Patents Issued in December 31, 2015
-
Publication number: 20150378746Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer configures the first computer to boot a second boot image. Upon power cycling, the first computer loads the second boot image.Type: ApplicationFiled: September 8, 2015Publication date: December 31, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alex FRIEDMAN, Constantine GAVRILOV
-
Publication number: 20150378747Abstract: Technologies for pre-memory phase initialization include a computing device having a processor with a cache memory. The computing device may determine whether a temporary memory different from the cache memory of the processor is present for temporary memory access prior to initialization of a main memory of the computing device. In response to determining that temporary memory is present, a portion of the basic input/output instructions may be copied from a non-volatile memory of the computing device to the temporary memory for execution prior to initialization of the main memory. The computing device may also initialize a portion of the cache memory of the processor as Cache as RAM for temporary memory access prior to initialization of the main memory in response to determining that temporary memory is not present. After initialization, the main memory may be configured for subsequent memory access. Other embodiments are described and claimed.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: Giri P. Mudusuru, Rangasai V. Chaganty, Chasel Chiu, Satya P. Yarlagadda, Nivedita Aggarwal, Nuo Zhang
-
Publication number: 20150378748Abstract: Systems and methods may provide for assuming control over a processor in response to an operating system (OS) request to transition the processor into a sleeping state and transitioning the processor into an intermediate state that has a shorter wake latency than the sleeping state. Additionally, the processor may be maintained in the intermediate state until a wake event is detected. In one example, one or more power lowering operations may be reversed in response to the wake event.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: ANTONIO S. CHENG, SIDDHARTH SHAH
-
Publication number: 20150378749Abstract: An information processing device has a storage unit and a touch panel with a screen. The storage unit stores layout information indicating the positions at which various settings are displayed on the screen. The touch panel displays a setting selection screen on which the settings are arranged in the display positions indicated by the layout information, accepts selections of settings to be made, and displays help screens showing help information for each of the settings in an order corresponding to the display positions indicated by the layout information. The layout information can be altered to have the help information displayed in a desired order.Type: ApplicationFiled: June 25, 2015Publication date: December 31, 2015Applicant: Oki Data CorporationInventor: Makoto YAMASHITA
-
Publication number: 20150378750Abstract: The present disclosure relates generally to a method and a machine for creating protective packaging. The machine includes a controller including a processing element and a display in electrical communication with the processing element. In response to a user input or a machine operation input, the processing element selects demonstrative content corresponding to the user input or the machine operation input and the display displays the demonstrative content. Examples of demonstrative content include tutorial videos or photographs illustrating how to operate the machine, how to replace consumables used by the machine, replace or repair machine components, and/or how to package certain items using packaging materials created by the machine.Type: ApplicationFiled: June 25, 2015Publication date: December 31, 2015Applicant: PREGIS INNOVATIVE PACKAGING LLCInventors: Thomas D. Wetsch, George Bertram, Edward Eisenberger
-
Publication number: 20150378751Abstract: In a method for managing change in an information technology (IT) environment, in response to an open change ticket, identifying one or more components of the IT environment that are associated with at least one change operation included in the change ticket. The method further includes identifying information associated with the identified one or more components of the IT environment. The method further includes determining a listing of allowable change operations for the identified one or more components of the IT environment in the change ticket based on the identified information associated with the identified one or more components of the IT environment. The method further includes receiving a user requested change operation. The method further includes determining whether the received user requested change operation is included in the determined listing of allowable change operations.Type: ApplicationFiled: June 25, 2014Publication date: December 31, 2015Inventors: Peter G. Finn, Manvendra Gupta
-
Publication number: 20150378752Abstract: Updating a native class pointer in persisted compiled code for use in an execution environment other than the one in which the native class pointer was created. This is done by using an identifier, stored with the persisted compiled code, of the class first loaded by the class loader that also loaded the class to which the native class pointer refers. A table is maintained in the execution environment mapping class identifiers to class loaders, and the stored identifier is used to consult this table to find a candidate class loader from those in the current execution environment that can provide the correct updated pointer.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventor: Mark G. Stoodley
