Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Red Hat patents (2015 archive)


Recent patent applications related to Red Hat. Red Hat is listed as an Agent/Assignee. Note: Red Hat may have other listings under different names/spellings. We're not affiliated with Red Hat, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "R" | Red Hat-related inventors


12/24/15 / #20150373478

Virtual machine based on a mobile device

A request to provision a virtual machine (vm) based on a mobile communications device may be received. In response to the request to provision the vm, a phone number may be allocated to be associated with the vm based on the mobile communications device. ... Red Hat

12/24/15 / #20150370692

Guest-independent testing of guest firmware in virtualized systems

A system and methods are disclosed for testing guest firmware in virtualized computer systems. In accordance with one embodiment, a hypervisor executed by a processing device infers that firmware has created a system table in a portion of memory of a virtual machine. ... Red Hat

12/24/15 / #20150370667

Managing storage connections

A processing device identifies a failure with at least one physical storage device of a first set of physical storage devices accessible to a virtualized environment via a logical storage domain. The logical storage domain has an assigned address. ... Red Hat

12/17/15 / #20150363373

Shareable and cross-application non-destructive content processing pipelines

A method and system for providing shareable and cross-application non-destructive content processing pipelines. A set of non-destructive edits for a content item is received via a first content processing application, wherein the set of non-destructive edits includes a series of operations performed by a user on the content item. ... Red Hat

12/10/15 / #20150356161

Transport layer abstraction for clustering implementation

Systems and methods are disclosed for replicating data. An example method includes receiving at a server a current data index and current data. ... Red Hat

12/03/15 / #20150347559

Storage cluster data shifting

A method performed by a computing system includes creating a graph, wherein nodes of the graph represent data objects of a data storage cluster, wherein edges of the graph represent joins between data objects represented by both nodes of respective edges, wherein node values of the nodes and weights of the edges are based on statistics related to use of the data objects. The method further includes assigning a first subset of the data objects to a relational database storage node within the data storage cluster, the first subset of data objects being represented by nodes within a cluster of the graph, and assigning a second subset of the data objects to a non-relational database storage node within the data storage cluster, the second subset of data objects being represented by nodes within the graph that are not part of a cluster.. ... Red Hat

12/03/15 / #20150347319

Kernel key handling

According to one example, a method performed by a computing system includes determining that a size of key data to be stored within a kernel memory is greater than a threshold value. The threshold value is based on a size value associated with maintaining the key data outside of the kernel memory. ... Red Hat

12/03/15 / #20150347272

Native java backtracing from the c/c++ runtime

A system and method are disclosed for runtime probing of software. In accordance with one embodiment, a target method of a software application is modified to include a call to a first helper method and a call to a second helper method that occurs after the call to the first helper method. ... Red Hat

12/03/15 / #20150347240

Using an object retain block in a virtual machine

A method for using a retain block in application code executing on a virtual machine includes identifying an instruction in application code, the instruction pertaining to an object, determining the instruction is part of a retain block, prior to executing the instruction, determining whether the instruction is to cause the object to be modified, and when the instruction is to cause the object to be modified, storing data indicating a first state of the object in a retain block store and causing the first state of the object to be modified using a second state. Also, the method includes in response to an error occurring during an execution of the instruction, returning the object from the second state to the first state using the stored data.. ... Red Hat

12/03/15 / #20150347171

Intelligent detection of inconsistent advanced configuration and power interface (acpi) table instances in virtualized systems

A system and methods are disclosed for detecting inconsistent instances of a system table in a virtualized computer system. In accordance with one embodiment, a processing device decompiles a first binary representing a first instance of a system table, to obtain a first string of symbols. ... Red Hat

12/03/15 / #20150347169

Scheduler limited virtual device polling

A hypervisor executing on a computer system identifies a request of a guest operating system of a virtual machine in a shared device. The shared device comprises a shared memory space between a virtual processor of the virtual machine and the hypervisor. ... Red Hat

12/03/15 / #20150347167

Setup of management system in a virtualization system

Implementations for setup of management system in a virtualization system are disclosed. A method of the disclosure includes installing, by a setup program of a host machine, a virtual machine (vm) on the host machine in view of configuration information obtained by the setup program, verifying that an operating system (os) is installed on the vm, verifying that a management system is installed on the vm, confirming that the management system is responsive, when responsiveness of the management system is confirmed, sending a command to the management system to add the host machine to a list of host machines associated with the management system, and restarting the vm when a confirmation that the host machine is added to the list of the management system is received from the management system, wherein the management system is to manage the vm and one or more other vms of the host machine.. ... Red Hat

12/03/15 / #20150347166

Paravirtualized migration counter for migrating a virtual cpu to a different physical cpu

An application associated with a virtual processor running on a physical processor reads a first value of a counter and a second value of the counter. The counter is indicative of a migration status of the virtual processor with respect to the physical processor. ... Red Hat

12/03/15 / #20150347165

Virtual machine template management

Systems and methods for managing virtual machine templates. An example method may comprise: identifying, by a computer system, a virtual machine snapshot represented by a volume chain comprising one or more copy-on-write (cow) volumes; and creating, based on the virtual machine snapshot, a virtual machine template represented by a new cow volume, wherein the new cow volume comprises data from the cow volumes of the volume chain.. ... Red Hat

12/03/15 / #20150347111

Composite content views

A configuration management system provides a web user interface that allows a user to instruct the configuration management system to load content into an environment, take a snapshot of the environment, and store the snapshot in a snapshot library. The configuration management provides access to the snapshot library via the web user interface.. ... Red Hat

12/03/15 / #20150346787

Cloud management with power management support

A system and method for managing power in virtualized computer systems are disclosed. In accordance with one embodiment, a request to instantiate a virtual machine is received. ... Red Hat

11/26/15 / #20150339367

Shared application store for a platform-as-a-service (paas) system

A processing device of a container registry receives an indication of a selection of a container provided by the container registry, the container to deploy on a computer system in a hosted environment, the hosted environment comprising software and hardware facilities to execute the plurality of containers in a cloud computing environment, wherein the container is stored in a first repository. The processing device issues a command to create a second repository comprising a copy of the first repository. ... Red Hat

11/26/15 / #20150339207

Performance regression testing in presence of noise

A method and system includes calculating a performance metric for each of a plurality of builds of a software application in view of a respective performance test result associated with each of the plurality of builds, calculating a respective difference in performance metrics for each pair of consecutive builds of the plurality of builds, determining a largest performance drop in view of respective differences in the performance metrics among the pairs of consecutive builds of the plurality of builds, wherein the largest performance drop is associated with a first pair of consecutive builds comprising a first build and a second build, determining, by a processing device, a confidence level associated with the largest performance drop in view of performance test results associated with the first build and the second build, in response to determining that the confidence level is greater than or equal to a threshold, identifying one of the first build or the second build as a problematic build of the software application.. . ... Red Hat

11/26/15 / #20150339165

Identifying memory devices for swapping virtual machine memory pages

Systems and methods for identifying memory devices for swapping virtual machine memory pages. An example method may comprise: determining a workload type associated with a workload being executed by a virtual machine running on a computer system; identifying a memory device associated with the workload type; and allocating a memory block on the identified memory device for swapping memory pages of the virtual machine.. ... Red Hat

11/26/15 / #20150339155

Virtual processor states

A method includes, with a hypervisor, detecting that a virtual processor of a virtual machine has accessed a designated address, the designated address being associated with a time value, causing the virtual processor to enter a halt state for a period of time, and causing the virtual processor to exit the halt state after a period of time has passed, the period of time being based on the time value.. . ... Red Hat

11/26/15 / #20150339142

Memory monitor emulation

According to one example, a method includes with a hypervisor, detecting that a guest has executed a memory monitor command for a virtual processor, making a copy of a memory address associated with the memory monitor command, the copy being placed in hypervisor memory, and with the hypervisor, in response to detecting that the guest system has executed a wait command, executing a loop until the copy is different than the data stored in the memory address.. . ... Red Hat

11/19/15 / #20150334058

Adjusting buffer size for network interface controller

Systems and methods for adjusting the receive buffer size for network interface controllers. An example method may comprise: selecting a packet size value having a certain ordinal number in an ordered sequence of sizes of a plurality of data packets received by a network interface controller; and adjusting, in view of the selected packet size value, a size of a buffer associated with the network interface controller.. ... Red Hat

11/19/15 / #20150331812

Input/output (i/o) processing via a page fault doorbell mechanism

Systems and methods are disclosed for processing an input/output (i/o) operation. An example system includes a kernel interface that receives a notification of a page fault. ... Red Hat

11/19/15 / #20150331676

Managing a software appliance

Managing a software appliance is disclosed. A described method includes receiving from a user, a request specifying functionality of a custom software appliance and searching a repository, in view of the functionality, a pre-built software appliance, a recipe and a software component. ... Red Hat

11/12/15 / #20150324485

Lookup with key sequence skip for radix trees

Systems and methods are disclosed for determining whether a key is stored in a radix tree. An example system includes a traverser that identifies a container including a sequence of elements. ... Red Hat

11/12/15 / #20150324484

Offline radix tree compression with key sequence skip

Systems and methods are disclosed for compressing a radix tree. An example method of compressing a radix tree including a plurality of containers includes traversing a radix tree including a plurality of containers. ... Red Hat

11/12/15 / #20150324401

Offline compression for limited sequence length radix tree

Systems and methods are disclosed for compressing a radix tree. An example method of compressing a radix tree includes traversing a radix tree including a plurality of containers. ... Red Hat

11/12/15 / #20150324384

Offline generation of compressed radix tree with key sequence skip

Systems and methods are disclosed for compressing a radix tree. An example method includes traversing a radix tree including a plurality of containers. ... Red Hat

11/05/15 / #20150319068

Metering software infrastructure in a cloud computing environment

A system and method include determining, by a processing device, a first quantity associated with usage of a hardware resource on which a virtual machine is instantiated in a cloud, determining, by the processing device from the virtual machine, a second quantity associated with usage of a software resource utilized on the virtual machine, and determining usage of the cloud in view of the first quantity and the second quantity.. . ... Red Hat

10/29/15 / #20150310067

Method and system for providing security in a data federation system

An example method of controlling access to data stored in a plurality of autonomous data sources includes receiving a federated query including a plurality of source queries. The method also includes receiving a request to submit a source query to a target data source. ... Red Hat

10/22/15 / #20150304357

Extending selinux policy with enforcement of file name translations

An operating system identifies a request of a process to create a new object with a name in a file system of the processing device. The operating system identifies a policy rule applicable to the new object in view of at least the name of the new object. ... Red Hat

10/01/15 / #20150281271

Inhibiting denial-of-service attacks using group controls

A processor receives within a user interface of a process server on a first computer system a first signal that includes a request to create an isolated execution environment within a host environment controlled by an operating system executing on a second computer system, receives a second signal that specifies a control group, which specifies an amount of hardware resources on the second computer system that are accessible to the isolated execution environment, for the isolated execution environment. The processor generates a third signal that requests creation by a processor of the second computer system of the isolated execution environment and application of the control group to the isolated execution environment. ... Red Hat

10/01/15 / #20150278825

Behavior adjustment based on capabilities of a downstream server

Systems, methods, and techniques are disclosed for controlling access to a subscription. An example method includes receiving a set of capabilities of a downstream server and storing the set of capabilities in a distributor record. ... Red Hat

10/01/15 / #20150277962

Reducing or suspending transfer rate of virtual machine migration when dirtying rate exceeds a convergence threshold

An example method for adjusting the rate of transfer of the execution state of a virtual machine undergoing live migration may comprise determining, by a processor, a first rate being a rate of change of an execution state of a virtual machine undergoing live migration from a first computer system to a second computer system. The example method may further comprise determining a second rate being a rate of transfer of the execution state of the virtual machine to the second computer system. ... Red Hat

10/01/15 / #20150277886

Configuring dependent services associated with a software package on a host system

A software package to be installed on a host system may be received. Services of the host system that are associated with the software package may be identified. ... Red Hat

