Patent application number | Description | Published |
20080215558 | SYSTEM FOR MANAGING CONFIGURATION CHANGES IN A DATA PROCESSING SYSTEM - A method of managing configuration changes in a data processing system, particularly a network wherein software products ( | 09-04-2008 |
20080229253 | Method, System and Computer Program for Navigating UML Diagrams - A solution for navigating UML diagrams ( | 09-18-2008 |
20090089761 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR DEBUGGING SOFTWARE APPLICATIONS IN A WEB ENVIRONMENT - A method and system are provided for debugging a software application in a data processing system that includes a server entity and client entities. For at least one of the client entities, a server component of the application running on the server entity is accessed, and a client component of the application is downloaded from the server entity. The client component is executed. Client log information relating to the execution of the client component is saved by invoking a log function provided by the client component; the client log information is saved into a non-persistent memory structure of the client component. The client log information is transmitted for use in the debugging of the application. | 04-02-2009 |
20090319317 | Or Relating To A Method and System for Testing - A method of evaluating a cost associated with a test scenario, which test scenario comprises one or more branches making up a use case, the method comprising the steps of: determining a first parameter based on the complexity of the use case; determining a second parameter which indicates the criticality of the use case; determining a third parameter which indicates an execution cost of each action and decision point of the use case; determining a fourth parameter which indicates the priority of each branch of the use case; determining a fifth parameter which indicates the classification of each test parameter for each branch of the use case; determining a cost associated with the test scenario, based on a predetermined calculation using two or more of the first, second, third, fourth and fifth parameters. | 12-24-2009 |
20110264776 | DEPLOYING AN OPERATING SYSTEM - A method for deploying an operating system onto a client system includes, with the client system, receiving a bootloader image from an external device in response to a request for the bootloader image and installing the bootloader. The installed bootloader is configured to provide a streaming function from the client system to both a client repository of the client system and a remote data repository and selectively redirect requests for a block of data to one of: the client repository and the remote data repository. The method further includes, with the client system, during operation of a function of the operating system, making a request for a data block of the operating system, the data block including the function, and receiving the data block from one of: the client repository and the remote repository based on availability information. | 10-27-2011 |
20120151201 | MANAGEMENT OF MULTIPLE SOFTWARE IMAGES WITH RELOCATION OF BOOT BLOCKS - A method, system and computer program product for managing multiple software images in a data processing entity. At least part of the memory blocks of each of the software images is stored into a corresponding image portion of a mass memory. A current software image stored in a current image is selected. The memory blocks stored in boot locations of the current software image are relocated to a relocation portion of the mass memory. The boot blocks of the current software image are copied into the corresponding boot location. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations and each request to access a selected memory block of the current software image by the access function is served. | 06-14-2012 |
20120151202 | MANAGEMENT OF MULTIPLE SOFTWARE IMAGES WITH SHARED MEMORY BLOCKS - A data processing entity that includes a mass memory with a plurality of memory locations for storing memory blocks. Each of a plurality of software images includes a plurality of memory blocks with corresponding image addresses within the software image. The memory blocks of software images stored in boot locations of a current software image are relocated. The boot blocks of the current software image are stored into the corresponding boot locations. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations, thereby loading the access function. Each request to access a selected memory block of the current software image is served by the access function, with the access function accessing the selected memory block in the associated memory location provided by the control structure. | 06-14-2012 |
20120185427 | SYSTEM AND METHOD FOR CAPTURING AN IMAGE OF A SOFTWARE ENVIRONMENT - A method and system for optimally capturing an image on a physical or virtual environment and transferring it to a target system, by leveraging the capabilities of the operating system residing on the source system to manipulate the file system of the source storage device, and by presenting the target data storage as a local simulated disk to the source environment. | 07-19-2012 |
20130232329 | Encrypting And Decrypting A Virtual Disc - A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key. | 09-05-2013 |
20130247020 | UPGRADE OF SOFTWARE IMAGES BASED ON STREAMING TECHNIQUE - Releasing a portion of mass memory, relocating memory blocks stored in boot locations of the target software image to the released portion, storing the boot blocks into corresponding boot locations, booting the data-processing entity from the boot blocks in the corresponding boot locations thereby loading a streaming function, and serving each request of reading a selected memory block of the target software image by the streaming function, the streaming function downloading the selected memory block from the external source and storing the selected memory block into the released portion when the selected memory block is not available in the mass memory, or retrieving the selected memory block from the mass memory otherwise. | 09-19-2013 |
20140089652 | CUSTOMIZING PROGRAM LOGIC FOR BOOTING A SYSTEM - A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The system is connected to one or more target systems via a network, the server system being adapted for: receiving a first list of device identifiers from one of the target systems; automatically selecting, for each of the device identifiers in the received first list, at least one driver operable to control the identified device from a set of drivers, thereby generating a sub-set of said set of drivers; providing a core program logic to the target system; and providing the sub-set of drivers to the target system, wherein a combination of the sub-set of drivers and the core program logic constitutes a customized program logic operable to control the devices of said target system. | 03-27-2014 |
