Patent application number | Description | Published |
20140130029 | VIRTUALIZED APPLICATION IMAGE PATCHING - Virtual applications are automatically kept up to date with the current version of a virtual application. Instead of the client having to obtain the entire version of the current virtual application, the client obtains the portions of the current virtual application that are changed from its version of the virtual application. After obtaining the changes needed to update its version of the virtual application, the client integrates those changes into its version of the virtual application. | 05-08-2014 |
20140379799 | AUGMENTING CONTENT OBTAINED FROM DIFFERENT CONTENT SOURCES - An online service stores and augments aggregated content that is obtained from different content sources. For example, the content may include electronic messages, calendars, contacts, social network content, feed data, search results, and the like. The online service augments the aggregated content to include additional content. The online service may augment the aggregated content differently based on the type of the content being augmented. For example, electronic messages may be augmented differently as compared to when augmenting calendar events or contact cards. Searches may be made across all or a portion of the different content sources that are aggregated and augmented for a user. For example, a user may view the messages from a particular user regardless of the message provider providing the content to the user. Similarly, a user may perform a general search across each of the different content sources to locate items matching a search query. | 12-25-2014 |
Patent application number | Description | Published |
20130159543 | FAST APPLICATION STREAMING USING ON-DEMAND STAGING - Embodiments are directed to rapidly launching a virtual software application using on-demand file staging, rapidly launching a virtual software application using on-demand registry staging and to rapidly publishing a virtual software application using on-demand staging. In one scenario, a computer system creates a high-level file listing that includes a list of specified high-level data files and directories that are part of a virtual application package. The computer system receives an indication from an application user that the virtual application is to be accessed and dynamically creates sparse data files for those data files that are to be accessed based on the received indication. Then, upon determining that the virtual application is attempting to access the sparse data files, the computer system dynamically streams the data corresponding to the sparse data files on demand from the remote data store. | 06-20-2013 |
20140351301 | FAST APPLICATION STREAMING USING ON-DEMAND STAGING - Embodiments are directed to rapidly launching a virtual software application using on-demand file staging, rapidly launching a virtual software application using on-demand registry staging and to rapidly publishing a virtual software application using on-demand staging. In one scenario, a computer system creates a high-level file listing that includes a list of specified high-level data files and directories that are part of a virtual application package. The computer system receives an indication from an application user that the virtual application is to be accessed and dynamically creates sparse data files for those data files that are to be accessed based on the received indication. Then, upon determining that the virtual application is attempting to access the sparse data files, the computer system dynamically streams the data corresponding to the sparse data files on demand from the remote data store. | 11-27-2014 |
20140373008 | THREAD OPERATION ACROSS VIRTUALIZATION CONTEXTS - Application virtualization at the thread level, rather than at the process level, the operation of a thread across virtualization contexts. For instance, one virtualization context might be a native environment, whereas another virtualization context might be a virtualization environment in which code running inside a virtualization package has access to virtualized computing resources. A thread operating in a first virtualization context then enters an entry point to code associated with a second virtualization context. For instance, a native thread might enter a plug-in operating as part of a virtualized package in a virtualization environment. While the thread is operating on the code, the thread might request access to the second computing resources associated with the second virtualization environment. In response, the thread is associated with the second virtualization context such that the thread has access to the second computing resources associated with the second virtualization context. | 12-18-2014 |
Patent application number | Description | Published |
20090249324 | VIRTUALIZED APPLICATION IMAGE PATCHING - Virtual applications are automatically kept up to date with the current version of a virtual application. Instead of the client having to obtain the entire version of the current virtual application, the client obtains the portions of the current virtual application that are changed from its version of the virtual application. After obtaining the changes needed to update its version of the virtual application, the client integrates those changes into its version of the virtual application. | 10-01-2009 |
20100306270 | GENERATING A LOCAL COPY OF A VIRTUALIZED APPLICATION PACKAGE FROM A LOCAL INSTALLATION - Technologies are described herein for generating a local copy of a virtualized application package from a local installation. An empty copy of the virtualized application package is generated from a skeleton file. The skeleton file contains a hash value computed from each data block in the virtualized application package. The component files of the application are retrieved from a virtual file system representation of the location installation of the application, and each component file is divided into one or more blocks of data. A hash value is computed for each block of data and the skeleton file is searched for a hash value corresponding to a data block of the virtualized application file that matches the hash value computed for each block of data. If a match is found, the block of data is copied to the corresponding data block of the empty copy of the virtualized application package. | 12-02-2010 |
