Patent application number | Description | Published |
20130095889 | Filtering Mobile Communications Device Messages For Presentation Within An Automobile - Filtering mobile communications device messages for presentation within an automobile, the automobile coupled for data communications to a user's mobile communications device, and: responsive to the user's mobile communications device receiving a message, identifying, by a message display filter, message characteristics of the message; identifying, by the message display filter, environmental characteristics; and administering, by the message display filter, presentation of content of the message within the automobile in dependence upon the message characteristics, the environmental characteristics, and a predefined message filtering ruleset. | 04-18-2013 |
20130282835 | Filtering Message Posts in a Social Network - A social media mechanism processes messages for content that may require filtering of recipients of the message, and informs a user who drafted the message when the message might need to be filtered so it is not sent to all potential recipients of the message. The user may then select to send the message to all potential recipients, or to filter the recipients so the message is sent to less than all of the potential recipients. User profiles are created and maintained, and may include information that helps to determine when filtering of messages is desirable. Feedback buttons are also provided to provide feedback when a user does not like a message. | 10-24-2013 |
20130282841 | FILTERING MESSAGE POSTS IN A SOCIAL NETWORK - A social media mechanism processes messages for content that may require filtering of recipients of the message, and informs a user who drafted the message when the message might need to be filtered so it is not sent to all potential recipients of the message. The user may then select to send the message to all potential recipients, or to filter the recipients so the message is sent to less than all of the potential recipients. User profiles are created and maintained, and may include information that helps to determine when filtering of messages is desirable. Feedback buttons are also provided to provide feedback when a user does not like a message. | 10-24-2013 |
20140164594 | INTELLIGENT PLACEMENT OF VIRTUAL SERVERS WITHIN A VIRTUALIZED COMPUTING ENVIRONMENT - A method for recommending placement of virtual servers within a virtualized environment. The method includes collecting information relating to a plurality of virtual servers and to a plurality of host computing systems, wherein one or more of the plurality of host computing systems hosts at least one of the plurality of virtual servers. The method includes measuring efficiency of at least one of the plurality of virtual servers on a current host computing system within the virtualized environment. The method includes determining the efficiency of the at least one virtual server will be improved with the at least one virtual server on a second host computing system and, in response to determining the efficiency will be improved, recommending placement of the at least one virtual server on the second host computing system. | 06-12-2014 |
20150052520 | METHOD AND APPARATUS FOR VIRTUAL MACHINE TRUST ISOLATION IN A CLOUD ENVIRONMENT - Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service (IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of suspicious activity on a particular virtual machine using node agents embedded in each physical node. The node agents transmit activity data to a security and relocation engine. If a virtual machine's suspicious activity levels exceed defined suspicious activity thresholds, the security and relocation engine assigns that virtual machine to a different zone. The zones may have reduced connectivity and/or service levels. This enables administrators to more efficiently respond to security threats in the cloud environment. | 02-19-2015 |
20150052614 | VIRTUAL MACHINE TRUST ISOLATION IN A CLOUD ENVIRONMENT - Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service (IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of suspicious activity on a particular virtual machine using node agents embedded in each physical node. The node agents transmit activity data to a security and relocation engine. If a virtual machine's suspicious activity levels exceed defined suspicious activity thresholds, the security and relocation engine assigns that virtual machine to a different zone. The zones may have reduced connectivity and/or service levels. This enables administrators to more efficiently respond to security threats in the cloud environment. | 02-19-2015 |
20150066764 | MULTI FACTOR AUTHENTICATION RULE-BASED INTELLIGENT BANK CARDS - System, method, and computer program product to implement four factor authentication rule-based intelligent bank cards, by receiving valid authentication information for a card associated with an account, verifying that a captured image of a person presenting the card matches an image of an authorized user of the account, analyzing the captured image to detect an emotion of the person, and performing a predefined operation to control access to the account upon determining that the detected emotion satisfies an emotion rule associated with the account. | 03-05-2015 |
20150100487 | MULTI FACTOR AUTHENTICATION RULE-BASED INTELLIGENT BANK CARDS - System, method, and computer program product to implement four factor authentication rule-based intelligent bank cards, by receiving valid authentication information for a card associated with an account, verifying that a captured image of a person presenting the card matches an image of an authorized user of the account, analyzing the captured image to detect an emotion of the person, and performing a predefined operation to control access to the account upon determining that the detected emotion satisfies an emotion rule associated with the account. | 04-09-2015 |
