Patent application number | Description | Published |
20090300071 | File Synchronization Between Multiple Nodes - Methods and products for storing data for synchronizing one or more files between two or more nodes. One embodiment of the method includes commencing to create a metadata object associated with a file to be synchronized: determining a file location on the or each node; adding the file location of the or each node to the metadata object such that the metadata object includes details relating to the file and the location thereof in one or more of the two or more nodes; and making the metadata object available to predetermined users via a central server. | 12-03-2009 |
20110093743 | Method and System of Updating a Plurality of Computers - Updating a plurality of computers is accomplished. A first message is created in an update source, where the first message includes a one or more instructions and an address of a message repository. The first message is transmitted to a first computer using either a Push or a Pull protocol. A second message is transmitted to the first computer using the Push or Pull protocol, the second message comprising data retrieved from the address in the first message. The first computer executes one or more of the instructions in the first message with at least some of the second message. The address in the first message is updated to match the address of the first computer. The updated first message is transmitting to a further one of the computers. Transmission of the second message is repeated to further ones in the plurality of computers until substantially all of a pre-defined number of computers have been updated. | 04-21-2011 |
20110126187 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR DISTRIBUTING SOFTWARE PATCHES - A software patch management solution ( | 05-26-2011 |
20110154329 | METHOD AND SYSTEM FOR OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk. | 06-23-2011 |
20120131577 | PROVIDING A VIRTUAL MACHINE - A software element database stores software element definitions according to a software element hierarchy. A score is assigned to at least one of the software element based at least in part upon the software element's hierarchy level. Further, virtual machine templates are stored in a library. The virtual machine templates include at least one software element associated with a software element from the software element database. A user enters a specification that specifies desired software elements to be included in the virtual machine via a user interface. After the specification is entered, the a score value is calculated for at least one virtual machine template from the library, based on the scores assigned to the software elements. Using the calculated score, the virtual machine template having the highest score value is selected and the selected virtual machine template is delivered as the virtual machine to a hypervisor. | 05-24-2012 |
20120159448 | COMPUTER PROGRAM TESTING - The invention provides a method and system for testing a software component, by instrumenting the software component under test with a component able to modify the execution of the component under test and able to generate an event corresponding to the performed modification, and by verifying that the order and the content of the event received match a predefined sequence. | 06-21-2012 |
20120159485 | OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk. | 06-21-2012 |
20120185862 | Managing Scheduling of Processes - A mechanism dynamically modifies the base-priority of a spawned set of processes according to their actual resource utilization (CPU or I/O wait time) and to a priority class assigned to them during their startup. In this way it is possible to maximize the CPU and I/O resource usage without at the same time degrading the interactive experience of the users currently logged on the system. | 07-19-2012 |
20120216181 | AUTOMATIC UPGRADE OF VIRTUAL APPLIANCES - A software application distributed as a virtual appliance is automatically installed, updated and removed in a virtual machine system running on top of a virtual machine monitor in a computer. The software application virtual appliance comprises a virtual disk, which is automatically detected and installed or removed at the customer by a virtual disk activation manager program, which executes scripts including commands through an API to the virtual machine monitor. The virtual appliance virtual disk is also created automatically by the software manufacturing using the virtual disk activation manager program. The virtual appliance virtual disk stores the binaries of the software application, a software package created by the software manufacturer using a software package tool, an installer to execute the software package, installation and un-installation scripts and a unique identifier which is a signature for the virtual machine virtual disk. | 08-23-2012 |
20120216199 | PROVIDING A VIRTUAL MACHINE - A software element database stores software element definitions according to a software element hierarchy. A score is assigned to at least one of the software element based at least in part upon the software element's hierarchy level. Further, virtual machine templates are stored in a library. The virtual machine templates include at least one software element associated with a software element from the software element database. A user enters a specification that specifies desired software elements to be included in the virtual machine via a user interface. After the specification is entered, the a score value is calculated for at least one virtual machine template from the library, based on the scores assigned to the software elements. Using the calculated score, the virtual machine template having the highest score value is selected and the selected virtual machine template is delivered as the virtual machine to a hypervisor. | 08-23-2012 |
