Patents Issued in August 3, 2017
  • Publication number: 20170220327
    Abstract: Embodiments include method, systems and computer program products for dynamic source code generation. In some embodiments, a request comprising data may be received. Parsed natural language may be generated using the data. Knowledgebase data may be obtained. Source code may be generated based on the parsed natural language and the knowledgebase data. The generate source code may be transmitted in response to the request.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 3, 2017
    Inventors: Corville O. Allen, Heather L. Duschl, Marit L. Imsdahl, Alexandra D Markello, Dana L. Price
  • Publication number: 20170220328
    Abstract: A method for significantly reducing compilation time of an application program is provided for compiling the program using profile-directed feedback (PDF). The method applies an additional analysis process between a training run of the application program and a whole program compilation of the application. This analysis process examines a PDF profile file(s) produced during the training run and aggregates data from the PDF file to determine a maximum block counter associated with each source file of the application. Only those source files having maximum block counters in a specified top percent of all the source files of the application have their fat binaries included in the whole program compilation.
    Type: Application
    Filed: October 13, 2016
    Publication date: August 3, 2017
    Inventors: Shimin Cui, William G. O'Farrell, Graham K. Yiu
  • Publication number: 20170220329
    Abstract: This application discloses an image deployment method, where the image deployment method is applied to a container system. Information about an image that has been deployed on each host is collected. After an image tag of a to-be-deployed image is obtained, a degree of overlapping between the image that has been deployed on each host and the to-be-deployed image is determined. A host with a higher overlapping degree needs to download a smaller amount of data when deploying the to-be-deployed image and deploys the to-be-deployed image at a higher speed. Finally, a management node selects, according to overlapping degrees of the hosts, a deployment host for deploying the to-be-deployed image.
    Type: Application
    Filed: April 20, 2017
    Publication date: August 3, 2017
    Inventors: Lei YANG, Jincheng LI, Hang WANG
  • Publication number: 20170220330
    Abstract: A remote support installation mechanism provides for the installation of a remote support client application onto a user device. A server may receive a request for a remote support eligibility status from a device agent application on a user device that is loaded with an installer package for a remote support client application. The remote support client application may be used to initiate a remote support session with a remote support application on a remote support server to provide a computing terminal with remote support access to the user device. The server may determine based on at least one of a device management database or a user account database that the user device qualifies for remote support. Accordingly, the server may send an install command to trigger an installation of the remote support client application on the user device from the installer package.
    Type: Application
    Filed: January 28, 2016
    Publication date: August 3, 2017
    Inventors: Jonathan Michael Soini, Timothy Adam Shelton
  • Publication number: 20170220331
    Abstract: A trusted execution environment on an enterprise-enabled computing device allows invocation of a suite of secure applications (apps) on a computing device in an enterprise without hindering external or non-enterprise apps from running on in the same memory space on the same enterprise computing device. An application wrapper provides an operation queue for storing application lifecycle operations while the trusted execution environment is enabled, and the environment is secured. The application defers lifecycle operation to ensure that all security measures are in place before it is allowed to execute.
    Type: Application
    Filed: February 2, 2016
    Publication date: August 3, 2017
    Inventors: James Seibel, Kevin LaFlamme
  • Publication number: 20170220332
    Abstract: Functionality is described herein for performing at least one network connectivity task on a client device with the aid of one or more assistant devices. In some implementations, a client device (such as a smartphone, desktop personal computing device, etc.) relies on an assistant device to assist it in updating its programs, including its driver programs. In other implementations, a client device relies on an assistant device in establishing a network connection with a network-accessible entity. Functionality is also described herein for performing at least one program execution task on a client device with the aid of one or more assistant devices. For instance, the client device may rely on the assistant device to assist it in executing a driver program. The driver program, in turn, enables the client device to interact with a peripheral device or some other component.
