Patents Issued in December 31, 2015
  • Publication number: 20150378746
    Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer configures the first computer to boot a second boot image. Upon power cycling, the first computer loads the second boot image.
    Type: Application
    Filed: September 8, 2015
    Publication date: December 31, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alex FRIEDMAN, Constantine GAVRILOV
  • Publication number: 20150378747
    Abstract: Technologies for pre-memory phase initialization include a computing device having a processor with a cache memory. The computing device may determine whether a temporary memory different from the cache memory of the processor is present for temporary memory access prior to initialization of a main memory of the computing device. In response to determining that temporary memory is present, a portion of the basic input/output instructions may be copied from a non-volatile memory of the computing device to the temporary memory for execution prior to initialization of the main memory. The computing device may also initialize a portion of the cache memory of the processor as Cache as RAM for temporary memory access prior to initialization of the main memory in response to determining that temporary memory is not present. After initialization, the main memory may be configured for subsequent memory access. Other embodiments are described and claimed.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: Giri P. Mudusuru, Rangasai V. Chaganty, Chasel Chiu, Satya P. Yarlagadda, Nivedita Aggarwal, Nuo Zhang
  • Publication number: 20150378748
    Abstract: Systems and methods may provide for assuming control over a processor in response to an operating system (OS) request to transition the processor into a sleeping state and transitioning the processor into an intermediate state that has a shorter wake latency than the sleeping state. Additionally, the processor may be maintained in the intermediate state until a wake event is detected. In one example, one or more power lowering operations may be reversed in response to the wake event.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: ANTONIO S. CHENG, SIDDHARTH SHAH
  • Publication number: 20150378749
    Abstract: An information processing device has a storage unit and a touch panel with a screen. The storage unit stores layout information indicating the positions at which various settings are displayed on the screen. The touch panel displays a setting selection screen on which the settings are arranged in the display positions indicated by the layout information, accepts selections of settings to be made, and displays help screens showing help information for each of the settings in an order corresponding to the display positions indicated by the layout information. The layout information can be altered to have the help information displayed in a desired order.
    Type: Application
    Filed: June 25, 2015
    Publication date: December 31, 2015
    Applicant: Oki Data Corporation
    Inventor: Makoto YAMASHITA
  • Publication number: 20150378750
    Abstract: The present disclosure relates generally to a method and a machine for creating protective packaging. The machine includes a controller including a processing element and a display in electrical communication with the processing element. In response to a user input or a machine operation input, the processing element selects demonstrative content corresponding to the user input or the machine operation input and the display displays the demonstrative content. Examples of demonstrative content include tutorial videos or photographs illustrating how to operate the machine, how to replace consumables used by the machine, replace or repair machine components, and/or how to package certain items using packaging materials created by the machine.
    Type: Application
    Filed: June 25, 2015
    Publication date: December 31, 2015
    Applicant: PREGIS INNOVATIVE PACKAGING LLC
    Inventors: Thomas D. Wetsch, George Bertram, Edward Eisenberger
  • Publication number: 20150378751
    Abstract: In a method for managing change in an information technology (IT) environment, in response to an open change ticket, identifying one or more components of the IT environment that are associated with at least one change operation included in the change ticket. The method further includes identifying information associated with the identified one or more components of the IT environment. The method further includes determining a listing of allowable change operations for the identified one or more components of the IT environment in the change ticket based on the identified information associated with the identified one or more components of the IT environment. The method further includes receiving a user requested change operation. The method further includes determining whether the received user requested change operation is included in the determined listing of allowable change operations.