09/24/15 / #20150271149

Smart card accessible over a personal area network

Systems and methods for a smart card accessible over a personal area network (pan). An example method may include: communicatively coupling a device to the pan, storing a digital certificate that identifies a user, logging the user on to an additional device within the pan, and providing an encryption service for the additional device, by: receiving a message to be encrypted, encrypting the message, sending the encrypted message to the additional device via the pan, receiving an encrypted version of an additional message, decrypting the additional message using the private key associated with the user to produce an unencrypted version of the additional message, and sending the unencrypted version of the additional message to the additional device via the pan.. ... Red Hat

09/24/15 / #20150269214

Identifying files in change logs using file content location identifiers

Systems and methods for identifying files in change logs using file content location identifiers. An example method may comprise: detecting a file system operation associated with a file; and creating a change log record comprising an identifier of a first data structure referencing a first physical location of contents of the file before the file system operation, and an identifier of a second data structure referencing a second physical location of the contents of the file after the file system operation.. ... Red Hat

09/24/15 / #20150269213

Compacting change logs using file content location identifiers

Systems and methods for compacting change logs using file content location identifiers. An example method may comprise: identifying a first change log record comprising an identifier of a first data structure referencing a first physical location of contents of a file before a first file system operation, the first change log record further comprising an identifier of a second data structure referencing a second physical location of the contents of the file after the file first system operation; identifying a second change log record comprising the identifier of the second data structure referencing the second physical location of the contents of the file before a second file system operation, the second change log record further comprising an identifier of a third data structure referencing a third physical location of the contents of the file after the second file system operation; and replacing the first change log record and the second change log record with a third change log record comprising the identifier of the first data structure and the identifier of the third data structure.. ... Red Hat

09/24/15 / #20150269183

File replication using file content location identifiers

Systems and methods for file replication using file content location identifiers. An example method may comprise: receiving an identifier of a data structure associated with a file residing on a first file server, the data structure referencing a physical location of the contents of the file; identifying a file system operation to be performed with respect to a replica of the file residing on a second file server; and performing the file system operation by accessing the replica of the file using a file name alias comprising the identifier of the data structure.. ... Red Hat

09/24/15 / #20150269066

Indirect resource management

A method for memory management includes allocating an available block of memory for use by a first object, determining that the block of memory includes at least a portion of a second object, the second object no longer being used by an application associated with the second object, determining that the second object utilized at least one resource that was not shutdown, releasing the at least one resource, and writing to the block of memory with the first object.. . ... Red Hat

09/10/15 / #20150254096

Management of inter-dependent configurations of virtual machines in a cloud

A server computer system determines that configuring a first virtual machine in a cloud depends on a configuration result of configuring a second virtual machine. The server computer system configures the second virtual machine in the cloud and configures the first virtual machine in the cloud using the configuration result of the second virtual machine.. ... Red Hat

09/03/15 / #20150249707

Triggering workload movement based on policy stack having multiple selectable inputs

A policy management tool can access a set of usage history data for a set of resources consumed by the workload and generate a migration policy stack in view of a set of user-selected policy parameters, wherein the set of user-selected policy parameters comprises a set of multiple selectable inputs, and the migration policy stack comprises a set of one or more migration policies. The policy management tool can evaluate the set of one or more workload migration policies in view of the set of usage history data to configure a migration of the workload, and schedule the migration of the workload in view of the evaluating.. ... Red Hat

09/03/15 / #20150249703

Systems and methods for communicating information of participants registered with a sub-coordinator during distributed transaction processing

Systems and methods are provided for prepare list communication to participants in a two-phase commit protocol transaction processing. An exemplary method includes receiving a distributed transaction for processing, wherein the processing uses a two-phase commit protocol, receiving a distributed transaction comprising a plurality of processes for processing, wherein the processing uses a two-phase commit protocol and preparing, by a main coordinator, at least one participating processing node from the plurality of processes, wherein the at least one participating processing node comprises a first sub-coordinator and a first participant, and wherein the first participant executes a first process of the plurality of processes. ... Red Hat

09/03/15 / #20150248839

Contextual graphical user interface training

A method for contextual graphical user interface (gui) training includes, with a training module, switching from a normal mode of the gui to a lesson mode to provide a lesson to a user, the lesson being one of a number of lessons that were preselected by the user. The method further includes, while in the lesson mode, overlaying instructions of a task onto the gui, with the training module, providing example user input to demonstrate the task, with the training module, undoing the task, prompting the user to perform the task, notifying the user that an input received by the computing system does not correspond to the demonstrated task, and recording completion of the task in response to input from the user, the input corresponding to successful completion of the demonstrated task.. ... Red Hat

09/03/15 / #20150248703

Geographically-aware electronic traveling advertisements

Implementations disclose geographically-aware electronic traveling advertisements. A method includes providing, by a mobile advertising unit, advertisements for display on an electronic display of the mobile advertising unit, wherein the advertisements are stored in a data store of the mobile advertising unit, receiving a priority advertisement and rules corresponding to the priority advertisement, wherein the rules comprise a range of locations that trigger display of the priority advertisement and a time range to trigger display of the priority advertisement, identifying a current location of the mobile advertising unit from a location unit of the mobile advertising unit and a current time, determining that at least one of the current location is within the range of locations of the rules for the priority advertisement or the current time is within the time range of the rules for the priority advertisement, and providing the priority advertisement for display on the electronic display.. ... Red Hat

09/03/15 / #20150248631

Systems and methods for intelligent batch processing of business events

Systems and methods are provided for intelligent batch processing of business events. An exemplary method includes accessing a business process having a plurality of events for execution, determining, using one or more hardware processors, a batch group for processing comprising at least one of the plurality of events, wherein the batch group is determined using a time delay for collecting the at least one of the plurality of events to determine the batch group, and submitting the batch group for processing the at least one of the plurality of events. ... Red Hat

09/03/15 / #20150248449

Online compression for limited sequence length radix tree

Systems and methods are disclosed for inserting a key into a radix tree. In an example method, inserting a key into the radix tree includes comparing a first key including a first sequence of elements with a second key including a second sequence of elements. ... Red Hat

09/03/15 / #20150248448

Online radix tree compression with key sequence skip

Systems and methods are disclosed for inserting a key into and removing a key from a composite data structure including a radix tree and an auxiliary data structure. In an example, a method of inserting a key into the composite data structure includes receiving an instruction to store a first key in the composite data structure. ... Red Hat

09/03/15 / #20150248434

Delayed asynchronous file replication in a distributed file system

Delayed asynchronous file replication in a distributed file system is described. A first server receives requests to perform a updates to a first replica of a file. ... Red Hat

09/03/15 / #20150248404

Database schema migration

Various example embodiments are directed to systems and methods for migrating a database from a source database having a source schema to a target database having a target schema. For example, a computing device may identify a first source schema table associated with a first migration instruction. ... Red Hat

09/03/15 / #20150248403

Database schema migration

Various example embodiments are directed to systems and methods for migrating a database from a source database having a source schema to a target database having a target schema. For example the migrating may comprise a pre-migration phase and a migration phase. ... Red Hat

09/03/15 / #20150248361

Memory distribution across multiple non-uniform memory access nodes

A system, methods, and apparatus for determining memory distribution across multiple non-uniform memory access processing nodes are disclosed. An apparatus includes processing nodes, each including processing units and main memory serving as local memory. ... Red Hat

09/03/15 / #20150248333

Enabling disk image operations in conjunction with snapshot locking

Systems and methods for enabling disk image operations in conjunction with snapshot locking. An example method may include: attaching a first snapshot to a first virtual machine the first snapshot being stored within a disk image, generating, in view of the first snapshot, a second snapshot, the second snapshot being stored within the disk image, attaching the first snapshot to a second virtual machine, and causing the first snapshot to be locked in view of the second virtual machine performing one or more operations on the first snapshot, wherein the first virtual machine performs one or more operations on the second snapshot concurrent with the locking of the first snapshot.. ... Red Hat

09/03/15 / #20150248320

Host-storage connectivity monitoring

Systems and methods for host-storage connectivity monitoring. An example method may include: receiving first status information from a first host connected to a storage domain, processing the first status information to determine an operation status of the storage domain with respect to the first host, comparing the operation status of the storage domain with respect to the first host with an operation status of the storage domain with respect to a second host, and, in response to a determination that both the operation status of the storage domain with respect to the first host and the operation status of the storage domain with respect to the second host include one or more errors, maintaining an operational accessibility of the first host.. ... Red Hat

09/03/15 / #20150248309

Systems and methods for prepare list communication to participants in two-phase commit protocol transaction processing

Systems and methods are provided for prepare list communication to participants in a two-phase commit protocol transaction processing. An exemplary method includes receiving a distributed transaction for processing, wherein the processing uses a two-phase commit protocol, preparing a first participating node comprising a first process of the distributed transaction, and preparing a second participating node comprising a second process of the distributed transaction. ... Red Hat

09/03/15 / #20150248308

Systems and methods for semi-durable transaction log storage in two-phase commit protocol transaction processing

Systems and methods are provided for semi-durable transaction log storage in a two-phase commit protocol transaction processing. An exemplary method includes receiving a distributed transaction comprising a plurality of processes for processing, wherein the processing uses a two-phase commit protocol and preparing, by a main coordinator, at least one participant comprising at least one of the plurality of processes to prepare for execution by the at least one participant. ... Red Hat

09/03/15 / #20150248303

Paravirtualized migration counter

An application associated with a processor reads a first value of a counter and a second value of the counter. The counter is indicative of a migration status of the application with respect to the processor. ... Red Hat

09/03/15 / #20150248288

Compiled file normalization

A method performed by a computing system includes, with the computing system, extracting non-compiler specific components from a first compiled file, the first compiled file being compiled from a piece of source code, and with the computing system, rearranging the extracted non-compiler specific components into a normalized order, the normalized order being used to consistently arrange a plurality of compiled files.. . ... Red Hat

09/03/15 / #20150248237

Reverse copy on write for better cache utilization

Methods, systems, and computer program products for providing reverse copy-on-write for improved cache utilization are disclosed. Examples generally relate to both physical and virtualized computer systems. ... Red Hat

08/27/15 / #20150244802

Importing and exporting virtual disk images

A processing device receives a first command to export a first virtual image to a server, wherein the first virtual disk image comprises a plurality of volumes that comprise a read-only base volume and at least one additional volume that comprises changes to the base volume. The processing device generates a map of the first virtual disk image, wherein the map identifies, for each offset in the first virtual disk image, which of the plurality of volumes contains most recent data for the offset. ... Red Hat

08/27/15 / #20150244667

Mailing list manipulations

Implementations for mailing list manipulations are disclosed. In one example, the method includes receiving a first distribution list comprising a first plurality of electronic messaging system addresses, receiving a first identifier referencing a first electronic messaging system address, and causing a message to be sent to one or more electronic messaging system address in the first distribution list except to the first electronic messaging system address.. ... Red Hat

08/27/15 / #20150244616

Routing a message in a dynamic service mesh

An example method for routing a message in a dynamic service mesh includes receiving at a mesh point a first message from a sender service and determining, based on a routing table, whether the mesh point has previously received a second message from the sender service. When the mesh point is determined to not have received the second message from the sender service, the first message is routed to a target service in the dynamic service mesh. ... Red Hat

08/27/15 / #20150244608

Reactive source routing associated with a network

An initiation of a network device on a host system may be detected and an ip address may be assigned to the network device. Furthermore, a network gateway may be associated with the ip address. ... Red Hat

08/27/15 / #20150244584

User interface for adding and removing rows associated with virtual machines

A graphical user interface may be provided. In some embodiments, the graphical user interface may include a plurality of rows. ... Red Hat

08/27/15 / #20150244582

Host connectivity templates

A system and a method are disclosed for configuring hosts of virtual machines. The system and method include receiving, by a management server, a network configuration of a first host, wherein the first host is associated with a network identified by a network label, storing the network configuration of the first host in a template record, in response to a request to configure a second host, determining if the second host is to join the network identified by the network label, and configuring the second host using the template record.. ... Red Hat