    Type: Application
    Filed: January 28, 2016
    Publication date: August 3, 2017
    Inventors: Harish Srinivasan, Benjamin M. Schultz, James C. Gray, Nishad Mulye
  • Publication number: 20170220333
    Abstract: Systems and methods of the present invention provide for one or more centralized server computers communicatively coupled to a network and configured to: receive a request to update an image on a client device connected via the network. A software running on the central computer uses a USB signal conversion software, running on a kit computer and connected to the client device, to simulate the client device being directly connected to the server computer through the network for re-imaging of the client device. A data transfer/charging switch software on the kit computer switches the amperage of the kit computer appropriately to accommodate a data transfer and charging mode for the client device.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 3, 2017
    Inventor: David Higginson
  • Publication number: 20170220334
    Abstract: Systems and methods are presented for a mobile device comprising an industrial internet application container comprising a plurality constituent applications configured for execution within the container on the device, the constituent applications providing different respective functionalities.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 3, 2017
    Inventors: Michael Hart, Milton Waid, Andy Johns, Jeremy Osterhoudt
  • Publication number: 20170220335
    Abstract: A system and method for deploying user apps to user devices is disclosed. A service module on a host system maintains class files of the user app within an original archive, and creates an install agent archive and a modified user app archive from the original archive. In some embodiments, the service module deploys an install agent from the install agent archive and a runtime agent of the modified user app archive to the user device. In other embodiments, the install agent and the runtime agent are pre-installed within a virtual machine of the user device. The install agent receives the class files from the service module, and the runtime agent loads and executes the class files to deploy the user app on the user device. In a preferred embodiment, the system enables faster initial deployment and redeployment of user apps on Android user devices than current systems and methods.
    Type: Application
    Filed: January 31, 2017
    Publication date: August 3, 2017
    Inventors: Madis Pink, Allan Raundahl Gregersen, Rein Raudjärv
  • Publication number: 20170220336
    Abstract: Aspects of the present invention generally relate to a system, method, and computer program product for transforming APIs from legacy system-of-record to new system-of-engagement using complete API process logic. API candidates are generated from execution traces for transforming the API from the legacy system to a new system of record. An embodiment of the invention is first, add implementers into a legacy systems and collect the instrumenter output as execution traces. Second, rank the execution traces and find the most frequent execution traces. Third, consolidate the execution traces by merging common trace segments. The codes covered by the consolidated execution traces will be considered as candidate API components. Fourth, expand the merged execution traces and find related execution traces and check the connectivity between different nodes.
    Type: Application
    Filed: February 2, 2016
    Publication date: August 3, 2017
    Inventors: Hao Chen, Ya Bin Dang, Shao Chun Li, Guang Tai Liang, Li Jun Mei, Zhenyu Zhang
  • Publication number: 20170220337
    Abstract: A computer program product for verifying source code in disparate source control systems. A processor configured to: obtain a first source code from a target repository; access a second source code from a source repository; and verify each file in the first source code matches each corresponding file in the second source code. Verifying causes the processor to: read contents of a file in the first source code in the target repository; access a corresponding file in the second source code in the source repository; replace contents of the corresponding file in the second source code in the source repository with the contents of the file in the first source code in the target repository; execute an editor in the source repository to display differences in the corresponding file that have been modified as a result of replacing contents; and log each file that does not match.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 3, 2017
    Inventors: Lauren J. Hayward Schaefer, David G. Terry
  • Publication number: 20170220338
    Abstract: A technique includes tracking changes to a code base using a source code management application; and maintaining a correlation between defects in the code base and changes addressing the defects. The technique includes determining a defect density in a subset of the code base associated with implementation of a requirement for the code base. Determining the defect density includes identifying how many defects are addressed by changes that modify the subset of the code base.
    Type: Application
    Filed: April 19, 2017
    Publication date: August 3, 2017
    Inventors: Miroslav Novak, Filip Blaha, Petr Dousa
  • Publication number: 20170220339
    Abstract: The present invention provides information for making a decision so as to efficiently localize environment-dependent portions of a program. Man-hours required to localize the environment-dependent portions are calculated by means of a unique method using program structure data and environment-dependent portions data. An effect of localizing the environment-dependent portions is calculated and visualized based on a Lorenz curve and a Gini coefficient.
    Type: Application
    Filed: December 5, 2014
    Publication date: August 3, 2017
    Applicant: HITACHI, LTD.
    Inventors: Daisuke FUKUI, Genta KOREKI
  • Publication number: 20170220340
    Abstract: Provided is an information processing system for detecting a project risk more preferably with fewer input information. The system includes: feature representation totalizing means that totalizes an occurrence frequency of a feature representation related to each process based on a set of a message and a time of occurrence of the message, and on feature representation information indicating the feature representation related to the process; and discrepancy determination means that outputs information about discrepancy between ideal and actual states of the process based on an occurrence rate calculated from the occurrence frequency related to the process and on a detection rule that defines a position of the occurrence rate on a time axis.
