Patent application number | Description | Published |
20130086269 | COLLABORATIVE MANAGEMENT OF SHARED RESOURCES - Collaborative management of shared resources is implemented by a storage server receiving, from a first resource manager, notification of a violation for a service provided by the storage server or device coupled to the storage server. The storage server further receives, from each of a plurality of resource managers, an estimated cost of taking a corrective action to mitigate the violation and selects a corrective action proposed by one of the plurality of resource managers based upon the estimated cost. The storage server directs the resource manager that proposed the selected corrective action to perform the selected corrective action. | 04-04-2013 |
20130086324 | INTELLIGENCE FOR CONTROLLING VIRTUAL STORAGE APPLIANCE STORAGE ALLOCATION - A change in workload characteristics detected at one tier of a multi-tiered cache is communicated to another tier of the multi-tiered cache. Multiple caching elements exist at different tiers, and at least one tier includes a cache element that is dynamically resizable. The communicated change in workload characteristics causes the receiving tier to adjust at least one aspect of cache performance in the multi-tiered cache. In one aspect, at least one dynamically resizable element in the multi-tiered cache is resized responsive to the change in workload characteristics. | 04-04-2013 |
20130132967 | OPTIMIZING DISTRIBUTED DATA ANALYTICS FOR SHARED STORAGE - Methods, systems, and computer executable instructions for performing distributed data analytics are provided. In one exemplary embodiment, a method of performing a distributed data analytics job includes collecting application-specific information in a processing node assigned to perform a task to identify data necessary to perform the task. The method also includes requesting a chunk of the necessary data from a storage server based on location information indicating one or more locations of the data chunk and prioritizing the request relative to other data requests associated with the job. The method also includes receiving the data chunk from the storage server in response to the request and storing the data chunk in a memory cache of the processing node which uses a same file system as the storage server. | 05-23-2013 |
20130166724 | Dynamic Instantiation and Management of Virtual Caching Appliances - A service level objective (SLO) violation is detected for a workload of a networked storage system, based on a performance metric not being satisfied for the workload. In response to detecting the SLO violation, a controller determines that changing a level of caching at a node of the networked storage system will improve the performance metric for the workload. The controller implements the change by adjusting an operation of a virtual cache appliance (VCA) of the networked storage system. The adjusting can be instantiating a new VCA, or adjusting the level of caching at an existing VCA. The adjusting can be for caching related to the workload itself, or it can be caching for an intertering workload. | 06-27-2013 |
20140143282 | GRAPH TRANSOFRMATIONS TO CORRECT VIOLATIONS OF SERVICE LEVEL OBJECTIONS IN A DATA CENTER - Graph transformations are used by a data management system to correct violations of service-level objectives (SLOs) in a data center. In one aspect, a process is provided to manage a data center by receiving an indication of a violation of a service-level objective associated with the data center from a server in the data center. A graph representation and a transformations data container are retrieved by the data management system from data storage accessible to the data management system. The transformations data container includes one or more transformations. The transformation is processed to create a mutated graph from a data center representation from the graph representation. An option for managing the data center is determined as a result of evaluating the mutated graphs. | 05-22-2014 |
20140156777 | DYNAMIC CACHING TECHNIQUE FOR ADAPTIVELY CONTROLLING DATA BLOCK COPIES IN A DISTRIBUTED DATA PROCESSING SYSTEM - A dynamic caching technique adaptively controls copies of data blocks stored within caches (“cached copies”) of a caching layer distributed among servers of a distributed data processing system. A cache coordinator of the distributed system implements the dynamic caching technique to increase the cached copies of the data blocks to improve processing performance of the servers. Alternatively, the technique may decrease the cached copies to reduce storage capacity of the servers. The technique may increase the cached copies when it detects local and/or remote cache bottleneck conditions at the servers, a data popularity condition at the servers, or a shared storage bottleneck condition at the storage system. Otherwise, the technique may decrease the cached copies at the servers. | 06-05-2014 |