    Type: Application
    Filed: June 25, 2014
    Publication date: December 31, 2015
    Inventors: Peter G. Finn, Manvendra Gupta
  • Publication number: 20150378752
    Abstract: Updating a native class pointer in persisted compiled code for use in an execution environment other than the one in which the native class pointer was created. This is done by using an identifier, stored with the persisted compiled code, of the class first loaded by the class loader that also loaded the class to which the native class pointer refers. A table is maintained in the execution environment mapping class identifiers to class loaders, and the stored identifier is used to consult this table to find a candidate class loader from those in the current execution environment that can provide the correct updated pointer.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventor: Mark G. Stoodley
  • Publication number: 20150378753
    Abstract: A network-based virtual computing resource provider may offer virtual compute instances that implement rolling resource credits for scheduling virtual computing resources. Work requests for a virtual compute instance may be received at a virtualization manager. A resource credit balance may be determined for the virtual compute instance. The resource credit balance may accumulate resource credits in rolling fashion, carrying over unused credits from previous time periods. Resource credits may then be applied when generating scheduling instructions to provide to a physical resource to perform the work requests, such as a physical CPU in order to increase the utilization of the resource according to the number of credits applied. Applied resource credits may then be deducted from the credit balance.
    Type: Application
    Filed: July 15, 2014
    Publication date: December 31, 2015
    Applicant: Amazon Technologies, Inc.
    Inventors: JOHN MERRILL PHILLIPS, WILLIAM JOHN EARL, DEEPAK SINGH
  • Publication number: 20150378754
    Abstract: A method for interrupting an execution of an overall program of an electronic control unit, wherein the overall program has a first program and a second program. A graphical modeling environment is provided that has graphical model elements, wherein the first program is represented by a first model element, and the second program is represented by a second model element, and the link between the first program and the second program is represented by a third model element. A halt condition is specified by the modeling environment, wherein a program status change leading to interruption of the execution of the overall program is specified by means of the halt condition, the overall program is executed, a program status change is detected during execution of the overall program. The execution of the overall program is interrupted when the program status change specified in the halt condition takes place.
    Type: Application
    Filed: June 25, 2015
    Publication date: December 31, 2015
    Applicant: dSPACE digital signal processing and control engineering GmbH
    Inventors: Lars STOCKMANN, Fabian EDLING
  • Publication number: 20150378755
    Abstract: In an embodiment, a request is received for a first partition to execute on a first virtual processor. If the first physical processor is available at a first node, the first virtual processor is dispatched to execute at the first physical processor at the first node that is the home node of the first virtual processor. If the first physical processor is not available, a determination is made whether the first physical processor is assigned to a second virtual processor and a home node of the second virtual processor is not the first node. If the first physical processor is assigned to a second virtual processor and the home node of the second virtual processor is not the first node, execution of the second virtual processor is stopped on the first physical processor and the first virtual processor is dispatched to the first physical processor.
    Type: Application
    Filed: September 9, 2015
    Publication date: December 31, 2015
    Inventors: Stuart Z. Jacobs, David A. Larson, Naresh Nayar
  • Publication number: 20150378756
    Abstract: Provided herein are systems and methods for instrumenting mobile applications. A decompiler of an instrumentation tool may convert byte code of a compiled mobile application to source code. The instrumentation tool may add instrumentation code into one or more selected classes of the source code by generating an instrumentation class in the source code for each of the one or more selected classes. A compiler of the instrumentation tool may compile the source code that includes instrumentation code into the byte code of the compiled mobile application. Responsive to execution of the compiled mobile application, the byte code that corresponds to the instrumentation code may report instrumentation data to one of a local file or a server.
    Type: Application
    Filed: June 24, 2015
    Publication date: December 31, 2015
    Inventors: Ole Lensmar, Abraham Nevado
  • Publication number: 20150378757
    Abstract: A method of optimizing software source code, where the source code is for execution as compiled bytecode using a just-in-time compiler. The source code is compiled to generate corresponding compiled bytecode. The bytecode is then executed using a just-in-time compiler. Run-time optimization actions performed by the just-in-time compiler during execution of the bytecode are determined, and analysed to determine corresponding optimization data for the source code.
