Patent application number | Description | Published |
20090144420 | Efficient monitoring of heterogeneous applications - A heterogeneous environment having applications and application enablers operating on application servers organized as a cluster is managed. The application servers are managed by a cluster management application. A system management application permits access to computing performance data provided by an operating system and reported to the system management application. Performance data of the applications and application enablers is collected from an application agent through the application servers. Topology information regarding the application servers is collected via the cluster management application. The performance data and the topology information are retrieved and sent to the system management application. Access to the performance data via the system management application is permitted. The system management application links to the computing performance data using the topology information. | 06-04-2009 |
20100017512 | Method and System For Improvements In or Relating to Off-Line Virtual Environments - The compliance of a virtual machine image to a set of requirements is determined during a process to potentially introduce the virtual machine image into a network. One or more virtual machine images are identified. During compliance testing, the identified virtual machine image is controlled such that it cannot connect to the network. One or more tests are carried out to determine if the virtual machine image is compliant with one or more predetermined requirements. If a virtual machine is compliant with said one or more predetermined requirements, the virtual machine image is connected to the network. | 01-21-2010 |
20110093957 | METHOD AND SYSTEM FOR ADMINISTERING A SECURE DATA REPOSITORY - A method, system and computer program product for administering a secure data repository. Rather than using a specific database, an application may use an existing hierarchical file structure, such as provided by conventional operating systems, to store structured data in a number of files. To detect unauthorized, malicious or inadvertent changes to these files, either within one or more files, or by deletion, replacement or movement of files in their entirety, each file incorporates a last change timestamp and the contents of the file are digitally signed. Furthermore, every file in the secure repository is logged in an index file together with its respective change date stamp, and the index file as a whole is also digitally signed. Unauthorized changes can be identified by comparison of the file date stamps with the content of the index as well as verifying the validity of each digital signature. | 04-21-2011 |
20110113402 | REPRESENTING NON-FUNCTIONAL REQUIREMENTS (NFRS) IN UNIFIED MODELING LANGUAGE (UML) - Modeling non-functional requirements (NFRs) in a computer programming environment. In one aspect, this further comprises: identifying use case (UC) artifacts having one or more NFRs; retrieving the one or more NFRs and any data associated therewith; analysing the associated data to define a test case therefor; retrieving a UC realisation from a model to determine one or more possible program flows; and testing each possible program flow to select the test case which verifies the use case required, thereby modeling the NFR. | 05-12-2011 |
20110154329 | METHOD AND SYSTEM FOR OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk. | 06-23-2011 |
20120131578 | Optimization of Virtual Appliance Deployment - In an embodiment for deploying a new virtual appliance ( | 05-24-2012 |
20120159485 | OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk. | 06-21-2012 |
20120216181 | AUTOMATIC UPGRADE OF VIRTUAL APPLIANCES - A software application distributed as a virtual appliance is automatically installed, updated and removed in a virtual machine system running on top of a virtual machine monitor in a computer. The software application virtual appliance comprises a virtual disk, which is automatically detected and installed or removed at the customer by a virtual disk activation manager program, which executes scripts including commands through an API to the virtual machine monitor. The virtual appliance virtual disk is also created automatically by the software manufacturing using the virtual disk activation manager program. The virtual appliance virtual disk stores the binaries of the software application, a software package created by the software manufacturer using a software package tool, an installer to execute the software package, installation and un-installation scripts and a unique identifier which is a signature for the virtual machine virtual disk. | 08-23-2012 |
20120246647 | MANAGING SOFTWARE CONTENT IN VIRTUAL DESKTOP ENVIRONMENTS - Software is managed in a virtual desktop environment by discovering virtual appliances contained in the virtual desktop environment, and for each virtual appliance discovering the virtual machines belonging to the virtual appliance. Software is further managed by discovering the standalone virtual machines comprised in the virtual desktop environment, and for each discovered virtual machine, introspecting each virtual machine to detect non-virtual applications and virtualized applications running in the virtual machine. For each detected application, identification is made of the operating system on which the application is running | 09-27-2012 |
20130014111 | Optimization of Virtual Appliance Deployment - In an embodiment for deploying a new virtual appliance ( | 01-10-2013 |