20140223014 | COLLABORATIVE MANAGEMENT OF SHARED RESOURCES - Collaborative management of shared resources is implemented by a storage server receiving, from a first resource manager, notification of a violation for a service provided by the storage server or device coupled to the storage server. The storage server further receives, from each of a plurality of resource managers, an estimated cost of taking a corrective action to mitigate the violation and selects a corrective action proposed by one of the plurality of resource managers based upon the estimated cost. The storage server directs the resource manager that proposed the selected corrective action to perform the selected corrective action. | 08-07-2014 |
20140310463 | SYSTEMS AND METHODS FOR TRACKING WORKING-SET ESTIMATES WITH A LIMITED RESOURCE BUDGET - Embodiments of the systems and techniques described here can leverage several insights into the nature of workload access patterns and the working-set behavior to reduce the memory overheads. As a result, various embodiments make it feasible to maintain running estimates of a workload's cacheability in current storage systems with limited resources. For example, some embodiments provide for a method comprising estimating cacheability of a workload based on a first working-set size estimate generated from the workload over a first monitoring interval. Then, based on the cacheability of the workload, a workload cache size can be determined. A cache then can be dynamically allocated (e.g., change, possibly frequently, the cache allocation for the workload when the current allocation and the desired workload cache size differ), within a storage system for example, in accordance with the workload cache size. | 10-16-2014 |
20150046653 | METHODS AND SYSTEMS FOR DETERMINING A CACHE SIZE FOR A STORAGE SYSTEM - Technology for operating a cache sizing system is disclosed. In various embodiments, the technology monitors input/output (IO) accesses to a storage system within a monitor period; tracks an access map for storage addresses within the storage system during the monitor period; and counts a particular access condition of the IO accesses based on the access map during the monitor period. When sizing a cache of the storage system that enables the storage system to provide a specified level of service, the counting is for computing a working set size (WSS) estimate of the storage system. | 02-12-2015 |
20150046654 | CONTROLLING A DYNAMICALLY INSTANTIATED CACHE - A change in workload characteristics detected at one tier of a multi-tiered cache is communicated to another tier of the multi-tiered cache. Multiple caching elements exist at different tiers, and at least one tier includes a cache element that is dynamically resizable. The communicated change in workload characteristics causes the receiving tier to adjust at least one aspect of cache performance in the multi-tiered cache. In one aspect, at least one dynamically resizable element in the multi-tiered cache is resized responsive to the change in workload characteristics. | 02-12-2015 |
20150081836 | PROFILE-BASED LIFECYCLE MANAGEMENT FOR DATA STORAGE SERVERS - Technology is described for a profile-based lifecycle management for data storage servers. The technology can receive a profile, monitor events emitted by devices of the data storage system, determine based on the monitored events that a device of the storage system matches the indicated condition, and perform the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system. The received profile can indicate a condition and an action corresponding to the condition. | 03-19-2015 |
20150081871 | ACTIVELY RESPONDING TO DATA STORAGE TRAFFIC - Technology is described for actively responding to data storage traffic. The technology can provide an application program interface; receive, via the application program interface, from an application, a command to query a data storage attribute associated with a virtual data storage component; query the associated virtual data storage component; and return to the application a value for the data storage attribute. | 03-19-2015 |
20150081893 | FABRIC ATTACHED STORAGE - Technology is described for a profile-based lifecycle management for data storage servers. The technology can receive a profile, monitor events emitted by devices of the data storage system, determine based on the monitored events that a device of the storage system matches the indicated condition, and perform the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system. The received profile can indicate a condition and an action corresponding to the condition. | 03-19-2015 |
20150142942 | NETWORK STORAGE MANAGEMENT AT SCALE USING SERVICE LEVEL OBJECTIVES - Technology is disclosed for managing network storage services by service level objectives (SLOs). The method receives multiple service level capability (SLC) templates; creates at least one storage service level (SSL) instance using at least one of the SLC templates; provisions a storage object located in a network storage infrastructure based on the SSL instance; and services storage requests using the storage object. | 05-21-2015 |