    Type: Application
    Filed: June 10, 2015
    Publication date: December 31, 2015
    Inventors: Fiona M. Crowther, Geza Geleji, Christopher J. Poole, Martin A. Ross, Craig H. Stirling
  • Publication number: 20150378758
    Abstract: Techniques to process virtual machine objects through multistep workflows in a computer system are described. In an example, a method of processing virtual machine objects through a workflow having a plurality of ordered steps in a computer system includes executing the workflow on computing resources of the computer system using the virtual machine objects as parametric input, where the computing resources: divide the virtual machine objects into workgroups; perform instances of a step of the workflow in parallel on the workgroups as the workgroups complete a prior step in the workflow; and execute an agent to delegate the workgroups to, and receive results from, the instances of the step as the workflow is executed.
    Type: Application
    Filed: June 26, 2014
    Publication date: December 31, 2015
    Inventors: Matthew DUGGAN, David CHAVEZ, Aleksey PERSHIN, Kishore NADIMPALLI, Ilia LANGOUEV
  • Publication number: 20150378759
    Abstract: Systems and techniques are described for determining the status of migrating virtual machines. A described technique includes initiating a migration of one or more virtual machines from a source host that is located at a source site to a destination host that is located at a destination site. A determination is made that a fault has occurred during the migration of the one or more virtual machines. In response to determining that the error has occurred, a determination is made, for each virtual machine of the one or more virtual machines, whether the virtual machine has been fully migrated from the source host to the destination host.
    Type: Application
    Filed: June 26, 2014
    Publication date: December 31, 2015
    Inventors: Aleksey Pershin, Min Cai, Ilia Langouev, Gabriel Tarasuk-Levin
  • Publication number: 20150378760
    Abstract: A virtualized computing environment includes a plurality of host computers, each host being connected to a physical network and having a hypervisor executing therein. To provision a virtual machine requiring a connection to a virtual network in one of the hosts, a candidate host for hosting the virtual machine, the candidate host having the virtual network configured therein, is selected. A request is then made for a status of the virtual network to the candidate host. The status of the virtual network is then received from the candidate host. If the virtual network is available, then the virtual machine is deployed to the candidate host. If the virtual network is not available, then a second candidate host is selected for hosting the virtual machine.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: Chi-Hsiang SU, Sachin THAKKAR
  • Publication number: 20150378761
    Abstract: Techniques are disclosed for maintaining high availability (HA) for virtual machines (VMs) running on host systems of a host cluster, where each host system executes a HA module in a plurality of HA modules and a storage module in a plurality of storage modules, where the host cluster aggregates, via the plurality of storage modules, locally-attached storage resources of the host systems to provide an object store, where persistent data for the VMs is stored as per-VM storage objects across the locally-attached storage resources comprising the object store, and where a failure causes the plurality of storage modules to observe a network partition in the host cluster that the plurality of HA modules do not. In one embodiment, a host system in the host cluster executing a first HA module invokes an API exposed by the plurality of storage modules for persisting metadata for a VM to the object store.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: Marc Sevigny, Keith Farkas, Christos Karamanolis
  • Publication number: 20150378762
    Abstract: The current document is directed to methods and systems for monitoring the performance of memory management in virtual machines. By accurately measuring the performance of memory management in virtual machines, a virtualization layer can dynamically reconfigure virtual machines to use more optimal memory-management methods, intelligently schedule execution of virtual machines to increase memory-management performance, and migrate virtual machines among different servers and computer systems to increase memory-management performance.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Applicant: VMware, Inc.
    Inventors: Kalyan Saladi, Reza Taheri, Daniel Michael Hecht, Jin Heo, Jeffrey Buell
  • Publication number: 20150378763
    Abstract: Methods and apparatus to manage monitoring agents. A disclosed example involves determining if a virtual machine has a first service installed that corresponds to a service rule, the service rule to specify a service identifier and a configuration for a monitoring agent. The method also involves determining if the virtual machine has the monitoring agent corresponding to the first service. The method also involves, in response to determining if the first service matches the service identifier specified by the service rule and that the monitoring agent is not installed on the virtual machine, initiating installation of the monitoring agent on the virtual machine.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: Lital Hassine, Scott Feldstein, Moran Shimron
  • Publication number: 20150378764
    Abstract: An access data collector collects access assignment data characterizing active access assignment operations of a hypervisor in assigning host computing resources among virtual machines for use in execution of the virtual machines.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: Jeyashree SIVASUBRAMANIAN, Sudheer APTE
  • Publication number: 20150378765
    Abstract: Methods and apparatus are disclosed to scale application deployments in cloud computing environments using virtual machine pools.
