Patent application number | Description | Published |
20090327449 | WIRELESS SYNCHRONIZATION OF MEDIA CONTENT AND SUBSCRIPTION CONTENT - Arrangements are provided which use a host computer to configure a wireless portable device's network connection parameters. The radio on the portable device may be used to help locate nearby accessible wireless networks. Once a synchronization relationship between the portable device and a media library on a host computer is established, periodically updated content, such as podcasts, may be discovered and subscribed to using software on the host computer, and the content synchronized with the host computer. A portable device may manage episodic content, such as podcasts, using the device's own wireless connection, and may further send such content to other portable devices. A central user profile may be set up on a web server to synchronize multiple wireless or wired devices. | 12-31-2009 |
20100325123 | Media Seed Suggestion - Media recommendation techniques are described. In an implementation, a similarity value is calculated for a plurality of media using a plurality of similarity functions. A vote is assigned for each similarity value that is above a threshold that is assigned for a respective similarity function and the plurality of media is ranked based at least in part on the assigned votes. A playlist is then created based at least in part on the ranking. Media seed techniques are also described. In an implementation, a set of dissimilar candidates are calculated for a plurality of media using a similarity function in which the set of dissimilar candidates describes the media that is dissimilar in comparison with other media included in the plurality of media. A seed is selected using the set of the dissimilar candidates to create a playlist that includes at least some of the plurality of media. | 12-23-2010 |
20100325125 | MEDIA RECOMMENDATIONS - Media recommendation techniques are described. In an implementation, a similarity value is calculated for a plurality of media using a plurality of similarity functions. A vote is assigned for each similarity value that is above a threshold that is assigned for a respective similarity function and the plurality of media is ranked based at least in part on the assigned votes. A playlist is then created based at least in part on the ranking. Media seed techniques are also described. In an implementation, a set of dissimilar candidates are calculated for a plurality of media using a similarity function in which the set of dissimilar candidates describes the media that is dissimilar in comparison with other media included in the plurality of media. A seed is selected using the set of the dissimilar candidates to create a playlist that includes at least some of the plurality of media. | 12-23-2010 |
20100332568 | Media Playlists - Media playlist techniques are described. In an implementation, a communication is formed, for transmission via a network to a media provider, to request data that describes media that is available for streaming from the media provider. The playlist is created based at least in part on media that is available locally on the computer and the data received from the media provider such that the playlist references one or more of the media that are available for streaming from the media provider. | 12-30-2010 |
20110271272 | APPLICATION PROGRAMMING INTERFACE FOR IDENTIFYING, DOWNLOADING AND INSTALLING APPLICABLE SOFTWARE UPDATES - An application programming interface (API) provides a set of functions for application developers to build software programs that automatically detect, download, and install desired software updates. | 11-03-2011 |
20120030325 | WIRELESS SYNCHRONIZATION OF MEDIA CONTENT AND SUBSCRIPTION CONTENT - Arrangements are provided which use a host computer to configure a wireless portable device's network connection parameters. The radio on the portable device may be used to help locate nearby accessible wireless networks. Once a synchronization relationship between the portable device and a media library on a host computer is established, periodically updated content, such as podcasts, may be discovered and subscribed to using software on the host computer, and the content synchronized with the host computer. A portable device may manage episodic content, such as podcasts, using the device's own wireless connection, and may further send such content to other portable devices. A central user profile may be set up on a web server to synchronize multiple wireless or wired devices. | 02-02-2012 |
20140181276 | WIRELESS SYNCHRONIZATION OF MEDIA CONTENT AND SUBSCRIPTION CONTENT - Arrangements are provided which use a host computer to configure a wireless portable device's network connection parameters. The radio on the portable device may be used to help locate nearby accessible wireless networks. Once a synchronization relationship between the portable device and a media library on a host computer is established, periodically updated content, such as podcasts, may be discovered and subscribed to using software on the host computer, and the content synchronized with the host computer. A portable device may manage episodic content, such as podcasts, using the device's own wireless connection, and may further send such content to other portable devices. A central user profile may be set up on a web server to synchronize multiple wireless or wired devices. | 06-26-2014 |
