1123 patents
Page 22 of 57
Utility
Quantum Process Duplication
25 Aug 22
Quantum process duplication is disclosed herein.
Stephen Coady, Leigh Griffin
Filed: 24 Feb 21
Utility
Access Protection for Shared Qubits
25 Aug 22
Access protection for shared qubits is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 24 Feb 21
Utility
vkjhdib9xc6dvdev2ynwpow4gmocawu6 pgby53skxgwlxcc
25 Aug 22
Network interface provisioning of containerized instances based on tenant policies.
Huamin Chen, Douglas K. Smith
Filed: 25 Feb 21
Utility
gmhhoojewi2pwb9k79t5rjpctczqx3na42iduix7476e7ub
25 Aug 22
Incorporation of a trace visualization with a traffic graph visualization in a service mesh is disclosed.
Joel Takvorian
Filed: 9 May 22
Utility
w9vccqdgkv4mgjdys0bn43xxks8mytmf65uflq43bmeisk4sgd9u
25 Aug 22
Systems and methods of the disclosure include: publishing, by a first host computer system of a computing cluster comprising a plurality of host computer systems running a plurality of virtual machines, a list of memory page identifiers, wherein each memory page identifier is associated with a corresponding content identifier; receiving, from a second host computer system of the computing cluster, a memory page request comprising a first memory page identifier; and sending, to the first host computer system, a first memory page identified by the first memory page identifier.
Michael Tsirkin, David Alan Gilbert
Filed: 25 Feb 21
Utility
k0hy lqzjdc0rl2b660zix7ld9
18 Aug 22
Zero copy message reception for guests is disclosed.
Michael Tsirkin
Filed: 9 May 22
Utility
3rkcfit188b9 s9h996tvnhawqs
18 Aug 22
Systems and methods for direct memory control operations on memory data structures.
Ulrich Drepper
Filed: 16 Feb 21
Utility
e7t8r2ps4vtrhaiqhn76y7eal6ptd6c4g2kwuswdgnlzzhd9
18 Aug 22
A system, include a memory and a processor where the processor is in communication with the memory.
Boaz Shuster, Oded Ramraz
Filed: 16 Feb 21
Utility
5zwinvft ivxcr89ugnrqivicjph7r874tmp3takjw9jga9lvg3
18 Aug 22
Systems and methods for determining if a controller that can service a custom resource (CR) exists are disclosed.
Markus Thoemmes
Filed: 6 May 22
Utility
2zol8ysznyqmnkod7r20ueirczyk f1vh
11 Aug 22
Software components can be automatically integrated into a control framework in a distributed computing environment.
Michael Gerard Ryan
Filed: 9 Feb 21
Utility
qodyyg 3t4pqv1rskq6lk4wajpxdxvqzz3l2n2s41sy8xwbiv0cj
11 Aug 22
Migration rules for a migration engine can be automatically generated using an automated pipeline.
Marco Rizzi, Paolo Antinori
Filed: 9 Feb 21
Utility
oaiwnai8ka09628cd6wp364gj2 gqzdogydllbzuhxwr3sqawi34znfu9
11 Aug 22
A method includes receiving a request for content associated with a content platform and in response to receiving the request, retrieving the requested content from the content platform.
Og Benso Maciel
Filed: 9 Feb 21
Utility
vc4923lrz40i7sks23rgqehze7ivluwmfl1xmyd55avju8sd5dgofhuj5yp
11 Aug 22
Decision tables can be automatically validated on a computer according to some examples.
Luca Molteni, Matteo Mortari
Filed: 9 Feb 21
Utility
kdzlyaw0xtiepe11kojwx26ey2fm51ybsh6vfn 5jl7g1rtcouahw8hn
11 Aug 22
Systems and methods are described for providing context for software deployment using augmented reality.
Adam Scerra, Alexander Braverman Masis, Kedar Vijay Kulkarni
Filed: 9 Feb 21
Utility
5cf093cmb40yk 23a2rx9j7h1e4y6hck9idpaoqp
11 Aug 22
Systems and methods for remote management of software on private networks are generally described.
Matt Albert Woodson
Filed: 5 Feb 21
Utility
0zqvasjh0j5q2ea mku46kf1bag16b4h2jmmf48u0qke9khi3dta4
4 Aug 22
A method includes receiving, from a client device, a request to initiate an action on a target system.
Dmitri Pal
Filed: 3 Feb 21
Utility
lpd47151rtjuvi1tuk64o7n7cf1s xs4a4f515
4 Aug 22
Systems and methods for memory management for guests.
Michael Tsirkin, David Gilbert
Filed: 8 Apr 22
Utility
qivj4b3b4wazej5 zawilfoegvos
4 Aug 22
Page request interface overhead reduction for virtual machine migration and write protection in memory may be provided by generating a page table associated with the memory; in response to receiving a write-protection command to prevent write-access to data from a portion of the memory, write-protecting a first range of memory addresses comprising the data write protected from the portion of the memory, wherein a second range of memory addresses comprises data not write protected in the memory; and modifying the page table to include a page table entry associated with the first range of memory addresses being write-protected, wherein write access to a memory address in the first range of memory addresses by a device during write-protection is tracked.
Michael Tsirkin, Amnon Ilan
Filed: 25 Apr 22
Utility
7e3 amy1pjoe3pcrl7rfe0nv7ejk28fakh1q7nmm
4 Aug 22
Task permissions for software services can be set in a distributed computing environment according to some examples described herein.
Michael Gerard Ryan, Brian Gallagher
Filed: 4 Feb 21
Utility
kvl1qkmln4ujxya41iyrcyq24yb3o378mx0r1lo16b
4 Aug 22
A prioritization for bugs in software on multiple systems can be determined.
Shannon Hughes, Brian Michael Hamrick
Filed: 2 Feb 21