G06F9/45504

Application-level runtime environment for executing applications native to mobile devices without full installation

System and method for processing applications, interfacing between the applications and operating systems, executing an application without full installation, and extracting graphical user interface (GUI) contents of the application to make the GUI contents indexed and searchable. The system includes a computer system to execute the applications in a progressive, installation-free, and/or searchable manner.

Memory block defect detection and management
11625298 · 2023-04-11 · ·

An apparatus includes a memory sub-system comprising a plurality of memory blocks and a memory block defect detection component. The memory block defect detection component is to set, for a memory block among the plurality of memory blocks, a first block defect detection rate and determine whether the first block defect detection rate is greater than a threshold block defect detection rate for the at least one memory block. In response to a determination that the first block defect detection rate is greater than the threshold block defect detection rate for the memory block, the memory block defect detection component is to assert a program command on the memory block determine whether a program operation associated with assertion of the program command on the at least one memory block is successful. In response to a determination the program operation is unsuccessful, the memory block defect detection component is to determine that a failure involving a plane associated with the memory block and another plane of the memory sub-system has occurred.

METHODS AND SYSTEMS FOR EMULATING APPLICATION-SPECIFIC WORKSTATIONS ON PERSONAL COMPUTERS
20230103860 · 2023-04-06 ·

Provided are methods and systems which transform a general purpose computer into a secure and dedicated remote work station by enabling the computer to be booted using an operating system stored on a connected portable storage device and by executing the operating system from volatile memory in a secure and efficient manner.

Qualifying a device driver for a device
11620144 · 2023-04-04 · ·

A method, a computer program containing instructions, and an apparatus for qualifying a device driver for a device. After a test environment is initiated, a test on the device driver is performed. This involves a device emulator emulating a behavior of the device under stipulated conditions. During the test, the device emulator performs an error injection or a test on at least one rarely occurring case.

Method for managing hardware resource, method for querying location of hardware resource, and related apparatus

The present embodiments provide a method for managing a hardware resource, a method for querying a location of a hardware resource, and a related apparatus. The method for managing a hardware resource includes receiving, by a virtualized infrastructure manager (VIM), a hardware resource allocation request message sent by a VNF management entity, where the hardware resource allocation request message is used to request the VIM to allocate a hardware resource to a virtual machine that runs a VNFC, and the hardware resource allocation request message includes location information of the hardware resource that the virtual machine requests to allocate. The method also includes allocating, by the VIM, the hardware resource at a corresponding location to the virtual machine according to the location information of the hardware resource.

Dynamically-imposed field and method type restrictions for managed execution environments

A data structure (e.g., field, method parameter, or method return value) is defined by a descriptor to be of a particular type, which imposes a first set of restrictions on values assumable by the data structure. Separately, the data structure is associated with a type restriction that defines a second set of restrictions that further restricts the values assumable by the data structure. The descriptor and type restriction are encoded separately in a program binary. Responsive to identifying a value for the data structure that (a) is not forbidden by the first set of restrictions defined the descriptor and (b) is forbidden by the second set of restrictions defined by the type restriction, a runtime environment may perform a restrictive operation, such as: blocking storage of the value to a field; blocking passing of the value to a method parameter; or blocking return of the value from a method.

ANALYTIC MODEL EXECUTION ENGINE WITH INSTRUMENTATION FOR GRANULAR PERFORMANCE ANALYSIS FOR METRICS AND DIAGNOSTICS FOR TROUBLESHOOTING
20230135164 · 2023-05-04 ·

At an interface an analytic model for processing data is received. The analytic model is inspected to determine a language, an action, an input type, and an output type. A virtualized execution environment is generated for an analytic engine that includes executable code to implement the analytic model for processing an input data stream.

Systems for Platform-Independent Application Publishing to a Web Container
20230136034 · 2023-05-04 ·

Provided are computer-implemented methods and systems for publishing an application to a web container. An example method for publishing an application to a web container may include establishing a channel of communication with a user device associated with an end user. The method may further include embedding a web container into a web portal associated with a plurality of applications. The method may include executing an application in a user session associated with the end user. The method may further include capturing images of a virtual screen associated with the application executed on the application server. After the capture, the method may continue with sending the images to the web container of the web portal running in a web browser of the user device. The web container may publish the images to the web browser to display the application as part of the web portal in the web browser.

DETECTION OF POTENTIAL NEED TO USE A LARGER DATA FORMAT IN PERFORMING FLOATING POINT OPERATIONS

Detection of whether a result of a floating point operation is safe. Characteristics of the result are examined to determine whether the result is safe or potentially unsafe, as defined by the user. An instruction is provided to facilitate detection of safe or potentially unsafe results.

VIRTUALIZATION BASED INTRA-BLOCK WORKLOAD ISOLATION

Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package.