08/27/15 / #20150244574

Offloading to a network interface card

A processing device sends a set of executable instructions to a network interface controller (nic). The processing device accesses a report generated by the nic after the nic has executed at least one instruction from the set of executable instructions.. ... Red Hat

08/27/15 / #20150244573

Network interface card offloading

A network interface controller (nic) executes a set of instructions with respect to received data communications packet and generates output data associated with the execution of the set of instructions. The nic stores the output data in a location that is accessible to an operating system.. ... Red Hat

08/27/15 / #20150244569

Unified and persistent network configuration

A system and a method are disclosed to configure networking components, including in response to a first configuration command, creating a running configuration for a host computer, saving the running configuration in a configuration file stored in a temporary directory, and in response to receiving a second configuration command to make the running configuration persistent, copying the configuration file to a persistent directory.. . ... Red Hat

08/27/15 / #20150244568

Virtual device profile

A system and a method are disclosed for configuring virtual network interface cards (vnics) of virtual machines, including presenting on a graphic user interface (gui), by a management server of a host executing a virtual machine (vm), a plurality of attributes of a virtual network interface card (vnic), assigning, via the gui, values to the plurality of attributes, storing the values of the plurality of attributes in a profile on the management server, and configuring a second vnic of the vm using the values in the profile.. . ... Red Hat

08/27/15 / #20150244566

Network configuration via abstraction components and standard commands

An apparatus receives a request to establish a networking configuration. The apparatus creates one or more networking abstraction components, wherein the created networking abstraction components represent the networking configuration to be established. ... Red Hat

08/27/15 / #20150244511

Duplex services residing in a messaging bus

An example method of integrating a plurality of heterogeneous peer-to-peer communication participants includes retrieving from a first input queue coupled to a duplex service a first message. The first message includes a message identifier and is from a sender. ... Red Hat

08/27/15 / #20150242600

Offering additional license terms during conversion of standard software licenses for use in cloud computing environments

A processor receives, from a software vendor system, a rule for converting a software license associated with a software program to a cloud software license associated with using the software program in a cloud computing environment, and receives, from an owner computer of the software license, a request to convert the software license to the cloud software license. The request includes an identifier of the software vendor system and a license identifier. ... Red Hat

08/27/15 / #20150242464

Source query caching as fault prevention for federated queries

An example system for processing a federated query includes a query proxy that receives a federated query including a plurality of source queries and receives an indication that a failed set of one or more source queries failed to execute successfully. Each source query is specific to an autonomous data source belonging to a federation. ... Red Hat

08/27/15 / #20150242330

Guest-programmable location of advanced configuration and power interface (acpi) tables in virtualized systems

A system and method are disclosed for guest-programmable relocation of system tables in a virtualized computer system. In accordance with one embodiment, a hypervisor that is executed by a computer system obtains a first base address of a first portion of memory, where the first base address is in an address space of a guest of a virtual machine, and where the first base address is for a set of one or more system tables that is currently exposed by the hypervisor at a second portion of memory having a second base address in the address space of the guest. ... Red Hat

08/27/15 / #20150242283

Backing up virtual machines

A processing device generates a live snapshot of a virtual disk image attached to a virtual machine, wherein generating the live snapshot comprises converting an existing read-write volume to a read-only volume. The processing device generates, from the read-only volume, a temporary snapshot of the virtual disk image, the temporary snapshot comprising a temporary read-write volume. ... Red Hat

08/27/15 / #20150242282

Mechanism to update software packages

A system and a method are disclosed, including in response to a request to upgrade software stored in a file system, creating, by a processing device, a first snapshot of a file system, responsive to receiving a rollback request, creating a second snapshot of the file system, and rolling back the file system using the first snapshot.. . ... Red Hat

08/27/15 / #20150242232

Resuming a paused virtual machine

A host in a virtualization system pings one or more storage domains. When the host determines that a storage domain in inaccessible and later determines that the storage domain is once again accessible, the host may determine a set of virtual machines associated with the storage domain that are paused. ... Red Hat

08/27/15 / #20150242230

Hypervisor capability access provision

An apparatus receives virtualization manager indication of a capability selected from a virtualization manager capability subset. The apparatus receives non-virtualization manager indication of a selected capability not in said subset. ... Red Hat

08/27/15 / #20150242229

Idle processor management by guest in virtualized systems

A system and method for idle processor management in virtualized systems are disclosed. In accordance with one embodiment, a guest operating system (os) of a virtual machine estimates an idle time for a virtual central processing unit (cpu) of the virtual machine, where the virtual machine is executed by a cpu of a host computer system, and where the virtual cpu is mapped to the cpu. ... Red Hat

08/27/15 / #20150242225

Execution of a script based on properties of a virtual device associated with a virtual machine

An event associated with a virtual machine may be identified. Furthermore, a script associated with the event may be identified. ... Red Hat

08/27/15 / #20150242224

Disk resize of a virtual machine

An engine in a virtualization system may determine that a disk size of a disk represented by a virtual machine disk image is to be changed. In response, the engine determines whether a host is using the virtual machine disk image to run a virtual machine and also determines a file format of the virtual machine disk image. ... Red Hat

08/27/15 / #20150242221

Using linker scripts for loading system configuration tables

Systems and methods for using linker scripts for loading system configuration tables. An example method may comprise: packaging, by a host computer system, a first system configuration table and a second system configuration table into one or more memory image files; providing a script comprising a first instruction to load the memory image files into a memory of a virtual machine being executed by the host computer system, the script further comprising a second instruction to resolve, in view of a base address, a reference by the first system configuration table to the second system configuration table; and providing the memory image files and the script to the virtual machine.. ... Red Hat

08/27/15 / #20150242203

Determining character sequence digest

Systems and methods for determining a character sequence digest. An example method may comprise: identifying, within a character sequence, one or more sections, wherein each section comprises a section header and one or more section bodies; performing the following operations for each identified section body: responsive to determining that the section body is not preceded by a section header, prepending a section header to the section body; calculating a section digest by applying a hash function to the section comprising the section header and the section body; and calculating a digest of the character sequence by applying a symmetric summing operation to one or more section digests.. ... Red Hat

08/27/15 / #20150242199

Deployment optimization for activation of scaled applications in a multi-tenant platform-as-a-service (paas) system

A mechanism for optimization of deployment of applications for activation in a multi-tenant platform-as-service (paas) system is disclosed. A method of the disclosure includes receiving, by a processing device, a request for deployment of an application source code on a node. ... Red Hat

08/27/15 / #20150242197

Automatic installing and scaling of application resources in a multi-tenant platform-as-a-service (paas) system

A mechanism for automatic installing and scaling of application resources in a multi-tenant platform-as-a-service (paas) environment in a cloud computing system is disclosed. A method includes creating, by a processing device of an infrastructure-as-a-service (iaas) platform, an image package corresponding to a node host on a multi-tenant platform-as-a-service (paas) system. ... Red Hat

08/27/15 / #20150242159

Copy-on-write by origin host in virtual machine live migration

Systems and methods for reducing network traffic in virtual machine live migration. An example method may comprise: intercepting, by a first computer system, a write access to a memory page by a virtual machine undergoing live migration from the first computer system to a second computer system; storing a copy of the memory page in a memory before allowing the virtual machine to modify the memory page; identifying data to be transmitted to the second computer system responsive to comparing the memory page and the copy of the memory page; and transmitting the data to the second computer system.. ... Red Hat

08/27/15 / #20150242121

Per-memory group swap device

Systems and methods are disclosed for swapping a memory page from memory to a swap device. An example system for swapping a memory page from memory to a swap device includes a memory to store one or more memory pages. ... Red Hat

08/27/15 / #20150242079

User interface with an expandable navigation tree

A graphical user interface (gui) may be provided. The gui may include a navigation tree in a first portion and a link in a second portion. ... Red Hat

08/20/15 / #20150237464

Systems and methods for delaying social media sharing based on a broadcast media transmission

Systems and methods are provided for delaying social media sharing based on a broadcast media transmission. An exemplary method includes determining a location of a user and associating the location of the user with an event occurring at the location. ... Red Hat

08/20/15 / #20150237114

Geographic placement of application components by a multi-tenant platform-as-a-service (paas) system

Implementations for geographic placement of application components by a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes providing, by a processing device of a multi-tenant paas system, a list of geographic locations to a user of a multi-tenant paas system, receiving, by the processing device from the user, a first request to deploy a component of an application corresponding to the user, the first request comprising a selection of one of the geographic locations from the list, and communicating, by the processing device, a second request to deploy the component of the application, the second request directed to a messaging server dedicated to the selected geographic location of the user, the dedicated messaging server of the selected geographic location to handle a configuration of a node in the selected geographic location for the component of the application.. ... Red Hat

08/20/15 / #20150237025

Storing a key to an encrypted file in kernel memory

Storing a key to an encrypted file in a kernel memory is disclosed. Authentication data may be received and authentication credentials of the authentication data may be stored in a file. ... Red Hat

08/20/15 / #20150234667

Defining classes as singleton classes or non-singleton classes

One or more of the classes is defined using an attribute or keyword that indicates that the one or more classes may be defined as singleton classes or non-singleton classes (a class that may be instantiated more than once). A compiler system converts the class to a singleton class when the compiler system receives a command or request indicating that the class is to be defined as a singleton class. ... Red Hat

08/20/15 / #20150234643

Identifying singleton classes

A compiler system analyzes source code for an application. The compiler system determines whether a class in the source code uses a singleton pattern even though the class is not defined as singleton class. ... Red Hat

08/13/15 / #20150229580

Multiple cloud marketplace aggregation

A processor replicates a request for a computer resource to a plurality of clouds, and updates a repository in view of resource offerings received from the plurality of clouds. The repository stores resource and service data for each cloud. ... Red Hat

08/13/15 / #20150229537

Policy enforcement in a distributed computing system

A policy is added to a repository. The repository is a component of a distributed computing system. ... Red Hat

08/13/15 / #20150227574

Commit-one-phase distributed transactions with multiple starting participants

A request from previous coordinator node to assume control of a two-phase commit distributed transaction is received. The previous coordinator node has sent a commit query to multiple participants of the two-phase commit distributed transaction. ... Red Hat

08/13/15 / #20150227537

Non-uniform file access in a distributed file system

Data connections from a remote login session are identified and an identification query may be transmitted by the remote login session to endpoints (e.g., servers) of the data connections. In response to the identification query, identification information may be received from the endpoints. ... Red Hat

08/13/15 / #20150227535

Caseless file lookup in a distributed file system

A caseless file lookup in a distributed file system is disclosed. A request to store a file in a volume may be received. ... Red Hat

08/13/15 / #20150227382

Monitoring virtual machine protocols, services, and operations

Systems and methods for monitoring virtual machine protocols, services, and operations. An example method may comprise: initiating a connection to a virtual machine; receiving service data, the service data pertaining to one or more services installed on the virtual machine, and protocol data pertaining to one or more protocols utilized by the virtual machine; generating, with a processing device and in view of at least one of the service data or the protocol data, one or more configuration commands, the one or more configuration commands corresponding to at least one of the one or more services or the one or more protocols; and transmitting the one or more configuration commands to the virtual machine.. ... Red Hat

08/13/15 / #20150227381

Transmitting encapsulated snmp commands to virtual machines

Systems and methods for transmitting encapsulated snmp commands to virtual machines. An example method may comprise: receiving, from a network device, a first simple network management protocol (snmp) request, the first snmp request being directed to a virtual machine executing on a host device; encapsulating the snmp request with a virtualization manager executing on the host device; and providing the encapsulated snmp request to the virtual machine.. ... Red Hat

08/13/15 / #20150227350

Multi-dimensional, multi-configuration compilation phase output visualization technique

Systems and methods of providing a visual output of a compilation phase is provided. An example method includes receiving input source code for compilation by a compiler and displaying a multi-dimensional coordinate system including first and second axes. ... Red Hat

