Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Red Hat Inc
Red Hat Israel Ltd
Red Hat Israel Inc
Red Hat Israel ltd
Red Hat Corporation
Red Hat Isarael Ltd
Red Hat Israel Ltd_20131212
Red Hat Lsrael Ltd
Red Hat inc

Red Hat patents


Recent patent applications related to Red Hat. Red Hat is listed as an Agent/Assignee. Note: Red Hat may have other listings under different names/spellings. We're not affiliated with Red Hat, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "R" | Red Hat-related inventors


Api and user interface for mapreduce jobs

The method may provide a second GUI that is to display the arguments, first argument values, and allow for a selection of second argument values for the second portion of the arguments. In response to a selection, the method may execute the MapReduce job in view of the first argument... Red Hat

Breakpoint insertion into kernel pages

A method includes, with a hypervisor, receiving a first request from a guest'to write a first piece of data to a first memory location within a kernel code page. The method further includes determining that the first request triggers a violation based on a kernel protection mechanism, and in response... Red Hat

 new patent  Differentiating open and abandoned transactions in a shared storage environment

Systems and methods for enhancing storage recollection in a shared storage system by enabling the recollection procedure to differentiate between open and abandoned transaction. An example method comprises: detecting, by a processing device, a transaction marker of a storage system, the transaction marker being stored on shared storage and indicating... Red Hat

 new patent  Collection of guest status

The present disclosure provides new and innovative methods and systems for guest status collection in a virtual environment. An example method includes accessing a hypervisor media library and booting an information collection guest from the hypervisor media library. The method may also include exposing the information collection guest to a... Red Hat

 new patent  Exitless timer access for virtual machines

A system and method of scheduling timer access includes a first physical processor with a first physical timer executing a first guest virtual machine. A hypervisor determines an interrupt time remaining before an interrupt is scheduled and determines the interrupt time is greater than a threshold time. Responsive to determining... Red Hat

 new patent  Transparent guest based notification overlay

The present disclosure provides new and innovative methods and systems for managing transparent guest based notifications in a virtual environment. In a method for controlling the display of information on a client, a hypervisor may connect a virtual graphics card to a virtual machine. The hypervisor may receive a render... Red Hat

Failure resistent volume creation in a shared storage environment

Systems and methods for data storage management technology that use task identifiers to manage tasks and ensure storage modifications occur without unnecessary task duplication. An example method may comprise: generating a task identifier on a first device; transmitting a request comprising the task identifier to create a task on a... Red Hat

Virtual machine initiated memory deduplication

Methods, systems, and computer program products are included for initiating deduplication of memory by virtual machine guests. A method includes providing a virtual machine, by a hypervisor, and running a guest on the virtual machine. The guest sends the hypervisor a scan indicator based on an amount of the virtual... Red Hat

Plugin for software deployment

A plugin for a website browser can enable a user to deploy software onto a computing device quickly and easily. For example, the plugin can automatically detect that a user is visiting a website on which program code for a software application is shared or hosted. The website may be... Red Hat

Committed program-code management

An association between two or more segments of committed program code can be determined so that the segments of committed program code can be used together for building a software project. For example, one or more communications can be received and indicate that two or more segments of program code... Red Hat

Live storage domain decommissioning in a virtual environment

Implementations of the disclosure provide for live storage domain decommissioning in a virtual environment. A method of the disclosure includes identifying, by a processing device, a storage domain to decommission from a storage system. The storage domain comprises a plurality of disk images. It is determined whether the disk images... Red Hat

Secure live virtual machine guest based snapshot recovery

A system, method, and apparatus for secure live virtual machine guest based snapshot recovery. A virtual machine sends a request to access a snapshot of a first virtual disk of the virtual machine including a snapshot identifier. A hypervisor selects the snapshot using the snapshot identifier and creates a second... Red Hat

Operating system integrated application isolation

A system, method, and apparatus for operating system integrated application isolation. A snapshot manager creates a snapshot table including one or more pointers to a file system storage. Then an application is installed on an operating system and mapped to a snapshot table. The snapshot manager receives a request by... Red Hat

Snapshot version control

Methods, systems, and computer program products are included for providing snapshot version control. A method includes creating a snapshot corresponding to a file system at a first point in time. After creating the snapshot, a file management data structure of the file system is modified corresponding to a file creation,... Red Hat

