Patent classifications
G06F9/45533
System and method for midserver facilitation of long-haul transport of telemetry for cloud-based services
A system and method that uses midservers located between the business enterprise computer infrastructure and the cloud-based infrastructure to collect, aggregate, analyze, transform, and securely transmit data from a multitude of computing devices and peripherals at an external network to a cloud-based service.
Wait optimizer for recording an order of first entry into a wait mode by a virtual central processing unit
A wait optimizer circuit can be coupled to a processor to monitor an entry of a virtual CPU (vCPU) into a wait mode to acquire a ticket lock. The wait optimizer can introduce an amount of delay, while the vCPU is in the wait mode, with an assumption that the spinlock may be resolved before sending a wake up signal to the processor for rescheduling. The wait optimizer can also record a time stamp only for a first entry of the vCPU from a plurality of entries into the wait mode within a window of time. The time stamps for vCPUs contending for the same ticket lock can be used by a hypervisor executing on the processor for rescheduling the vCPUs.
Simulated change of immutable objects during execution runtime
A system for executing software, wherein a computing device stores instructions for a code execution module such that, when the instructions are executed, the computing device will: receive, for execution by the code execution module, software; create one or more immutable software nodes described in the software; determine that the software comprise an instruction to begin a simulated change at runtime of the one or more immutable software nodes; store the simulated change in a simulated change apparatus; using the simulated change apparatus, perform one or more operations of the software as if the one or more immutable software nodes had been changed in memory, during a period of time where each of the one or more immutable software nodes is guaranteed to retain logical immutability; and output results of the one or more operations.
Encrypted cross-zone replication for cross-zone replicated block storage devices
The present disclosure generally relates to creating virtualized block storage devices whose data is replicated across isolated computing systems to lower risk of data loss even in wide-scale events, such as natural disasters. The virtualized device can include at least two volumes, each of which is implemented in a distinct computing system. Each volume can be encrypted with a distinct key, and an encryption service can operate to transform data “in-flight” on the replication path between the volumes, reencrypting data according to the key appropriate for each volume.
SCHEDULING IN A CONTAINER ORCHESTRATION SYSTEM UTILIZING HARDWARE TOPOLOGY HINTS
A request to execute a workload that utilizes an amount of resources to be executed is received from a client device. Corresponding resources that are available at multiple non-uniform memory access (NUMA) nodes are received from one or more host systems. A particular NUMA node of the multiple NUMA nodes is identified in view of the particular NUMA node having available resources that are greater than the amount of resources to execute the workload. A scheduling hint is assigned to the workload that indicates that the particular NUMA node is to be used to execute the workload.
Methods and apparatus to schedule service requests in a network computing system using hardware queue managers
An example system to schedule service requests in a network computing system using hardware queue managers includes: a gateway-level hardware queue manager in an edge gateway to schedule the service requests received from client devices in a queue; a rack-level hardware queue manager in a physical rack in communication with the edge gateway, the rack-level hardware queue manager to send a pull request to the gateway-level hardware queue manager for a first one of the service requests; and a drawer-level hardware queue manager in a drawer of the physical rack, the drawer-level hardware queue manager to send a second pull request to the rack-level hardware queue manager for the first one of the service requests, the drawer including a resource to provide a function as a service specified in the first one of the service requests.
Application Virtualization System
Methods and systems for application virtualization are described herein. The system may provide a plurality of endpoint devices with access to an application. The application may be hosted by a computing device and configured to run on a mobile computing device. The computing device may determine instructions to execute the application for different endpoint devices of the plurality based on information about the plurality of endpoint devices. The computing device may modify output from execution of the determined instructions into graphics data and may provide the graphics data to at least one of the plurality of endpoint devices to enable that endpoint device to render a user interface in which to access the application.
TECHNIQUES FOR ADAPTING ESCALATION PATHS OF INTERRUPTS IN A DATA PROCESSING SYSTEM
Techniques of adapting an interrupt escalation path are implemented in hardware. An interrupt controller receives, from a physical thread of the processor core, a request to adapt, in an event assignment data structure, an escalation path for a specified event source, where the escalation path includes a pointer to a first event notification descriptor. The interrupt controller reads an entry for the physical thread in an interrupt context data structure to determine a virtual processor thread running on the physical thread. Based on the virtual processor thread determined from the interrupt context data structure, the interrupt controller accesses an entry in a virtual processor data structure to determine a different second event notification descriptor to which escalations are to be routed. The interrupt controller updates the pointer in the event assignment data structure to identify the second event notification descriptor, such that the interrupt escalation path is adapted.
MACHINE LOGIC FOR JOB MANAGEMENT BASED ON CONTEXTUAL FACTORS
Technology for revising a smart contract, including a set of machine logic based rules for job management of jobs to be performed under an SLA (service level agreement). The machine learning algorithm is refined and optimized dynamically based on intermittently received context data (historical, relevant operational data—may be augmented with projections regarding future events and/or operations). Also, the SLA is self-evolving so that its terms also change based an analysis of the context data.
Management system and control method
A management system gives an instruction to assign a value of an attribute corresponding to an environment where a processing system including a virtual machine started using a system image file is constructed, to the system image file, determines, based on a condition according to the value of the attribute assigned to the system image file in response to the instruction, whether the system image file is to be deleted, and gives an instruction to delete, from a storage device, the system image file that has been determined to be deleted.