Patent application number | Description | Published |
20150220358 | ARRANGEMENT AND METHOD FOR THE ALLOCATION OF RESOURCES OF A PLURALITY OF COMPUTING DEVICES - An arrangement configured to allocate resources of a host system to one or more virtual machines, the arrangement comprising: an interface configured to receive a first request from a client system for a first amount of a resource of a host system to be allocated to a first virtual machine and to transmit confirmation to the client system of the allocation of the first amount of the resource; and a hypervisor module configured to allocate an amount of the resource of the host system to the first virtual machine, wherein the amount of the resource allocated to the first virtual machine is less than the first amount of the resource, such that at least a part of the first amount of the resource is available for allocation to a second virtual machine. | 08-06-2015 |
20150229583 | ARRANGEMENT CONFIGURED TO ALLOCATE RESOURCES OF A PLURALITY OF DATA STORAGE MEDIA TO A PLURALITY VIRTUAL MACHINES AND ASSOCIATED METHOD - An arrangement configured to allocate resources of a plurality of data storage media to a plurality virtual machines, the arrangement comprising: an interface configured to receive a first data access rate requirement for a first of the plurality of virtual machines and a second data access rate requirement for a second of the plurality of virtual machines; and a hypervisor module configured to compare the first and second data access rate requirements to stored data access rates for a first and a second data storage media associated with the plurality of computing devices, and to allocate resources of at least one of the first and second data storage media to the first and second virtual machines such that the first and second data access requirements are met. | 08-13-2015 |
20150237066 | ARRANGEMENT CONFIGURED TO MIGRATE A VIRTUAL MACHINE IN THE EVENT OF AN ATTACK - An arrangement for use in managing resources of a plurality of computing devices in response to an attack, the arrangement comprising: an interface configured to receive an indication of a parameter associated with a first computing device of the plurality of computing devices; and a migration module configured to migrate a virtual machine, or part of a virtual machine, from the first computing device to a second computing device in response to the indication received by the interface, wherein the parameter includes an indicator of a symptom of an attack against the first computing device or a program operating on the first computing device. | 08-20-2015 |
20150244640 | ARRANGEMENT AND METHOD FOR USE IN MANAGING RESOURCES OF A PLURALITY OF COMPUTING DEVICES - An arrangement for use in managing resources of a plurality of computing devices, the arrangement comprising: an interface configured to receive an indication of a parameter associated with a first computing device of the plurality of computing devices; and a migration module configured to migrate a virtual machine, or part of a virtual machine, from the first computing device to a second computing device in response to the indication received by the interface. | 08-27-2015 |
20150296051 | METHODS, REMOTE ACCESS SYSTEMS, CLIENT COMPUTING DEVICES, AND SERVER DEVICES FOR USE IN REMOTE ACCESS SYSTEMS - A method of managing the execution of a computer program in a remote access system, comprising: connecting a client computing device to a server device; receiving a request from the client computing device to operate a computer program; determining a device on which to execute the computer program; and executing the computer program on the server device or the client computing device according to the determination, the computer program being executable on both the client computing device and the server device respectively. Furthermore: a method for selectively remotely installing programs; a method for remote access and assistance; a method for monitoring a remote user's activity; a method for distributing group policies. | 10-15-2015 |
20150304237 | METHODS AND SYSTEMS FOR MANAGING ACCESS TO A LOCATION INDICATED BY A LINK IN A REMOTE ACCESS SYSTEM - A method of managing access to a location indicated by a link in a remote access system, the method comprising: executing a first computer program using one or more resources of a client computing device or a server device, the execution of the first computer program resulting in the presentation of a link; receiving an instruction to access a storage location indicated by the link; determining whether to access the storage location indicated by the link using one or more resources of the client computing device or the server device based on one or more factors; and accessing the storage location indicated by the link using one or more resources of the client computing device or the server device in accordance with the determination. | 10-22-2015 |
20150304306 | STORAGE SYSTEM AND METHOD OF STORING AND MANAGING DATA - A system for and method of storing data comprising: encoding a file into a plurality of fragments; retrieving storage configuration data from a data management store including data associated with a plurality of remote storage volumes, the storage configuration data comprising an indication of a predefined data transmission size corresponding to each remote storage volume; using the storage configuration data to identify a storage strategy associating each fragment with a remote storage volume, wherein using the storage configuration data includes using the indications of the pre defined data transmission sizes; packaging one or more fragments each associated with a common identified remote storage volume as identified by the storage strategy to form a data bundle; communicating the data bundle to the respective common identified remote storage volume associated with the fragments in the data bundle; and storing the fragments at that identified remote storage volume. | 10-22-2015 |
20150312243 | STORAGE SYSTEM AND METHOD OF STORING AND MANAGING DATA - A system for and method of storing and managing data comprising: encoding a file into a plurality of fragments; retrieving storage configuration data from a data management store; retrieving encryption key data from a keystore; identifying a storage strategy using the storage configuration data, the storage strategy associating each fragment with a remote storage volume; and for each fragment: using the encryption key data to identify an encryption key associated with a remote storage volume identified in the storage strategy; encrypting the fragment using the identified encryption key; communicating the encrypted fragment to the associated remote storage volume as identified by the storage strategy; and storing the encrypted fragment at that identified remote storage volume. | 10-29-2015 |