Patent classifications
G06F2009/45575
Vehicle control device, vehicle control method, and recording medium storing vehicle control program
A vehicle control device that: judges a state of a vehicle; structures a plurality of VMs that control equipment installed in the vehicle; and in accordance with the state of the vehicle, switches an order of carrying out activation or stoppage of the plurality of VMs.
METHOD AND SYSTEM FOR IMPLEMENTING VIRTUAL MACHINE (VM) MANAGEMENT USING HARDWARE COMPRESSION
Novel tools and techniques are provided for implementing virtual machine (“VM”) management, and, more particularly, to methods, systems, and apparatuses for implementing VM management using hardware compression. In various embodiments, a computing system might identify one or more first virtual machines (“VM's”) among a plurality of VM's that are determined to be currently inactive and might identify one or more second VM's among the plurality of VM's that are determined to be currently active. The computing system might compress a virtual hard drive associated with each of the identified one or more first VM's that are determined to be currently inactive. The computing system might also perform or continue to perform one or more operations using each of the identified one or more second VM's that are determined to be currently active.
SYSTEMS AND METHODS FOR ENDPOINT CONTEXT-DRIVEN, DYNAMIC WORKSPACES
Systems and methods for endpoint context-driven, dynamic workspaces are described. In some embodiments, an Information Handling System (IHS) of a workspace orchestration service, the IHS comprising a processor and a memory coupled to the processor, the memory having program instructions stored thereon that cause the IHS to: receive initial context information from a local management agent; produce a first workspace definition based upon the initial context information, where the local management agent is configured to instantiate a first workspace based upon the first workspace definition; receive updated context information from the local management agent; and in response to the updated context information being noncompliant with attributes of the first workspace definition, select a second workspace definition, where the updated context information complies with the attributes of the second workspace definition, and the local management agent is configured to instantiate a second workspace based upon the second workspace definition.
AUTOSCREENSHOT SYSTEMS AND METHODS FOR VIRTUAL OPERATING SYSTEM STATES
Described screenshot verification systems and methods for automatically verifying the integrity of a backup image or other process-of-interest using a screenshot verification system, as well as disaster recovery systems including said systems and performing said methods. In accordance with various aspects of the present disclosure, a virtual machine is booted and screenshots of the boot process are taken, which are used by a trained model, such as a convolutional neural network, to determine a boot state consistency. The systems and methods described deliver over 99% accuracy and do not involve regular expression analysis typical of conventional methods.
LAZY RESTORE OF VIRTUAL MACHINES
A method of restarting execution of a virtual machine (VM) on a host, after an upgrade of a virtualization software for the VM, wherein prior to the upgrade, page mapping data for mapping memory pages of the VM to first page frames located in a first region of a physical memory of the host was copied into second page frames located in a second region of the physical memory of the host includes the steps of: restarting execution of the VM on the host after the upgrade while the page mapping data for mapping the memory pages of the VM to the first page frames, are stored in the second page frames; and during said execution of the VM after the upgrade, copying a portion of the page mapping data stored in the second page frames into a third page frame located in the first region of the physical memory.
Optimized branching using safe static keys
Systems and methods for managing optimized branching in executable instructions are disclosed. In one implementation, a processing device may identify, in a sequence of executable instructions, a branching instruction associated with a safe static key, the branching instruction specifying a first target location. The processing device may determine whether a value of the safe static key is initialized. Responsive to determining that the value of the safe static key is initialized, the processing device may further replace the branching instruction with an unconditional branching instruction specifying the first target location. Responsive to determining that the value of the safe static key is uninitialized, the processing device may replace the branching instruction with a conditional branching instruction specifying the first target location.
Methods and apparatus to manage compute resources in a hyperconverged infrastructure computing environment
Methods, apparatus, systems and articles of manufacture are disclosed for managing compute resources in a computing environment. Disclosed examples are to select an offering workload in a computing environment to lend at least one resource to a needy workload in the computing environment; Disclosed examples are also to cause a host associated with the offering workload to at least one of (i) instantiate a first virtual machine when the host is implemented with a second virtual machine or (ii) instantiate a first container when the host is implemented with a second container. Disclosed examples are further to assign the first virtual machine or the first container to the needy workload.
Hardware offload support for an operating system offload interface using operation code verification
A method may include receiving, by a privileged component executed by a processing device, bytecode of a packet processing component from an unprivileged component executed by the processing device, analyzing, by the privileged component, the bytecode of the packet processing component to identify whether the bytecode comprises a first command that returns a redirect, analyzing, by the privileged component, the bytecode of the packet processing component to identify whether the bytecode comprises a second command that returns a runtime computed value, and responsive to determining that the bytecode comprises the first command or the second command, setting a redirect flag maintained by the privileged component.
MAINTAINING SHARED MEMORY PAGES WHEN SUSPENDING AND RESUMING VIRTUAL MACHINES TO/FROM VOLATILE MEMORY
Techniques that enable a hypervisor to (1) maintain shared memory pages and (2) handle memory accounting for VMs that are suspended to and resumed from the volatile memory of a host system are provided. Regarding (1), the hypervisor can maintain shared memory pages in volatile memory across the suspend-to-memory and resume-from-memory operations, without having to save their reference counts. Regarding (2), the hypervisor can keep track of the volatile memory reserved and consumed by VMs as they are suspended and resumed, without erroneously double counting that memory.
HANDLING MEMORY ACCOUNTING WHEN SUSPENDING AND RESUMING VIRTUAL MACHINES TO/FROM VOLATILE MEMORY
Techniques that enable a hypervisor to (1) maintain shared memory pages and (2) handle memory accounting for VMs that are suspended to and resumed from the volatile memory of a host system are provided. Regarding (1), the hypervisor can maintain shared memory pages in volatile memory across the suspend-to-memory and resume-from-memory operations, without having to save their reference counts. Regarding (2), the hypervisor can keep track of the volatile memory reserved and consumed by VMs as they are suspended and resumed, without erroneously double counting that memory.