20130091498 | MAINTENANCE OF VIRTUAL APPLIANCES - Maintenance of a virtual appliance is provided. The virtual appliance comprises a set of software components each one installed on a corresponding virtual machine. A maintenance descriptor is provided comprising an indication of a new level of at least each one of the software components to be updated thereto. For each software component indicated in the maintenance descriptor, a current level is determined of the software component that is installed on the corresponding virtual machine. A set of old ones of the software components to be actually updated is determined according to a comparison between the corresponding current levels and new levels. The virtual appliance is then cloned. The cloned virtual appliance is updated by updating each old software component thereof to the new level. The virtual appliance is now replaced by the updated cloned virtual appliance. | 04-11-2013 |
20130152084 | Controlling Usage of Virtual Disks Before Their Attachment to Virtual Machines - Controlling usage of virtual disks in a data-processing center hosting a set of virtual machines is described where each virtual disk comprises a set of software artifacts. A corresponding method comprises detecting a request of adding a new virtual disk comprising a set of new software artifacts to a selected one of the virtual machines, determining composition information of the new virtual disk, which includes an indication of the new software artifacts, retrieving an indication of usage entitlements of the new software artifacts in the data-processing center, enabling or preventing the attachment of the new virtual disk to the selected virtual machine according to a comparison between the composition information and the usage entitlements, attaching the new virtual disk to the selected virtual machine in response to the enabling thereof, and updating the usage entitlements in response to the attachment of the new virtual disk. | 06-13-2013 |
20130159973 | ACTIVATION LOGIC GENERATION FOR A SOFTWARE APPLIANCE - Embodiments relate to generating an activation logic component for a software appliance. An aspect includes analyzing configuration settings of a software component, the software component being installed in a first system environment. Another aspect includes generating an image-based installation version of the software component for a second system environment, the second system environment being distinct from the first system environment. Yet another aspect includes generating an activation logic component, such that the image-based installation version of the software component and the activation logic component are generated by an activation logic generator. | 06-20-2013 |
Patent application number | Description | Published |
20090288083 | Method and System for Dynamic Virtual Environment Migration - An incompatibility problem during a virtual environment migration from a first host to a second host can be addressed by changing a configuration of the virtual environment and/or by migrating the virtual environment to a host other than the second host. A migration advisor module is configured to take such action automatically upon detection of the incompatibility problem. Alternatively, the migration advisor module may take such action with assistance and/or input from an operator. The migration advisor module can change the configuration of the virtual environment by removing unnecessary components of the virtual environment and causing the reconfigured virtual environment to be migrated to the second host. Alternatively, the migration advisor module can cause the virtual environment to be migrated to a third host with sufficient physical system resources to meet the requirements of the virtual environment. | 11-19-2009 |
20100049559 | METHOD AND SYSTEM FOR FOCUSED AND SCALABLE EVENT ENRICHMENT FOR COMPLEX IMS SERVICE MODELS - A system and method for focused and scalable event enrichment for information management system service models in which a monitoring agent monitors one or more IT components running on one or more end-points. When an event probe is installed, a local metadata cache is primed with metadata stored on a metadata server. After a monitoring agent receives an event from an end-point, the event is enriched with metadata stored in the local metadata cache. The enriched event is then uploaded to an event monitoring server. A business service manager server uses the enriched events stored on the event monitoring server to manage the service model and to quickly determine service status based on service impacting events. | 02-25-2010 |
20100175063 | Detection and Management of Dynamic Migration of Virtual Environments - A mechanism is provided to detect that a dynamic migration of a virtual environment is in progress or has been executed during a hardware or software scan without requiring instrumentation of applications running within the virtual machine. The mechanism relies on a particular sequencing and usage of application programming interfaces and commands that scanning technology provides, associated with the modularity of the scans and on the external virtual machine enabler component running on the host. The mechanism may detect a dynamic migration and take proper actions based on the system configuration. The actions may include discarding the output of the scan executed across a dynamic migration and repeat the scan. The actions may also include notifying the initialization subsystem of the non-migration-safe application to execute a script or program to address migration safety issues. One particular program or script may be an agent ID regeneration program or script. | 07-08-2010 |
