Patent application number | Description | Published |
20120233609 | OPTIMIZING VIRTUAL MACHINE SYNCHRONIZATION FOR APPLICATION SOFTWARE - Real-time application metrics of an application executed by a virtual machine are dynamically monitored by a controlling agent and analyzed to determine an optimal configuration of the virtual machine for executing the application. Based on the measured metrics, tunable parameters of the virtual machine may be adjusted to achieve desired application performance. | 09-13-2012 |
20130191528 | AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment. | 07-25-2013 |
20130191826 | AUTOMATICALLY SELECTING OPTIMAL TRANSPORT PROTOCOL IN A CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an optimal transport protocol in a cloud computing environment. An application creates a socket to communicate with a destination Virtual Machine (VM). The application requests a daemon agent to query a virtual machine manager to determine if the destination VM is on the same hypervisor as the application. The daemon agent receives a VMCI address (“context ID”) and an indication of the hypervisor associated with the destination VM from the virtual machine manager. The daemon agent enables the transport layer to route traffic over the VMCI protocol to the destination VM using its context ID in response to the destination VM being on the same hypervisor as the application. In this manner, the application is able to route traffic using an optimal transport protocol, including VMCI, depending on peer hypervisor association without requiring any code modifications to the application. | 07-25-2013 |
20130227132 | AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment. | 08-29-2013 |
20130247041 | AUTOMATICALLY SELECTING OPTIMAL TRANSPORT PROTOCOL IN A CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an optimal transport protocol in a cloud computing environment. An application creates a socket to communicate with a destination Virtual Machine (VM). The application requests a daemon agent to query a virtual machine manager to determine if the destination VM is on the same hypervisor as the application. The daemon agent receives a VMCI address (“context ID”) and an indication of the hypervisor associated with the destination VM from the virtual machine manager. The daemon agent enables the transport layer to route traffic over the VMCI protocol to the destination VM using its context ID in response to the destination VM being on the same hypervisor as the application. In this manner, the application is able to route traffic using an optimal transport protocol, including VMCI, depending on peer hypervisor association without requiring any code modifications to the application. | 09-19-2013 |
20140052945 | OPTIMIZING STORAGE SYSTEM BEHAVIOR IN VIRTUALIZED CLOUD COMPUTING ENVIRONMENTS BY TAGGING INPUT/OUTPUT OPERATION DATA TO INDICATE STORAGE POLICY - A method, system and computer program product for optimizing storage system behavior in a cloud computing environment. An Input/Output (I/O) operation data is appended with a tag, where the tag indicates a class of data for the I/O operation data. Upon the storage controller reviewing the tag appended to the I/O operation data, the storage controller performs a table look-up for the storage policy associated with the determined class of data. The storage controller applies a map to determine a storage location for the I/O operation data in a drive device, where the map represents a logical volume which indicates a range of block data that is to be excluded for being stored on the drive device and a range of block data that is to be considered for being stored on the drive device. In this manner, granularity of storage policies is provided in a cloud computing environment. | 02-20-2014 |
20140053151 | REDUCING USAGE OF RESOURCE UTILIZED BY A VIRTUAL MACHINE WHOSE RESOURCE UTILIZATION IS ADVERSELY AFFECTING NEIGHBORING VIRTUAL MACHINES - A method, system and computer program product for managing resource utilization of virtual machines in a cloud computing environment. A cloud controller computes an index of the utilization of a resource by a virtual machine to determine its adverse impact on its neighboring virtual machine(s) that share the same resource. If the interference index is greater than a threshold, then the utilization of the resource by that virtual machine will be throttled or reduced provided that the servicing of its workload is not weighted at too high of a priority and that one or more of its neighboring virtual machines are not able to meet their service-level agreement requirements. In this manner, the adversely affected neighboring virtual machines may have its performance restored in meeting their service-level agreement requirements without having to add additional resources and/or be migrated to other areas of the cloud computing environment. | 02-20-2014 |
20140059541 | OPTIMIZING DEPLOYMENT OF VIRTUAL MACHINES BY PRE-GENERATING A VIRTUAL MACHINE'S FIRST-BOOT METADATA BY CLOUD CONTROLLER - A method, system and computer program product for optimizing virtual machine deployment. A cloud controller pre-generates and stores a virtual machine's first-boot metadata (e.g., a RSA key) prior to the deployment of the virtual machine so that the virtual machine does not need to generate such metadata at deployment time thereby reducing the deployment time of the virtual machine. Instead, after the deployment and activation of the virtual machine, an activation agent running on the virtual machine requests the pre-generated first-boot metadata from the cloud controller. The cloud controller retrieves the requested pre-generated first-boot metadata to be transmitted to the requesting virtual machine and implements public-key cryptography so that the requesting virtual machine can verify the authenticity of the transmitted first-boot metadata. By reducing the deployment time for the virtual machine, cloud resources can be used for other activities. | 02-27-2014 |
20140059542 | OPTIMIZING VIRTUAL MACHINE DEPLOYMENT TIME BY TEMPORARILY ALLOCATING MORE PROCESSING RESOURCES DURING THE INITIAL DEPLOYMENT TIME OF THE VIRTUAL MACHINE - A method, system and computer program product for optimizing virtual machine deployment time. A cloud controller receives a request from a user to configure a virtual machine with a designated CPU capacity. If the designated CPU capacity is less than or equal to a threshold, then the cloud controller determines if there are additional cloud resources available to be allocated to deploy the virtual machine. If so, then the cloud controller allocates additional CPU capacity to the designated CPU capacity to be used to provision the virtual machine thereby enabling a multithreaded startup to initialize the operating system and middleware tiers so as to reduce the deployment time of the virtual machine. The additional resources would only be available during the initial deployment time of the virtual machine and removed before the user is granted access to the system when it comes online. | 02-27-2014 |
