2188 patents
Page 16 of 110
Utility
Dynamic preparation of a new network environment, and subsequent monitoring thereof
1 Aug 23
Dynamic preparation of a new network environment, and subsequent monitoring thereof is disclosed.
William W. Foster, Jr., Kambiz Aghaiepour, Joseph D. Talerico
Filed: 12 May 20
Utility
Classical management of qubit requests
1 Aug 23
Classical management of qubit requests is provided.
Leigh Griffin, Stephen Coady
Filed: 27 May 21
Utility
soom1s0dkmytzdb7uh6lanc05myonns4c9
1 Aug 23
A process in a system can monitor available free storage space on a storage device, and, based on preset log file parameters, can act upon log files being stored on or written to the storage device to keep the storage device from running out of storage space due to excessive logging.
Michael Kolesnik, Mordechay Asayag
Filed: 4 Oct 21
Utility
unisik563fh6t77fentqp9
1 Aug 23
Systems and methods are described for automated classification of defective code from bug tracking tool data.
Srinivasa Bharath Kanta, Veera Raghava Beri Reddy, Pawan Vinayak Dhiran
Filed: 24 May 21
Utility
tinunruxgbv3rgq5z3fvyx7cuaigsm05tf 7t4hev1hucis1
1 Aug 23
Automatic object optimization to accelerate machine learning training is disclosed.
Huamin Chen, Dennis R. C. Keefe
Filed: 29 Mar 19
Utility
rq92hbacr4kmy61sg4a5b3vro24ycpy24pi801
1 Aug 23
A network device queue manager receives a request to execute a workload on a node of a cloud computing environment, where the cloud computing environment comprises a plurality of nodes; determines that the workload is to be executed by a dedicated processor resource; identifies a set of one or more shared processor resources associated with the node, wherein each shared processor resource of the set of shared processor resources processes device interrupts; selects a processor resource from the set of one or more shared processor resources to execute the first workload on the first node; bans the selected processor resource from processing device interrupts while executing the workload; and executes the workload with the selected processor resource.
Yanir Quinn, Marcel Apfelbaum
Filed: 28 Sep 21
Utility
tk3d9cx7bbd99z5zbm1kuj09lesv4hwml1liero7jgyq7fbqd1 20kn
27 Jul 23
The examples disclosed herein provide classifying quantum errors.
Stephen Coady, Leigh Griffin
Filed: 27 Jan 22
Utility
228ncd2j2uyxvtu9l8p4rsz0yk4hv3zrco5x7q1wdpp4brs86z5rpjdz67
27 Jul 23
Embodiments of the present disclosure provide a method, a system and a non-transitory computer-readable medium to securely pass a message.
Leigh Griffin, Pierre-Yves Chibon
Filed: 21 Jan 22
Utility
hbuzlmb9lj6624of3p4l7bu d8ts
27 Jul 23
Systems and methods for determining a topology of an application deployment on a distributed system can include receiving multiple traces of requests within an application, where the application includes multiple components.
Kenneth Finnigan, Paul Robinson
Filed: 21 Jan 22
Utility
9nkb67dy1gnfhstw8e3cki7t8pnw d8if9p5hrq
27 Jul 23
Systems and methods for configuration file editing during the execution of the configuration process can include initiating a configuration process using a configuration file referencing a sequence of tasks and receiving a command to edit the configuration file.
Arie Bregman, Ilan Gersht
Filed: 26 Jan 22
Utility
oh27f96poggz6b4jv6knwgavt8zp2vvi5qbixcxezf9auyg30v09r96gi0
27 Jul 23
Systems and methods for ensuring that data received from a virtual device is random are provided.
Michael Tsirkin, Karen Lee Noel
Filed: 3 Apr 23
Utility
2irigueef4x9ku0g9cf 1mcwubptqruh8ixmoowmu9vlq92es1p5v66y0m
27 Jul 23
A quantum process is caused to be initiated on a quantum computing system from a quantum instruction file.
Leigh Griffin, Stephen Coady
Filed: 25 Jan 22
Utility
x46g025ln8h8cyk3 w87zjlg8sdq0s94wor5p6m7zeqg0r1
27 Jul 23
Safe critical section operations for virtual machines with virtual central processing unit overcommit are provided by: in response to identifying a preempting task to run on a first physical central processing unit (PCPU) from a second PCPU, setting a status of a flag in a virtual memory used by a first virtual central processing unit (VCPU) running on the first PCPU to indicate that the preempting task will interrupt the first VCPU; in response to initiating execution of a read-side critical section operation scheduled by the first VCPU to run on the first PCPU, checking the status of the flag in the virtual memory; and in response to the status of the flag being positive: exiting the first VCPU to a hypervisor; executing, by the hypervisor, the preempting task on the first PCPU; and after completing the preempting task, continuing execution of the read-side critical section operation.
Michael Tsirkin
Filed: 27 Jan 22
Utility
tkmysd4y99wk1ekehirg3x joo0268owjvztf
25 Jul 23
A method of performing resource discovery includes receiving, by a processing device, a resource identifier describing a resource of a computing cluster to be accessed by a workflow application.
Ricardo Zanini Fernandes, Edoardo Vacchi
Filed: 24 May 22
Utility
o43j43srbrrvqjdyw1xmxrsoa8tgfvjs58yytmuq438p8drqlkm48
25 Jul 23
Embodiments of the present disclosure provide a hybrid approach to performing a lazy pull of a container image.
Giuseppe Scrivano
Filed: 1 Apr 21
Utility
vl5lv6jmnl 700lqyykark1gzdyt4900o7
25 Jul 23
A system for managing access to a shared resource includes a plurality of nodes is described.
Alejandro Martinez Ruiz
Filed: 29 Mar 21
Utility
qghi5d3vhuwtuayr6oawco2ofachsfbpt0x5ytxrr 0b51emvzuiq1sa
25 Jul 23
A method may include receiving, by a privileged component executed by a processing device, bytecode of a packet processing component from an unprivileged component executed by the processing device, analyzing, by the privileged component, the bytecode of the packet processing component to identify whether the bytecode comprises a first command that returns a redirect, analyzing, by the privileged component, the bytecode of the packet processing component to identify whether the bytecode comprises a second command that returns a runtime computed value, and responsive to determining that the bytecode comprises the first command or the second command, setting a redirect flag maintained by the privileged component.
Michael Tsirkin, Jesper Brouer
Filed: 26 Aug 19
Utility
w0zxtft r67g995lqqp5w
25 Jul 23
A tracing operation is initiated on a service, wherein the service comprises a plurality of method calls.
Heiko Rupp
Filed: 2 Mar 22
Utility
skyq7zz8oub0ayj35dr4hw6v1u5k7fzgdbzzmun7cekvs7qas8e0lrhlre
25 Jul 23
A system includes a memory and a processor, where the processor is in communication with the memory.
Howard Proctor
Filed: 27 Apr 21
Utility
qe1jvcu8nu9pp30zfhwnkqft35879kxp1g28ixkmptaguhor
25 Jul 23
Methods, systems, and computer program products for optimization of query processing in a data federation system using priority queuing techniques are provided.
Filip Nguyen, Filip Elias
Filed: 18 Sep 17