Patent application number | Description | Published |
20090144545 | COMPUTER SYSTEM SECURITY USING FILE SYSTEM ACCESS PATTERN HEURISTICS - A system for computer system security using file system access pattern heuristics is provided. The system includes access patterns to establish nominal read and write frequencies to a file system using heuristics, dynamic policies, and a policy manager. The policy manager monitors accesses to the file system to determine read and write access frequencies to the file system. The policy manager also compares the read and write access frequencies to the access patterns, and determines whether the read and write access frequencies exceed the access patterns per the dynamic policies. The policy manager further identifies an attack on the file system in response to exceeding the dynamic policies, where the identified attack is associated with a communication path to the file system. The policy manager additionally modifies an aspect of access via the communication path in accordance with the attack response in the dynamic policies to mitigate the attack. | 06-04-2009 |
20090177854 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PREEMPTIVE PAGE EVICTION - A method, system, and computer program product for preemptive page eviction in a computer system are provided. The method includes identifying a region in an input file for preemptive page eviction, where the identified region is infrequently accessed relative to other regions of the input file. The method also includes generating an output file from the input file, where the identified region is flagged as a page for preemptive page eviction in the output file. The method further includes loading the output file to a memory hierarchy including a faster level of memory and a slower level of memory, wherein the flagged page is preemptively written to the slower level of memory. | 07-09-2009 |
20090271841 | METHODS, HARDWARE PRODUCTS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING ZERO-TRUST POLICY IN STORAGE REPORTS - A zero-trust policy is implemented in storage reports to provide a preventative measure against potential attack vectors. Introspection of a guest memory having a guest memory layout is performed. An operating system (OS) memory map is accepted. The guest memory layout is compared with the OS memory map. When the guest memory layout matches the OS memory map, the OS memory map is used to obtain one or more interested memory segments, and data processing is performed. | 10-29-2009 |
20090282481 | METHODS, HARDWARE PRODUCTS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING INTROSPECTION DATA COMPARISON UTILIZING HYPERVISOR GUEST INTROSPECTION DATA - Introspection data comparison is implemented utilizing hypervisor guest introspection data. A hypervisor shim on a hypervisor is used to construct one or more workload management components that are independent from a participating pool member of a pool comprising a guest having a guest memory and a guest operating system. The hypervisor collects a first set of data. The guest sends a second set of data comprising guest memory data from the guest memory. The first set of data is compared with the second set of data to detect at least one of a potential security intrusion or an anomalous deviation between the first set of data and the second set of data. A policy manager takes action based upon a result of the comparison of the first and second sets of data. | 11-12-2009 |
20100017800 | METHOD, COMPUTER PROGRAM PRODUCT, AND HARDWARE PRODUCT FOR SUPPORTING VIRTUAL MACHINE GUEST MIGRATION OVERCOMMIT - Virtual machine guest migration overcommit is supported by providing a virtual machine with an unschedulable resource that is not available for system scheduling. The unschedulable resource may, but need not, be provided in the form of a memory buffer, or one or more network resources, or one or more resources that are accessible from a network. The unschedulable resource is utilized in one or more domains to temporarily conceal one or more user environments that do not fit into a set of currently available resources, such that the one or more temporarily concealed user environments are not terminated or paged out. | 01-21-2010 |
20100023944 | Suspend Profiles and Hinted Suspending - Methods, systems and computer program products for suspend profiles and hinted suspending. Exemplary embodiments include a suspend mode management method, including determining a task to perform in the computer system during a suspend period of the computer system, detecting a suspend event in the computer system, the suspend event initiating the suspend period and performing the task during the suspend period. | 01-28-2010 |
20100080376 | SYSTEM AND METHOD FOR ROUTING CALLS - A method and system of routing telephone calls from a calling party to a called party including placing a call to a called party, accessing context information associated with the called party, permitting the calling party to opt to continue with the call or terminate the call based on the accessed context information, wherein continuing with the call comprises connecting the call to the called party or selecting a redirection option with the call. | 04-01-2010 |
20100229167 | TESTING OPERATING SYSTEM ISOLATION USING ERROR INJECTION - A continuously operating system is provided and includes a processor and a computer readable medium to which the processor is operatively coupled, the computer readable medium having executable instructions stored thereon which, when executed, cause the processor to continuously load an operating system and to simultaneously operate as at least first and second mechanisms. The first mechanism loads a new module, which is a new version of an in-memory module of the operating system, into the operating system, and the second mechanism isolates and interrupts current access to the in-memory module such that subsequent access is to the new module. | 09-09-2010 |
20100262966 | MULTIPROCESSOR COMPUTING DEVICE - A computing device includes a first processor configured to operate at a first speed and consume a first amount power and a second processor configured to operate at a second speed and consume a second amount of power. The first speed is greater than the second speed and the first amount of power is greater than the second amount of power. The computing device also includes a scheduler configured to assign processes to the first processor only if the processes utilize their entire timeslice. | 10-14-2010 |