08/13/15 / #20150227317

Performing discard commands on raid storage devices

An example method for performing discard commands on redundant array of independent disks (raid) devices may comprise receiving a request to free a range of logical sectors that is mapped to a plurality of storage devices organized as raid. The method may further comprise identifying a first physical sector number corresponding to a first logical sector having a lowest number greater or equal than a starting logical sector number of the range of logical sectors. ... Red Hat

08/06/15 / #20150220725

Single login multiplexing

A method and system for providing access to application, where an association of a plurality of passwords with a login for an account of an application is maintained, wherein each of the plurality of passwords has a corresponding user and a corresponding set of privileges. A request for access to the account is received from a first user including the login and a first password of the plurality of password corresponding to the user, and the user is authenticated in view of the login and the password. ... Red Hat

08/06/15 / #20150220406

Virtual machine-guest driven state restoring by hypervisor

An example method of saving and restoring a state of one or more registers for a guest includes detecting exit of a virtual machine mode of a guest running on a virtual machine. A set of registers is accessible by the guest and includes a first subset of registers and a second subset of registers. ... Red Hat

07/30/15 / #20150215209

Multiple active link aggregators

A computing device identifies a plurality of network interface controllers (nics) of a computing device that are available for link aggregation. The computing device establishes a first link aggregator for a first set of the plurality of nics and a second link aggregator for a second set of the plurality of nics. ... Red Hat

07/30/15 / #20150215128

Mobile device user strong authentication for accessing protected network resources

Systems and methods for strong user authentication for accessing protected applications by mobile computing devices. An example method may comprise: receiving, by a mobile computing device, a cryptographic nonce via a first communication interface; transmitting, via a second communication interface, an authentication request using the cryptographic nonce, to an authentication server via an http proxy server; receiving a resource access token from the authentication server; and transmitting a computing resource access request using the resource access token.. ... Red Hat

07/30/15 / #20150212956

Updating virtual machine memory by interrupt handler

Systems and methods for directly updating the virtual machine memory by interrupt handlers. An example method may comprise: receiving, by a computer system, an interrupt triggered by a physical device; receiving, by an interrupt handling routine, a data frame from the physical device; identifying a virtual machine to receive the interrupt; and responsive to determining that an active memory context on the computer system matches a memory context of the virtual machine, writing, by the interrupt handling routine, the data frame into a memory of the virtual machine.. ... Red Hat

07/30/15 / #20150212948

Lazy memory transformation in virtual machine live migration

Systems and methods for lazy memory transformation in virtual machine live migration. An example method may comprise: receiving, by a computer system, a plurality of transformed memory blocks, each transformed memory block comprising one or more memory pages mapped into an address space of a virtual machine being migrated to the computer system; storing, in a memory data structure, one or more mappings, each mapping comprising a guest virtual address of a memory page and an identifier of a transformed memory block containing the memory page; responsive to detecting an access to a memory page by the virtual machine, identifying, using the memory data structure, a transformed memory block containing the memory page being accessed; and storing in a memory mapped into the address space of the virtual machine the memory page produced by performing a reverse transformation of the transformed memory block.. ... Red Hat

07/30/15 / #20150212940

Identifying performance limiting internode data sharing on numa platforms

Methods, systems, and computer program products for identifying performance limiting internode data sharing on non-uniform memory access (numa) platforms are provided. A computer-implemented method may include receiving event records collected by a performance monitoring unit (pmu) during event tracing, associating the event records with corresponding operating system information observed during the event tracing, analyzing the event records to identify shared cache line utilization, and generating a shared cache line utilization report in view of the analyzing.. ... Red Hat

07/30/15 / #20150212850

Using compensation transactions for multiple one-phase commit participants

An example system includes a registration engine that receives a request to register with a transaction. The request is from a one-phase commit resource manager. ... Red Hat

07/30/15 / #20150212846

Reducing redundant network transmissions in virtual machine live migration

Systems and methods for reducing redundant network transmissions in virtual machine live migration. An example method may comprise: reading, by a hypervisor running on a first computer system, from a memory mapped into an address space of a virtual machine undergoing live migration from the first computer system to a second computer system, a data structure comprising a plurality of records, each record mapping an address of a memory page to an identifier of a virtual disk frame storing contents of the memory page; reading a plurality of page modification flags, each page modification flag indicating that contents of a corresponding memory page differ from contents of a virtual disk frame referenced by the data structure; responsive to determining that a memory page is referenced by the data structure and that a page modification flag corresponding to the memory page is set, transmitting the memory page to the second computer system; and responsive to determining that a memory page is not referenced by the data structure, transmitting the memory page to the second computer system.. ... Red Hat

07/30/15 / #20150212845

Lazy disk input/output in virtual machine live migration

Systems and methods for implementing lazy disk i/o in virtual machine live migration. An example method may comprise: determining, by a first computer system, that contents of a memory page mapped into an address space of a virtual machine undergoing live migration from a second computer system to the first computer system is stored on a network-accessible virtual disk; storing, in a memory data structure, a mapping of an address of the memory page to an identifier of a location of the memory page on the virtual disk; and responsive to detecting an access to the memory page by the virtual machine, storing in a memory mapped into the address space of the virtual machine the memory page retrieved from the location of the memory page on the virtual disk.. ... Red Hat

07/30/15 / #20150212844

Fair unidirectional multi-queue virtual machine migration

Methods, systems, and computer program products for providing fair unidirectional multi-queue virtual machine migration are disclosed. A computer-implemented method may include maintaining a current scan identifier for each of a plurality of streams used to migrate a virtual machine from a first hypervisor to a second hypervisor, determining when a current scan identifier of a first stream and a current scan identifier of a second stream are associated with different memory states of the virtual machine, and adjusting processing of memory updates when the current scan identifiers are associated with different memory states of the virtual machine. ... Red Hat

07/30/15 / #20150212841

Delayed population of advanced configuration and power interface (acpi) tables by hypervisor

A system and method for system table modification in a virtualized computer system are disclosed. In accordance with one embodiment, a hypervisor that is executed by a computer system detects an attempt by a guest operating system of a virtual machine to access a system table. ... Red Hat

07/30/15 / #20150212839

Tracking transformed memory pages in virtual machine chain migration

Systems and methods for tracking transformed memory pages in virtual machine chain migration. An example method may comprise: receiving, by a computer system, a transformed memory block comprising one or more memory pages mapped into an address space of a virtual machine being migrated to the computer system; performing a reverse transformation of at least part of the transformed memory block, to produce a memory page comprised by the transformed memory block; storing, in a memory, the memory page; detecting a modification of the memory page by the virtual machine; and, responsive to determining that a number of modified memory pages associated with the transformed memory block exceeds a threshold value, discarding the transformed memory block.. ... Red Hat

07/23/15 / #20150207875

Distributed coordinated snapshots

A management process coordinates a number of servers to create a crash-consistent distributed snapshot. The management process instructs the servers to enter an ambiguity mode in which acknowledgement of barrier operations is delayed, instructs the servers to generate portion snapshots, and instructs the servers to exit the ambiguity mode and acknowledge barrier operations.. ... Red Hat

07/23/15 / #20150205818

Tiered distributed storage policies

A processing device identifies a file (or data block) and selects a storage location for the file based on a plurality of data distribution policies. To select the storage location, the processing device applies, at a top distribution layer, a first data distribution policy to select a first storage pool from a plurality of storage pools based on a first storage criterion. ... Red Hat

07/23/15 / #20150205634

Resilient scheduling of broker jobs for asynchronous tasks in a multi-tenant platform-as-a-service (paas) system

Implementations for resilient scheduling of broker jobs for asynchronous tasks in a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes receiving, by the processing device of a broker of a multi-tenant paas system from a user of the multi-tenant paas system, a request to complete a job, adding, by the processing device, an entry corresponding to the requested job in a data store of the broker, adding, by the processing device, another entry corresponding to the requested job in a scheduler communicably coupled to the broker, and sending, by the processing device to the user, an acknowledgment of the request and an identifier (id) of the job, wherein the job is processed asynchronous to the sending of the acknowledgment.. ... Red Hat

07/23/15 / #20150205610

Configuring managed systems using abstracted functions

Systems and methods for configuring managed systems using abstracted functions. An example method may include: receiving a command corresponding to one or more instructions in a defined protocol, the instructions being directed to a first system and a second system, processing the command to generate the instructions, configuring a first instance of the one or more instructions with respect to the first system, configuring a second instance of the one or more instructions with respect to the second system, determining, with the processing device, an execution efficiency metric with respect to the first instance of the one or more instructions and the second instance of the one or more instructions, and providing, in view of the execution efficiency metric, at least one of the first instance of the one or more instructions to the first system or the second instance of the one or more instructions to the second system.. ... Red Hat

07/16/15 / #20150199787

Distribute workload of an application to a graphics processing unit

Systems, methods, and techniques of distributing a workload of an application to a gpu are provided. An example method includes obtaining an intermediate representation of a source code portion of an application and compiling the intermediate representation into a set of instructions that is native to the gpu. ... Red Hat

07/16/15 / #20150199747

Associating interdependent subscriptions

Implementations for associating stackable subscriptions with varying attribute coverage are disclosed. In one example, the method includes receiving a fulfillment requirement associated with a computing system, selecting a first product subscription from a plurality of product subscriptions in a data store, determining whether the first product subscription partially satisfies the fulfillment requirement, selecting a second product subscription from the plurality of product subscriptions when the first product subscription partially satisfies the fulfillment requirement, determining whether an addition of the second product subscription to the first product subscription satisfies the fulfillment requirement, and associating the first and second product subscriptions with the computing system when the addition of the second product subscription to the first product subscription satisfies the fulfillment requirement.. ... Red Hat

07/16/15 / #20150199404

System and method for batch query processing

A system and method of batch query processing includes accumulating data queries in a query holding area of a query assistant running in a computer server, separating the accumulated data queries into a plurality of partitions, ordering the partitions, ordering the accumulated data queries within each of the partitions, and processing the accumulated data queries in an order based on the ordering of the partitions and the ordering of the data queries within each of the partitions. Each of the partitions includes data queries with a respective from-type. ... Red Hat

07/16/15 / #20150199209

Hypervisor-based balloon page initialization

Methods, systems, and computer program products for hypervisor-based balloon page initialization are provided. A computer-implemented method may include receiving, by a hypervisor, a memory page from a guest, returning the memory page to the guest, and notifying the guest that the hypervisor is to initialize the returned memory page.. ... Red Hat

07/09/15 / #20150195377

Conditional request processing

A method and system for processing a request is provided. An example system includes a security module that authenticates a request from a client. ... Red Hat

07/09/15 / #20150195337

Downloadable cartridges for a multi-tenant platform-as-a-service (paas) system

Implementations for downloadable cartridges for a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes receiving, by a processing device of a multi-tenant platform-as-a-service (paas) system, a location of a cartridge manifest corresponding to a cartridge that is maintained outside of the multi-tenant paas system, downloading the cartridge manifest from the received location, parsing the downloaded cartridge manifest to determine a source location of files of the cartridge, the source location separate from the multi-tenant paas system, and causing the files of the cartridge to be obtained from the determined source location for use by at least one node of the multi-tenant paas system that is hosting an application requesting the cartridge.. ... Red Hat

07/09/15 / #20150195138

Cloud-based service resource provisioning based on network characteristics

Provisioning a resource to provide a service based on network characteristics is disclosed. A request for a service may be received and network characteristics of current resources providing the service may be identified. ... Red Hat

07/09/15 / #20150193541

Query data splitting

Implementations for query data splitting are disclosed. In one example, the method includes receiving, by a processing device, a first query and a second query, determining that the second query is a subset of the first query, determining a first set of attributes associated with the first query and a second set of attributes associated with the second query, and determining, by the processing device, whether to submit the second query or the first query to a database in view of the first set of attributes and the second set of attributes.. ... Red Hat

07/09/15 / #20150193481

Installation and update of cartridges in a multi-tenant platform-as-a-service (paas) system

