Patents Issued in December 21, 2017
-
Publication number: 20170364340Abstract: A method for improving performance of an access triggered architecture for a computer implemented application is provided. The method first executes typical operations of the access triggered architecture according to an execution time, wherein the typical operations comprise: obtaining a dataset and an instruction set; and using the instruction set to transmit the dataset to a functional block associated with an operation, wherein the functional block performs the operation using the dataset to generate a revised dataset. The method further creates a pipeline of the typical operations to reduce the execution time of the typical operations, to create a reduced execution time; and executes the typical operations according to the reduced execution time, using the pipeline.Type: ApplicationFiled: August 28, 2017Publication date: December 21, 2017Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Thom Kreider, Jon Douglas Gilreath, Gary Warnica, Paul D. Kammann, Vince J. Gavagan, IV, Ronald E. Strong
-
Publication number: 20170364341Abstract: A computer generates a parallel program, based on an analysis of a single program that includes a plurality of tasks written for a single-core microcomputer, by parallelizing parallelizable tasks for a multi-core processor having multiple cores. The computer includes a macro task (MT) group extractor that analyzes, or finds, a commonly-accessed resource commonly accessed by the plurality of tasks, and extracts a plurality of MTs showing access to such commonly-accessed resource. Then, the computer uses an allocation restriction determiner to allocate the extracted plural MTs to the same core in the multi-core processor. By devising a parallelization method described above, an overhead in an execution time of the parallel program by the multi-core processor is reduced, and an in-vehicle device is enabled to execute each of the MTs in the program optimally.Type: ApplicationFiled: June 8, 2017Publication date: December 21, 2017Inventor: Kenichi MINEDA
-
Publication number: 20170364342Abstract: A plugin for a website browser can enable a user to deploy software onto a computing device quickly and easily. For example, the plugin can automatically detect that a user is visiting a website on which program code for a software application is shared or hosted. The website may be an open-source website, a program-code repository, or a program-code review platform. The plugin can automatically analyze the program code, an installation file provided with the program code, software and hardware characteristics of the specific computing device on which the software application is to be deployed, and other data to determine how to deploy the software application on the specific computing device. The plugin can then deploy the software application on the computing device in response to the user clicking a button, allowing for the software application to be easily deployed on the computing device with minimal user interaction or skill.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Boaz Shuster, Oded Ramraz
-
Publication number: 20170364343Abstract: An apparatus, method, and system for receiving a request for a transaction using a computer system. An absence of a first identification of an application on a first user device is determined, when a beacon of the computer system does not detect the first identification within a defined geographical area. A plurality of transaction data from a transaction device is received. A second identification based on the received transaction data is generated. An installation status of the application on the first user device based on the generated second identification and the absence of the first identification is also generated.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Manu T. George, Anoop G. M. Ramachandra, Murali K. Surampalli
-
Publication number: 20170364344Abstract: An application program uninstallation method and apparatus relate to the field of communications technologies. The method includes: obtaining current location information of a terminal (101); obtaining effective location information of a first application that is already installed on the terminal, where the effective location information is used for instructing the first application to provide an effective application service when the terminal is within a geographical location range corresponding to the effective location information (102); and uninstalling, by the terminal, the first application when the current location information of the terminal does not match the effective location information of the first application (103).Type: ApplicationFiled: December 18, 2015Publication date: December 21, 2017Inventor: Xiangyang Wang
-
Publication number: 20170364345Abstract: Software updates within one or more regions of a multi-tenant cloud are coordinated. Tenant vs. tenant conflicts, tenant vs. infrastructure provider conflicts, and conflicts between security and another priority are identified and resolved using a shared update coordinator, update priority specifications, and availability specifications. An infrastructure update request may be presented to tenants for approval. Postponed infrastructure updates may be prioritized higher. Preventing exploits of zero-day vulnerabilities may be prioritized over meeting availability targets. Updates may be merged to reduce downtime, even when the updates originate from independently controlled entities. Maximum downtime, minimum fault domains, minimum virtual machines, permitted update start times, and other availability criteria may be specified. Updates may be preempted, or allowed to complete, based on their relative priorities.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Marcus FONTOURA, Mark RUSSINOVICH, Yunus MOHAMMED, Pritesh PATWA, Avnish Kumar CHHABRA, Ziv RAFALOVICH