Hypervisor translation bypass

A system and method of translation bypass includes a hypervisor reserving a range of host virtual addresses. The hypervisor detects that a guest address is unmapped. The hypervisor determines a host virtual address. Determining the host virtual address includes adding the guest address to a host virtual address base offset.... Red Hat

System and configuring a virtual device

Methods, systems, and computer program products are included for providing a virtual machine guest with access to a host device. A method includes providing a hypervisor with access to an enhanced allocation capability entry of a host device. The host device performs input and output operations via a range of... Red Hat

Hypervisor-visible guest thread management

Responsive to receiving a first request from an application to create a thread for the application, a guest operating system sends a first notification to a hypervisor to create a dedicated virtual processor for the thread. Responsive to receiving an identifier associated with the dedicated virtual processor from the hypervisor,... Red Hat

Collecting test results in different formats for storage

Systems and methods are provided for storing test results. An example method includes receiving a notification that a job has completed execution in a test execution server. The notification includes an identifier and a name of the job, and is sent from the test execution server. The method also includes... Red Hat

Modification of write-protected memory using code patching

Systems and methods are provided for modifying a set of memory pages. An example method includes loading kernel code and patching code of a kernel into a guest memory. The patching code is stored at a first range of memory addresses, which is in an executable mode in a first... Red Hat

Virtual machine based huge page balloon support

Systems and methods for virtual machine based huge page balloon support are provided. A guest operating system (OS) receives a request from a hypervisor for guest memory to be made available to a host operating system (OS). The guest OS further receives a huge page size of a host page... Red Hat

Disk image deletion with failure resistent data erasure

Systems and methods for disk image deletion with failure resistant data erasure. An example method may comprise: receiving a request to delete a first disk image associated with a data storage portion; associating the data storage portion with a second disk image responsive to receiving the request to delete the... Red Hat

Recordation of user interface events for script generation

An example method of generating one or more scripts specific to an application programming interface (API) type and language and in accordance with user-selected events includes receiving an API type and a language in which to implement a script. Events selected by a user via a graphical user interface in... Red Hat

Discovering and provisioning computing devices in a security enhanced environment

Systems and methods for discovering and provisioning computing devices within a computing environment. An example method may comprise: loading a first kernel from a removable storage, wherein the first kernel identifies device information of the computing device when executed; transmitting a provisioning request comprising the device information to a provisioning... Red Hat

Guest initiated atomic instructions for shared memory page host copy on write

A guest OS detects a DMA write request for a device assigned to the guest OS to perform a DMA write to a shared page of memory that has a write protection attribute to cause a protection page fault upon an attempt to write to the shared page of memory.... Red Hat

Scalable page migration after memory de-duplication

A system and method of de-duplication includes receiving a first page, scanning a first structure, identifying a first match, determining a quantity of mappings to the first match is less than a threshold, and adding a first mapping to the first match. The method includes receiving a second page, scanning... Red Hat

Multiple input-output memory management units with fine grained device scopes for virtual machines

A system and method of emulated input-output memory management units includes a management software associating a first device with a first input-output memory management unit having a first security designation, and associating a second device with a second input-output memory management unit having a second security designation different from the... Red Hat

Safe transmit packet processing for network function virtualization applications

A transmit packet processing system includes a NIC, a memory, one or more processors in communication with the memory, and a device driver. The memory has a first set and a second set of physical memory pages. The device driver is loaded in an OS and is configured to initialize... Red Hat

Guest protection from application code execution in kernel mode

Systems and methods are disclosed for securing an application running on a guest. An example method includes detecting, by a guest running on a virtual machine, that a set of physical memory pages is allocated to an application. The virtual machine runs on a hypervisor, and the application runs on... Red Hat

Module management in a protected kernel environment

Methods, systems, and computer program products are included for performing module unloading in a protected kernel environment. A method includes loading a module into a kernel, the module including an exit function. The kernel provides, to a hypervisor, a memory location corresponding to the exit function of the module. A... Red Hat

Kernel state data collection in a protected kernel environment

Methods, systems, and computer program products are included for collecting kernel data in a protected kernel environment. A method includes allocating a first portion of a memory for a first kernel and reserving a second portion of the memory for a second kernel. The second kernel is stored in the... Red Hat

Dynamic guest virtual machine identifier allocation

An example method of updating a virtual machine (VM) identifier (ID) stored in a memory buffer allocated from guest memory includes supplying firmware to a guest running on a VM that is executable on a host machine. The firmware includes instructions to allocate a memory buffer. The method also includes... Red Hat

