2188 patents
Page 47 of 110
Utility
Reducing Wear on Zoned Storage Devices for Storing Digital Data
2 Jun 22
Wear on a zoned storage device can be reduced in some examples.
Uri Lublin, Gabriel Zvi BenHanokh
Filed: 30 Nov 20
Utility
Protection of Balloon Inflated Memory Using Temporary Loan Pages
2 Jun 22
A system includes a guest memory having guest physical pages (“GPPs”) that includes loan pages having a fixed quantity, a host memory, a processor in communication with the memory, and a virtual machine monitor (“VMM”).
David Hildenbrand
Filed: 30 Nov 20
Utility
Efficient Out of Order Request Completion
2 Jun 22
Systems and methods for supporting efficient out of order request completion.
Michael Tsirkin
Filed: 30 Nov 20
Utility
Scalable Visualization of a Containerized Application In a Multiple-cluster Environment
2 Jun 22
Scalable visualization of a containerized application in a multiple-cluster environment is disclosed.
Valentina Birsan, Feng Xiang, Jaclyn P. Wakin, Laura Rodriguez, Joshua Packer
Filed: 30 Nov 20
Utility
Chained Triggering of Builds In Continuous Integration Environments
2 Jun 22
The technology disclosed herein enables presenting, via a user interface, one or more builds, wherein each build comprises one or more first software build operations, and at least one first software build operation is currently executing, presenting, via the user interface, one or more computing jobs, wherein each job comprises one or more second software build operations, receiving, via the user interface, an input associating a job selected from the one or more jobs with a build selected from the one of the builds, and responsive to receiving the input, scheduling, execution of the second software build operations to occur in response to a completion of execution of the first software build operations.
Arie Bregman, Ilan Gersht
Filed: 30 Nov 20
Utility
Client-based Search Query Autocomplete
2 Jun 22
Client-based search query autocomplete is disclosed.
James E. Scarborough, John Pratt
Filed: 30 Nov 20
Utility
Labeled Security for Control Flow Inside Executable Program Code
2 Jun 22
A method includes configuring one or more permissions for a first page of memory including a first section of a plurality of sections of an executable program code to enable execution of the first section.
Peter Jones, Adam Jackson
Filed: 14 Feb 22
Utility
Detecting and Handling Attacks on Processes Executing Within a Trusted Execution Environment
2 Jun 22
Systems and methods for detecting and handling attacks on processes executing within a trusted execution environment (TEE) are disclosed.
Michael Hingston McLaughlin Bursell, Nathaniel P. McCallum
Filed: 30 Nov 20
Utility
Firmware Version Corruption Attack Prevention
2 Jun 22
A method includes detecting a change in control of a peripheral device from a first security domain to a second security domain of a computer system and in response to detecting the change in control of the peripheral device, reading a current firmware version of the peripheral device and determining whether the current firmware version of the peripheral device is trusted by the computer system.
Michael Tsirkin, Amnon Ilan
Filed: 30 Nov 20
Utility
Supervisor-based Firmware Hardening
2 Jun 22
Systems and methods for verifying firmware before it is loaded to a memory device are presented herein.
Michael Tsirkin, Amnon Ilan
Filed: 30 Nov 20
Utility
Tool for Generating Security Policies for Containers
2 Jun 22
Disclosed are systems and methods for generating security policies for containers.
Lukas Vrabec, Petr Lautrbach
Filed: 18 Feb 22
Utility
Efficient Launching of Trusted Execution Environments
2 Jun 22
The technology disclosed herein enables efficient launching of trusted execution environments.
Michael Hingston McLaughlin Bursell, Michael Tsirkin, Nathaniel McCallum
Filed: 30 Nov 20
Utility
Managing Operator Pattern Service Connections to an Environment
2 Jun 22
A method includes receiving a request from an operator pattern service to perform an operation on a computing environment and determining whether the operator pattern service has permission to perform the operation on the computing environment.
Aiden Keating, Dimitra Stefania Zuccarelli, Ciaran Roche
Filed: 30 Nov 20
Utility
Compilation framework for hardware configuration generation
31 May 22
Systems and methods for supporting a compilation framework for hardware configuration generation.
Ulrich Drepper, Ahmed Sanaullah
Filed: 18 Dec 20
Utility
Bytecode modification
31 May 22
Systems and methods for modifying bytecode at runtime are provided.
Filip Elias, Filip Nguyen
Filed: 26 Feb 13
Utility
Merging multiple package files into a merged package file
31 May 22
Merging multiple package files into a merged package file is disclosed herein.
Avraham Talmor, Ilan Gersht, Arie Bregman
Filed: 16 Dec 20
Utility
Hot-swapping storage pool backend functional modules
31 May 22
Systems and methods for hot-swapping storage pool backend functional modules of a host computer system.
Federico Simoncelli
Filed: 4 Apr 19
Utility
Cooperative cloud infrastructure using blockchains for hardware ownership and access
31 May 22
A system includes a memory, a processor in communication with the memory, a hypervisor executing on the processor, a pool of hypervisor resources, and a cloud-sharing module (CSM).
Jay Vyas, Huamin Chen
Filed: 3 Jan 20
Utility
Synchronizing batch job status across nodes on a clustered system
31 May 22
Systems and method for determining and synchronizing an execution status of a batch job are provided.
Cheng Fang, Ingo Arnold Weiss
Filed: 24 Apr 19
Utility
Log record analysis based on log record templates
31 May 22
Log record analysis based on log record templates is disclosed.
Michel Peterson, Michael Kolesnik
Filed: 1 Aug 19