20100312865 | ASYNCHRONOUS UPDATE OF VIRTUALIZED APPLICATIONS - A determination is made as to whether an updated image for an outdated virtualized application is available on a server. If it is determined that the updated image is available, then a background download operation configured to retrieve the updated image from the server is initiated. Another determination is made as to whether the outdated virtualized application is being utilized. After the background download operation is complete, if it is determined that the outdated virtualized application is not being utilized, then the outdated virtualized application is transformed to a current virtualized application by replacing at least a portion of the outdated virtualized application with the updated image. The outdated virtualized application and the current virtualized application are configured to be executed on the computer without installation on a computer. | 12-09-2010 |
20100318987 | BOOTSTRAPPING STREAMED AND VIRTUALIZED APPLICATIONS - Technologies are described herein for bootstrapping streamed and virtualized applications from a network. Bootstrapping features may be deployed entirely over hypertext transfer protocol (HTTP) or other file download, or file transfer, mechanisms. A bootstrap loader, or bootstrapper, may provide the user interface (UI) elements during launch of an application from a network. Prerequisites, system requirements, languages, and localization for the application may be supported. Consistent UI elements may be presented starting with the bootstrapper through to the streaming and initial execution of the application. Consistent UI elements and rapid streamed downloading can provide a user with a boot-like user experience even for an online click-to-run application being streamed from a network. | 12-16-2010 |
20100333085 | Streaming Optimized Virtual Application Images - Embodiments provide an optimized virtual application or suite of virtual applications, but are not so limited. In an embodiment, components of a system are configured to generate an optimized virtual package that can be used in a virtual application streaming environment. Components of the system can provide bits of the optimized virtual package based in part on scenario mappings associated with a user action and/or an application or application feature. In one embodiment, a client virtualization handler can operate to download byte ranges of an optimized virtual package including re-prioritizing byte range download operations as part of streaming virtual application functionality over a computing network. | 12-30-2010 |
20130139151 | Streaming Optimized Virtual Application Images - Embodiments provide an optimized virtual application or suite of virtual applications, but are not so limited. In an embodiment, components of a system are configured to generate an optimized virtual package that can be used in a virtual application streaming environment. Components of the system can provide bits of the optimized virtual package based in part on scenario mappings associated with a user action and/or an application or application feature. In one embodiment, a client virtualization handler can operate to download byte ranges of an optimized virtual package including re-prioritizing byte range download operations as part of streaming virtual application functionality over a computing network. | 05-30-2013 |
20140007081 | Generating a Local Copy of a Virtualized Application Package from a Local Installation | 01-02-2014 |
Patent application number | Description | Published |
20090327221 | CONTEMPORANEOUSLY SHARING RESOURCES TARGETED BY A LIBRARY - Computer-readable media, computer-readable media, computerized methods, and computer systems for acting on properties of multiple resources, which span disparate locations within a network, upon detecting an intuitive user-initiated operation are provided. Initially, a library is provided that includes a framework for contemporaneously accessing a collection of items within a scope thereof. Upon launching the library, representations of the scoped items are surfaced at a UI display. When the user-initiated operation is applied at one of the surfaced representations, properties of each of the scoped items are automatically manipulated. A library-configuration state, which reflects how the items are affected upon manipulating the properties thereof, may be updated upon implementing the manipulation. Accordingly, if the scope of the library is subsequently extended to encompass another item outside the original collection of items, the properties of this new item are automatically manipulated to align with the library-configuration state. | 12-31-2009 |
20110246525 | CONTEMPORANEOUSLY SHARING RESOURCES TARGETED BY A LIBRARY - Computer-readable media, computer-readable media, computerized methods, and computer systems for acting on properties of multiple resources, which span disparate locations within a network, upon detecting an intuitive user-initiated operation are provided. Initially, a library is provided that includes a framework for contemporaneously accessing a collection of items within a scope thereof. Upon launching the library, representations of the scoped items are surfaced at a UI display. When the user-initiated operation is applied at one of the surfaced representations, properties of each of the scoped items are automatically manipulated. A library-configuration state, which reflects how the items are affected upon manipulating the properties thereof, may be updated upon implementing the manipulation. Accordingly, if the scope of the library is subsequently extended to encompass another item outside the original collection of items, the properties of this new item are automatically manipulated to align with the library-configuration state. | 10-06-2011 |
Patent application number | Description | Published |
