Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Red Hat Inc patents


Recent patent applications related to Red Hat Inc. Red Hat Inc is listed as an Agent/Assignee. Note: Red Hat Inc may have other listings under different names/spellings. We're not affiliated with Red Hat Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "R" | Red Hat Inc-related inventors


Node proximity detection for high-availability applications

Systems and methods for detecting when related applications are running on nodes that that located near one another. An example method may comprise: analyzing beacon data to determine a physical location of a first node and a physical location of a second node; determining an application of the first node and an application of the second node are related applications; detecting the physical location of the first node and the physical location of the second node are within a proximity threshold; and generating, by a processing device, a notification indicating the related applications of the first node and the second node are within the proximity threshold.. ... Red Hat Inc

Virtual machine exit support by a virtual machine function

Systems, methods, and techniques for securing a state of a guest are provided. An example method includes determining, by a virtual machine function within a guest, a guest central processing unit (cpu) state that is stored in one or more registers of a cpu and associated with the guest. ... Red Hat Inc

Supporting secure layer extensions for communication protocols

An implementation of the disclosure provides an apparatus comprising: a memory to store a plurality of handshake responses to authenticate client communications; and a processing device, operatively coupled to the memory, to: receive a handshake request from a client device the handshake request comprising an identifier of a communication protocol supported by the client device. A secure layer extension is extracted from the identifier of the communication protocol. ... Red Hat Inc

Memory-mapped input/output (i/o) channel

Various examples are directed to systems and methods for utilizing a memory-mapped i/o channel. A first application may request that a message be sent to a channel counterparty. ... Red Hat Inc

Rps support for nfv by system call bypass

A system for receive packet steering (rps) support for network function virtualization (nfv) by system call bypass includes a memory, a plurality of central processing units (cpus) in communication with the memory, an operating system, and a network interface controller (nic) including a receive queue. The system also includes a driver thread and a plurality of forwarding threads. ... Red Hat Inc

Enabling additional metrics in a monitoring system to diagnose problems

Systems and methods for enabling additional metrics in a monitoring system to diagnose problems are disclosed. An example method may include collecting first metric data at a first collection frequency, determining whether the first metric data exceeds a first boundary defined by a first metric rule, responsive to determining that the first metric data exceeds the first boundary, collecting second metric data at a second collection frequency and collecting the first metric data at a third collection frequency, the second metric data and the third collection frequency defined by the first metric rule, determining whether the first metric data no longer exceeds the first boundary, and responsive to determining the first metric data no longer exceeds the first boundary, terminating collection of the second metric data while continuing to collect the first metric data at the first collection frequency.. ... Red Hat Inc

Blockchain-based software instance usage determination

Blockchain-based software instance usage determination is disclosed. A span identifier that identifies a span is received. ... Red Hat Inc

Web-based support subscriptions

Embodiments pertain generally to a method for providing subscription services in view of virtual machines. The method includes determining that a user is enrolled for a continuous availability service and determining, in view of the continuous availability service, that the service provider is to instantiate a virtual machine for the user to continue execution of operations executed on a client machine. ... Red Hat Inc

Supporting security access controls in an overlay filesystem

An implementation of this disclosure provides a system comprising memory to store a plurality of layers and a processing device coupled to that memory to set up the layers and to mount them into an overlay. The layers comprise an upper and one or more lower layers. ... Red Hat Inc

Systems and methods for providing processor state protections in a virtualized environment

Methods, systems, and computer program products are included for providing protections to a processor state of a virtual machine. An example method includes providing, to a processor, instructions corresponding to a virtual machine. ... Red Hat Inc

Non-persistent mode for network connection

Systems and methods for enhanced network connection privacy. An example method may comprise: receiving a selection to activate a non-persistent mode for a network manager of a client device, the non-persistent mode preventing tracking of network locations accessed by the client device; activating the non-persistent mode for the network manager; and while the non-persistent mode is activated for the network manager: receiving a request to connect to a network; and performing, via the network manager, a set of operations to establish a connection with the network, the set of operations excluding storing information revealing the network connection in persistent memory of the client device.. ... Red Hat Inc

Keyboard input corresponding to multiple languages

A method and system for displaying words with a script corresponding to the language of the words, where an input word is received and the system determines whether the word is in a first language list. If the word is in the first language list, the word is displayed in a first script. ... Red Hat Inc

Secure zero-copy packet forwarding

A hypervisor detects a virtual device configured by a virtual machine, generates a para-virtualized networking interface between the virtual device and a memory space within hypervisor memory, maps the memory space to a peripheral component interconnect (pci) memory space of the virtual machine, and configures the memory space to be accessible to a physical device via direct memory access (dma), where the physical device is associated with the virtual device of the virtual machine. The hypervisor then transfer packets between the virtual machine and the physical device using the para-virtualized networking interface.. ... Red Hat Inc

Page cache management during migration

Systems and methods for page cache management during migration are disclosed. An example method may include initiating, by a processing device of a source host machine, a migration process for migration of a virtualized component from the source host machine to a destination host machine. ... Red Hat Inc

08/23/18 / #20180239661

Generating targeted analysis results in a support system

Generating targeted analysis results in a support system is disclosed. Computing device information about a supported computing device in which a problem was encountered is received. ... Red Hat Inc

08/23/18 / #20180239652

Lightweight thread synchronization using shared memory state

A system and method for lightweight thread synchronization using a shared memory state includes exposing, by an operating system executing on one or more processors, a memory mapping interface. The one or more processors may execute a first thread and a second thread. ... Red Hat Inc

08/23/18 / #20180239629

Virtual processor scheduling via memory monitoring

Systems and methods for scheduling virtual processors via memory monitoring are disclosed. In one implementation, a hypervisor running on a host computer system may detect a task switch event associated with a virtual processor running on a physical processor of the host computer system. ... Red Hat Inc

08/23/18 / #20180239627

Dynamic guest controlled halt polling

A system and method for dynamic guest controlled halt polling includes a memory, one or more physical processors in communication with the memory, a virtual machine executing on the one or more physical processors, and a hypervisor executing on the one or more physical processors. In an example, the hypervisor detects a request to disable halt polling. ... Red Hat Inc

