Patents Issued in August 17, 2017
  • Publication number: 20170235545
    Abstract: An example playback device includes a first interface for receiving a first audio signal from a first audio source; a second interface for receiving a second audio signal from a second audio source; and a processor configured to: cause the playback device to playback the second audio signal; determine that the first audio signal is present at the first interface; in response to determining that the first audio signal is present at the first interface, (i) cease playback of the second audio signal being played by the playback device and (ii) cause the playback device to playback the first audio signal; receive an instruction to stop the playback device from playing the first audio signal while the first audio signal is still present at the first interface; and arm the playback device such that a subsequent presence of the first audio signal at the first interface causes the playback device to play the first audio signal.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventors: Nicholas A.J. Millington, Tom Cullen, Robert Reimann, Brent Lehman
  • Publication number: 20170235546
    Abstract: An example implementation involves a playback device receiving digital data representing audio content, the digital data encoded in a first format. The playback device causes one or more speaker drivers to playback the audio content. The playback device decodes a portion of the received digital data to convert the portion of the received digital data from the first format to a second format and transmits, via a network interface to a computing device of an identification system, the decoded portion of the received digital data. The playback device receives, from via the network interface from the identification system, metadata corresponding to the audio content, and in response, causes a control device to display a graphical representation of the received metadata, wherein causing the control device to display the graphical representation comprises sending, via the network interface to the control device, the received metadata to the control device.
    Type: Application
    Filed: May 5, 2017
    Publication date: August 17, 2017
    Inventors: Eric Clayton, Aurelio Rafael Ramos
  • Publication number: 20170235547
    Abstract: A dialog server which provides dialogs made by at least one user through their respective avatars in a virtual space. A method and a computer readable article of manufacture tangibly embodying computer readable instructions for executing the steps of the method are also provided. The dialog server includes: a position storage unit which stores positional information on the avatars; an utterance receiver which receives at least one utterance of avatars and utterance strength representing an importance or attention level of the utterance; an interest level calculator which calculates interest levels between avatars based on their positional information; a message processor which generates a message based on the utterance in accordance with a value calculated from the interest levels and the utterance strength; and a message transmitter which transmits the message to the avatars.
    Type: Application
    Filed: January 12, 2017
    Publication date: August 17, 2017
    Inventors: Gakuto Kurata, Tohru Nagano, Michiaki Tatsubori
  • Publication number: 20170235548
    Abstract: Multichannel data sonification arrangements for providing parallel perceptual channels for representing complex numerical data to a user seeking to identify correlations within the data are presented. In an implementation, several varying data quantities are represented by time-varying sound and presented to a user to observe both variations and correlations among sonic events or trends. The data sonification can include multiple data-modulated sound timbre classes, for example each separately rendered within a stereo sound field. The sound timbre classes can be arranged to convey a sonic metaphor.
    Type: Application
    Filed: May 3, 2017
    Publication date: August 17, 2017
    Inventor: Lester F. LUDWIG
  • Publication number: 20170235549
    Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for generating object model validation rules. The method includes receiving an object model and generating a first field structure. A second field structure is generated based on the first field structure. A set of validation rules is then generated based on the second field structure.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Inventors: Phillip M. Rauscher, Ossama Shokry
  • Publication number: 20170235550
    Abstract: Software element model based univeral software modeling method to construct software model. After determining basic constituents of the software element model, the present invention constructs software models through the software hierarchy model, the software interface models, the software interaction models, the software algorithm model, the software process model, and the software transfer model as step features and thereby provides a specification for software modeling in various fields; such specification has advantages including generality and convenience; the software models constructed through the present invention is executable, has a clear structure, adjustable hierarchies, and controllable granularities for modeling; this method supports both top-down analysis and bottom-up integration for modeling in various software systems.
    Type: Application
    Filed: June 25, 2015
    Publication date: August 17, 2017
    Inventors: Changming FU, Chunsheng LONG, Hong TANG
  • Publication number: 20170235551
    Abstract: Systems and methods for extending a visualization platform are disclosed. A user may create a visualization project created. One or more properties for a non-native widget established by a developer of the non-native widget may be received from the project. Such properties may designate a name or a type of data that the non-native widget is capable of processing. Responsive to an instruction received from the user of the visualization authoring environment, a source of data to be processed by the non-native widget or a destination of data produced by the non-native widget to be processed by other widgets may be established. The appearance or behavior of the non-native widget may be rendered based at least in part on a value available from the source of the data or the appearance or behavior of one or more other widgets may be rendered based at least in part on data produced by the non-native widget.