20150234703 | SYSTEM AND METHOD TO PERFORM A BACKUP OPERATION USING ONE OR MORE ATTRIBUTES OF FILES - A system and method for performing a backup operation is described. A source system determines a set of files to be backed up at a backup system. Based on one or more attributes of each file of the set of files, the source system determines an order in which to perform the backup operation for the set of files. The order specifies an individual file of the set of files to be backed up before another file of the set of files. The source system communicates with the backup system to perform the backup operation of the set of files in the determined order. | 08-20-2015 |
20150334203 | OPTIMIZING DISTRIBUTED DATA ANALYTICS FOR SHARED STORAGE - Methods, systems, and computer executable instructions for performing distributed data analytics are provided. In one exemplary embodiment, a method of performing a distributed data analytics job includes collecting application-specific information in a processing node assigned to perform a task to identify data necessary to perform the task. The method also includes requesting a chunk of the necessary data from a storage server based on location information indicating one or more locations of the data chunk and prioritizing the request relative to other data requests associated with the job. The method also includes receiving the data chunk from the storage server in response to the request and storing the data chunk in a memory cache of the processing node which uses a same file system as the storage server. | 11-19-2015 |
20150370486 | DYNAMIC STORAGE MANAGEMENT USING VIRTUAL STORAGE APPLIANCES - The techniques introduced here provide for efficient management of storage resources in a modern, dynamic data center through the use of virtual storage appliances. Virtual storage appliances perform storage operations and execute in or as a virtual machine on a hypervisor. A storage management system monitors a storage system to determine whether the storage system is satisfying a service level objective for an application. The storage management system then manages (e.g., instantiates, shuts down, or reconfigures) a virtual storage appliance on a physical server. The virtual storage appliance uses resources of the physical server to meet the storage related needs of the application that the storage system cannot provide. This automatic and dynamic management of virtual storage appliances by the storage management system allows storage systems to quickly react to changing storage needs of applications without requiring expensive excess storage capacity. | 12-24-2015 |
Patent application number | Description | Published |
20090312549 | METHOD OF PREPARATION OF AZAINDOLE DERIVATIVES - A method of preparing azaindole compounds for antiviral use having the formula | 12-17-2009 |
20100076191 | PROCESS FOR PREPARING TRIAZOLE SUBSTITUTED AZAINDOLEOXOACETIC PIPERAZINE DERIVATIVES AND NOVEL SALT FORMS PRODUCED THEREIN - A process is provided for preparing triazole substituted azaindoleoxoacetic piperazine derivative. Novel intermediates produced in the above process, and novel N-1 and amorphous forms of a 1,2,3-triazole substituted azaindoloxoacetic piperazine derivatives and processes for producing such novel forms are also provided. | 03-25-2010 |
20100210599 | PRODRUGS OF PIPERAZINE AND SUBSTITUTED PIPERIDINE ANTIVIRAL AGENTS - This invention provides for prodrug Compounds I, pharmaceutical compositions thereof, and their use in treating HIV infection. | 08-19-2010 |
20120238755 | SALTS OF PRODRUGS OF PIPERAZINE AND SUBSTITUTED PIPERIDINE ANTIVIRAL AGENTS - This invention provides for prodrug Compounds I, pharmaceutical compositions thereof, and their use in treating HIV infection. | 09-20-2012 |
20130253196 | SALTS OF PRODRUGS OF PIPERAZINE AND SUBSTITUTED PIPERIDINE ANTIVIRAL AGENTS - This invention provides for prodrug Compounds I, pharmaceutical compositions thereof, and their use in treating HIV infection. | 09-26-2013 |
20150025240 | SALTS OF PRODRUGS OF PIPERAZINE AND SUBSTITUTED PIPERIDINE ANTIVIRAL AGENTS - This invention provides for prodrug Compounds I, pharmaceutical compositions thereof, and their use in treating HIV infection. | 01-22-2015 |
20150232414 | SALTS OF PRODRUGS OF PIPERAZINE AND SUBSTITUTED PIPERIDINE ANTIVIRAL AGENTS - This invention provides for prodrug Compounds I, pharmaceutical compositions thereof, and their use in treating HIV infection. | 08-20-2015 |
20150315218 | SALTS OF PRODRUGS OF PIPERAZINE AND SUBSTITUTED PIPERIDINE ANTIVIRAL AGENTS - This invention provides for prodrug Compounds I, pharmaceutical compositions thereof, and their use in treating HIV infection: | 11-05-2015 |
Patent application number | Description | Published |
20130205311 | METHODS AND APPARATUS TO CONTROL A STATE OF DATA COLLECTION DEVICES - Methods and apparatus to control a state of data collection devices are disclosed. An example method includes generating a level of engagement based on an analysis of an audience associated with a media exposure environment; and controlling a state of a data collection device based on the level of engagement. | 08-08-2013 |
