2188 patents
Page 14 of 110
Utility
Data relocation for data units in scale-out storage systems
22 Aug 23
Data units can be relocated in scale-out storage systems.
Joshua Durgin, Gabriel Zvi BenHanokh
Filed: 8 Jun 21
Utility
Automated runtime service optimization via modification of a configuration file
22 Aug 23
Automated runtime service optimization via modification of a configuration file is disclosed.
Leigh Griffin, Brendan O'Farrell
Filed: 21 Dec 20
Utility
Efficient handling of network topology change notification for virtual machines
22 Aug 23
Systems and methods for memory management for virtual machines.
Michael Tsirkin, Karen Lee Noel
Filed: 7 May 20
Utility
Providing supplemental information to a guest operating system by a hypervisor
22 Aug 23
Providing supplemental information to a guest operating system by a hypervisor is disclosed.
Bandan Das
Filed: 10 Dec 20
Utility
Tiered cloud storage for different availability and performance requirements
22 Aug 23
A system and method for a tiered cloud storage for different availability and performance requirements includes a gateway, a block store configured to cache data, and an object store configured to persistently store data.
Huamin Chen, Jay Vyas
Filed: 14 Sep 20
Utility
Latency reduction for kernel same page merging
22 Aug 23
A system includes a memory including a plurality of memory pages, a processor in communication with the memory, and a supervisor.
Michael Tsirkin, Karen Lee Noel
Filed: 13 Jun 22
Utility
Methods and systems for building custom appliances in a cloud-based network
22 Aug 23
A cloud management system can track the usage of the virtual machines in order to determine the fees associated with the user's subscription to the cloud computing environment.
James Michael Ferris, Aaron Peter Darcy
Filed: 15 May 20
Utility
Authenticating Electronic Key Devices
17 Aug 23
An example method may include receiving, from a key device, a first counter value and a first encoded counter value, identifying, among one or more mapping table entries in an access control unit mapping table, an access control unit mapping table entry specifying a second counter value that corresponds to the received first counter value, determining whether a second encoded counter value specified by the identified access control unit mapping table entry corresponds to the received first encoded counter value, and responsive to determining that the second encoded counter value corresponds to the received first encoded counter value, sending, to a control unit, an indication that permission is granted.
Andrea Cosentino, Paolo Antinori
Filed: 15 Feb 22
Utility
Mesh Network Update Management
17 Aug 23
A method of managing updates in a mesh network includes determining that an update is available for a first computing node of a mesh network and identifying one or more characteristics of the first computing node of the mesh network.
Leigh Griffin, Pierre-Yves Chibon
Filed: 11 Feb 22
Utility
Blockchain-driven Dynamic Access Control
17 Aug 23
Embodiments of the present disclosure include a processing device that receives a proposed block for inclusion on a blockchain, the proposed block including a proposed update to an access control policy and an update condition for evaluating the proposed update, transmits an access request to be evaluated according to a modified version of the access control policy that incorporates the proposed update to generate access results, and transmits a determination for the inclusion of the proposed block on the blockchain in view of the access results.
Leigh Griffin, Aoife Moloney
Filed: 15 Feb 22
Utility
Using Wireless Charging to Redistribute Power Resources Within a Mesh Network
17 Aug 23
A system and method of using wireless charging to redistribute power resources within a mesh network.
Leigh Griffin, Pierre-Yves Chibon
Filed: 15 Feb 22
Utility
Automated deployment of control nodes at remote locations
15 Aug 23
A control node can be automatically deployed at a remote location according to some examples described herein.
Arie Bregman, Steve Mattar
Filed: 12 Jan 22
Utility
Implementing a service mesh in the hypervisor
15 Aug 23
A packet is received by a hypervisor from a first container, the packet to be provided to a second container, the packet including a header including a first network address associated with the second container.
Michael Tsirkin, Francisco Javier Martinez Canillas, Alberto Carlos Ruiz Ruiz
Filed: 7 Nov 19
Utility
Host malfunction detection for CI/CD systems
15 Aug 23
A method includes for each node of a plurality of nodes, determining a runtime value associated with an execution of a continuous integration and continuous delivery/deployment (CI/CD) pipeline, determining, for each node of the plurality of nodes, an aggregate performance statistic in view of the runtime value of the plurality of nodes, identifying, in view of the aggregate performance statistic, at least one node of the plurality of nodes that satisfies a performance threshold criterion, and responsive to identifying the at least one node of the plurality of nodes that satisfied the performance threshold criterion, marking the at least one node of the plurality of nodes as underperforming.
Arie Bregman, Avraham Talmor, Ilan Gersht
Filed: 27 Jul 21
Utility
Continuous testing and dependency tracking for java virtual machines
15 Aug 23
A system includes a processor in communication with a memory, a virtual machine running on the processor, and an application executing within the virtual machine.
Stuart Douglas, Georgios Andrianakis, Stephane Epardaud
Filed: 4 Jun 21
Utility
Scheduling multiple processes with varying delay sensitivity
15 Aug 23
Scheduling multiple processes with varying delay sensitivity is disclosed herein.
Jered J. Floyd, Ali Ok
Filed: 25 Sep 20
Utility
Vulnerability analyzer for application dependencies in development pipelines
15 Aug 23
Systems, methods, and machine-readable instructions stored on machine-readable media are disclosed for analyzing an image for vulnerabilities.
Aagam Shah, Samuzzal Choudhury, Mitesh Patel
Filed: 19 Dec 18
Utility
Pre-population of Persistent Storage Volumes
10 Aug 23
A method includes populating a physical storage volume associated with a second PVC from a data source identified by a first PVC and in response to populating the physical storage volume, associating the physical storage volume with the first PVC.
Adam Gerard Litke, Michael Howard Henriksen
Filed: 13 Apr 23
Utility
User Customizable Compiler Attributes for Code Checking
10 Aug 23
Disclosed herein is technology to use customized compiler attributes to check source code.
Ulrich Drepper
Filed: 7 Feb 22
Utility
User Customizable Compiler Attributes for Code Optimization
10 Aug 23
Disclosed herein is technology to use customized compiler attributes to enhance code optimizations.
Ulrich Drepper
Filed: 7 Feb 22