G06F2009/45562

PERFORMANCE VARIABILITY REDUCTION USING AN OPPORTUNISTIC HYPERVISOR

An opportunistic hypervisor determines that a guest virtual machine of a virtualization host has voluntarily released control of a physical processor. The hypervisor uses the released processor to identify and initiate a virtualization management task which has not been completed. In response to determining that at least a portion of the task has been performed, the hypervisor enters a quiescent state, releasing the physical processor to enable resumption of the guest virtual machine.

Systems and methods for developing digital experience applications

In one implementation, systems and methods are provided for developing a computer-implemented digital experience application having a first and a second micro-application. Each micro-application includes a front end interface configured to receive and display information. The first micro-application includes a first event manager configured to detect an application event belonging to a category, and a first state manager configured to detect an application state belonging to the category. The digital experience application further includes a driver application configured to host the first and second micro-applications, an event hub configured to receive the detected application event from the first micro-application, and a state store configured to store the detected application state received from the first micro-application. The second micro-application includes a second event manager configured to receive the detected application event from the event hub, and a second state manager configured to receive the detected application state from the state store.

Method and Apparatus for Establishing Link Between Virtualized Network Functions
20180013586 · 2018-01-11 ·

The present invention discloses a method and an apparatus for establishing a link between virtualized network functions. The method includes obtaining an internet protocol (IP) address of a connection point (CP) of a first virtualized network function (VNF) and identification information of the CP. The method also includes determining identification information of a second VNF corresponding to the identification information of the CP of the first VNF, sending the IP address of the CP of the first VNF and the identification information of the CP to the second VNF corresponding to the identification information of the second VNF. Additionally, the method includes starting a link connection establishment process between a CP of the second VNF and the CP of the first VNF.

Multi-site virtual infrastructure orchestration of network service in hybrid cloud environments

A method of deploying a network service (NS) across multiple data centers includes identifying virtual network functions (VNFs) associated with the NS in response to a request for or relating to the NS, generating commands to deploy VNFs based on VNF descriptors, and issuing the commands to the data centers to deploy VNFs. The data centers each have a cloud management server in which cloud computing management software is run to provision virtual infrastructure resources thereof for a plurality of tenants. The cloud computing management software of a first data center is different from the cloud computing management software of a second data center, and the commands issued to the first and second data centers are each a generic command that is not in a command format of the cloud computing management software of either the first data center or the second data center.

Hybrid approach to performing a lazy pull of container images
11709665 · 2023-07-25 · ·

Embodiments of the present disclosure provide a hybrid approach to performing a lazy pull of a container image. A file system in user space (FUSE) is utilized to lazy pull the container image, and manage file requests from the container while the container image is being fetched locally. During the retrieving, the FUSE may receive from the container, one or more file requests, and may temporarily block each of the one or more file requests until it can process them. Once the container image is fully fetched locally, the overlay structure of the container image expected by a file system in the kernel (e.g., Overlay FS) is created and control is passed to the file system in the kernel. The FUSE may then unmount itself, to expose the container to the underlying mount point.

Generation, actuation, and enforcement of policies for resources within a distributed computing system

The generation, actuation, and enforcement of policies within a distributed computing system is provided. The policies are employed to manage the resources of the system. The resources include virtualized resources, such as virtual machines (VMs) and virtual storage disks (VSDs). A policy includes a rule and scope. Enforcing a policy includes applying the rule to resources that are within the policy's scope. Policies are employed to constrain the leasing period and reclaim leased resources, as well constrain the access of certain users to specific operations on the leased resources. Policies may be created via a UI that automatically generates a policy encoding. The policy is registered and accessed via a policy store. When multiple policies target a common resource, merging strategies are applied to the multiple policies. The multiple policies are ranked, merged, filtered, and any remaining conflicts are resolved to generate an effective policy that is consistent with the multiple policies and is enforced on the common resource.

Preloading of virtual devices in anticipation of a connection request from a physical device
11709696 · 2023-07-25 · ·

Latency experienced by a user of a client device may be reduced by preloading virtual devices in anticipation of a connection request from the client device. For example, a plurality of virtual devices may be partially loaded prior to a connection request from a client device. In response to the connection request from the client device, a user associated with the client device may be identified and user profile information associated with the user may be retrieved. Based on the retrieved user profile information associated with the user, a virtual device, from among the plurality of preloaded virtual devices, may be loaded, such that the loading of the virtual device is complete and is specific to the user of the client device.

Method, apparatus, electronic device and readable storage medium for adjusting instance number

A method, an apparatus, an electronic device and a computer readable storage medium for adjusting an instance number are provided. The method includes: acquiring an actual performance index of a current time window; determining a theoretical instance number corresponding to the actual performance index; and in response to the theoretical instance number being greater than an instance creating upper limit of a current edge computing node, requesting another edge computing node having an instance addition capability to jointly create an instance of a total number equal to the theoretical instance number.

UPGRADABLE BASE IMAGE OF VIRTUAL MACHINE
20180011871 · 2018-01-11 ·

A method for de-duplicating updates in virtual machines (VMs) is provided that may be executed on a host computer using a hypervisor. Client VMs are derived from a base image, and the method includes: creating a temporary virtual machine, updating the temporary virtual machine, identifying modified blocks of the updated temporary virtual machine, and identifying files associated with the modified blocks. Moreover, the method includes determining block identifiers of matching files of a VM corresponding to identified files of the updated temporary VM, moving block content of blocks relating to the determined block identifiers from its initial location to a free location within the client VM if the block content and the matching files are not identical in the client virtual machine and the temporary VM, and de-duplicating content within the client VM, generating a complete bootable image, and replacing the base image by the temporary VM.

PERFORMING GARBAGE COLLECTION ON AN OBJECT ARRAY USING ARRAY CHUNK REFERENCES

Techniques for performing garbage collection on an object array using array chunk references is described. A garbage collector (GC) thread identifies an object array to be processed. The GC thread divides the object array into array chunks. The GC thread generates array chunk references corresponding respectively to the array chunks. Each array chunk reference comprises: (a) chunk start bits representing a memory address of a start of a corresponding array chunk, and (b) chunk length bits representing a chunk length of the corresponding array chunk. The GC thread pushes the array chunk references onto the processing stack. A single processing stack concurrently stores multiple array chunk references, associated with a same object array. One or more of the array chunk references, that are associated with the same object array and stored on the processing stack, may be distributed to other GC threads for processing.