-
Publication number: 20170364346Abstract: An image processing device and control method that includes a processor and a memory storing a set of instructions that, when executed by the processor, controls the image processing device to receive a first data object representing a software update to be applied to the at least one peripheral device coupled to the image processing device. A communication mode switch message is generated to change a mode of communicating data between the at least one peripheral device and the image processing device and communicate the communication mode switch message to the at least one peripheral device. Currently active communication mode is disabled and a previously disabled communication pathway of the at least one peripheral device is activated as an update mode. The data representing the software update is transmitted via the update mode to apply the software update to the at least one peripheral device.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Jiayin Peng, Jiuyuan Ge, Song Cang, Bryan Heller
-
Publication number: 20170364347Abstract: Techniques are described for segregating a monolithic computing device that contains many installed applications into separate application storage volumes that can be attached or detached from the computing device as needed. Once the monolithic device has been segregated, the application storage volumes can be managed remotely from a management server and can be enabled or disabled on the device based on instructions from an administrator. Additionally, the administrator is enabled to select which application storage volumes are migrated during an operating system (OS) upgrade on the computing device.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventors: Nir Adler, Dima Golbert, Or Lupovitz, Kosta Shougaev
-
Publication number: 20170364348Abstract: A lighting system includes lighting devices and a controller. An Over-The-Air (OTA) update of lighting device programming is delivered via point-to-point connections between the controller and some number of lighting devices and/or between the lighting devices. Delivery of the OTA update from one lighting device to another lighting device is triggered based on an update command sent via a wireless mesh network of the lighting system.Type: ApplicationFiled: June 29, 2016Publication date: December 21, 2017Inventors: Konstantin Klitenik, Emanuel Paul Malandrakis
-
Publication number: 20170364349Abstract: Users may carry multiple electronic devices that can communicate between each other wirelessly. For example, law enforcement officers may carry several wirelessly connected electronic devices. However, some of these devices may have limited battery power, bandwidth, and/or ranges, restricting their ability to receive software updates. To compensate for these limitations, devices may be updated through associated intermediate devices. The intermediate devices may further provide a conduit for updating devices with restricted communications ability.Type: ApplicationFiled: June 10, 2017Publication date: December 21, 2017Applicant: Axon Enterprise, Inc.Inventors: Tyler J. Conant, Rick Wong, Raymond T. Fortna, Nathan A. Grubb, Mark A. Hanchett
-
Publication number: 20170364350Abstract: A system includes at least one data collection device connected to a corresponding data terminal via a primary communication channel; and a central connectivity point connected to each data collection device via a wireless secondary communication channel so as to communicate with the at least one data collection device without disrupting communication between the at least data collection device and the corresponding data terminal via the primary communication channel and to permit remote administration of each data collection device.Type: ApplicationFiled: August 30, 2017Publication date: December 21, 2017Inventors: John A. Pettinelli, Jr., John Izzo
-
Publication number: 20170364351Abstract: A data patch for a program already installed in an interactive display computer system is received over a network and stored. There is also received a first set of parameters for controlling the installation of the patch. At the computer, a second set of parameters for controlling optimum installation time periods is predetermined wherein said data patch may be installed. The first and second sets of parameters are correlated to determine a set of optimum time periods during which the data patch may be installed, and this set of time periods are displayed so that a user may interactively select an optimum time period for installation of the data patch.Type: ApplicationFiled: September 4, 2017Publication date: December 21, 2017Inventors: Judith Helen Bank, Liam Harpur, Ruthie D> Lyle, Patrick Joseph O'Sullivan, Lin Sun
-