    Type: Application
    Filed: August 7, 2014
    Publication date: December 31, 2015
    Inventors: Servesh SINGH, Kiran SINGH, Shyam MANKALA
  • Publication number: 20150378766
    Abstract: Embodiments described herein rapidly migrate child virtual machines (VM) by leveraging shared memory resources between parent and child VMs. In a first, proactive phase, parent VMs are migrated to a plurality of potential target hosts. In a second, reactive phase, after a request is received to migrate a child VM to a selected target host, memory blocks that are unique to the child VM are migrated to the selected target host. In some examples, memory blocks are compressed and decompressed as needed. In other examples, the operation environment is modified. Aspects of the disclosure offer a high performance, resource efficient solution that outperforms traditional approaches in areas of software compatibility, stability, quality of service control, resource utilization, and more.
    Type: Application
    Filed: December 31, 2014
    Publication date: December 31, 2015
    Inventors: Daniel James BEVERIDGE, Gabriel TARASUK-LEVIN
  • Publication number: 20150378767
    Abstract: Examples perform live migration of VMs from a source host to a destination host. The disclosure changes the storage environment, directly or through a vendor provider, to active/active synchronous and, during migration, migrates only data which is not already stored at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes, with exclusive access to the storage disks, and the system is returned to the previous storage environment (e.g., active/active asynchronous).
    Type: Application
    Filed: December 31, 2014
    Publication date: December 31, 2015
    Inventors: Gabriel TARASUK-LEVIN, Patrick William Penzias DIRKS, Ilia LANGOUEV, Curt KOLOVSON
  • Publication number: 20150378768
    Abstract: Systems, methods, and software described herein manage volumes and virtual machines using a location database gathered from a hypervisor management system. In one example, a method of operating a volume attachment service to manage volumes and virtual machines includes transferring a location request to a hypervisor management service to identify locations of one or more virtual machines. The method further provides, receiving the locations of the one or more virtual machines and storing the locations in a location database. The method also includes identifying a volume action request for a first virtual machine, and directing the volume action request to a hypervisor of the first virtual machine based on the locations in the location database.
    Type: Application
    Filed: March 25, 2015
    Publication date: December 31, 2015
    Inventors: Matthew Conover, Steven Lawson, Jeffrey Ulatoski
  • Publication number: 20150378769
    Abstract: A method for provisioning a virtualized resource includes directing, by a provisioning machine, a server-executed hypervisor to provision a virtual machine. The provisioning machine directs generation of an organizational unit within a first organizational unit within a multi-tenant directory service separated from a second organizational unit in the multi-tenant directory service by a firewall. The provisioning machine associates the virtual machine with the first organizational unit. The provisioning machine establishes at least one firewall rule on the virtual machine restricting communications to the virtual machine to communications from explicitly authorized machines, which including at least one other machine within the organizational unit. The provisioning machine receives a request to provision a virtualized resource for at least one user. The provisioning machine updates data associated with the organizational unit to include an identification of the at least one user.
    Type: Application
    Filed: May 26, 2015
    Publication date: December 31, 2015
    Inventors: Charles F. Buck, Jason A. Shivok
  • Publication number: 20150378770
    Abstract: A virtual machine backup method includes utilizing a log to indicate updates to memory of a virtual machine when the updates are evicted from a cache of the virtual machine. A guard band is determined that indicates a threshold amount of free space for the log. A determination is made that the guard band will be or has been encroached upon corresponding to indicating an update in the log. A backup image of the virtual machine is updated based, at least in part, on a set of one or more entries of the log, wherein the set of entries is sufficient to comply with the guard band. The set of entries is removed from the log.