20130205314 | METHODS AND APPARATUS TO SELECT MEDIA BASED ON ENGAGEMENT LEVELS - Methods and apparatus to select media based on engagement levels are disclosed. An example method includes generating an engagement level based on information related to an audience member in a media exposure environment; and selecting, based on the engagement level, one of a plurality of media collections from which a piece of media is to be select for presentation in the media exposure environment. | 08-08-2013 |
20130259298 | METHODS AND APPARATUS TO COUNT PEOPLE IN IMAGES - An example method includes analyzing frame pairs of a plurality of frame pairs captured over a period of time to identify a redundant person indication detected in an overlap region, the overlap region corresponding to an intersection of a first field of view of a first image sensor and a second field of view of a second image sensor, each of the frame pairs including a first frame captured by the first image sensor and a second frame captured by the second image sensor; eliminating the identified redundant person indication to form a conditioned set of person indications for the period of time; grouping similarly located ones of the person indications of the conditioned set to form groups; analyzing the groups to identify redundant groups detected in the overlap region; and eliminating the redundant groups from a people tally generated based on the groups. | 10-03-2013 |
20130259299 | METHODS AND APPARATUS TO COUNT PEOPLE IN IMAGES - Methods and apparatus to count people in images are disclosed. An example method includes, in response to determining that a first person indication of a first frame obtained via a first image sensor is redundant to a second person indication of a second frame obtained via a second image sensor, storing a first coordinate of the first person indication in connection with a second coordinate of the second person indication in a database; and in response to detecting a third person indication in a third frame obtained via the first image sensor, querying the database with a third coordinate of the third person indication to determine whether the third coordinate matches the first coordinate. | 10-03-2013 |
20130259380 | METHODS AND APPARATUS TO COUNT PEOPLE IN IMAGES - Methods and apparatus to count people in images are disclosed. An example method includes generating a first fluctuation factor for a first frame by averaging fluctuation values of a random set of pixels of the first frame; generating a second fluctuation factor for a person indication area of the first frame by averaging fluctuation values of pixels of the person indication area; and marking the person indication area as a false positive when the second fluctuation factor is less than or equal to the first fluctuation factor. | 10-03-2013 |
20130259381 | METHODS AND APPARATUS TO COUNT PEOPLE IN IMAGES - Methods and apparatus to count people in images are disclosed. An example method includes dividing a frame of image data into a plurality of segments; calculating first fluctuation factors for the respective segments; calculating a second fluctuation factor for the frame; and identifying ones of the segments having a first fluctuation factor greater than the second fluctuation factor as active segments. | 10-03-2013 |
20130262181 | METHODS AND APPARATUS TO PREDICT AUDIENCE COMPOSITION AND/OR SOLICIT AUDIENCE MEMBERS - Methods and apparatus to predict audience composition and solicit audience members are disclosed. A method to predict audience composition for future media involves obtaining indications of intent from first audience members to consume first media, determining a portion of the first audience members that were actually exposed to the first media, and predicting audience composition for a second media of second audience members based on the portion of the first audience members. | 10-03-2013 |
20140105461 | METHODS AND APPARATUS TO COUNT PEOPLE IN IMAGES - Methods and apparatus to count people in images are disclosed. An example method includes analyzing frame pairs of a plurality of frame pairs captured over a period of time to identify a redundant person indication detected in an overlap region, the overlap region corresponding to an intersection of a first field of view and a second field of view; eliminating the identified redundant person indication to form a conditioned set of person indications for the period of time; grouping similarly located ones of the person indications of the conditioned set to form groups; analyzing the groups to identify redundant groups detected in the overlap region; and eliminating the redundant groups from a people tally generated based on the groups. | 04-17-2014 |