Publication number: 20170364352Abstract: Embodiments include a system for release cycle optimization; the system includes a processor configured to perform a method. The method includes accessing, by a processor, historical data relating to a plurality of software version each having a plurality of attributes; selecting a subset of attributes from the plurality of attributes; receiving a set of data values for each of the subset of attributes from the plurality of attributes; performing one or more simulations of a software development cycle utilizing the set of data values; and obtaining a set of results from the one or more simulations comprising a plurality of predicted field defects values corresponding to each of the set of data values.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Lukasz G. Cmielowski, Marek Franczyk, Tymoteusz Gedliczka, Andrzej J, Wrobel
-
Publication number: 20170364353Abstract: Techniques are described for segregating a monolithic computing device that contains many installed applications into separate application storage volumes that can be attached or detached from the computing device as needed. Once the monolithic device has been segregated, the application storage volumes can be managed remotely from a management server and can be enabled or disabled on the device based on instructions from an administrator. Additionally, the administrator is enabled to select which application storage volumes are migrated during an operating system (OS) upgrade on the computing device.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventors: Nir Adler, Dima Golbert, Or Lupovitz, Kosta Shougaev
-
Publication number: 20170364354Abstract: An association between two or more segments of committed program code can be determined so that the segments of committed program code can be used together for building a software project. For example, one or more communications can be received and indicate that two or more segments of program code are to be committed to one or more repositories associated with a software project. Thereafter, the segments of program code, a database, or other information can be analyzed to determine an association between the two or more segments of program code. Based on the association between the two or more segments of program code, the two or more segments of program code can be integrated together into combined program code. A build tool can then build the software project using the combined program code.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Alexander Braverman Masis, Ilia Meerovich
-
Publication number: 20170364355Abstract: Embodiments involve a data organization procedure and a development environment system that is set up to carry out the data organization procedure. The data organization procedure according to an embodiment envisages that a stored data set or a data set to be stored is organized according to a first structure, whereby the data set is subdivided according to aspects of the content and/or according to access rights aspects into partial data sets, whereby in addition to the first structure another structure is envisaged, according to which the data set is organized, whereby the data set is subdivided into authority areas, whereby each authority area includes at least one partial data set according to the first structure, whereby each partial data set includes at least one data unit, and whereby a responsible user set is allocated to each authority area, whereby the user set includes at least one user.Type: ApplicationFiled: June 14, 2017Publication date: December 21, 2017Inventors: Torsten Nitschke, Benno Heines, Rolf Salzmann, Carsten Kolodziej, Robert von der Ahe
-
Publication number: 20170364356Abstract: A technique for operating a processor includes receiving, at an issue queue, a store instruction that has an associated address generation (AGN) operation and an associated data operation. The AGN operation is issued to AGN logic associated with a pipeline slice in response to all source operands for the AGN operation being ready. The AGN logic is configured to generate an address for the store instruction. Confirmation, for the AGN operation is received. The confirmation includes an indication of the pipeline slice that performed the AGN operation. In response to receiving the confirmation and a source operand for the data operation being ready, the issue queue issues the data operation to data logic associated with the pipeline slice indicated by the confirmation. The data logic is configured to format data for the store instruction.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: SALMA AYUB, MAARTEN J. BOERSMA, SUNDEEP CHADHA, DAVID A. HRUSECKY, JENNIFER L. MOLNAR, DUNG Q. NGUYEN
-
Publication number: 20170364357Abstract: A method in an instruction fetch unit configured to initiate a fetch of an instruction bundle from a first memory and to initiate a fetch of an instruction bundle from a second memory, wherein a fetch from the second memory takes a predetermined fixed plurality of processor cycles, the method comprising: identifying that an instruction bundle is to be selected for fetching from the second memory in a predetermined future processor cycle; and initiating a fetch of the identified instruction bundle from the second memory a number of processor cycles prior to the predetermined future processor cycle based upon the predetermined fixed plurality of processor cycles taken to fetch from the second memoryType: ApplicationFiled: June 15, 2017Publication date: December 21, 2017Inventors: Andrew David Webber, Daniel Ángel Chaver Martínez, Enrique Sedano Algarabel
-
