1123 patents
Page 5 of 57
Utility
Parallel Booting Operating System
26 Oct 23
Systems and methods providing a parallel booting operating system.
Leigh Griffin, Pierre-Yves Chibon
Filed: 22 Apr 22
Utility
Encrypted Memory Guest/host Communication
26 Oct 23
Systems and methods for enabling a Virtual Machine (VM) and hypervisor to communicate are disclosed.
Michael Tsirkin, Karen Lee Noel
Filed: 25 Apr 22
Utility
Scalable Asynchronous Communication for Encrypted Virtual Machines
26 Oct 23
Systems and methods for virtual machine communication in a virtualized environment can include identifying an encrypted guest memory location of a virtual machine (VM), the encrypted guest memory location associated with a virtual device, and copying a first set of encrypted data from the encrypted guest memory location to hypervisor memory to create a copied set of encrypted data.
Michael Tsirkin, Karen Noel
Filed: 22 Apr 22
Utility
Virtual Machine Storage System for Duplication Avoidance
26 Oct 23
Systems and methods for duplication avoidance are disclosed.
Giuseppe Scrivano, Michael Tsirkin
Filed: 22 Apr 22
Utility
Scheduling Multiple Processes with Varying Delay Sensitivity
19 Oct 23
Scheduling multiple processes with varying delay sensitivity is disclosed herein.
Jered J. Floyd, Ali Ok
Filed: 23 Jun 23
Utility
Tiered Cloud Storage for Different Availability and Performance Requirements
19 Oct 23
A system and method for a tiered cloud storage for different availability and performance requirements includes a gateway, a block store configured to cache data, and an object store configured to persistently store data.
Huamin Chen, Jay Vyas
Filed: 28 Jun 23
Utility
Dynamic Distributed Tracing Instrumentation In a Microservice Architecture
19 Oct 23
A method call of a service to be analyzed is identified.
Heiko Rupp
Filed: 23 Jun 23
Utility
Managing Software Service Lifetimes Using Voting Via Digital Ledgers
19 Oct 23
Smart contracts within digital ledger systems can be used in managing lifetimes of software services.
Bilgin Ibryam
Filed: 18 Apr 22
Utility
Configuration of a Server In View of a Number of Clients Connected to the Server
19 Oct 23
A size of a cache of a server associated with a network service is modified in view of a number of clients that are connected to the server.
Poornima Gurusiddaiah, Amar Tumballi Suryanarayan
Filed: 12 Jun 23
Utility
Managing Cloud Acquisitions Using Distributed Ledgers
19 Oct 23
Systems and methods of the disclosure include: broadcasting, by a cloud resource provisioning component, to a cryptographically-protected distributed ledger, a first transaction comprising a cloud resource request for provisioning a cloud resource; transmitting, to one or more cloud providers, the cloud resource request; receiving, from a first cloud provider of the one or more cloud providers, a first cloud resource offer responsive to the cloud resource request; and broadcasting, to the cryptographically-protected distributed ledger, a second transaction comprising the first cloud resource offer.
Cathal O’Connor, Brian Gallagher
Filed: 21 Jun 23
Utility
Message Schema Migration In Messaging Systems
19 Oct 23
Systems and methods for providing message schema migration in messaging systems.
Carles Arnal Castello, Paolo Antinori
Filed: 15 Apr 22
Utility
Distributed Anomaly Detection Using Combinable Measurement Value Summaries
12 Oct 23
Distributed anomaly detection using combinable measurement value summaries is disclosed.
William C. Benton, Sophie Watson
Filed: 12 Jun 23
Utility
Cross-validating Files to Facilitate Code Generation
12 Oct 23
In various examples disclosed herein, provided is a method and system for cross-validating files to facilitate code generation.
Edoardo Vacchi, Paolo Antinori
Filed: 8 Apr 22
Utility
Profiling and Optimization of Compiler-generated Code
12 Oct 23
The technology disclosed herein enables a processing device to receive program code comprising a plurality of program code instructions, wherein the plurality of program code instructions comprise at least one profiling instruction, wherein the program code is loaded from an executable program file that specifies a persistent memory region; and execute the program code including the at least one profiling instruction, wherein to execute the at least one profiling instruction, the processing device is to: identify a memory location in the persistent memory region in view of a profiling identifier included in the at least one profiling instruction, generate a profiling information item, and store the profiling information item in the persistent memory region at the identified memory location.
Ulrich Drepper
Filed: 2 Jun 23
Utility
Rebasing Image Layers Utilising a Repository-based Strategy
12 Oct 23
A system and method of performing a rebase action to image layers of a container.
Pierre-Yves Chibon, Leigh Griffin
Filed: 6 Apr 22
Utility
Just-in-time Packager Build System
12 Oct 23
A method includes receiving a software build task, identifying one or more previously executed software build tasks in view of one or more properties of the software build task and determining a set of computing resources to be allocated to a build container for performing the software build task in view of the one or more previously executed software build tasks.
Leigh Griffin, Leonardo Rossetti
Filed: 11 Apr 22
Utility
Generating Filesystem Images with Integrated Containers
12 Oct 23
Generating filesystem images with integrated containers is disclosed herein.
Pierre-Yves Chibon, Leigh Griffin
Filed: 11 Apr 22
Utility
Optimizing Execution of Quantum Service Definition Files Using a Quantum Optimization Database
12 Oct 23
Optimizing execution of quantum service definition files using a quantum optimization database is disclosed herein.
Stephen Coady, Leigh Griffin
Filed: 11 Apr 22
Utility
Containerized Gateways and Exports for Distributed File Systems
12 Oct 23
Systems and method for improved creation and management of distributed file systems are provided.
Varsha Rao, Patrick Donnelly, Ramana Krisna Venkatesh Raja, Jeffrey Layton
Filed: 15 Jun 23
Utility
Managing Message Sizes In a Mesh Network
12 Oct 23
In one example described herein, a processing device can receive computing metrics from nodes within a mesh network.
Andrea Cosentino, Leigh Griffin, Paolo Antinori
Filed: 8 Apr 22