2188 patents
Page 6 of 110
Utility
Establishing controlled remote access to debug logs
21 Nov 23
Systems and methods are disclosed for establishing controlled remote access to debug logs.
Michael Tsirkin, Andrea Arcangeli, Michael Hingston Mclaughlin Bursell
Filed: 29 Apr 20
Utility
Supervisor-based firmware hardening
21 Nov 23
Systems and methods for verifying firmware before it is loaded to a memory device are presented herein.
Michael Tsirkin, Amnon Ilan
Filed: 30 Nov 20
Utility
Providing a captive portal to manage a driver application for a peripheral device
21 Nov 23
Aspects of the disclosure provide for mechanisms providing a captive portal to manage a driver application for a peripheral device.
Michael Tsirkin
Filed: 12 Feb 20
Utility
Peripheral component interconnect (PCI) device removal for virtual machines
21 Nov 23
In response to a request to remove a PCI device from a virtual machine (VM), a processing device may transmit, to a guest operating system (OS) of a VM, an indication that a peripheral component interconnect (PCI) device connected to the VM has been disconnected such that the PCI device appears disconnected to a PCI port driver of the guest OS and simultaneously communicates with a device driver of the guest OS.
Michael Tsirkin
Filed: 12 Dec 19
Utility
Analyzing execution of quantum services using quantum computing devices and quantum simulators
21 Nov 23
Analyzing execution of quantum services using quantum computing devices and quantum simulators is disclosed.
Leigh Griffin, Stephen Coady
Filed: 28 Jul 21
Utility
Determining blockchain ledger indicates notification availability for an application
21 Nov 23
Notification system using a blockchain system.
Axel Simon
Filed: 16 Aug 21
Utility
Host auto role classifier
21 Nov 23
A method includes receiving one or more characteristics associated with a server of a datacenter.
Arie Bregman, Ilan Gersht, Avraham Talmor
Filed: 4 Apr 22
Utility
Multi-cluster networking using hub and spoke elastic mesh
21 Nov 23
A method is provided that includes receiving, from a first cluster, data intended for a second cluster and routing the data to the second cluster, thereby forming an indirect connection between a first cluster and the second cluster.
Nir Magnezi, Michael Kolesnik
Filed: 3 Dec 19
Utility
Shim Layer for Intercepting Calls Between an Upper Layer and a Lower Layer of a Container Image
16 Nov 23
A shim layer can be incorporated into a container image for intercepting calls between an upper layer and a lower layer of the container image according to some aspects described herein.
Cathal O'Connor, Brian Gallagher
Filed: 13 May 22
Utility
Automatically Switching Between Quantum Services and Classical Services Based on Detected Events
16 Nov 23
One example described herein include a system that can detect an event associated with executing a software operation using a quantum service of a quantum computing system.
Leigh Griffin, Stephen Coady
Filed: 12 May 22
Utility
Aggregated Health Monitoring of a Cluster During Test Automation
16 Nov 23
A system includes a cluster of nodes, memory, and a processor, where the cluster includes an application programming interface (API) server and one or more components.
Naga Ravi Chaitanya Elluri
Filed: 10 Jul 23
Utility
Dynamic allocation of arithmetic logic units for vectorized operations
14 Nov 23
A system includes a processing device that includes a vector arithmetic logic unit comprising a plurality of arithmetic logic units (ALUs), and a first processor core operatively coupled to the vector arithmetic logic unit, the processing device to receive a first vector instruction from the first processor core, wherein the first vector instruction specifies at least one first input vector having a first vector length, identify a first subset of the ALUs in view of the first vector length and one or more allocation criteria, execute, using the first subset of the set of ALUs, one or more first ALU operations specified by the first vector instruction, wherein the vector arithmetic logic unit executes the first ALU operations in parallel with one or more second ALU operations specified by a second vector instruction received from a second processor core.
Ulrich Drepper
Filed: 18 Dec 20
Utility
Prefetching data from a data storage system
14 Nov 23
Data can be prefetched from a data storage system.
Gabriel Zvi BenHanokh, Uri Lublin
Filed: 20 Nov 20
Utility
Filesystem pass-through on lightweight virtual machine containers
14 Nov 23
An example method for filesystem pass-through on lightweight virtual machine containers includes executing a container on a host, and creating a file system overlay in a local file system storage located on the host.
Sage Weil, Vincent Batts
Filed: 11 Apr 22
Utility
Sharing of web application in development via instant messaging application
14 Nov 23
Systems and methods for virtual image testing.
Ilan Gersht, Arie Bregman
Filed: 23 Sep 21
Utility
Detecting and handling attacks on processes executing within a trusted execution environment
14 Nov 23
Systems and methods for detecting and handling attacks on processes executing within a trusted execution environment (TEE) are disclosed.
Michael Hingston McLaughlin Bursell, Nathaniel P. McCallum
Filed: 30 Nov 20
Utility
Function pointer protection
14 Nov 23
A system includes a memory and a processor in communication with the memory.
Michael Tsirkin
Filed: 25 Feb 21
Utility
Hotswapping qubits for resource-limited quantum computing devices
14 Nov 23
Hotswapping qubits for resource-limited quantum computing devices is disclosed.
Leigh Griffin, Stephen Coady
Filed: 27 May 21
Utility
Providing cascading quantum encryption services in quantum computing systems
14 Nov 23
Providing cascading quantum encryption services is disclosed.
Stephen Coady, Leigh Griffin
Filed: 2 Mar 20
Utility
Visual Database System for Multidimensional Data Representation
9 Nov 23
A visual database system can represent multidimensional data.
Sanja Bonic
Filed: 4 May 22