20100235520 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - Communication device capabilities may change during an established multimedia session due to connection of a peripheral device. For example, a user listens to an Internet radio service on a mobile phone through a set of headphones. Later, the user connects the mobile phone to stereo system in a car. The mobile phone can leverage the car's stereo system to present higher quality audio than it could present with the headphones. Functionality can be implemented in a communication device to detect connection of a peripheral device and determine multimedia capabilities of the peripheral device. The communication device updates its presence information to indicate the multimedia capabilities of the peripheral device. In response, a multimedia server determines multimedia capabilities indicated in the presence information have changed and optimizes delivery of multimedia content based on the updated multimedia capabilities. | 09-16-2010 |
20110119388 | Optimization of Multimedia Service Over an IMS Network - Predetermined multimedia services are provided to a plurality of users through a IP Multimedia Subsystem (IMS). A request is received at a placement server of a multimedia service by at least one user, and the placement server retrieves on a presence server information about the at least one user. The placement server identifies application servers including a multimedia application capable of providing the requested multimedia service, and the placement server selects an application server that is located a minimum average distance from at least one user. In response to the minimum average distance being greater than a predetermined threshold, a local application server is selected with an average distance from the user that is less than the predetermined threshold. A virtual image of the multimedia application is created on the selected local application server, and a connection is established between the user and the selected local application server. | 05-19-2011 |
20120143988 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - A method includes connecting a communications device to an Internet Multimedia Subsystem network. The method includes transmitting presence information indicating multimedia capabilities of the communications device and requesting multimedia content from a multimedia server to cause the multimedia server to transmit multimedia content. The method includes detecting connection of a peripheral device to the communications device and determining that the multimedia capabilities have increased due to the connection of the peripheral device. The method includes updating the presence information to indicate the increased multimedia capabilities and transmitting the updated presence information to cause the multimedia server to transmit the multimedia content adjusted for the increased multimedia capabilities indicated in the updated presence information. The method includes receiving the multimedia content adjusted for the increased multimedia capabilities and presenting at least some of the adjusted multimedia content on the peripheral device. | 06-07-2012 |
20120174101 | Detection and Management of Dynamic Migration of Virtual Environments - A mechanism is provided to detect that a dynamic migration of a virtual environment is in progress or has been executed during a hardware or software scan without requiring instrumentation of applications running within the virtual machine. The mechanism relies on a particular sequencing and usage of application programming interfaces and commands that scanning technology provides, associated with the modularity of the scans and on the external virtual machine enabler component running on the host. The mechanism may detect a dynamic migration and take proper actions based on the system configuration. The actions may include discarding the output of the scan executed across a dynamic migration and repeat the scan. The actions may also include notifying the initialization subsystem of the non-migration-safe application to execute a script or program to address migration safety issues. One particular program or script may be an agent ID regeneration program or script. | 07-05-2012 |
20130074068 | Method, System, and Computer Program for Implementing a Customizable Virtual Appliance - A method for managing a virtual image in a cloud environment by implementing a customizable virtual image deployment may be provided. The method may comprise generating a virtual image and a set of configuration parameters related to specific parts of the virtual image, and assigning a set of values to the configuration parameters. Furthermore, the method may comprise deploying the virtual image using the set of values assigned to the parameters, such that parts of the virtual image may be deployed as a customized virtual image depending on the set of values of the parameters. | 03-21-2013 |