-
Publication number: 20150378753Abstract: A network-based virtual computing resource provider may offer virtual compute instances that implement rolling resource credits for scheduling virtual computing resources. Work requests for a virtual compute instance may be received at a virtualization manager. A resource credit balance may be determined for the virtual compute instance. The resource credit balance may accumulate resource credits in rolling fashion, carrying over unused credits from previous time periods. Resource credits may then be applied when generating scheduling instructions to provide to a physical resource to perform the work requests, such as a physical CPU in order to increase the utilization of the resource according to the number of credits applied. Applied resource credits may then be deducted from the credit balance.Type: ApplicationFiled: July 15, 2014Publication date: December 31, 2015Applicant: Amazon Technologies, Inc.Inventors: JOHN MERRILL PHILLIPS, WILLIAM JOHN EARL, DEEPAK SINGH
-
Publication number: 20150378754Abstract: A method for interrupting an execution of an overall program of an electronic control unit, wherein the overall program has a first program and a second program. A graphical modeling environment is provided that has graphical model elements, wherein the first program is represented by a first model element, and the second program is represented by a second model element, and the link between the first program and the second program is represented by a third model element. A halt condition is specified by the modeling environment, wherein a program status change leading to interruption of the execution of the overall program is specified by means of the halt condition, the overall program is executed, a program status change is detected during execution of the overall program. The execution of the overall program is interrupted when the program status change specified in the halt condition takes place.Type: ApplicationFiled: June 25, 2015Publication date: December 31, 2015Applicant: dSPACE digital signal processing and control engineering GmbHInventors: Lars STOCKMANN, Fabian EDLING
-
Publication number: 20150378755Abstract: In an embodiment, a request is received for a first partition to execute on a first virtual processor. If the first physical processor is available at a first node, the first virtual processor is dispatched to execute at the first physical processor at the first node that is the home node of the first virtual processor. If the first physical processor is not available, a determination is made whether the first physical processor is assigned to a second virtual processor and a home node of the second virtual processor is not the first node. If the first physical processor is assigned to a second virtual processor and the home node of the second virtual processor is not the first node, execution of the second virtual processor is stopped on the first physical processor and the first virtual processor is dispatched to the first physical processor.Type: ApplicationFiled: September 9, 2015Publication date: December 31, 2015Inventors: Stuart Z. Jacobs, David A. Larson, Naresh Nayar
-
Publication number: 20150378756Abstract: Provided herein are systems and methods for instrumenting mobile applications. A decompiler of an instrumentation tool may convert byte code of a compiled mobile application to source code. The instrumentation tool may add instrumentation code into one or more selected classes of the source code by generating an instrumentation class in the source code for each of the one or more selected classes. A compiler of the instrumentation tool may compile the source code that includes instrumentation code into the byte code of the compiled mobile application. Responsive to execution of the compiled mobile application, the byte code that corresponds to the instrumentation code may report instrumentation data to one of a local file or a server.Type: ApplicationFiled: June 24, 2015Publication date: December 31, 2015Inventors: Ole Lensmar, Abraham Nevado
-
Publication number: 20150378757Abstract: A method of optimizing software source code, where the source code is for execution as compiled bytecode using a just-in-time compiler. The source code is compiled to generate corresponding compiled bytecode. The bytecode is then executed using a just-in-time compiler. Run-time optimization actions performed by the just-in-time compiler during execution of the bytecode are determined, and analysed to determine corresponding optimization data for the source code.Type: ApplicationFiled: June 10, 2015Publication date: December 31, 2015Inventors: Fiona M. Crowther, Geza Geleji, Christopher J. Poole, Martin A. Ross, Craig H. Stirling
-
Publication number: 20150378758Abstract: Techniques to process virtual machine objects through multistep workflows in a computer system are described. In an example, a method of processing virtual machine objects through a workflow having a plurality of ordered steps in a computer system includes executing the workflow on computing resources of the computer system using the virtual machine objects as parametric input, where the computing resources: divide the virtual machine objects into workgroups; perform instances of a step of the workflow in parallel on the workgroups as the workgroups complete a prior step in the workflow; and execute an agent to delegate the workgroups to, and receive results from, the instances of the step as the workflow is executed.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Inventors: Matthew DUGGAN, David CHAVEZ, Aleksey PERSHIN, Kishore NADIMPALLI, Ilia LANGOUEV
-