20130091498 | MAINTENANCE OF VIRTUAL APPLIANCES - Maintenance of a virtual appliance is provided. The virtual appliance comprises a set of software components each one installed on a corresponding virtual machine. A maintenance descriptor is provided comprising an indication of a new level of at least each one of the software components to be updated thereto. For each software component indicated in the maintenance descriptor, a current level is determined of the software component that is installed on the corresponding virtual machine. A set of old ones of the software components to be actually updated is determined according to a comparison between the corresponding current levels and new levels. The virtual appliance is then cloned. The cloned virtual appliance is updated by updating each old software component thereof to the new level. The virtual appliance is now replaced by the updated cloned virtual appliance. | 04-11-2013 |
20130104144 | Application Switching in a Graphical Operating System - A method for application switching in an operating system may be provided. The method may comprise providing at least two active applications on the operating system, and providing a first list of actions related to the first active application, via a first interface, to an application switching manager, and providing a second list of actions related to the second active application, via a second interface, to the application switching manager. Additionally, the method may further comprise selecting an active application out of the at least two active applications together with selecting an action selected from the first list of actions for a first application or a second action for the second list for a second application using a graphical user interface. | 04-25-2013 |
20130152084 | Controlling Usage of Virtual Disks Before Their Attachment to Virtual Machines - Controlling usage of virtual disks in a data-processing center hosting a set of virtual machines is described where each virtual disk comprises a set of software artifacts. A corresponding method comprises detecting a request of adding a new virtual disk comprising a set of new software artifacts to a selected one of the virtual machines, determining composition information of the new virtual disk, which includes an indication of the new software artifacts, retrieving an indication of usage entitlements of the new software artifacts in the data-processing center, enabling or preventing the attachment of the new virtual disk to the selected virtual machine according to a comparison between the composition information and the usage entitlements, attaching the new virtual disk to the selected virtual machine in response to the enabling thereof, and updating the usage entitlements in response to the attachment of the new virtual disk. | 06-13-2013 |
20130305097 | COMPUTER PROGRAM TESTING - To centrally manage execution of tests of software in an event oriented manner, a test execution engine reads a first test case from a test case component, where the test case represents tasks that have to be run to test a first procedure of a software program under evaluation. Further, the test execution engine identifies a participant node configured for sending events to an event queue and obtains events from the event queue. With those obtained events, the test execution engine evaluates whether the first procedure of the software program executed successfully and indicates whether the first procedure executed properly. The participant node has a node agent transmits events about the procedure and the first test case to the event queue. | 11-14-2013 |
20140115285 | RECONFIGURING A SNAPSHOT OF A VIRTUAL MACHINE - Techniques for reconfiguring a snapshot of a virtual machine (VM) may be provided. The VM may be deployed on a hypervisor running on a computer. Techniques comprise provisioning of a VM, installing and configuring an operating system and a base program. A snapshot of the virtual machine may be taken together with the operating system and the base program together with configuration data defining the configuration of the virtual machine, the operating system and base application in a metadata descriptor. All may be stored in a persistent storage. Then the content of the metadata descriptor may be modified, and it may be reverted back to the snapshot using the modified content of the metadata descriptor such that the snapshot of the virtual machine with the operating system and the base program is reconfigured upon deployment of the snapshot including the operating system and the base program. | 04-24-2014 |
20140244821 | Resource Management With Conditioned Policies - A resource management solution based on management policies is provided, where each management policy comprises an indication of a management activity and at least one of the management policies comprising an indication of an application condition. A corresponding method comprises deploying a set of operative management policies assigned to each one of a set of target computing machines onto the target computing machine to cause the target computing machine to verify the application condition of each assigned operative management policy according to status information available on the target computing machine. | 08-28-2014 |
20140331226 | RECONFIGURING A SNAPSHOT OF A VIRTUAL MACHINE - Techniques for reconfiguring a snapshot of a virtual machine (VM) may be provided. The VM may be deployed on a hypervisor running on a computer. Techniques comprise provisioning of a VM, installing and configuring an operating system and a base program. A snapshot of the virtual machine may be taken together with the operating system and the base program together with configuration data defining the configuration of the virtual machine, the operating system and base application in a metadata descriptor. All may be stored in a persistent storage. Then the content of the metadata descriptor may be modified, and it may be reverted back to the snapshot using the modified content of the metadata descriptor such that the snapshot of the virtual machine with the operating system and the base program is reconfigured upon deployment of the snapshot including the operating system and the base program. | 11-06-2014 |
