1065 patents
Utility
Quantum entanglement protection
16 Jan 24
Quantum entanglement protection is disclosed.
Leigh Griffin, Stephen Coady
Filed: 8 Aug 22
Utility
Classifying quantum errors
16 Jan 24
The examples disclosed herein provide classifying quantum errors.
Stephen Coady, Leigh Griffin
Filed: 27 Jan 22
Utility
eatqakt1j19i9nel4rrjcoqf4z7t5wil3
16 Jan 24
Systems and methods are disclosed for a consensus-based node retirement in a mesh network.
Pierre-Yves Chibon, Leigh Griffin
Filed: 20 Feb 23
Utility
60ea2svg8rshczxdulg25ivo3ohhy oh
16 Jan 24
A request for a traffic topology of a service mesh including traffic between multiple services that utilize multiple communication protocols is received.
John Joseph Mazzitelli, Jay Shaughnessy
Filed: 15 Nov 21
Utility
hrhz2jn0uwa p5bv7ntrq91ip
9 Jan 24
Described is a system and method that includes executing, by a processing device, a data risk mitigation service (DRMS), to monitor, for each node of a plurality of nodes in a mesh network, at least one of metadata indicating a health state of a node or a call for help from the node.
Leigh Griffin, Pierre-Yves Chibon
Filed: 4 May 22
Utility
4oli9qhwzoc9yxsl33hjgow0yb3hq5oi imhix35awcrlkqz0a5jdrcr
9 Jan 24
Log files are received from disparate remote system machines separate from the log master server machine.
Jonathan J. Pickard, William W. Foster, Jr.
Filed: 10 May 19
Utility
h1y20wenbylqf8rfcu1amu34wqvy4l4
9 Jan 24
Heterogeneous memory management and services.
James W. Espy, Jeffrey A. Brown
Filed: 14 Jan 20
Utility
jckrtyf0r4m1pdgdtjnmk7o 4uhsezdr5uredz5hlwd
9 Jan 24
Page request interface overhead reduction for virtual machine migration and write protection in memory may be provided by generating a page table associated with the memory; in response to receiving a write-protection command to prevent write-access to data from a portion of the memory, write-protecting a first range of memory addresses comprising the data write protected from the portion of the memory, wherein a second range of memory addresses comprises data not write protected in the memory; and modifying the page table to include a page table entry associated with the first range of memory addresses being write-protected, wherein write access to a memory address in the first range of memory addresses by a device during write-protection is tracked.
Michael Tsirkin, Amnon Ilan
Filed: 25 Apr 22
Utility
kzz37ir7pmw6jgegkznkbm4zedarmn4lb91sb6krio6xwv3raihuk
9 Jan 24
Application lifecycle management based on real-time resource usage.
Leigh Griffin, Pierre-Yves Chibon
Filed: 9 Jul 21
Utility
satkjua6r8eyzgbnd1fdee4rilhz7cgzx7z70ffb6tgs2xcyeelwsg
9 Jan 24
Techniques of scheduling workload(s) on partitioned resources of host systems are described.
Marcel Apfelbaum, Swati Sehgal
Filed: 13 Apr 21
Utility
vuzk4z4mk5rmj5xmzh1oc0amw8z5w9iwi
9 Jan 24
Preventing quantum errors using a Quantum Error Correction Algorithm Trainer (QECAT) table is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 29 Nov 21
Utility
ultu3qj3xscczv846s2goozcbt3
9 Jan 24
Systems and methods of the disclosure include: publishing, by a first host computer system of a computing cluster comprising a plurality of host computer systems running a plurality of virtual machines, a list of memory page identifiers, wherein each memory page identifier is associated with a corresponding content identifier; receiving, from a second host computer system of the computing cluster, a memory page request comprising a first memory page identifier; and sending, to the first host computer system, a first memory page identified by the first memory page identifier.
Michael Tsirkin, David Alan Gilbert
Filed: 25 Feb 21
Utility
8rg1nz35glzpq3uctg59vk11o627u2veb5ftbt7jmd
2 Jan 24
Data can be prefetched in a distributed storage system.
Gabriel Zvi BenHanokh, Yehoshua Salomon
Filed: 8 Sep 21
Utility
03cqof fr73jnyk8z137oxlf1gtixlc
2 Jan 24
Systems and methods for memory management for virtual machines.
Michael Tsirkin
Filed: 4 May 21
Utility
k82xlibzua0o1gb0mdbns2bnj25h5 y0uqf2inwn1z5fvf
2 Jan 24
A system includes a memory and a processor, where the processor is in communication with the memory.
Andrea Cosentino, Paolo Antinori
Filed: 15 Apr 21
Utility
rzu8j5fqm3iu3jvr5hnb8bkwf4hpbjizg1ozf7t2h0120siixfzes85oxlj
2 Jan 24
Systems and methods for configuration file editing during the execution of the configuration process can include initiating a configuration process using a configuration file referencing a sequence of tasks and receiving a command to edit the configuration file.
Arie Bregman, Ilan Gersht
Filed: 26 Jan 22
Utility
g944rlylht15ues7t9ygtdkoow03nogykdyljr jv7
2 Jan 24
Systems and methods are described for compiling a specified instruction from a first virtual application to a second virtual application.
Ryan Goulding, Andrew Toth, Aneesh Puttur
Filed: 9 Mar 21
Utility
idyof27ydji8me8p4nb27a04issbivbbq3j9jdhb6wcv6g76 ipxe9
2 Jan 24
Systems and methods for generating asynchronous application programming interface (API) documents are generally described.
Paolo Antinori, Eric Philip Wittmann
Filed: 19 May 21
Utility
4gsm26yz1fqbclwu6ydjgep8ph6wy3xtjaarj3wu3ltwj4vkfwq3
19 Dec 23
An application programming interface (API) gateway device receives an API request from a client device, the API gateway to provide access to a plurality of services provided by a plurality of compute nodes.
Leigh Griffin, Pierre-Yves Chibon
Filed: 11 Jul 22
Utility
v9cwnekgwskphiscxch3
19 Dec 23
Systems and methods for implementing multi-factor system-to-system authentication using secure execution environments.
Michael Hingston McLaughlin Bursell
Filed: 12 Oct 20