    Type: Application
    Filed: August 4, 2015
    Publication date: August 3, 2017
    Applicant: NEC Corporation
    Inventors: Ayako HOSHINO, Takashi SHIRAKI
  • Publication number: 20170220341
    Abstract: Embodiments are directed to a computer implemented method for executing machine instructions in a central processing unit. The method includes obtaining, by a processor system, a machine instruction for execution, the machine instruction being defined for computer execution according to a computer architecture. The method further includes executing the machine instruction, wherein the executing includes loading a multiplicand into a multiplicand register, and loading a multiplier into a multiplier register. The executing further generates an intermediate product having least significant bits by multiplying the multiplicand and the multiplier. The executing further includes generating a rounded product by performing a probability analysis on the least significant bits of the intermediate product, and initiating a rounding operation on the intermediate product to produce the rounded product based at least in part on the probability analysis.
    Type: Application
    Filed: January 28, 2016
    Publication date: August 3, 2017
    Inventors: Jonathan D. Bradbury, Steven R. Carlough, Brian R. Prasky, Eric M. Schwarz
  • Publication number: 20170220342
    Abstract: Embodiments are directed to a computer implemented method for executing machine instructions in a central processing unit. The executing includes loading a first operand into a first operand register, and loading a second operand into a second operand register. The executing further includes shifting either the first operand or the second operand to form a shifted operand. The executing further includes adding or subtracting the first operand and the second operand to obtain a sum or a difference, and loading the sum or the difference having a least significant bit into a third register or a memory. The executing further includes performing a probability analysis on least significant bits of the shifted operand or the non-shifted operand, and initiating a rounding operation on the least significant bit of the sum or the difference based at least in part on the probability analysis.
    Type: Application
    Filed: January 28, 2016
    Publication date: August 3, 2017
    Inventors: Jonathan D. Bradbury, Steven R. Carlough, Brian R. Prasky, Eric M. Schwarz
  • Publication number: 20170220343
    Abstract: Embodiments are directed to a computer implemented method for executing machine instructions in a central processing unit. The method includes obtaining, by a processor system, a machine instruction for execution, the machine instruction being defined for computer execution according to a computer architecture. The method further includes executing the machine instruction, wherein the executing includes loading a multiplicand into a multiplicand register, and loading a multiplier into a multiplier register. The executing further generates an intermediate product having least significant bits by multiplying the multiplicand and the multiplier. The executing further includes generating a rounded product by performing a probability analysis on the least significant bits of the intermediate product, and initiating a rounding operation on the intermediate product to produce the rounded product based at least in part on the probability analysis.
    Type: Application
    Filed: February 14, 2017
    Publication date: August 3, 2017
    Inventors: Jonathan D. Bradbury, Steven R. Carlough, Brian R. Prasky, Eric M. Schwarz
  • Publication number: 20170220344
    Abstract: Embodiments are directed to a computer implemented method for executing machine instructions in a central processing unit. The executing includes loading a first operand into a first operand register, and loading a second operand into a second operand register. The executing further includes shifting either the first operand or the second operand to form a shifted operand. The executing further includes adding or subtracting the first operand and the second operand to obtain a sum or a difference, and loading the sum or the difference having a least significant bit into a third register or a memory. The executing further includes performing a probability analysis on least significant bits of the shifted operand or the non-shifted operand, and initiating a rounding operation on the least significant bit of the sum or the difference based at least in part on the probability analysis.
    Type: Application
    Filed: February 14, 2017
    Publication date: August 3, 2017
    Inventors: Jonathan D. Bradbury, Steven R. Carlough, Brian R. Prasky, Eric M. Schwarz
  • Publication number: 20170220345
    Abstract: Methods, systems, and apparatus, including an apparatus for processing an instruction for accessing a N-dimensional tensor, the apparatus including multiple tensor index elements and multiple dimension multiplier elements, where each of the dimension multiplier elements has a corresponding tensor index element. The apparatus includes one or more processors configured to obtain an instruction to access a particular element of a N-dimensional tensor, where the N-dimensional tensor has multiple elements arranged across each of the N dimensions, and where N is an integer that is equal to or greater than one; determine, using one or more tensor index elements of the multiple tensor index elements and one or more dimension multiplier elements of the multiple dimension multiplier elements, an address of the particular element; and output data indicating the determined address for accessing the particular element of the N-dimensional tensor.
    Type: Application
    Filed: March 13, 2017
    Publication date: August 3, 2017
    Inventors: Dong Hyuk Woo, Andrew Everett Phelps
  • Publication number: 20170220346
    Abstract: Briefly, methods and apparatus to migrate a software thread from one wavefront executing on one execution unit to another wavefront executing on another execution unit whereby both execution units are associated with a compute unit of a processing device such as, for example, a GPU. The methods and apparatus may execute compiled dynamic thread migration swizzle buffer instructions that when executed allow access to a dynamic thread migration swizzle buffer that allows for the migration of register context information when migrating software threads. The register context information may be located in one or more locations of a register file prior to storing the register context information into the dynamic thread migration swizzle buffer. The method and apparatus may also return the register context information from the dynamic thread migration swizzle buffer to one or more different register file locations of the register file.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 3, 2017
    Applicant: Advanced Micro Devices, Inc.