Patent application number | Description | Published |
20090106747 | DYNAMIC CLASS LOADING - According to one embodiment of the present invention a method is disclosed. The method includes requesting a class to be dynamically loaded during program execution. The class includes an attribute. A properties file is searched for the attribute. An associated delegation policy is found in the properties file. The associated delegation policy is associated with the attribute. The class is loaded by applying the associated delegation policy. | 04-23-2009 |
20090282097 | Method and System for Ensuring Consistency Over Time of Data Gathered By Distinct Software Applications - A method for keeping synchronized data collected by a first and at least one second software applications from respective information sources and stored in a respective first and second data repositories. The method comprises: a) receiving a request to refresh data stored in the first data repository; b) causing the at least one second software application to collect data from the respective information source; c) receiving the data collected by the first and the at least one second software applications from the respective information sources, and d) uploading the received data to the respective first and second repositories. | 11-12-2009 |
20100023521 | SYSTEM AND METHOD FOR MANAGING LOCKS ACROSS DISTRIBUTED COMPUTING NODES - A method and system for managing locks for one or more resources in a distributed system including multiple distributed computing nodes, is provided. One implementation involves maintaining a database as a shared storage accessible by plural participating nodes for storing shared lock information, each participating node locally managing a local list of locks, the participating nodes cooperating in providing decentralized lock management across the nodes using the local and shared lock information, to achieve granting and releasing of locks for synchronizing access to one or more resources. | 01-28-2010 |
20100049959 | METHOD AND SYSTEM FOR CONFIGURATION OF COMPONENTIZED SOFTWARE APPLICATIONS - A method and system for centrally managing configuration of software application components, is provided. One implementation involves creating configuration metadata for each component of the application; providing a specific configuration for a component; checking validity of the specific configuration using the metadata for said component; and monitoring the application component configuration for consistency with said specific configuration. | 02-25-2010 |
20140143529 | CONFIGURATION OF COMPONENTIZED SOFTWARE APPLICATIONS - Centrally managing configuration of software application components includes creating configuration metadata for each component of the application; providing a specific configuration for a component; checking validity of the specific configuration using the metadata for said component; and monitoring the application component configuration for consistency with said specific configuration. | 05-22-2014 |
Patent application number | Description | Published |
20120110483 | MULTI-DESKTOP MANAGEMENT - A transparency percentage value is associated with each application icon defined for active executable applications using a computing system. At least one application that is active on a desktop screen is collected for each of at least two different visual attribute values collected from a user. The different collected visual attribute values are displayed with a pointing widget. The icons of the applications are displayed using a transparency percentage value of zero percent (0%) for icons corresponding to the visual attribute value currently pointed to and a transparency percentage value of one hundred percent (100%) for any other icon that is not currently pointed to. In response to detecting a change by the user from a current visual attribute value to a different new visual attribute value pointed to by the pointing widget, the transparency percentage values of the application icons are adjusted based upon the new visual attribute value. | 05-03-2012 |
20120137101 | OPTIMIZING MEMORY MANAGEMENT OF AN APPLICATION RUNNING ON A VIRTUAL MACHINE - A method, system and computer program product for optimizing memory usage of an application running on a virtual machine. A virtual machine memory block is pre-allocated and the average memory usage of the virtual machine is periodically computed using statistics collected from the virtual machine through an API. If the memory usage average becomes higher than a maximum threshold, then a recovery mode is entered by releasing the virtual machine memory block and forcing the running application to reduce its processing activity; optionally, a garbage collector cycle can be forced. If the computed memory usage average becomes lower than a minimum threshold value, which is lower than the maximum threshold value, then a normal mode is entered by re-allocating the virtual machine memory block and forcing the running application to resumes its normal processing activity. Optionally, when the virtual machine is idle, a deep garbage collection is forced. | 05-31-2012 |