20140095858 | CUSTOMIZING PROGRAM LOGIC FOR BOOTING A SYSTEM - A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The method includes determining the hardware devices operatively connected with the target system; sending a first list of identifiers of the determined hardware devices to a server system; receiving the first list of device identifiers; automatically selecting at least one driver operable to control the identified device, thereby generating a sub-set of said set of drivers; and complementing a core program logic with said driver sub-set to generate the customized program logic. | 04-03-2014 |
20140380035 | ENCRYPTING AND DECRYPTING A VIRTUAL DISC - A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key. | 12-25-2014 |
Patent application number | Description | Published |
20080228902 | Configuring processing entities according to their roles in a data processing system with a distributed architecture - A mechanism is provided for configuring different computers of a network. Each computer plays a specific physic role (defined by an architecture of the network) and/or a specific logic role (defined by the applications running in the network). A reference model and a transition table are associated with each product to be installed in the network; the reference model specifies a target configuration for each role (defined by the components of the product to be installed), while the transition table specifies the actions required to reach each target configuration from each current configuration of the computers. A server identifies the role and the current configuration of each computer; the actions required to enforce the desired target configuration on the computer are then established and executed. | 09-18-2008 |
20090158268 | Software Distribution Method and System - A software distribution method ( | 06-18-2009 |
20090187523 | Adaptive method and system with automatic scanner installation - A self-adaptive resource management method ( | 07-23-2009 |
20120042195 | MANAGING OPERATING SYSTEM DEPLOYMENT FAILURE - A method for managing operating system deployment failure includes, with an operating system deployment server, running an operating system deployment process that comprises running a progressive hardware discovery process of a target machine to which an operating system is deployed, the discovery process to capture inventory information related to the target machine, monitoring the operating system deployment to detect failure in a pre-operating system environment running on the target machine for a predefined period of time, and executing a remediation action in response to generation of a failure code during the period of time, the remediation action related to a Basic Input Output System (BIOS) of the target machine. | 02-16-2012 |
20130151805 | REORGANIZATION OF SOFTWARE IMAGES BASED ON PREDICTED USE THEREOF - A solution for managing a software image being stored in a plurality of physical blocks of a storage system comprises monitoring each access to the physical blocks, calculating a predicted sequence of access to the physical blocks according to the monitored accesses, and reorganizing the physical blocks according to the predicted sequence. The monitoring may be performed as the physical blocks are accessed during the booting of virtual images on the software image. | 06-13-2013 |
20130151834 | Deployment of a Software Image on Multiple Targets with Streaming Technique - Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver. | 06-13-2013 |
20130151835 | Deployment of a Software Image on Multiple Targets with Streaming Technique - Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver. | 06-13-2013 |
20140143392 | DEPLOYMENT OF SOFTWARE IMAGES WITH RUN-TIME RECONNECTION - A processor-implemented method, system, and/or computer program product deploys software images onto a computing system. A first computing machine is instantiated from a software image onto a computing system. The first computing machine has a first old access identifier, and is initially connected to a second computing machine in the computing system via a second old access identifier for the second computing machine. The second computing machine is reconfigured to have a new access identifier by: retrieving the new access identifier for said second computing machine, and associating the new access identifier with the second old access identifier; and redirecting each outbound communication, from the first old access identifier to the second old access identifier, to the new access identifier of the second computing machine. | 05-22-2014 |
20150052508 | UPGRADE OF SOFTWARE IMAGES BASED ON STREAMING TECHNIQUE - Releasing a portion of mass memory, relocating memory blocks stored in boot locations of the target software image to the released portion, storing the boot blocks into corresponding boot locations, booting the data-processing entity from the boot blocks in the corresponding boot locations thereby loading a streaming function, and serving each request of reading a selected memory block of the target software image by the streaming function, the streaming function downloading the selected memory block from the external source and storing the selected memory block into the released portion when the selected memory block is not available in the mass memory, or retrieving the selected memory block from the mass memory otherwise. | 02-19-2015 |
Patent application number | Description | Published |
20130007265 | MONITORING RESOURCES IN A CLOUD-COMPUTING ENVIRONMENT - Provided are a computer program product, system, and method for monitoring resources in a cloud computing environment. A set of cloud resources is provisioned to a user of the cloud-computing environment. A set of private resources is provided for the user, each private resource being provisioned within the set of cloud resources of the user. Monitoring templates are exposed, each one for a corresponding type of a private resource to the user. A user subscription is received to at least one of the monitoring templates, wherein each of the subscribed monitoring templates is for one of the user private resources. A private monitoring agent is provided within the cloud resources of the user housing the private resource of the user to monitor the private resource according to the corresponding selected monitoring template. | 01-03-2013 |
