Patent application number | Description | Published |
20090055658 | Authenticating and Verifying an Authenticable and Verifiable Module - A module-specific public key and cryptographically protected data related to the module-specific public key are extracted from an authenticable and verifiable module. The cryptographically protected data is compared with the module-specific public key to authenticate the authenticable and verifiable module. A value calculated from an image, including a size and location block, included within the authenticable and verifiable module is compared with a value extracted from a digital signature contained in a verification block within the authenticable and verifiable module to verify the authenticable and verifiable module. | 02-26-2009 |
20100115095 | AUTOMATICALLY MANAGING RESOURCES AMONG NODES - A system for managing resources automatically among nodes includes a node controller configured to dynamically manage allocation of node resources to individual workloads, where each of the nodes is contained in one of a plurality of pods. The system also includes a pod controller configured to manage live migration of workloads between nodes within one of the plurality of pods, where the plurality of pods are contained in a pod set. The system further includes a pod set controller configured to manage capacity planning for the pods contained in the pod set. The node controller, the pod controller and the pod set controller are interfaced with each other to enable the controllers to meet common service policies in an automated manner. The node controller, the pod controller and the pod set controller are also interfaced with a common user interface to receive service policy information. | 05-06-2010 |
20120265881 | PROVISIONING DATA CENTER RESOURCES - Example methods, apparatus and articles of manufacture to provision data center resources are disclosed. An example method includes provisioning a first portion of data center resources to operate during time intervals based on a base workload for the respective time intervals, the base workload being based on data patterns of a data center and configuring a second portion of the data center resources to operate when an actual workload exceeds a threshold corresponding to the base workload. | 10-18-2012 |
20130110564 | SPOT PRICING TO REDUCE WORKLOAD IN A DATA CENTER | 05-02-2013 |
20130111494 | MANAGING WORKLOAD AT A DATA CENTER | 05-02-2013 |
20130227317 | POWER MANAGEMENT - A method for power management may include collecting data related to resource utilization and process information from a server. The method may further include using the collected data to generate use and state models respectively based on use and state categories of the server. The method may also include determining a state condition of the server through use of the generated use and state models to manage power utilization of the server. | 08-29-2013 |
20140040474 | MAXIMIZING SERVER UTILIZATION WITHIN A DATACENTER - A method of maximizing server utilization within a datacenter comprising collocating a number of workloads to a subset of a number of physical servers within a datacenter, adjusting access to resources by critical and non-critical workloads, isolating a number of critical workloads that share resources to the subset of resource instances, and controlling resource utilization of the collocated workloads. A system for collocating workloads in a datacenter, the system comprising a number of servers communicatively coupled to each other and a collocation module that receives information from each server and decides whether to leave a workload running on one of any of the servers on that server, or migrate a workload running on one of the number of servers to another server. | 02-06-2014 |
20140040899 | SYSTEMS AND METHODS FOR DISTRIBUTING A WORKLOAD IN A DATA CENTER - A data center workload distribution management system includes a cooling cost engine to determine a cooling cost or cooling capacity for each of a plurality of zones of a data center and a workload distribution engine. The workload distribution engine is to identify the zone that has a lowest cooling cost and sufficient cooling capacity and also has sufficient processing capacity for a workload, determine a local cooling efficiency index for at least one location within the identified zone, and distribute the workload to the location having a local cooling efficiency index that indicates the highest cooling efficiency. | 02-06-2014 |
20140278692 | MANAGING A FACILITY - In a method for managing a facility that is to receive resources from a first resource supply, a supply of resources available from the first resource supply is predicted for a predetermined period of time. In addition, a demand for resources in the facility during the predetermined period of time is predicted. A capacity schedule for the facility is planned to meet a predefined operational goal, in which the plan of the capacity schedule uses as inputs, the predicted supply of resources available from the first resource supply and the predicted demand for resources in the facility during the predetermined period of time. Moreover, a determination as to whether the planned capacity schedule meets the predefined operational goal is made. | 09-18-2014 |
20140282503 | WEIGHT-BASED COLLOCATION MANAGEMENT - According to an example, an application performance measurement for an application for a current time interval, a performance specification for the application, and a resource consumption metric for a resource of a plurality of resources that are to process the application for the current time interval may be accessed. In addition, the application performance measurement, the performance specification, and the resource consumption metric may be used to determine a resource specification for a next time interval for the resource of the plurality of resources. Moreover, the resource specification may be used to determine, by a processor, a resource weight for the resource of the plurality of resources for the next time interval. | 09-18-2014 |
Patent application number | Description | Published |
20150281003 | MOBILE APPLICATION CONTROL - A device user may determine what applications from a set of applications may access the corporate network and which applications do not access the network. An indication of the limits on what a corporate network may access on a user personal device may provided to a user and either accepted or rejected. The user, if the user agreement is accepted, may receive a list of allowed applications and modify the list by removing applications on the list which the user does not want to send data to the corporate network. Both the user and a corporate network administrator may view the user accepted limits and track what user device applications actually have accessed the corporate network to confirm compliance with the limits. | 10-01-2015 |
20150281281 | IDENTIFICATION OF UNAUTHORIZED APPLICATION DATA IN A CORPORATE NETWORK - An appliance works in conjunction with an agent on a remote device to control application access to a corporate network. In conjunction with an SSL tunnel and policy operating at the appliance, granular application control may be implemented. In particular, a device user may determine what applications from a set of applications may access the corporate network and which applications do not access the network. The policies applied to application traffic may be generated by an administrator. Policies may also be applied from a remote server to data stored on the user device. | 10-01-2015 |
20150281282 | APPLICATION SIGNATURE AUTHORIZATION - An appliance works in conjunction with an agent on a remote device to control application access to a corporate network. In conjunction with an SSL tunnel and policy operating at the appliance, granular application control may be implemented. In particular, a device user may determine what applications from a set of applications may access the corporate network and which applications do not access the network. The applications may be analyzed to determine whether the application is good or bad, as what security configurations, approvals and denials are associated with the application. | 10-01-2015 |
Patent application number | Description | Published |
20080234036 | PROVIDING PROGRESSIVE GAMES FOR GAMING ENVIRONMENTS - Techniques for providing progressive games in a gaming environment are disclosed. Progressive configuration data can effectively define one or more progressive games for a gaming environment that includes one or more gaming machines. The progressive gaming data can, for example, be provided as a set of rules (e.g., rules in an XSLT form). A progressive configurator uses the progressive configuration data and gaming data received from the gaming machines in order to effectively implement one or more progressive games. The gaming data can, for example, include information about a gaming machine (e.g., serial number, network, location), one or more games available on the gaming machine (e.g., type of the game, minimum and maximum bet for a game), and data regarding a specific game instance (e.g., amount wagered, outcome of a game instance). In addition, the amount of contribution to a progressive game, whether there is a win, and/or prize to be rewarded can be determined by the progressive configurator and/or a progressive gaming manager. | 09-25-2008 |