    Type: Application
    Filed: June 1, 2015
    Publication date: December 31, 2015
    Inventors: Guy L. Guthrie, Naresh Nayar, Geraint North, William J. Starke, Albert J. Van Norstrand, JR.
  • Publication number: 20150378771
    Abstract: Examples perform live migration of objects such as VMs from a source host to a destination host. The disclosure exposes the contents of the storage disk at the destination host, compares the storage disk of the destination host to the source host, and during migration, migrates only data which is not already stored at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes, with exclusive access to the storage disks.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 31, 2015
    Inventors: Gabriel TARASUK-LEVIN, Patrick William Penzias DIRKS, Ilia LANGOUEV, Curt KOLOVSON
  • Publication number: 20150378772
    Abstract: A management system and method that generally allocates a virtual function to a virtual function definition of a virtual server, where the virtual function definition of the virtual server is previously assigned with a unique function identifier, and assigns the unique function identifier to the virtual function in response to the allocating of the virtual function, where the unique function identifier causes a discovery of the virtual function by the virtual server.
    Type: Application
    Filed: August 11, 2015
    Publication date: December 31, 2015
    Inventors: Gerhard Banzhaf, DAVID F. CRADDOCK, JAMES M. JENKS, ANGEL NUNEZ MENCIAS, JUSTIN D. MILLER, ERIC A. WEINMANN
  • Publication number: 20150378773
    Abstract: One aspect of the present invention provides a PLC system that can cause a programmable indicator to acquire a log in desired timing of a user without directly performing setting operation on the programmable indicator. The PLC system includes a PC and the programmable indicator having a logging function. When receiving input operation to turn on the logging function, the PC performs processing of transmitting a control command for performing the logging function to the programmable indicator. The programmable indicator turns on the logging function when receiving the control command from the PC.
    Type: Application
    Filed: June 25, 2015
    Publication date: December 31, 2015
    Inventors: Yuta NAGATA, Hidehiko SEKIMOTO
  • Publication number: 20150378774
    Abstract: A transaction request is received at a log-based transaction manager, indicating a conflict check delimiter and a read set descriptor indicative of one or more locations from which data is read during the requested transaction. Using the conflict check delimiter, a subset of transaction records stored in a particular persistent log to be examined for conflicts prior to committing the requested transaction is identified. In response to determining that none of the read locations of the requested transaction correspond to a write location indicated in the subset of transaction records, a new transaction record is stored in the particular persistent log indicating that the requested transaction has been committed.
    Type: Application
    Filed: June 26, 2014
    Publication date: December 31, 2015
    Applicant: AMAZON TECHNOLOGIES, INC.
    Inventor: ALLAN HENRY VERMEULEN
  • Publication number: 20150378775
    Abstract: A transaction request is received at a log-based transaction manager, indicating a logical constraint to be satisfied before the corresponding transaction is committed. The transaction manager identifies a subset of transaction records stored in a persistent change log that are to be examined to evaluate the logical constraint. Based at least in part on the result of a comparison of one or more constraint-related data signatures included in the transaction request with corresponding data signatures in the subset of transaction records, a decision is made to commit the requested transaction.
    Type: Application
    Filed: June 26, 2014
    Publication date: December 31, 2015
    Applicant: Amazon Technologies, Inc.
    Inventor: ALLAN HENRY VERMEULEN
  • Publication number: 20150378776
    Abstract: This invention relates to scheduling threads in a multicore processor. Executable transactions may be scheduled using at least one distribution queue, which lists executable transactions in order of eligibility for execution, and multilevel scheduler which comprises a plurality of linked individual executable transaction schedulers. Each of these includes a scheduling algorithm for determining the most eligible executable transaction for execution. The most eligible executable transaction is outputted from the multilevel scheduler to the at least one distribution queue.