08/23/18 / #20180239626

Efficient virtual machine memory monitoring with hyper-threading

A system and method for efficient virtual machine memory monitoring with hyper-threading includes executing, by a hypervisor executing on a plurality of physical processors, a virtual central processor unit (vcpu) of a virtual machine on a first hyper-thread. The plurality of physical processors include a first physical processor having the first hyper-thread and a second hyper-thread. ... Red Hat Inc

08/23/18 / #20180239625

Cpu overcommit with guest idle polling

A system for cpu overcommit with guest idle-polling includes a memory, a plurality of host cpus in communication with the memory, a virtual machine, and a hypervisor. The plurality of host cpus include a first host cpu and a second host cpu. ... Red Hat Inc

08/23/18 / #20180239624

Preloading enhanced application startup

Preloading enhanced application startup is disclosed. For example, a first local socket associated with a first copy of an executable program loaded in a memory receives a first instruction to launch a second copy of the executable program. ... Red Hat Inc

08/23/18 / #20180239620

Transparent fast application launcher

Methods and apparatus for a transparent fast application launcher are disclosed. For example, an executable loader receives a first request to load and then loads a first copy of an executable program into a memory, including resolving and loading at least one shared library associated with the executable program to the memory. ... Red Hat Inc

08/16/18 / #20180234247

Mixed checksum injection for content verification on multiple platforms

A mixed checksum injection system includes a memory, at least one processor in communication with the memory, a data repository including content, and a server including a crms. The crms executes on the at least one processor to generate a plurality of checksum values for the content. ... Red Hat Inc

08/16/18 / #20180232389

Generating file usage information

Embodiments relate to systems and methods for tracking local and remote file usage, and aggregating the resulting file usage statistics for presentation to a user. The operating system of a local computer can track and generate local file usage statistics, such as most recently used files and editing time. ... Red Hat Inc

08/16/18 / #20180232288

Driver switch for device error recovery for assigned devices

An error recovery system includes a memory, a processor in communication with the memory, a primary device, a backup device, a hypervisor executing on the processor, and a virtual machine. The virtual machine includes a guest operating system (os) executing on the hypervisor, a pass-through device, and a guest driver. ... Red Hat Inc

08/09/18 / #20180227249

Adjusting buffer size for network interface controller

Systems and methods for adjusting the receive buffer size for network interface controllers. An example method may comprise: maintaining, by a computer system, a moving window referencing a pre-defined number of incoming data packets; responsive to receiving a new data packet, shifting the moving window to include the new data packet while excluding a least recently received data packet; calculating a weighted average value of sizes the incoming data packets referenced by the moving window, wherein a most recently received data packet is associated with a first weight that is higher that a second weight associated with a least recently received data packet; and adjusting, using the weighted average value, a size of a buffer allocated for incoming data packets.. ... Red Hat Inc

08/09/18 / #20180227202

Reporting progress of operation executing on unreachable host

A method includes receiving, by a processing device of a first host from a virtualization manager via a network connection, a request to perform a storage operation on a storage volume associated with a storage domain, initiating the storage operation on the storage volume, responsive to determining that the network connection has been lost, storing a progress indicator of the operation in a volume metadata associated with the storage volume, and transmitting, to the virtualization manager, the progress indicator stored in the volume metadata.. . ... Red Hat Inc

08/09/18 / #20180225313

Managing a deduplicated data index

Among other things, in one aspect, in general, a system for managing data in a data storage system includes a plurality of index nodes each storing a map of entries, each entry of the map including an identifier corresponding to a particular portion of data stored in the data storage system, and metadata indicating a location where the particular portion of data is stored in the data storage system, and one or more supernodes configured to return an identification of an index node that recently submitted a request for a particular identifier associated with at least one of the portions of data.. . ... Red Hat Inc

08/09/18 / #20180225225

Secure data management

A computing device can securely and selectively enable a remote computing device to decrypt encrypted data that is stored remotely (e.g., within a cloud-computing environment). For example, the computing device can transmit an encrypted communication to a processing device of the remote computing device. ... Red Hat Inc

08/09/18 / #20180225221

Post-copy vm migration speedup using free page hinting

A system and methods for migrating a virtual machine (vm). In one embodiment, a hypervisor receives a request to migrate the contents of a memory of a source vm in a first physical memory area to a destination vm in a second physical memory area, where the first and second physical memory areas are disjoint. ... Red Hat Inc

08/09/18 / #20180225182

Fault isolation and identification in versioned microservices

A method for identifying and isolating faults in versioned microservices includes a request replicator receiving an original request, and determining whether to replicate the original request. The request replicator replicates the original request creating one or more replicated requests, including a first replicated request. ... Red Hat Inc

08/09/18 / #20180225178

Failure recovery in shared storage operations

Systems and methods for failure recovery in shared storage operations. An example method comprises: acquiring, by a processing device, a lock with respect to a storage domain comprising a specified disk image; creating a transaction marker associated with the disk image, wherein the transaction marker is represented by a pre-defined tag associated with a logical volume of a block-based storage, wherein the logical volume implements a data area of a new volume associated with the disk image; creating a component of the new volume associated with the disk image; destroying the transaction marker by removing the pre-defined tag representing the transaction marker from the logical volume; and releasing the lock with respect to the storage domain.. ... Red Hat Inc

08/09/18 / #20180225141

Guest-influenced packet transmission

A method performed by a physical computing system includes, with a hypervisor, receiving a first packet from a virtual machine managed by the hypervisor, the first packet for transmission to a destination, the first packet including a first queue identifier, selecting a first transmission queue from a plurality of available transmission queues to transmit the first packet, the first transmission queue being based on the first queue identifier, receiving a second packet from the virtual machine, the second packet for transmission to the destination, the second packet including a second queue identifier, and selecting a second transmission queue from the plurality of available transmission queues to transmit the second packet, the second transmission queue being based on the second queue identifier.. . ... Red Hat Inc

08/09/18 / #20180225051

Managing data replication in a data grid

Data replication in a data grid can be managed. For example, a computing device usable in the data grid can determine a version number for a key-value pair. ... Red Hat Inc

08/02/18 / #20180219955

Capacity scaling of network resources

A mechanism for adjusting a resource availability of a data center is disclosed. A processing device may receive a first request from a client device, wherein the request includes a set of instructions and a host name assigned to an internet protocol (ip) address of a server at a first data center to execute the set of instructions. ... Red Hat Inc