    Inventors: Bradford Beckmann, Sooraj Puthoor
  • Publication number: 20170220347
    Abstract: In one embodiment, the present invention includes a method for receiving a rounding instruction and an immediate value in a processor, determining if a rounding mode override indicator of the immediate value is active, and if so executing a rounding operation on a source operand in a floating point unit of the processor responsive to the rounding instruction and according to a rounding mode set forth in the immediate operand. Other embodiments are described and claimed.
    Type: Application
    Filed: April 12, 2017
    Publication date: August 3, 2017
    Inventors: Ronen Zohar, Shane Story
  • Publication number: 20170220348
    Abstract: In one embodiment, the present invention includes a method for receiving a rounding instruction and an immediate value in a processor, determining if a rounding mode override indicator of the immediate value is active, and if so executing a rounding operation on a source operand in a floating point unit of the processor responsive to the rounding instruction and according to a rounding mode set forth in the immediate operand. Other embodiments are described and claimed.
    Type: Application
    Filed: April 12, 2017
    Publication date: August 3, 2017
    Inventors: Ronen Zohar, Shane Story
  • Publication number: 20170220349
    Abstract: In one embodiment, the present invention includes a method for receiving a rounding instruction and an immediate value in a processor, determining if a rounding mode override indicator of the immediate value is active, and if so executing a rounding operation on a source operand in a floating point unit of the processor responsive to the rounding instruction and according to a rounding mode set forth in the immediate operand. Other embodiments are described and claimed.
    Type: Application
    Filed: April 12, 2017
    Publication date: August 3, 2017
    Inventors: Ronen Zohar, Shane Story
  • Publication number: 20170220350
    Abstract: An apparatus and method are described for performing a bit reversal and permutation on mask values. For example, a processor is described to execute an instruction to perform the operations of: reading a plurality of mask bits stored in a source mask register, the mask bits associated with vector data elements of a vector register; and performing a bit reversal operation to copy each mask bit from a source mask register to a destination mask register, wherein the bit reversal operation causes bits from the source mask register to be reversed within the destination mask register resulting in a symmetric, mirror image of the original bit arrangement.
    Type: Application
    Filed: April 13, 2017
    Publication date: August 3, 2017
    Inventors: Elmoustapha OULD-AHMED-VALL, Robert VALENTINE
  • Publication number: 20170220351
    Abstract: A processor includes a plurality of packed data registers. The processor also includes a decode unit to decode a packed variable length code point length determination instruction. The instruction is to indicate a first source packed data that is to have a plurality of packed variable length code points that are each to represent a character. The instruction is also to indicate a destination storage location. The processor also has an execution unit coupled with the decode unit and the packed data registers. The execution unit, in response to the instruction, is to store a result packed data in the indicated destination storage location. The result packed data is to have a length for each of the plurality of the packed variable length code points. Other processors, methods, systems, and instructions are also disclosed.
    Type: Application
    Filed: April 17, 2017
    Publication date: August 3, 2017
    Applicant: lntel Corporation
    Inventor: Shihjong Kuo
  • Publication number: 20170220352
    Abstract: Methods, systems, and apparatus, including an apparatus for processing an instruction for accessing a N-dimensional tensor, the apparatus including multiple tensor index elements and multiple dimension multiplier elements, where each of the dimension multiplier elements has a corresponding tensor index element. The apparatus includes one or more processors configured to obtain an instruction to access a particular element of a N-dimensional tensor, where the N-dimensional tensor has multiple elements arranged across each of the N dimensions, and where N is an integer that is equal to or greater than one; determine, using one or more tensor index elements of the multiple tensor index elements and one or more dimension multiplier elements of the multiple dimension multiplier elements, an address of the particular element; and output data indicating the determined address for accessing the particular element of the N-dimensional tensor.
    Type: Application
    Filed: February 3, 2016
    Publication date: August 3, 2017
    Inventors: Dong Hyuk Woo, Andrew Everett Phelps
  • Publication number: 20170220353
    Abstract: Methods and apparatus for predicting the value of a stack pointer which store data when an instruction is seen which grows the stack. The information which is stored includes a size parameter which indicates by how much the stack is grown and one or both of: the register ID currently holding the stack pointer value or the current stack pointer value. When a subsequent instruction shrinking the stack is seen, the stored data is searched for one or more entries which has a corresponding size parameter. If such an entry is identified, the other information stored in that entry is used to predict the value of the stack pointer instead of using the instruction to calculate the new stack pointer value. Where register renaming is used, the information in the entry is used to remap the stack pointer to a different physical register.