    Type: Application
    Filed: September 9, 2015
    Publication date: December 31, 2015
    Inventor: Mark David Lippett
  • Publication number: 20150378777
    Abstract: Execution of a transaction mode setting instruction causes a computer processor to be in an atomic read-only mode ignoring conflicts to certain write-sets of a transaction during transactional execution. Read-set conflicts may still cause a transactional abort. Absent any aborting, the transaction's execution may complete, by committing transactional stores to memory and updating architecture states.
    Type: Application
    Filed: June 26, 2014
    Publication date: December 31, 2015
    Inventors: Michael Karl Gschwind, Eric M. Schwarz, Chung-Lung K. Shum, Timothy J. Slegel
  • Publication number: 20150378778
    Abstract: Execution of a transaction mode setting instruction causes a computer processor to be in an atomic write-only mode ignoring conflicts to certain read-sets of a transaction during transactional execution. Write-set conflicts may still cause a transactional abort. Absent any aborting, the transaction's execution may complete, by committing transactional stores to memory and updating architecture states.
    Type: Application
    Filed: June 26, 2014
    Publication date: December 31, 2015
    Inventors: Michael Karl Gschwind, Chung-Lung K. Shum, Timothy J. Slegel
  • Publication number: 20150378779
    Abstract: Execution of a transaction may be initiated by a CPU in a transactional execution (TX) environment. A set of TX performance characteristics of the transaction during the transactional execution may be collected and stored in a location specified by an instruction of the transaction when the transactional execution ends or aborts.
    Type: Application
    Filed: August 20, 2015
    Publication date: December 31, 2015
    Inventors: Fadi Y. Busaba, Harold W. Cain, III, Dan F. Greiner, Michael Karl Gschwind, Valentina Salapura, Eric M. Schwarz, Chung-Lung K. Shum
  • Publication number: 20150378780
    Abstract: Discontiguous storage locations are prefetched by a prefetch instruction. Addresses of the discontiguous storage locations are provided by a list directly or indirectly specified by a parameter of the prefetch instruction, along with metadata and information about the list entries. Fetching of corresponding data blocks to cache lines is initiated. A processor may enter transactional execution mode and memory instructions of a program may be executed using the prefetched data blocks.
    Type: Application
    Filed: August 20, 2015
    Publication date: December 31, 2015
    Inventors: Fadi Y. Busaba, Dan F. Greiner, Michael Karl Gschwind, Maged M. Michael, Valentina Salapura, Eric M. Schwarz, Timothy J. Slegel
  • Publication number: 20150378781
    Abstract: Transactional execution of a transaction beginning instruction initiates prefetching, by a CPU, of discontiguous storage locations specified by a list. The list includes entries specifying addresses and may also include corresponding metadata. The list may be specified by levels of indirection. Fetching of corresponding discontiguous cache lines is initiated while in TX mode. Additional instructions in the transaction may be executed and use the prefetched cache lines.
    Type: Application
    Filed: August 20, 2015
    Publication date: December 31, 2015
    Inventors: Fadi Y. Busaba, Dan F. Greiner, Michael Karl Gschwind, Maged M. Michael, Valentina Salapura, Eric M. Schwarz, Timothy J. Slegel
  • Publication number: 20150378782
    Abstract: Tasks may be scheduled on more than one processor to allow the processors to operate at lower processor frequencies and processor supply voltages. In particular, realtime tasks may be scheduled on idle processors without context switching an existing executing tasks. For example, a method of executing tasks on a plurality of processors may include receiving a new task with an earlier deadline than an executing task; determining whether an idle processor is available; and when an idle processor is available, executing the new task on the idle processor.
    Type: Application
    Filed: November 17, 2014
    Publication date: December 31, 2015
    Applicant: Unisys Corporation
    Inventors: Chandan Hks, Sonika P. Reddy
  • Publication number: 20150378783
    Abstract: Examples perform live migration of virtual machines (VM) from a source host to a destination host. The live migration performs time-consuming operations before the source host is stunned, reducing the downtime apparent to users. Some examples contemplate pre-copying memory from the source VM to the destination VM, and the opening of disks on the destination VM before stunning the source VM.