08/02/18 / #20180217939

Deferring registration for dma operations

Systems and methods for deferring registration for direct memory access (dma) operations. An example method comprises: receiving a memory region registration request identifying a memory region for a direct memory access (dma) operation; generating a local key for the memory region; deferring registration of the memory region until receiving a dma work request referencing the local key; and responsive to receiving the dma work request, registering the memory region for dma transfer.. ... Red Hat Inc

08/02/18 / #20180217861

Methods and systems for establishing connections associated with virtual machine migrations

An example method of establishing one or more connections between a target host machine and a remote endpoint connected to a virtual machine (vm) running on a source host machine includes receiving, by a target hypervisor executable on a target host machine, a list of one or more remote endpoints to which a vm executable on a source host machine is connected. The source and target host machines are coupled to a network. ... Red Hat Inc

08/02/18 / #20180217765

Deleting disks while maintaining snapshot consistency in a virtualized data-center

An implementation of the disclosure provides a system comprising a memory to store disk images and a processing device, operatively coupled to the memory. The processing device is to identify a first disk image comprising a volume chain. ... Red Hat Inc

07/26/18 / #20180213035

File replication using file content location identifiers

Systems and methods for file replication using file content location identifiers. An example method comprises: receiving, by a processing device, an index node number identifying a first index node associated with a file residing on a first file server, the first index node referencing a physical location of contents of the file; identifying a replica of the file residing on a second file server; assigning the index node number of the first index node to a second index node referencing a physical location of contents of the replica of the file on the second file server; performing, by the processing device, a file system operation by accessing the replica of the file referenced by the index node number.. ... Red Hat Inc

07/26/18 / #20180212981

Disabling applications on a client device remotely

Systems and methods for disabling applications on a client device remotely are disclosed. An example method may comprise establishing, via a network interface device, a communication connection with a client computing device, receiving, via the communication connection, a list of applications installed on the client computing device, comparing the received list of applications to a blacklist of applications, identifying, in view of the comparing, an installed application on the received list of applications, the installed application comprised in the blacklist of applications, identifying a severity score corresponding to the installed application and an action corresponding to the severity score, and responsive to the identifying the severity score and the corresponding action, causing, by the processing device, the corresponding action to be performed with respect to the client computing device, the corresponding action pertaining to the installed application.. ... Red Hat Inc

07/26/18 / #20180212945

Authenticator plugin interface

Authenticator plugin interface for an enterprise virtualization portal is provided. An example method for evaluating a portal access request may comprise: receiving, by a virtualization management platform, a request initiated by a requestor for access to an enterprise virtualization portal associated with the virtualization management platform, the request comprising a login credential; transmitting, to a first authentication system, a first authentication query comprising an identifier of a first data type, and a first value of the first data type, wherein the first value is derived from the login credential; receiving a first response message comprising an identifier of a second data type, and an authentication response of the second data type; and responsive to evaluating the authentication response, granting the requestor access to the enterprise virtualization portal.. ... Red Hat Inc

07/26/18 / #20180212923

Domain name system network traffic management

A mechanism for replacing a first internet protocol (ip) address with a second ip address in a response to a request to a server from an application is disclosed. A processing device may receive a request from an application. ... Red Hat Inc

07/26/18 / #20180211031

Virtual machine malware scanning

Methods, systems, and computer program products for selecting a virtual machine to perform a task corresponding to a client request and performing the task at the virtual machine. After performing the task at the virtual machine, an indicator corresponding to a shutdown of the virtual machine is detected. ... Red Hat Inc

07/19/18 / #20180203992

Deferred subscription activation using blockchain

Deferred subscription activation using blockchain is disclosed. A first plurality of blockchain blocks that contain authorized transactions that authorize corresponding activation request transactions associated with software instances of a plurality of software instances is received. ... Red Hat Inc

07/19/18 / #20180203736

Affinity based hierarchical container scheduling

Affinity based hierarchical container scheduling is disclosed. For example, a hierarchical map identifies relationships between a plurality of nodes and hardware devices, subzones, and zones. ... Red Hat Inc

07/19/18 / #20180203635

Categorizing computing process output data streams for flash storage devices

Categorizing computing process output data streams for flash storage devices is disclosed. A first computing process characteristic of a first computing process that generates a first output data stream is determined. ... Red Hat Inc

07/19/18 / #20180203585

Visual representation of network-discovered components

Systems and methods to generate an icon that visually represents a server. An input associated with a server is identified. ... Red Hat Inc

07/12/18 / #20180198853

Open virtualized multitenant network scheme servicing virtual machine and container based connectivity

A multitenant network scheme system includes a memory, a physical processor in communication with the memory, an isolated guest on a host, a virtual switch, and a network interface controller. The isolated guest includes a virtual network interface controller (vnic). ... Red Hat Inc

07/12/18 / #20180198762

Distribution of secure data with entitlement enforcement

An example method for distributing content includes receiving a first encrypted request for content over a first encrypted connection from a client. The method also includes obtaining an unencrypted version of the first encrypted request. ... Red Hat Inc

07/12/18 / #20180196772

Uma-aware root bus selection

A method includes determining a first host non-uniform memory access (numa) node of a plurality of host numa nodes on a host machine that provides a virtual machine to a guest, the first host numa node being associated with a pass-through device, creating a virtual numa node on the virtual machine, mapping the virtual numa node to the first host numa node, adding a virtual expander to a virtual root bus of the virtual machine, and associating the virtual expander with the virtual numa node.. . ... Red Hat Inc

07/12/18 / #20180196648

Providing dynamic instrumentation using domain-specific monitoring-language-to-kernel-bytecode compilation

Providing dynamic instrumentation using domain-specific monitoring-language-to-kernel-bytecode compilation is disclosed. An instrumentation program file is converted by a compilation engine into multiple bytecode sections. ... Red Hat Inc

07/05/18 / #20180189755

Providing blockchain-based subscription-as-a-service management

Providing blockchain-based subscription-as-a-service management is disclosed. In one example, a node within a customer network begins execution of a subscription-as-a-service software instance. ... Red Hat Inc

