Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Red Hat patents


Recent patent applications related to Red Hat. Red Hat is listed as an Agent/Assignee. Note: Red Hat may have other listings under different names/spellings. We're not affiliated with Red Hat, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "R" | Red Hat-related inventors


Open virtualized multitenant network scheme servicing virtual machine and container based connectivity

A multitenant network scheme system includes a memory, a physical processor in communication with the memory, an isolated guest on a host, a virtual switch, and a network interface controller. The isolated guest includes a virtual network interface controller (vnic). ... Red Hat

Distribution of secure data with entitlement enforcement

An example method for distributing content includes receiving a first encrypted request for content over a first encrypted connection from a client. The method also includes obtaining an unencrypted version of the first encrypted request. ... Red Hat

Uma-aware root bus selection

A method includes determining a first host non-uniform memory access (numa) node of a plurality of host numa nodes on a host machine that provides a virtual machine to a guest, the first host numa node being associated with a pass-through device, creating a virtual numa node on the virtual machine, mapping the virtual numa node to the first host numa node, adding a virtual expander to a virtual root bus of the virtual machine, and associating the virtual expander with the virtual numa node.. . ... Red Hat

Providing dynamic instrumentation using domain-specific monitoring-language-to-kernel-bytecode compilation

Providing dynamic instrumentation using domain-specific monitoring-language-to-kernel-bytecode compilation is disclosed. An instrumentation program file is converted by a compilation engine into multiple bytecode sections. ... Red Hat

Providing blockchain-based subscription-as-a-service management

Providing blockchain-based subscription-as-a-service management is disclosed. In one example, a node within a customer network begins execution of a subscription-as-a-service software instance. ... Red Hat

Content aggregation for unstructured data

A mechanism for extracting system characteristics from an unstructured data format, a semi-structured data format, or a structured data format is disclosed. A processing device may receive information associated with a computing system in an unstructured data format. ... Red Hat

Virtual machine to host device bridging

In an example embodiment, a hypervisor exposes a first guest device to a first virtual machine. The hypervisor exposes a virtual host device and a pass-through device to a second virtual machine. ... Red Hat

Lazy persistent storage volume provisioning

Methods and systems for provisioning persistent storage are disclosed. For example, a new isolated guest and associated persistent storage volume are requested to be created. ... Red Hat

Identifying application usage roles for devices provided to virtual machines

Embodiments of the disclosure provide techniques for or managing devices for a virtual machine. A method is provided that includes associating, by a processing device of a cloud management system, a device with a virtual machine. ... Red Hat

Speaker priority for conference calls

An example method for managing a conference call includes detecting multiple concurrent audio signals. The multiple concurrent audio signals include a first audio signal from a first participant on a conference call and a second audio signal from a second participant on the conference call. ... Red Hat

Generating an adjacency graph from a series of linear linked data structures

Implementations of the present disclosure provide for generating adjacency graph from a series of linear linked data structures. A method of one implementation includes receiving an input of a series of linear linked data structures (links). ... Red Hat

Low impact snapshot database protection in a micro-service environment

An implementation of the disclosure provides a system for generating low impact snapshots comprising a memory to store application data and a processing device coupled to the memory. The processing device is to identify a plurality of transactions within a cloud computing environment. ... Red Hat

Efficient hypervisor reporting

Mechanisms for efficient hypervisor reporting are disclosed. A first communication from a first hypervisor reporter is received that identifies a first hypervisor as a hypervisor about which the first hypervisor reporter can generate reports over time. ... Red Hat

Managing processor frequencies

Processor frequencies can be managed. For example, a computing device can determine (i) a first estimate of an operating characteristic of a processor in using a first pair of frequencies to perform a task, and (ii) a second estimate of the operating characteristic of the processor in using a second pair of frequencies to perform the task. ... Red Hat

06/14/18 / #20180167601

Flicker-free remoting support for server-rendered stereoscopic imaging

A system includes a memory, one or more processors, a guest virtual machine, a hypervisor, and a client. The hypervisor receives, from the client, a first notification of stereoscopic capability. ... Red Hat

06/14/18 / #20180167487

Container deployment scheduling with constant time rejection request filtering

Container deployment scheduling with constant time rejection request filtering is disclosed. For example, each node in a multi-node system includes system resources with available amounts quantitatively represented by values. ... Red Hat

06/07/18 / #20180159861

Access guards for multi-tenant logging

A multi-tenant logging system that allows a user to have an individual profile that controls the user's access to tenant logs is provided. The system includes a plugin that adds features of an access control list (acl) to indexes of a logging stack based on a user's access role. ... Red Hat

06/07/18 / #20180157518

Batched memory page hinting

Systems and methods for batching memory page hints that may enable a hypervisor to reuse a particular memory page without copying the particular memory page to and from swap space. An example method may comprise: releasing, by a processing device executing a virtual machine, memory pages in use by the virtual machine; adding the memory pages to a set of memory pages; determining, by the virtual machine, that the set of memory pages satisfies a threshold quantity; and responsive to the determining, notifying a hypervisor that the memory pages released by the virtual machine are available for reuse by the hypervisor without being copied to persistent storage.. ... Red Hat

06/07/18 / #20180157508

Co-locating containers based on source to improve compute density

Co-locating containers based on source to improve compute density is disclosed. For example, a repository stores image files associated with metadata. ... Red Hat

06/07/18 / #20180157469

Compiler integrated intelligent deserialization framework

An example system includes a memory, a processor in communication with the memory, and a compiler that includes a serializer and a deserializer. The compiler executes on the processor to receive an input including a plurality of tags associated with a message. ... Red Hat

05/31/18 / #20180152415

Mac address allocation for virtual machines

Systems and methods for network identifier allocation for virtual machines are described. An example method may include: determining that a first network identifier has not been assigned to a virtual machine, transmitting a network identifier request to a server, and assigning a network identifier to the virtual machine based on a data packet directed to the virtual machine, the data packet comprising the second network identifier.. ... Red Hat

