Patent application number | Description | Published |
20090113243 | Method, Apparatus and Computer Program Product for Rule-Based Directed Problem Resolution for Servers with Scalable Proactive Monitoring - Method, apparatus and computer program product are configured to perform computer monitoring activities; to collect information regarding computer system status during the computer monitoring activities; to detect a problem in dependence on the information collected during the computer monitoring activities; and to determine whether to launch a diagnostic probe when the problem is detected. The monitoring activities may be performed on a periodic or event-driven basis. The determination whether to launch a diagnostic probe is based on a rule included in a hierarchy of rules. The hierarchy of rules is based on problem tickets; system logs; and computer system configuration information. | 04-30-2009 |
20100082620 | METHOD FOR EXTRACTING SIGNATURE FROM PROBLEM RECORDS THROUGH UNSTRUCTURED AND STRUCTURED TEXT MAPPING, CLASSIFICATION AND RANKING - The structure attributes and unstructured attributes of a ticket are used to generate a problem signature. For structured attributes, correlation between field values is determined and fields with the highest weight are identified. For unstructured attributes, data mining techniques are applied to generate a plurality of keywords with a ranking for each ticket by identifying keywords, and commonly used acronyms and corpus variances. The set of structured attributes and the plurality of keywords from unstructured attributes form the signature of a given problem ticket. | 04-01-2010 |
20110252279 | PROCESSING EXECUTION REQUESTS WITHIN DIFFERENT COMPUTING ENVIRONMENTS - A computerized method, computer system, and a computer program product for processing an execution request within different computing environments. Execution requests and generated reference information are forwarded to the different computing environments, where the requests are processed using the reference information. Results of the processed execution requests are collected from the different computing environments. The results are compared to find any discrepancy, possibly giving indication of a software or hardware error. | 10-13-2011 |
20110307887 | DYNAMIC VIRTUAL MACHINE SHUTDOWN WITHOUT SERVICE INTERRUPTIONS - Techniques for dynamically managing a sleep state of a virtual machine are provided. The techniques include detecting idleness of a virtual machine, putting the idle virtual machine into a sleep state, implementing a virtual machine surrogate, wherein the virtual machine surrogate listens to network traffic, enabling the virtual machine to handle network traffic that is capable of being handled by the virtual machine, and enabling the virtual machine to queue network traffic and wake-up the virtual machine in the sleep state for network traffic that the virtual machine surrogate is incapable of handling. | 12-15-2011 |
20120047492 | DEPLOYMENT OF A TOOL FOR TESTING MIGRATED APPLICATIONS - Configuration information associated with software installed on a production system may be discovered. A script is automatically generated for capturing data traffic from and to the software installed on the production system using the configuration information. The script may be executed to capture data traffic of the software running on the production system. A migrated version of the software may be executed on a test system using requests extracted from the captured data traffic. The responses in the captured data traffic may be compared with responses from the migrated version of the software. | 02-23-2012 |
20120260247 | Fine-Grained Cloud Management Control Using Nested Virtualization - A computer implemented method, a computer program product and a data processing system allocate resources within a computing organization. A hypervisor layer is implemented on an underlying hardware. The hypervisor layer comprises a set of virtual machines. A first pseudo-hypervisor layer is then implemented within a first one of the set of virtual machines of the hypervisor layer. The first pseudo-hypervisor layer comprises a second set of virtual machines. A first software component is located within a first virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. A second software component is collocated within a second virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. | 10-11-2012 |
20130212593 | Controlled Growth in Virtual Disks - A method, an apparatus and an article of manufacture for controlling growth in virtual disk size. The method includes limiting a guest virtual machine file in a hypervisor from allocating a new disk block as allocated space, wherein a virtual disk on a virtual machine is mapped to the guest virtual machine file, and facilitating the virtual disk to reuse a previously allocated and freed disk block for the allocated space to control growth in virtual disk size. | 08-15-2013 |
20130291127 | ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT - Access is obtained to a plurality of intermediately transformed electronic documents (with a plurality of sections and subsections) which have been transformed, by topical analysis and text summarization techniques, from a plurality of original electronic documents comprising at least some unstructured electronic documents. Audit and retrieval agent code is appended to the sections and subsections to create a plurality of finally transformed electronic documents. Users are allowed to access the finally transformed electronic documents. The users are provided with accountability reminders contemporaneous with the access. The access of the users to the sections and subsections of the finally transformed electronic documents is logged. An audit report is provided based on the logging. Also provided is a cloud service for enterprise-level sensitive data protection with variable data granularity, using one or more one guest virtual machine images. | 10-31-2013 |