Publication number: 20170364358Abstract: Operation of a multi-slice processor that includes a plurality of execution slices. Operation of such a multi-slice processor includes: receiving a first instruction indicating a first target register; receiving a second instruction indicating the first target register as a source operand; responsive to the second instruction indicating the first target register as a source operand, updating a dependent count corresponding to the first instruction; and issuing, in dependence upon the dependent count for the first instruction being greater than a dependent count for another instruction, the first instruction to an execution slice of the plurality of execution slices.Type: ApplicationFiled: June 20, 2016Publication date: December 21, 2017Inventors: KHANDKER N. ADEEB, JOSHUA W. BOWMAN, JEFFREY C. BROWNSCHEIDLE, BRANDON R. GODDARD, DUNG Q. NGUYEN, TU-AN T. NGUYEN, BRIAN D. VICTOR, BRENDAN M. WONG
-
Publication number: 20170364359Abstract: According to one embodiment, a processor includes an instruction decoder to decode instruction and a execution unit to execute instructions, the execution unit being associated with a capture logic to periodically capture operating heuristics of the execution unit, a detection logic coupled to the execution unit to evaluate the captured operating heuristics to determine whether there is a need to adjust an operating point of the execution unit, and a control logic coupled to the detection logic and the execution unit to adjust the operating point of the execution unit based on the evaluation of the operating heuristics.Type: ApplicationFiled: June 30, 2017Publication date: December 21, 2017Inventors: Inder M. Sodhi, Sanjeev S. Jahagirdar
-
Publication number: 20170364360Abstract: Techniques are disclosed for providing anti-theft protection for power tools. In one example of the techniques of the disclosure, at least one processor of a power tool receives, from an operator, a command to operate the power tool. In response to receiving the command, the at least one processor determines whether at least one of a value of a master authentication counter of the power tool and a value of a user authentication counter of the power tool has reached a predetermined threshold. In response to determining that the at least one of the value of the master authentication counter and the value of the user authentication counter has reached a predetermined threshold, the at least one processor disables the power tool.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: Renato Bessegato, Mohit Berry
-
Publication number: 20170364361Abstract: A processor includes an execution unit, a retirement module, a first retirement counter, a second retirement counter, and an adjustment module. The execution unit executes instructions of a first thread and a second thread by simultaneous multithreading. The retirement module retires the executed instructions of the first thread in order of the first-thread instruction sequence, and retires the executed instructions of the second thread in order of the second-thread instruction sequence. The first retirement counter determines a first multi-thread retirement rate of the first thread. The second retirement counter determines a second multi-thread retirement rate of the second thread. The adjustment module adjusts the proportions of hardware resources respectively occupied by the first thread and the second thread according to the first multi-thread retirement rate and the second multi-thread retirement rate, so that the processor executes at its most efficient level of performance.Type: ApplicationFiled: August 5, 2016Publication date: December 21, 2017Inventor: Meng-Chen YANG
-
Publication number: 20170364362Abstract: Systems and methods of processing using a quantum processor are described. A method includes obtaining a problem Hamiltonian and defining a nested Hamiltonian with a plurality of logical qubits by embedding a logical KN representing the problem Hamiltonian into a larger KC×N, where N represents a number of the logical qubits and C represents a nesting level defining the amount of hardware resources for the nest Hamiltonian. The method also includes encoding the nested Hamiltonian into the plurality of physical qubits of the quantum processor; and performing a quantum annealing process with the quantum processor after the encoding.Type: ApplicationFiled: June 15, 2017Publication date: December 21, 2017Applicant: UNIVERSITY OF SOUTHERN CALIFORNIAInventors: Daniel LIDAR, Tameem ALBASH, Walter VINCI
-
Publication number: 20170364363Abstract: Livelock recovery circuits configured to detect livelock in a processor, and cause the processor to transition to a known safe state when livelock is detected. The livelock recovery circuits include detection logic configured to detect that the processor is in livelock when the processor has illegally repeated an instruction; and transition logic configured to cause the processor to transition to a safe state when livelock has been detected by the detection logic.Type: ApplicationFiled: November 1, 2016Publication date: December 21, 2017Inventors: Ashish Darbari, Iain Singleton
-
Publication number: 20170364364Abstract: A computing device in accordance with an example includes a first operating system and a second operating system. The computing device includes a controller to select one of the first and second operating systems based on a mode of the computing device, where the first and second operating systems are executed substantially in parallel on a processor of the computing device.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventor: Evan Joel Wilson