Interacting with a source object via a virtual object

An example method of interacting with a source object via a virtual object, the method includes associating a first set of properties of a virtual object with a second set of properties of a source object that is defined in a program. The method also includes defining a set of... Red Hat

Kernel tracing in a protected kernel environment

Methods, systems, and computer program products are included for performing tracing in a protected kernel environment. A method includes scanning at least a portion of a kernel to locate one or more instructions. The locations of the one or more instructions are provided to a hypervisor. The one or more... Red Hat

Kernel transitioning in a protected kernel environment

Methods, systems, and computer program products are included for providing one or more additional kernels kernel in a protected kernel environment. A method includes providing, by a hypervisor, a virtual machine that includes a first kernel. A first portion of memory of the virtual machine is allocated for the first... Red Hat

Secure receive packet processing for network function virtualization applications

A transmit packet processing system includes a memory, one or more processors in communication with the memory, and an operating system. The one or more processors execute a packet processing thread and a rearming thread. The OS maps a receive ring into a first memory of an application and maps... Red Hat

08/31/17 / #20170249458

Application memory protection using a host page table switching virtual machine function

A hypervisor generates first and second page views, where a guest physical address points to a first page of the first page view and a second page of the second page view. A first pointer value is written to the first page and a second pointer value is written to... Red Hat

08/31/17 / #20170249465

Host-driven application memory protection for virtual machines

A memory protection system includes a memory, one or more physical processors, a hypervisor, and a virtual machine including a guest OS executing on the one or more processors. The hypervisor notifies the guest OS of a first location of a first device and a second location of a second... Red Hat

08/31/17 / #20170250817

Securing code loading by a guest in a virtual environment

Methods, systems, and computer program products are included for loading a code module. A method includes verifying, by a guest, a digital signature of a code module stored in an initial guest memory buffer. The guest copies the verified code module stored at the initial guest memory buffer into a... Red Hat

08/31/17 / #20170251082

Dynamic cache-efficient event suppression for network function virtualization

A system and method for dynamic cache-efficient event suppression includes recording, by a system processor, a quantity of messages received from a client during an interval of time between at least two events of a plurality of events. The system processor is in communication with a shared memory having a... Red Hat

08/24/17 / #20170242719

Securing code loading in a virtual environment

Methods, systems, and computer program products are included for loading a code module. A method includes providing, by a hypervisor, a virtual machine that includes a guest operating system. The code module and a signature corresponding to the code module are sent by the guest operating system to the hypervisor.... Red Hat

08/24/17 / #20170242721

Protection from guest interrupts in a virtual machine function

An example method for secure virtual machine access to a protected virtual machine function includes storing a first virtual machine function instruction, which is executable to configure access privileges of a guest according to a trampoline view, as a last instruction on a first trampoline page. The method also includes... Red Hat

08/24/17 / #20170242811

Multi-queue device assignment to virtual machine groups

A system and method of device assignment includes receiving an assignment request to assign a device to a plurality of guest virtual machines. The plurality of guest virtual machines includes a first guest virtual machine with a first guest memory having a first physical address and a second guest virtual... Red Hat

08/17/17 / #20170235679

Non-uniform memory access support in a virtual environment

Methods, systems, and computer program products for configuring devices in a virtual environment are described. An example method includes determining a NUMA node assigned to a virtual machine. A guest of the virtual machine probes a root bus to detect a first device coupled to the root bus. The first... Red Hat

08/10/17 / #20170228271

Page fault-based fast memory-mapped i/o for virtual machines

Implementations provide for page fault-based fast memory-mapped I/O for virtual machines. A method of the disclosure includes detecting, by a processing device executing a hypervisor on a host machine, a protection fault at the hypervisor, the protection fault caused by a guest of the hypervisor attempting to write to an... Red Hat

06/01/17 / #20170153952

Reverse network address translation failover

In an example system, a first interface has a first address and a first port number. A second interface has a second address and a second port number. A router is in communication with the first and second interfaces over a network. The router is configured to request, a first... Red Hat

06/01/17 / #20170155620

Mac address allocation for virtual machines

Systems and methods for MAC address allocation for virtual machines. An example method may include: initializing a virtual machine, determining that a network identifier has not been assigned to the virtual machine, in view of a determination that a network identifier has not been assigned to the virtual machine, transmitting,... Red Hat