20140254876 | METHODS AND APPARATUS TO COUNT PEOPLE IN IMAGES - Methods and apparatus to count people in images are disclosed. An example method includes maintaining a history of instances in which a person is detected by a first image sensor and by a second sensor different than the first image sensor at approximately a same time, respective ones of the instances including a first coordinate at which a first person was detected via the first image sensor, and a second coordinate at which the first person was detected via the second image sensor; and, in response to first image data captured by the first image sensor including a second person at the first coordinate, determining whether second image data captured by the second image sensor includes the second person without comparing the first image data to the second image data. | 09-11-2014 |
20140254880 | METHODS, APPARATUS AND ARTICLES OF MANUFACTURE TO MONITOR ENVIRONMENTS - Methods, apparatus, and articles of manufacture to monitor environments are disclosed. An example method includes analyzing a first depth value corresponding to a coordinate of an object of an image captured by a depth sensor, the first depth value having been captured with the depth sensor positioned at a first angle relative to a reference axis; moving the depth sensor to a second angle relative to the reference axis, the second angle being different than the first angle; triggering capture of a second depth value at the coordinate with the depth sensor positioned at the second angle; and calculating a depth gradient for the coordinate based on the first and second depth values. | 09-11-2014 |
20140257969 | METHODS AND APPARATUS TO MEASURE EXPOSURE TO MOBILE ADVERTISEMENTS - Methods and apparatus to measure exposure to mobile advertisements are disclosed. An example apparatus includes a panelist database containing first time-location data identifying a first set of physical locations of a first vehicle at corresponding points in time; an advertising vehicle database containing second time-location data identifying a second set of physical locations of a second vehicle at corresponding points in time, the second vehicle to display a first advertisement; and credit logic to determine whether to credit the first vehicle with an exposure to the first advertisement based on the first time-location data and the second time-location data. | 09-11-2014 |
20140270354 | METHODS AND APPARATUS TO MEASURE EXPOSURE TO LOGOS IN VEHICLE RACES - Methods and apparatus to measure logo exposure in vehicle races are disclosed. An example apparatus includes a vehicle database containing first time-location data identifying a first set of physical locations of a first vehicle at corresponding points in time, the first vehicle to display a first logo; a camera database containing time-camera view data identifying a set of views of a camera at corresponding points in time; and credit logic to determine whether to credit the first logo with an exposure to the camera based on the first time-location data and the time-camera view data. | 09-18-2014 |
20140282693 | METHODS AND APPARATUS TO PRESENT SUPPLEMENTAL MEDIA ON A SECOND SCREEN - Methods and apparatus to present supplemental media on a second screen are disclosed. An example method includes obtaining, at a digital media device, media identifying data from audio data of a portion of first media being presented via the digital media device; determining that the portion of the first media is an advertisement based on the media identifying data; detecting, at the digital media device, a command to cause the digital media device to skip the portion of the first media; and providing an indication to a second device in response to detecting the command, the indication to cause the second device to present second media. | 09-18-2014 |
20150189378 | METHODS AND APPARATUS TO COUNT PEOPLE IN AN AUDIENCE - Methods, apparatus, systems and articles of manufacture to count people in an audience are disclosed. An example method includes analyzing location information collected by a portable device indicative of a location of the portable device. The method also includes analyzing proximity information collected by the portable device indicative of when a person is near the portable device. The example method further includes generating presence information based on (1) the location information and (2) the proximity information, the presence information being indicative of whether the person is present in a media exposure environment associated with a media presentation device. | 07-02-2015 |
20150269443 | METHODS AND APPARATUS TO COUNT PEOPLE IN IMAGES - Methods and apparatus to count people in images are disclosed. An example method includes identifying, via a processor, active segments of a plurality of segments of a first frame of image data based on respective fluctuation factors; determining, via the processor, that a first one of the active segments is adjacent to or overlaps with a second one of the active segments; and providing, via the processor, a region of interest in the first frame of image data to an object detection operation, the region of interest including the first and second ones of the active segments and excluding an inactive one of the plurality of segments of the first frame. | 09-24-2015 |