    Type: Application
    Filed: October 6, 2016
    Publication date: August 17, 2017
    Inventors: Maurice Martin, Steven Yamanaka, Daniel Akiva, Norman Basham, Bryan Lipson
  • Publication number: 20170235552
    Abstract: A computing device is provided configured to compute a data function on a function-input value comprising an electronic storage storing a table network configured for the data function and an electronic processor coupled to the storage and configured to compute the data function by applying the table network, wherein the device is configured to obtain the function-input value as an encoded input value, the encoded input value combines the function-input value together with a state-input value encrypted together into a single value, the table network is configured to take as input the encoded input value and produce as output an encoded output value, the encoded output value combines a function-output value together with a state-output value encrypted data function together into a single value, wherein the function-output value equals the result of applying the data function to the function-input value, and the state-output value equals the result of applying a state function to the state-input value.
    Type: Application
    Filed: December 17, 2013
    Publication date: August 17, 2017
    Inventors: LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN, PAULUS MATHIAS HUBERTUS MECHTILDIS ANTONIUS GORISSEN, MINA DENG, ALPHONS ANTONIUS MARIA LAMBERTUS BRUEKERS
  • Publication number: 20170235553
    Abstract: A method comprises receiving a source code having a data set with a processor, opening the data set and identifying compile stage dependencies and run stage dependencies in the data set, determining whether a compile stage dependency has been identified, determining whether the identified compile stage dependency is accessible responsive to determining that the compile stage dependency has been identified, retrieving the compile stage dependency responsive to determining that the identified compile stage dependency is accessible, and compiling the source code and saving the compiled source code in a memory using the retrieved compile stage dependency responsive to determining that no run stage dependencies have been identified.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Inventors: Eli M. Dow, Thomas D. Fitzsimmons, Emily M. Metruck, Charles J. Stocker, IV
  • Publication number: 20170235554
    Abstract: A method comprises receiving a source code having a data set with a processor, opening the data set and identifying compile stage dependencies and run stage dependencies in the data set, determining whether a compile stage dependency has been identified, determining whether the identified compile stage dependency is accessible responsive to determining that the compile stage dependency has been identified, retrieving the compile stage dependency responsive to determining that the identified compile stage dependency is accessible, and compiling the source code and saving the compiled source code in a memory using the retrieved compile stage dependency responsive to determining that no run stage dependencies have been identified.
    Type: Application
    Filed: May 31, 2016
    Publication date: August 17, 2017
    Inventors: Eli M. Dow, Thomas D. Fitzsimmons, Emily M. Metruck, Charles J. Stocker, IV
  • Publication number: 20170235555
    Abstract: A method, computer program product, and computer system for tracking tuples by ID as the tuples progress through an operator of a chain of operators within a processing element. Dynamic loading may be utilized to load a processing code for the operator in response to invoking fusion for the operator. Ownership of network I/O may be shifted from the operator to a final operator of the chain of operators within the processing element. A tuple ID may be rolled back to a last ID processed by the operator being added into the processing element.
    Type: Application
    Filed: February 12, 2016
    Publication date: August 17, 2017
    Inventors: Alexander Cook, David M. Koster, Christopher R. Sabotta, Joseph C. Schmidt
  • Publication number: 20170235556
    Abstract: Herein disclosed is an optimization for a compiler, the optimization configured to assign numeric values, or semantic fingerprints, to portions of code, and to combine these fingerprints to arrive at fingerprints for larger and larger portions of code. The fingerprints can be provided to various consumers such as code redundancy optimization modules and copyright violation and malware/virus identification modules. The fingerprints can also be used to cluster similar code, and then code within each cluster can be merged. Merger can include creating a single merged portion of code including the same portions of code from the original portions of code plus control flow and new arguments to account for differences between the original portions of code. The original portions of code can be replaced with wrappers that use new arguments to call to the merged portion of code.
    Type: Application
    Filed: August 22, 2016
    Publication date: August 17, 2017
    Inventor: Tobias Edler Von Koch
  • Publication number: 20170235557
    Abstract: Various systems and methods for translating atomic read-modify-write accesses are described herein. In one example, a method includes determining that a machine instruction of a first language specifies an atomic read-modify-write access. The method includes generating machine instructions of the second language to perform an atomic access for the address if the address is aligned. The method includes generating machine instructions of a second language to acquire a global lock if the address is unaligned. Additionally, the method includes generating machine instructions of the second language to perform a non-atomic access for the address if the address is unaligned. Also, the method includes generating machine instructions of the second language to release the global lock if the address is unaligned.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Clarence Dang, Youssef Barakat, Arun Kishan
  • Publication number: 20170235558
    Abstract: A system and method are shown for automatically regenerating an application installer from an application instance installed in a computing environment that involves collecting information for objects installed in the computing environment for an installed application, creating an installer map showing a plan for linked objects related to the installed application, adding a copy of the linked objects to an application installer package for the installed application, and creating a regenerated application installer based on the application installer package for the installed application.
