Patent classifications
G06F9/45541
SYSTEM AND METHOD FOR SUBSCRIPTION MANAGEMENT USING COMPOSED SYSTEMS
Methods, systems, and devices for providing computer implemented services using managed systems are disclosed. To provide the computer implemented services, the managed systems may need to operate in a predetermined manner conducive to, for example, execution of applications that provide the computer implemented services. Similarly, the managed system may need access to certain hardware resources (e.g., and also software resources such as drivers, firmware, etc.) to provide the desired computer implemented services. To improve the likelihood of the computer implemented services being provided, the managed systems may be managed using a subscription based model. The subscription model may utilize a highly accessible service to obtain information regarding desired capabilities (e.g., a subscription) of a managed system, and use the acquired information to automatically instantiate and/or retire composed systems to manage resources presentation and/or use.
Updating operating system images of inactive compute instances
Updating inactive compute instances is disclosed. It is determined that a first compute instance that boots from an operating system image on a first storage device is in an inactive state. It is determined that updates to the operating system image on the first storage device exist. The operating system image is copied from the first storage device to a second storage device. The operating system image on the second storage device is updated with the updates to generate an updated operating system image on the second storage device. The updated operating system image is copied form the second storage device to the first storage device in place of the operating system image.
Composable information handling systems in an open network using access control managers
A method for managing composed information handling systems includes obtaining a composition request for a composed information handling system, making a first determination that a first information handling system is not capable of servicing the composition request local, and based on the first determination: allocating, an available resource on the first information handling system to the composed information handling system, sending a resource allocation request to a system control processor manager for access to an additional resource, obtain, in response to the allocation request, a notification for access to a second information handling system of the information handling systems that provides the available resource, setting up management services for available resource and the additional resource to obtain logical hardware resources, and presenting the logical hardware resources to at least one compute resource set as bare metal resources.
Online Migration Method and System for Bare Metal Server
An online migration method and system for a bare metal server, where a first hardware card receives a migration command for a first bare metal server, and where the first hardware card is inserted into the first bare metal server. The first hardware card notifies, based on the migration command, the first bare metal server to start a virtual machine manager in the first bare metal server, where the virtual machine manager records first dirty memory page location information that is for memory of the first bare metal server and that is generated by the first bare metal server, and sends the first dirty memory page location information to the first hardware card. The first hardware card online migrates a dirty memory page of the first bare metal server to a second bare metal server based on the first dirty memory page location information.
Vehicle system, vehicle and method for operating such a vehicle system
A vehicle system having: a hardware level, a first operating system, and a virtual machine integrated on the hardware level having a second operating system. A hypervisor operates the virtual machine such that the first and the second operating systems) are operated in parallel on the hardware. A first application is executed on the first operating system and a second application is executed on the second operating system. The first application has a higher safety standard than the second application. The second operating system is configured to be operated in suspend-to-RAM mode while the first operating system is switched off.
Efficient transfers between tiers of a virtual storage system
Efficiently transferring data between tiers in a virtual storage system, including: receiving, by the virtual storage system, a request to write data to the virtual storage system; transforming, within storage provided by a first tier of storage of the virtual storage system, the data to generate transformed data; and migrating, from the first tier of storage to a second tier of storage that is more durable than the first tier of storage of the virtual storage system, at least a portion of the transformed data.
Virtual IP support for bare metal cloud infrastructures
Disclosed is an improved approach for managing floating/virtual IP addresses in a virtualization system. Where a bare metal cloud provider does not provide adequate facilities to implement broadcast operations, the approach would capture broadcast packets, and from the captured packets, generate calls to the cloud provider to implement configuration changes to reflect the changes desired by the broadcast packets.
Using delayed autocorrelation to improve the predictive scaling of computing resources
Techniques are described for filtering and normalizing training data used to build a predictive auto scaling model used by a service provider network to proactively scale users' computing resources. Further described are techniques for identifying collections of computing resources that exhibit suitably predictable usage patterns such that a predictive auto scaling model can be used to forecast future usage patterns with reasonable accuracy and to scale the resources based on such generated forecasts. The filtering of training data and the identification of suitably predictable collections of computing resources are based in part on autocorrelation analyses, and in particular on “delayed” autocorrelation analyses, of time series data, among other techniques described herein.
System and method for tag based request context in a cloud infrastructure environment
Systems and methods described herein support tag based request context in a cloud infrastructure environment. Cloud administrators do not generally have the ability to restrict resource usage in existing clouds. Granting a user permission to create resources allows them to create and/or terminate any number of resources up to a predefined account limit. Tags are associated with requests for resources for allowing administrators to restrict a user's handling of resources to the appropriate level by allowing fine-tuned control of access to the resources based on the context of the request for the resources. Request context information of the request is compared against a required credential gate level for permitting handling of resources in a tenancy having the first privilege level classification, and the request is selectively granted based on the request context information matching the first required credential gate level.
Model specific register (MSR) instrumentation
Techniques are disclosed for dynamic access and instrumentation of model specific registers (MSRs). A virtual machine monitor (VMM) can provide a kernel application program interface (API) that can be utilized to access and instrument an MSR. A method may include receiving, by the VMM, an MSR instrumentation command that identifies an MSR to instrument and causing instrumentation of the MSR identified in the MSR instrumentation command. Instrumentation of the identified MSR can be caused by configuring or manipulating a virtual machine control structure (VMCS) of a guest virtual machine (VM). The MSR instrumentation command may be an MSR instrumentation request command, an MSR remove request command, an MSR value set request command, or an MSR value fetch request command. In some cases, the VMM may be a Type-I hypervisor.