07/05/18 / #20180189299

Content aggregation for unstructured data

A mechanism for extracting system characteristics from an unstructured data format, a semi-structured data format, or a structured data format is disclosed. A processing device may receive information associated with a computing system in an unstructured data format. ... Red Hat Inc

07/05/18 / #20180189094

Virtual machine to host device bridging

In an example embodiment, a hypervisor exposes a first guest device to a first virtual machine. The hypervisor exposes a virtual host device and a pass-through device to a second virtual machine. ... Red Hat Inc

06/28/18 / #20180181436

Lazy persistent storage volume provisioning

Methods and systems for provisioning persistent storage are disclosed. For example, a new isolated guest and associated persistent storage volume are requested to be created. ... Red Hat Inc

06/28/18 / #20180181429

Identifying application usage roles for devices provided to virtual machines

Embodiments of the disclosure provide techniques for or managing devices for a virtual machine. A method is provided that includes associating, by a processing device of a cloud management system, a device with a virtual machine. ... Red Hat Inc

06/21/18 / #20180176384

Speaker priority for conference calls

An example method for managing a conference call includes detecting multiple concurrent audio signals. The multiple concurrent audio signals include a first audio signal from a first participant on a conference call and a second audio signal from a second participant on the conference call. ... Red Hat Inc

06/21/18 / #20180176104

Generating an adjacency graph from a series of linear linked data structures

Implementations of the present disclosure provide for generating adjacency graph from a series of linear linked data structures. A method of one implementation includes receiving an input of a series of linear linked data structures (links). ... Red Hat Inc

06/21/18 / #20180173562

Low impact snapshot database protection in a micro-service environment

An implementation of the disclosure provides a system for generating low impact snapshots comprising a memory to store application data and a processing device coupled to the memory. The processing device is to identify a plurality of transactions within a cloud computing environment. ... Red Hat Inc

06/21/18 / #20180173550

Efficient hypervisor reporting

Mechanisms for efficient hypervisor reporting are disclosed. A first communication from a first hypervisor reporter is received that identifies a first hypervisor as a hypervisor about which the first hypervisor reporter can generate reports over time. ... Red Hat Inc

06/21/18 / #20180173289

Managing processor frequencies

Processor frequencies can be managed. For example, a computing device can determine (i) a first estimate of an operating characteristic of a processor in using a first pair of frequencies to perform a task, and (ii) a second estimate of the operating characteristic of the processor in using a second pair of frequencies to perform the task. ... Red Hat Inc

06/14/18 / #20180167601

Flicker-free remoting support for server-rendered stereoscopic imaging

A system includes a memory, one or more processors, a guest virtual machine, a hypervisor, and a client. The hypervisor receives, from the client, a first notification of stereoscopic capability. ... Red Hat Inc

06/14/18 / #20180167487

Container deployment scheduling with constant time rejection request filtering

Container deployment scheduling with constant time rejection request filtering is disclosed. For example, each node in a multi-node system includes system resources with available amounts quantitatively represented by values. ... Red Hat Inc

06/07/18 / #20180159861

Access guards for multi-tenant logging

A multi-tenant logging system that allows a user to have an individual profile that controls the user's access to tenant logs is provided. The system includes a plugin that adds features of an access control list (acl) to indexes of a logging stack based on a user's access role. ... Red Hat Inc

06/07/18 / #20180157518

Batched memory page hinting

Systems and methods for batching memory page hints that may enable a hypervisor to reuse a particular memory page without copying the particular memory page to and from swap space. An example method may comprise: releasing, by a processing device executing a virtual machine, memory pages in use by the virtual machine; adding the memory pages to a set of memory pages; determining, by the virtual machine, that the set of memory pages satisfies a threshold quantity; and responsive to the determining, notifying a hypervisor that the memory pages released by the virtual machine are available for reuse by the hypervisor without being copied to persistent storage.. ... Red Hat Inc

06/07/18 / #20180157508

Co-locating containers based on source to improve compute density

Co-locating containers based on source to improve compute density is disclosed. For example, a repository stores image files associated with metadata. ... Red Hat Inc

06/07/18 / #20180157469

Compiler integrated intelligent deserialization framework

An example system includes a memory, a processor in communication with the memory, and a compiler that includes a serializer and a deserializer. The compiler executes on the processor to receive an input including a plurality of tags associated with a message. ... Red Hat Inc

05/31/18 / #20180152415

Mac address allocation for virtual machines

Systems and methods for network identifier allocation for virtual machines are described. An example method may include: determining that a first network identifier has not been assigned to a virtual machine, transmitting a network identifier request to a server, and assigning a network identifier to the virtual machine based on a data packet directed to the virtual machine, the data packet comprising the second network identifier.. ... Red Hat Inc

05/31/18 / #20180152363

Recovery from a networking backend disconnect

Methods, systems, and computer program products are included for processing one or more buffers in a networking queue. An example method includes receiving one or more transmit requests or receive requests from a guest running on a virtual machine. ... Red Hat Inc

05/31/18 / #20180150348

Automated problem resolution

Mechanisms for generating a remediation script to resolve a problem condition in a remote computing device are provided. System information associated with a remote computing device is accessed. ... Red Hat Inc

05/31/18 / #20180150327

Lockless free memory ballooning for virtual machines

An example method for managing memory includes receiving an inflate notification including a first identifier corresponding to a first time. The inflate notification indicates that a set of guest memory pages is unused by the guest at the first time. ... Red Hat Inc

05/31/18 / #20180150311

Virtual processor state switching virtual machine functions

A system and method for virtual processor state switching virtual machine functions includes a memory, one or more processors, in communication with the memory, a virtual machine executing on the one or more processors, a virtual machine function executing on the virtual machine, and a hypervisor executing on the one or more processors. The hypervisor receives from the virtual machine function a request to save a state of the virtual machine function in hypervisor memory. ... Red Hat Inc

05/31/18 / #20180150260

Key-based memory deduplication protection

Methods, systems, and computer program products are included for deduplicating one or more memory pages. A method includes receiving a first key from a first application running on a computer system. ... Red Hat Inc

05/31/18 / #20180150258

Size adjustable volumes for containers

Implementations of the disclosure provide for size adjustable volumes for containers. A method of the disclosure includes determining, by a processing device of the paas system, a size used space in a storage volume with respect to a container associated with an execution of an application. ... Red Hat Inc