05/31/18 / #20180152363

Recovery from a networking backend disconnect

Methods, systems, and computer program products are included for processing one or more buffers in a networking queue. An example method includes receiving one or more transmit requests or receive requests from a guest running on a virtual machine. ... Red Hat

05/31/18 / #20180150348

Automated problem resolution

Mechanisms for generating a remediation script to resolve a problem condition in a remote computing device are provided. System information associated with a remote computing device is accessed. ... Red Hat

05/31/18 / #20180150327

Lockless free memory ballooning for virtual machines

An example method for managing memory includes receiving an inflate notification including a first identifier corresponding to a first time. The inflate notification indicates that a set of guest memory pages is unused by the guest at the first time. ... Red Hat

05/31/18 / #20180150311

Virtual processor state switching virtual machine functions

A system and method for virtual processor state switching virtual machine functions includes a memory, one or more processors, in communication with the memory, a virtual machine executing on the one or more processors, a virtual machine function executing on the virtual machine, and a hypervisor executing on the one or more processors. The hypervisor receives from the virtual machine function a request to save a state of the virtual machine function in hypervisor memory. ... Red Hat

05/31/18 / #20180150260

Key-based memory deduplication protection

Methods, systems, and computer program products are included for deduplicating one or more memory pages. A method includes receiving a first key from a first application running on a computer system. ... Red Hat

05/31/18 / #20180150258

Size adjustable volumes for containers

Implementations of the disclosure provide for size adjustable volumes for containers. A method of the disclosure includes determining, by a processing device of the paas system, a size used space in a storage volume with respect to a container associated with an execution of an application. ... Red Hat

05/31/18 / #20180150232

Memory overcommit by speculative fault

An example method of allocating memory pages for a guest includes receiving, by a hypervisor, a request to allocate a plurality of guest memory pages for a guest running on a virtual machine. The virtual machine and the hypervisor run on a host machine. ... Red Hat

05/24/18 / #20180146072

Creation of a binding based on a description associated with a server

An indication of an update to a server system may be received. In response to receiving the indication that the server system has been updated, a description associated with resources of the server system may be received. ... Red Hat

05/24/18 / #20180144121

Non-repudiation of broadcast messaging

A method performed by a computing system includes receiving from a publishing entity a message and a first piece of evidence that the message was sent by the publishing entity, time-stamping the first piece of evidence, storing the time-stamped first piece of evidence, sending the message to a first subscribing entity, receiving from the first subscribing entity a second piece of evidence that the message was received by the first subscribing entity, time-stamping the second piece of evidence, and storing the time-stamped second piece of evidence.. . ... Red Hat

05/24/18 / #20180144025

Map-reduce job virtualization

A method and system is disclosed that identifies a job written in a first language. The job is to be performed in parallel on a plurality of nodes of a plurality of clusters. ... Red Hat

05/24/18 / #20180143848

Using hypervisor trapping for protection against interrupts in virtual machine functions

A system, methods, and apparatus for using hypervisor trapping for protection against interrupts in virtual machine functions are disclosed. A system includes memory, one or more physical processors, a virtual machine executing on the one or more physical processors, and a hypervisor executing on the one or more physical processors. ... Red Hat

05/24/18 / #20180143847

Dynamic batch management of shared buffers for virtual machines

Methods, systems, and computer program products for providing dynamic batch management of shared packet buffers are disclosed. A virtualized computer system may include a hypervisor with access to memory and executed by a processor to maintain a pool of host memory to store a plurality of incoming network packets received by a network device, adjust a number of memory buffers associated with the pool of host memory to resize the pool of host memory, receive an indication of an incoming network packet stored in the pool of host memory by the network device, and provide the incoming network packet to a guest. ... Red Hat

05/24/18 / #20180143828

Efficient scheduling for hyper-threaded cpus using memory monitoring

A system and method for scheduling of hyper-threaded cpus using memory monitoring includes a memory with an operating system memory and a physical processor in communication with the memory. The physical processor includes a first hyper-thread and a second hyper-thread. ... Red Hat

05/17/18 / #20180139221

Multi-tenant cloud security threat detection

Methods and systems for security threat detection are disclosed. For example, a virtual machine with a network interface of a plurality of virtual machines includes a plurality of applications including first and second applications. ... Red Hat

05/17/18 / #20180137018

Non-blocking listener registration in the presence of data grid nodes joining the cluster

A method of communicating data in a node cluster of a data grid is described. The method includes receiving, at a listener of a first node, data from a second node that is filtered using the filter during a search query of a node cluster. ... Red Hat

05/17/18 / #20180136977

Multi-queue device assignment for application groups

A system and method of device assignment includes receiving, by a supervisor, an assignment request to assign a device to a first application and a second application. The first application is associated with a first memory and has a first address. ... Red Hat

05/17/18 / #20180136959

Executing code referenced from a microservice registry

Methods and systems for executing code referenced from a microservice registry are disclosed. For example, a microservice registry is stored in a memory. ... Red Hat

05/17/18 / #20180136868

Translation bypass by host iommu for systems with virtual iommu

A system and method of translation bypass includes a hypervisor retrieving a physical bus address range from a host input-output memory management unit. The hypervisor reserves an allowed address range of the physical bus address range, and sends the allowed address range to a guest virtual machine. ... Red Hat

05/17/18 / #20180136867

Address based host page table selection

A page table selection system includes a memory, a processor in communication with the memory, a virtual machine, and a hypervisor. The virtual machine includes a guest executing on the processor. ... Red Hat

05/10/18 / #20180129494

Detect application defects by correlating contracts in application dependencies

An example method of detecting incompatibility between an application and an application dependency includes identifying a first set of contracts exposed in a first version of an application dependency. Each contract includes a symbol and a corresponding signature. ... Red Hat

05/10/18 / #20180129479

Container images by composition

Methods and systems for creating containers by composition are disclosed. For example, a container image includes multiple layers, including first and second layers, which an image engine determines are read only or unmodified by adding any other layers. ... Red Hat