Implementations for installation and update of cartridges in a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes receiving, by a processing device of a node of a multi-tenant paas system, an indication to initiate an update process for cartridges of the node, receiving a cartridge file package for storage at the node, storing the cartridge file package to a cartridge library of the node, and maintaining the cartridge file package in the cartridge library as a newest version of a template cartridge that corresponds to the cartridge file package.. ... Red Hat

07/09/15 / #20150193452

Locked files for cartridges in a multi-tenant platform-as-a-service (paas) system

Implementations for locked files for cartridges in a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes identifying, by a processing device of a multi-tenant platform-a-a-service (paas) system, an operation requested to be performed by the multi-tenant paas system, determining access contexts for the identified operation with respect to a cartridge associated with the operation, the access context comprising a user or component that is attempting to access a file of the cartridge for the identified operation, accessing a locked files manifest of the cartridge, the locked files manifest identifying at least one of files or directories of the cartridge to which a cartridge author of the cartridge restricts access to application developers utilizing the cartridge to execute an application, and applying access permissions to the cartridge according to the determined access contexts and the locked files manifest.. ... Red Hat

07/09/15 / #20150193343

Cache system with multiple cache unit states

A cache system stores a number of different datasets. The cache system includes a number of cache units, each in a state associated with one of the datasets. ... Red Hat

07/09/15 / #20150193329

Bug reporting and communication

A method for software bug resolution includes generating, with a software bug reporting client module, a software bug report for a bug, the bug being detected in a piece of software. The method further includes prompting a user to add information about the bug to the software bug report and sending the software bug report to a bug reporting entity to be presented as a post on a feed, the feed associated with the bug reporting entity. ... Red Hat

07/09/15 / #20150193324

Template directories for cartridges in a multi-tenant platform-as-a-service (paas) system

Implementations for template directories for cartridges in a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes maintaining, by a node executed by a processing device, a cartridge library comprising cartridge packages that provide functionality for applications executed by the node for a multi-tenant platform-as-a-service (paas) system, embedding, by the node, a cartridge instance from the cartridge library in a gear of the node, providing, via the cartridge instance, a template directory to an application utilizing the cartridge instance on the node, and executing, by the node, a sample application from the template directory to demonstrate functionality of the cartridge instance to an application developer of the application.. ... Red Hat

07/09/15 / #20150193268

File lock and unlock mechanism

A system and a method are disclosed for managing file locks, including initiating, by a processing device executing a kernel, executions of a number of active tasks that each has acquired a respective lock to a record, and in response to release of a first lock to the record by an active task, waking up a previously-designated worker task out of a number of idle tasks, in which the worker task is to attempt an acquisition of a second lock on behalf of at least one remaining task of the idle tasks.. . ... Red Hat

07/09/15 / #20150193265

Using nonspeculative operations for lock elision

A method includes identifying a set of instructions to be executed as a transaction that is to access a section of memory, prior to executing the set of instructions as the transaction, facilitating a non-speculative access to a data cache, the data cache comprising a plurality of cache lines, each cache line comprising a lock to lock a respective portion of the memory, determining if the section of memory is available for the transaction in view of locks of the plurality of cache lines, and in response to a determination that the section of memory is not available, causing the non-speculative access to the data cache to be repeated.. . ... Red Hat

07/09/15 / #20150193254

Virtual media shelf

A method and system for providing a guest with virtual media that can be read by the guest. A hypervisor hosted by a computer system presents a guest-to-host channel to a guest in the computer system. ... Red Hat

07/09/15 / #20150193249

Idle processor management in virtualized systems via paravirtualization

A system and method are disclosed for managing idle processors in virtualized systems. In accordance with one embodiment, a hypervisor executing on a host computer receives an anticipated idle time for a processor of the host computer system from a guest operating system of a virtual machine executing on the host computer system. ... Red Hat

07/09/15 / #20150193248

Non-blocking unidirectional multi-queue virtual machine migration

Methods, systems, and computer program products for non-blocking unidirectional multi-queue virtual machine migration are provided. A computer-implemented method may include maintaining information to track an association between a memory area in a virtual machine and a stream for a first stage of virtual machine migration, detecting one or more updates to the memory area during the first stage of migration, examining the information to identify the stream associated with the memory area for the first stage of migration, sending the updates to the memory area on the identified stream during the first stage of migration, modifying the information to associate the memory area with a new stream for a second stage of the migration, and sending updates to the memory area on the new stream during the second stage of migration.. ... Red Hat

07/09/15 / #20150193212

Conditional just-in-time compilation

A processor may perform conditional just-in-time (jit) compilation. An example method may comprise: identifying, by the processor, a defined pattern in a byte stream derived from a high level programming language module; evaluating a conditional expression associated with the defined pattern, wherein the conditional expression comprises an execution platform identifier; and compiling the byte stream into a native code, while excluding, in view of the evaluating, a portion of byte stream associated with the defined pattern.. ... Red Hat

07/09/15 / #20150193100

Intuitive workspace management

A method performed by a computer processing system includes associating a first workspace with a first graphical object of a workspace widget, the workspace widget being provided to a user through a graphical user interface (gui). The method further includes receiving an input from a user to switch to a second workspace, providing the second workspace to the user through the gui, moving the first graphical object from a first position in the workspace widget to a second position in the workspace widget, adding a second graphical object to the workspace widget at the first position, the second graphical object being associated with the second workspace.. ... Red Hat

07/02/15 / #20150188833

Overhead management for virtual machines

A method includes loading a guest virtual machine onto a host system, determining, with the host system, an encapsulation method to be used in association with a virtual network associated with the guest virtual machine, determining an overhead value based on the encapsulation method, determining an adjusted maximum transmission unit (mtu) value based on the overhead value, and passing, information related to the adjusted mtu value from the host system to the guest virtual machine.. . ... Red Hat

07/02/15 / #20150188788

External service provider

An apparatus identifies a connector configuration event. Responsive to the connector configuration event, the apparatus sends an external service information request. ... Red Hat

07/02/15 / #20150188778

Normalized management network

An apparatus obtains one or more management logical network properties. The apparatus determines one or more management logical network properties to be instantiated. ... Red Hat

07/02/15 / #20150186203

Applying security label on kernel core crash file

A system for applying security label on a kernel core crash file is disclosed. A method of the disclosure includes accessing, by a processing device, a crash recovery configuration file, parsing the crash recovery configuration file to determine a storage location of a core file, the core file comprising an image of a kernel of an operating system (os), the image being captured when the os fails, locating the core file at the determined storage location, and upon determining that a security label is not associated with the core file, sending a command to apply the security label to the core file.. ... Red Hat

07/02/15 / #20150186174

Mac address prefixes used on virtual machine hosts

A hypervisor running on a host machine identifies a first media access control (mac) address prefix associated with the host machine, wherein the first mac address prefix comprises one or more bits that are shared by mac addresses for virtual machines hosted by the host machine. The hypervisor configures the host machine to filter packets based on a first mac address prefix filter, wherein the first mac address prefix filter passes packets addressed to mac addresses that have the identified first mac address prefix. ... Red Hat

06/25/15 / #20150180709

Configuring network settings of an unreachable host

An exemplary system may configure network settings of an unreachable host. In one embodiment, the system determines that a first host on a network is unreachable using a first communication protocol. ... Red Hat

06/25/15 / #20150178966

System and method to check the correct rendering of a font

Systems and methods for determining a correct rendering of a candidate entity are provided. An example method includes identifying a first combined image including an image of a reference entity. ... Red Hat

06/25/15 / #20150178122

Method and system for providing a high-availability application

A system, method, and techniques for providing high availability to an application are provided. An example system includes a plurality of databases and a persistence layer that generates, based on a request, one or more sets of database commands that is specific to a database. ... Red Hat

06/25/15 / #20150178113

Loading runtime configuration files into virtual machine instances

Systems and methods for loading runtime configuration files into virtual machine instances. An example method may comprise: storing, by a processing device, a plurality of virtual machine configuration files in a storage memory accessible by a virtual machine instance; creating a file list referencing a virtual machine configuration file of the plurality of virtual machine configuration files, the file list further specifying a target location of the virtual machine configuration file in the virtual machine instance; and causing a boot process of the virtual machine instance to download the virtual machine configuration file specified by the file list from the storage memory into the target location specified by the file list.. ... Red Hat

06/25/15 / #20150178111

Hypervisor managed scheduling of virtual machines

A hypervisor determines that a virtual machine is important. In response, the hypervisor selects one or more processing devices of a multiprocessor computer system and pins the virtual machine to the selected processing devices. ... Red Hat

06/25/15 / #20150178106

Virtual machine data replication with shared resources

Systems and methods for virtual machine data replication with shared resources. An example method may include: identifying resources that are shared across a plurality of virtual machines, storing a copy of the resources, receiving, an indication of a portion of virtual storage of a virtual machine to be replicated, determining that the portion of virtual storage is not included in the resources, in response to the determination, updating a replicated copy of the virtual machine in view of the portion of virtual storage, the replicated copy further including the resources that are shared across a plurality of virtual machines, determining an initialization efficiency metric in relation to the replicated copy, and in response to the determination that the initialization efficiency metric exceeds an efficiency threshold, storing a copy of the virtual storage.. ... Red Hat

06/25/15 / #20150177997

Creating new virtual machines based on post-boot virtual machine snapshots

Systems and methods for creating new virtual machines based on post-boot virtual machine snapshots. An example method may include: receiving a request to create a new virtual machine, identifying, in view of the request, a virtual machine snapshot, the virtual machine snapshot including one or more elements of an initialized virtual machine, determining an update efficiency metric with respect to the virtual machine snapshot, and in response to a determination that the update efficiency metric reflects that updating the virtual machine snapshot is relatively more efficient than creating a new virtual machine in lieu of the virtual machine snapshot, creating the new virtual machine in view of the virtual machine snapshot.. ... Red Hat

06/18/15 / #20150172318

Adopting policy objects for host-based access control

A policy manager running on a client device receives policy data from a domain controller comprising a directory server and a file server. The client device runs an operating system that does not natively support policy retrieval from the directory server and file server. ... Red Hat

06/18/15 / #20150172284

Smartcard formation with authentication

A method includes detecting a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first cryptographic authentication key, and formatting, by a processor, the security token device by replacing the first cryptographic authentication key of the security token device with a second cryptographic authentication key that is specific to a security requirement of the enterprise.. . ... Red Hat

06/18/15 / #20150169686

System and method for querying hybrid multi data sources

A system and method of querying hybrid multi data sources includes receiving a query at a hybrid multi data source running on a computer server, creating a list of data sources, filtering the list of data sources based on data source hints included in the query, filtering the list of data sources based on data source rules, forming one or more query plans for processing the query, evaluating each of the query plans, selecting a first query plan from the query plans based on results of the evaluating, and performing the first query plan. Each query plan corresponds to a data source in the filtered list of data sources. ... Red Hat

06/18/15 / #20150169685

System and method for dynamic collaboration during query processing

A system and method of dynamic collaboration during query processing includes determining a load factor for a data source, receiving a query at a query assistant running on a computer server, determining a complexity of the query, adjusting the complexity by the load factor, simplifying the query by removing one or more first query elements from the query when the adjusted complexity is above a threshold, forming a query plan where the first query elements are designated for processing outside the data source, and performing the query plan by sending one or more abbreviated queries to the data source and processing the first query elements using the query assistant. The abbreviated queries are based on the query with the first query elements removed. ... Red Hat

06/18/15 / #20150169569

Fractal approach for probabilistic flow cache maintenance

An apparatus sets a layer counter to point to a first layer of a data structure. The apparatus determines the layer counter to reference an overflowing cell. ... Red Hat

06/18/15 / #20150169306

Policy-based application deployment and continuous best-fit placement across heterogeneous computing infrastructures