Publication number: 20150378759Abstract: Systems and techniques are described for determining the status of migrating virtual machines. A described technique includes initiating a migration of one or more virtual machines from a source host that is located at a source site to a destination host that is located at a destination site. A determination is made that a fault has occurred during the migration of the one or more virtual machines. In response to determining that the error has occurred, a determination is made, for each virtual machine of the one or more virtual machines, whether the virtual machine has been fully migrated from the source host to the destination host.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Inventors: Aleksey Pershin, Min Cai, Ilia Langouev, Gabriel Tarasuk-Levin
-
Publication number: 20150378760Abstract: A virtualized computing environment includes a plurality of host computers, each host being connected to a physical network and having a hypervisor executing therein. To provision a virtual machine requiring a connection to a virtual network in one of the hosts, a candidate host for hosting the virtual machine, the candidate host having the virtual network configured therein, is selected. A request is then made for a status of the virtual network to the candidate host. The status of the virtual network is then received from the candidate host. If the virtual network is available, then the virtual machine is deployed to the candidate host. If the virtual network is not available, then a second candidate host is selected for hosting the virtual machine.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: Chi-Hsiang SU, Sachin THAKKAR
-
Publication number: 20150378761Abstract: Techniques are disclosed for maintaining high availability (HA) for virtual machines (VMs) running on host systems of a host cluster, where each host system executes a HA module in a plurality of HA modules and a storage module in a plurality of storage modules, where the host cluster aggregates, via the plurality of storage modules, locally-attached storage resources of the host systems to provide an object store, where persistent data for the VMs is stored as per-VM storage objects across the locally-attached storage resources comprising the object store, and where a failure causes the plurality of storage modules to observe a network partition in the host cluster that the plurality of HA modules do not. In one embodiment, a host system in the host cluster executing a first HA module invokes an API exposed by the plurality of storage modules for persisting metadata for a VM to the object store.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: Marc Sevigny, Keith Farkas, Christos Karamanolis
-
Publication number: 20150378762Abstract: The current document is directed to methods and systems for monitoring the performance of memory management in virtual machines. By accurately measuring the performance of memory management in virtual machines, a virtualization layer can dynamically reconfigure virtual machines to use more optimal memory-management methods, intelligently schedule execution of virtual machines to increase memory-management performance, and migrate virtual machines among different servers and computer systems to increase memory-management performance.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Applicant: VMware, Inc.Inventors: Kalyan Saladi, Reza Taheri, Daniel Michael Hecht, Jin Heo, Jeffrey Buell
-
Publication number: 20150378763Abstract: Methods and apparatus to manage monitoring agents. A disclosed example involves determining if a virtual machine has a first service installed that corresponds to a service rule, the service rule to specify a service identifier and a configuration for a monitoring agent. The method also involves determining if the virtual machine has the monitoring agent corresponding to the first service. The method also involves, in response to determining if the first service matches the service identifier specified by the service rule and that the monitoring agent is not installed on the virtual machine, initiating installation of the monitoring agent on the virtual machine.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Inventors: Lital Hassine, Scott Feldstein, Moran Shimron
-
Publication number: 20150378764Abstract: An access data collector collects access assignment data characterizing active access assignment operations of a hypervisor in assigning host computing resources among virtual machines for use in execution of the virtual machines.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Inventors: Jeyashree SIVASUBRAMANIAN, Sudheer APTE
-
Publication number: 20150378765Abstract: Methods and apparatus are disclosed to scale application deployments in cloud computing environments using virtual machine pools.Type: ApplicationFiled: August 7, 2014Publication date: December 31, 2015Inventors: Servesh SINGH, Kiran SINGH, Shyam MANKALA
-
Publication number: 20150378766Abstract: Embodiments described herein rapidly migrate child virtual machines (VM) by leveraging shared memory resources between parent and child VMs. In a first, proactive phase, parent VMs are migrated to a plurality of potential target hosts. In a second, reactive phase, after a request is received to migrate a child VM to a selected target host, memory blocks that are unique to the child VM are migrated to the selected target host. In some examples, memory blocks are compressed and decompressed as needed. In other examples, the operation environment is modified. Aspects of the disclosure offer a high performance, resource efficient solution that outperforms traditional approaches in areas of software compatibility, stability, quality of service control, resource utilization, and more.Type: ApplicationFiled: December 31, 2014Publication date: December 31, 2015Inventors: Daniel James BEVERIDGE, Gabriel TARASUK-LEVIN