05/31/18 / #20180150232

Memory overcommit by speculative fault

An example method of allocating memory pages for a guest includes receiving, by a hypervisor, a request to allocate a plurality of guest memory pages for a guest running on a virtual machine. The virtual machine and the hypervisor run on a host machine. ... Red Hat Inc

05/24/18 / #20180146072

Creation of a binding based on a description associated with a server

An indication of an update to a server system may be received. In response to receiving the indication that the server system has been updated, a description associated with resources of the server system may be received. ... Red Hat Inc

05/24/18 / #20180144121

Non-repudiation of broadcast messaging

A method performed by a computing system includes receiving from a publishing entity a message and a first piece of evidence that the message was sent by the publishing entity, time-stamping the first piece of evidence, storing the time-stamped first piece of evidence, sending the message to a first subscribing entity, receiving from the first subscribing entity a second piece of evidence that the message was received by the first subscribing entity, time-stamping the second piece of evidence, and storing the time-stamped second piece of evidence.. . ... Red Hat Inc

05/24/18 / #20180144025

Map-reduce job virtualization

A method and system is disclosed that identifies a job written in a first language. The job is to be performed in parallel on a plurality of nodes of a plurality of clusters. ... Red Hat Inc

05/24/18 / #20180143848

Using hypervisor trapping for protection against interrupts in virtual machine functions

A system, methods, and apparatus for using hypervisor trapping for protection against interrupts in virtual machine functions are disclosed. A system includes memory, one or more physical processors, a virtual machine executing on the one or more physical processors, and a hypervisor executing on the one or more physical processors. ... Red Hat Inc

05/24/18 / #20180143847

Dynamic batch management of shared buffers for virtual machines

Methods, systems, and computer program products for providing dynamic batch management of shared packet buffers are disclosed. A virtualized computer system may include a hypervisor with access to memory and executed by a processor to maintain a pool of host memory to store a plurality of incoming network packets received by a network device, adjust a number of memory buffers associated with the pool of host memory to resize the pool of host memory, receive an indication of an incoming network packet stored in the pool of host memory by the network device, and provide the incoming network packet to a guest. ... Red Hat Inc

05/24/18 / #20180143828

Efficient scheduling for hyper-threaded cpus using memory monitoring

A system and method for scheduling of hyper-threaded cpus using memory monitoring includes a memory with an operating system memory and a physical processor in communication with the memory. The physical processor includes a first hyper-thread and a second hyper-thread. ... Red Hat Inc

05/17/18 / #20180139221

Multi-tenant cloud security threat detection

Methods and systems for security threat detection are disclosed. For example, a virtual machine with a network interface of a plurality of virtual machines includes a plurality of applications including first and second applications. ... Red Hat Inc

05/17/18 / #20180137018

Non-blocking listener registration in the presence of data grid nodes joining the cluster

A method of communicating data in a node cluster of a data grid is described. The method includes receiving, at a listener of a first node, data from a second node that is filtered using the filter during a search query of a node cluster. ... Red Hat Inc

05/17/18 / #20180136977

Multi-queue device assignment for application groups

A system and method of device assignment includes receiving, by a supervisor, an assignment request to assign a device to a first application and a second application. The first application is associated with a first memory and has a first address. ... Red Hat Inc

05/17/18 / #20180136959

Executing code referenced from a microservice registry

Methods and systems for executing code referenced from a microservice registry are disclosed. For example, a microservice registry is stored in a memory. ... Red Hat Inc

05/17/18 / #20180136868

Translation bypass by host iommu for systems with virtual iommu

A system and method of translation bypass includes a hypervisor retrieving a physical bus address range from a host input-output memory management unit. The hypervisor reserves an allowed address range of the physical bus address range, and sends the allowed address range to a guest virtual machine. ... Red Hat Inc

05/17/18 / #20180136867

Address based host page table selection

A page table selection system includes a memory, a processor in communication with the memory, a virtual machine, and a hypervisor. The virtual machine includes a guest executing on the processor. ... Red Hat Inc

05/10/18 / #20180129494

Detect application defects by correlating contracts in application dependencies

An example method of detecting incompatibility between an application and an application dependency includes identifying a first set of contracts exposed in a first version of an application dependency. Each contract includes a symbol and a corresponding signature. ... Red Hat Inc

05/10/18 / #20180129479

Container images by composition

Methods and systems for creating containers by composition are disclosed. For example, a container image includes multiple layers, including first and second layers, which an image engine determines are read only or unmodified by adding any other layers. ... Red Hat Inc

05/03/18 / #20180124055

Decoupling container image layers to preserve privacy

An example system includes a memory, one or more processors in communication with the memory, and a container image generator. The container image generator receives a first set of information. ... Red Hat Inc

05/03/18 / #20180121266

Idempotent mode of executing commands triggered by complex event processing

Systems and methods for enforcing the idempotent mode of executing commands triggered by complex event processing. An example method may comprise: receiving, by a processing device, an event data item comprising a value of a state variable; applying an event processing rule to the event data item, by evaluating a conditional statement comprising the value of the state variable, to generate an event processing command; producing a command identifier identifying the event processing command; and responsive to failing to insert the command identifier into a hash table employed for storing identifiers of executed commands, discarding the event processing command.. ... Red Hat Inc

05/03/18 / #20180121247

Supporting quality-of-service for virtual machines based on operational events

An implementation of the disclosure provides a method. The method comprises identifying a quality-of-service level associated with a virtual machine (vm) executed by a processing device of a host machine. ... Red Hat Inc

05/03/18 / #20180121243

Identifying memory devices for swapping virtual machine memory pages

Systems and methods for identifying memory devices for swapping virtual machine memory pages. An example method may comprise: identifying, by a processing device, a workload type associated with a workload being executed by a computer system; identifying a memory device associated with the workload type; evaluating a memory pressure metric reflecting a period of time during which an application being executed by the computer system has been blocked by a memory allocation operation; and responsive to determining that the memory pressure metric exceeds a threshold value, allocating a memory block on the identified memory device.. ... Red Hat Inc

04/19/18 / #20180109642

Persistent-memory management

Data can be stored in a persistent-memory device, rather than a hard drive, of a computing device. A copy of the data can also be stored in another persistent-memory device of a remote computing device. ... Red Hat Inc