-
Publication number: 20170364365Abstract: An example method of initializing a plurality of processors in a hardware platform of computing device for use by system software executing on the hardware platform includes: parsing a descriptor table that has been loaded into memory from firmware to identify an original boot protocol for initializing at least one secondary processor of the plurality of processors; creating at least one mailbox structure in the memory associated with the at least one secondary processor; causing the at least one secondary processor to execute secondary processor initialization code stored in the memory, the secondary processor initialization code implementing a mailbox-based boot protocol that uses the at least one mailbox structure to initialize the at least one secondary processor; and modifying the descriptor table to identify the mailbox-based boot protocol for initializing the at least one secondary processor in place of the original boot protocol.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Andrei WARKENTIN, Harvey TUCH, Cyprien LAPLACE, Alexander FAINKICHEN
-
Publication number: 20170364366Abstract: A computing device supports distributed application execution by receiving an application definition that identifies a plurality of platform-independent device functions to be performed by an application, and mapping the platform-independent device functions to corresponding code modules stored in a code module repository. The computing device distributes the corresponding code modules to a plurality of remote devices for distributed execution of the application by the remote devices according to device-specific support for the platform-independent device functions by the remote devices. The distributing includes sending a given code module to different remote devices that have different device-specific support for the platform-independent device function corresponding to the given code module.Type: ApplicationFiled: February 10, 2017Publication date: December 21, 2017Inventors: Ola Angelsmark, Johan Olsson, Per Persson
-
Publication number: 20170364367Abstract: An information processing system includes an operating unit that receives an input in response to a user operation and that runs under a first operating system; and a main body that runs under a second operating system and operates in response to the input received by the operating unit. The main body includes a generation unit that generates a command to direct rendering of a screen corresponding to an application being executed, and a command transmission control unit that provides control to transmit the command to the operating unit. The operating unit includes a receiving unit that receives the command from the main body, a screen rendering unit that renders the screen in accordance with the command received by the receiving unit, a display unit that displays the screen rendered by the screen rendering unit, and a reboot unit that reboots the operating unit in asynchronization with the main body.Type: ApplicationFiled: September 7, 2017Publication date: December 21, 2017Applicant: Ricoh Company, Ltd.Inventors: Yoh MASUYAMA, Tadashi NAGATA, Keisuke IWASA
-
Publication number: 20170364368Abstract: A setting method of accessing system parameters and a server are provided. The server includes a baseboard management controller. The setting method includes the following steps. First, a remote device is used to log in a webpage of the server according to a network address. Then, a CMOS setting parameter of the server is read out from a storage space of the baseboard management controller and then is loaded in the webpage.Type: ApplicationFiled: July 26, 2016Publication date: December 21, 2017Applicants: INVENTEC (PUDONG) TECHNOLOGY CORPORATION, INVENTEC CORPORATIONInventor: Jian-Xin HUANG
-
Publication number: 20170364369Abstract: The present disclosure relates to accessing data using dynamically generated application programming interface (API) calls. According to one embodiment, a method generally includes receiving, at a computing system, a data request from a client device. The data request generally identifies a navigable path through a graph projection of the API. The computing system generates an API call to process the data request. To generate the API call for each node in the navigable path, the computing system, identifies a node in the graph projection to access data from and generates a subquery to access data from the node using one or more parameters included in the data request and defined in a schema associated with the node. The computing system executes the one or more subqueries to obtain a result and returns the result of executing the subqueries as a result of the API call.Type: ApplicationFiled: September 5, 2017Publication date: December 21, 2017Inventors: Joe WELLS, Greg LAUCKHART
-
