Follow us on Twitter
twitter icon@FreshPatents


Cloud Computing patents

      

This page is updated frequently with new Cloud Computing-related patent applications.

Edge computing system
An edge computing system comprises an application store, an edge server and a cloud computing system comprising a backend server. The edge server is configured to receive an application from the application store with additional information defining capabilities of the edge server that are required for the application to run on the edge server and/or capabilities of devices connected to the edge server.
Vituosys Limited


Edge computing system
An edge computing system comprises: a cloud computing system; an edge processing function; a connection between the edge processing function and the cloud computing system; a backend server within the cloud computing system. An assessment module is configured to receive information about processing goals, and processing capabilities of the backend server and the edge processing function.
Vituosys Limited


Deploying a networking test tool in a cloud computing system
Methods, systems, and computer readable media for deploying a networking test tool in a cloud computing system are disclosed. An example method includes receiving user input specifying configuration information for a networking test tool for deployment in a cloud computing system.
Ixia


Methods, systems and apparatus to propagate node configuration changes to services in a distributed environment
Methods, apparatus and articles of manufacture to propagate node changes in a cluster of nodes and reconfigure services based on the node changes in a cloud computing environment are disclosed. Example methods disclosed herein include analyzing a node change event message at a first node of the plurality of nodes to identify a node change event type contained in the node change event message.
Vmware, Inc.


Method and system to allocate bandwidth based on task deadline in cloud computing networks
A method implemented to provide a virtual network to tenants requiring bandwidth in a cloud computing environment is disclosed. The method starts with receiving a request for a task at a network device, the request including a first parameter indicating vms required, a second parameter indicating bandwidths the required vms need, a third parameter indicating a duration of the task, and a fourth parameter indicating a deadline of the task.
Ericsson Ab


Network visibility appliances for cloud computing architectures
With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge.
Gigamon Inc.


Methods and systems for using a cloud computing environment to share biological related data
The present disclosure provides a novel approach for shifting or distributing various information (e.g., protocols, analysis methods, sample preparation data, sequencing data, etc.) to a cloud-based network. For example, the techniques relate to a cloud computing environment configured to receive this information from one or more individual sample preparation devices, sequencing devices, and/or computing systems.
Illumina, Inc.


Methods, systems, and apparatus to trigger a workflow in a cloud computing environment
Methods, apparatus and articles of manufacture to provide workflow subscription management in a cloud computing environment are disclosed. Example disclosed methods include, in response to a first input identifying an event topic, causing, by executing an instruction with a processor, a corresponding event schema to be displayed, accessing a second input identifying a field included in the event topic schema and a third input identifying a threshold value corresponding to the field.
Vmware, Inc.


Distributed assignment of video analytics tasks in cloud computing environments to reduce bandwidth utilization
Example task assignment methods disclosed herein for video analytics processing in a cloud computing environment include determining a graph, such as a directed acyclic graph, including nodes and edges to represent a plurality of video sources, a cloud computing platform, and a plurality of intermediate network devices in the cloud computing environment. Disclosed example task assignment methods also include specifying task orderings for respective sequences of video analytics processing tasks to be executed in the cloud computing environment on respective video source data generated by respective ones of the video sources.

Device and determining a circumferential shape of an electrode array for electrical impedance tomography
An electrical impedance tomography device (1) includes an electrode array, including a plurality of electrodes (33) arranged spaced apart from one another, a signal feed unit (51) and a signal acquisition unit (50). A calculation and control unit (70) is configured to determine a current elliptical circumferential shape (20′) of the electrode array on a thorax (34) of a human being and to provide a control signal (79), which indicates the elliptical circumferential shape (20) of the electrode array.
Drägerwerk Ag & Co. Kgaa


Device and determining an axial twist position of an electrode array for electrical impedance tomography

An electrical impedance tomography device (1) includes an electrode array, including a plurality of electrodes (33) arranged spaced apart from one another, a signal feed unit (51) and a signal acquisition unit (50). A calculation and control unit (70) is configured to determine a situation with an axial twist angle of the electrode array on a thorax (34) of a human being and to provide a control signal (79), which indicates the situation with axial twist angle of the electrode array.
Drägerwerk Ag & Co. Kgaa

Connectivity between cloud-hosted systems and on-premises enterprise resources

Connectivity required for cloud computing services is provided by an ssl/tls-based vpn client computer system operatively connected to a customer network of a cloud service customer. The vpn client instantiates an ssl/tls-based vpn tunnel with an ssl/tls-based vpn server operatively connected to a provider network of a cloud services provider.
Citrix Systems, Inc.

Graph-based network fabric for a network visibility appliance

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. A visibility platform can be used to monitor virtualized traffic traversing a cloud computing platform, such as amazon web services, vmware, or openstack.
Gigamon Inc.

Lifecycle management of custom resources in a cloud computing environment

Methods, apparatus and articles of manufacture to provide lifecycle management of custom resources in a cloud computing environment are disclosed. Example methods disclosed herein for custom resource lifecycle management include accepting, with an extensibility service implemented by a virtual appliance, a resource definition and a lifecycle definition for a custom resource to be executed in a cloud computing environment.
Vmware, Inc.