05/25/17 / #20170147377

Lazy timer programming for virtual machines

A system and method for programming a timer in a virtualized system are disclosed. In accordance with one embodiment, a hypervisor executed by a processing device stores, in a first memory location that is readable by a virtual machine (VM), a first time that is associated with a first future... Red Hat

05/25/17 / #20170147240

Memory deduplication protection for memory pages

An example method of providing memory deduplication protection for one or more memory pages includes inserting an identifier of a first memory page into a list of memory pages for which memory deduplication is avoided. The first memory page is located in a virtual address space allocated to a memory... Red Hat

05/25/17 / #20170147315

Configuring dependent services associated with a software package on a host system

A software package to be installed on a host system may be identified. A service of the host system that is unavailable during an installation of the software package on the host system may be identified where the installation changes a configuration of the service. A determine may be made... Red Hat

05/25/17 / #20170147371

Virtual machine migration using memory page hints

Methods, systems, and computer program products are provided for migrating memory pages. A virtual machine is run by a hypervisor. The virtual machine includes a guest that is allocated a plurality of guest memory pages. A data structure is initialized corresponding to a memory page of the plurality of guest... Red Hat

05/25/17 / #20170147374

Virtual pci device based hypervisor bypass for vm bridging

In an example embodiment, a hypervisor exposes a first guest device to a first virtual machine and a second guest device to a second virtual machine. The hypervisor exposes a first virtual host device and a second virtual host device to a third virtual machine. The hypervisor maps a first... Red Hat

05/25/17 / #20170147376

Input ouput memory management unit based zero copy virtual machine to virtual machine communication

In an example embodiment, a hypervisor exposes a virtual input-output memory management unit (IOMMU) to a first virtual machine. The first virtual machine includes a first guest operating system (OS). The hypervisor exposes a first virtual device to the first virtual machine. The hypervisor exposes a shared memory device to... Red Hat

05/25/17 / #20170147378

Virtual machine to host device bridging

In an example embodiment, a hypervisor exposes a first guest device to a first virtual machine. The hypervisor exposes a virtual host device and a pass-through device to a second virtual machine. The hypervisor maps a first memory and a second memory into the second virtual machine at a first... Red Hat

05/25/17 / #20170147511

Virtual machine memory lock-down

A hypervisor receives, from a guest virtual machine, a request to disable access to a memory range. The hypervisor disables access to the memory range. The hypervisor detects a prohibited access attempt. The prohibited access attempt is an access attempt to the memory range. Responsive to detecting the prohibited access... Red Hat

05/25/17 / #20170149729

Fan network management

A method performed by a physical computing system includes, with a first virtual entity manager of a first host machine, detecting an Address Resolution Protocol (ARP) request from a first virtual entity supported by the first virtual entity manager to a second virtual entity having a first logical address within... Red Hat

05/25/17 / #20170150117

Flicker-free remoting support for server-rendered stereoscopic imaging

A system includes a memory, one or more processors, a guest virtual machine, a hypervisor, and a client. The hypervisor receives, from the client, a first notification of stereoscopic capability. The hypervisor sends, to the guest virtual machine, a second notification of stereoscopic capability. The hypervisor receives, from the guest... Red Hat

05/18/17 / #20170139755

Efficient chained post-copy virtual machine migration

A hypervisor receives, from a second host at a third host, at a second time after a first time, a first plurality pages. The first plurality of pages were copied at the first time, from a first host to the second host. The hypervisor receives a mapping at the third... Red Hat

05/11/17 / #20170132028

Application of a pattern to inactive pages in guest memory

Systems and methods are disclosed for migrating a virtual machine from a source hypervisor to a destination hypervisor. An example method of migrating a virtual machine from a source hypervisor to a destination hypervisor includes receiving, by a source hypervisor running a virtual machine, an indication to migrate the virtual... Red Hat

05/11/17 / #20170134325

Memory-mapped input/output (i/o) channel

Various examples are directed to systems and methods for utilizing a memory-mapped I/O channel. A first application may request that a message be sent to a channel counterparty. A message driver may receive from the first application the request to send the message, where the request comprises payload data from... Red Hat

04/27/17 / #20170116092

Managing network failure using back-up networks

A method of managing network failure identifying a plurality of hypervisors, each of the plurality of hypervisors being associated with a plurality of networks. The method includes determining whether the plurality of hypervisors satisfies an unavailability condition, and, in response to determining that the plurality of hypervisors satisfies the unavailability... Red Hat