20160028817 | WIRELESS SYNCHRONIZATION OF MEDIA CONTENT AND SUBSCRIPTION CONTENT - Arrangements are provided which use a host computer to configure a wireless portable device's network connection parameters. The radio on the portable device may be used to help locate nearby accessible wireless networks. Once a synchronization relationship between the portable device and a media library on a host computer is established, periodically updated content, such as podcasts, may be discovered and subscribed to using software on the host computer, and the content synchronized with the host computer. A portable device may manage episodic content, such as podcasts, using the device's own wireless connection, and may further send such content to other portable devices. A central user profile may be set up on a web server to synchronize multiple wireless or wired devices. | 01-28-2016 |
Patent application number | Description | Published |
20120151476 | VIRTUAL MACHINE MORPHING FOR HETEROGENEOUS MIGRATION ENVIRONMENTS - Virtual machines may migrate between heterogeneous sets of implementation resources in a manner that allows the virtual machines to efficiently and effectively adapt to new implementation resources. Furthermore, virtual machines may change types during migration without terminating the virtual machines. Migration templates may be established to manage migration of sets of virtual machines between sets of implementation resources and/or virtual machine types. Migration templates may be established based at least in part on information provided by migration agents added to the virtual machines under consideration for migration. The migration agents may detect and augment relevant virtual machine capabilities, as well as trigger reconfiguration of virtual machine components in accordance with migration templates. | 06-14-2012 |
20120250682 | FRAMEWORKS AND INTERFACES FOR OFFLOAD DEVICE-BASED PACKET PROCESSING - High-speed processing of packets to, and from, a virtualization environment can be provided while utilizing hardware-based segmentation offload and other such functionality. A hardware vendor such as a network interface card (NIC) manufacturer can enable the hardware to support open and proprietary stateless tunneling in conjunction with a protocol such as single root I/O virtualization (SR-IOV) in order to implement a virtualized overlay network. The hardware can utilize various rules, for example, that can be used by the NIC to perform certain actions, such as to encapsulate egress packets and decapsulate packets. | 10-04-2012 |
20120250686 | OFFLOAD DEVICE-BASED STATELESS PACKET PROCESSING - High-speed processing of packets to, and from, a virtualization environment can be provided while utilizing hardware-based segmentation offload and other such functionality. A hardware vendor such as a network interface card (NIC) manufacturer can enable the hardware to support open and proprietary stateless tunneling in conjunction with a protocol such as single root I/O virtualization (SR-IOV) in order to implement a virtualized overlay network. The hardware can utilize various rules, for example, that can be used by the NIC to perform certain actions, such as to encapsulate egress packets and decapsulate packets. | 10-04-2012 |
20140181395 | VIRTUAL TAPE LIBRARY SYSTEM - A virtual tape library system is used to back up data from a client archive system expecting physical tape operations onto logical data containers and/or a metadata store of a storage service by emulating the physical tape operations. For example, a virtual tape library appliance is installed at a customer premise location to interface with a client archive system. The virtual tape library appliance provides virtual interfaces to appear as physical tape library subsystems, such as tape drives and media changing interfaces. However, these virtual interfaces are supported by logical data containers in a storage service and a metadata store. The virtual tape library system allows the client archive system to make requests to import new virtual tapes, export virtual tapes for archiving, store virtual tapes at a virtual location, load and eject virtual tapes into a virtual tape drive and operate on virtual tapes in a virtual tape drive. | 06-26-2014 |
20140181396 | VIRTUAL TAPE USING A LOGICAL DATA CONTAINER - A virtual tape is constructed using a logical data container to aid in emulating a virtual tape by providing tape functionality, reducing seek time and improving recovery time in case of a failure. For example, the logical data container may comprise a global header followed by one or more data block groups. The global header may provide metadata to track record locations, file mark locations, virtual tape data in memory, data validation information and a virtual tape head location. This metadata in the global tape header may help reduce seek time, improve recovery time using last known data in memory, erase a virtual tape and provide tape head position. Data block groups may include information that validates data, provides error correction, provides record and file marks and provides storage of client data. | 06-26-2014 |
