Patent application number | Description | Published |
20080201694 | CODE RECOVERY SYSTEM AND METHOD - A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner. | 08-21-2008 |
20080208981 | Providing Information Regarding Mailing List Aliases - A method for providing information regarding mailing list aliases, the method including displaying an email message including at least one mailing list alias, and displaying an email address of a recipient of the email message in association with the mailing list alias. | 08-28-2008 |
20080310605 | CALL CONNECTION SYSTEM & METHOD - A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device. | 12-18-2008 |
20120240110 | OPTIMIZED DEPLOYMENT AND REPLICATION OF VIRTUAL MACHINES - Systems and methods for deploying a virtual machine (VM) on a host are provided. An exemplary method comprises notifying a host to download a master copy of a VM image from a remotely located network storage device, in response to a service provider providing a definition manifest for a service request supported by the VM, wherein the host deploys the VM directly from the VM image downloaded to a storage medium locally connected to the host machine, wherein deployment of the VM allows the host to locally service the service request associated with the definition manifest, wherein the host replicates copies of the VM image, in response to receiving additional service requests to create one or more VM clones; wherein the host customizes the one or more VM clones based on the definition manifest. | 09-20-2012 |
Patent application number | Description | Published |
20140040446 | Remote Provisioning of Virtual Appliances for Access to Virtualized Storage - Systems and methods for remotely provisioning software to process data stored in a virtualized storage environment are provided. In one embodiment, the method comprises receiving a request, at a first location, for processing data using a software application, wherein the data is stored in a virtualized storage space at a second location and the software application is invoked in a virtualized computing environment at a third location; using a service at the first location to remotely invoke one or more instances of the software application over the virtualized computing environment at the third location; and using the service at the first location to remotely manage transfer of data stored in the virtualized storage space at the second location to the third location. | 02-06-2014 |
20150106520 | Efficient Provisioning & Deployment of Virtual Machines - Machines, systems and methods for managing quality of service in a virtualized computing environment, the method comprising: provisioning one or more active virtual machines (VMs) over one or more hosts in a virtualized computing network, wherein one or more resources are allocated to the active VMs before the active VMs service one or more requests; monitoring information associated with quality of service defined for servicing of the requests; and designating at least an active VM as a shadow VMs, in response to results of the monitoring, wherein at least one resource remains allocated to the shadow VM, while the shadow VM enters a dormant state and no longer services any requests. | 04-16-2015 |
20150235049 | Maintaining Data Privacy in a Shared Data Storage System - Machines, systems and methods for sanitizing data are provided. The method comprises determining whether a data request is submitted by an authorized user, in response to receiving the data request, wherein the data request is for accessing first data stored on a data storage system; in response to determining that the data request is submitted by an authorized user, analyzing data access history by the user to the data storage system; in response to determining that the user has previously accessed data on the data storage system that in light of the first data reveal confidential information which the user is not authorized to access, restricting user's access to the confidential information. | 08-20-2015 |