-
Publication number: 20150378767Abstract: Examples perform live migration of VMs from a source host to a destination host. The disclosure changes the storage environment, directly or through a vendor provider, to active/active synchronous and, during migration, migrates only data which is not already stored at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes, with exclusive access to the storage disks, and the system is returned to the previous storage environment (e.g., active/active asynchronous).Type: ApplicationFiled: December 31, 2014Publication date: December 31, 2015Inventors: Gabriel TARASUK-LEVIN, Patrick William Penzias DIRKS, Ilia LANGOUEV, Curt KOLOVSON
-
Publication number: 20150378768Abstract: Systems, methods, and software described herein manage volumes and virtual machines using a location database gathered from a hypervisor management system. In one example, a method of operating a volume attachment service to manage volumes and virtual machines includes transferring a location request to a hypervisor management service to identify locations of one or more virtual machines. The method further provides, receiving the locations of the one or more virtual machines and storing the locations in a location database. The method also includes identifying a volume action request for a first virtual machine, and directing the volume action request to a hypervisor of the first virtual machine based on the locations in the location database.Type: ApplicationFiled: March 25, 2015Publication date: December 31, 2015Inventors: Matthew Conover, Steven Lawson, Jeffrey Ulatoski
-
Publication number: 20150378769Abstract: A method for provisioning a virtualized resource includes directing, by a provisioning machine, a server-executed hypervisor to provision a virtual machine. The provisioning machine directs generation of an organizational unit within a first organizational unit within a multi-tenant directory service separated from a second organizational unit in the multi-tenant directory service by a firewall. The provisioning machine associates the virtual machine with the first organizational unit. The provisioning machine establishes at least one firewall rule on the virtual machine restricting communications to the virtual machine to communications from explicitly authorized machines, which including at least one other machine within the organizational unit. The provisioning machine receives a request to provision a virtualized resource for at least one user. The provisioning machine updates data associated with the organizational unit to include an identification of the at least one user.Type: ApplicationFiled: May 26, 2015Publication date: December 31, 2015Inventors: Charles F. Buck, Jason A. Shivok
-
Publication number: 20150378770Abstract: A virtual machine backup method includes utilizing a log to indicate updates to memory of a virtual machine when the updates are evicted from a cache of the virtual machine. A guard band is determined that indicates a threshold amount of free space for the log. A determination is made that the guard band will be or has been encroached upon corresponding to indicating an update in the log. A backup image of the virtual machine is updated based, at least in part, on a set of one or more entries of the log, wherein the set of entries is sufficient to comply with the guard band. The set of entries is removed from the log.Type: ApplicationFiled: June 1, 2015Publication date: December 31, 2015Inventors: Guy L. Guthrie, Naresh Nayar, Geraint North, William J. Starke, Albert J. Van Norstrand, JR.
-
Publication number: 20150378771Abstract: Examples perform live migration of objects such as VMs from a source host to a destination host. The disclosure exposes the contents of the storage disk at the destination host, compares the storage disk of the destination host to the source host, and during migration, migrates only data which is not already stored at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes, with exclusive access to the storage disks.Type: ApplicationFiled: June 26, 2015Publication date: December 31, 2015Inventors: Gabriel TARASUK-LEVIN, Patrick William Penzias DIRKS, Ilia LANGOUEV, Curt KOLOVSON
-
Publication number: 20150378772Abstract: A management system and method that generally allocates a virtual function to a virtual function definition of a virtual server, where the virtual function definition of the virtual server is previously assigned with a unique function identifier, and assigns the unique function identifier to the virtual function in response to the allocating of the virtual function, where the unique function identifier causes a discovery of the virtual function by the virtual server.Type: ApplicationFiled: August 11, 2015Publication date: December 31, 2015Inventors: Gerhard Banzhaf, DAVID F. CRADDOCK, JAMES M. JENKS, ANGEL NUNEZ MENCIAS, JUSTIN D. MILLER, ERIC A. WEINMANN
-
Publication number: 20150378773Abstract: One aspect of the present invention provides a PLC system that can cause a programmable indicator to acquire a log in desired timing of a user without directly performing setting operation on the programmable indicator. The PLC system includes a PC and the programmable indicator having a logging function. When receiving input operation to turn on the logging function, the PC performs processing of transmitting a control command for performing the logging function to the programmable indicator. The programmable indicator turns on the logging function when receiving the control command from the PC.Type: ApplicationFiled: June 25, 2015Publication date: December 31, 2015Inventors: Yuta NAGATA, Hidehiko SEKIMOTO
