for placing a virtual machine on a target virtual machine manager out of multiple virtual machine managers. System management software is connected to the virtual machine managers and selects the target virtual machine manager for placing the virtual machine. The method includes: the system management software creating a memory profile for all virtual machines hosted on the multiple virtual machine managers, the system management software evaluating probabilities for samepage mapping of the virtual machine to be placed on the multiple virtual machine managers based on the memory profiles of the virtual machines, the system management software selecting under consideration of the probabilities for samepage mapping a most appropriate virtual machine manager as the target virtual machine manager, and the system management software placing the virtual machine on the target virtual machine manager. | 05-31-2012 |
20140101657 | CONCURRENT HYPERVISOR REPLACEMENT - Replacing a source hypervisor by a target hypervisor in a system having a first level hypervisor managing multiple logical partitions to share a set of resources of a server. The source hypervisor enabling at least one source virtual machine to share resources that are assigned to a source logical partition of the multiple logical partitions where the source hypervisor runs, the target hypervisor enabling at least one target virtual machine to share resources that are assigned to a target logical partition of the multiple logical partitions where the target hypervisor runs, wherein memory segments of a physical memory of the server are assigned to the at least one source virtual machine. | 04-10-2014 |
20140123238 | ACCESSING PRIVILEGED OBJECTS IN A SERVER ENVIRONMENT - Accessing privileged objects in a server environment. A privileged object is associated with an application comprising at least one process resource and a corresponding semi-privileged instruction. The association is filed in an entity of an operating system kernel. A central processing unit (CPU) performs an authorization check if the semi-privileged instruction is issued and attempts to access the privileged object. The CPU executes the semi-privileged instruction and grants access to the privileged object if the operating system kernel has issued the semi-privileged instruction; or accesses the entity if a process resource of the application has issued the semi-privileged instruction to determine authorization of the process resource to access the privileged object. Upon positive authorization the CPU executes the semi-privileged instruction and grants access to the privileged object, and upon authorization failure denies execution of the semi-privileged instruction and performs a corresponding authorization check failure handling. | 05-01-2014 |
Patent application number | Description | Published |
20100016466 | Polymerizable dental material - The subject matter of the invention is a radically polymerizable dental material comprising at least two components. A first component of the dental material contains the salt of a CH-acidic compound, and an additional component contains an acid with acidity greater than that of the CH-acidic compound of the first component. Both components contain radically polymerizable monomers. When the two components are mixed, the acid of the second component converts the salt of the CH-acidic compound of the first component into a CH-acidic molecule, and the CH-acidic molecule triggers the radical polymerization of the monomers. In addition to the advantages of CH-acidic compounds in dental materials on the basis of a reactive resin, the invention achieves long-term storage stability as a result of an increase in the proportion of the reactive resin matrix in polymerizable dental materials. | 01-21-2010 |
20100068305 | MIXTURE FOR USE AS A WOUND DRESSING - A subject matter of the invention is a mixture, which comprises:
| 03-18-2010 |
20150094397 | POLYMERIZABLE DENTAL MATERIAL - The subject matter of the invention is a radically polymerizable dental material comprising at least two components. A first component of the dental material contains the salt of a CH-acidic compound, and an additional component contains an acid with acidity greater than that of the CH-acidic compound of the first component. Both components contain radically polymerizable monomers. When the two components are mixed, the acid of the second component converts the salt of the CH-acidic compound of the first component into a CH-acidic molecule, and the CH-acidic molecule triggers the radical polymerization of the monomers. In addition to the advantages of CH-acidic compounds in dental materials on the basis of a reactive resin, the invention achieves long-term storage stability as a result of an increase in the proportion of the reactive resin matrix in polymerizable dental materials. | 04-02-2015 |
Patent application number | Description | Published |
20100005776 | FUEL SUPPLY SYSTEM FOR A GAS-TURBINE ENGINE - On a fuel supply system for a gas-turbine engine with a high-pressure supply line and a fuel metering unit, the fuel distribution system connected to staged or non-staged burners includes only one single fuel line ( | 01-14-2010 |
20110271765 | Method and apparatus for the detection of defects in the raceways of bearing shells and in the rolling elements of ceramic hybrid bearings - This invention relates to a method and an apparatus for the detection of defects in the raceways of bearing shells and the rolling elements of ceramic hybrid bearings. In order to enable the detection of such defects without falsifying the measuring values of the ceramic hybrid bearings installed, the present invention provides that the outer or inner ferromagnetic bearing shell (outer ring | 11-10-2011 |
20130142467 | METHOD AND DEVICE FOR ADJUSTING THE BEARING PLAY IN A CERAMIC HYBRID BEARING - A method and a device for adapting a bearing clearance in a ceramic-hybrid bearing having rolling elements in the form of balls or rollers made from a ceramic material and an outer and an inner bearing shell made from ferromagnetic material. In order to be in a position to adapt the bearing clearance also during operation, a magnetic flux is introduced into an outer side of the stationary, non-rotating bearing shell and exits again at the opposite outer side of the bearing shell, with a magnetic field and an associated magnetic flux being generated, and that a deformation of the bearing shell in the sense of a decrease or increase in the circumference of the bearing shell is brought about due to the resulting magnetostrictive effect from a change in the magnetic flux. | 06-06-2013 |
20150276641 | MEASURING APPARATUS AND METHOD FOR DETECTING FERROMAGNETIC PARTICLES - Measuring apparatus and measuring method for detecting ferromagnetic particles which are movably arranged in a liquid volume, characterized by a magnetic means for generating a magnetic field in the liquid volume, a measuring means for the total electrical resistance of the liquid volume with the ferromagnetic particles therein and a means for checking the function of the measuring apparatus with at least one low-value resistor of between 50 and 500Ω for carrying out a resistance measurement. The invention also describes a magnetic means with an electromagnet which, when in need of cleaning, can be demagnetized by means of correct energization (measured using the normal resistance measurement) and can be magnetized again when started up again. | 10-01-2015 |