05/03/18 / #20180124055

Decoupling container image layers to preserve privacy

An example system includes a memory, one or more processors in communication with the memory, and a container image generator. The container image generator receives a first set of information. ... Red Hat

05/03/18 / #20180121266

Idempotent mode of executing commands triggered by complex event processing

Systems and methods for enforcing the idempotent mode of executing commands triggered by complex event processing. An example method may comprise: receiving, by a processing device, an event data item comprising a value of a state variable; applying an event processing rule to the event data item, by evaluating a conditional statement comprising the value of the state variable, to generate an event processing command; producing a command identifier identifying the event processing command; and responsive to failing to insert the command identifier into a hash table employed for storing identifiers of executed commands, discarding the event processing command.. ... Red Hat

05/03/18 / #20180121247

Supporting quality-of-service for virtual machines based on operational events

An implementation of the disclosure provides a method. The method comprises identifying a quality-of-service level associated with a virtual machine (vm) executed by a processing device of a host machine. ... Red Hat

05/03/18 / #20180121243

Identifying memory devices for swapping virtual machine memory pages

Systems and methods for identifying memory devices for swapping virtual machine memory pages. An example method may comprise: identifying, by a processing device, a workload type associated with a workload being executed by a computer system; identifying a memory device associated with the workload type; evaluating a memory pressure metric reflecting a period of time during which an application being executed by the computer system has been blocked by a memory allocation operation; and responsive to determining that the memory pressure metric exceeds a threshold value, allocating a memory block on the identified memory device.. ... Red Hat

04/19/18 / #20180109642

Persistent-memory management

Data can be stored in a persistent-memory device, rather than a hard drive, of a computing device. A copy of the data can also be stored in another persistent-memory device of a remote computing device. ... Red Hat

04/19/18 / #20180109466

Utilizing access control data structures for sharing computing resources

Systems and methods for sharing resources between multiple processing streams. An example method may comprise: maintaining, by a processing device, a first variable indicating a number of processing streams waiting to access a resource; performing an operation on a second variable comprising a first portion and a second portion, the operation comprising updating the first portion to reflect a number of available units of the resource and further comprising reading the second portion reflecting a value of the first variable.. ... Red Hat

04/19/18 / #20180109464

Dynamically adjusting resources to meet service level objectives

The present disclosure provides for dynamic resource allocation to a container on a host. For example, in a first directed acyclic graph (“dag”), a cpu resource usage of a container may be detected. ... Red Hat

04/19/18 / #20180109387

Continued verification and monitor of application code in containerized execution environment

A method includes receiving, by a processing device executing a validation service, a validation data associated with a first instance of an execution environment, the validation data provided by a publication service associated with a second instance of the execution environment, acquiring a decryption key from a release server associated with the execution environment, determining, using the decryption key, a validation status associated with the first instance in view of the validation data, and notifying the release server of the validation status.. . ... Red Hat

04/19/18 / #20180107729

Method for generating synthetic data sets at scale with non-redundant partitioning

An example system includes a first machine and a second machine, a clustering module, and a training module. The clustering module receives a plurality of data sets, each including attributes. ... Red Hat

04/19/18 / #20180107607

Page table entry caching for virtual device emulation

A hypervisor configures a page table entry in a host page table to map an address associated with memory-mapped input-output (mmio) for a virtual device of a guest of the hypervisor to an input/output (i/o) instruction. The address is marked in the page table entry as a hypervisor exit entry, and the page table entry to cause an exit to the hypervisor responsive to the guest attempting to access the address. ... Red Hat

04/19/18 / #20180107586

Automatically validated release candidates for data-driven applications by automated publishing of integration microservice and data container tuple

A system and method for automatically validated release candidates for data-driven applications includes monitoring a first microservice and a second microservice. A respective functionality of each microservice is independently verifiable. ... Red Hat

04/12/18 / #20180101564

Transaction compensation for single phase resources

A method including initiating a transaction comprising a plurality of data items in one or more data stores, wherein the transaction is to cause a change to at least a first data item of the plurality of data items. The method also including generating a first transactional data usable to undo the change to the first data item associated with the transaction, wherein the first transaction data comprises a serialized compensation data structure to undo the change to the first data item and complementary information regarding activities complementary to the undo operation.. ... Red Hat

04/12/18 / #20180101452

Memory first live snapshot

The subject matter of this specification can be implemented in, among other things, a method including creating a new disk file at a reference point-in-time, wherein an original disk file is a backing file of the new disk file, copying the original disk file to a disk snapshot file, in response to the original disk file being copied to the disk snapshot file, merging the original disk file and the new disk file to form a merged file, wherein a virtual machine is to continue to perform disk operations using the merged file, and determining whether the merged file is synchronized with the original disk file and the new disk file by determining whether entries of a bitmap for the merged file match corresponding entries of a bitmap for the new disk file.. . ... Red Hat

04/12/18 / #20180101408

Node selection for a new application in a multi-tenant cloud hosting environment

A method includes instantiating a first web application for a first application owner on a virtual machine and instantiating a second web application for a second application owner. The second application owner is different than the first application owner. ... Red Hat

03/29/18 / #20180091584

Identifying a component cluster

Mechanisms for identifying a component cluster among a plurality of components in a distributed computing environment are disclosed. Configuration information that corresponds to the plurality of components is accessed. ... Red Hat

03/29/18 / #20180091555

Method of managing system utilities access control

An access control system includes a memory, a processor, a host operating system (os) executing on the processor, a container on the host os, and a security manager running on the host os. The container has a set of access control rules and includes a containerized utility. ... Red Hat

03/29/18 / #20180089421

Identifying exploitable code sequences

A system and method for identifying exploitable code sequences. In one implementation, a first processing device identifies an executable portion of a program and a set of registers of a second processing device, and stores a set of addresses in the set of registers. ... Red Hat