    Type: Application
    Filed: February 11, 2015
    Publication date: August 17, 2017
    Inventors: Mariano Saenz, Rajesh Manjrekar, Suhas Rohit Mehta
  • Publication number: 20170235559
    Abstract: Systems, apparatuses, and methods for managing the deployment of extensions to the functionality of a multi-tenant data processing platform. A computing system, such as a multi-tenant distributed computing platform, may have multiple business related applications installed on the platform that are used by one or more users/tenants to perform business related functions. Developers may create and implement “extensions” to such applications, and make those extensions available to tenants/users of the platform. Such extensions may provide an enhancement to the underlying application, such as by introducing new or improved functionality, a new or improved user interface, new or improved reporting capabilities, etc.
    Type: Application
    Filed: January 22, 2015
    Publication date: August 17, 2017
    Inventors: Mariano Nestor Saenz, Douglas H. Williams, Elham Ghassemzadeh, Suhas R. Mehta
  • Publication number: 20170235560
    Abstract: Examples are disclosed herein that relate to updating stylus firmware. One example provides a method of performing a stylus firmware upgrade in an interactive display system including a display and a stylus comprising sending, from the display, a signal to the stylus causing the stylus to enter a listen mode, while the stylus operates in the listen mode, sending, from the display, a firmware upgrade notification to the stylus configured for receipt by the listen mode, receiving, at the display, a reply to the firmware upgrade notification from the stylus, determining, at the display, whether the reply was received within a predetermined time range, and, responsive to determining that the reply was received within the predetermined time range, initiating transfer of a firmware update to the stylus if a newer firmware version is available.
    Type: Application
    Filed: February 12, 2016
    Publication date: August 17, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ian McLean, Nigel Stuart Keam
  • Publication number: 20170235561
    Abstract: One embodiment provides a method of determining a revised firmware upgrade plan for one or more devices, said method including: utilizing at least one processor to execute computer code that performs the steps of: selecting, in view of a predetermined change window and risk associated with the firmware upgrade plan, a firmware upgrade plan; detecting a failure during execution of the firmware upgrade plan; and responsive to the detecting, identifying a revised firmware upgrade plan based on time remaining in the predetermined change window and risk associated with the revised firmware upgrade plan. Other aspects are described and claimed.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 17, 2017
    Inventors: Eric Kevin Butler, Thomas D. Griffin, Steven P. Gronefeld, Divyesh Jadav, William Anthony Sherrill, Aameek Singh
  • Publication number: 20170235562
    Abstract: In one embodiment, a system for managing a virtualization environment includes a set of host machines, each of which includes a hypervisor, virtual machines, and a virtual machine controller, one or more virtual disks comprising a plurality of storage devices, the one or more virtual disks being accessible by the virtual machine controllers, where the virtual machine controllers conduct I/O transactions with the virtual disks, and an upgrade system configured to receive a request to upgrade a virtualized file server on a plurality of host machines from a first program code version to a second program code version, for each host machine, generate a snapshot of a code image associated with the second program code version, and provide the snapshot to the host machine via the virtual disk. The virtual machine controller located on the host machine stores the snapshot on a first storage device associated with the host machine.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 17, 2017
    Inventors: Kalpesh Ashok Bafna, Luong Ngo, Kavitha Pasikanti, Venkata Vamsi Krishna Kothuri, Mausumi Ranasingh
  • Publication number: 20170235563
    Abstract: In one embodiment, a system for managing a virtualization environment includes a set of host machines, each of which includes a hypervisor, virtual machines, and a virtual machine controller, one or more virtual disks comprising a plurality of storage devices and accessible by the virtual machine controllers, and a deployment system configured to receive a request to upgrade a virtualized file server on a plurality of host machines from a first program code version to a second program code version, and, for each host machine, request an upgrade token. When the host machine acquires the upgrade token, the deployment system is configured to generate a snapshot of a code image associated with the second program code version, and provide the snapshot to the host machine via the virtual disk. The virtual machine controller located on the host machine stores the snapshot on a storage device associated with the host machine.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 17, 2017
    Inventors: Kalpesh Ashok Bafna, Aroosh Sohi, Alexander Michael Bunch
  • Publication number: 20170235564
    Abstract: A software upgrade method and a device, which relate to the field of communications technologies. Software upgrade is performed for a terminal by using an access device located in a local area network, which avoids access to the Internet when software of the terminal is upgraded and reduces load or burden of a network. The method includes: receiving, by an access device, software information sent by at least one terminal device in a local area network in which the access device is located, and performing a comparison between the software information sent by the at least one terminal device and software information stored in the access device, to determine whether to-be-updated target software exists; if it is determined that to-be-updated target software exists in the at least one terminal device, transmitting update information of the target software to a terminal device corresponding to the target software.
