2188 patents
Page 55 of 110
Utility
Downtime reduction with VF MAC filter programming by hypervisors
1 Mar 22
A method includes, with a hypervisor, receiving, with a Physical Function (PF) of a network device, a data packet destined for a virtual machine (VM), forwarding the data packet to the VM, detecting an event that indicates that a driver for a virtual network device associated with the VM is up, in response to detecting the event, programming a device address filter of the PF, and with the network device, after the device address filter is programmed, forwarding incoming data packets destined for the VM directly to a Virtual Function (VF) associated with the virtual network device.
Michael Tsirkin
Filed: 14 May 19
Utility
Malicious packet filtering by a hypervisor
1 Mar 22
A method includes accessing, by a hypervisor executing by a processing device, a filtering queue that stores at least one packet determined to be malicious by a virtual machine, generating, by the hypervisor, a filtering rule in view of characteristics of the at least one packet determined to be malicious, and storing the filtering rule in a data store to apply to subsequent packets addressed to the virtual machine to determine whether any of the subsequent packets have similar characteristics with the at least one packet determined to be malicious.
Michael Tsirkin, Jiri Benc, Aaron Conole
Filed: 25 Aug 17
Utility
Detecting anomalies in networks
1 Mar 22
Anomalies can be identified within a network.
Marcel Hild
Filed: 28 Mar 19
Utility
Server detection of leaked credentials over HTTP
1 Mar 22
In some implementations, systems and methods for detecting leaked credentials in a request for a network resource are provided.
Darran Lofthouse, Farah Juma
Filed: 6 Aug 19
Utility
Rapid Bug Identification In Container Images
24 Feb 22
Bugs in container images can be rapidly identified.
Sebastian Scheinkman, Or Shoval
Filed: 21 Aug 20
Utility
Automatically Generating Continuous Integration Pipelines
24 Feb 22
Continuous integration pipelines can be automatically generated.
Arie Bregman, Ilan Gersht
Filed: 18 Aug 20
Utility
Self Optimizing Application
24 Feb 22
A system includes a memory a processor.
Stuart Douglas, Pedro Silva
Filed: 21 Aug 20
Utility
Optimizing Logging of Decision Outcomes In Distributed Transactions
24 Feb 22
Systems and methods are described for optimizing logging of decision outcomes in distributed transaction protocols.
Jonathan Halliday
Filed: 1 Nov 21
Utility
Free Detection with Double Free Protection
24 Feb 22
The technology disclosed herein may detect, avoid, or protect against “use after free” or “double free” programing logic errors.
Michael Tsirkin
Filed: 24 Aug 20
Utility
Reducing overlay network overhead across container hosts
22 Feb 22
A system for reducing overlay network overhead includes a memory, a processor in communication with the memory, a first container and a second container running on a first host, and a container scheduler executing on the processor.
Huamin Chen, Jay Vyas
Filed: 25 Jun 20
Utility
Source code file retrieval
22 Feb 22
According to one example, a method includes receiving a query from a client device, the query comprising a specified build identifier and a specified source code file name, determining, by a server device, a source code file from a plurality of archives using the specified build identifier and the specified source code file name, wherein determining the source code file comprises matching a longest shared prefix of the archive name associated with the specified build identifier and an archive name from a set of archive names having archived file names corresponding to the specified source code file name, and after the determining, responding to the query with the source code file.
Aaron Bela Merey, Frank Eigler
Filed: 30 Jan 20
Utility
Generating test plans for testing computer products based on product usage data
22 Feb 22
Implementations for generating test plans for testing computer products based on product usage data are described.
Eran Kuris, Arie Bregman
Filed: 6 Aug 19
Utility
Tool for generating security policies for containers
22 Feb 22
Disclosed are systems and methods for generating security policies for containers.
Lukas Vrabec, Petr Lautrbach
Filed: 11 Feb 19
Utility
Instantaneous key invalidation in response to a detected eavesdropper
22 Feb 22
Instantaneous key invalidation in response to a detected eavesdropper.
Leigh Griffin, Stephen Coady
Filed: 4 Oct 19
Utility
Virtual Bond for Efficient Networking of Virtual Machines
17 Feb 22
A packet is received by a first virtual machine supported by a host system from a second virtual machine via a shared memory device that is accessible to a plurality of virtual machines supported by the host system.
Michael Tsirkin
Filed: 17 Aug 20
Utility
Automated Pinning of File System Subtrees
17 Feb 22
Methods and systems for improved pinning of file system subtrees are provided.
Patrick Donnelly, Sidharth Anupkrishnan
Filed: 13 Aug 20
Utility
Performing Automatic Qubit Relocation
17 Feb 22
Performing automatic qubit relocation is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 17 Aug 20
Utility
Automatic generation of configuration files
15 Feb 22
A method includes receiving one or more project environment features of a project, identifying one or more relevant projects from a number of known projects by comparing the one or more project environment features of the project to one or more project environment features of each of the known projects, and generating at least a portion of a configuration file based on one or more configuration files from each of the one or more relevant projects.
Ido Ovadia, Boaz Shuster
Filed: 26 Mar 20
Utility
Balancing a recurring task between multiple worker processes
15 Feb 22
Balancing a recurring task between multiple worker processes is disclosed.
David Martin
Filed: 25 Apr 17
Utility
Labeled security for control flow inside executable program code
15 Feb 22
A method includes loading each section of an executable program code into a respective page of memory, configuring permissions for a first page including a first section of the executable program code to enable execution of the first section loaded into the first page.
Peter Jones, Adam Jackson
Filed: 28 Feb 18