03/29/18 / #20180089089

Guest ordering of host file system writes

Systems and methods for data storage management technology that enables a guest module of a virtual machine to indicate an order in which a host module should write data from physical memory to a secondary storage. An example method may comprise: identifying, by a processing device executing a host module, a plurality of modifications to direct access excited (dax) memory made by a plurality of direct access operations executed by a guest module of a virtual machine; determining, by the host module, an order of the plurality of modifications to dax memory; receiving, by the host module, a synchronization request from the guest module; and responsive to the synchronization request, copying, by the host module, data from the dax memory to a secondary storage in view of the order of the plurality of modifications.. ... Red Hat

03/29/18 / #20180088975

Virtual machine live migration using intelligent order of pages to transfer

An example method for virtual machine (vm) live migration using intelligent order of pages to transfer includes receiving a request to live migrate a vm, transferring memory pages of the vm that are identified as at least one of read-only or executable in a first iteration of vm memory page transfer of the live migration, transferring, as part of a second iteration of the transfer, prioritized memory pages of the vm that have not been transferred as part of the first iteration, and transferring, as part of a third iteration of the transfer, other memory pages of the vm that have not been transferred as part of the first and second iterations and that are not identified as ignored memory pages of the vm, wherein the other memory pages of the vm comprise de-prioritized memory pages of the vm that are transferred last in the third iteration.. . ... Red Hat

03/29/18 / #20180088974

Input/output command rebalancing in a virtualized computer system

The present disclosure provides new methods and systems for input/output command rebalancing in virtualized computer systems. For example, an i/o command may be received by a rebalancer from a virtual queue in a container. ... Red Hat

03/22/18 / #20180083947

Stateless server-based encryption associated with a distribution list

An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a plurality of destination clients. The method also includes receiving, by a decryption module of the decryptor device, encrypted electronic messages from the plurality of destination clients. ... Red Hat

03/22/18 / #20180083778

Binding data to a network in the presence of an entity with revocation capabilities

Implementations of the disclosure provide for binding data to a network in the presence of an entity with revocation capabilities. A cryptographic system is provided that includes a memory to store revocation information comprising a plurality of identifiers and a processing device operatively coupled to the memory. ... Red Hat

03/22/18 / #20180081683

Task assignment using machine learning and information retrieval

An example method of assigning a task to a developer includes partitioning, based on a first set of developer attributes, a list of developers into a plurality of developer clusters. The method also includes for a plurality of tasks, identifying a set of developers assigned to the respective task, identifying a developer cluster including a greater number of developers from the respective set of developers than another developer cluster, and classifying the respective task as belonging to the respective developer cluster. ... Red Hat

03/15/18 / #20180074864

Time-bound conditional resource deallocation

Method and system for deallocating shared system resources. In an example, the system includes a memory storing a system resource allocation database, a processor running a scheduler, including an i/o and a scheduler engine. ... Red Hat

03/08/18 / #20180069842

Binding data to a network in the presence of an entity

Implementations of the disclosure provide for binding data to a network in the presence of an entity. In one implementation, a cryptographic system is provided. ... Red Hat

03/01/18 / #20180063083

Guest netfilter protection by virtual machine function

A system and method for guest netfilter protection using a virtual machine function includes a memory, one or more processors, in communication with the memory, a virtual machine, a hypervisor, and a virtual network interface controller on the virtual machine. The virtual machine and the hypervisor are configured to execute on the one or more processors. ... Red Hat

03/01/18 / #20180062969

Protocol-based packet traffic creation

Mechanisms for packet creation are provided. A packet capture including a plurality of packets is accessed. ... Red Hat

03/01/18 / #20180062952

Supplementing log messages with metadata

Mechanisms for supplementing log messages are disclosed. A log collection agent initiates, to a centralized management system, a request for metadata associated with a first executing process of the computing device. ... Red Hat

03/01/18 / #20180062926

Discovering and mitigating out-of-sync network parameters

A system for discovering and mitigating out-of-sync network parameters may determine that a first value for a parameter of a set of parameters of a logical network associated with a host computing system is different from a second value specified for the parameter in a network definition. The system may further presenting, via a user interface, the first value and the second value for the parameter and receiving, via the user interface, a confirmation of validity of the first value for the parameter. ... Red Hat

03/01/18 / #20180060592

Automatic parameter value generation

Automatic parameter value generation is disclosed. It is determined that a parameter value generation trigger associated with a parameter has occurred. ... Red Hat

03/01/18 / #20180060327

Calculating a failure intensity value for a group of search sessions

Calculating a failure intensity value for a group of search sessions is provided. In one example, a method for calculating a failure intensity value for a group of search sessions is provided. ... Red Hat

03/01/18 / #20180060254

Quality of service enforcement and data security for containers accessing storage

Systems and methods for quality of service (qos) enforcement and data security for containers accessing storage. An example method may comprise: receiving an input/output (i/o) call initiated by a container running on a host computer system to request data from a storage device; translating the i/o call into a device emulator call to a device emulator emulating a storage device; sending the device emulator call to the device emulator; and receiving, from the device emulator, a response comprising the data retrieved from the storage device.. ... Red Hat

03/01/18 / #20180060249

Code loading hardening by hypervisor page table switching

Systems and methods are provided for modifying one or more guest memory permissions. An example method includes receiving a request to modify a memory permission of a guest running on a virtual machine. ... Red Hat

03/01/18 / #20180060245

Hypervisor translation bypass by host iommu with virtual machine migration support

A system and method of translation bypass includes a hypervisor configuring a host input-output memory management unit to translate a guest memory of a guest virtual machine. The hypervisor reserves a first portion of the guest memory. ... Red Hat

03/01/18 / #20180060103

Guest code emulation by virtual machine function

Systems and methods are provided for emulating guest code by a virtual machine function. An example method includes detecting, by a hypervisor, a request by a guest to access a resource. ... Red Hat

03/01/18 / #20180060100

Virtual machine migration acceleration with page state indicators

Methods, systems, and computer program products are included for migrating a virtual machine. An example method of migrating a virtual machine includes transmitting, from a hypervisor, a migration indicator to a guest. ... Red Hat

