Patent classifications
G06F9/45537
Extending server-based desktop virtual machine architecture to client machines
A server-based desktop-virtual machines architecture may be extended to a client machine. In one embodiment, a user desktop is remotely accessed from a client system. The remote desktop is generated by a first virtual machine running on a server system, which may comprise one or more server computers. During execution of the first virtual machine, writes to a corresponding virtual disk are directed to a delta disk file or redo log. A copy of the virtual disk is created on the client system. When a user decides to “check out” his or her desktop, the first virtual machine is terminated (if it is running) and a copy of the delta disk is created on the client system. Once the delta disk is present on the client system, a second virtual machine can be started on the client system using the virtual disk and delta disk to provide local access to the user's desktop at the client system. This allows the user to then access his or her desktop without being connected to a network.
Systems and methods for providing seamless software compatibility using virtual machines
Certain embodiments of the present invention are directed to a system for and method of providing seamless software compatibility by using virtual machines to provide an improved, more seamless method of user interaction with one or more virtual machines (VMs) that are resident on a host computer system. Several embodiments of the present invention provide a means in the host environment for directly invoking one or more guest operating system (OS) applications or files and displaying them in the host environment, rather than in a separate VM window. Furthermore, each embodiment of the present invention allows the possibility of multiple applications on multiple OSs (i.e., legacy or modem OSs), respectively, to run simultaneously and with the appearance of running seamlessly in the host environment.
Methods, systems, and computer readable media for emulating virtualization resources
Methods, systems, and computer readable media for emulating virtualization resources are disclosed. According to one method, the method occurs at a computing platform. The method includes receiving a message associated with a device under test (DUT) and in response to receiving the message, performing an action associated with at least one of an emulated hypervisor and an emulated virtual machine (VM).
Apparatus, method, and system to dynamically deploy wireless infrastructure
CRYSTAL “Cognitive radio you share, trust and access locally” (CRYSTAL) is a virtualized cognitive access point that may provide for combining multiple wireless access applications on a single hardware platform. Radio technologies such as LTE (Long-Term Evolution), WiMax (Worldwide Interoperability for Microwave Access), GSM (Global System for Mobile Communications), and the like can be supported. CRYSTAL platforms can be aggregated and managed as a cloud, which provides a model for access point sharing, control, and management. CRYSTAL may be used for scenarios such as neighborhood spectrum management. CRYSTAL security features allow for home/residential as well as private infrastructure implementations.
Cross-function virtualization of a telecom core network
In the present disclosure, functions associated with the central office of an evolved packet core network are co-located onto a computer platform or sub-components through virtualized function instances. This reduces and/or eliminates the physical interfaces between equipment and permits functional operation of the evolved packet core to occur at a network edge.
Managing memory in virtualized environments
Techniques are described for enabling a virtual machine to be presented with an amount of available guest memory, where a hypervisor or other privileged component manages the mapping of the guest memory to either volatile memory (e.g., RAM) or to secondary storage (e.g., SSD). This enables volatile memory to be effectively oversubscribed to on host computing devices that have a limited amount of total available volatile memory but which are running multiple virtual machines. For example, each virtual machine on the device can be presented as having access to the total amount of available RAM that is available on the device. The hypervisor or other virtualization component then monitors the usage of the memory by each virtual machine and shapes which portions of the guest memory for that virtual machine are mapped to RAM and which portions are mapped to secondary storage, such as SSD.
SECURE CLOUD PROCESSING
Methods and systems are provided for performing operations comprising: generating, on a publicly accessible server, a secure enclave, the secure enclave having isolated memory and processing resources of the server; installing, on the secure enclave, a virtual machine comprising a guest operating system of a first entity; installing, by the virtual machine, one or more cryptographic processes associated with the first entity; and encrypting and decrypting cryptographic keys associated with the first entity using the one or more cryptographic processes.
DYNAMIC FUNCTIONAL PARTITIONING FOR SECURITY PASS-THROUGH VIRTUAL NETWORK FUNCTION (VNF)
A network device or system can operate to enable a security pass-through with a user equipment (UE) and further define various virtual functions between a physical access point (pAP) and a virtual AP (vAP) based on one or more communication link parameters (e.g., latency). The security pass-through can be an interface connection that passes through a computer premise equipment (CPE) or wireless residential gateway (GW) without the CPE or GW modifying or affecting the data traffic such as by authentication or security protocol. The SP network device can receive traffic data from a UE through or via the security pass-through from a UE of a community Wi-Fi network at a home, residence, or entity network.
Method and system for permutation encoding of digital data
A method of constructing an application file from a plurality of files, each storing only a portion of an original application file. Each of the files stores one or more data blocks obtained from the original application file, and a location in the original application file from which each of the data blocks was obtained. At least one of the files stores the size of the original application file. The method includes allocating a block of memory the size of the original application file and storing each of the data blocks of the files in a memory location of the block of memory corresponding to the location in the original application file from which the data block was obtained. Before the block of memory includes the entire original application file, a reconstructed application file comprising the block of memory is executed to thereby at least partially implement an application.
PROCESSOR VIRTUALIZATION IN UNMANNED VEHICLES
A processing system for an unmanned vehicle (UV) such as an unmanned aerial vehicle (UAV) is provided. The processing system comprises a first processing unit of an integrated circuit and a second processing unit of the integrated circuit. The processing system comprises a first operating system provisioned using the first processing unit. The first operating system is configured to execute a first vehicle control process. The processing system comprises a virtualization layer configured using at least the second processing unit, and a second operating system provisioned using the virtualization layer. The second operating system is configured to execute a second vehicle control process.