2188 patents
Page 13 of 110
Utility
Managing inter-processor interrupts in virtualized computer systems
12 Sep 23
An example method may include allocating, on a host computer system, a memory page in a memory of an input/output (I/O) device, mapping the memory page into a memory space of a virtual machine associated with a first virtual processor, creating a first entry in an interrupt mapping table in the memory of the I/O device, where the first entry includes a memory address that is associated with a second virtual processor identifier and further includes an interrupt vector identifier; and creating a second entry in an interrupt injection table of an interrupt injection unit of the host computer system, where the second entry is associated with a memory address that corresponds to a second virtual processor, the second entry includes the interrupt vector identifier, and the second entry is further associated with the second virtual processor identifier.
Amnon Ilan, Michael Tsirkin
Filed: 17 Aug 21
Utility
Dynamic data stream processing for Apache Kafka using GraphQL
12 Sep 23
Systems and methods for specifying a stream processing topology via a client-side API without server-side support.
Wojciech Trocki, Manyanda Chitimbo, Enda Martin Phelan
Filed: 4 Feb 21
Utility
kl9v8fecs6fglufxw0ar47pyhvjjth
7 Sep 23
A first plurality of programming instructions written in a first quantum programming language is accessed.
Leigh Griffin, Stephen Coady
Filed: 3 Mar 22
Utility
gwk06uz4v6lgm0my s8atce
7 Sep 23
A system includes a memory, a processor in communication with the memory, and a first TEE instance.
Michael Tsirkin
Filed: 3 Apr 23
Utility
smuhzl09mvv5rqag2agqywumn59stq5
7 Sep 23
Managing access to quantum services in quantum computing devices is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 2 Mar 22
Utility
5n0zjqpfdg1qizt9dbo myxjk5qzy40873vp8a3g2qa65yzs
7 Sep 23
Offline debugging of quantum services using service definition layers is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 2 Mar 22
Utility
yxbzftku92prj2rfl6z3ljsesnu8b0ltfuuc4tnwh87uhprimfymou
7 Sep 23
Systems and methods are described for passing event messages between components of a computing cluster.
Matthias Wessendorf, Pierangelo Di Pilato, Ahmed Abdalla Ibrahim Abdelrehim, Ali Ok
Filed: 28 Apr 23
Utility
r8qkxy1f49m4xowqy0ilz8p9ab5u
5 Sep 23
Implementations of the disclosure are directed to network updates for virtual machine migration.
Michael Tsirkin
Filed: 20 Nov 19
Utility
7tuhd7qn9au4gtvrdd3v0vbvfb9u6ntb60copnhadwxvn20oq3v05r2kyj
5 Sep 23
Systems and methods for memory management for virtual machines.
Michael Tsirkin
Filed: 30 Jul 20
Utility
rd8lgesar57xjm5t24ceewwjiio6q9jpcwvu8
5 Sep 23
Systems and methods for event notification support for nested virtual machines.
Michael Tsirkin, Karen Lee Noel
Filed: 30 Jul 20
Utility
ei9tl1xx05d820xefl5u0gj4tt189oqbk5v3
5 Sep 23
The technology disclosed herein enables a hypervisor to send a security policy to a virtual machine, which may use the security policy to validate system call invocations requested by a guest operating system.
Michael Tsirkin, Amnon Ilan
Filed: 31 Aug 20
Utility
ioi92z3d8i5stwixgkqhfypqa9i2edpa 0qgy9oc7p2
5 Sep 23
Providing clock times to virtual devices.
Yuval Kashtan, Gal Hammer
Filed: 30 Oct 20
Utility
3a7iis1r82gww9niajih4td7 fgycvplfbqzpb3hm
5 Sep 23
A system includes a memory and processor in communication with the memory.
Stuart Douglas, Jason Greene
Filed: 30 Apr 20
Utility
asevftk257s8us5mykat8ig92x64p1k0851r3izu0zbqol89211cu 1b
5 Sep 23
Systems and methods for providing scalable object storage query capabilities in a distributed storage system are disclosed.
Huamin Chen, Yehuda Sadeh-Weinraub
Filed: 25 May 21
Utility
kg1hqfg3o 81hdzg9l5v7pbk965rs9
31 Aug 23
Events associated with a virtual machine can be used to adjust an amount of resource objects that may be allocated from a resource pool for the virtual machine.
Andrea Cosentino, Paolo Antinori
Filed: 25 Feb 22
Utility
i6mt3isbdiqg4szn5e3093lo1jp3 cbocmuy151
31 Aug 23
Methods, systems, and computer program products provide a hybrid data scan pipeline or detector that reduces (as compared to conventional storage operations) response latency and increases scanning accuracy of encryption attacks such as ransomware attacks.
Huamin Chen, Yuval Lifshitz
Filed: 25 Feb 22
Utility
kn22cyxnmtm0v4xz1cn0draye76je
31 Aug 23
A first data object is received for storing in an object repository of a storage platform.
Yuval Lifshitz, Huamin Chen
Filed: 25 Feb 22
Utility
32f 985bl034juo8ikjmolijmoff2nh0llby1t8lr97fpcdcs4v
31 Aug 23
Debugging executing quantum services using service definition layers is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 25 Feb 22
Utility
xiucuo4g80lp bqmmnwe1nywbuch
31 Aug 23
A method includes determining that access permissions associated with a service of a computing system have been revoked, identifying one or more access policy sets including access policy rules associated with the service, removing the access policy rules associated with the service from the one or more access policy sets, and marking one or more decision execution paths of a policy decision point associated with the service with a feature flag.
Leigh Griffin, Cathal O'Connor
Filed: 25 Feb 22
Utility
95tvtyaxaalpf4q0neesmjdekdl11qmcz6gdxv5p36gxg9o18md
22 Aug 23
Systems and methods for cloud-based keyless entry are generally described.
Andrea Cosentino, Paolo Antinori
Filed: 28 Oct 21