-
Publication number: 20150378774Abstract: A transaction request is received at a log-based transaction manager, indicating a conflict check delimiter and a read set descriptor indicative of one or more locations from which data is read during the requested transaction. Using the conflict check delimiter, a subset of transaction records stored in a particular persistent log to be examined for conflicts prior to committing the requested transaction is identified. In response to determining that none of the read locations of the requested transaction correspond to a write location indicated in the subset of transaction records, a new transaction record is stored in the particular persistent log indicating that the requested transaction has been committed.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Applicant: AMAZON TECHNOLOGIES, INC.Inventor: ALLAN HENRY VERMEULEN
-
Publication number: 20150378775Abstract: A transaction request is received at a log-based transaction manager, indicating a logical constraint to be satisfied before the corresponding transaction is committed. The transaction manager identifies a subset of transaction records stored in a persistent change log that are to be examined to evaluate the logical constraint. Based at least in part on the result of a comparison of one or more constraint-related data signatures included in the transaction request with corresponding data signatures in the subset of transaction records, a decision is made to commit the requested transaction.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Applicant: Amazon Technologies, Inc.Inventor: ALLAN HENRY VERMEULEN
-
Publication number: 20150378776Abstract: This invention relates to scheduling threads in a multicore processor. Executable transactions may be scheduled using at least one distribution queue, which lists executable transactions in order of eligibility for execution, and multilevel scheduler which comprises a plurality of linked individual executable transaction schedulers. Each of these includes a scheduling algorithm for determining the most eligible executable transaction for execution. The most eligible executable transaction is outputted from the multilevel scheduler to the at least one distribution queue.Type: ApplicationFiled: September 9, 2015Publication date: December 31, 2015Inventor: Mark David Lippett
-
Publication number: 20150378777Abstract: Execution of a transaction mode setting instruction causes a computer processor to be in an atomic read-only mode ignoring conflicts to certain write-sets of a transaction during transactional execution. Read-set conflicts may still cause a transactional abort. Absent any aborting, the transaction's execution may complete, by committing transactional stores to memory and updating architecture states.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Inventors: Michael Karl Gschwind, Eric M. Schwarz, Chung-Lung K. Shum, Timothy J. Slegel
-
Publication number: 20150378778Abstract: Execution of a transaction mode setting instruction causes a computer processor to be in an atomic write-only mode ignoring conflicts to certain read-sets of a transaction during transactional execution. Write-set conflicts may still cause a transactional abort. Absent any aborting, the transaction's execution may complete, by committing transactional stores to memory and updating architecture states.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Inventors: Michael Karl Gschwind, Chung-Lung K. Shum, Timothy J. Slegel
-
Publication number: 20150378779Abstract: Execution of a transaction may be initiated by a CPU in a transactional execution (TX) environment. A set of TX performance characteristics of the transaction during the transactional execution may be collected and stored in a location specified by an instruction of the transaction when the transactional execution ends or aborts.Type: ApplicationFiled: August 20, 2015Publication date: December 31, 2015Inventors: Fadi Y. Busaba, Harold W. Cain, III, Dan F. Greiner, Michael Karl Gschwind, Valentina Salapura, Eric M. Schwarz, Chung-Lung K. Shum
-
Publication number: 20150378780Abstract: Discontiguous storage locations are prefetched by a prefetch instruction. Addresses of the discontiguous storage locations are provided by a list directly or indirectly specified by a parameter of the prefetch instruction, along with metadata and information about the list entries. Fetching of corresponding data blocks to cache lines is initiated. A processor may enter transactional execution mode and memory instructions of a program may be executed using the prefetched data blocks.Type: ApplicationFiled: August 20, 2015Publication date: December 31, 2015Inventors: Fadi Y. Busaba, Dan F. Greiner, Michael Karl Gschwind, Maged M. Michael, Valentina Salapura, Eric M. Schwarz, Timothy J. Slegel
-
Publication number: 20150378781Abstract: Transactional execution of a transaction beginning instruction initiates prefetching, by a CPU, of discontiguous storage locations specified by a list. The list includes entries specifying addresses and may also include corresponding metadata. The list may be specified by levels of indirection. Fetching of corresponding discontiguous cache lines is initiated while in TX mode. Additional instructions in the transaction may be executed and use the prefetched cache lines.Type: ApplicationFiled: August 20, 2015Publication date: December 31, 2015Inventors: Fadi Y. Busaba, Dan F. Greiner, Michael Karl Gschwind, Maged M. Michael, Valentina Salapura, Eric M. Schwarz, Timothy J. Slegel
-