20150281775 | METHODS AND APPARATUS TO CONTROL A STATE OF DATA COLLECTION DEVICES - Methods and apparatus to control a state of data collection devices are disclosed. An example method includes collecting people data from a media exposure environment including a media presentation device; identifying, via a processor, a type of person present in the media exposure environment; when the type of person is a first type of person, refraining from collecting data from the media exposure environment with the processor for a first time period; and when the type of person is a second type of person different than the first type of person, collecting, with the processor, media exposure data from the media exposure environment. | 10-01-2015 |
Patent application number | Description | Published |
20140344081 | System, Method and Article of Manufacture to Facilitate a Financial Transaction Without Unlocking a Mobile Device - A financial transaction is facilitated without unlocking a mobile device, where the lock screen wallpaper of a mobile device is dynamically set to an image having a scanning code (e.g., a QR code, a barcode, etc.) for use at a business location that the user is currently located. | 11-20-2014 |
20140344082 | System, Method and Article of Manufacture to Facilitate a Financial Transaction Without Unlocking a Mobile Device - A financial transaction is facilitated without unlocking a mobile device, where the lock screen wallpaper of a mobile device is dynamically set to an image having a scanning code (e.g., a QR code, a barcode, etc.) for use at a business location that the user is currently located. | 11-20-2014 |
20140344151 | System, Method and Article of Manufacture to Facilitate a Financial Transaction Without Unlocking a Mobile Device - A financial transaction is facilitated without unlocking a mobile device, where the lock screen wallpaper of a mobile device is dynamically set to an image having a scanning code (e.g., a QR code, a barcode, etc.) for use at a business location that the user is currently located. | 11-20-2014 |
20150334219 | DYNAMICALLY REPLACEABLE LOCK SCREEN WALLPAPER - The lock screen wallpaper of a mobile device is temporarily changed so that when a user activates the display without unlocking the phone, he/she can review information that is rendered as the lock screen wallpaper. | 11-19-2015 |
Patent application number | Description | Published |
20150278881 | AUTOMATIC VERIFICATION OF ADVERTISER IDENTIFIER IN ADVERTISEMENTS - Systems and methods for automatically verifying an identifier of a content provider are provided. A first identifier, a content item, and a uniform resource locator are received from a content provider. The domain of the uniform resource locator is determined. A plurality of second resources under the domain are accessed and stored in memory. From the plurality of second resources, a plurality of second identifiers are detected. A map of domain and a plurality of second identifiers is created. Using the map, the first identifier is compared to each of the plurality of second identifiers. If there is a match, the first identifier is approved to be used with the content item. The first identifier may be displayed on a user device with the content item. | 10-01-2015 |
20150287099 | METHOD TO COMPUTE THE PROMINENCE SCORE TO PHONE NUMBERS ON WEB PAGES AND AUTOMATICALLY ANNOTATE/ATTACH IT TO ADS - Systems and methods for automatically extracting a plurality of contact information from a resource, calculating prominence scores of each contact information, and associating a selected contact information with a content item are provided. A content item and a uniform resource locator are received from a content provider. A resource identified by the uniform resource locator is loaded. A plurality of contact information is detected from the loaded resource. For each of the detected contact information, a prominence score is calculated. One of the plurality of contact information is selected based on the calculated prominence scores. The selected contact information is associated with the content item. | 10-08-2015 |
20160005023 | CONDUCTING FINANCIAL TRANSACTIONS BY TELEPHONE - A method for completing financial transactions by telephone comprises a user that indicates a desire to conduct a financial transaction with a merchant using financial account information maintained by an account system. The merchant determines the user's telephone number and prepares a request to the account system for data to complete the financial transaction. The account system prepares a request for authorization to transmit the data to the merchant to complete the financial transaction and transmits the request to a user device. The user device displays the request for authorization, and the user's authorization is transmitted to the account system. Upon receipt of the authorization, the account system account management system prepares limited use financial account for the transaction with the user and transmits the data to the merchant. The merchant completes the financial transaction requested by the user during the telephone call using the received data. | 01-07-2016 |