20140181818 | OPTIMIZATION OF PACKET PROCESSING BY DELAYING A PROCESSOR FROM ENTERING AN IDLE STATE - Some embodiments facilitate high performance packet-processing by enabling one or more processors that perform packet-processing to determine whether to enter an idle state or similar state. As network packets usually arrive or are transmitted in batches, the processors of some embodiments determine that more packets may be coming down a multi-stage pipeline upon receiving a first packet for processing. As a result, the processors may stay awake for a duration of time in anticipation of an incoming packet. Some embodiments keep track of the last packet that entered the first stage of the pipeline and compare that with a packet that the processor just processed in a pipeline stage to determine whether there may be more packets coming that need processing. In some embodiments, a processor may also look at a queue length of a queue associated with an upstream stage to determine whether more packets may be coming. | 06-26-2014 |
20140237088 | MANAGING IMAGING OF COMPUTING DEVICES - Systems and methods for managing imaging of computing devices are provided. A device image manager enables selection of one or more device images on the basis of various computing device criteria. The device image manager may obtain hardware qualification information associated with one or more device images, and obtain device configuration information associated with a computing device. The device image manager may select a set of appropriate device images for the computing device based on the hardware qualification information, device configuration information, or various device image selection criteria. | 08-21-2014 |
20140314091 | FRAMEWORKS AND INTERFACES FOR OFFLOAD DEVICE-BASED PACKET PROCESSING - High-speed processing of packets to, and from, a virtualization environment can be provided while utilizing hardware-based segmentation offload and other such functionality. A hardware vendor such as a network interface card (NIC) manufacturer can enable the hardware to support open and proprietary stateless tunneling in conjunction with a protocol such as single root I/O virtualization (SR-IOV) in order to implement a virtualized overlay network. The hardware can utilize various rules, for example, that can be used by the NIC to perform certain actions, such as to encapsulate egress packets and decapsulate packets. | 10-23-2014 |
20150139241 | STATELESS PACKET SEGMENTATION AND PROCESSING - High-speed processing of packets to, and from, a virtualization environment can be provided while utilizing segmentation offload and other such functionality of commodity hardware. Virtualization information can be added to extension portions of protocol headers, for example, such that the payload portion is unchanged and, when physical address information is added to a frame, a frame can be processed using commodity hardware. In some embodiments, the virtualization information can be hashed and added to the payload or stream at, or relative to, various segmentation boundaries, such that the virtualization or additional header information will only be added to a subset of the packets once segmented, thereby reducing the necessary overhead. Further, the hashing of the information can allow for reconstruction of the virtualization information upon desegmentation even in the event of packet loss. | 05-21-2015 |
20150199519 | MANAGING FIRMWARE UPDATE ATTEMPTS - Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure counter for each update or update attempt. The value of the counter can be determined every time the validity of the firmware is confirmed, and this value can be stored to a secure location. At subsequent times, such as during a boot process, the actual value of the counter can be determined and compared with the expected value. If the values do not match, such that the firmware may be in an unexpected state, an action can be taken, such as to prevent access to, or isolate, the hardware until such time as the firmware can be validated or updated to an expected state. | 07-16-2015 |
20150248341 | MONITORING AND ANALYSIS OF OPERATING STATES IN A COMPUTING ENVIRONMENT - A set of techniques is described for monitoring and analyzing crashes and other malfunctions in a multi-tenant computing environment (e.g. cloud computing environment). The computing environment may host many applications that are executed on different computing resource combinations. The combinations may include varying types and versions of hardware or software resources. A monitoring service is deployed to gather statistical data about the failures occurring in the computing environment. The statistical data is then analyzed to identify abnormally high failure patterns. The failure patterns may be associated with particular computing resource combinations being used to execute particular types of applications. Based on these failure patterns, suggestions can be issued to a user to execute the application using a different computing resource combination. Alternatively, the failure patterns may be used to modify or update the various resources in order to correct the potential malfunctions caused by the resource. | 09-03-2015 |