20140101658 | OPTIMIZING VIRTUAL MACHINE SYNCHRONIZATION FOR APPLICATION SOFTWARE - Real-time application metrics of an application executed by a virtual machine are dynamically monitored by a controlling agent and analyzed to determine an optimal configuration of the virtual machine for executing the application. Based on the measured metrics, tunable parameters of the virtual machine may be adjusted to achieve desired application performance. | 04-10-2014 |
20140142923 | TEXT PREDICTION USING ENVIRONMENT HINTS - Provided are techniques for text prediction using environment hints. A list of words is received, wherein each word in the list of words has an associated weight. For at least one word in the list of words, an environment weight is obtained from an environment dictionary. The associated weight of the at least one word is updated using the obtained environment weight. The words in the list of words are ordered based on the updated, associated weight of each of the words. | 05-22-2014 |
20140142926 | TEXT PREDICTION USING ENVIRONMENT HINTS - Provided are techniques for text prediction using environment hints. A list of words is received, wherein each word in the list of words has an associated weight. For at least one word in the list of words, an environment weight is obtained from an environment dictionary. The associated weight of the at least one word is updated using the obtained environment weight. The words in the list of words are ordered based on the updated, associated weight of each of the words. | 05-22-2014 |
20140149421 | DYNAMICALLY QUANTIFYING THE DEMAND OF EACH SOFTWARE COMPONENT OF EACH SOFTWARE STACK DEPLOYED IN THE CLOUD ENVIRONMENT - A method, system and computer program product for dynamically quantifying a demand for the software components deployed in a cloud environment. An administrative server generates a table mapping the software levels of the software components of the deployed software stacks with the number of instances of the deployed software stacks tracked over a period of time. The depth weight based on subtracting a depth index (zero-based) from a depth size is calculated for each software component, where a depth index refers to the software level of the software component in question and a depth size refers to the number of software levels for the software stack bearing the software component in question. A metric used in quantifying the demand for the software component (“popularity index”) is then determined for each software component based on the number of deployed instances and the depth weight for that software component. | 05-29-2014 |
20140258487 | MINIMIZING WORKLOAD MIGRATIONS DURING CLOUD MAINTENANCE OPERATIONS - A method, system and computer program product for minimizing workload migrations during cloud maintenance operations. Upon receiving an indication that a scheduled maintenance operation is to be performed, a cloud controller uploads the maintenance binaries associated with the scheduled maintenance operation and analyzes the maintenance binaries so as to evaluate the requirements of the maintenance packages and dependencies associated with the scheduled maintenance operation. A matrix is then generated by the cloud controller to identify the classes of hardware that will be disrupted by the scheduled maintenance operation based on the analysis. The workloads running on the classes of hardware identified in the matrix will then be consolidated prior to the scheduled maintenance operation. By consolidating the workloads onto a fewer number of hardware components, a fewer number of workload migrations will need to be performed during the cloud maintenance operation. | 09-11-2014 |
20140258539 | MINIMIZING WORKLOAD MIGRATIONS DURING CLOUD MAINTENANCE OPERATIONS - A method, system and computer program product for minimizing workload migrations during cloud maintenance operations. Upon receiving an indication that a scheduled maintenance operation is to be performed, a cloud controller uploads the maintenance binaries associated with the scheduled maintenance operation and analyzes the maintenance binaries so as to evaluate the requirements of the maintenance packages and dependencies associated with the scheduled maintenance operation. A matrix is then generated by the cloud controller to identify the classes of hardware that will be disrupted by the scheduled maintenance operation based on the analysis. The workloads running on the classes of hardware identified in the matrix will then be consolidated prior to the scheduled maintenance operation. By consolidating the workloads onto a fewer number of hardware components, a fewer number of workload migrations will need to be performed during the cloud maintenance operation. | 09-11-2014 |
20140341446 | UTILIZING A TOUCH SCREEN AS A BIOMETRIC DEVICE - A method, system or computer usable program product for authenticating a fingerprint by aggregating samples on a digital touch screen including capturing multiple data samples of a finger swipe across the touch screen, wherein the touch screen is used both for fingerprint recognition and manipulation of a user interface; utilizing a processor to aggregate the multiple data samples to form a combined sample fingerprint of the finger; and responsive to detecting the combined sample fingerprint matching a predetermined allowed fingerprint, providing a signal indicating the fingerprint is authentic. | 11-20-2014 |
20150016000 | PREVENTING MOISTURE DAMAGE TO A DEVICE - A device including a system for preventing moisture damage to the device includes a processor and a module operable on the processor for monitoring for a predetermined capacitance criterion on a surface of the device. The device is automatically powered off in response to detecting the predetermined capacitance criterion. | 01-15-2015 |
20150016001 | PREVENTING MOISTURE DAMAGE TO A DEVICE - A method, device and computer program product for preventing moisture damage to electronic circuitry of a device may include monitoring for a predetermined capacitance criterion on a surface of the device; and automatically powering off the device in response to detecting the predetermined capacitance criterion. | 01-15-2015 |