    Type: Application
    Filed: December 31, 2014
    Publication date: December 31, 2015
    Inventors: Gabriel TARASUK-LEVIN, Patrick William Penzias DIRKS, Haripriya RAJAGOPAL, Sujay Shrikant GODBOLE, Derek ULUSKI
  • Publication number: 20150378784
    Abstract: Work flows consist of the following steps: (i) receiving a work flow data set that defines a work flow which includes a plurality of work items; and (ii) defining, a centralized and pattern-based work flow level job input/output (I/O) characteristic set that includes at least I/O settings for work items included in the work flow.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: Kinson Chik, Meng Ding, Qingda Wang
  • Publication number: 20150378785
    Abstract: The disclosure describes performing live migration of objects such as virtual machines (VMs) from a source host to a destination host. The disclosure changes the storage environment, directly or through a vendor provider, to active/passive synchronous or near synchronous and, during migration, migrates only data which has not already been replicated at the destination host. The source and destination VMs have concurrent access to storage disks during migration. After migration, the destination VM executes with exclusive access to the storage disks, and the system is returned to the previous storage environment of active/passive asynchronous.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 31, 2015
    Inventors: Gabriel TARASUK-LEVIN, Patrick William Penzias DIRKS, Ilia LANGOUEV, Curt KOLOVSON
  • Publication number: 20150378786
    Abstract: Allocation of physical resources is achieved by accessing consumption data for each of a plurality of application components executing in one or more virtual machines and consuming a plurality of allocated physical resources. The consumption data is indicative of consumption levels by each of the plurality of application components of each of the plurality of physical resources. Following a determination that a value for a performance metric associated with the application has crossed an associated threshold value, the consumption data is analyzed to identify a consumption level of a first of the plurality of physical resources being consumed by a first of the plurality of application components has deviated from a historical trend for that physical resource. An instruction is then communicated that when executed will cause a change in an allocation level of the first of the plurality of physical resources.
    Type: Application
    Filed: January 31, 2013
    Publication date: December 31, 2015
    Inventors: Adarsh Suparna, Ajeya H Simha
  • Publication number: 20150378787
    Abstract: A computer implemented method for assigning workload slices from a workload to upcoming frames to be processed during the rendering of the upcoming frames. The processing time of upcoming frames and workload slices varies at runtime according to system resources The method determines an effective frame rate that estimates the duration of an upcoming frame and also determines an effective slice rate that estimates the time it takes to complete an upcoming workload slice. Based on the effective frame rate and the effective slice rate, the method then calculates the slice-to-frame ratio which defines the rate in which slices are assigned to upcoming frames. The slice-to-frame ratio can dynamically change to accommodate for changes to the processing time of rendered frames and completed workload slices.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventor: Stefan Cameron
  • Publication number: 20150378788
    Abstract: A computer implemented method, system and computer program product enabling cloud service providers to register in a cloud book; wherein the cloud book includes a profile for each cloud service provider of the cloud service providers including the services and terms of service for each cloud service provider of the cloud service providers; and enabling consumers to register in the cloud book; wherein the users are able to connect to each other; wherein the users are able to browse the cloud service providers' connection to consumers; wherein each consumer is enabled to compare the services and terms of service to determine which service provider has services that match the consumer; further wherein the cloud book enables a first consumer to sign up for services with a first cloud service provider.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: John J. Roese, Stephen J. Todd
  • Publication number: 20150378789
    Abstract: A system and method are disclosed for dynamically reserving resources within a cluster environment. The method embodiment of the invention comprises receiving a request for resources in the cluster environment, monitoring events after receiving the request for resources and based on the monitored events, dynamically modifying at least one of the request for resources and the cluster environment.
