2188 patents
Page 50 of 110
Utility
Interchangeable plugins for detecting conflicts between server-side data and client-side data
3 May 22
Conflicts can be detected between server-side data and client-side data using interchangeable plugins.
Wojciech Julian Trocki
Filed: 3 Jul 19
Utility
Host auto role classifier
3 May 22
A method includes receiving one or more characteristics associated with a server of a datacenter.
Arie Bregman, Ilan Gersht, Avraham Talmor
Filed: 29 Oct 20
Utility
tmm7u5pivuiy5ap8v0eu9y74smuk6o7l8tcj8gji33d4jvkz6
28 Apr 22
Distributed storage nodes having specialized hardware can be pooled for servicing data requests.
Gabriel Zvi BenHanokh, Brett Niver
Filed: 23 Oct 20
Utility
awucoq8de1t4xxx43nqg 6e4wt4yj3h3t3gxb3bhitiiv1900qopx3986
28 Apr 22
A system includes at least one memory including a persistent storage, at least one processor in communication with the at least one memory, a virtual machine associated with a virtual machine memory, and a hypervisor executing on the at least one processor.
Michael Tsirkin
Filed: 28 Oct 20
Utility
077pu7ts5k9agl vpxhyuixcczm
28 Apr 22
A system includes a host including a memory and a processor, where the processor is in communication with the memory.
Sergio Lopez Pascual
Filed: 28 Oct 20
Utility
8qgjsh4tiz1hl55s3pwkql6ypmek 4a195k8hbrnea88mopayhzklo3
28 Apr 22
Introspection of a containerized application in a runtime environment is disclosed.
Valentina Birsan, Feng Xiang
Filed: 28 Oct 20
Utility
6wopt8bm3wqay17dc6oohgzsmq3j1eeckzt3y0g28zql6pnwd8i
28 Apr 22
The technology disclosed herein enables an operating system kernel to schedule and perform load balancing of latency-sensitive tasks on processors that are otherwise excluded from a scope of load balancing performed by the kernel scheduler.
Yuval Kashtan, Gal Hammer
Filed: 27 Oct 20
Utility
lzt0sov1e0xw4hygpri68yj922anqgwyiffzsi9tcossn9nbjdvd67liszn7
28 Apr 22
Systems and methods for encryption support for virtual machines.
Michael Tsirkin, David Hildenbrand
Filed: 28 Oct 20
Utility
vxmpr944b5e2nxq9ttm2upnvx3ed okn7mh0vjdmxh7baasi9b7ja5wh
28 Apr 22
Embodiments of the present disclosure relate to specifying security settings for containers and extracting and applying such security settings from container images provided by e.g., developers or vendors of an application.
Daniel Walsh, Valentin Rothberg
Filed: 23 Oct 20
Utility
tgp5omc58v4m7wj1a214gq4d hof
28 Apr 22
Embodiments of the present disclosure provide a substitute audit log for use by applications in the user-space of a host operating system to write audit information.
Giuseppe Scrivano, Daniel Walsh
Filed: 23 Oct 20
Utility
c1r31wv61l2yeyhfgk5i2n2xaftqvb6wj7vua2dvqhi9r
28 Apr 22
A system includes a memory, a processor in communication with the memory, a supervisor, and a trusted execution environment (“TEE”).
Michael Tsirkin, Michael Bursell
Filed: 28 Oct 20
Utility
zsou7a0 2q8lrzzatwas7n4tzanbgogc687dsuhbqpmv
28 Apr 22
Certain aspects and features provide generation or simulation of sensory data that would otherwise come from Internet-of-things (IoT) sensors in reproducible and controllable way.
Stefan Bunciak, Martin Vecera, Miroslav Jaros
Filed: 5 Jan 22
Utility
go81u1z1yctw qzt79d0axp9a9pkscpb2dnnlm
26 Apr 22
A hypervisor receives a notification from a guest operating system (OS) of a virtual machine (VM), where the notification indicates a guest OS access of a memory address associated with a device slot of a communication bus, where the device slot is unavailable to the guest OS; maps, in a page table of the hypervisor, a page table entry for a memory configuration space of the device slot to the memory address, where the page table entry indicates that the configuration space is available to the guest OS; identifies an additional device slot associated with the communication bus; and maps, in the page table, an additional page table entry for an additional memory configuration space of the additional device slot to an additional memory address, where the additional page table entry indicates that the additional configuration space is available to the guest OS.
Michael Tsirkin, Paolo Bonzini
Filed: 26 Feb 20
Utility
9dqenzmrjjca2zi6s8cd8w16lfty91ebcm ewb
26 Apr 22
Methods, systems, and computer program products are included for performing a transaction, where log entries pertaining to the transaction are maintained following the transaction for audit purposes.
Mark Cameron Little
Filed: 9 Feb 15
Utility
oyzz5kqby9olhculy9vtda778o1mg64l77uor3x1ss64qmg90sml87rcvc8
26 Apr 22
Software tracing can be accomplished in a multitenant environment according to various examples of the present disclosure.
Juraci Paixao Kroehling
Filed: 23 Jan 19
Utility
tpua85bijempmycpbynasw6xhkaw02ztf
26 Apr 22
An example system includes a memory, one or more processors in communication with the memory, and a container image generator.
Huamin Chen, Jay Vyas
Filed: 31 Oct 16
Utility
751vk e7cr81o9na1cvqq2v3bswt5hi7oe5j5eay
26 Apr 22
Encrypted multi-stage smart contracts are disclosed.
Axel Simon, Michael H. M. Bursell
Filed: 21 Feb 19
Utility
nera9w3n96bln2wars61 3azyhz6cfeja9l3zhknw8k6pu7kacoza3
26 Apr 22
The technology disclosed herein provides an enhanced access control mechanism that uses a proof-of-work key wrapping system to temporally restrict access to data.
Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
Filed: 19 Aug 19
Utility
mv6cw3qmtiyxa0d5nxkogab
21 Apr 22
A region of a volatile memory can be dynamically resized based on a charge level of a backup battery supply.
Joshua Durgin, Gabriel Zyi BenHanokh
Filed: 20 Oct 20
Utility
rcno7blssj9hxllalnnuh
21 Apr 22
Run-time identification of dependencies during dynamic linking.
Florian Weimer
Filed: 21 Oct 20