Implementations for policy-based application deployment and continuous best-fit placement across heterogeneous computing infrastructures are disclosed. A method of the disclosure includes determining that an application of a source application platform system triggered a metrics-based threshold of a plurality of metrics-based thresholds, determining, based on the metrics-based threshold that was triggered, a target application platform system to deploy the application, translating metadata of the application from a format of the source application platform system to a format of the target application platform system, and causing the application to be deployed at the target application platform system.. ... Red Hat

06/11/15 / #20150163222

Strong user authentication for accessing protected network

Systems and methods for strong user authentication for accessing protected networks. An example method may comprise: transmitting, by a processing device, an authentication request to an authentication server; receiving an access granting token from the authentication server; transmitting, to a nonce server, a nonce request using the access granting token; receiving a cryptographic nonce from the nonce server; and transmitting, to a virtual private network (vpn) server, a vpn connection request using the cryptographic nonce.. ... Red Hat

06/11/15 / #20150163100

Link-layer level link aggregation autoconfiguration

A computing device identifies a plurality of network interface controllers (nics) that are available for link aggregation. The computing device probes a network using a plurality of protocols to detect a topology of at least one network to which the plurality of nics are connected. ... Red Hat

06/11/15 / #20150160952

Managing configuration states in an application server

A mechanism for managing configuration states in an application server. The method includes saving a plurality of configuration states of an application server. ... Red Hat

06/11/15 / #20150160936

Self-moving operating system installation in cloud-based network

Embodiments relate to systems and methods for a self-moving operating system installation in cloud-based network. A guest operating system can be instantiated in a cloud-based host environment to support a set of virtual machines. ... Red Hat

06/04/15 / #20150156272

Managing a distributed cache for virtual machines

A processing device of host may receive desktop image data for a first client device that includes a graphical object. The processing device may determine an object identifier of the graphical object and a device identifier of a second client device associated with the graphical object. ... Red Hat

06/04/15 / #20150156078

Method and system for dynamically shifting a service

Systems and methods are disclosed for dynamically shifting one or more instances of a service from a first set of servers to a second set of servers. In an embodiment, a system includes a service repository that stores one or more services. ... Red Hat

06/04/15 / #20150154272

Managing data operations in an integrated database system

A mechanism for managing data operations in an integrated database system. The method includes receiving a request to perform a data operation and retrieving a data set from a primary data source (pds) in view of the request. ... Red Hat

06/04/15 / #20150154226

File link migration

File link migration is described. A method may include identifying a first file link referencing a file residing at a first computer system, and identifying, at the first computer system, a first inode data structure referenced by the first file link, the first inode data structure comprising a first link count. ... Red Hat

06/04/15 / #20150154057

Scaling of application resources in a multi-tenant platform-as-a-service environment in a cloud computing system

Implementations provide for scaling of application resources in a multi-tenant platform-as-a-service (paas) environment in a cloud computing system. A method of the disclosure includes monitoring a load measurement of containers associated with an application executed on virtual machines (vms) in a multi-tenant paas system, comparing the load measurement with a criteria, and when the load measurement exceeds the criteria, causing resources to be added to execute functionality of the application in the vms of the multi-tenant paas system.. ... Red Hat

05/28/15 / #20150150001

Host reservation system

A provisioning server receives a reserve command with a set of criteria and searches for a host matching the criteria. Upon finding such a host, the provisioning server reserves the host for performing a virtualization test. ... Red Hat

05/28/15 / #20150149997

Facilitating execution of mmio based instructions

A hypervisor of a host receives an indication of an exit from a guest to the hypervisor and a memory-mapped input output (mmio) address that caused the exit to hypervisor. The hypervisor walks a page table of the guest to identify a guest address associated with the mmio address that caused the exit to the hypervisor. ... Red Hat

05/28/15 / #20150149996

Hypervisor dynamically assigned input/output resources for virtual devices

Systems and methods are disclosed for assigning an i/o resource to a virtual pci device. An example system includes an i/o resource table that stores a pool of one or more available i/o resources for assignment to one or more virtual pci devices. ... Red Hat

05/28/15 / #20150149687

Ordered memory pages transmission in virtual machine live migration

Systems and methods for virtual machine live migration. An example method may comprise: identifying, by a first computer system executing a virtual machine undergoing live migration to a second computer system, a plurality of stable memory pages comprised by an execution state of the virtual machine, wherein the plurality of stable memory pages comprises memory pages that have not been modified within a defined period of time; transmitting the plurality of stable memory pages to the second computer system; determining that an amount of memory comprised by a plurality of unstable memory pages is below a threshold value, wherein the plurality of unstable memory pages comprises memory pages that have been modified within the defined period of time; and transmitting the plurality of unstable memory pages to the second computer system.. ... Red Hat

05/28/15 / #20150149667

Interrupt reduction by dynamic application buffering

Systems and methods are disclosed for processing a queue associated with a request. An example system includes an input/output (i/o) interface that receives a request associated with a channel. ... Red Hat

05/21/15 / #20150143498

Offline authentication

A method including determining, by a processing device, whether a computer system is able to access an authentication server, in response to determining that the computer system is able to access the authentication server, requesting a first set of credentials, authenticating the first set of credentials, assigning a user a first role for performing operations on the computer system in view of the first set of credentials, and in response to determining that the computer system is unable to access the authentication server, requesting a second set of credentials different from the first set of credentials, authenticating one or more credentials provided by the user, and assigning the user a second role for performing operations on the computer system in view of the one or more credentials, wherein the first role specifies a first type of access to at least one object on the computer system, and the second role specifies a second type of access to the at least one object, wherein the first type of access is different from the second type of access.. . ... Red Hat

05/21/15 / #20150143266

Multiple display management

A method and system for managing multiple displays, including receiving a first indication to allow movement of an object between a first display and a second display, allowing movement of the object between the first display and the second display in view of the first indication, receiving a second indication to prevent movement of the object between the first display to the second display, and preventing movement of the object between the first display and the second display in view of the second indication.. . ... Red Hat

05/21/15 / #20150142828

Ontology based categorization of users

Systems and methods are disclosed for categorizing a user. An example method includes marking one or more graphical user interface (gui) features of an application. ... Red Hat

05/21/15 / #20150142300

Determining alternative route by navigation system

Systems and methods for determining alternative navigational routes. An example method may comprise: determining a first route to a destination, the route comprising a plurality of edges of a graph representing a map of navigable paths, wherein each edge represents a path connecting two vertices and each vertex represents at least one of: an endpoint of a path or a junction of two or more paths; and determining a second route to the destination from a point located at least a defined distance from a junction comprised by the first route, along an edge not comprised by the first route.. ... Red Hat

05/21/15 / #20150137944

Preventing the discovery of access codes

An example method includes determining a size at which to display one or more keys of a virtual keypad and determining a symbol to display on the one or more keys of the virtual keypad. The method also includes displaying the one or more keys of the virtual keypad on a computing device in accordance with a key's determined size and symbol, where a first displayed key is displayed at a different size than a second displayed key. ... Red Hat

05/07/15 / #20150127497

Search based content inventory comparison

The subject matter of this specification can be implemented in, among other things, a method that includes receiving a selection of content filters for content data that identifies products, packages, and repositories, and receiving a selection of environment filters. The method includes filtering the content data to identify content items in view of the content filters and the environment filters. ... Red Hat

04/30/15 / #20150121553

System and method for code protection

Systems, methods, and techniques are disclosed for. An example method of providing code protection includes identifying a set of methods including one or more code portions to extract from an application. ... Red Hat

04/30/15 / #20150121337

Regular expression support in instrumentation languages using kernel-mode executable code

Systems and methods are provided for regular expression support in instrumentation languages using kernel-mode executable code. An example system includes a translator module that receives an input source code including a regular expression in a first source code language, wherein the translator module further determines a matching function in kernel-mode code language corresponding to the regular expression, and wherein the matching function corresponds to deterministic finite automaton. ... Red Hat

04/30/15 / #20150120920

Cross-cloud computing resource usage tracking

Systems and methods for cross-cloud computing resource usage tracking. An example method comprises: receiving a request comprising an operational specification of a computing resource; selecting a first provisioning cloud in view of the operational specification; receiving an updated operational specification of the computing resource; receiving a first provisioning offer from the first provisioning cloud and a second provisioning offer from a second provisioning cloud responsive to the updated operational specification; selecting the second provisioning cloud in view of the first and second provisioning offers; providing an interface between the first computing resource and a second computing resource residing in a second provisioning cloud; and tracking resource usage data of the first computing resource across the provisioning clouds.. ... Red Hat

04/30/15 / #20150120853

Parallel message processing on diverse messaging buses

Systems, methods, and techniques are disclosed for processing messages using a messaging bus. An example system includes an input queue that stores one or more input messages and an output queue that stores one or more output messages. ... Red Hat

04/16/15 / #20150106911

Provisioning proxy for provisioning data on hardware resources

A processing device receives an unauthenticated provisioning request from a hardware resource. Responsive to determining that the hardware resource satisfies one or more provisioning criteria, the processing device forwards the provisioning request to a server residing behind a firewall, receives provisioning data from the server, removes sensitive information from the provisioning data to create modified provisioning data, and forwards the modified provisioning data to the hardware resource.. ... Red Hat

04/16/15 / #20150106728

Remote dashboard console

A method, system and computer readable medium for remote control of a remote device by a remote dashboard console of a client device. The method includes identifying the remote device for management via the remote dashboard console of the client device. ... Red Hat

04/16/15 / #20150106572

Scripted multiprocess probing without system privilege

A controller process loads a module based on a user-generated script into itself. The controller process also generates a shared memory mapping using offset pointers as opposed to absolute pointers. ... Red Hat

04/16/15 / #20150106428

System and method for collaborative processing of service requests

A system and method of collaborative processing of service requests includes receiving a service request at an application server, beginning execution of a proxy member function of a proxy class, and determining whether a movable member function in a movable class is to be executed at a client. When the movable member function is to be executed at the client, the method further includes creating a partial response including code for the movable class and information for invoking the movable member function and transmitting the partial response to the client fore execution of the movable member function. ... Red Hat

04/16/15 / #20150106422

System and method for server selection using competitive evaluation

A system and method of server selection using competitive evaluation includes receiving a service request at an arbiter running on a computing device, determining whether the service request is associated with a preferred server, and forwarding the service request to the preferred server when the service request is associated with the preferred server. When the service request is not associated with the preferred server, the method further includes using the arbiter to coordinate a competitive evaluation among a plurality of active servers, selecting as the preferred server a first one of the active servers that completes processing of the service request first, and associating the preferred server with the service request. ... Red Hat

04/16/15 / #20150106411

Migrating file locks in distributed file systems

Systems and methods for migrating file locks in distributed file systems. An example method may comprise: receiving, by a file system server, over a first connection initiated by a file system client, a connection identifier comprising a file identifier; identifying, in view of the connection identifier, a second connection initiated by the file system client, the second connection associated with a file lock with respect to a file identified by the file identifier; and associating the file lock with the first connection.. ... Red Hat

04/16/15 / #20150106353

Data federation query suggestion

Systems and methods are provided for data federation query suggestion. An example system includes a query constraint database including at least one query constraint and a query constraint resolving module that receives from a user a query to search a federated database using a federated database search engine and determines if the query satisfies at least one query constraints. ... Red Hat

04/09/15 / #20150100970

Application-driven shared device queue polling

Methods and systems relate to receiving, at a system device, a first request from an operating system, the first request identifying shared queue and providing an instruction to the system device to enable polling of the identified shared queue, enabling, by a processing device, polling of the identified shared queue, wherein enabling polling comprises identifying a message in the identified shared queue and polling information related to the identified shared queue, and disabling, by the processing device, a device interrupt associated with the message in the identified shared queue.. . ... Red Hat

04/09/15 / #20150100957

Virtual machine joiner

A method, system and computer readable medium for joining multiple virtual machines (vms). The method includes identifying a first vm executing a first operating system (os) for joining with a second vm executing a second os, wherein the first os and the second os are incompatible. ... Red Hat