    Type: Application
    Filed: October 14, 2014
    Publication date: August 17, 2017
    Inventors: Wenkang Feng, Kaibing Zhang, Xinchao Shui, Junbo Wen
  • Publication number: 20170235565
    Abstract: The present disclosure includes some examples of methods, systems, and machine readable media which deliver firmware updates to a computing device of a hearing professional while requiring little or no user interaction. For example, the firmware patches may be delivered in a way that does not require administrator access on the computer. In various embodiments, the updates may only require periodic access to a network (e.g., the Internet), the updates may not require the fitting software to be running, and/or the updates may not even require a user to be logged in to the computing device.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventor: Jeff Patrick Kryzer
  • Publication number: 20170235566
    Abstract: Systems and methods of efficient software replication are provided. This is accomplished by a first communication device that determines if a second communication device needs to have a software upgrade. In response to determining that the second communication device needs to have the software upgrade, the software upgrade is downloaded onto the second communication device. In response to downloading the software upgrade onto the second communication device, the second communication device determines if a third communication device needs to have the software upgrade. In response to determining that the third communication device needs to have the software upgrade, the second communication device downloads the software upgrade to the third communication device. This process can be repeated for any number of communication devices or the process may be completed in different orders.
    Type: Application
    Filed: May 5, 2017
    Publication date: August 17, 2017
    Inventor: Nishant Krishna
  • Publication number: 20170235567
    Abstract: A wireless router receives a firmware update from a remote server, and destructively overwrites router firmware in flash memory in a chunk-wise manner, and then writes a kernel memory before going live with upgraded firmware. Some routers authenticate the firmware image. In some cases, image chunks are re-ordered into an executable order after receipt and before finishing their final arrangement in the flash memory. In some routers, a maximum firmware image size is at least two chunk sizes smaller than the flash memory storage capacity. Some routers remap ROM to RAM memory. Some decompress data from flash into a RAM. Some save text file configuration settings in flash before rebooting. Some detect a user's inactive billing status and redirect a web browser to a billing activation page.
    Type: Application
    Filed: December 19, 2016
    Publication date: August 17, 2017
    Applicant: Gytheion Networks, LLC
    Inventors: Joseph P. Marino, Jonathan Fortin
  • Publication number: 20170235568
    Abstract: Techniques are described for version control with selectable file portion synchronization between an IDE and a repository, so that a version control system of this disclosure either synchronizes or ignores different portions of a file during synchronization, in accordance with user selections. In one example, a method includes evaluating content entered into a file. The method further includes detecting a starting delimiter and a stopping delimiter in the file. The method further includes copying a first portion of the file outside the starting delimiter and the stopping delimiter to a repository, and refraining from copying a second portion of the file inside the starting delimiter and the stopping delimiter to the repository.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 17, 2017
    Inventors: Scott D. Cowan, Evan C. Hughes
  • Publication number: 20170235569
    Abstract: An interrelated set of tools and methods is disclosed for: (1) measuring the relationship between software source code attributes (such as code quality, design quality, test quality, and complexity metrics) and software economics outcome metrics (such as maintainability, agility, and cost) experienced by development and maintenance organizations, (2) using this information to project or estimate the level of technical debt in a software codebase, (3) using this information to estimate the financial value of efforts focused on improving the codebase (such as rewriting or refactoring), and (4) using this information to help manage a software development effort over its lifetime so as to improve software economics, business outcomes, and technical debt while doing so.
    Type: Application
    Filed: February 17, 2017
    Publication date: August 17, 2017
    Applicant: Silverthread, Inc.
