2188 patents
Page 39 of 110
Utility
Metadata Size Reduction for Data Objects In Cloud Storage Systems
8 Sep 22
Metadata sizes for data objects in cloud storage systems can be reduced.
Joshua Durgin, Gabriel Zvi BenHanokh
Filed: 2 Mar 21
Utility
Library Based Virtual Machine Migration
8 Sep 22
A method includes determining to migrate a guest VM from a source host to a destination host and, in response to determining to migrate the guest VM, determining that a page of the guest VM matches a page of a VM image of a plurality of VM images in a VM library associated with the source host.
Michael Tsirkin
Filed: 2 Mar 21
Utility
Application Programming Interface Compatibility
8 Sep 22
A system, comprising a memory and a processor, where the processor is in communication with the memory, is configured to receive a request to determine a compatibility of a first version of an application programming interface (API) with a second version of the API.
Andrew D. Mackenzie, Eric Wittmann
Filed: 8 Mar 21
Utility
Management of Local Signing of Software Packages Using a Trusted Execution Environment
8 Sep 22
Systems and methods providing a processing device to receive, by a software build process executing in a trusted execution environment (TEE) of a first computer system, software source code from a second computer system.
Axel Simon, Michael Hingston McLaughlin Bursell
Filed: 5 Mar 21
Utility
Management of Building of Software Packages Using a Trusted Execution Environment
8 Sep 22
Systems and methods providing a processing device to receive, by a software build process executing in a trusted execution environment (TEE) of a first computer system, software source code from a second computer system.
Axel Simon, Michael Hingston McLaughlin Bursell
Filed: 5 Mar 21
Utility
Container Management for Cryptanalysis Attack Protection
8 Sep 22
Containers can be managed for cryptanalysis attack protection.
Orit Wasserman, Gabriel Zvi BenHanokh
Filed: 3 Mar 21
Utility
Constrained key derivation in linear space
6 Sep 22
The technology disclosed herein provides an enhanced cryptographic access control mechanism that uses a cryptographic keys that are based on proximity data.
Nathaniel P. McCallum, Peter M. Jones
Filed: 7 Feb 19
Utility
Scalable collaborative editing
6 Sep 22
Systems and methods for scalable collaborative editing are generally described.
Eric Philip Wittmann, Paolo Antinori
Filed: 9 Mar 21
Utility
Video conference content requests to non-participants
6 Sep 22
Systems and methods for providing video conference content requests to non-participants.
Ilan Gersht, Arie Bregman, Avraham Talmor
Filed: 26 Apr 21
Utility
Mitigating software-update risks for end users
6 Sep 22
Software-update risks can be mitigated for end users by implementing some examples described herein.
Alexander Braverman Masis
Filed: 24 Nov 20
Utility
Calculating a patch target on an application server
6 Sep 22
A method includes receiving, at an application server, a request to modify a target object, such as a resource object.
Er Qiang Ma, Alessio Soldano
Filed: 23 Apr 20
Utility
Blockchain-based container image registry
6 Sep 22
Methods and systems for storing and retrieving container images are provided.
Dylan Murray
Filed: 10 Sep 19
Utility
Migrating the runtime state of a container between two nodes
6 Sep 22
Embodiments of the present disclosure relate to migrating the in-memory state of a containerized application to a destination node.
Aiden Keating, Jason Madigan
Filed: 10 Oct 19
Utility
Free memory page hinting by virtual machines
6 Sep 22
Systems and methods for free memory hinting by virtual machines.
David Hildenbrand, Michael Tsirkin
Filed: 13 Dec 19
Utility
Proof-of-work key wrapping for restricting data execution based on device capabilities
6 Sep 22
The technology disclosed herein provides a proof-of-work key wrapping system for restricting data execution based on device capabilities.
Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
Filed: 19 Aug 19
Utility
Non Fragmenting Memory Ballooning
1 Sep 22
Technology is disclosed for non-fragmenting memory ballooning.
Michael Tsirkin, David Hildenbrand
Filed: 1 Mar 21
Utility
User interface metadata from an application program interface
30 Aug 22
A method includes receiving, from a client device, a request for graphical user metadata (GUM) associated with an application program interface (API), wherein the request is directed to a well-known GUM endpoint of the API.
Stan David Silvert
Filed: 20 Oct 17
Utility
Automated problem resolution
30 Aug 22
Mechanisms for generating a remediation script to resolve a problem condition in a remote computing device are provided.
Andrew H. Hecox, Gavin Romig-Koch
Filed: 30 Nov 16
Utility
Provisioning Bare Metal Machines with a Complex Software Product
25 Aug 22
Provisioning bare metal machines with a complex software product is disclosed.
Sai Sindhur Malleni
Filed: 24 Feb 21
Utility
Application Deployment Using Reduced Overhead Bytecode
25 Aug 22
A system includes a memory, a processor in communication with the memory, and a recorder.
Stuart Douglas
Filed: 9 May 22