Patent classifications
G06F9/45533
Hypervisor restart handling mechanism using random session numbers
Certain embodiments described herein are generally directed to handling a hypervisor restart event in a distributed network system. Embodiments include receiving, by a central controller, a session identifier from a first hypervisor. Embodiments further include comparing, by the central controller, the session identifier to a stored session identifier associated with the first hypervisor. Embodiments further include determining, by the central controller based on the session identifier not matching the stored session identifier associated with the first hypervisor, that the first hypervisor has restarted. Embodiments further include updating, by the central controller, the stored session identifier associated with the first hypervisor to match the session identifier. Embodiments further include identifying, by the central controller, a second hypervisor that is associated with the first hypervisor. Embodiments further include sending, by the central controller, a notification to the second hypervisor that the first hypervisor has restarted.
Method for executing task by scheduling device, and computer device and storage medium
A method for executing a task by a scheduling device, belonging to the technical field of electronics. The method includes: acquiring a target algorithm corresponding to a target task to be executed; acquiring an execution environment condition for a target algorithm, and current execution environment information of various execution devices; in the execution devices, determining a target execution device of which the execution environment information satisfies the execution environment condition; and sending a control message for executing the target task to the target execution device.
Server, server system, and method of increasing network bandwidth of server
A server includes a normal NIC as an NIC having an expansion function, and a virtual patch panel having a transfer function of transferring packets between the normal NIC and an accelerator utilization type NIC, which is implemented by software. The server is configured such that, when a packet is transferred between the normal NIC and the accelerator utilization type NIC via the virtual patch panel, the target function transfers the packet to and from the APLs.
Agentless personal network firewall in virtualized datacenters
Concepts and technologies directed to agentless personal firewall security in virtualized datacenters are disclosed herein. Embodiments can include a computer system that can host a hypervisor via a memory and a processor. Upon execution, the processor can cause the computer system to perform operations. The operations can include receiving an inbound communication request to a virtual machine associated with the hypervisor. The operations also can include identifying a virtual port associated with the virtual machine based on the inbound communication request. The operations can include determining that the inbound communication request lacks an identity of a virtual application process that executes on the virtual machine. The operation also can include building a virtual machine memory map. The operation also can include forcing exposure of the virtual application process based on the virtual machine memory map.
Methods and systems for loading data onto transportation vehicles
Methods and systems for a transportation vehicle are provided. One method includes initializing a first browser at an electronic device to communicate with a remote virtual loader having access to data for an in-flight entertainment (IFE) system of an aircraft; authenticating the first browser by the remote virtual loader; providing IFE data for the IFE system to the first browser by the remote virtual loader with an instruction to grant access to the IFE data by a second browser of the electronic device, the second browser authenticated by the IFE system to send information to the IFE system; and transferring the IFE data from the electronic device to the IFE system by the second browser that obtains access to the IFE data from the first browser in response to the instruction from the remote virtual loader.
System and method for automatically scaling a cluster based on metrics being monitored
In accordance with an embodiment, described herein is a system and method for use in a distributed computing environment, for automatically scaling a cluster based on metrics being monitored. A cluster that comprises a plurality of nodes or brokers and supports one or more colocated partitions across the nodes, can be associated with an exporter process and alert manager that monitors metrics associated with the cluster. Various metrics can be associated with user-configured alerts that trigger or otherwise indicate the cluster should be scaled. When a particular alert is raised, a callback handler associated with the cluster, for example an operator, can automatically bring up one or more new nodes, that are added to the cluster, and then reassign a selection of existing colocated partitions to the new nodes/brokers, such that computational load can be distributed within the newly-scaled cluster environment.
Using a storage path to facilitate disaster recovery
A method, computer program product, and computing system for using a storage path to facilitate disaster recovery are described. A method may comprise receiving a selection of the storage path to facilitate access to a cloud storage device by the cloud computing client. The method may further comprise configuring the storage path to facilitate access to the cloud storage device by the cloud computing client, wherein the storage path is dedicated to the cloud computing client, and wherein a cloud computing site infrastructure is inaccessible to the cloud computing client via the storage path. The method may also comprise configuring a backup routine to generate a backed-up client resource and transmit the backed-up client resource to the cloud storage device via the storage path. The method may additionally comprise transmitting a list of backed-up client resources stored at the cloud storage device.
VIRTUAL COMPUTATIONAL STORAGE DEVICES
A system includes a virtual computational storage emulation module configured to provide a virtual computational storage device. The system further includes a storage element, where the virtual computational storage emulation module is configured to store data associated with the virtual computational storage device at the storage element. The system further includes a compute element. The virtual computational storage emulation module is configured to send a compute request associated with the virtual computational storage device to the compute element.
METHOD OF RESOURCE MANAGEMENT OF VIRTUALIZED SYSTEM, ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT
Techniques for managing resources of a virtualized system involve acquiring historical distribution data about a virtualized system, the historical distribution data indicating a historical distribution of resources occupied by workloads on a plurality of host machines of the virtualized system over a predetermined historical time period. The techniques further involve generating predicted distribution data based on the historical distribution data, the predicted distribution data indicating an estimated distribution of resources occupied by the workloads on the plurality of host machines over a predetermined future time period. The techniques further involve performing workload migration at least once based on the predicted distribution data, the workload migration including migrating a workload of a first host machine whose first estimated quantity of occupied resources exceeds a high threshold to a second host machine whose second estimated quantity of occupied resources is below a low threshold.
CONTINUOUS TESTING AND DEPENDENCY TRACKING FOR JAVA VIRTUAL MACHINES
A system includes a processor in communication with a memory, a virtual machine running on the processor, and an application executing within the virtual machine. The virtual machine is associated with at least one testing tool configured to transform a plurality of application classes of the application, such that each respective class of the plurality of application classes is configured to track its respective usage. The testing tool is further configured to test the application with a plurality of tests, and while testing the application, map which respective classes of the plurality of application classes are used by respective tests. Additionally, the testing tool is configured to determine which class(es) is used by which tests (e.g., a subset of tests). Responsive to a first class being modified, the testing tool is configured to retest the application with the subset of tests.