1123 patents
Page 10 of 57
Utility
Preventing Duplication of Files In a Storage Device
6 Jul 23
Duplication of files in a storage device of a computing device can be avoided using some techniques described herein.
Giuseppe Scrivano
Filed: 6 Jan 22
Utility
Selective Memory Deduplication for Virtualized Computer Systems
29 Jun 23
A processing device executing a guest receives a request from an application to disable memory deduplication for a memory page associated with the application; identifies a non-mergeable memory range for memory space of the guest, where the non-mergeable memory range is associated with guest memory pages not to be deduplicated; maps, in a page table of the guest, an entry for the memory page to a memory address within the non-mergeable memory range; and causes a host to disable memory deduplication for the memory page responsive to detecting an access of the memory page by the application.
Michael Tsirkin, Andrea Arcangeli
Filed: 17 Feb 23
Utility
rz7ojf8g6qs1dgbykbige
29 Jun 23
Aspects of the disclosure provide for mechanisms for managing containers across operating systems in a computer system.
Raymond Strode, Alexander Larsson, Matthias Clasen, Debarshi Ray
Filed: 17 Feb 23
Utility
n0nyaceldeh46gxzy6wef16zoo ppht
29 Jun 23
A first processing device receives a request to execute a program, determines that an amount of memory modified by one or more instructions of the program satisfies a threshold criterion, and provides the one or more instructions to a second processing device for execution, wherein the second processing device implements an instruction set architecture of the first processing device.
Ulrich Drepper
Filed: 27 Feb 23
Utility
ht84g1 9orwgemkldb22f4rk21eshmk
29 Jun 23
In some implementations, a method is provided.
Marcel Hild
Filed: 6 Mar 23
Utility
qvac3cha4iy1qgk 1uuwo86dybs
29 Jun 23
Processing logic may monitor testing of a candidate service with one or more services to determine if one or more criteria are satisfied.
Leigh Griffin, Cathal O'Connor
Filed: 23 Dec 21
Utility
u3frqr4zrzl1o0bzjutb5carr84b66 itbvknovg
25 May 23
Systems and methods for extending a container orchestration engine API in-process are disclosed.
Markus Thoemmes, Francesco Guardiani
Filed: 9 Jan 23
Utility
569ijggxjasmxvua5dfllewvqauap rqffla0mlln7o2xkl2p
25 May 23
A method includes receiving, at a container registry, a container image including a set of files, determining that at least one file of the set of files is a duplicate of a previously stored container image file at the container registry.
Giuseppe Scrivano
Filed: 23 Nov 21
Utility
kzwlpojh23ynr8xdbbaqlt4m5i3zrxwfvpwc3r440 3lx
25 May 23
An apparatus and method of performing a time-based operation on a row in a database table includes receiving a function to be applied to a particular row in a table within the database management system.
Michael Kolesnik, Michel Peterson
Filed: 9 Jan 23
Utility
6l2zcwv8ch5d1fuks3et2kkgy
18 May 23
Systems and methods for generating SLO specifications using annotations are generally described.
Paolo Antinori, Eric Wittmann
Filed: 18 Nov 21
Utility
s1he2l24dmhcj19kn62il2342al56upytekkc0uww
18 May 23
An integrated development environment (IDE) receives an indication of a selected source code portion within source code.
Paolo Antinori, Eric Wittmann
Filed: 17 Nov 21
Utility
v66dp7y1626ypfl291mka7p2w3hcg5e7djurdxprnub1xzz qjkoya
18 May 23
A quantum isolation zone (QIZ) controller executing on a quantum computing system receives, from a first requestor, a request to allocate a group of qubits from a plurality of available qubits that are implemented by the quantum computing system and to establish a QIZ that limits qubit visibility of any quantum process associated with the QIZ to the qubits in the group of qubits.
Leigh Griffin, Stephen Coady
Filed: 18 Nov 21
Utility
ctu21qf0ka86z8iqepb2keclyddve92eo19gjcgn4yj4t3cj2q3qm0u9
18 May 23
Systems and methods for ballooning related memory allocation techniques for execution environments.
Michael Tsirkin, David Hildenbrand
Filed: 6 Jan 23
Utility
do4hud92xkmge7vkqmqi4azsxlb5mgawqn961w6grn828uc m2w
18 May 23
A request for a traffic topology of a service mesh including traffic between multiple services that utilize multiple communication protocols is received.
John Joseph Mazzitelli, Jay Shaughnessy
Filed: 15 Nov 21
Utility
f0lpajbuq7qfilg4qlh681mjlkfegfma0wd7w7zpnnfb2b9in5j0
18 May 23
A method includes initiating, by a device manager associated with a cluster manager proxy, a connection with a cluster of computing devices, wherein initiating the connection includes providing first credentials to the cluster of computing devices to access the cluster manager proxy.
Jonathan Hal Cope, Huamin Chen, Ricardo Noriega De Soto, Frank Alexander Zdarsky
Filed: 15 Nov 21
Utility
af3u80pwk99m2hj37 b0khb
18 May 23
A technique for dynamic scaling of a distributed computing system is described.
Orit Wasserman, Yehoshua Salomon
Filed: 18 Nov 21
Utility
fvbau7b4iu0w3e9kxz1tfqwdmf2dyfj5
11 May 23
A system includes a memory and a processor.
Michael Tsirkin, Sergio Lopez Pascual
Filed: 9 Jan 23
Utility
cgwovttw87qib62j3nytzw7bao02j8jhm1n3vvtqtxe02ksbe
4 May 23
Enabling callback-based qubit manipulation is disclosed herein.
Stephen Coady, Leigh Griffin
Filed: 28 Oct 21
Utility
ah14mzixcobqw1z23gg hjfp5dakrajsrecl4be1bobjdo1l8su
4 May 23
A method includes monitoring, during a first time interval, traffic associated with one or more applications executed by a cluster of compute nodes and determining, in view of the traffic associated with the one or more applications during the first time interval, that the traffic is predicted to exceed a capacity threshold of the cluster of compute nodes at an end of a second time interval.
Markus Thoemmes, Roland Ludwig Huss
Filed: 28 Oct 21
Utility
o60u6c6ru076lxb5fm yguac6vzp11z12r0o4uv12sel
4 May 23
An example method may include: receiving, by a hypervisor, a data packet, identifying a memory location associated with a guest virtual machine and accessible to the guest virtual machine and the hypervisor, wherein a program mapping table comprising one or more mapping table entries is stored at the memory location, each mapping table entry specifying a program selection criterion and a packet processing program.
Michael Tsirkin, Jesper Brouer
Filed: 28 Oct 21