20150277802 | FILE STORAGE USING VARIABLE STRIPE SIZES - A write request directed to a storage object is received at a distributed file storage service. Based on a variable stripe size selection policy, a size of a particular stripe of storage space to be allocated for the storage object is determined, which differs from the size of another stripe allocated earlier for the same storage object. Allocation of storage for the particular stripe at a particular storage device is requested, and if the allocation succeeds, the contents of the storage device are modified in accordance with the write request. | 10-01-2015 |
20150277969 | ATOMIC WRITES FOR MULTIPLE-EXTENT OPERATIONS - A node of a storage service is selected as a coordinator of a distributed transaction involving multiple page-level modifications. The coordinator identifies other nodes as members of a node chain collectively storing physical data pages at which proposed modifications are to be performed, including a decider node responsible for a decision to commit the transaction. The coordinator generates a transaction preparation message comprising a representation of an order of respective commit decisions associated with the proposed modifications, and transmits the message to a selected node of the chain for a sequential propagation along the chain. Each chain node performs a local commit analysis for its changes and stores a record of its intent to commit. If a decision to commit is reached at the decider, the proposed modifications are completed. | 10-01-2015 |
20150278243 | SCALABLE FILE STORAGE SERVICE - A client request, formatted in accordance with a file system interface, is received at an access subsystem of a distributed multi-tenant storage service. After the request is authenticated at the access subsystem, an atomic metadata operation comprising a group of file system metadata modifications is initiated, including a first metadata modification at a first node of a metadata subsystem of the storage service and a second metadata modification at a second node of the metadata subsystem. A plurality of replicas of at least one data modification corresponding to the request are saved at respective storage nodes of the service. | 10-01-2015 |
20150278397 | NAMESPACE MANAGEMENT IN DISTRIBUTED STORAGE SYSTEMS - A directed acyclic graph (DAG) is generated to represent a namespace of a directory. In response to a request to create a new object with a specified name, a hash value bit sequence is computed for the name. A plurality of levels of the DAG are navigated using successive subsequences of the bit sequence to identify a candidate node for storing a new entry corresponding to the specified name. If the candidate node meets a split criterion, the new entry and at least a selected subset of entries of the candidate node's list of entries are distributed among a plurality of DAG nodes, including at least one new DAG node, using respective bit sequences obtained by applying the hash function for each distributed entry. | 10-01-2015 |
20150280959 | SESSION MANAGEMENT IN DISTRIBUTED STORAGE SYSTEMS - A request for a session identifier for a particular client is transmitted from an access subsystem of a storage service to a metadata subsystem of the service. A session identifier based on a persistent session storage location at which metadata of the client session are stored is received at the access subsystem. The session identifier is cached at the access subsystem prior to its transmission to the client. A lock state indicator generated by the metadata subsystem in response to a particular request from the client during the client session may also be cached at the access subsystem. Subsequent storage requests from the client during the session may be handled by the access subsystem using the cached session identifier and lock state indicator. | 10-01-2015 |
20150339156 | MANAGING VIRTUAL MACHINE MIGRATION - Systems and method for the management of migrations of virtual machine instances are provided. A migration manager monitors a resource usable for migration of a virtual machine instance in order to predict availability of the migration resource. When migration of a virtual machine instance is desired, the migration manager schedules the migration to occur at a future point in time identified based on the predicted availability of the migration resource. | 11-26-2015 |
20160110214 | FRAMEWORKS AND INTERFACES FOR OFFLOAD DEVICE-BASED PACKET PROCESSING - High-speed processing of packets to, and from, a virtualization environment can be provided while utilizing hardware-based segmentation offload and other such functionality. A hardware vendor such as a network interface card (NIC) manufacturer can enable the hardware to support open and proprietary stateless tunneling in conjunction with a protocol such as single root I/O virtualization (SR-IOV) in order to implement a virtualized overlay network. The hardware can utilize various rules, for example, that can be used by the NIC to perform certain actions, such as to encapsulate egress packets and decapsulate packets. | 04-21-2016 |