20140040889 | Facilitating Customer-Initiated Virtual Machine Migration and Swapping - Techniques for facilitating customer-initiated virtual machine (VM) migration and swapping. A method includes obtaining documentation of at least one performance parameter of two or more virtual machines running on two or more physical machines, obtaining a request for a virtual machine exchange from a user of a first virtual machine, wherein the request comprises a preference for at least one desired performance parameter in at least one additional virtual machine, matching the request from the user of the first virtual machine with at least one additional virtual machine that includes the at least one desired performance parameter without assistance from a cloud provider, and exchanging the first virtual machine with a virtual machine from the at least one additional virtual machine that includes the at least one desired performance parameter. | 02-06-2014 |
20140040892 | Facilitating Customer-Initiated Virtual Machine Migration and Swapping - A system and an article of manufacture for facilitating customer-initiated virtual machine (VM) migration and swapping include obtaining documentation of at least one performance parameter of two or more virtual machines running on two or more physical machines, obtaining a request for a virtual machine exchange from a user of a first virtual machine, wherein the request comprises a preference for at least one desired performance parameter in at least one additional virtual machine, matching the request from the user of the first virtual machine with at least one additional virtual machine that includes the at to least one desired performance parameter without assistance from a cloud provider, and exchanging the first virtual machine with a virtual machine from the at least one additional virtual machine that includes the at least one desired performance parameter. | 02-06-2014 |
20140059555 | PROCESSING EXECUTION REQUESTS WITHIN DIFFERENT COMPUTING ENVIRONMENTS - A computerized method, computer system, and computer program product for processing an execution request within different computing environments. Execution requests and generated reference information are forwarded to the different computing environments, where the requests are executing using the reference information. Results of the processed execution requests are collected from the different computing environments. The results are compared to identify whether a discrepancy exists giving indication of a software or hardware error. | 02-27-2014 |
20140172405 | EVALUATING DISTRIBUTED APPLICATION PERFORMANCE IN A NEW ENVIRONMENT - A method for evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine. | 06-19-2014 |
20140172406 | EVALUATING DISTRIBUTED APPLICATION PERFORMANCE IN A NEW ENVIRONMENT - Evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine. | 06-19-2014 |
20160070556 | PATCHING SYSTEMS AND APPLICATIONS IN A VIRTUALIZED ENVIRONMENT - A method for updating an application executing on a virtual machine includes replicating the virtual machine to produce a replica, applying an update to the replica that is scheduled to be made to the virtual machine, in parallel with the applying, updating one of the virtual machine and the replica so that a state of the virtual machine matches a state of the replica, and continuing execution of the application on one of the virtual machine and the replica. | 03-10-2016 |
Patent application number | Description | Published |
20130016583 | Correcting Aliasing of Pulsed Wave Doppler of Diagnostic Ultrasound - Pulsed wave (PW) Doppler has the same emitted and reflected pulse frequency because it emits the next ultrasound pulse after receiving the previously reflected one. But, the forward blood flow will interact with the emitted ultrasound pulse and shorten its time of flight (TOF), which creates a positive TOF shift between the calculated TOF and detected TOF. If the velocity of forward flow is too fast and causes the TOF shift more than half of the calculated TOF, the reflected ultrasound pulses are considered as from the previously emitted pulses with longer TOF, which will show negative TOF shift and be misinterpreted as aliasing. This aliasing TOF shift can be completely rectified to its correct registration no matter how fast the forward flow velocity will be. So, the advantages of TOF shift theory can better quantitatively explain the spectral characteristics of PW Doppler, and more accurately calculate the flow velocity. | 01-17-2013 |
20150103629 | CORRECTION OF DETECTING DEPTH AND CALCULATION OF SPEED OF MOVING OBJECTS BASED ON TIME OF FLIGHT OF ULTRASOUND PULSES - During transmission, speed of ultrasound pulses gradually reduces due to their energy loss from acoustic impedance. So, calculating a detecting depth with fixed speed of the ultrasound pulses will distort ultrasound images. Correction of the detecting depth will rectify a depth registration and improve the imaging quality. The thickness and density of piezoelectric elements (PZT) decide a quantity of the ultrasound pulses, which affect their detecting depth. The density and sound speed in PZT elements decide the frequency of the ultrasound pulses, which can be used to increase the detecting depth for a high frequency ultrasound. Moving objects can change speed of reflected ultrasound pulses, which change their TOF and TOF shift. Therefore the TOF shift can be used to calculate the velocity of the moving objects in a continuous and a pulsed wave and a color ultrasound, and correct aliasing of the pulsed wave and the color ultrasound. | 04-16-2015 |