Publication number: 20150378782Abstract: Tasks may be scheduled on more than one processor to allow the processors to operate at lower processor frequencies and processor supply voltages. In particular, realtime tasks may be scheduled on idle processors without context switching an existing executing tasks. For example, a method of executing tasks on a plurality of processors may include receiving a new task with an earlier deadline than an executing task; determining whether an idle processor is available; and when an idle processor is available, executing the new task on the idle processor.Type: ApplicationFiled: November 17, 2014Publication date: December 31, 2015Applicant: Unisys CorporationInventors: Chandan Hks, Sonika P. Reddy
-
Publication number: 20150378783Abstract: Examples perform live migration of virtual machines (VM) from a source host to a destination host. The live migration performs time-consuming operations before the source host is stunned, reducing the downtime apparent to users. Some examples contemplate pre-copying memory from the source VM to the destination VM, and the opening of disks on the destination VM before stunning the source VM.Type: ApplicationFiled: December 31, 2014Publication date: December 31, 2015Inventors: Gabriel TARASUK-LEVIN, Patrick William Penzias DIRKS, Haripriya RAJAGOPAL, Sujay Shrikant GODBOLE, Derek ULUSKI
-
Publication number: 20150378784Abstract: Work flows consist of the following steps: (i) receiving a work flow data set that defines a work flow which includes a plurality of work items; and (ii) defining, a centralized and pattern-based work flow level job input/output (I/O) characteristic set that includes at least I/O settings for work items included in the work flow.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: Kinson Chik, Meng Ding, Qingda Wang
-
Publication number: 20150378785Abstract: The disclosure describes performing live migration of objects such as virtual machines (VMs) from a source host to a destination host. The disclosure changes the storage environment, directly or through a vendor provider, to active/passive synchronous or near synchronous and, during migration, migrates only data which has not already been replicated at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes with exclusive access to the storage disks, and the system is returned to the previous storage environment of active/passive asynchronous.Type: ApplicationFiled: June 26, 2015Publication date: December 31, 2015Inventors: Gabriel TARASUK-LEVIN, Patrick William Penzias DIRKS, Ilia LANGOUEV, Curt KOLOVSON
-
Publication number: 20150378786Abstract: Allocation of physical resources is achieved by accessing consumption data for each of a plurality of application components executing in one or more virtual machines and consuming a plurality of allocated physical resources. The consumption data is indicative of consumption levels by each of the plurality of application components of each of the plurality of physical resources. Following a determination that a value for a performance metric associated with the application has crossed an associated threshold value, the consumption data is analyzed to identify a consumption level of a first of the plurality of physical resources being consumed by a first of the plurality of application components has deviated from a historical trend for that physical resource. An instruction is then communicated that when executed will cause a change in an allocation level of the first of the plurality of physical resources.Type: ApplicationFiled: January 31, 2013Publication date: December 31, 2015Inventors: Adarsh Suparna, Ajeya H Simha
-
Publication number: 20150378787Abstract: A computer implemented method for assigning workload slices from a workload to upcoming frames to be processed during the rendering of the upcoming frames. The processing time of upcoming frames and workload slices varies at runtime according to system resources The method determines an effective frame rate that estimates the duration of an upcoming frame and also determines an effective slice rate that estimates the time it takes to complete an upcoming workload slice. Based on the effective frame rate and the effective slice rate, the method then calculates the slice-to-frame ratio which defines the rate in which slices are assigned to upcoming frames. The slice-to-frame ratio can dynamically change to accommodate for changes to the processing time of rendered frames and completed workload slices.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventor: Stefan Cameron
-
Publication number: 20150378788Abstract: A computer implemented method, system and computer program product enabling cloud service providers to register in a cloud book; wherein the cloud book includes a profile for each cloud service provider of the cloud service providers including the services and terms of service for each cloud service provider of the cloud service providers; and enabling consumers to register in the cloud book; wherein the users are able to connect to each other; wherein the users are able to browse the cloud service providers' connection to consumers; wherein each consumer is enabled to compare the services and terms of service to determine which service provider has services that match the consumer; further wherein the cloud book enables a first consumer to sign up for services with a first cloud service provider.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Inventors: John J. Roese, Stephen J. Todd
-
