Patent application number | Description | Published |
20090070781 | METHOD AND APPARATUS FOR INTERFACING WITH A COMPUTER USER VIA VIRTUAL THUMBNAILS - Methods and apparatus of interfacing with a computer user via virtual thumbnails are disclosed. The system determines the number of zones for each virtual thumbnail, the variable to represent in each zone, and the current state of each of those variables. The system then dynamically renders each of the virtual thumbnails accordingly. For example, if the top-left zone of a virtual thumbnail is to indicate the current operating system associated with a virtual machine, and the current operating system for that virtual machine is Microsoft Windows, then the system displays a flying window icon in the top-left zone of that virtual thumbnail. Once the virtual thumbnail are displayed, the system looks for events associated with the virtual thumbnails (e.g., a click in one of the zones) and executes instructions in response to detecting those events (e.g., show virtual thumbnails indicative of the operating system's services if the operating system zone of a virtual thumbnail is clicked). | 03-12-2009 |
20090138869 | METHODS AND APPARATUS FOR STORING AND TRANSMITTING HISTORICAL CONFIGURATION DATA ASSOCIATED WITH INFORMATION TECHNOLOGY ASSETS - Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets are disclosed. The system reads and stores a first version of data with a timestamp. The system then performs a local update by reading a second version of data with a timestamp, replacing the first set of data and timestamp, and storing the changes between the first and second versions of data. The system also may receive update requests from a remote location for the latest version of data. The changes between versions of data are sent to the remote location, where the changes between versions of data are stored and are usable to create the requested latest version of data and/or prior versions of data. | 05-28-2009 |
20090138877 | METHODS AND APPARATUS FOR LOCATING AN UNAUTHORIZED VIRTUAL MACHINE - Methods and apparatus of locating an unauthorized virtual machine are disclosed. A virtual machine is registered with a management system. When the virtual machine is requested to start, the system determines whether the virtual machine is in an authorized environment. In an authorized environment, the virtual machine is enabled to operate normally. In an unauthorized environment, the virtual machine is disabled. The disabled virtual machine gathers information about the unauthorized environment and transmits the information to the virtual machine owner. | 05-28-2009 |
20120284715 | COMPLIANCE-BASED ADAPTATIONS IN MANAGED VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing. | 11-08-2012 |
20120291030 | COMPLIANCE-BASED ADAPTATIONS IN MANAGED VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing. | 11-15-2012 |
20130232122 | METHODS AND APPARATUS FOR STORING AND TRANSMITTING HISTORICAL CONFIGURATION DATA ASSOCIATED WITH INFORMATION TECHNOLOGY ASSETS - Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets are disclosed. The system reads and stores a first version of data with a timestamp. The system then performs a local update by reading a second version of data with a timestamp, replacing the first set of data and timestamp, and storing the changes between the first and second versions of data. The system also may receive update requests from a remote location for the latest version of data. The changes between versions of data are sent to the remote location, where the changes between versions of data are stored and are usable to create the requested latest version of data and/or prior versions of data. | 09-05-2013 |
20130232586 | METHODS AND APPARATUS FOR LOCATING AN UNAUTHORIZED VIRTUAL MACHINE - Methods and apparatus of locating an unauthorized virtual machine are disclosed. A virtual machine is registered with a management system. When the virtual machine is requested to start, the system determines whether the virtual machine is in an authorized environment. In an authorized environment, the virtual machine is enabled to operate normally. In an unauthorized environment, the virtual machine is disabled. The disabled virtual machine gathers information about the unauthorized environment and transmits the information to the virtual machine owner. | 09-05-2013 |
20130247045 | AUTOMATIC OPTIMIZATION FOR VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing. | 09-19-2013 |
20140082621 | AUTOMATIC OPTIMIZATION FOR VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing. | 03-20-2014 |
20140289730 | METHODS AND APPARATUS FOR USING TAGS TO CONTROL AND MANAGE ASSETS - By implementing various types of tags, easy management and control of assets in a business system is enabled. These assets may be virtual machines, hardware assets, personnel assets, etc. System tags are determined and associated with an asset automatically. Virtual tags and dynamic tags are tags that do not contain the information sought—rather, these tags contain instructions about how to determine the tag value associated with an asset. Management tags are user-entered tags indicating information about an asset based on the knowledge of an individual. These tags can be combined using Boolean algebraic operators, resulting in a tag-based algebra system, which enables a Tag-Based Query Language for searching a universe of assets based on the associated tags. Additionally, tag-based algebra enables access control based on tags associated with a user, assets in a universe of assets, and enables policies to be enforced in a universe of assets. | 09-25-2014 |
20140380412 | COMPLIANCE-BASED ADAPTATIONS IN MANAGED VIRTUAL SYSTEMS - Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing. | 12-25-2014 |