    Inventors: Daniel J. Sturtevant, Carliss Baldwin, Alan MacCormack, Sunny Ahn, Sean Gilliland
  • Publication number: 20170235570
    Abstract: Systems, methods, and non-transitory computer-readable media can receive information about an application design plan. The application design plan can be associated with at least one deployment criterion. One or more available infrastructure resources can be identified based on the information about the application design plan. A plurality of deployment options can be determined based on the one or more available infrastructure resources. The plurality of deployment options can be determined to be compliant with the at least one deployment criterion. The plurality of deployment options can be ranked to produce an ordered set of deployment options.
    Type: Application
    Filed: April 28, 2017
    Publication date: August 17, 2017
    Inventors: John Catalano, Kyle Falkenhagen, Frank Martinez, Eric Pulier, Tim Woodall
  • Publication number: 20170235571
    Abstract: According to one embodiment, a processor includes an instruction decoder to receive an instruction to process a multiply-accumulate operation, the instruction having a first operand, a second operand, a third operand, and a fourth operand. The first operand is to specify a first storage location to store an accumulated value; the second operand is to specify a second storage location to store a first value and a second value; and the third operand is to specify a third storage location to store a third value. The processor further includes an execution unit coupled to the instruction decoder to perform the multiply-accumulate operation to multiply the first value with the second value to generate a multiply result and to accumulate the multiply result and at least a portion of a third value to an accumulated value based on the fourth operand.
    Type: Application
    Filed: January 3, 2017
    Publication date: August 17, 2017
    Inventors: Vinodh Gopal, Erdinc Ozturk, James D. Guilford, Gilbert M. Wolrich
  • Publication number: 20170235572
    Abstract: A processor includes a vector register including data fields to store values of vector elements of data, a decoder to decode a single instruction multiple data (SIMD) instruction specifying a source operand and a mask to identify a masked portion of the data fields. An execution unit is to read a plurality of values from unmasked data fields of the plurality of data fields of the vector register; compare, within the vector register, each of the plurality of values from the unmasked data fields for equality with all other values of the plurality of values; and responsive to a detection of an inequality of any two values of the plurality of values, set a mask field, corresponding to a detected unequal value, to a masked state with a flip of a bit value of the mask field, to signal the detection of the inequality.
    Type: Application
    Filed: May 3, 2017
    Publication date: August 17, 2017
    Inventors: Elmoustapha Ould-Ahmed-Vall, Charles R. Yount, Suleyman Sair, Kshitij A. Doshi
  • Publication number: 20170235573
    Abstract: A condition code can depend upon a numerical output of a floating point operation for a processing pipeline. A classification can be determined for the floating point operation of a received instruction. In response to the classification and using condition determination logic, a value can be calculated for the condition code by inferring from data that is available from the processing pipeline before the numerical output is available. The value for the condition code can be provided to branch decision logic of the processing pipeline.
    Type: Application
    Filed: May 3, 2017
    Publication date: August 17, 2017
    Inventors: Steven R. Carlough, Son T. Dao, Petra Leber, Silvia M. Mueller
  • Publication number: 20170235574
    Abstract: A condition code can depend upon a numerical output of a floating point operation for a processing pipeline. A classification can be determined for the floating point operation of a received instruction. In response to the classification and using condition determination logic, a value can be calculated for the condition code by inferring from data that is available from the processing pipeline before the numerical output is available. The value for the condition code can be provided to branch decision logic of the processing pipeline.
    Type: Application
    Filed: May 3, 2017
    Publication date: August 17, 2017
    Inventors: Steven R. Carlough, Son T. Dao, Petra Leber, Silvia M. Mueller
  • Publication number: 20170235575
    Abstract: A method for supporting architecture speculation in an out of order processor is disclosed. The method comprises fetching two threads into the processor, wherein a first thread executes in a speculative state and a second thread executes in a non-speculative state. The method also comprises enabling a speculative scope for an execution of the first thread and a non-speculative scope for an execution of the second thread in an architecture of the processor, wherein the speculative scope and the non-speculative scope can both be fetched into the architecture and be present concurrently.
    Type: Application
    Filed: November 16, 2016
    Publication date: August 17, 2017
    Applicant: Intel Corporation
    Inventor: Mohammad Abdallah
  • Publication number: 20170235576
    Abstract: An apparatus and method for performing parallel decoding of prefix codes such as Huffman codes. For example, one embodiment of an apparatus comprises: a first decompression module to perform a non-speculative decompression of a first portion of a prefix code payload comprising a first plurality of symbols; and a second decompression module to perform speculative decompression of a second portion of the prefix code payload comprising a second plurality of symbols concurrently with the non-speculative decompression performed by the first compression module.