03/30/17 / #20170090816

Protection for memory deduplication by copy-on-write

An example method of providing deduplication support for one or more memory pages includes setting, by a memory manager, an initial memory page to a write protection mode. The initial memory page is located in an address space allocated to a memory consumer. The method also includes detecting, by the... Red Hat

03/30/17 / #20170090964

Post-copy virtual machine migration with assigned devices

A hypervisor updates a mapping at a first time by storing a first mapping of the first plurality of pages in an input-output memory management unit. A guest of a virtual machine attempts to access at least one byte of each of a second plurality of pages on the migration... Red Hat

03/30/17 / #20170090965

Dirty memory tracking with assigned devices by exitless paravirtualization

An example method of tracking memory modified by an assigned device includes allocating, by a hypervisor running a virtual machine, guest memory to a guest running on the virtual machine, where a device is assigned to the virtual machine. The method also includes reading, while the virtual machine is running... Red Hat

03/30/17 / #20170090968

Deferred assignment of devices in virtual machine migration

Systems and methods for deferred assignment of devices in virtual machine migration. An example method comprises: starting, by a processing device of a first host computer system, a virtual machine being migrated from a second host computer system in a post-copy migration mode; receiving a request to associate an input/output... Red Hat

03/30/17 / #20170093736

Packet size control using maximum transmission units for facilitating packet transmission

A system and method of facilitating packet transmission comprises a first node, a second node, and an intermediate node. The intermediate node receives a first packet, from the first node, determines a packet size, determines a maximum transmission unit (MTU) size, and determines whether the packet size is greater than... Red Hat

Patent Packs
03/23/17 / #20170083430

Code coverage plugin

A method for starting a level of testing on a first package file is disclosed. The method receives, via an application programming interface, at a plugin, a request to start the level of testing on the first package file. The method further modifies, by the plugin, the memory data structure... Red Hat

03/16/17 / #20170075582

Translating access requests for a multi-level page data structure

Methods, systems, and computer program products for receiving a memory access request, the memory access request including a virtual memory address; locating a page entry in a page entry structure, the page entry corresponding to the virtual memory address; identifying that a page corresponding to the page entry includes a... Red Hat

03/16/17 / #20170075706

Using emulated input/output devices in virtual machine migration

Systems and methods for using emulated I/O devices in virtual machine live migration. An example method comprises: creating an emulated input/output (I/O) device corresponding to a virtual function I/O device associated with a virtual machine being migrated from a first host computer system to a second host computer system; intercepting,... Red Hat

03/16/17 / #20170075770

Virtual device backend recovery

Methods, systems, and computer program products for restoring a backend after a backend disconnect. The method includes detecting a disconnect of a backend. The method further includes setting a flag and notifying a guest regarding the disconnect. The method further includes resetting a data structure accessed by the backend. The... Red Hat

03/16/17 / #20170075814

Multi-level page data structure

Methods, systems, and computer program products for receiving a memory allocation request; comparing a memory size corresponding to the memory allocation request to a memory size threshold; allocating a memory page that has a size larger than the memory size threshold, the memory page having a page entry in a... Red Hat

03/09/17 / #20170068554

Hypervisor driven gradual balloon inflation

A hypervisor determines a target CPU usage of a virtual machine in responding to a request to allocate guest memory. Then the hypervisor receives a first balloon request for a first quantity of guest memory to be ballooned. The hypervisor transmits a second balloon request for guest memory to be... Red Hat

03/09/17 / #20170068634

Asynchronous mapping of hot-plugged device associated with virtual machine

Systems and methods for asynchronous mapping of a hot-plugged I/O device associated with a virtual machine. An example method comprises: executing, by a first processing thread running on a host computer system, a virtual processor associated with a virtual machine; initializing, by a second processing thread, a table entry of... Red Hat

02/16/17 / #20170046184

Guest management of devices assigned to a virtual machine

Systems and methods are disclosed for providing device state information to a destination hypervisor. An example method of providing device state information to a destination hypervisor includes sending, by a source hypervisor to a guest running on a virtual machine, a request to save a state of a device into... Red Hat