04/19/18 / #20180109466

Utilizing access control data structures for sharing computing resources

Systems and methods for sharing resources between multiple processing streams. An example method may comprise: maintaining, by a processing device, a first variable indicating a number of processing streams waiting to access a resource; performing an operation on a second variable comprising a first portion and a second portion, the operation comprising updating the first portion to reflect a number of available units of the resource and further comprising reading the second portion reflecting a value of the first variable.. ... Red Hat Inc

04/19/18 / #20180109464

Dynamically adjusting resources to meet service level objectives

The present disclosure provides for dynamic resource allocation to a container on a host. For example, in a first directed acyclic graph (“dag”), a cpu resource usage of a container may be detected. ... Red Hat Inc

04/19/18 / #20180109387

Continued verification and monitor of application code in containerized execution environment

A method includes receiving, by a processing device executing a validation service, a validation data associated with a first instance of an execution environment, the validation data provided by a publication service associated with a second instance of the execution environment, acquiring a decryption key from a release server associated with the execution environment, determining, using the decryption key, a validation status associated with the first instance in view of the validation data, and notifying the release server of the validation status.. . ... Red Hat Inc

04/19/18 / #20180107729

Method for generating synthetic data sets at scale with non-redundant partitioning

An example system includes a first machine and a second machine, a clustering module, and a training module. The clustering module receives a plurality of data sets, each including attributes. ... Red Hat Inc

04/19/18 / #20180107607

Page table entry caching for virtual device emulation

A hypervisor configures a page table entry in a host page table to map an address associated with memory-mapped input-output (mmio) for a virtual device of a guest of the hypervisor to an input/output (i/o) instruction. The address is marked in the page table entry as a hypervisor exit entry, and the page table entry to cause an exit to the hypervisor responsive to the guest attempting to access the address. ... Red Hat Inc

04/19/18 / #20180107586

Automatically validated release candidates for data-driven applications by automated publishing of integration microservice and data container tuple

A system and method for automatically validated release candidates for data-driven applications includes monitoring a first microservice and a second microservice. A respective functionality of each microservice is independently verifiable. ... Red Hat Inc

04/12/18 / #20180101564

Transaction compensation for single phase resources

A method including initiating a transaction comprising a plurality of data items in one or more data stores, wherein the transaction is to cause a change to at least a first data item of the plurality of data items. The method also including generating a first transactional data usable to undo the change to the first data item associated with the transaction, wherein the first transaction data comprises a serialized compensation data structure to undo the change to the first data item and complementary information regarding activities complementary to the undo operation.. ... Red Hat Inc

04/12/18 / #20180101452

Memory first live snapshot

The subject matter of this specification can be implemented in, among other things, a method including creating a new disk file at a reference point-in-time, wherein an original disk file is a backing file of the new disk file, copying the original disk file to a disk snapshot file, in response to the original disk file being copied to the disk snapshot file, merging the original disk file and the new disk file to form a merged file, wherein a virtual machine is to continue to perform disk operations using the merged file, and determining whether the merged file is synchronized with the original disk file and the new disk file by determining whether entries of a bitmap for the merged file match corresponding entries of a bitmap for the new disk file.. . ... Red Hat Inc

04/12/18 / #20180101408

Node selection for a new application in a multi-tenant cloud hosting environment

A method includes instantiating a first web application for a first application owner on a virtual machine and instantiating a second web application for a second application owner. The second application owner is different than the first application owner. ... Red Hat Inc

03/29/18 / #20180091584

Identifying a component cluster

Mechanisms for identifying a component cluster among a plurality of components in a distributed computing environment are disclosed. Configuration information that corresponds to the plurality of components is accessed. ... Red Hat Inc

03/29/18 / #20180091555

Method of managing system utilities access control

An access control system includes a memory, a processor, a host operating system (os) executing on the processor, a container on the host os, and a security manager running on the host os. The container has a set of access control rules and includes a containerized utility. ... Red Hat Inc

03/29/18 / #20180089421

Identifying exploitable code sequences

A system and method for identifying exploitable code sequences. In one implementation, a first processing device identifies an executable portion of a program and a set of registers of a second processing device, and stores a set of addresses in the set of registers. ... Red Hat Inc

03/29/18 / #20180089089

Guest ordering of host file system writes

Systems and methods for data storage management technology that enables a guest module of a virtual machine to indicate an order in which a host module should write data from physical memory to a secondary storage. An example method may comprise: identifying, by a processing device executing a host module, a plurality of modifications to direct access excited (dax) memory made by a plurality of direct access operations executed by a guest module of a virtual machine; determining, by the host module, an order of the plurality of modifications to dax memory; receiving, by the host module, a synchronization request from the guest module; and responsive to the synchronization request, copying, by the host module, data from the dax memory to a secondary storage in view of the order of the plurality of modifications.. ... Red Hat Inc

03/29/18 / #20180088975

Virtual machine live migration using intelligent order of pages to transfer

An example method for virtual machine (vm) live migration using intelligent order of pages to transfer includes receiving a request to live migrate a vm, transferring memory pages of the vm that are identified as at least one of read-only or executable in a first iteration of vm memory page transfer of the live migration, transferring, as part of a second iteration of the transfer, prioritized memory pages of the vm that have not been transferred as part of the first iteration, and transferring, as part of a third iteration of the transfer, other memory pages of the vm that have not been transferred as part of the first and second iterations and that are not identified as ignored memory pages of the vm, wherein the other memory pages of the vm comprise de-prioritized memory pages of the vm that are transferred last in the third iteration.. . ... Red Hat Inc

03/29/18 / #20180088974

Input/output command rebalancing in a virtualized computer system

The present disclosure provides new methods and systems for input/output command rebalancing in virtualized computer systems. For example, an i/o command may be received by a rebalancer from a virtual queue in a container. ... Red Hat Inc

03/22/18 / #20180083947

Stateless server-based encryption associated with a distribution list

An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a plurality of destination clients. The method also includes receiving, by a decryption module of the decryptor device, encrypted electronic messages from the plurality of destination clients. ... Red Hat Inc

03/22/18 / #20180083778

Binding data to a network in the presence of an entity with revocation capabilities

Implementations of the disclosure provide for binding data to a network in the presence of an entity with revocation capabilities. A cryptographic system is provided that includes a memory to store revocation information comprising a plurality of identifiers and a processing device operatively coupled to the memory. ... Red Hat Inc