20160034946 | SYSTEM AND METHOD FOR PROVIDING AND MANAGING THIRD PARTY CONTENT WITH CALL FUNCTIONALITY - Systems and methods for implementing an online content item campaign with selective call functionality can include a processor determining a rendering frequency of instances of a third-party content item for rendering with a call icon, based on a resource of the third-party content provider. The processor can provide a first instance of the content item for rendering with the call icon in accordance with the rendering frequency of instances. A call bridge device can receive a call from the client computing device upon actuation of the call icon, direct the call to a phone number of the third-party content provider, and determine a parameter of the call. The processor can adjust the rendering frequency of instances based on the parameter of the call and provide instances of the content item for display by client computing devices with the call icon in accordance with the adjusted rendering frequency of instances. | 02-04-2016 |
Patent application number | Description | Published |
20110167421 | Dynamic Scaling of Management Infrastructure in Virtual Environments - Methods, systems, and computer programs for performing management tasks in a virtual infrastructure are presented. The method includes detecting an increase, beyond a predetermined threshold, in the number of tasks waiting to be processed by a first virtual center (VC), which executes as a virtual machine (VM) in the virtual infrastructure. Further, the method includes operations for spawning one or more additional VCs executing as VMs in the virtual infrastructure and for distributing the managed objects handled by the first VC among the additional VCs. The tasks waiting to be processed are reallocated among the first VC and the additional VCs, and the reallocated tasks are then processed by the corresponding VC. | 07-07-2011 |
20120203739 | Programmatic Snapshot and Revert of Virtualized Data Center Inventory - A snapshot of an inventory of a virtualized computer system is produced and a user-editable code is generated therefrom, so that the inventory can be reconstructed entirely or partially. The snapshot includes identifying data for items in the virtualized computer system, and relationship data that indicate hierarchical and non-hierarchical relationships between the items. The items in the inventory of the virtualized computer system include virtual machines, servers on which the virtual machines are running, one or more data centers in which the servers reside, and logical containers such as folders for virtual machines, resource pools that each contain one or more virtual machines, and server clusters that each contain one or more servers. | 08-09-2012 |
20130091499 | METHOD AND APPARATUS FOR COMPARING CONFIGURATION AND TOPOLOGY OF VIRTUALIZED DATACENTER INVENTORIES - Disclosed herein is a method of verifying that a reconstructed inventory of a virtualized computer system has been accurately reproduced from an original inventory of a virtualized computer system. A first snapshot and a second snapshot are received, where the first snapshot is a snapshot of the original inventory and the second snapshot is a snapshot of the reconstructed inventory. The first snapshot and the second snapshot are then analyzed to determine that hierarchical relationships, roles and permissions, configuration settings, and/or custom definitions of items in the original inventory match hierarchical relationships of corresponding items in the reconstructed inventory. | 04-11-2013 |
20130159428 | METHODS AND APPARATUS FOR AN E-MAIL-BASED MANAGEMENT INTERFACE FOR VIRTUALIZED ENVIRONMENTS - A server system is configured to provide an e-mail based interface for executing management operations on a virtualized infrastructure which includes a plurality of virtual machines (VMs), underlying host computers, clusters, and/or data centers. Such an interface may be provided in a virtualized infrastructure to enable a system administrator to execute administrative operations remotely from a mobile device without requiring custom installation of an application on the mobile device or a secure connection to the server system. The server system receives e-mails at a pre-determined e-mail address, authenticates the sender of the e-mail, and extracts and executes commands from the e-mail. A number of techniques for validating the e-mail containing server commands may also be provided. | 06-20-2013 |
20130219297 | METHODS AND APPARATUS FOR E-MAIL-BASED MANAGEMENT OF VIRTUALIZED ENVIRONMENTS - A technique for remotely managing virtual machines employs a user interface (UI) of a rich e-mail client that is configured to interpret metadata included in a communication received from a management server for the virtual machines and, in response, generate one or more UI elements. The UI includes a first region that displays a message from the management server and a second region that displays the one or more UI elements for causing a command to be generated and sent to the management server in response to a predetermined input made thereon. | 08-22-2013 |