20120072602 | TRANSPOSE BOX BASED NETWORK SCALING - The deployment and scaling of a network of electronic devices can be improved by utilizing one or more network transpose boxes. Each transpose box can include a number of connectors and a meshing useful for implementing a specific network topology. When connecting devices of different tiers in the network, each device need only be connected to at least one of the connectors on the transpose box. The meshing of the transpose box can cause each device to be connected to any or all of the devices in the other tier as dictated by the network topology. When changing network topologies or scaling the network, additional devices can be added to available connectors on an existing transpose box, or new or additional transpose boxes can be deployed in order to handle the change with minimal cabling effort. | 03-22-2012 |
20120072614 | TRANSPOSE BOXES FOR NETWORK INTERCONNECTION - The deployment and scaling of a network of electronic devices can be improved by utilizing one or more network transpose boxes. Each transpose box can include a number of connectors and a meshing useful for implementing a specific network topology. When connecting devices of different tiers in the network, each device need only be connected to at least one of the connectors on the transpose box. The meshing of the transpose box can cause each device to be connected to any or all of the devices in the other tier as dictated by the network topology. When changing network topologies or scaling the network, additional devices can be added to available connectors on an existing transpose box, or new or additional transpose boxes can be deployed in order to handle the change with minimal cabling effort. | 03-22-2012 |
20120250679 | Network Transpose Box and Switch Operation Based on Backplane Ethernet - The deployment and scaling of a network of electronic devices can be improved by utilizing one or more network transpose boxes. Each transpose box can include a number of connectors and a meshing useful for implementing a specific network topology. When connecting devices of different tiers in the network, each device need only be connected to at least one of the connectors on the transpose box. One or more of the deployed electronic devices (e.g., switches, transpose boxes) in the network can transmit data based on a backplane Ethernet standard, such as 10GBASE-KR, 10GBASE-KX4, or 40GBASE-KR4. | 10-04-2012 |
20140025843 | TRANSPOSE BOX BASED NETWORK SCALING - The deployment and scaling of a network of electronic devices can be improved by utilizing one or more network transpose boxes. Each transpose box can include a number of connectors and a meshing useful for implementing a specific network topology. When connecting devices of different tiers in the network, each device need only be connected to at least one of the connectors on the transpose box. The meshing of the transpose box can cause each device to be connected to any or all of the devices in the other tier as dictated by the network topology. When changing network topologies or scaling the network, additional devices can be added to available connectors on an existing transpose box, or new or additional transpose boxes can be deployed in order to handle the change with minimal cabling effort. | 01-23-2014 |
20150063558 | SYSTEMS AND METHODS FOR ALLOCATION OF TELEPHONY RESOURCES ON-DEMAND - Organizations may employ private computer networks to enable customers to place a telephone call to customer service agents (CSAs). To maintain high customer service, it may desirable to expand the private computer network's ability to respond to customer calls on-demand. One or more requests for additional telephony resources may be submitted to a telephony resource allocation service in communication with a configurable network service. The telephony resource allocation service may determine telephony resources available for allocation to the private computer network and facilitate communication between the configurable network service and the private computer network. In this manner, additional computer private network extensions executing instances of call distribution services may also be generated and configured. Thus, the capacity of the private computer network to respond to customer calls may be expanded, while the additional private network extensions may manage distribution of calls to the CSAs transmitted over the allocated telephony resources. | 03-05-2015 |
20150131654 | METHOD AND SYSTEM FOR ROUTING PACKETS - A system for routing packets that includes leaf network devices, spine network devices, and a border gateway protocol controller to perform a method for routing packets in a network. The method includes receiving packets at a leaf device and, using the destination IP address of the packet to determine to which spine network device the packet is to be sent. The spine network devices each include a non-overlapping portion of a routing table. The spine network devices include functionality to determine a route for the packet based on its destination IP address, to determine to which leaf network device the packet is to be sent, and to send the packet to the discovered leaf network device. The leaf network device that receives the packet includes functionality to, based on the destination MAC address of the packet, determine out of which leaf network device interface to send the packet. | 05-14-2015 |
20150131663 | METHOD AND SYSTEM FOR ROUTING PACKETS - A system for routing packets that includes leaf network devices, spine network devices, and a border gateway protocol controller to perform a method for routing packets in a network. The method includes receiving packets at a leaf device and, using the destination IP address of the packet to determine to which spine network device the packet is to be sent. The spine network devices each include a non-overlapping portion of a routing table. The spine network devices include functionality to determine a route for the packet based on its destination IP address, to determine to which leaf network device the packet is to be sent, and to send the packet to the discovered leaf network device. The leaf network device that receives the packet includes functionality to, based on the destination MAC address of the packet, determine out of which leaf network device interface to send the packet. | 05-14-2015 |