Publication number: 20170364370Abstract: A method includes displaying a bitmap of unique groups of colored tiles on the display screen and reading a color value of a first pixel in a first tile in the bitmap. Color values of tiles within the first tile's group are determined. The position of the first pixel within the first tile is determined. The position of the first tile's group within the bitmap and the position of the first tile within the bitmap are also determined. The position of the first pixel in the bitmap and the position of the bitmap on the display screen are calculated. A performance metric is calculated based at least in part on the position of the bitmap on the display screen.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Hari SIVARAMAN, Peter FARKAS
-
Publication number: 20170364371Abstract: A computer-implemented technique is described herein for facilitating a user's repeated execution of the same computer-implemented actions. The technique performs this task by determining patterns in the manner in which the user repeats requests associated with certain computer-implemented actions. For example, the technique determines context-dependent patterns in the manner in which the user submits search requests to a search system. The technique then leverages those patterns by proactively providing a request-assistance tool to the user in those context-specific circumstances in which the user is likely to perform the repetitive computer-implemented actions. The digital action-assistance tool provides various kinds of assistance to the user in performing the repetitive computer-implemented actions.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Ajoy Nandi, Jason T. Creighton
-
Publication number: 20170364372Abstract: In an approach for providing assistance to a user viewing an online video, the computer receives an online video. The computer determines that an uncommon action occurs with the online video. The computer receives an issue based on the uncommon action. The computer receives one or more responses associated with the received issue. The computer identifies an at least one response from the received one or more responses associated with the received issue. The computer provides the identified at least one response.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: Liam S. Harpur, Erik H. Katzen, Sumit Patel, Pascal Wagner
-
Publication number: 20170364373Abstract: The present disclosure relates to an interactive system that manages analytics contexts through a series of analytics interactions. The disclosed interactive system receives a selection of an analytics interaction from a user during an interactive analytics session. Then, the system generates a series of analytics interactions by the user during the interactive analytics session. Each analytics interaction represents an analytics context that comprises an analytics interaction, a result, and a reference analytics context. Moreover, the system manages a plurality of analytics contexts by selecting the reference analytics context from previous analytics interactions, or by navigating to a different analytics context, or by deactivating a user-selected analytics context, and presents to the user the series of analytics interactions with the result corresponding to both the selection of the analytics interaction and the reference analytics context.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: Olga Shain, Yaniv Sabo, Renato Keshet
-
Publication number: 20170364374Abstract: In some embodiments, systems, apparatuses, methods, and processes are provided to assist parties in contract negotiations. In some embodiments, a system for use by a first party in contract negotiation with a second party comprises: a control circuit; and a contract term playbook database accessible by the control circuit; wherein the control circuit is configured to: receive, from a user of the first party via a user interface, feedback from the second party regarding a contract term of a draft contract; access the contract term playbook database using the feedback; and output, to the user via the user interface, guidance for response to the second party regarding the contract term and preapproved by the first party.Type: ApplicationFiled: June 20, 2017Publication date: December 21, 2017Inventor: Alistair J. Maiden
-
Publication number: 20170364375Abstract: A system for chassis management includes a plurality of motherboards of a chassis, a plurality of baseboard management controllers (BMCs), and at least one chassis level component. Each of the plurality of BMCs is associated with one of the plurality of motherboards. The plurality of BMCs are interconnected via a first communication bus. The plurality of BMCs and the at least one chassis level component are interconnected via a second communication bus. One BMC of the plurality of BMCs is configured to operate as a virtual chassis management controller (VCMC) for the chassis. The VCMC is configured to exchange data with other BMCs of the plurality of BMCs over the first communication bus and manage the at least one chassis level component over the second communication bus.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: Kai-Fan KU, Chin-Fu TSAI
-
Publication number: 20170364376Abstract: Providing for search to facilitate discovery or access to configuration functions of a computer application is described herein. By way of example, metadata can be appended to configuration functions of the computer application. A matrix correlating subsets of metadata with related configuration functions can facilitate distinguishing respective configuration functions, or groups of related configuration functions based on the subsets of metadata. User search data can be referenced against the subsets of metadata. Respective subsets of metadata that satisfy a condition defined by a data matching function can be returned as a match, and configuration functions associated with matching metadata can be output in response to the search data.Type: ApplicationFiled: June 29, 2017Publication date: December 21, 2017Inventor: Suraj Jacob