    Type: Application
    Filed: December 6, 2016
    Publication date: August 17, 2017
    Inventors: SUDHIR K. SATPATHY, SANU K. MATHEW, VINODH GOPAL, JAMES D. GUILFORD
  • Publication number: 20170235577
    Abstract: Operation of a multi-slice processor that includes execution slices and a dispatch network of the multi-slice processor implementing a hardware level mechanism to overcome a system hang. Such a multi-slice processor includes a plurality of execution slices and a dispatch network of the multi-slice processor implementing a hardware level mechanism to overcome a system hang. Operation of such a multi-slice processor includes, storing, in one or more logical units of a plurality of logical units of an age array, a logical value representing a relative age between instructions; propagating, in response to a current instruction being in a hang state, a hang signal to the plurality of logical units of the age array; in response to the hang signal, generating, from the plurality of logical units, a plurality of logical output values indicating a next instruction ready for execution; and issuing the next instruction for execution.
    Type: Application
    Filed: February 12, 2016
    Publication date: August 17, 2017
    Inventors: JEFFREY C. BROWNSCHEIDLE, SUNDEEP CHADHA, MAUREEN A. DELANEY, DHIVYA JEGANATHAN, DUNG Q. NGUYEN, SALIM A. SHAH
  • Publication number: 20170235578
    Abstract: In accordance with embodiments disclosed herein, there are provided methods, systems, and apparatuses for scheduling instructions in a multi-strand out-of-order processor. For example, an apparatus for scheduling instructions in a multi-strand out-of-order processor includes an out-of-order instruction fetch unit to retrieve a plurality of interdependent instructions for execution from a multi-strand representation of a sequential program listing; an instruction scheduling unit to schedule the execution of the plurality of interdependent instructions based at least in part on operand synchronization bits encoded within each of the plurality of interdependent instructions; and a plurality of execution units to execute at least a subset of the plurality of interdependent instructions in parallel.
    Type: Application
    Filed: December 27, 2016
    Publication date: August 17, 2017
    Inventors: Boris A. Babayan, Vladimir M. Pentkovski, Alexander V. Butuzov, Sergey Y. Shishlov, Alexey Y. Sivtsov, Nikolay Kosarev
  • Publication number: 20170235579
    Abstract: An example processor for speculative execution event counter checkpointing and restoring may include a plurality of symmetric cores, at least one of the symmetric cores to simultaneously process a plurality of threads and to perform out-of-order instruction processing for the plurality of threads; at least one shared cache circuit to be shared among two or more the of symmetric cores. The processor may further include event counter circuitry comprising: a plurality of event counters including programmable event counters and fixed event counters and one or more configuration registers to store configuration data to specify an event type to be counted by the programmable event counters, wherein at least one of the one or more configuration registers is to store configuration data for a plurality of the programmable event counters.
    Type: Application
    Filed: May 4, 2017
    Publication date: August 17, 2017
    Inventors: Laura A. Knauth, Ravi Rajwar, Peggy J. Irelan, Konrad K. Lai, Martin G. Dixon
  • Publication number: 20170235580
    Abstract: An example system for speculative execution event counter checkpointing and restoring may include a plurality of processors, a first interconnect to couple two or more of the plurality of processors, a second interconnect to couple one or more of the plurality of processors to one or more other system components, and a system memory coupled to one or more of the processors.