03/22/18 / #20180081683

Task assignment using machine learning and information retrieval

An example method of assigning a task to a developer includes partitioning, based on a first set of developer attributes, a list of developers into a plurality of developer clusters. The method also includes for a plurality of tasks, identifying a set of developers assigned to the respective task, identifying a developer cluster including a greater number of developers from the respective set of developers than another developer cluster, and classifying the respective task as belonging to the respective developer cluster. ... Red Hat Inc

03/15/18 / #20180074864

Time-bound conditional resource deallocation

Method and system for deallocating shared system resources. In an example, the system includes a memory storing a system resource allocation database, a processor running a scheduler, including an i/o and a scheduler engine. ... Red Hat Inc

03/08/18 / #20180069842

Binding data to a network in the presence of an entity

Implementations of the disclosure provide for binding data to a network in the presence of an entity. In one implementation, a cryptographic system is provided. ... Red Hat Inc

03/01/18 / #20180063083

Guest netfilter protection by virtual machine function

A system and method for guest netfilter protection using a virtual machine function includes a memory, one or more processors, in communication with the memory, a virtual machine, a hypervisor, and a virtual network interface controller on the virtual machine. The virtual machine and the hypervisor are configured to execute on the one or more processors. ... Red Hat Inc

03/01/18 / #20180062969

Protocol-based packet traffic creation

Mechanisms for packet creation are provided. A packet capture including a plurality of packets is accessed. ... Red Hat Inc

03/01/18 / #20180062952

Supplementing log messages with metadata

Mechanisms for supplementing log messages are disclosed. A log collection agent initiates, to a centralized management system, a request for metadata associated with a first executing process of the computing device. ... Red Hat Inc

03/01/18 / #20180062926

Discovering and mitigating out-of-sync network parameters

A system for discovering and mitigating out-of-sync network parameters may determine that a first value for a parameter of a set of parameters of a logical network associated with a host computing system is different from a second value specified for the parameter in a network definition. The system may further presenting, via a user interface, the first value and the second value for the parameter and receiving, via the user interface, a confirmation of validity of the first value for the parameter. ... Red Hat Inc

03/01/18 / #20180060592

Automatic parameter value generation

Automatic parameter value generation is disclosed. It is determined that a parameter value generation trigger associated with a parameter has occurred. ... Red Hat Inc

03/01/18 / #20180060327

Calculating a failure intensity value for a group of search sessions

Calculating a failure intensity value for a group of search sessions is provided. In one example, a method for calculating a failure intensity value for a group of search sessions is provided. ... Red Hat Inc

03/01/18 / #20180060254

Quality of service enforcement and data security for containers accessing storage

Systems and methods for quality of service (qos) enforcement and data security for containers accessing storage. An example method may comprise: receiving an input/output (i/o) call initiated by a container running on a host computer system to request data from a storage device; translating the i/o call into a device emulator call to a device emulator emulating a storage device; sending the device emulator call to the device emulator; and receiving, from the device emulator, a response comprising the data retrieved from the storage device.. ... Red Hat Inc

03/01/18 / #20180060249

Code loading hardening by hypervisor page table switching

Systems and methods are provided for modifying one or more guest memory permissions. An example method includes receiving a request to modify a memory permission of a guest running on a virtual machine. ... Red Hat Inc

03/01/18 / #20180060245

Hypervisor translation bypass by host iommu with virtual machine migration support

A system and method of translation bypass includes a hypervisor configuring a host input-output memory management unit to translate a guest memory of a guest virtual machine. The hypervisor reserves a first portion of the guest memory. ... Red Hat Inc

03/01/18 / #20180060103

Guest code emulation by virtual machine function

Systems and methods are provided for emulating guest code by a virtual machine function. An example method includes detecting, by a hypervisor, a request by a guest to access a resource. ... Red Hat Inc

03/01/18 / #20180060100

Virtual machine migration acceleration with page state indicators

Methods, systems, and computer program products are included for migrating a virtual machine. An example method of migrating a virtual machine includes transmitting, from a hypervisor, a migration indicator to a guest. ... Red Hat Inc

03/01/18 / #20180060097

Hyper-threading based host-guest communication

A system and method for hyper-threading based host-guest communication includes storing, by a guest, at least one request on a shared memory. A physical processor, in communication with the shared memory, includes a first hyper-thread and a second hyper-thread. ... Red Hat Inc

03/01/18 / #20180059974

Safe physical function passthrough using virtual machine functions

A system and method for safe physical function passthrough using virtual machine functions includes sending, by a guest on a virtual machine, an access request for a host device to a virtual machine function on the virtual machine. The method also includes determining, by the virtual machine function, whether the access request is valid responsive to receiving the access request. ... Red Hat Inc

03/01/18 / #20180059956

Memory deduplication based on guest page hints

Methods, systems, and computer program products are included for de-duplicating one or more memory pages. A method includes receiving, by a hypervisor, a list of read-only memory page hints from a guest running on a virtual machine. ... Red Hat Inc

03/01/18 / #20180059953

Snapshot management with an external storage service

Mechanisms for snapshot management are provided. A request that requests that a first storage entity of type volume entity be generated is sent to an external storage service via an external interface. ... Red Hat Inc

03/01/18 / #20180056185

Methods, systems, and products for control of gaming applications

Methods, systems, and products bookmark gaming applications. When a player wishes to pause a gaming application, a bookmark may be created. ... Red Hat Inc

02/22/18 / #20180054469

State analysis of remote computing images

Systems and methods for analyzing a computing image (e.g., container image, virtual disk image) while it is on a remote node in a secured environment. An example method may comprise: initiating a proxy agent on a node, the proxy agent having access to an image repository comprising an image; transmitting to the proxy agent a request for image data of the image; receiving the image data from the proxy agent; and analyzing the image data to determine a state of the image.. ... Red Hat Inc