-
Publication number: 20170364377Abstract: Application code is obtained at a compiler toolchain, which accesses a package manager that tracks dependencies for a set of software components including application-level components represented as application-level packages, hypervisor interface-level components represented as hypervisor interface-level packages, and hypervisor-level components represented as hypervisor-level packages. A dependency solver is employed to select a sub-set of the set of packages that satisfy the dependencies.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Ricardo A. Koller Jemio, Daniel J. Williams
-
Publication number: 20170364378Abstract: Implementations of the disclosure provide for live storage domain decommissioning in a virtual environment. A method of the disclosure includes identifying, by a processing device, a storage domain to decommission from a storage system. The storage domain comprises a plurality of disk images. It is determined whether the disk images are associated with a virtual machine. Thereupon, the disk images are hot-unplugged from the virtual machine. Responsive to detecting that the disk images are unplugged from the virtual machine, the disk image is deleted from the storage domain and the storage domain is removed from the storage system.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Maor Lipchuk, Daniel Erez
-
Publication number: 20170364379Abstract: A method of providing a backdoor interface between software executing in a virtual machine and a hypervisor executing on a computing system that supports the virtual machine includes trapping, at the hypervisor, an exception generated in response to execution of a debug instruction on a central processing unit (CPU) by the software; identifying, by an exception handler of the hypervisor handling the exception, an equivalence between an immediate operand of the debug instruction and a predefined value; and invoking, in response to the equivalence, a backdoor service of the hypervisor using state of at least one register of the CPU as parametric input, the state being set by the software prior to executing the debug instruction.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: Andrei WARKENTIN, Harvey TUCH, Cyprien LAPLACE, Alexander FAINKICHEN
-
Publication number: 20170364380Abstract: One embodiment is a method and includes monitoring by a module associated with a first application component installed on a first virtual machine (“VM”) a state of at least one second application component installed on a second VM and on which a state of the first application component is at least partially dependent, in which the state of the at least one second application component is made available by a module associated with the at least one application component; determining that the state of the at least one second application component has changed from a first state to a second state; and updating the state of the first application component based on a current state of the first application component and the second state of the at least one second application component.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Dwight Rodney Frye, JR., Michael J. Lemen, Vinod Jagannath Damle
-
Publication number: 20170364381Abstract: Example implementations relate to data center configuration. For example, a server system is configured in a data center by a configuration system including an input processor that receives a data file having multiple record types including a range record type. An error checking processor verifies that the data file has correct syntax and that each of the multiple record types is a valid record type with required attributes. If no error is detected, a record processor converts each of the record types in the data file into a set of ReST API and an output processor sends the set of ReST API requests to a data center configuration manager.Type: ApplicationFiled: January 13, 2015Publication date: December 21, 2017Applicant: Hewlett Packard Enterprise Development LPInventors: Bobby Brad Suber, Russell Nelson Briggs
-
Publication number: 20170364382Abstract: Embodiments of the disclosure provide a method and an apparatus for hot upgrading a virtual machine management service module. The method includes creating a request receiving thread and a request handling thread by a virtual machine management service module process, wherein the request receiving thread receives a service request during the hot upgrading; creating a handling thread management unit; and managing, by the handling thread management unit, exit and new start of the request handling thread during the hot upgrading.Type: ApplicationFiled: June 16, 2017Publication date: December 21, 2017Inventor: Yibo ZHOU
-