20110119427 | SYMMETRIC LIVE MIGRATION OF VIRTUAL MACHINES - A first least recently used map is generated for a set of memory pages of a first virtual machine. The first least recently used map includes metadata including memory page physical address location information. A first of the memory pages of the first virtual machine and the metadata for the first memory page is sent from the first virtual machine to a second virtual machine while the first virtual machine is executing. A first memory page and meta data associated therewith of the second virtual machine is received from the second virtual machine at the first virtual machine. The memory pages of the first virtual machine are ordered from a first location of the first least recently used map to a last location of the first least recently used map based on how recently each of the memory pages of the first virtual machine has been used. | 05-19-2011 |
20110143581 | INTELLIGENT ELECTRICAL CONNECTOR SYSTEM - An intelligent electrical connector system may include an electrical connector, and a transceiver carried by the electrical connector. The system may also include a second electrical connector, and a second transceiver carried by the second electrical connector. The second transceiver may relay interface information to the transceiver regarding the second electrical connector's parameters. | 06-16-2011 |
20120117546 | Run-time Module Interdependency Verification - A method for determining intermodule dependency in software having a plurality of modules, at least a portion of the modules, executing calls to other modules, comprising loading the software modules into a memory, preferably in a contiguous extent, with the modules being logically separated; executing instructions of the software step-by-step with threading disabled; determining whether when an instruction is executed, a module other than the current modules is being called; and if a module other than the current module is being called, storing data sufficient to identify the calling instruction, the calling module, the called instruction and the called module. A computer readable medium, to which a processor of a system is operatively coupled, having executable instructions stored thereon for executing the method on a computer. A computer programmed to execute the method. | 05-10-2012 |
20120221338 | AUTOMATICALLY GENERATING AUDIBLE REPRESENTATIONS OF DATA CONTENT BASED ON USER PREFERENCES - A custom-content audible representation of selected data content is automatically created for a user. The content is based on content preferences of the user (e.g., one or more web browsing histories). The content is aggregated, converted using text-to-speech technology, and adapted to fit in a desired length selected for the personalized audible representation. The length of the audible representation may be custom for the user, and may be determined based on the amount of time the user is typically traveling. | 08-30-2012 |
20120272077 | GPS INPUT FOR POWER CONSUMPTION POLICY - A portable computing device is provided. The portable computing device includes a power source for providing a power supply in accordance with a power consumption policy, a processing unit operably coupled to the power source and a storage unit. The storage unit is operably coupled to the power source and the processing unit and configured to cause the processing unit to access geo-location data and to adjust the power consumption policy based on the geo-location data. | 10-25-2012 |
20130060988 | METHOD FOR SYMMETRIC LIVE MIGRATION OF VIRTUAL MACHINES - A method is provided for symmetric live migration of virtual machines. According to the method, a first least recently used map is generated for a set of memory pages of a first virtual machine. The first least recently used map includes metadata including memory page physical address location information. A first memory page of the first virtual machine and the metadata for the first memory page is sent from the first virtual machine to a second virtual machine while the first virtual machine is executing. A first memory page and meta data associated therewith of the second virtual machine is received from the second virtual machine. The memory pages of the first virtual machine are ordered from a first location of the first least recently used map to a last location of the first least recently used map based on how recently each of the memory pages of the first virtual machine has been used. | 03-07-2013 |
20130104227 | ADVANCED AUTHENTICATION TECHNOLOGY FOR COMPUTING DEVICES - Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern. | 04-25-2013 |
20140366028 | USER DATAGRAM PROTOCOL (UDP) PACKET MIGRATION IN A VIRTUAL MACHINE (VM) MIGRATION - Embodiments of the invention relate to receiving, by a first processor comprising a processing device, an indication that a migration of a virtual machine from the first processor to a second processor is to occur. The first processor transmits user datagram protocol (UDP) packets intended for the virtual machine to the second processor based on the indication. A signal is transmitted to the virtual machine to enter an offline state, wherein the offline states comprises a transfer of at least one of a central processing unit (CPU) state and a memory state, and wherein the virtual machine is configured to halt a processing of the UDP packets in response to receiving the signal. The virtual machine is reactivated once the migration of the virtual machine from the first processor to the second processor is complete. The virtual machine is instructed to resume the processing of the UDP packets. | 12-11-2014 |
20140366029 | USER DATAGRAM PROTOCOL (UDP) PACKET MIGRATION IN A VIRTUAL MACHINE (VM) MIGRATION - Embodiments of the invention relate to receiving, by a first processor comprising a processing device, an indication that a migration of a virtual machine from the first processor to a second processor is to occur. The first processor transmits user datagram protocol (UDP) packets intended for the virtual machine to the second processor based on the indication. A signal is transmitted to the virtual machine to enter an offline state, wherein the offline states comprises a transfer of at least one of a central processing unit (CPU) state and a memory state, and wherein the virtual machine is configured to halt a processing of the UDP packets in response to receiving the signal. The virtual machine is reactivated once the migration of the virtual machine from the first processor to the second processor is complete. The virtual machine is instructed to resume the processing of the UDP packets. | 12-11-2014 |