20130007727 | REACTIVATION OF A SOFTWARE IMAGE FROM A SOURCE MACHINE ONTO A TARGET MACHINE - Provided are a computer program product, system and method for reactivation of a software image from a source machine onto a target machine. Discovery is made of a static software application in the software image listening on a corresponding selected communication channel of the source address. Listening is performed on behalf of the static software application on the corresponding selected communication channel of the target address. An inbound message directed to the selected communication channel of the target address is redirected to the corresponding static software application on the selected communication channel of the source address. | 01-03-2013 |
20130219161 | Direct Migration of Software Images with Streaming Technique - A mechanism is provided for migrating a software image installed on a source data-processing entity to a target data-processing entity. The target data-processing entity is booted from a preliminary bootstrap program. The software image is mounted as a remote mass memory on the target data-processing entity. A primary bootstrap program of the software image is copied onto a local mass memory of the target data-processing entity. The target data-processing entity is re-booted from the primary bootstrap program thereby loading a streaming function, and serving each request of accessing a memory block on the target data-processing entity by the streaming function. In response to the memory block missing from the local mass storage, the streaming function downloads the memory block from the software image and stores the memory block into the local mass memory. Otherwise, the streaming function retrieves the memory block from the local mass memory otherwise. | 08-22-2013 |
20130318102 | Data Handling in a Cloud Computing Environment - The present invention relates to a method for data handling in a computing environment. A data access request is generated to access data by a requesting VM. VMs of an ordered list are sequentially checked for data cache hit corresponding to the data in an order given by a ranking. The data is read from the checked VM in response to at least one data cache hit of a checked VM being found, and thereafter a ranking value of the checked VM is updated, thereby updating ranking based on the ranking value. The data is requested from the at least one storage server in response to no data cache hot being found. | 11-28-2013 |
20140089393 | Near Live-Migration of Operating System and Application - A method for live-migration of an operating system and an application is provided. The operating system runs on a first computer. The application may run on the operating system. The live-migration may be performed to a second computer while the application showing no externally detectable downtime during live-migration of the application. The method may comprise operating a tracking tool that may track and store data modifications to a disk-system of the computer in a tracking file, triggering a shutdown of the first computer while the tracking tool continues to operate in tracking mode and shut down the first computer completely. Then restarting the first computer and sending the data modifications stored prior to the complete shutdown of the first computer to the second computer, which then may be started based on the sent data, followed by starting the application such that from an external perspective no application disruption is detectable. | 03-27-2014 |
20140325514 | Maintenance of Offline Virtual Machines Based on a Maintenance Register - A solution is proposed for maintaining virtual machines being available in a data-processing system. A mechanism determines a list of software components installed on each virtual machine, retrieves a set of maintenance policies for each software component, each maintenance policy being indicative of a patch to be applied to the corresponding software component. The mechanism determines a set of old virtual machines having at least one old software component thereof requiring the application of at least a new one of the corresponding patches according to a comparison among the maintenance policies and a maintenance register indicative of a current state of the software components of the virtual machines. The mechanism applies the corresponding at least one new patch to each old software component of each old virtual machine and updates the maintenance register according to the application of said at least one new patch to each old software component of each old virtual machine. | 10-30-2014 |
20140359617 | Patching a Virtual Image - A mechanism for patching a virtual image modifies a selected dormant virtual image to be patched by injecting a corresponding patch logic and patch material to be applied on next boot during an off-line preparation phase. The mechanism downloads a boot medium and creates a temporary disk for a selected target virtual machine with corresponding deployment data The mechanism changes a master boot record of said temporary disk associated with the target virtual machine to boot next on the boot medium. The mechanism executes the patch logic to install the patch material in case the target virtual machine associated with the virtual image to be patched is booted. | 12-04-2014 |
20140359618 | Creating a Virtual Appliance - A mechanism is provided for creating a virtual appliance. The mechanism receives input of an unmodified virtual appliance and a list of target models. The mechanism creates a modified virtual appliance with an ISO file, a conversion tool, and a list of validated target models based on the input. The modified virtual appliance is configured to boot on the ISO file containing a mini operating system working on all validated target models. Responsive to a deployment of the modified virtual appliance being triggered on a target model, the mini operating system is booted on the corresponding target model. The mini operating system determines the model of the current target model on which the mini operating system is running, and responsive to determining the current target model is a validated target model, applies modifications to an operating system of the virtual appliance in accordance with current target model to form a portable virtual appliance running on target model. | 12-04-2014 |