20120151488 | Measuring Transaction Performance Across Application Asynchronous Flows - A mechanism modifies a deployment descriptor of each application component including at least one producer application component or consumer application component, by adding, for each producer application component or consumer application component, an application component identifier, a producer or consumer type, and a recipient identifier of a recipient the application component uses. Responsive to determining a match exists and the given application component is of producer type, the application server virtual machine logs an identifier of a recipient containing a message sent by the given application component, a correlation identifier of the given application component, and an execution start time. Responsive to determining a match exists and the given application component is of consumer type, the application server virtual machine logs an identifier of the recipient resource containing a message processed by the given application component, a correlation identifier of the given application component, and an execution end time. | 06-14-2012 |
20120317546 | METHOD AND SYSTEM FOR CHECKING THE CONSISTENCY OF APPLICATION JAR FILES - A computer method and system dynamically provide consistency of Java application files. A processor executed routine is configured (e.g., instrumented as an agent) to intercept each class that is loaded into a subject Java application or JVM. The system computes a cyclic redundancy check (CRC) of the respective JAR file surrounding the loaded class. The system compares the computed CRC value to a CRC value of at least one other copy of the respective JAR file. Based on the comparison, the system determines consistency (e.g., same version) of the multiple copies of the respective JAR file used by the subject Java application. If the multiple copies of the respective JAR file are determined to be inconsistent, the system alerts the user and/or enables the application to abort. | 12-13-2012 |
20120317563 | METHOD AND SYSTEM FOR CHECKING THE CONSISTENCY OF APPLICATION JAR FILES - A computer method and system dynamically provide consistency of Java application files. A processor executed routine is configured (e.g., instrumented as an agent) to intercept each class that is loaded into a subject Java application or JVM. The system computes a cyclic redundancy check (CRC) of the respective JAR file surrounding the loaded class. The system compares the computed CRC value to a CRC value of at least one other copy of the respective JAR file. Based on results of the comparison, the system determines consistency (e.g., same version) of the multiple copies of the respective JAR file used by the subject Java application. If the multiple copies of the respective JAR file are determined to be inconsistent, the system alerts the user and/or enables the application to abort. The comparative CRC value may be stored in a repository; and the step of comparing looks up the stored CRC value in the repository. | 12-13-2012 |
20130007713 | AUTOMATED TESTING PROCESS - A method, computer program product, and system for automating a test environment is provided. The method may include providing, at one or more computing devices, a superclass and a class-under-test, the superclass and the class-under-test having an inheritance chain therebetween. The method may further include inserting, via the computing device, an intermediate mock class between the superclass and the class-under-test. The method may also include automatically modifying, via the computing device, the class-under-test at runtime. | 01-03-2013 |
20130007714 | AUTOMATED TESTING PROCESS - A method, computer program product, and system for automating a test environment is provided. The method may include providing, at one or more computing devices, a superclass and a class-under-test, the superclass and the class-under-test having an inheritance chain therebetween. The method may further include inserting, via the computing device, an intermediate mock class between the superclass and the class-under-test. The method may also include automatically modifying, via the computing device, the class-under-test at runtime. | 01-03-2013 |
20130174156 | Measuring Transaction Performance Across Application Asynchronous Flows - A mechanism modifies a deployment descriptor of each application component including at least one producer application component or consumer application component, by adding, for each producer application component or consumer application component, an application component identifier, a producer or consumer type, and a recipient identifier of a recipient the application component uses. Responsive to determining a match exists and the given application component is of producer type, the application server virtual machine logs an identifier of a recipient containing a message sent by the given application component, a correlation identifier of the given application component, and an execution start time. Responsive to determining a match exists and the given application component is of consumer type, the application server virtual machine logs an identifier of the recipient resource containing a message processed by the given application component, a correlation identifier of the given application component, and an execution end time. | 07-04-2013 |
20140147052 | Detecting Broken Lamps In a Public Lighting System Via Analyzation of Satellite Images - A computer receives a first image of a plurality of lamps. The computer receives a second image of a plurality of lamps. The computer transforms the second image so a location depicted in a plurality of pixels of the first image is depicted in a corresponding plurality of pixels in the second image. The computer determines a brightness variation exists between a pixel of the plurality of pixels of the second image and a corresponding pixel of the plurality of pixels of the first image. The computer identifies a location corresponding to the pixel of the plurality of pixels of the second image where the brightness variation exists. | 05-29-2014 |