20150185318 | CALCULATION OF DETECTING DEPTH AND MOVING SPEED OF OBJECTS WITH CODED PULSES BASED ON SPEED CHANGES OF ULTRASOUND/SOUND - During transmission, a speed of ultrasound pulses gradually reduces due to their energy loss from acoustic impedance. A thickness and a density of piezoelectric (PZT) elements and a sound speed in the PZT elements decides energy of the ultrasound pulses and their detecting depth. A speed of moving objects and an angle of the moving objects with the ultrasound pulses may change a speed of reflected ultrasound pulses and affect their time of flight (TOF) and TOF shift. A method of Coding ultrasound pulses combines advantages of a continuous wave ultrasound and a pulsed wave ultrasound. So, it can be used to obtained the TOF and the TOF shift and calculate the depth and the moving speed of the detecting objects, which also avoids a problem of an aliasing for highly moving speed of the objects. | 07-02-2015 |
20150226843 | CALCULATION OF DEPTH AND SPEED OF OBJECTS WITH CODED PULSES BASED ON SPEED CHANGES OF ULTRASOUND/SOUND - During transmission, a speed of ultrasound pulses gradually reduces due to acoustic impedance. A length and a density and a sound speed of the ultrasound pulses decide their average speed in the transmitting medium, frequencies, sound intensity and detecting depth. Time of flight (TOF) and TOF shift can be used to calculate the depth and moving speed of detecting objects. Calculating a speed of moving objects by simultaneously detecting TOFs at one detecting site from two separated piezoelectric (PZT) elements improves the testing results with accuracy, simplification and reproducibility. Coding ultrasound pulses to obtained the TOF and the TOF shift can be used to simultaneously calculate the depth and the moving speed of the objects, which also avoids a problem of an aliasing for highly moving speed of the objects. Coding ultrasound pulses also improves the quality of the imaging. | 08-13-2015 |
20150362590 | CALCULATING VELOCITY OF MOVING OBJECTS WITH TIME OF FLIGHT OF ULTRASOUND PULSES AND RECTIFYING DETECTING DEPTH WITH REDUCED ULTRASOUND SPEED - During transmission the speed of ultrasound pulses gradually reduces due to their energy loss. So, calculating the detecting depth with fixed transmitting speed may distort two dimensional images due to the reduction of pulse speed. Correcting TOF error will rectify the depth registration and improve the quality of images. | 12-17-2015 |
Patent application number | Description | Published |
20130169129 | COMPUTER ENCLOSURE - A computer enclosure includes an enclosure body, a cover panel, and a securing member. The enclosure body comprises a mounting panel. The mounting panel comprises a mounting panel body and a securing tab extending, at an angle, from the mounting panel body, the securing tab defines a securing hole. The cover panel defines an opening. The securing member comprises a securing portion secured to the cover panel, an engaging portion extending from the securing portion, and a handling portion extending from the securing portion. The engaging portion engages with the securing hole. The handling portion is exposed out of the cover panel via the opening. The handling portion is pressed inward via the opening to resist a free end of the securing tab and enable the securing tab to be deformed, thereby driving the securing hole to disengage from the engaging portion. | 07-04-2013 |
20140060107 | VENDING MACHINE WITH TEMPERATURE CONTROL SYSTEM - A temperature control system mounted in the chassis of a vending machine is quickly detachable as a single unit. The chassis comprise a base panel and a mounting panel substantially parallel to the base panel. The temperature control system comprises a bracket, a compressor, a condenser, and an evaporator. The bracket comprises a supporting plate and a pair of mounting plates fixed to the supporting plate. The compressor and the condenser are mounted on the supporting plate. The evaporator is attached to the pair of mounting plates and located above the compressor and the condenser. The pair of mounting plates engages with the pair of first gaps when the temperature control system is mounted in the chassis and the pair of mounting plates is simply disengaged away from the pair of first gaps when the temperature control system needs to be detached from the chassis. | 03-06-2014 |
20140060109 | VENDING MACHINE WITH TEMPERATURE CONTROL MODULE - A vending machine includes a cabinet and a temperature control module. The temperature control module includes an evaporator, a compressor, and a condenser. The cabinet includes a sliding rail. The temperature control module further includes a wheeled bracket. The evaporator, the compressor, and the condenser are secured to the bracket. The components of the temperature control module, as a single unit, can be installed and removed without any dismantling operation being carried out to the frame of the vending machine. | 03-06-2014 |
20140175033 | ELECTRONIC DEVICE RACK - An electronic device rack includes a first support leg, a second support leg substantially parallel to the first support leg, and a mounting member mounted between the first support leg and the second support leg, without the use of screws. The first support leg defines a plurality of latching holes and a plurality of installation holes. The mounting member includes a member body, a first latching tab extending from the member body, and a protrusion extending from the member body. The latching tab is engaged in two adjacent latching holes to prevent the mounting member from moving along a first direction substantially perpendicular to the first support leg. The resilient piece is engaged in one of the plurality of latching holes to prevent the mounting member from moving a third direction opposite to the second direction. | 06-26-2014 |