Publication number: 20170364383Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: predictively provisioning, by one or more processor, cloud computing resources of a cloud computing environment for at least one virtual machine; and initializing, by the one or more processor, the at least one virtual machine with the provisioned cloud computing resources of the cloud computing environment. In one embodiment, the predictively provisioning may include: receiving historical utilization information of multiple virtual machines of the cloud computing environment, the multiple virtual machines having similar characteristics to the at least one virtual machine; and determining the cloud computing resources for the at least one virtual machine using the historical utilization information of the multiple virtual machines.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Zhong Qi Feng, Jiang Tao Li, Yi Bin Wang, Chao Yu, Qing Feng Zhang
-
Publication number: 20170364384Abstract: A method and apparatus for configuring an overlay network are provided. In the method and apparatus, an application source comprising an executable portion is obtained. A computer system instance is caused to execute at least some of the executable portion, and a snapshot of the computer system instance after partial but incomplete execution of the executable portion is obtained such that the snapshot is usable to instantiate another computer system instance to continue execution of the executable portion from a point in execution at which the snapshot was obtained.Type: ApplicationFiled: September 6, 2017Publication date: December 21, 2017Inventor: Nicholas Alexander Allen
-
Publication number: 20170364385Abstract: This disclosure relates to methods and systems for queuing events. In one aspect, a method is disclosed that receives or creates an event and inserts the event into a queue. The method determines at least one property of the event and associates a priority with the event based on the property. The method then processes the event in accordance with its priority.Type: ApplicationFiled: May 3, 2017Publication date: December 21, 2017Inventors: Paul Meijer, Mark Hellkamp
-
Publication number: 20170364386Abstract: Computer implemented techniques comprise instructions configured to cause a processor to obtain routines, receive a user defined set of obtained routines to form a chain of at least two routines, produce the chain of the at least two routines according to the user defined set of routines, receive a user defined designation of the chain as a workflow, and produce by the computing system the designated workflow.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Prakash Khot, Pradeep Reddy, Jogeshwar Karthik Akundi, Samit Sasan, Pushkar Priyadarshi
-
Publication number: 20170364387Abstract: In an approach to guided virtual machine migration, one or more computer processors determine a target host computer available for a migration of a virtual machine from a source host computer. The one or more computer processors identify one or more resources of the target host computer with one or more predictive errors. The one or more computer processors determine whether the virtual machine uses one or more of the identified one or more resources with one or more predictive errors. The one or more computer processors rank a migration path for the virtual machine from the source host computer to the target host computer with a designation. The one or more computer processors create a target host map, wherein the target host map indicates at least one migration path for the virtual machine from the source host computer to the target host computer.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Syed R. Ahmed, Muralikrishna Nidugala, Praveen K. R. Pallamparti, Venkatesh Sainath, Dhavalkumar M. Thakar
-
Publication number: 20170364388Abstract: A job scheduler system includes one or more hardware processors, a memory including a job group queue stored in the memory, and a job scheduler engine configured to create a first job group in the job group queue, the first job group includes a generation counter having an initial value, receive a first request to steal the first job group, determine a state of the first job group based at least in part on the generation counter, the state indicating that the first job group is available to steal, based on the determining the state of the first job group, atomically increment the generation counter, thereby making the first job group unavailable for stealing, and alter an execution order of the first job group ahead of at least one other job group in the job group queue.Type: ApplicationFiled: August 30, 2017Publication date: December 21, 2017Inventor: Benoit Sevigny
-
Publication number: 20170364389Abstract: Technical solutions are described for determining and analyzing timing parameters to prognosticate a failure of one or more RTOS tasks. An example method includes dequeing a buffer queue entry from a buffer queue. In response to determining that a first task-id from the buffer queue entry does not match a second task-id from a topmost entry of a stack comprising buffer queue entries, the method includes pushing the buffer queue entry as a top-entry in a stack, updating a previous time sample value as the timestamp of the buffer queue entry, and accumulating a temporary execution time value for the second task-id from the stack. Further, in response to the first task-id matching the second task-id, computing an execution time value for the second task-id, updating the previous time sample value as the timestamp of the buffer queue entry, and popping the topmost entry from the stack.Type: ApplicationFiled: June 20, 2017Publication date: December 21, 2017Inventors: Vinod Shankar Naganathan, Lonnie Newton, Akilan Rathakrishnan