03/01/18 / #20180060097

Hyper-threading based host-guest communication

A system and method for hyper-threading based host-guest communication includes storing, by a guest, at least one request on a shared memory. A physical processor, in communication with the shared memory, includes a first hyper-thread and a second hyper-thread. ... Red Hat

03/01/18 / #20180059974

Safe physical function passthrough using virtual machine functions

A system and method for safe physical function passthrough using virtual machine functions includes sending, by a guest on a virtual machine, an access request for a host device to a virtual machine function on the virtual machine. The method also includes determining, by the virtual machine function, whether the access request is valid responsive to receiving the access request. ... Red Hat

03/01/18 / #20180059956

Memory deduplication based on guest page hints

Methods, systems, and computer program products are included for de-duplicating one or more memory pages. A method includes receiving, by a hypervisor, a list of read-only memory page hints from a guest running on a virtual machine. ... Red Hat

03/01/18 / #20180059953

Snapshot management with an external storage service

Mechanisms for snapshot management are provided. A request that requests that a first storage entity of type volume entity be generated is sent to an external storage service via an external interface. ... Red Hat

03/01/18 / #20180056185

Methods, systems, and products for control of gaming applications

Methods, systems, and products bookmark gaming applications. When a player wishes to pause a gaming application, a bookmark may be created. ... Red Hat

02/22/18 / #20180054469

State analysis of remote computing images

Systems and methods for analyzing a computing image (e.g., container image, virtual disk image) while it is on a remote node in a secured environment. An example method may comprise: initiating a proxy agent on a node, the proxy agent having access to an image repository comprising an image; transmitting to the proxy agent a request for image data of the image; receiving the image data from the proxy agent; and analyzing the image data to determine a state of the image.. ... Red Hat

02/22/18 / #20180054357

Discovering changes of network interface controller names

Systems and methods for discovering changes of network interface controller (nic) names are disclosed. An example method may comprise receiving new network configuration data comprising first network interface controller (nic) configuration data for a nic device that is identified by a permanent identifier (id), identifying the permanent id of the nic device in current network configuration data comprising second nic configuration data for the nic device, responsive to a first nic name corresponding to the permanent id in the new network configuration data being different than a second nic name corresponding to the permanent id in the current network configuration data, updating, by a processing device, the first nic configuration data in the new network configuration data to be the same as the second nic configuration data, and saving, by the processing device, the updated new network configuration data as the current network configuration data.. ... Red Hat

02/22/18 / #20180052762

Build failure management in continuous integration environments for distributed systems

A processing device, responsive to requests for builds for an application, forces an error to occur during an execution of each request. The execution of each request represents an execution of a set of operations for providing a respective build. ... Red Hat

02/22/18 / #20180052744

Tiered cloud storage for different availability and performance requirements

A system and method for a tiered cloud storage for different availability and performance requirements includes a gateway, a block store configured to cache data, and an object store configured to persistently store data. The gateway, the block store, and the object store are in a compute zone. ... Red Hat

02/22/18 / #20180052728

Root cause candidate determination in multiple process systems

Root cause determination in multiple process systems is disclosed. It is determined that a first process encountered a problem at a first point in time. ... Red Hat

02/22/18 / #20180052702

Coupling a host system to a virtual machine

A mechanism for managing virtual machines in a virtualization system is disclosed. A method of implementation of the disclosure includes receiving a request from a client system to route network traffic from a first network interface card (nic) of a first host system to a virtual machine. ... Red Hat

02/22/18 / #20180052701

Hot-plugging of virtual functions in a virtualized environment

Implementations of the disclosure provide for hot-plugging of virtual functions in a virtualized environment. In one implementation, a computer system comprising a memory to store parameters of virtual functions and a processing device, operatively coupled to the memory is provided. ... Red Hat

02/22/18 / #20180052637

Efficient image file loading and garbage collection

Method for loading and garbage collecting image files. An example system includes two memories, processors, and a garbage collector including an i/o and a garbage collector engine. ... Red Hat

02/15/18 / #20180048738

Blockchain management using a device in a wireless telecommunication system

Devices in a wireless telecommunication system can implement a blockchain that is distributed among the devices. For example, a base transceiver station of the wireless telecommunication system can receive, from a mobile device, a wireless radio communication that includes information associated with a blockchain transaction. ... Red Hat

02/15/18 / #20180046501

Routing table preservation for virtual machine migration with assigned devices

A migration system includes a memory, a physical processor, first and second hypervisors, first and second virtual machines, and first and second networking devices. The first hypervisor is located at a migration source location and the second hypervisor is located at a migration destination location. ... Red Hat

02/15/18 / #20180046484

Program execution recording and playback

A computer system receives a first instruction identifier identifying a first instruction being executed by a first thread associated with a first virtual machine and receives a second instruction identifier identifying a second instruction being executed by a second thread associated with the first virtual machine. The system produces an execution record comprising the first instruction identifier, a first thread identifier identifying the first thread, a first timestamp reflecting a first real-time clock value associated with executing the first instruction, the second instruction identifier, a second thread identifier identifying the second thread, and a second timestamp reflecting a second real-time clock value associated with executing the second instruction. ... Red Hat

02/15/18 / #20180046483

Driver switch for live migration with an assigned device

A migration system includes a memory, a physical processor in communication with the memory, a first device, a second device, a first hypervisor at a source location, a second hypervisor at a destination location, a first virtual machine, and a second virtual machine. The first virtual machine includes a guest os executing on the first hypervisor and a guest driver and the second virtual machine includes the guest os executing on the second hypervisor and the guest driver. ... Red Hat

02/08/18 / #20180039594

Hot-plug of devices in virtualized computer systems

A system and method for enabling hot-plugging of devices in virtualized systems. A hypervisor obtains respective values representing respective quantities of a resource for a plurality of virtual root buses of a virtual machine (vm). ... Red Hat

02/01/18 / #20180034823

Management of service accounts

The present disclosure provides new methods and systems for managing access to service accounts by user accounts. For example, a user account and a service account may be created. ... Red Hat

02/01/18 / #20180034791

Secret keys management in a virtualized data-center

Implementations of the disclosure provide for secret keys management in a virtualized data-center. In one implementation, a system is provided. ... Red Hat

