1123 patents
Page 9 of 57
Utility
Floating PV Service for Mesh Secure Message Transfer
27 Jul 23
Embodiments of the present disclosure provide a method, a system and a non-transitory computer-readable medium to securely pass a message.
Leigh Griffin, Pierre-Yves Chibon
Filed: 21 Jan 22
Utility
Determining a Distributed System Topology from a Single Application Deployment
27 Jul 23
Systems and methods for determining a topology of an application deployment on a distributed system can include receiving multiple traces of requests within an application, where the application includes multiple components.
Kenneth Finnigan, Paul Robinson
Filed: 21 Jan 22
Utility
Live Edit of Configuration Management Execution
27 Jul 23
Systems and methods for configuration file editing during the execution of the configuration process can include initiating a configuration process using a configuration file referencing a sequence of tasks and receiving a command to edit the configuration file.
Arie Bregman, Ilan Gersht
Filed: 26 Jan 22
Utility
Safe Entropy Source for Encrypted Virtual Machines
27 Jul 23
Systems and methods for ensuring that data received from a virtual device is random are provided.
Michael Tsirkin, Karen Lee Noel
Filed: 3 Apr 23
Utility
Quantum Computing System Heat Orchestration
27 Jul 23
A quantum process is caused to be initiated on a quantum computing system from a quantum instruction file.
Leigh Griffin, Stephen Coady
Filed: 25 Jan 22
Utility
Safe Critical Section Operations for Virtual Machines with Virtual Central Processing Unit Overcommit
27 Jul 23
Safe critical section operations for virtual machines with virtual central processing unit overcommit are provided by: in response to identifying a preempting task to run on a first physical central processing unit (PCPU) from a second PCPU, setting a status of a flag in a virtual memory used by a first virtual central processing unit (VCPU) running on the first PCPU to indicate that the preempting task will interrupt the first VCPU; in response to initiating execution of a read-side critical section operation scheduled by the first VCPU to run on the first PCPU, checking the status of the flag in the virtual memory; and in response to the status of the flag being positive: exiting the first VCPU to a hypervisor; executing, by the hypervisor, the preempting task on the first PCPU; and after completing the preempting task, continuing execution of the read-side critical section operation.
Michael Tsirkin
Filed: 27 Jan 22
Utility
Tagging Packages In an Application Ecosystem
20 Jul 23
Embodiments of the present disclosure relate to systems and methods for creating logical groups of packages by tagging individual packages with a tag associated with metadata corresponding to packages that are part of the group.
Pierre-Yves Chibon, Leigh Griffin
Filed: 19 Jan 22
Utility
Per-host Delta-difference Generation In Update Management Systems
20 Jul 23
Embodiments of the present disclosure relate to systems and methods for generating delta-difference on an on-demand basis.
Pierre-Yves Chibon, Leigh Griffin
Filed: 20 Jan 22
Utility
Quantum Computer System Scheduling and Parameterization Based on Error Correction History
20 Jul 23
In one example described herein a system can receive, by a scheduler of a server, a request to execute a quantum algorithm.
Stephen Coady, Leigh Griffin
Filed: 18 Jan 22
Utility
Mayday-relay Mechanism In a Mesh Network
20 Jul 23
A system and method of relaying distress calls in a mesh network of nodes.
Leigh Griffin, Pierre-Yves Chibon
Filed: 20 Jan 22
Utility
Sidecar-based Integration Capabilities for Containerized Applications
13 Jul 23
Methods and systems for improved integration functions for applications are provided.
Bilgin Ismet Ibryam
Filed: 30 Jan 23
Utility
Enabling Communication Between Virtual Machines and Virtual Devices by Hypervisor-controlled Firmware
13 Jul 23
Systems and methods for encryption support for virtual machines.
Michael Tsirkin
Filed: 13 Mar 23
Utility
Secure Virtual Machine and Peripheral Device Communication
13 Jul 23
A method includes exposing a public cryptographic key associated with a peripheral device of a computing system to a guest running on the computing system.
Michael Tsirkin
Filed: 13 Mar 23
Utility
Dynamic Data Batching for Graph-based Structures
13 Jul 23
A data query for data is received that is associated with a first data node managed by a first executable service and a second data node managed by a second executable service.
Manyanda Chitimbo, Wojciech Julian Trocki
Filed: 10 Jan 22
Utility
Managing Standard Operating Procedures Using Distributed Ledger Networks
13 Jul 23
Systems and methods of the disclosure include: receiving, by a node of a distributed ledger network, first transaction data, wherein the first transaction data comprises an alert derived from a state of a computer system; storing the first transaction data in a first block of the distributed ledger network; receiving, by the node, second transaction data, wherein the second transaction data comprises an identifier of a remedial action performed on the computer system in response to the alert and a result of performing the remedial action; and storing the second transaction data in a block of the distributed ledger network, wherein the block is provided by one of: the first block or a second block.
Brian Gallagher, Cathal O'Connor
Filed: 10 Jan 22
Utility
Automated Deployment of Control Nodes at Remote Locations
13 Jul 23
A control node can be automatically deployed at a remote location according to some examples described herein.
Arie Bregman, Steve Mattar
Filed: 12 Jan 22
Utility
Self-organizing Network Configuration
13 Jul 23
A status communication is received that is associated with a mesh network comprising a plurality of interconnected node devices.
Pierre-Yves Chibon, Leigh Griffin
Filed: 10 Jan 22
Utility
Selective Validation of a Portion of a Server Response to a Client Request
13 Jul 23
A portion of a server response to a client request can be selectively validated according to some examples described herein.
Josejulio Martinez Magana
Filed: 11 Jan 22
Utility
Robust Resource Removal for Virtual Machines
6 Jul 23
Systems and methods providing robust resource removal for virtual machines.
Michael Tsirkin, Karen Lee Noel
Filed: 4 Jan 22
Utility
Controlling Container Commands Issued In A Distributed Computing Environment
6 Jul 23
In one example described herein a system can intercept, using a webhook, a container command issued to a user interface of a container orchestration platform.
Khushboo Sancheti, Mandar Darwatkar, James Scott, Hoo In Song
Filed: 6 Jan 22