Patent classifications
G06F2009/45591
REAL-TIME DYNAMIC CONTAINER OPTIMIZATION COMPUTING PLATFORM
Aspects of the disclosure relate to a real-time dynamic container optimization computing platform. The real-time dynamic container optimization computing platform may receive a request to create a first processing block and first data associated with the first processing block. The real-time dynamic container optimization computing platform may utilize a plurality of models to select a first computing device for the first processing block. The real-time dynamic container optimization computing platform may generate and deploy a container to the first computing device. The real-time dynamic container optimization computing platform may monitor execution of the container on the first computing device. The real-time dynamic container optimization computing platform may migrate the container to the second computing device if an issue with execution of the container on the first computing device is detected.
Identifying a software vulnerability
Systems and methods to identify a software vulnerability are described. The system receives a message identifying a software vulnerability. The system identifies snapshot images taken of a production machine and stored in a database. The snapshot images include a snapshot image including a virtual machine. The snapshot images are identified being based on the message. The system identifies whether the snapshot images include the software vulnerability. The system registers the software vulnerability in association with a snapshot image in the database responsive to the identification of the snapshot image of the virtual machine including the software vulnerability.
Throttling CPU utilization by implementing a rate limiter
An approach for a hypervisor to throttle CPU utilization based on a CPU utilization throttling request received for a data flow is presented. A method comprises receiving a request for a CPU utilization throttling. The request is parsed to extract a CPU utilization level and a data flow identifier of the data flow. Upon receiving a data packet that belongs to the data flow identified by the data flow identifier, a packet size of the data packet is determined, and a rate limit table is accessed to determine, based on the CPU utilization level and the packet size, a rate limit for the data packet. If it is determined, based at least on the rate limit, that the CPU utilization level for the data flow would be exceeded if the data packet is transmitted toward its destination, then a recommendation is generated to drop the data packet.
Configuration optimization with performance prediction
An information handling system may include at least one processor; and a non-transitory memory coupled to the at least one processor. The information handling system may be configured to: execute a plurality of virtual machines having workloads associated therewith; during selected times, apply a plurality of configuration settings relating to the at least one processor while executing the workloads of the plurality of virtual machines; track a plurality of performance metrics relating to the at least one processor during the selected times; and predictively determine a selected one of the plurality of configuration settings that is predicted to improve performance of the workloads.
Extracting Malicious Instructions on a Virtual Machine in a Network Environment
A system including a guest virtual machine with one or more virtual machine measurement points configured to collect virtual machine operating characteristics metadata and a hypervisor control point configured to receive virtual machine operating characteristics metadata from the virtual machine measurement points. The hypervisor control point is further configured to send the virtual machine operating characteristics metadata to a hypervisor associated with the guest virtual machine. The system further includes the hypervisor configured to receive the virtual machine operating characteristics metadata and to forward the virtual machine operating characteristics metadata to a hypervisor device driver in a virtual vault machine. The system further includes the virtual vault machine configured to determine a classification for the guest virtual machine based on the virtual machine operating characteristics metadata and to send the determined classification to a vault management console.
MANAGEMENT OF NETWORK FUNCTIONS VIRTUALIZATION AND ORCHESTRATION APPARATUS, SYSTEM, MANAGEMENT METHOD, AND PROGRAM
Provided a management apparatus including a maintenance mode setting unit that transitions a first virtualization infrastructure (NFVI0) to a maintenance mode, a mobility control unit that at least instructs a virtualization deployment unit (VDU) on the first virtualization infrastructure in the maintenance mode to move to a second virtualization infrastructure (NFVI1), and a maintenance mode release unit that releases the maintenance mode of the first virtualization infrastructure (NFVI0).
SHADOW COMMAND RING FOR GRAPHICS PROCESSOR VIRTUALIZATION
A shadow command ring is described for graphics processor virtualization. In one example a command batch is loaded from a virtual machine of a general purpose processor into a physical command ring of a graphics processor. A physical tail pointer register of the graphics processor is set and the command batch and the physical tail pointer are trapped at a mediator. The mediator copies the trapped command batch and the physical tail pointer in a shadow command ring and sets a virtual tail pointer. The execution of the physical command ring is monitored and if an error is determined then the physical command ring is cleared and reloaded using the shadow command ring.
INTEROPERABILITY-AS-A-SERVICE IN A CLOUD ENVIRONMENT
Methods, devices, and techniques for determining interoperable resources are discussed herein. For example, in one aspect, a resource in a cloud environment may be discovered. Responsive to discovering the resource, an interoperability support matrix associated with the resource can be obtained. The interoperability support matrix may specify another resource that interoperates with the resource. An interoperability record is then stored in an interoperability support matrix repository. The interoperability record can specify that the another resource interoperates with the resource.
PROVIDING DEBUG INFORMATION ON PRODUCTION CONTAINERS USING DEBUG CONTAINERS
A method and associated system for providing debug information associated with computer software executing in a production container. The production container is replicated as a debug container. The computer software is executed in the production container and the debug container. Executing the computer software includes replicating requests sent to the computer software executing in the production container to the computer software executing in the debug container. Requests from the computer software executing in the production container are stored together with any responses to the stored requests. Debug information generated by the computer software executing in the debug container is stored.
COLLECTION OF GUEST STATUS
The present disclosure provides new and innovative methods and systems for guest status collection in a virtual environment. An example method includes accessing a hypervisor media library and booting an information collection guest from the hypervisor media library. The method may also include exposing the information collection guest to a memory of a virtual machine, detecting a first guest status of the virtual machine, generating an information message based on the first guest status, and sending the information message to a message display agent.