02/01/18 / #20180033424

Voice-controlled assistant volume control

A method includes receiving a voice command, determining, by a processing device, a first loudness parameter associated with the voice command, generating a voice response to the voice command, and determining a target loudness parameter associated with the voice response in view of the first loudness parameter associated with the voice command.. . ... Red Hat

02/01/18 / #20180032720

Detection of malicious software packages

Systems and methods for a security tool that verifies the security of a software package. An example method may involve identifying a plurality of components contained in a software package comprising one of a jar file, an android application package, a docker image, a container file, or a virtual machine image; comparing the components contained in the software package to a list of known components; classifying the software package as insecure when at least one of the components matches an insecure component, or as secure when each of the compared components matches a corresponding secure component on the list of known components; preventing addition of the software package to a software repository when the software package is classified as insecure; and when insecure, providing an interface to enable a user to request the components of the software package be added as a secure component on the list of known components.. ... Red Hat

02/01/18 / #20180032452

Memory distribution across multiple non-uniform memory access nodes

A system, methods, and apparatus for determining memory distribution across multiple non-uniform memory access processing nodes are disclosed. An apparatus includes processing nodes, each including processing units and main memory serving as local memory. ... Red Hat

01/25/18 / #20180027051

Application management in an application deployment pipeline

The present disclosure provides new methods and systems for managing applications in a deployment pipeline. For example, a policy of a first environment and a policy of a second environment are detected. ... Red Hat

01/25/18 / #20180025022

Delayed allocation for data object creation

Systems and methods for data storage management technology that optimizes the creation and storage of data objects. An example method may involve: receiving a request to create a data object; storing a first portion of the data object in a first data storage; determining a location in a second data storage in view of a predicted size of the data object and an access unit size of the second data storage; copying, by a processing device, the first portion of the data object from the first data storage to the location in the second data storage; and in response to receiving a second portion of the data object, directly storing the second portion in the second data storage.. ... Red Hat

01/25/18 / #20180024850

Providing a layered image using a hierarchical tree

A hierarchical tree of nodes for layered images may be maintained. The hierarchical tree may include paths that each includes nodes representing layered images for a virtual machine. ... Red Hat

01/25/18 / #20180024723

Synchronizing user input with a user interface

Synchronizing user input with a user interface is disclosed. User input that identifies a selected location on a display device that is presenting a first user interface (ui) is received at the first time. ... Red Hat

01/18/18 / #20180018116

Containerizing a block storage service

Containerization of a block storage service. A scheduler component of a block storage service is initiated in a first container via a containerization technology. ... Red Hat

01/11/18 / #20180013612

Logfile collection and consolidation

Mechanisms for consolidating log information from remote computing devices are provided. Connections with a plurality of remote computing devices are established. ... Red Hat

01/11/18 / #20180012571

Transparent guest based notification overlay

The present disclosure provides new and innovative methods and systems for managing transparent guest based notifications in a virtual environment. In a method for controlling the display of information on a client, a hypervisor may connect a virtual graphics card to a virtual machine. ... Red Hat

01/11/18 / #20180011781

Generating pseudorandom test items for software testing of an application under test (aut)

Generating pseudorandom test items for software testing of an application under test (aut) is provided. In one example, a method comprises selecting an oracle of one or more oracles within a test provider directory structure, the oracle defining one or more logical paths each comprising one or more test conditions and an expected result. ... Red Hat

01/11/18 / #20180011733

Exitless timer access for virtual machines

A system and method of scheduling timer access includes a first physical processor with a first physical timer executing a first guest virtual machine. A hypervisor determines an interrupt time remaining before an interrupt is scheduled and determines the interrupt time is greater than a threshold time. ... Red Hat

01/11/18 / #20180011726

Collection of guest status

The present disclosure provides new and innovative methods and systems for guest status collection in a virtual environment. An example method includes accessing a hypervisor media library and booting an information collection guest from the hypervisor media library. ... Red Hat

01/11/18 / #20180011650

Differentiating open and abandoned transactions in a shared storage environment

Systems and methods for enhancing storage recollection in a shared storage system by enabling the recollection procedure to differentiate between open and abandoned transaction. An example method comprises: detecting, by a processing device, a transaction marker of a storage system, the transaction marker being stored on shared storage and indicating a modification of the shared storage is incomplete; determining, in view of a locking data structure on the shared storage, whether the transaction marker is associated with an abandoned modification; in response to the transaction marker being associated with an abandoned modification, releasing a portion of the shared storage associated with the abandoned modification; and destroying the transaction marker.. ... Red Hat

01/04/18 / #20180007143

Persistent real-time communication channels with cloud computing systems

Mechanisms for establishing persistent bi-directional communication channels with cloud computing systems are disclosed. A processor device initiates a plurality of persistent bi-directional communication channels with a corresponding plurality of cloud computing systems. ... Red Hat

01/04/18 / #20180004817

Federation optimization using ordered queues

Methods, systems, and computer program products for optimization of query processing in a data federation system using priority queuing techniques are provided. Priority queuing techniques may include generating a query vector corresponding to a query, comparing the query vector to historical query vectors to determine similarity, determining an expected processing time for the query based on the determined similarity, and inserting the query into a priority ordered queue at a particular position based on the expected processing time.. ... Red Hat

12/28/17 / #20170371568

Failure resistent volume creation in a shared storage environment

Systems and methods for data storage management technology that use task identifiers to manage tasks and ensure storage modifications occur without unnecessary task duplication. An example method may comprise: generating a task identifier on a first device; transmitting a request comprising the task identifier to create a task on a second device, the task being associated with the task identifier and comprising the allocation of a data storage portion on a shared storage; determining a reply to the task is missing; and in response to determining the reply is missing, detecting whether the task was created on the second device.. ... Red Hat

12/21/17 / #20170364451

Operating system integrated application isolation

A system, method, and apparatus for operating system integrated application isolation. A snapshot manager creates a snapshot table including one or more pointers to a file system storage. ... Red Hat