    Type: Application
    Filed: May 4, 2017
    Publication date: August 17, 2017
    Inventors: Laura A. Knauth, Ravi Rajwar, Peggy J. Irelan, Konrad K. Lai, Martin G. Dixon
  • Publication number: 20170235581
    Abstract: A technique for managing a parallel cache hierarchy that includes receiving an instruction from a scheduler unit, where the instruction comprises a load instruction or a store instruction; determining that the instruction includes a cache operations modifier that identifies a policy for caching data associated with the instruction at one or more levels of the parallel cache hierarchy; and executing the instruction and caching the data associated with the instruction based on the cache operations modifier.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventors: John R. NICKOLLS, Brett W. Coon, Michael C. Shebanow
  • Publication number: 20170235582
    Abstract: System and methods are provided for an interactive help file for a host software user interface. According to one aspect, a host interface screen having actionable fields is provided and a first virtual button is generated and displayed on the host interface screen. The host interface screen is segmented into zones and, in response to activation of the first virtual button, a plurality of second virtual buttons are generated and displayed on the host interface screen. Following activation of a second virtual button, one or more help files are retrieved, and the host interface screen is transformed such that zones of the host interface screen that are not associated with the activated second virtual button are deactivated, the zone associated with the activated second virtual button is overlaid with a set of annotated links associated with help files, and the transformed host interface screen is displayed.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 17, 2017
    Inventor: Vincent Ramirez
  • Publication number: 20170235583
    Abstract: A configuration control transfer (“CCT”) system controls the transferring of control of configuration information of a device from a current configuration source to a target configuration source. A CCT server of the CCT system may send to the device a message requesting the configuration information of the device. In response, a CCT client of the CCT system collects the configuration information of the device and sends the collected configuration information to the CCT server. If the second configuration source can support the configuration information of the current configuration source, the CCT server requests that the device transfer control of the configuration information from the current configuration source to the target configuration source. The CCT client then transfers control of the configuration information to the target configuration source as the new current configuration source and un-enrolls the device from the former current configuration source.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 17, 2017
    Inventors: Tanvir Ahmed, Peter J. Kaufman, Shayak Lahiri, John Chadwell Spaith, Janani Vasudevan, Dennis Edward Flanagan
  • Publication number: 20170235584
    Abstract: The present disclosure includes apparatuses and methods related to distributed input/output (I/O) virtualization. A number of embodiments include an apparatus comprising a host computing device, a distributed virtualization controller (DVC) disposed on the host computing device, and a virtualized input/output (I/O) device in communication with the DVC.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Inventor: Yves Tchapda
  • Publication number: 20170235585
    Abstract: Specialized, service optimized virtual machines are assigned to handle specific types of Internet of Things (IoT) devices. An IoT context mapping policy engine within the context of a virtualized network function manages IoT context mapping policy functions in load balancers. The IoT context mapping policy functions select service optimized virtual machines based on IoT device IDs, and assign those virtual machines to handle the devices. The IoT context mapping policy functions provide load data to the IoT context mapping policy engine. Based on the load data, the IoT context mapping policy engine maintains appropriate scaling by creating or tearing down instances of the virtual machines.
    Type: Application
    Filed: February 12, 2016
    Publication date: August 17, 2017
    Inventors: Gaurav Gupta, Vivek Mhatre
  • Publication number: 20170235586
    Abstract: A system for and method of retrieving values of captured local variables for a lambda function in Java. In one embodiment, the system includes: (1) a Java virtual machine and (2) a captured variable retriever that interacts with the Java virtual machine and configured to retrieve a signature of the lambda function from a classfile of a Java class containing the lambda function, compare the signature with a declaration of the lambda function to identify arguments corresponding to the captured local variables, modify the lambda function and cause the Java virtual machine to execute the modified lambda function.
    Type: Application
    Filed: February 15, 2016
    Publication date: August 17, 2017
    Inventors: Michael Lai, Vinod Grover, Sean Lee, Jaydeep Marathe
  • Publication number: 20170235587
    Abstract: A volume rehost tool migrates a storage volume from a source virtual server within a distributed storage system to a destination storage server within the distributed storage system. The volume rehost tool can prevent client access to data on the volume through the source virtual server until the volume has been migrated to the destination virtual server. The tool identifies a set of storage objects associated with the volume, removes configuration information for the set of storage objects, and removes a volume record associated with the source virtual server for the volume. The tool can then create a new volume record associated with the destination virtual server, apply the configuration information for the set of storage objects to the destination virtual server, and allow client access to the data on the volume through the destination virtual server.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Vani Vully, Avishek Chowdhury, Balaji Ramani
  • Publication number: 20170235588
    Abstract: Technologies are generally described to provision virtual machines with security requirements in datacenter. In some examples, a scheduler at a datacenter may receive a request to provision a virtual machine, where the virtual machine has an associated security requirement. Based on the security requirement, the scheduler may compute a maximum co-run probability of the virtual machine with at least one other virtual machine. The scheduler may then attempt to determine whether the virtual machine can be accommodated on an already-operational server while satisfying both the maximum co-run probability and a computing resource capacity associated with the virtual machine. If so, the virtual machine may be provisioned on the working server. Otherwise, the virtual machine may be provisioned on a new server if possible.