    Type: Application
    Filed: April 18, 2017
    Publication date: August 3, 2017
    Inventor: Hugh Jackson
  • Publication number: 20170220354
    Abstract: Example implementations relate to server node shutdown. For example, a server node shutdown can include detecting a secondary power supply integrated into a server node, receiving a primary power supply interruption signal from the secondary power supply, and initiating a sequenced shutdown of the server node in response to receiving the signal using the secondary power supply.
    Type: Application
    Filed: November 12, 2014
    Publication date: August 3, 2017
    Inventors: David C. Valdez, Patrick A. Raymond, Justin H. Park, David P. Mohr, Hai Ngoc Nguyen
  • Publication number: 20170220355
    Abstract: A system includes a programmable non-volatile memory, a switch, a control chipset, and a basic input/output (BIOS) module. The switch has a first terminal coupled to the programmable non-volatile memory, and a second terminal coupled to the control chipset. The control chipset is configured to store a SKU parameter set in the programmable non-volatile memory according to a predetermined memory allocation. The BIOS module is coupled to the control chipset, and is configured to load and update the SKU parameter set according to the predetermined memory configuration during a booting operation of the motherboard.
    Type: Application
    Filed: February 2, 2016
    Publication date: August 3, 2017
    Inventors: Bo-Wen HUANG, Kei-Way CHANG, Shih-Ta CHU, Jun-Jie WU, Chen-Nan HSIAO
  • Publication number: 20170220356
    Abstract: Embodiments of the present invention relate to methods and apparatus for operating a host device (e.g. a ‘plug-and-play’ host device) coupled to a peripheral device (e.g. a mobile phone). In some embodiments, the host device may analyzed peripheral device-descriptive data (e.g. including but not limited to USB endpoint data) and determine information about the peripheral device in accordance with the results of the analysis. Operations that may be carried out by the host device in accordance with results of the analysis include but are not limited to protocol selection, retrieval of cell phone data, and determining software or hardware resource(s) of the peripheral device. In some embodiments, it is possible to actively suppress natural OS behavior whereby a device driver(s) specified by the peripheral device (e.g. in a hardware identifier) is loaded by the host device. For example, it is possible to load a surrogate driver instead.
    Type: Application
    Filed: December 5, 2016
    Publication date: August 3, 2017
    Inventor: Almog BEN HAROSH
  • Publication number: 20170220357
    Abstract: Provided is an image display apparatus including a sensor configured to sense a power control input with respect to the image display apparatus; a processor; a memory; and one or more instructions stored in the memory, which when executed by the processor, cause the image display apparatus to perform booting according to a state of the image display apparatus in response to the power control input being sensed while the image display apparatus is in an on state, and to enter a suspended state when the booting is completed.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 3, 2017
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Hyun-seok CHOI, Cheul-hee HAHM, Seok-young YOON
  • Publication number: 20170220358
    Abstract: In one aspect, a first device includes a processor, a display accessible to the processor, and storage accessible to the processor. The storage bears instructions executable by the processor to determine at least one element to present on the display to control a second device, where the determination is based at least in part on identification of at least one current relevancy parameter. The instructions are also executable by the processor to present the at least one element on the display.
    Type: Application
    Filed: February 2, 2016
    Publication date: August 3, 2017
    Inventors: Russell Speight VanBlon, Arnold S. Weksler, John Carl Mese, Nathan J. Peterson
  • Publication number: 20170220359
    Abstract: Non-limiting examples of the present disclosure describe surfacing a representation of digital artifacts for a user. An operation context associated with a user is identified. The operational context may correspond with an electronic document that is accessed through a productivity application. One or more of a plurality of digital artifacts may be identified based on the identified operational context. An exemplary representation of the one or more digital artifacts is surfaced through a user interface. An exemplary user interface may be a user interface of a productivity application, for example, where the electronic document is being accessed through the productivity application. In alternative examples, an exemplary user interface may be associated with a home service that is executed in association with an operating system (OS). In some instances, an operational context may change resulting in an update to an exemplary representation of digital artifacts. Other examples are also described.