12/21/17 / #20170364430

Optimization of operating system and virtual machine monitor memory management

A method and system for collecting statistics associated with multiple memory nodes to determine if a read-only page is read accessed in aggregate by multiple processing devices of the multiple memory nodes at or above a first threshold value. If so, the read-only page may be replicated to an additional memory node. ... Red Hat

12/21/17 / #20170364412

Secure live virtual machine guest based snapshot recovery

A system, method, and apparatus for secure live virtual machine guest based snapshot recovery. A virtual machine sends a request to access a snapshot of a first virtual disk of the virtual machine including a snapshot identifier. ... Red Hat

12/21/17 / #20170364378

Live storage domain decommissioning in a virtual environment

Implementations of the disclosure provide for live storage domain decommissioning in a virtual environment. A method of the disclosure includes identifying, by a processing device, a storage domain to decommission from a storage system. ... Red Hat

12/21/17 / #20170364354

Committed program-code management

An association between two or more segments of committed program code can be determined so that the segments of committed program code can be used together for building a software project. For example, one or more communications can be received and indicate that two or more segments of program code are to be committed to one or more repositories associated with a software project. ... Red Hat

12/21/17 / #20170364342

Plugin for software deployment

A plugin for a website browser can enable a user to deploy software onto a computing device quickly and easily. For example, the plugin can automatically detect that a user is visiting a website on which program code for a software application is shared or hosted. ... Red Hat

12/21/17 / #20170364263

Virtual machine initiated memory deduplication

Methods, systems, and computer program products are included for initiating deduplication of memory by virtual machine guests. A method includes providing a virtual machine, by a hypervisor, and running a guest on the virtual machine. ... Red Hat

12/14/17 / #20170357579

Hypervisor translation bypass

A system and method of translation bypass includes a hypervisor reserving a range of host virtual addresses. The hypervisor detects that a guest address is unmapped. ... Red Hat

12/14/17 / #20170357551

Snapshot version control

Methods, systems, and computer program products are included for providing snapshot version control. A method includes creating a snapshot corresponding to a file system at a first point in time. ... Red Hat

12/07/17 / #20170351542

Non-repudiable transaction protocol

A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide nro-w evidence of a work request from a client to the resource manager and provide nrr-w evidence to the client that the resource manager has completed initial work for the work request. ... Red Hat

11/30/17 / #20170344560

Distributed file system with integrated file object conversion

Systems and methods for enhancing a distributed file system to provide multiple formats of a file object by creating the file object in a requested format. An example method may comprise: receiving, by a distributed file system comprising a plurality of nodes, a request for a file object in a first format; determining whether the file object in the first format is available on the distributed file system; in response to determining the file object in the first format is missing, querying a node of the plurality of nodes to determine whether the file object is available in a second format on the distributed file system; and creating, by a processing device of the distributed file system, the file object in the first format in view of a file object in the second format when the file object is available in the second format.. ... Red Hat

11/30/17 / #20170344462

Preservation of modifications after overlay removal from a container

An example method of preserving a modification to an internal state of a computer system includes applying an overlay on a target container. The overlay includes a set of events corresponding to a first set of modifications to a computer system. ... Red Hat

11/30/17 / #20170344461

Automated exception resolution during a software development session based on previous exception encounters

Automated exception resolution during a software development session based on previous exception encounters is disclosed. A first software development session of a user is monitored. ... Red Hat

11/30/17 / #20170344460

Exception resolution in a software development session

Mechanisms for exception resolution in a software development session are provided. An exception is detected during a software development session. ... Red Hat

11/30/17 / #20170344457

System for expression evaluation at debug time

A system for expression evaluation at debug time includes a debugger which receives an executable program with debugging information from a compiler, where the executable program with the debugging information is generated by compiling a source code program and generating debugging information corresponding to the executable program. The compiler embeds at least a first abstract syntax tree of a first expression of the source code program in the debugging information. ... Red Hat

11/23/17 / #20170337208

Collecting test results in different formats for storage

Systems and methods are provided for storing test results. An example method includes receiving a notification that a job has completed execution in a test execution server. ... Red Hat

11/23/17 / #20170337074

Hypervisor-visible guest thread management

Responsive to receiving a first request from an application to create a thread for the application, a guest operating system sends a first notification to a hypervisor to create a dedicated virtual processor for the thread. Responsive to receiving an identifier associated with the dedicated virtual processor from the hypervisor, the guest operating system starts the thread using the dedicated virtual processor, and pins the thread to the dedicated virtual processor.. ... Red Hat

11/23/17 / #20170337073

System and method for configuring a virtual device

Methods, systems, and computer program products are included for providing a virtual machine guest with access to a host device. A method includes providing a hypervisor with access to an enhanced allocation capability entry of a host device. ... Red Hat

11/23/17 / #20170337054

Source to image transformation pipeline for a platform-as-a-service system

Implementations provide for a source to image transformation pipeline for a platform-as-a-service (paas) system. A method of the disclosure includes receiving a request to create an application for execution on a platform-as-a-service (paas) system, identifying, by a processing device, at least one of language or a framework corresponding to the application, identifying, by the processing device, a build image corresponding to the identified at least one of the language or the framework, constructing, by the processing device, a build configuration object, a deployment configuration object, and a networking configuration object for the application, and transmitting, by the processing device, the build configuration object, the deployment configuration object, and the networking configuration object to the paas system to enable the paas system to build and deploy the application at one or more nodes of the paas system without user intervention.. ... Red Hat

11/16/17 / #20170329618

Modification of write-protected memory using code patching

Systems and methods are provided for modifying a set of memory pages. An example method includes loading kernel code and patching code of a kernel into a guest memory. ... Red Hat

11/09/17 / #20170323024

Camera-activated data transfer from a source computing device to a target computing device

Mechanisms for transferring data from a source computing device to a target computing device are provided. A filename identifier (id) that identifies a file stored on the source computing device is presented on a display device. ... Red Hat