02/16/17 / #20170046185

Page table based dirty page tracking

A hypervisor identifies a set of pages associated with a guest operating system (OS) of a virtual machine (VM) that are shared with an application. The hypervisor maps each of the set of pages associated with the guest OS to a corresponding page associated with the application. The hypervisor modifies... Red Hat

02/16/17 / #20170046186

Limited hardware assisted dirty page logging

A hypervisor identifies a set of pages to be polled for updates made by a guest operating system, each page having a write protection attribute that causes an exit to a hypervisor upon a guest operating system attempt to update a corresponding page. The hypervisor modifies the write protection attribute... Red Hat

02/16/17 / #20170046187

Guest driven surprise removal for pci devices

A hypervisor receives a notification from a guest operating system of a virtual machine that includes a capability indicator of support provided by a virtual device driver for recovering from a surprise removal of a corresponding virtual device from the virtual machine. The hypervisor, upon receiving a request to remove... Red Hat

02/16/17 / #20170046255

Virtual machine based huge page balloon support

Systems and methods for virtual machine based huge page balloon support are provided. A guest operating system (OS) receives a request from a hypervisor for guest memory to be made available to a host operating system (OS). The guest OS further receives a huge page size of a host page... Red Hat

02/02/17 / #20170031593

Maintaining guest input/output tables in swappable memory

Systems and methods for maintaining guest input/output (I/O) tables in a swappable memory. An example method comprises: allocating, by a hypervisor running on a host computer system, one or more memory pages mapped into a memory space of a virtual machine running on the host computer system, to store a... Red Hat

02/02/17 / #20170031810

Host virtual address reservation for guest memory hot-plugging

An example method for host virtual address reservation comprises: reserving a host virtual address range within a virtual address space of a computer system; associating a first virtual memory device with a first guest physical address range a virtual machine running on the computer system; associating a second virtual memory... Red Hat

01/26/17 / #20170024313

Entropy increase by executable loader

Methods, systems, and computer program products for parsing a binary, the parsing including identifying a section that includes a relocation entry; locating padding in a memory page of the section, the section including one or more memory pages; and inserting entropy into the padding.... Red Hat

Patent Packs
12/21/17 / #20170364430

Optimization of operating system and virtual machine monitor memory management

A method and system for collecting statistics associated with multiple memory nodes to determine if a read-only page is read accessed in aggregate by multiple processing devices of the multiple memory nodes at or above a first threshold value. If so, the read-only page may be replicated to an additional... Red Hat

05/25/17 / #20170149698

Implicit dynamic receive queue steering for unidirectional flows in virtualized systems

A system and method are disclosed for steering incoming packets to receive queues of virtual machines (VMs). In one embodiment, a hypervisor executed by a processing device receives an incoming packet for a VM, where the incoming packet identifies an incoming flow to the VM. The hypervisor determines that a... Red Hat

01/11/18 / #20180011781

 new patent  Generating pseudorandom test items for software testing of an application under test (aut)

Generating pseudorandom test items for software testing of an Application Under Test (AUT) is provided. In one example, a method comprises selecting an oracle of one or more oracles within a test provider directory structure, the oracle defining one or more logical paths each comprising one or more test conditions... Red Hat

01/11/18 / #20180013612

 new patent  Logfile collection and consolidation

Mechanisms for consolidating log information from remote computing devices are provided. Connections with a plurality of remote computing devices are established. Each remote computing device has a corresponding logfile. For a plurality of iterations, logfile contents from each logfile on each remote computing device are retrieved, and the logfile contents... Red Hat

01/04/18 / #20180004817

Federation optimization using ordered queues

Methods, systems, and computer program products for optimization of query processing in a data federation system using priority queuing techniques are provided. Priority queuing techniques may include generating a query vector corresponding to a query, comparing the query vector to historical query vectors to determine similarity, determining an expected processing... Red Hat

01/04/18 / #20180007143

Persistent real-time communication channels with cloud computing systems

Mechanisms for establishing persistent bi-directional communication channels with cloud computing systems are disclosed. A processor device initiates a plurality of persistent bi-directional communication channels with a corresponding plurality of cloud computing systems. Each cloud computing system comprises a plurality of computing devices used to implement on-demand computing resources on one... Red Hat

12/07/17 / #20170351542

Non-repudiable transaction protocol

A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of... Red Hat

11/30/17 / #20170344457

System for expression evaluation at debug time

A system for expression evaluation at debug time includes a debugger which receives an executable program with debugging information from a compiler, where the executable program with the debugging information is generated by compiling a source code program and generating debugging information corresponding to the executable program. The compiler embeds... Red Hat