04/09/15 / #20150100752

Concurrent garbage collector thread

An example method of managing memory for an application includes identifying a plurality of regions of a heap storing one or more objects of a first type and one or more objects of a second type. Each object of the second type stores a memory address of an object of the first type. ... Red Hat

04/09/15 / #20150100742

Compatible virtual machine joiner

A method, system and computer readable medium for joining multiple virtual machines (vms). The method includes identifying a first virtual machine (vm) executing a first operating system (os) for joining with a second vm executing a second os, wherein the first os and the second os are compatible. ... Red Hat

04/09/15 / #20150100659

Caching mechanism for determining validity of cached data using web application business logic

Systems and methods are provided for a caching mechanism that determines validity of cached data using web application business logic. An example system includes a web container that receives a first request to return one or more generated data located in a data cache, and a web application including one or more data validity arbiters and business logic determining the validity of the one or more generated data. ... Red Hat

04/02/15 / #20150095639

Using a pkcs module for opening multiple databases

A processing device is to determine that a module, executed from a memory by the processing device, is initialized from opening a first database. The processing device is to identify a second database to be opened from a request from an application to access data that is stored in the second database. ... Red Hat

04/02/15 / #20150095548

Handling memory-mapped input-output (mmio) based instructions using fast access addresses

When a guest of a virtual machine attempts to accesses an address that causes an exit from the guest to the hypervisor of a host, the hypervisor receives an indication of an exit by a guest to the hypervisor. The received address is associated with a memory-mapped input-output (mmio) instruction. ... Red Hat

03/26/15 / #20150089101

Managing network interface controller-generated interrupts

Systems and methods for managing interrupts generated by network interface controllers. An example method may comprise: responsive to determining that a memory pressure metric in a computer system does not exceed a threshold value, disabling interrupts that signal completion of a packet transmission by a network interface controller; transmitting a plurality of data packets by the network interface controller; and responsive to detecting that the memory pressure metric exceeds the threshold value, releasing a memory buffer allocated to a data packet of the plurality of data packets.. ... Red Hat

03/26/15 / #20150089037

Automatic promiscuous forwarding for a bridge

An example system to disable a promiscuous mode of a network interface includes a plurality of local network interfaces. Each local network interface of the plurality is coupled over a network to one or more remote network interfaces. ... Red Hat

03/26/15 / #20150089010

Rdma-based state transfer in virtual machine live migration

Systems and methods for rdma-based state transfer in virtual machine live migration. An example method may comprise: determining, by a first computer system, that a memory block has been modified by a virtual machine undergoing live migration from the first computer system to a second computer system; designating the modified memory block for transfer via a remote direct memory access (rdma) adapter to the second computer system; selecting, asynchronously with respect to the designating, a memory block from a plurality of memory blocks designated for rdma transfer to the second computer system, wherein a sum of an amount of pinned physical memory in the first computer system and a size of the selected memory block does not exceed a pre-defined value; registering the selected memory block with the rdma adapter; and transmitting the selected memory block to the second computer system via the rdma adapter.. ... Red Hat

03/26/15 / #20150089009

Remote direct memory access with copy-on-write support

Systems and methods for implementing remote direct memory access (rdma) with copy-on-write support. An example method may comprise: registering, with an rdma adapter, by a first computer system, a mapping of a first virtual address to a first physical address, for transmitting a memory page identified by the first virtual address to a second computer system; registering, with the rdma adapter, a mapping of a second virtual address to the first physical address; detecting an attempt to modify the memory page; copying the memory page to a second physical address; and registering, with the rdma adapter, a mapping of a first virtual address to the second physical address.. ... Red Hat

03/19/15 / #20150081996

Pauseless garbage collector write barrier

An example method of managing memory includes identifying a first object of the first type to update, the first object being stored on a heap. The method also includes reading a first memory address stored in a second object of the second type and storing a copy of the first object at a second memory address. ... Red Hat

03/19/15 / #20150081917

Managing multi-level service level agreements in cloud-based networks

Embodiments relate to managing multi-level service level agreements (slas) in cloud-based networks. A resource managing module can manage resources in the cloud-based networks in response to the detection of one or more triggering events. ... Red Hat

03/19/15 / #20150081916

Controlling capacity in a multi-tenant platform-as-a-service environment in a cloud computing system

Implementations of the disclosure provide for controlling capacity in a multi-tenant platform-as-a-service (paas) environment in a cloud computing system. A method includes obtaining, by a resource control module executed by a processing device, an active capacity metric of each node in a multi-tenant platform-as-a-service (paas) system, the active capacity metric determined in view of a number of containers that are currently executing in the node and a maximum number of active containers allowed to execute in the node, comparing, by the resource control module, the active capacity metric of the each node to an active capacity threshold associated with the each node, and when the active capacity metric exceeds the active capacity threshold in all of the nodes in a district of the multi-tenant paas system and when a maximum actual capacity of containers in the district is not exceeded, adding a new node to the district.. ... Red Hat

03/12/15 / #20150074351

Write-behind caching in distributed file systems

Systems and methods for write-behind caching in distributed file systems. An example method may comprise: receiving, over a network, a direct write request referencing data to be written to a file residing on a persistent data storage device, the file containing at least part of an image of a virtual machine disk; writing, by a processing device, the data to a cache entry of a memory-resident cache, the cache entry corresponding to at least a part of the file; acknowledging the write request as completed; and committing, asynchronously with respect to the acknowledging, the cache entry to the persistent data storage device.. ... Red Hat

03/12/15 / #20150074077

Search prediction using context modeling

A search engine tracks search queries from a user received at the search engine to generate a search query history. A prediction engine compares the search query history from the user with search query histories from other users on the search engine. ... Red Hat

03/05/15 / #20150067390

Live snapshot of a virtual machine

The subject matter of this specification can be implemented in, among other things, a method including receiving a request to create a live snapshot of a state of a virtual machine at a reference point-in-time. The virtual machine can have a memory and an original disk file. ... Red Hat

03/05/15 / #20150067360

Providing power management services in a software provisioning environment

A software provisioning server can communicate with a power management system of the target machines to alter the power state of the target machines during actions requiring a change in the power state, such as power cycling the target machines during a software installation. The software provisioning server can communicate with the power management system of the target machines and instruct the power management systems to alter the power state of the target machines during the actions.. ... Red Hat

03/05/15 / #20150067342

Systems and methods for executing compliance verification or remediation scripts

Systems and methods for executing compliance verification or remediation scripts. An example method may comprise: identifying, by a computer system, a compliance script to be executed; determining a value of a cryptographic hash function of at least part of the identified compliance script; identifying, based on the value of the cryptographic hash function, an installation path of a corresponding digitally signed compliance script pre-installed on the computer system, the digitally signed compliance script associated with a security context; and executing, within the security context, the digitally signed compliance script.. ... Red Hat

03/05/15 / #20150067293

Non-intrusive storage of garbage collector-specific management data

A system, method, and techniques for managing memory are provided. An example method includes identifying a plurality of regions in a heap storing one or more objects of a first type and one or more objects of a second type. ... Red Hat

03/05/15 / #20150067196

Portable computing device providing operating system for host devices

A portable computing device detects a connection to a host computing device and receives data from the host computing device identifying at least one of a device type of the host computing device or properties of the host computing device. The portable computing device selects an operating system from a plurality of available operating systems installed on the portable computing device in view of the received data. ... Red Hat

03/05/15 / #20150067169

Tracking costs for a deployable instance

A system and method for receiving a request to launch a deployable instance, a resource requirement profile for the deployable instance, different cost model information for each cloud in a pool of clouds, and different capability information for each cloud in the pool of clouds. Selectable clouds in the pool of clouds that meet the resource requirement profile are determined, and a deployment cost is calculated for the deployable instance for each cloud in the pool of clouds based on the resource requirement profile and the cost information. ... Red Hat

03/05/15 / #20150067005

Path resolver for client access to distributed file systems

Systems and methods implementing a path resolver facilitating client access to a distributed file system. An example method may comprise: receiving, by a processing device, file identifier comprising a symbolic link; producing, by a user space process being executed by the processing device, a modified file identifier, by replacing a pre-defined sequence of characters within the file identifier by a path to a mount point of a distributed file system; and identifying, in view of the modified file identifier, a data structure comprising information about a file identified by the file identifier.. ... Red Hat

03/05/15 / #20150066859

Memory first live snapshot

The subject matter of this specification can be implemented in, among other things, a method including receiving a request to create a live snapshot of a state of a virtual machine including a memory and an original disk file. The method further includes copying, by a hypervisor, data from the memory to a storage device to form a memory snapshot. ... Red Hat

03/05/15 / #20150066855

Outcast index in a distributed file system

An outcast index in a distributed file system is described. A first server can receive an indication that a first replica stored on the first server is to be modified in view of a second replica stored on a second server. ... Red Hat

02/26/15 / #20150058841

Providing entropy to a guest operating system

The subject matter of this specification can be implemented in, among other things, a method including receiving, by a hypervisor of a host computer system, an entropy request from a guest operating system running on the host computer system. The method further includes identifying, by the hypervisor, an entropy source. ... Red Hat

02/26/15 / #20150058838

Switching between devices having a common host backend in a virtualized environment

Systems and methods are disclosed for switching between an assigned device and an emulated device. An example system includes a device-specific driver and a pass-through device driver included in a hypervisor. ... Red Hat

02/26/15 / #20150058822

System and method for estimating impact of software updates

A system and method of estimating impact of software updates includes obtaining usage measures for an instance of a software application, analyzing the software update of the software application by comparing base code for the software application to updated code for the software application, identifying one or more lines of interest from the base code based on the comparing, and aggregating the usage measures for the instance associated with the lines of interest to determine an impact factor. The base code corresponds to source code for the instance. ... Red Hat

02/26/15 / #20150058508

Dynamic shifting of service bus components

Systems and methods are disclosed for processing messages using a dynamic messaging bus. An example system includes a plurality of services residing in a dynamic messaging bus including a plurality of sub-buses. ... Red Hat

02/26/15 / #20150058471

Measuring resource consumption in a multi-tenant platform-as-a-service (paas) system

Implementations for measuring resource consumption in a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes determining, by a processing device, that a resource of an application of a multi-tenant platform-as-a-service (paas) system is initializing, the resource marked for usage tracking, accessing a list of initialization operations used in the initialization of the resource, determining that each of the initialization operations prior to a create usage record operation in the mapping are performed successfully, and creating a usage record for the resource using the create usage record operation.. ... Red Hat

02/26/15 / #20150058461

Image management in cloud environments

A system and method for managing images in a cloud including providing a uniform image management interface for receiving from a user uniform image descriptions for building images in a cloud, and receiving a uniform image description for building an image from the user. The uniform image description is provided to an application to create a cloud-specific image description to provide to an image builder for building the image, and the uniform image description is stored in a local data store.. ... Red Hat

02/26/15 / #20150058460

Granular permission assignment

A system and method for storing role definitions for cloud provider systems, receiving a first request to assign a user to a first role specifying a first cloud computing resource of a respective resource type, identifying a role definition corresponding to the first role that includes an action set permitted, and creating the first role for the user on the first cloud computing resource by associating the identified role definition with the first cloud computing resource and the user. A second request to assign the user to a second role is received specifying a second cloud computing of the respective resource type, and the second role is created for the user on the second cloud computing resource, where the identified role definition corresponds to the first and second roles, and wherein creating the second role includes associating the identified role definition with the first cloud computing resource and the user.. ... Red Hat

02/19/15 / #20150052585

Systems and methods for managing digital content entitlements

Systems and methods for managing digital content entitlements in distributed computer systems. An example method may comprise: receiving, by a processor, a request comprising an identity certificate and a digital content identifier; validating an entitlement of a requestor identified by the identity certificate to consume, over an entitlement period of time, the digital content identified by the digital content identifier; determining that a pre-defined authorization period of time does not exceed the entitlement period of time; and transmitting, to the requestor, a response comprising at least one of: a status code and a content certificate authorizing to consume the digital content for the pre-defined authorization period of time.. ... Red Hat