20130103800 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - A method includes connecting a communications device to an Internet Multimedia Subsystem network. The method includes transmitting presence information indicating multimedia capabilities of the communications device and requesting multimedia content from a multimedia server to cause the multimedia server to transmit multimedia content. The method includes detecting connection of a peripheral device to the communications device and determining that the multimedia capabilities have increased due to the connection of the peripheral device. The method includes updating the presence information to indicate the increased multimedia capabilities and transmitting the updated presence information to cause the multimedia server to transmit the multimedia content adjusted for the increased multimedia capabilities indicated in the updated presence information. The method includes receiving the multimedia content adjusted for the increased multimedia capabilities and presenting at least some of the adjusted multimedia content on the peripheral device. | 04-25-2013 |
20130263113 | Managing Pre-Requisite of a Software Product Virtual Image - A mechanism is provided for managing pre-requisite software components of a software product distributed on a virtual machine. A list of pre-requisite software components for the software product provided in the software product virtual image distribution package of the software product virtual image is read. A test is performed as to whether each pre-requisite software component in the list of prerequisite software components is not installed in the virtual machine. If the prerequisite software component is not installed, the pre-requisite software component is retrieved. License text of the retrieved pre-requisite software component is read and displayed to a user. Upon approval of the license text by the user, the retrieved pre-requisite software component is installed. The process is repeated until all the pre-requisite software components are installed. | 10-03-2013 |
20140143392 | DEPLOYMENT OF SOFTWARE IMAGES WITH RUN-TIME RECONNECTION - A processor-implemented method, system, and/or computer program product deploys software images onto a computing system. A first computing machine is instantiated from a software image onto a computing system. The first computing machine has a first old access identifier, and is initially connected to a second computing machine in the computing system via a second old access identifier for the second computing machine. The second computing machine is reconfigured to have a new access identifier by: retrieving the new access identifier for said second computing machine, and associating the new access identifier with the second old access identifier; and redirecting each outbound communication, from the first old access identifier to the second old access identifier, to the new access identifier of the second computing machine. | 05-22-2014 |
20140143773 | METHOD AND SYSTEM FOR RUNNING A VIRTUAL APPLIANCE - A method, system, and/or computer program product runs a virtual appliance in a distributed computing system. One or more predefined parameters, indicative of respective operating characteristics of the virtual appliance while running, are monitored. Time dependent values of the one or more predefined parameters are collected during the monitoring time period. For each of the one or more predefined parameters, a metric value from the time-dependent values of the parameter is derived. The metric values are evaluated, based on the constraints. In response to a determination that at least one metric value is violating at least part of the constraints, a second set of resources is allocated to the virtual appliance and a second set of virtual machines are determined for deploying the virtual appliance, in order to satisfy the constraints. | 05-22-2014 |
20140208316 | Dynamic Configuration of Virtual Appliances - A solution is proposed for deploying a virtual appliance onto a data processing system. A corresponding method comprises instantiating the virtual appliance with a basic configuration onto the data processing system, determining a value of each one of to set of environmental features of a virtual data processing environment associated with the virtual appliance, and downloading a set of local software programs corresponding to the values of at least part of the environmental features onto the virtual appliance. | 07-24-2014 |
20140325513 | Dynamic Configuration of Virtual Appliances - A solution is proposed for deploying a virtual appliance onto a data processing system. A corresponding, method comprises instantiating the virtual appliance with a basic configuration onto the data processing system, determining a value of each one of a set of environmental features at a virtual data processing environment associated with the virtual appliance, and downloading a set of local software programs corresponding to the values of at least part of the environmental features onto the virtual appliance. | 10-30-2014 |
20150089070 | OPTIMIZATION OF MULTIMEDIA SERVICE OVER AN IMS NETWORK - Predetermined multimedia services are provided to a plurality of users through a IP Multimedia Subsystem (IMS). A request is received at a placement server of a multimedia service by at least one user, and the placement server retrieves on a presence server information about the at least one user. The placement server identifies application servers including a multimedia application capable of providing the requested multimedia service, and the placement server selects an application server that is located a minimum average distance from at least one user. In response to the minimum average distance being greater than a predetermined threshold, a local application server is selected with an average distance from the user that is less than the predetermined threshold. A virtual image of the multimedia application is created on the selected local application server, and a connection is established between the user and the selected local application server. | 03-26-2015 |