11/30/17 / #20170344460

Exception resolution in a software development session

Mechanisms for exception resolution in a software development session are provided. An exception is detected during a software development session. Information regarding the exception is provided to a central exception repository computing device. The information includes exception information that identifies the exception and a first user identifier that identifies the... Red Hat

11/30/17 / #20170344461

Automated exception resolution during a software development session based on previous exception encounters

Automated exception resolution during a software development session based on previous exception encounters is disclosed. A first software development session of a user is monitored. A first exception during the first software development session is detected. In response to detecting the first exception, first contextual information is obtained from the... Red Hat

11/30/17 / #20170344462

Preservation of modifications after overlay removal from a container

An example method of preserving a modification to an internal state of a computer system includes applying an overlay on a target container. The overlay includes a set of events corresponding to a first set of modifications to a computer system. The method also includes after applying the overlay, receiving... Red Hat

11/30/17 / #20170344560

Distributed file system with integrated file object conversion

Systems and methods for enhancing a distributed file system to provide multiple formats of a file object by creating the file object in a requested format. An example method may comprise: receiving, by a distributed file system comprising a plurality of nodes, a request for a file object in a... Red Hat

11/23/17 / #20170337054

Source to image transformation pipeline for a platform-as-a-service system

Implementations provide for a source to image transformation pipeline for a Platform-as-a-Service (PaaS) system. A method of the disclosure includes receiving a request to create an application for execution on a Platform-as-a-Service (PaaS) system, identifying, by a processing device, at least one of language or a framework corresponding to the... Red Hat

11/09/17 / #20170323024

Camera-activated data transfer from a source computing device to a target computing device

Mechanisms for transferring data from a source computing device to a target computing device are provided. A filename identifier (ID) that identifies a file stored on the source computing device is presented on a display device. A selection of the filename ID is received. A unique identifier is generated, and... Red Hat

10/26/17 / #20170310494

Measuring resource consumption in a multi-tenant platform-as-a-service (paas) system

Implementations for measuring resource consumption in a cloud provider system are disclosed. A method of the disclosure includes determining that a resource of an application of a cloud provider system is initializing, determining whether each operation in a list of initialization operations used in the initialization of the resources is... Red Hat

10/19/17 / #20170300245

Reducing memory inconsistencies between synchronized computing devices

Mechanisms for reducing memory inconsistencies between two synchronized computing devices are provided. A first hypervisor module of a first computing device iteratively determines that content of a memory page of a plurality of memory pages has been modified. The content of the memory page is sent to a second hypervisor... Red Hat

10/19/17 / #20170300262

Logical address space for storage resource pools

A request to provide storage resources for an application may be received and storage resource pools that are available to provide storage resources may be identified. A determination may be made as to whether any of the storage resource pools has an available amount of storage resources to provide the... Red Hat

10/19/17 / #20170300350

Matching resources associated with a virtual machine to offered resources

A request to instantiate one or more virtual machines in a cloud may be received. The request may specify a service level agreement (SLA). A specification for resources to instantiate the virtual machine in view of a type of the virtual machine and the SLA may be determined. A value... Red Hat

10/12/17 / #20170295059

Distributed remote execution

A remote execution request is received from a client, specifying first and second remote execution tools and execution data pertaining to the tools and comprising a query to select host machines. First and second host machines are selected in view of a result of the query and the first and... Red Hat

10/12/17 / #20170295228

Using a shared data store for peer discovery

An example method includes: identifying, by a new node, an address of a shared data store comprising information on a current membership in a peer-to-peer system, wherein the shared data store is shared by a plurality of nodes that are current members of the peer-to-peer system, wherein the shared data... Red Hat

10/05/17 / #20170284815

Providing an instruction notification for navigation

A mechanism for providing an instruction notification for navigation. A method includes receiving destination data of a user device and generating default navigation instruction in view of the destination data. The default navigation instruction provides directions from a first location of the user device to a second location of the... Red Hat

10/05/17 / #20170286445

Migrating lock data within a distributed file system

Systems and methods for migrating locking data for a file system object within a distributed file system. An example method may comprise: initiating a transfer of locking data from a first node of a distributed file system to a second node of the distributed file system, wherein the locking data... Red Hat








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Red Hat in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Red Hat with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###