Publication number: 20150378789Abstract: A system and method are disclosed for dynamically reserving resources within a cluster environment. The method embodiment of the invention comprises receiving a request for resources in the cluster environment, monitoring events after receiving the request for resources and based on the monitored events, dynamically modifying at least one of the request for resources and the cluster environment.Type: ApplicationFiled: September 2, 2015Publication date: December 31, 2015Inventor: David Brian JACKSON
-
Publication number: 20150378790Abstract: Disclosed are systems, hybrid compute environments, methods and computer-readable media for dynamically provisioning nodes for a workload. In the hybrid compute environment, each node communicates with a first resource manager associated with the first operating system and a second resource manager associated with a second operating system. The method includes receiving an instruction to provision at least one node in the hybrid compute environment from the first operating system to the second operating system, after provisioning the second operating system, pooling at least one signal from the resource manager associated with the at least one node, processing at least one signal from the second resource manager associated with the at least one node and consuming resources associated with the at least one node having the second operating system provisioned thereon.Type: ApplicationFiled: August 24, 2015Publication date: December 31, 2015Inventor: David Brian JACKSON
-
Publication number: 20150378791Abstract: Creating, maintaining and using a lock dependency graph in a way that includes the following steps: (i) acquiring a first restriction on processor access in a multi-processor computer system; (ii) modeling the first restriction as first locking primitive information; and (iii) storing data corresponding to the first locking primitive information in a lock dependency graph. The first restriction on processor access is one of the following two types: (i) disabling the interrupts on a given processor; and/or (ii) sending inter-processor interrupts with synchronous waiting from one processor to another (including itself).Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventor: Srivatsa S. Bhat
-
Publication number: 20150378792Abstract: A deferral instruction associated with a transaction is executed in a transaction execution computing environment with transactional memory. Based on executing the deferral instruction, a processor sets a defer-state indicating that pending disruptive events such as interrupts or conflicting memory accesses are to be deferred. A pending disruptive event is deferred based on the set defer-state, and the transaction is completed based on the disruptive event being deferred. The progress of the transaction may be monitored during a deferral period. The length of such deferral period may be specified by the deferral instruction. Whether the deferral period has expired may be determined based on the monitored progress of the transaction. If the deferral period has expired, the transaction may be aborted and the disruptive event may be processed.Type: ApplicationFiled: August 28, 2015Publication date: December 31, 2015Inventors: Chung-Lung K. Shum, Timothy J. Slegel
-
Publication number: 20150378793Abstract: Throttling execution in a transaction operating in a processor configured to execute memory instructions out-of-program-order in a pipelined processor, wherein memory instructions are instructions for accessing operands in memory. Included is executing instructions of a transaction. Also included is determining whether the transaction is in throttling mode and based on determining that a transaction is in throttling mode, executing memory instructions in-program-order and dynamically prefetching memory operands of memory instructions.Type: ApplicationFiled: September 2, 2015Publication date: December 31, 2015Inventor: Michael Karl Gschwind
-
Publication number: 20150378794Abstract: Information processing device includes: a first storage unit for storing processing information indicative of predetermined processing and for sequentially outputting the stored processing information; a second storage unit for storing the processing information; a request management unit operative to receive and to store the received processing information in the first storage unit when available, and to store the received processing information in the second storage unit when the first storage unit is unavailable; a request acquisition unit operative to sequentially acquire the processing information output by the first storage unit when the processing information is present in the first storage unit, and search the second storage unit so as to detect and acquire the processing information when the processing information is absent in the first storage unit; and a processing execution unit to perform the predetermined processing according to the acquired processing information.Type: ApplicationFiled: May 27, 2015Publication date: December 31, 2015Applicant: Fujitsu LimitedInventor: Kenta Sato
-
Publication number: 20150378795Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for classifying events in a stream computing system using hierarchical analytic models. One of the methods includes receiving, by a stream computing system, data representing the values of one or more data attributes of an event in a stream of events. The values of each of the one or more data attributes are evaluated according to respective attribute-specific and class-specific criteria of a hierarchical analytic model in a predetermined order defined by the model. When a first value of a first data attribute satisfies one or more particular criteria for a first class, the first class of the plurality of classes is assigned to the event.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventor: Vinesh Prasanna Manoharan