    Type: Application
    Filed: January 31, 2017
    Publication date: August 3, 2017
    Inventors: Gama Aguilar-Gamez, Igor Dvorkin, Matthew Tebbs, Dhruv Sood, Farheen Omar, Jason Brinkle, Julia Syi, Mark Schmidt, RajaniKanth Ageeru, Robert Hanley, Taft Sandbakken, Vihar Tammana, Emanuel Rosu, Piotr Walaszek, Robert Rounthwaite, Evyenia R. KaraEftimoglu, James Mellers, Andrew Shuman, Agnieszka Girling, Sreekanth Kannepalli, Ian Williams, Nishadi Kolonne, Bonnie Pan
  • Publication number: 20170220360
    Abstract: In non-limiting examples of the present disclosure, systems and methods for providing customizable electronic document review options within electronic document processing applications are provided. An analysis of an electronic document may be performed comprising a review of an electronic document for a plurality of style issues, a plurality of spelling issues and a plurality of grammar issues. A proofing task pane having a plurality of selectable options may be displayed. A total number of identified issues associated with each of the plurality of style issues, the plurality of spelling issues and the plurality of grammar issues may be displayed in the task pane based on the analysis of the electronic document. A value associated with the electronic document may be calculated based on a fluency metric associated with the electronic document and an indication of the fluency value for the electronic document may be displayed in the task pane.
    Type: Application
    Filed: November 4, 2016
    Publication date: August 3, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Kenichiro Chiba, Alfredo Arnaiz, Dermot McLoughlin, Nicole Michel, Hani Farouq Abu-Huwaij, Rolf Ebeling, Shikha Devesh Desai, Maria Isabel R. Carpenter, Jesse Clay Satterfield, Michael Koenig
  • Publication number: 20170220361
    Abstract: A virtual assistant system includes a mobile device to receive an input command corresponding to a function to be performed at one or more external services, to translate the input command into a semantic atom representing the command, and to transmit the semantic atom, and an assistant server configured to receive the transmitted semantic atom, the assistant server including a plurality of plugins, each plugin corresponding to a respective one of the external services and configured to generate a proprietary language command corresponding to the received semantic atom for each external service in which the function is to be performed.
    Type: Application
    Filed: April 18, 2017
    Publication date: August 3, 2017
    Inventors: Vishal Sharma, Elhum Amjadi
  • Publication number: 20170220362
    Abstract: Systems and methods for performing power monitoring calibration to a target performance level are described. In some embodiments, an Information Handling System (IHS) may include a plurality of Central Processing Units (CPUs) and a logic circuit coupled to the plurality of CPUs, the logic circuit configured to: measure an operating performance level for each of the plurality of CPUs under a controlled workload and, in response to a determination that the operating performance level of any given one of the CPUs does not match a target performance level for all of the CPUs, apply an offset to a voltage regulator measurement associated with the given CPU that causes the operating performance level of the given CPU to match the target performance level for all of the CPUs.
    Type: Application
    Filed: January 28, 2016
    Publication date: August 3, 2017
    Applicant: Dell Products, L.P.
    Inventors: John Erven Jenne, Mukund P. Khatri
  • Publication number: 20170220363
    Abstract: This invention provides a method of solving the technological challenges with the rapid exchange of information between IBM mainframe computers and compatibles mainframe computers (Mainframe) and an emulated mainframe environment, usually hosted on other types of computer hardware, notably on low-cost personal computers, such as IBM's zPDT or the Hercules open-source emulator module (MF-Emulator). The invention will allow Mainframe's data to be exchanged with a MF-Emulator in a method compatible with both environments. The invention provides a virtual tape device apparatus attached directly to the Mainframes's input/output (I/O) channel interface and it provides a network (TCP/IP) attached interface to the MF-Emulator module hosting computer. Data is then written to or read from a Tape Image Data file that is used by the virtual tape device provided by the invention and by the MF-Emulator emulator module. No conversion of the data character set is necessary.
    Type: Application
    Filed: January 26, 2017
    Publication date: August 3, 2017
    Inventor: Paul Francis Gorlinsky
  • Publication number: 20170220364
    Abstract: Techniques for assigning applications to virtual machines (VMs) using constraint programming are disclosed. The applications are associated with application groups. The assignment problem requires that each application of a particular application group be assigned to a VM hosted by a same machine. A data model, for application to a constraint programming solver, formulates the assignment problem as a set of constraints for a solution to be found. The data model includes a set of data model elements corresponding to the applications to be processed. The data model includes a set of data model elements corresponding to the VMs. The data model includes a set of constraints that limits assignment of any particular application to a VM corresponding to a tenant associated with the particular application. The set of constraints further limits assignment of applications corresponding to a same application group to VMs executing on a same machine.