02/19/15 / #20150052496

Providing a user interface library for building web-based applications

A method and system for providing an interactive developer guide for guiding a user through a web-based application component selection process for a web-based application. The component selection process includes providing a component list including a plurality of configurable web-based application components, prompting the user to select a web-based application component from the list, and receiving a selection of a web-based application component from the list. ... Red Hat

02/19/15 / #20150052323

Systems and methods for memory deduplication by destination host in virtual machine live migration

Systems and methods for memory de-duplication in a virtual machine undergoing live migration. An example method may comprise: receiving, by a hypervisor executing on a destination host computer system, a first virtual address and a corresponding physical memory range identifier, the physical memory range identifier identifying a first physical memory range on an origin host computer system, the first virtual address identifying a first virtual memory range mapped to the first physical memory range in a virtual address space of a first virtual machine undergoing live migration from the origin host computer system to the destination host computer system; identifying a second virtual address corresponding to the physical memory range identifier, the second virtual address identifying a second virtual memory range in a virtual address space of a second virtual machine undergoing live migration from the origin host computer system to the destination host computer system; identifying a destination physical address corresponding to the second virtual address, the destination physical address identifying a second physical memory range on the destination host computer system; and mapping, on the destination host computer system, the first virtual address to the destination physical address.. ... Red Hat

02/19/15 / #20150052322

Systems and methods for memory deduplication by origin host in virtual machine live migration

Systems and methods for memory de-duplication in a virtual machine undergoing live migration. An example method may comprise: determining a first identifier identifying a first physical memory range, the first physical memory range mapped to a first virtual memory range in a virtual address space of a first virtual machine undergoing live migration from a origin host computer system to a destination host computer system; determining a second identifier identifying a second physical memory range, the second physical memory range mapped to a second virtual memory range in a virtual address space of a second virtual machine undergoing live migration from the origin host computer system to the destination host computer system; determining that the first identifier and the second identifier identify the same physical memory range; and notifying the destination host computer system that the first virtual memory range and the second virtual memory range have identical contents.. ... Red Hat

02/19/15 / #20150052216

Managing digital content consumption data

Systems and methods for managing data reflecting digital content consumption by computer systems. An example method may comprise: receiving a plurality of digital content consumption data objects, each digital content consumption data object comprising a timestamp and an identifier of a digital content item being consumed by the computer system at the moment of time defined by the timestamp; storing the plurality of digital content consumption data objects in a memory; receiving a request for digital content consumption information for a specified period of time; and retrieving from the memory two or more digital content consumption data objects having timestamps within the specified period of time.. ... Red Hat

02/19/15 / #20150052205

System and method for flexible holding storage during messaging

A system and method of flexible holding storage during messaging includes determining one or more properties of a message, the message to be stored in a holding storage area of a messaging system, determining status of one or more candidate holding storage devices, determining one or more storage selection rules, adjusting the one or more storage selection rules based on information associated with the status of the one or more candidate holding storage devices, and selecting a holding storage device for the message from the candidate holding storage devices based on the adjusted storage selection rules and information associated with the properties of the message. The one or more storage selection rules express preferences among the one or more candidate holding storage devices. ... Red Hat

02/19/15 / #20150052021

System and method for processing service queries

A system and method of processing service queries includes receiving a first request for services from a client, the first request for services includes a service query including identifiers for an action, one or more candidate services, a services template, and an aggregation; parsing the services query to identify the action, the candidate services, the services template, and the aggregation; determining one or more combinations of candidate services based on types of the candidate services; applying the services template to each of the combinations of candidate services to determine results for each of the combinations of candidate services; aggregating the results based on the aggregation; selecting a preferred combination of candidate services based on the applied aggregation; and forwarding the results corresponding to the preferred combination to the action.. . ... Red Hat

02/12/15 / #20150047058

Certificate checkin service

A method and system for a content provider to enable the consumption of content by properly entitled consumers (e.g., end-users, clients, customers) within a cloud provider network. A first certificate checkin service (ccs) executed by a processing device deployed in the cloud provider network receives a first set of usage data relating to content of a content provider consumed by a client of the cloud provider network. ... Red Hat

02/12/15 / #20150046620

Pessimistic interrupt affinity for devices

A computing apparatus identifies that a first processor of a host has forwarded information for a device to a second processor that controls the device. After identifying that the first processor has forwarded the information to the second processor and in response to determining that one or more update criteria have been satisfied, the computing apparatus causes future information for the device to be forwarded to the second processor.. ... Red Hat

02/12/15 / #20150046513

System and method for assembly and use of integration applications

A system and method of assembly and use of integration applications includes receiving a first request for services from a first client, the first request for services includes a first custom services header including one or more service descriptors, parsing the first custom services header to extract each of the service descriptors, determining a service corresponding to each of the service descriptors, inserting a request for the service into an integration application, deploying the integration application to an application server, adding a first entry to an application list, the first entry corresponding to the integration application, forwarding the first request for services to the integration application, receiving a response from the integration application, and returning the response to the first client. In some examples, the system and method further includes periodically purging one or more other integration applications from the application server based on timestamps recorded in the application list.. ... Red Hat

02/12/15 / #20150046463

System and method for content storage

A system and method of content storage includes a content store for storing a plurality of first content blocks and one or more first indexes, a content manager including one or more first content analyzers, and an interface for receiving access requests for the plurality of first content blocks. Each of the one or more first indexes includes a plurality of first entries for organizing a plurality of second content blocks from the plurality of first content blocks according to a respective organizational structure. ... Red Hat

02/12/15 / #20150043835

Merging and splitting data blocks

A first set of discrete cosine transform (dct) blocks is obtained. Each dct block from the first set of dct blocks has a first block size. ... Red Hat

02/05/15 / #20150040216

Systems and methods for restricting application binary interfaces

Systems and methods for restricting application binary interfaces. An example method may comprise: initializing, by a process spawned by a kernel of an operating system running on a computer system, a system call filter inhibiting at least one type of application binary interface (abi) calls; receiving a system call issued by a user space program executed by the computer system; intercepting the system call by the system call filter; determining that the system call is disabled by the system call filter; and performing a pre-determined action with respect to the system call.. ... Red Hat

02/05/15 / #20150040124

Paravirtulized capability for device assignment

A hypervisor of a host detects a request by a guest or a hypervisor administrator to expose a device associated with the host to the guest. The hypervisor locates free space in a configuration space of the device. ... Red Hat

02/05/15 / #20150039379

Segmented business process engine

A method and system for providing a segmented business process engine for generating a result in response to an event message. A process instance identification component of the segmented business process engine identifies a process instance associated with the event message and provides the process instance message to a selected process execution component of the segmented business process engine. ... Red Hat

01/29/15 / #20150033215

System and method for dynamic class management

A system and method of dynamic class management includes starting a skeleton application by loading a main class of the skeleton application and executing the main class, detecting a request for a requested class made by a referencing class, loading a class file associated with the requested class from a local storage device when the class file is stored on the local storage device and the requested class is not loaded in memory of the virtual machine, loading the class file from a class storage unit when the class file is not stored on the local storage device and the requested class is not loaded in the memory of the virtual machine, updating an application class graph (acg) to record a dependency of the referencing class on the requested class, and updating an object table when the request is associated with creation of an object of the requested class.. . ... Red Hat

01/29/15 / #20150032789

Dynamic object oriented remote instantiation

An example system for distributing a workload of an application includes a class identifier that identifies a remotely instantiable class in an instruction. Execution of the instruction includes processing a workload. ... Red Hat

01/22/15 / #20150026270

Distribution list creation and subscription

A method and system for the efficient creation and management of an e-mail distribution list. The method includes receiving, from a first sender, a first e-mail message directed to an e-mail address comprising a list name. ... Red Hat

01/22/15 / #20150023358

Migration of guest bridge

A system and method for migrating a guest bridge are provided. An example method includes maintaining at a guest bridge a set of forwarding tables including a set of mappings from a network address to at least one virtual network interface of a set of virtual network interfaces. ... Red Hat

01/15/15 / #20150019908

Providing non-volatile memory for suspend-to-random access memory

A mechanism for providing non-volatile memory for suspend-to-ram in a computer system. A method includes searching for a checkpoint message in a memory upon receipt of notification of restoring of power in a system. ... Red Hat

01/15/15 / #20150019812

Replication between sites using keys associated with modified data

Systems and methods are disclosed for replicating data stored in an in-memory data cache to a remote site. An example system includes an in-memory data cache and an in-memory keys cache. ... Red Hat

01/15/15 / #20150019680

Systems and methods for consistent hashing using multiple hash rlngs

Systems and methods for consistent hashing using multiple hash rings. An example method may comprise: assigning two or more tokens to each node of a plurality of nodes, the two or more tokens belonging to two or more distinct cyclic sequences of tokens, wherein each node is assigned a token within each cyclic sequence; receiving a request comprising an attribute of an object; determining, based on the attribute, a sequence identifier and an object position, the sequence identifier identifying a sequence of the two or more cyclic sequences of tokens, the object position identifying a position of the object within the sequence; and identifying, based on the sequence identifier and the object position, a node for servicing the request.. ... Red Hat

01/08/15 / #20150012962

Secure network labeling to control inter-process communications in a multi-tenant platform-as-a-service (paas) system

Implementations for secure network labeling to control inter-process communications in a multi-tenant platform-as-a-service (paas) system are disclosed. A method of the disclosure includes initializing, by a processing device of a node, a gear of an application on the node, wherein the node hosts a plurality of gears for a plurality of applications of a multi-tenant platform-as-a-service (paas) system, and wherein the plurality of applications comprising multi-tenant applications having different owners. ... Red Hat

01/08/15 / #20150012745

Precalculating hashes to support data distribution

A content server precomputes a hash value corresponding to content stored by the server. The server receives a request for the hash value from a first client device and provides the hash value to the first client device. ... Red Hat

01/08/15 / #20150012500

System and method for reading file blocks

A system and method for reading file blocks includes reading an inode associated with the file from the file system, the inode including one or more first block pointers, determining a height of a file tree associated with the file, and determining whether a value of a second block pointer selected from the one or more first block pointers is consistent with the file having been stored using a block allocation pattern. When the value of the second block pointer is consistent with the file having been stored using the block allocation pattern the method further includes pre-fetching a plurality of file blocks based on the block allocation pattern, verifying that the pre-fetched file blocks are consistent with the file tree, and retrieving one or more data blocks of the file. ... Red Hat

01/08/15 / #20150009831

Wild card flows for switches and virtual switches based on hints from hypervisors

A network switch receives routing information pertaining to a virtual machine from a hypervisor managing the virtual machine. The switch adds a wild card entry associated with the virtual machine to a first routing data structure, wherein the wild card entry specifies one or more exact match fields, one or more wild card fields and an action to perform for packets having properties that match the one or more exact match fields.. ... Red Hat

01/01/15 / #20150007170

Systems and methods for providing hypercall interface for virtual machines

Systems and methods for providing a hypercall interface for virtual machines. An example method may comprise receiving, by a hypervisor executing on a computer system, a hypercall instruction issued by a virtual machine to invoke a hypervisor function; and determining an identifier of the hypervisor function based on a value of an instruction pointer of the virtual machine.. ... Red Hat

01/01/15 / #20150006958

Method and system for providing high availability to distributed computer applications

Method, system, apparatus and/or computer program for achieving transparent integration of high-availability services for distributed application programs. Loss-less migration of sub-programs from their respective primary nodes to backup nodes is performed transparently to a client which is connected to the primary node. ... Red Hat

01/01/15 / #20150006704

Software appliance management using broadcast technique

Broadcasts identifying executed execution states and configurations of a plurality of virtual machines may be received. Each of the broadcasts may be received from a client system of a plurality of client systems. ... Red Hat

01/01/15 / #20150006592

Reducing transaction operations using deferred operations

A server computer system performs a first set of operations for a first transaction. The first transaction pertaining to data stored in a file system. ... Red Hat








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Red Hat in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Red Hat with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###