02/22/18 / #20180054357

Discovering changes of network interface controller names

Systems and methods for discovering changes of network interface controller (nic) names are disclosed. An example method may comprise receiving new network configuration data comprising first network interface controller (nic) configuration data for a nic device that is identified by a permanent identifier (id), identifying the permanent id of the nic device in current network configuration data comprising second nic configuration data for the nic device, responsive to a first nic name corresponding to the permanent id in the new network configuration data being different than a second nic name corresponding to the permanent id in the current network configuration data, updating, by a processing device, the first nic configuration data in the new network configuration data to be the same as the second nic configuration data, and saving, by the processing device, the updated new network configuration data as the current network configuration data.. ... Red Hat Inc

02/22/18 / #20180052762

Build failure management in continuous integration environments for distributed systems

A processing device, responsive to requests for builds for an application, forces an error to occur during an execution of each request. The execution of each request represents an execution of a set of operations for providing a respective build. ... Red Hat Inc

02/22/18 / #20180052744

Tiered cloud storage for different availability and performance requirements

A system and method for a tiered cloud storage for different availability and performance requirements includes a gateway, a block store configured to cache data, and an object store configured to persistently store data. The gateway, the block store, and the object store are in a compute zone. ... Red Hat Inc

02/22/18 / #20180052728

Root cause candidate determination in multiple process systems

Root cause determination in multiple process systems is disclosed. It is determined that a first process encountered a problem at a first point in time. ... Red Hat Inc

02/22/18 / #20180052702

Coupling a host system to a virtual machine

A mechanism for managing virtual machines in a virtualization system is disclosed. A method of implementation of the disclosure includes receiving a request from a client system to route network traffic from a first network interface card (nic) of a first host system to a virtual machine. ... Red Hat Inc

02/22/18 / #20180052701

Hot-plugging of virtual functions in a virtualized environment

Implementations of the disclosure provide for hot-plugging of virtual functions in a virtualized environment. In one implementation, a computer system comprising a memory to store parameters of virtual functions and a processing device, operatively coupled to the memory is provided. ... Red Hat Inc

02/22/18 / #20180052637

Efficient image file loading and garbage collection

Method for loading and garbage collecting image files. An example system includes two memories, processors, and a garbage collector including an i/o and a garbage collector engine. ... Red Hat Inc

02/15/18 / #20180048738

Blockchain management using a device in a wireless telecommunication system

Devices in a wireless telecommunication system can implement a blockchain that is distributed among the devices. For example, a base transceiver station of the wireless telecommunication system can receive, from a mobile device, a wireless radio communication that includes information associated with a blockchain transaction. ... Red Hat Inc

02/15/18 / #20180046501

Routing table preservation for virtual machine migration with assigned devices

A migration system includes a memory, a physical processor, first and second hypervisors, first and second virtual machines, and first and second networking devices. The first hypervisor is located at a migration source location and the second hypervisor is located at a migration destination location. ... Red Hat Inc

02/15/18 / #20180046484

Program execution recording and playback

A computer system receives a first instruction identifier identifying a first instruction being executed by a first thread associated with a first virtual machine and receives a second instruction identifier identifying a second instruction being executed by a second thread associated with the first virtual machine. The system produces an execution record comprising the first instruction identifier, a first thread identifier identifying the first thread, a first timestamp reflecting a first real-time clock value associated with executing the first instruction, the second instruction identifier, a second thread identifier identifying the second thread, and a second timestamp reflecting a second real-time clock value associated with executing the second instruction. ... Red Hat Inc

02/15/18 / #20180046483

Driver switch for live migration with an assigned device

A migration system includes a memory, a physical processor in communication with the memory, a first device, a second device, a first hypervisor at a source location, a second hypervisor at a destination location, a first virtual machine, and a second virtual machine. The first virtual machine includes a guest os executing on the first hypervisor and a guest driver and the second virtual machine includes the guest os executing on the second hypervisor and the guest driver. ... Red Hat Inc

02/08/18 / #20180039594

Hot-plug of devices in virtualized computer systems

A system and method for enabling hot-plugging of devices in virtualized systems. A hypervisor obtains respective values representing respective quantities of a resource for a plurality of virtual root buses of a virtual machine (vm). ... Red Hat Inc

02/01/18 / #20180034823

Management of service accounts

The present disclosure provides new methods and systems for managing access to service accounts by user accounts. For example, a user account and a service account may be created. ... Red Hat Inc

02/01/18 / #20180034791

Secret keys management in a virtualized data-center

Implementations of the disclosure provide for secret keys management in a virtualized data-center. In one implementation, a system is provided. ... Red Hat Inc

02/01/18 / #20180033424

Voice-controlled assistant volume control

A method includes receiving a voice command, determining, by a processing device, a first loudness parameter associated with the voice command, generating a voice response to the voice command, and determining a target loudness parameter associated with the voice response in view of the first loudness parameter associated with the voice command.. . ... Red Hat Inc

02/01/18 / #20180032720

Detection of malicious software packages

Systems and methods for a security tool that verifies the security of a software package. An example method may involve identifying a plurality of components contained in a software package comprising one of a jar file, an android application package, a docker image, a container file, or a virtual machine image; comparing the components contained in the software package to a list of known components; classifying the software package as insecure when at least one of the components matches an insecure component, or as secure when each of the compared components matches a corresponding secure component on the list of known components; preventing addition of the software package to a software repository when the software package is classified as insecure; and when insecure, providing an interface to enable a user to request the components of the software package be added as a secure component on the list of known components.. ... Red Hat Inc

02/01/18 / #20180032452

Memory distribution across multiple non-uniform memory access nodes

A system, methods, and apparatus for determining memory distribution across multiple non-uniform memory access processing nodes are disclosed. An apparatus includes processing nodes, each including processing units and main memory serving as local memory. ... Red Hat Inc

01/25/18 / #20180027051

Application management in an application deployment pipeline

The present disclosure provides new methods and systems for managing applications in a deployment pipeline. For example, a policy of a first environment and a policy of a second environment are detected. ... Red Hat Inc

01/25/18 / #20180025022

Delayed allocation for data object creation

Systems and methods for data storage management technology that optimizes the creation and storage of data objects. An example method may involve: receiving a request to create a data object; storing a first portion of the data object in a first data storage; determining a location in a second data storage in view of a predicted size of the data object and an access unit size of the second data storage; copying, by a processing device, the first portion of the data object from the first data storage to the location in the second data storage; and in response to receiving a second portion of the data object, directly storing the second portion in the second data storage.. ... Red Hat Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Red Hat Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Red Hat Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###