    Type: Application
    Filed: July 15, 2016
    Publication date: August 3, 2017
    Applicant: Oracle International Corporation
    Inventors: Serdar Kadioglu, Michael Colena, Samir Sebbah, Mirza Mohsin Beg
  • Publication number: 20170220365
    Abstract: An aspect of the disclosure includes a method, a system and a computer program product for determining allocation of virtual machines to computer servers. The method including generating a list of virtual machines (VMs) instances configured to run on a network. A plurality of equivalence sets of VMs is selected. A plurality of starting sets is generated from the equivalence sets of VMs. Combinations are generated of packing solutions of the equivalent sets to a plurality of computer servers. A resource capacity is determined of a first computer server. A first allocation of the starting sets is provided based on the combinations of packing solutions. A second allocation each VM instance is provided based on a colocation parameter and an anti-colocation parameter. Each VM instance is migrated to one of the computer servers based on the second allocation. The state of a computer server is changed after the migration.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 3, 2017
    Inventor: Eli M. Dow
  • Publication number: 20170220366
    Abstract: An amount of a hardware resource is assigned to a virtual machine (VM) to be run on a computing device including the hardware resource. The VM is caused to run on the computing device, and usage of the hardware resource by the VM is monitor. In response to determining that the usage of the hardware resource by the VM is less than a threshold, the amount of the hardware resource assigned to the VM is decreased.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 3, 2017
    Inventors: John Scott Crowe, Gary David Cudak, Jennifer J. Lee-Baron, Nathan Peterson, Amy Leigh Rose, Bryan L. Young
  • Publication number: 20170220367
    Abstract: A method includes receiving a trace of a job in a distributed computing system and a topology of the system and determining performance indicators of each virtual node's (1) busyness from executing its share of local resource and network dependent tasks in the job, (2) efficiency for executing its share of the local resource tasks, and (3) efficiency for executing its share of the network dependent tasks. The method includes aggregating performance indicators of each host's virtual nodes and determining if one of the hosts is least efficient in executing its share of the local resource and the network dependent tasks. If so, the method includes determining if the one host is less busy from executing it share of the local resource and the network dependent tasks than other hosts. If not, the method includes reporting the one host's busiest virtual node as a candidate of processor error.
    Type: Application
    Filed: January 30, 2016
    Publication date: August 3, 2017
    Applicant: VMware, Inc.
    Inventors: Xinhui LI, Luke LU, Sheng LU
  • Publication number: 20170220368
    Abstract: Systems herein include thin clients that operate with managed profile-based virtual machines. This can allow users to utilize personal user devices in an enterprise environment without subjecting sensitive enterprise credentials to the user device. A management server can determine a profile associated with the user device. Based on the profile, a virtual machine can be instantiated at a thin server, remotely from the thin client. The profile-specific virtual machine can include a particular guest operating system, guest applications, security features, or functionality. The instance of the virtual machine can communicate graphics information from a guest application to the thin client, and the thin client can communicate user interface events to the instance for controlling the guest application.
    Type: Application
    Filed: February 1, 2016
    Publication date: August 3, 2017
    Inventors: Kar Fai Tse, Ketan Bhardwaj, Erich Stuntebeck
  • Publication number: 20170220369
    Abstract: Systems, apparatuses, and methods for implementing hypervisor post-write notification of processor state register modifications. A write to a state register of the processor may be detected during guest execution. In response to detecting the write to the state register, the processor may trigger microcode to perform the write and copy the new value of the register to a memory location prior to exiting the guest. The hypervisor may be notified of the update to the state register after it occurs, and the hypervisor may be prevented from modifying the value of the guest's state register. The hypervisor may terminate the guest if the update to the state register is unacceptable. Alternatively, the hypervisor may recommend an alternate value to the guest. If the guest agrees, the guest may set the state register to the alternate value recommended by the hypervisor when the guest resumes operation.
    Type: Application
    Filed: February 3, 2016
    Publication date: August 3, 2017
    Inventors: David A. Kaplan, Joel Howard Schopp
  • Publication number: 20170220370
    Abstract: A resource provider is able to manage instance data associated with virtual compute instances running in the resource provider environment. For example, when provisioning a compute instance, the resource provider can obtain data associated with the compute instance and can store this data, for example, in a data store. The resource provider can act as a centralized repository of such data for some or all instances that are running in the resource provider environment. Entities (e.g., users or other compute instances running in the resource provider environment) can query the resource provider to perform various operations (e.g., read, modify, duplicate) on the data being managed by the resource provider for the various compute instances. Any changes to the data for a compute instance, for example, by a user, the compute instance, or a different compute instance, can be saved by the resource provider and propagated to the compute instance.