    Type: Application
    Filed: September 15, 2015
    Publication date: August 17, 2017
    Applicant: INTELLECTUAL VENTURES HONG KONG LIMITED
    Inventors: Jianping Wang, Wen Qi
  • Publication number: 20170235589
    Abstract: In one embodiment, a system for managing a virtualization environment includes a set of host machines, each of which includes a hypervisor, virtual machines, and a virtual machine controller, and a first virtualized file server configured to receive a request to access a storage item located at a second virtualized file server, determine that the storage item is designated as being accessible by other virtualized file servers, identify an FSVM of the second virtualized file server at which the storage item is located, and forward the request to the FSVM of the second virtualized file server. The storage item may be designated as being accessible by other virtualized file servers when the storage item is associated with a predetermined tag value indicating that the storage item is shared among virtualized file servers. The predetermined tag value may be stored in a sharding map in association with the storage item.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 17, 2017
    Inventors: Anil Kumar Gopalapura Venkatesh, Richard James Sharpe, Durga Mahesh Arikatla, Kalpesh Ashok Bafna, Devyani Suryakant Kanada
  • Publication number: 20170235590
    Abstract: In one embodiment, a system for managing a virtualization environment comprises a plurality of host machines, one or more virtual disks comprising a plurality of storage devices, a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines, and a backup system configured to, in response to a request to access a data item, determine an access frequency for the data item. The backup system is further configured to, in response a request to store a data item, determine a storage tier at which the data item is to be stored in a cloud storage service, wherein the tier is determined based on the access frequency associated with the data item, and store the data item at the determined tier of the cloud storage service.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 17, 2017
    Inventors: Vishal Sinha, Richard James Sharpe, Kalpesh Ashok Bafna, Anil Kumar Gopalapura Venkatesh, Durga Mahesh Arikatla, Shyamsunder Prayagchand Rathi
  • Publication number: 20170235591
    Abstract: In one embodiment, a system for managing a virtualization environment comprises a plurality of host machines, one or more virtual disks comprising a plurality of storage devices, a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines, wherein the VFS is configured to detect a failure of one of the FSVMs on a first one of the host machines, wherein the first host machine is located within a first block of host machines. The VFS may then identify a failover path to a second FSVM. For each storage resource associated with the first FSVM, the VFS may migrate the storage resource to the second FSVM.
    Type: Application
    Filed: February 2, 2017
    Publication date: August 17, 2017
    Inventors: Devyani Suryakant Kanada, Richard James Sharpe, Durga Mahesh Arikatla, Satyajit Sanjeev Deshmukh
  • Publication number: 20170235592
    Abstract: In particular embodiments, a system for managing a virtualization environment includes host machines, each of the host machines including a hypervisor, user virtual machines (UVMs) and a virtual machine controller. The virtualization environment also includes virtual disks comprising a plurality of storage devices, and being accessible by the virtual machine controllers. The virtual machine controllers conduct I/O transactions with the virtual disks. The system stores an entity-relationship graph representing elements in the virtualization environment. Each of the elements is represented by an entity-type node in the entity-relationship graph, and relationships between the elements are represented by edges between the nodes.
    Type: Application
    Filed: February 2, 2017
    Publication date: August 17, 2017
    Inventors: Artem Yevgenyevich Livshits, Ming Chen, Mohan Maturi, Ning Zhou, Rahul Paul, Rahul Singh, Ramesh U. Chandra, Shrivatsan Vasudhevan, Suresh Sivaprakasam, Swagat Borah, Vyas Ram Selvam
  • Publication number: 20170235593
    Abstract: In particular embodiments, a system for managing a virtualization environment includes host machines, each of the host machines including a hypervisor, user virtual machines (UVMs) and a virtual machine controller. The virtualization environment also includes virtual disks comprising a plurality of storage devices, and being accessible by the virtual machine controllers. The virtual machine controllers conduct I/O transactions with the virtual disks. The system stores an entity-relationship graph representing elements in the virtualization environment. Each of the elements is represented by an entity-type node in the entity-relationship graph, and relationships between the elements are represented by edges between the nodes.
    Type: Application
    Filed: February 2, 2017
    Publication date: August 17, 2017
    Inventors: Ming Chen, Mohan Maturi, Rahul Singh
  • Publication number: 20170235594
    Abstract: Particular embodiments provide a system comprising a cluster of host machines for managing communications in a virtualization environment. Each of the host machines may comprise a hypervisor, a user virtual machine (UVM), and an I/O controller. A virtual disk accessible by all of the I/O controllers may comprise multiple storage devices, wherein the I/O controllers conduct I/O transactions with the virtual disk based on I/O requests received from the UVMs. A management module may implement a monitoring policy of rules associated with an operating status of components of the virtualization environment. The management module may receive data associated with the operating status of the components. In response to determining that the data associated with the operating status of the components satisfies one or more of the rules in the monitoring policy, the management module may initiate an alert.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 17, 2017
    Inventors: Deepak Vankadaru, Deepthi Dasa Lakshminarayana, Karthik Mysore Guruprasad, Sundarakumar Sundhararajan, Ting Suk Lee