    Type: Application
    Filed: September 2, 2015
    Publication date: December 31, 2015
    Inventor: David Brian JACKSON
  • Publication number: 20150378790
    Abstract: Disclosed are systems, hybrid compute environments, methods and computer-readable media for dynamically provisioning nodes for a workload. In the hybrid compute environment, each node communicates with a first resource manager associated with the first operating system and a second resource manager associated with a second operating system. The method includes receiving an instruction to provision at least one node in the hybrid compute environment from the first operating system to the second operating system, after provisioning the second operating system, pooling at least one signal from the resource manager associated with the at least one node, processing at least one signal from the second resource manager associated with the at least one node and consuming resources associated with the at least one node having the second operating system provisioned thereon.
    Type: Application
    Filed: August 24, 2015
    Publication date: December 31, 2015
    Inventor: David Brian JACKSON
  • Publication number: 20150378791
    Abstract: Creating, maintaining and using a lock dependency graph in a way that includes the following steps: (i) acquiring a first restriction on processor access in a multi-processor computer system; (ii) modeling the first restriction as first locking primitive information; and (iii) storing data corresponding to the first locking primitive information in a lock dependency graph. The first restriction on processor access is one of the following two types: (i) disabling the interrupts on a given processor; and/or (ii) sending inter-processor interrupts with synchronous waiting from one processor to another (including itself).
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventor: Srivatsa S. Bhat
  • Publication number: 20150378792
    Abstract: A deferral instruction associated with a transaction is executed in a transaction execution computing environment with transactional memory. Based on executing the deferral instruction, a processor sets a defer-state indicating that pending disruptive events such as interrupts or conflicting memory accesses are to be deferred. A pending disruptive event is deferred based on the set defer-state, and the transaction is completed based on the disruptive event being deferred. The progress of the transaction may be monitored during a deferral period. The length of such deferral period may be specified by the deferral instruction. Whether the deferral period has expired may be determined based on the monitored progress of the transaction. If the deferral period has expired, the transaction may be aborted and the disruptive event may be processed.
    Type: Application
    Filed: August 28, 2015
    Publication date: December 31, 2015
    Inventors: Chung-Lung K. Shum, Timothy J. Slegel
  • Publication number: 20150378793
    Abstract: Throttling execution in a transaction operating in a processor configured to execute memory instructions out-of-program-order in a pipelined processor, wherein memory instructions are instructions for accessing operands in memory. Included is executing instructions of a transaction. Also included is determining whether the transaction is in throttling mode and based on determining that a transaction is in throttling mode, executing memory instructions in-program-order and dynamically prefetching memory operands of memory instructions.
    Type: Application
    Filed: September 2, 2015
    Publication date: December 31, 2015
    Inventor: Michael Karl Gschwind
  • Publication number: 20150378794
    Abstract: Information processing device includes: a first storage unit for storing processing information indicative of predetermined processing and for sequentially outputting the stored processing information; a second storage unit for storing the processing information; a request management unit operative to receive and to store the received processing information in the first storage unit when available, and to store the received processing information in the second storage unit when the first storage unit is unavailable; a request acquisition unit operative to sequentially acquire the processing information output by the first storage unit when the processing information is present in the first storage unit, and search the second storage unit so as to detect and acquire the processing information when the processing information is absent in the first storage unit; and a processing execution unit to perform the predetermined processing according to the acquired processing information.
    Type: Application
    Filed: May 27, 2015
    Publication date: December 31, 2015
    Applicant: Fujitsu Limited
    Inventor: Kenta Sato
  • Publication number: 20150378795
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for classifying events in a stream computing system using hierarchical analytic models. One of the methods includes receiving, by a stream computing system, data representing the values of one or more data attributes of an event in a stream of events. The values of each of the one or more data attributes are evaluated according to respective attribute-specific and class-specific criteria of a hierarchical analytic model in a predetermined order defined by the model. When a first value of a first data attribute satisfies one or more particular criteria for a first class, the first class of the plurality of classes is assigned to the event.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventor: Vinesh Prasanna Manoharan