    Type: Application
    Filed: August 12, 2016
    Publication date: August 3, 2017
    Inventors: Gideon Klompje, Mathew Daniel
  • Publication number: 20170220371
    Abstract: A virtual resource management node to seamlessly migrate a virtual machine with less influence on services in an NFV environment. A VIM is a VIM for managing each virtualized resource that is included in an NFV environment including virtualized resources including a physical machine in which a virtual machine having a VNF being a virtualized communication function is implemented, and the VIM includes a switching unit for switching a network flow from a virtual machine of a migration source to a virtual machine of a migration destination, or switching a system between an Active (ACT) system virtual machine of a migration source and a Standby (SBY) system virtual machine of a migration destination.
    Type: Application
    Filed: February 17, 2015
    Publication date: August 3, 2017
    Applicant: NTT DOCOMO, INC.
    Inventors: Masaaki KOSUGI, Hidenori ASABA, Takeo YAMASAKI, Ashiq KHAN, Shigeru IWASHINA, Takashi SHIMIZU
  • Publication number: 20170220372
    Abstract: Embodiments are directed towards employing a traffic management system (TMS) that is enabled to deploy component virtual machines (CVM) to the cloud to perform tasks of the TMS. In some embodiments, a TMS may be employed with one or more CVMs. In at least one embodiment, the TMS may maintain an image of each CVM. Each CVM may be configured to perform one or more tasks, to operate in specific cloud infrastructures, or the like. The TMS may deploy one or more CVMs locally and/or to one or more public and/or private clouds. In some embodiments, deployment of the CVMs may be based on a type of task to be performed, anticipated resource utilization, customer policies, or the like. The deployment of the CVMs may be dynamically updated based on monitored usage patterns, task completions, customer policies, or the like.
    Type: Application
    Filed: December 27, 2016
    Publication date: August 3, 2017
    Inventors: Richard Roderick Masters, Brent Wayne Blood, Paul Imre Szabo, Benn Sapin Bollay
  • Publication number: 20170220373
    Abstract: Systems and methods are disclosed for providing secure information processing. In one exemplary implementation, there is provided a method of secure domain isolation. Moreover, the method may include configuring a computing component with data/programming associated with address swapping and/or establishing isolation between domains or virtual machines, processing information such as instructions from an input device while keeping the domains or virtual machines separate, and/or performing navigating and/or other processing among the domains or virtual machines as a function of the data/programming and/or information, wherein secure isolation between the domains or virtual machines is maintained.
    Type: Application
    Filed: February 9, 2017
    Publication date: August 3, 2017
    Inventor: Edward T. Mooring
  • Publication number: 20170220374
    Abstract: Embodiments described herein rapidly pre-migrate child virtual machines (VMs) by leveraging shared memory resources between parent and child VMs. In a first, proactive phase, at least a portion of the memory of a parent VM is migrated to a plurality of potential target hosts. In a second, reactive phase, after a request is detected to migrate a child VM to a selected target host, differences in memory are transferred to the selected target host. Aspects of the disclosure offer a high performance, resource efficient solution that outperforms traditional approaches in areas of software compatibility, stability, quality of service control, resource utilization, and more.
    Type: Application
    Filed: April 17, 2017
    Publication date: August 3, 2017
    Applicant: VMware, Inc.
    Inventors: Daniel James Beveridge, Gabriel Tarasuk-Levin
  • Publication number: 20170220375
    Abstract: Temporal dynamic policies may be used to effectively alter the management of a virtual machine in a virtualized computing environment based upon some temporal condition such as how long a virtual machine has been active or idle, how long it has been since the virtual machine was created or deployed, etc. The altered management may be used, for example, to activate various performance and/or reliability-related technologies such as high availability and failover functionality for longer-running virtual machines.
    Type: Application
    Filed: April 21, 2017
    Publication date: August 3, 2017
    Inventors: Joseph W. Cropper, Jeffrey W. Tenner
  • Publication number: 20170220376
    Abstract: Temporal dynamic policies may be used to effectively alter the management of a virtual machine in a virtualized computing environment based upon some temporal condition such as how long a virtual machine has been active or idle, how long it has been since the virtual machine was created or deployed, etc. The altered management may be used, for example, to activate various performance and/or reliability-related technologies such as high availability and failover functionality for longer-running virtual machines.
    Type: Application
    Filed: April 21, 2017
    Publication date: August 3, 2017
    Inventors: Joseph W. Cropper, Jeffrey W. Tenner