10/26/17 / #20170310494

Measuring resource consumption in a multi-tenant platform-as-a-service (paas) system

Implementations for measuring resource consumption in a cloud provider system are disclosed. A method of the disclosure includes determining that a resource of an application of a cloud provider system is initializing, determining whether each operation in a list of initialization operations used in the initialization of the resources is performed successfully, prior to a create usage record operation in the list of initialization operations, in response to determining that each of the initialization operations prior to the create usage record operation in the list of initialization operations is performed successfully, creating a usage record for the resource using the create usage record operation based on a threshold usage level associated with the application, and in response to determining that at least one of the initialization operations prior to the create usage record operation in the list of initialization operations has failed, performing a roll-back operation or a re-try operation for the at least one of the initialization operations that has failed.. ... Red Hat

10/26/17 / #20170308312

Disk image deletion with failure resistent data erasure

Systems and methods for disk image deletion with failure resistant data erasure. An example method may comprise: receiving a request to delete a first disk image associated with a data storage portion; associating the data storage portion with a second disk image responsive to receiving the request to delete the first disk image; deleting the first disk image; and initiating a data erasure procedure on the data storage portion.. ... Red Hat

10/12/17 / #20170295228

Using a shared data store for peer discovery

An example method includes: identifying, by a new node, an address of a shared data store comprising information on a current membership in a peer-to-peer system, wherein the shared data store is shared by a plurality of nodes that are current members of the peer-to-peer system, wherein the shared data store is a container for storing data in a storage cloud; sending, by the new node, a first message comprising an address of the new node to the shared data store; requesting, by the new node, at least one membership data structure from the shared data store; receiving, by the new node, a second message comprising the at least one membership data structure; generating, by the new node, a new membership data structure comprising the address of the new node and the plurality of addresses for the plurality of nodes identified in the at least one membership data structure; sending, by the new node, a third message comprising the new membership data structure to the shared data store; and joining, by the new node, the peer-to-peer system, wherein the joining comprises using the new membership data structure to identify nodes of the plurality of nodes to receive a plurality of messages from the new node.. . ... Red Hat

10/12/17 / #20170295059

Distributed remote execution

A remote execution request is received from a client, specifying first and second remote execution tools and execution data pertaining to the tools and comprising a query to select host machines. First and second host machines are selected in view of a result of the query and the first and second tools. ... Red Hat

10/05/17 / #20170286445

Migrating lock data within a distributed file system

Systems and methods for migrating locking data for a file system object within a distributed file system. An example method may comprise: initiating a transfer of locking data from a first node of a distributed file system to a second node of the distributed file system, wherein the locking data is associated with a file system object and comprises a connection identifier indicating a connection between a client requesting a lock and the first node; constructing a modified connection identifier that indicates a connection between the client and the second node; and updating the second node to include the locking data with the modified connection identifier.. ... Red Hat

10/05/17 / #20170284815

Providing an instruction notification for navigation

A mechanism for providing an instruction notification for navigation. A method includes receiving destination data of a user device and generating default navigation instruction in view of the destination data. ... Red Hat

09/28/17 / #20170277572

Migration of network entities to a cloud infrastructure

A method for migrating network entities to a cloud computing infrastructure includes receiving an indication of at least one node of a plurality of nodes to migrate from an enterprise network to a cloud computing infrastructure, identifying one or more related nodes of the plurality of nodes that have direct and indirect communication relationships with the indicated node, and adding the indicated node and at least one node of the related nodes for the indicated node to a migration group. The method includes preparing a migration-configuration file for each node of the migration group, the migration-configuration file comprising service level agreement (sla) information, deploying a migration agent to each node of the migration group, and migrating the migration group to the cloud computing infrastructure, wherein each node of the migration group is migrated using a corresponding migration-configuration file to generate an sla for each node of the migration group with a provider of the cloud computing infrastructure in view of sla information from the corresponding migration configuration file.. ... Red Hat

09/21/17 / #20170272399

Managed ldap entries

A method and apparatus for maintaining in a lightweight directory access protocol (ldap) repository entries that are managed by an ldap directory server. An ldap directory server receives a client request to add a specified entry to an ldap repository, determines, based on a managed entry configuration, that the specified entry requires a managed entry operation, and adds the specified entry to the ldap repository. ... Red Hat

09/21/17 / #20170270287

Methods and apparatus for using credentials to access computing resources

Mechanisms for controlling access to credentials are disclosed. A computing device receives, at a first time, a request associated with a user to initiate a plurality of actions against a computing resource of a plurality of computing resources, the request including a credential identifier that identifies a credential. ... Red Hat

09/21/17 / #20170270135

Distributed deduplication using locality sensitive hashing

Deduplication in a distributed storage system is described. A deduplication manager defines a first extent on a first node in a distributed storage system. ... Red Hat

09/21/17 / #20170270028

System, method and apparatus for debugging of reactive applications

A debugger executes on a computer system to receive a first debugging command from a client, where the first debugging command sets a first instruction in the reactive application to suspend execution of the reactive application, and where during execution of the reactive application the first instruction is triggered which suspends execution of the reactive application. Responsive to the execution of the reactive application being suspended, a system clock of the reactive application is replaced with a substitute clock and the substitute clock is paused. ... Red Hat

09/14/17 / #20170262462

Correcting a volume chain after a volume creation failure is detected

A system and method are disclosed for detecting and handling volume creation failures. In one implementation, a request to create a new volume in a volume chain for a virtual machine is received. ... Red Hat

09/14/17 / #20170262270

Configuration of an application in a computing platform

A platform executing on a computer system identifies a capability to be used by an application based on an application descriptor for the application and determines a component that provides the capability based on a component descriptor of the component. The platform identifies an additional capability to be used by the component based on the component descriptor and determines an additional component that provides the additional capability. ... Red Hat

09/07/17 / #20170255548

Method and system for dynamically updating data fields of buffers

A computing system can include memory management capabilities. In one embodiment, the system receives a request to update a first size of each of a plurality of portions of memory to a second size. ... Red Hat








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Red Hat in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Red Hat with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###