20150127830 | MANAGEMENT OF ADDRESSES IN VIRTUAL MACHINES - Methods for managing an address on a switching device, managing an address on a network switch, and screening addresses in a cloud computing environment are provided. One embodiment is directed towards a computer-implemented method for managing an address on a switching device that is communicatively coupled to a plurality of virtual machines. The method includes accessing an address pool that includes an assigned address for each virtual machine from the plurality of virtual machines. The method includes determining, on the switching device, a used address for the virtual machine from the plurality of virtual machines. The method includes determining whether the used address is matching the assigned address for each virtual machine. The method also includes routing traffic from the virtual machine to a hypervisor in response to the used address matching the assigned address. | 05-07-2015 |
20150128245 | MANAGEMENT OF ADDRESSES IN VIRTUAL MACHINES - Methods for managing an address on a switching device, managing an address on a network switch, and screening addresses in a cloud computing environment are provided. One embodiment is directed towards a computer-implemented method for managing an address on a switching device that is communicatively coupled to a plurality of virtual machines. The method includes accessing an address pool that includes an assigned address for each virtual machine from the plurality of virtual machines. The method includes determining, on the switching device, a used address for the virtual machine from the plurality of virtual machines. The method includes determining whether the used address is matching the assigned address for each virtual machine. The method also includes routing traffic from the virtual machine to a hypervisor in response to the used address matching the assigned address. | 05-07-2015 |
20150295789 | MANAGEMENT OF VIRTUAL MACHINE PLACEMENT IN COMPUTING ENVIRONMENTS - A method, a system, and a computer program product for managing the resources of a virtual machine on a physical server are provided. The method includes receiving, at a management application, a request to increase a first virtual resource from an initial level to an increased level for a first virtual machine. The first virtual machine is provided by a first physical server in a computing environment. The method also includes determining whether a free virtual resource for the first physical server is sufficient for the request at the increased level. The method also includes increasing, in response to the free virtual resource being insufficient for the request, the first virtual resource. | 10-15-2015 |
20150295790 | MANAGEMENT OF VIRTUAL MACHINE RESOURCES IN COMPUTING ENVIRONMENTS - Embodiments of the present disclosure call for a method, a system, and a computer program product for managing virtual resources for a virtual machine of interest on a physical server. The method includes monitoring a plurality of physical servers, on a computing system. Each physical server provides an initial level of virtual resources to a plurality of virtual machines. The method also includes receiving a requested level of virtual resources for a virtual machine of interest hosted by a first physical server from the plurality of physical servers. The method also includes determining whether the first physical server is able to host the requested level of virtual resources for the virtual machine of interest. The method also includes determining, in response to the first physical server not being able to host the requested level of resources for the virtual machine of interest, a path. | 10-15-2015 |
20150295791 | MANAGEMENT OF VIRTUAL MACHINE PLACEMENT IN COMPUTING ENVIRONMENTS - A method, a system, and a computer program product for managing the resources of a virtual machine on a physical server are provided. The method includes receiving, at a management application, a request to increase a first virtual resource from an initial level to an increased level for a first virtual machine. The first virtual machine is provided by a first physical server in a computing environment. The method also includes determining whether a free virtual resource for the first physical server is sufficient for the request at the increased level. The method also includes increasing, in response to the free virtual resource being insufficient for the request, the first virtual resource. | 10-15-2015 |
20150295792 | MANAGEMENT OF VIRTUAL MACHINE RESOURCES IN COMPUTING ENVIRONMENTS - Embodiments of the present disclosure call for a method, a system, and a computer program product for managing virtual resources for a virtual machine of interest on a physical server. The method includes monitoring a plurality of physical servers, on a computing system. Each physical server provides an initial level of virtual resources to a plurality of virtual machines. The method also includes receiving a requested level of virtual resources for a virtual machine of interest hosted by a first physical server from the plurality of physical servers. The method also includes determining whether the first physical server is able to host the requested level of virtual resources for the virtual machine of interest. The method also includes determining, in response to the first physical server not being able to host the requested level of resources for the virtual machine of interest, a path. | 10-15-2015 |
20150334039 | BURSTING CLOUD RESOURCES TO AFFECT STATE CHANGE PERFORMANCE - Systems, methods, and computer program products to perform an operation, by, responsive to a request specifying to transition a state of a virtual machine in a cloud computing environment from a first state to a second state, allocating one or more system resources to the virtual machine during the transition from the first state to the second state, and, upon completion of the transition, releasing a portion of the allocated one or more system resources to a pool of available resources, so that the virtual machine is left with a remaining portion of the allocated one or more resources sufficient for operation during the second state. | 11-19-2015 |
20150334040 | BURSTING CLOUD RESOURCES TO AFFECT STATE CHANGE PERFORMANCE - Method to perform an operation, by, responsive to a request specifying to transition a state of a virtual machine in a cloud computing environment from a first state to a second state, allocating one or more system resources to the virtual machine during the transition from the first state to the second state, and, upon completion of the transition, releasing a portion of the allocated one or more system resources to a pool of available resources, so that the virtual machine is left with a remaining portion of the allocated one or more resources sufficient for operation during the second state. | 11-19-2015 |