20130346518 | CREATION OF A SOCIAL NETWORK OF MEMBERS OF A VIRTUALIZATION INFRASTRUCTURE - A computer-implemented method for creating a social network of members of a virtualization infrastructure. At a virtualization infrastructure manager, at least a portion of the members of the virtualization infrastructure are identified. Parent/child relationships of identified members of the virtualization infrastructure are identified. A social network of the identified members of the virtualization infrastructure is generated based on the parent/child relationships. Affiliation relationships between parent members and child members of the virtualization infrastructure are established, wherein the child members can access shared message streams corresponding to the parent members, such that a child member can establish an association of a message with an indication that the child member identifies with content of the message. | 12-26-2013 |
20130346519 | ADMINISTRATION OF A NETWORK - A computer-implemented method to facilitate administration of a network of members. Members of a network are provided with access to a shared message stream such that the members of the network are able to monitor messages generated by other members of the network posted to the shared message stream, wherein at least some of the messages are indicative of operational conditions of particular other members which generated the messages. Responsive to a first member of the network identifying a specific operational condition of the first member, the shared message stream is monitored for a message related to the specific operational condition. Provided the shared message stream includes a message related to the specific operational condition identified by the first member, an association of the message with an indication that the first member identifies with the specific operational condition is established, wherein the first member is configured to establish the association. | 12-26-2013 |
20140130048 | DYNAMIC SCALING OF MANAGEMENT INFRASTRUCTURE IN VIRTUAL ENVIRONMENTS - Methods, systems, and computer programs for performing management tasks in a virtual infrastructure are presented. The method includes detecting a decrease, below a predetermined threshold, in a number of tasks waiting to be processed by a plurality of virtual centers (VCs) executing as virtual machines (VMs) in a virtual infrastructure, wherein each of the plurality of VCs is a management VM for the managed objects of the virtual infrastructure. The method further includes, based on the detected decrease in the number of tasks waiting to be processed, selecting one or more VCs of the plurality of VCs to be removed, distributing managed objects handled by the selected one or more VCs to one or more non-selected VCs of the plurality of VCs, and removing the selected one or more VCs. | 05-08-2014 |
20140365522 | USING A GRAPH DATABASE OF A VIRTUALIZATION INFRASTRUCTURE - In a computer-implemented method for providing management of a virtualization infrastructure, a query related to the virtualization infrastructure is received. A graph database of the virtualization infrastructure is accessed, the graph database including nodes associated with members of the virtualization infrastructure and edges associated with relationships of the members of the virtualization infrastructure, wherein the nodes and the relationships include types. An answer to the query is received from the graph database. | 12-11-2014 |
20140365531 | CREATION OF A GRAPH DATABASE OF A VIRTUALIZATION INFRASTRUCTURE - In a computer-implemented method for creating a graph database of a virtualization infrastructure, data defining entities and relationships of the entities of a virtualization infrastructure is received at a graph database, wherein the relationships of the entities are in accordance with an inventory structure of the virtualization infrastructure. The graph database is populated with the entities and the relationships of the entities of the virtualization infrastructure. | 12-11-2014 |
20150095432 | GRAPHING RELATIVE HEALTH OF VIRTUALIZATION SERVERS - In a computer-implemented method for generating a graph of relative health of virtualization management servers, performance information of virtualization management servers of a virtualization infrastructure is accessed and the performance information is aggregated. A graph of relative health of the virtualization management servers based on the aggregating of the performance information for the virtualization server is generated, and the graph is posted to a social network of members of the virtualization infrastructure. | 04-02-2015 |
20150379167 | CROWD-SOURCED OPERATIONAL METRIC ANALYSIS OF VIRTUAL APPLIANCES - A system and method for performing an operational metric analysis for a virtual appliance uses application operational data from multiple instances of the virtual appliance. The application operational data is then used to generate an operational metric prediction for the virtual appliance. | 12-31-2015 |