Patent classifications
G06F11/0712
Virtual machine
A computer-implemented method for executing a software application in a virtual machine executing on a data processing device includes receiving software code for a software application, determining application programming interfaces referenced by the software code, determining portions of an operating system accessed by the software code and creating an application container in the virtual machine. The method also includes application programming interfaces referenced by the software code inside the application container, portions of the operating system accessed by the software code inside the application container and executing the software application inside the application container on the virtual machine.
SYSTEMS AND METHODS FOR CONTINUOUS DATA PROTECTION COMPRISING STORAGE OF COMPLETED I/O REQUESTS INTERCEPTED FROM AN I/O STREAM USING TOUCH POINTS
Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
SECURE OPERATIONS OF CLOUD LANDSCAPES THROUGH WORKFLOW TEMPLATES
In an example embodiment, a workflow engine is introduced within a cloud landscape. Runbooks re then implemented as workflow templates within the workflow engine. The workflow engine allows for creation of workflows from the workflow templates as well as composing workflows from individual steps. The workflow engine provides a mechanism to describe workflow templates and workflow sets as code.
EMS resolution of split-brain virtual network function components
An example operation may include a system, comprising one or more of receiving a virtual network function component instance (VNFCI) status notification resumption message with an active state when a peer VNFCI operational state is active, retrieving a timestamp of a VNFCI state change to an active state from an element VNFCI state database, retrieving a timestamp of a peer VNFCI state change to active from an element VNFCI state database, sending one or more of: a request to a virtual network function manager (VNFM) to determine if the VNFCI network is isolating while an operating state was active, and a request to the VNFM to determine if the peer VNFCI network is isolating while an operating state was active, sending a state change request with standby state to the peer VNFCI when the VNFCI is not network isolated and the peer VNFCI is network isolated, and a VNFM response is received regarding the VNFCI, a timeout response from the VNFM, and a VNFM response is received regarding the peer VNFCI, and sending a state change request with standby to the VNFCI with one or more of: the VNFCI network isolate and peer VNFCI is not network isolated, and the VNFCI is network isolated or the peer VNFCI is not network isolated, and the VNFCI is not network isolated and the peer VNFCI is network isolated and the VNFCI is in preferred standby.
Virtual Machines Recoverable From Uncorrectable Memory Errors
The disclosed technology provides techniques, systems, and apparatus for containing and recovering from uncorrectable memory errors in distributed computing environment. An aspect of the disclosed technology includes a hypervisor or virtual machine manager that receives signaling of an uncorrectable memory error detected by a host machine. The virtual machine manager then uses information received via the signaling to identify virtual memory addresses or memory pages associated with the corrupted memory element so as to allow for containment and recovery from the error.
SYSTEMS AND METHODS FOR MACHINE LEARNING OPTIMIZATION
A computing system optimises a machine learning process. At the application level, the computing system comprises: a processing master pod maintaining a shared work queue comprising machine learning model training operations, each model training operation comprising an associated set of hyperparameter configurations to be evaluated during the course of the training operation, wherein each training operation is executed for a pre-defined number of iterations; a shared repository storing records, each record corresponding to one of the model training operations in the shared work queue; and processing worker pods, and: accessing a model training operation; retrieving the corresponding record for the accessed model training operation; executing the pre-defined number of iterations for each of the obtained one or more model training operations; and for each executed iteration, outputting evaluation result data associated with the corresponding iteration to the shared repository for storage in the corresponding record.
COMPUTE INSTANCE WARMUP OPERATIONS
Methods, apparatuses, and computer program products are described. An application server may create a compute instance associated with a pool of compute instances. The application server may select, based on one or more operation usage metrics that may indicate operations previously performed by compute instances in the pool of compute instances, a set of initialization operations from a plurality of available initialization operations. The application server may retrieve, at the compute instance, the set of initialization operations based on the selecting. The application server may perform the set of initialization operations with the compute instance as part of a compute instance warmup process in response to the compute instance being created. The application server may indicate the compute instance as an available compute instance in the pool of compute instances based on the compute instance warmup process.
System and method for generating a guest operating system crash dump
Disclosed herein are systems and method for generating a guest Operating System (OS) crash dump. In one aspect, an exemplary method comprises, obtaining information about a guest physical memory and a state of a guest CPU, determining guest page tables including a data structure for mapping between the guest physical memory and guest virtual pages using registers of the guest CPU, identifying an interrupt handler and determining an address of the interrupt handler using the guest page tables and the registers of guest CPU, finding a location of a kernel image in memory by scanning virtual addresses backward starting from the interrupt handler until a beginning of an executable kernel module is found, identifying and fetching debug symbols, determining system task descriptors using the debug symbols, determining debugger relevant data using the debug symbols, and generating the crash dump header using the system task descriptors and the debugger relevant data.
VIRTUAL MACHINE FAULT TOLERANCE
System and method for providing fault tolerance in virtualized computer systems use a first guest and a second guest running on virtualization software to produce outputs, which are produced when a workload is executed on the first and second guests. An output of the second guest is compared with an output of the first guest to determine if there is an output match. If there is no output match, the first guest is paused and a resynchronization of the second guest is executed to restore a checkpointed state of the first guest on the second guest. After the resynchronization of the second guest, the paused first guest is caused to resume operation.
INSIDER ATTACK RESISTANT SYSTEM AND METHOD FOR CLOUD SERVICES INTEGRITY CHECKING
An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.