Server and cloud computing resource optimization method thereof for cloud big data computing architecture

A server and a cloud computing resource optimization method thereof for cloud big data computing architecture are provided. The server runs a dynamic scaling system to perform the following operations: receiving a task message; executing a profiling procedure to generate a profile based on an to-be-executed task recorded in the task message; executing a classifying procedure to determine a task classification of the to-be-executed task; executing a prediction procedure to obtain a plurality of predicted execution times corresponding to a plurality of computing node numbers, a computing node type and a system parameter of the to-be-executed task; executing an optimization procedure to determine a practical computing node number of the to-be-executed task; and transmitting an optimization output message to a management server to make the management server allocate at least one data computing system to execute a program file of the to-be-executed task..
Institute For Information Industry

Load balancing by endpoints

A mechanism is provided for in a cloud computing infrastructure, a mechanism is provided for balancing client sessions across virtual machines such that the number of virtual machines is efficiently managed. In some embodiments, the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions.
Microsoft Technology Licensing, Llc

Welding systems and methods utilizing cloud computing and data storage

Welding systems and methods utilizing cloud computing and data storage are disclosed. An example method includes receiving, via communication circuitry of a cloud-based resource, welding data relating to a welding operation from a first customer; storing the welding data in computer-readable storage media associated with the cloud-based resource; offering the welding data for sale, via the cloud based resource; receiving, via the communication circuitry, an offer for the welding data from a second customer, different from the first customer, wherein the first and second customers are individual welders, factories, distributed manufacturing operations, or a combination thereof; performing a financial transaction with the second customer; and transmitting, via the communication circuitry, the welding data to the second customer..
Illinois Tool Works Inc.

Central namespace controller for multi-tenant cloud environments

A centralized namespace controller allocates addresses in a distributed cloud infrastructure on-demand. Upon receiving a request to allocate addresses for a network to be provisioned by a cloud computing system included in the distributed cloud infrastructure, the centralized namespace controller allocates a network address that is unique within the distributed cloud infrastructure.
Vmware, Inc.

Multipath forwarding in an overlay network

The use of overlay networks, such as network virtualization using overlays over layer 3 (nvo3), is a growing trend to address networking issues in data centers that make use of virtualization and cloud computing techniques. Additional considerations may be required to support multipath forwarding scenarios..
Telefonaktiebolaget Lm Ericsson (publ)

System and monitoring changes in databases and websites

A system and method is described for constructing a differential web in which information including objects, numbers, or text in databases and web pages may be selected using pointing device movements. Once selected, objects may be designated to be monitored for changes, said changes being captured and made browsable on web-like constructs.
Sensoriant, Inc.

Tenant-controlled cloud updates

Systems and methods are taught for providing customers of a cloud computing service to control when updates affect the services provided to the customers. Because multiple customers share the cloud's infrastructure, each customer may have conflicting preferences for when an update and associated downtime occurs.
Microsoft Technology Licensing, Llc

Content driven automated upgrade of running web applications in on-premise environments

An enterprise web application management system includes a cloud computing network having a webapp database to store webapp code. An on-premise local computing network is remotely located from the cloud computing network.
International Business Machines Corporation

Securing content using pipelines

A transcoding service is described that is capable of transcoding or otherwise processing content, such as video, audio or multimedia content, by utilizing one or more pipelines. A pipeline can enable a user to submit transcoding jobs (or other processing jobs) into an available pipeline, where a transcoding service (or other such service) assigns one or more computing resources to process the jobs received to each pipeline.
Amazon Technologies, Inc.

System and a cloud computing abstraction layer with security zone facilities

In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload. This allows a developer to define a security zone and to apply at least one type of security policy with respect to the security zone including the type of security zone policy in the metamodel framework such that the type of security zone policy can be associated with the software workload upon development of the software workload, and if the type of security zone policy is associated with the software workload, automatically applying the security policy to the software workload when the software workload is deployed within the security zone..
Csc Agility Platform, Inc.

System and a cloud computing abstraction layer

According to one system of the invention, the system provides a cloud-computing service from a cloud-computing environment comprising a plurality of cloud-computing resources. The system may comprise: a management module configured to manage a cloud-computing resource of the plurality of cloud-computing resources as a cloud-computing service, wherein the cloud-computing service performs a computer workload; an adapter configured to connect to the cloud-computing resource to the system and translate a management instruction received from the management module into a proprietary cloud application program interface call for the cloud-computing resource; a cloud service bus configured to route the management instruction from the management module to the adapter; a consumption module configured to allow a user to subscribe the cloud-computing service; a planning module configured to plan the cloud-computing service; and a build module configured to build the cloud-computing service from the cloud-computing resource and publish the cloud-computing service to the consumption module..
Servicemesh, Inc.

Automatic provisioning of cloud services

Systems and methods for automatically provisioning a service instance in a cloud computing system are presented. In an example embodiment, a message is retrieved by one of multiple provisioner nodes from a message queue shared by the provisioner nodes, the message including a service request to provision a service instance on the computing infrastructure.
General Electric Company

. .

Method and system for securely transmitting volumes into cloud

A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a volume service that is executable by one or more processors and is configured to instruct a cloud computing device to generate a worker virtual machine.
Citrix Systems, Inc.

Technique for extending capacities of a radio access network

An approach for extending capacities of a radio access network (ran) is presented. An exemplary method implementation of that approach comprises flying a drone to an ran site.
Telefonaktiebolaget Lm Ericsson (publ)

Hybrid cloud network monitoring system for tenant use

Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (vm) executing in the cloud computing system, wherein the first vm is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating vm having a first network interface and a second network interface is instantiated, wherein the decapsulating vm is inaccessible to the first tenant organization.
Vmware, Inc.

Device specific multi-channel data compression

A sensor device may include a computing device in communication with multiple microphones. A neural network executing on the computing device may receive audio signals from each microphone.
Google Llc

System, organizing photographs stored on a mobile computing device

An image organizing system for organizing and retrieving images from an image repository residing on a mobile device is disclosed. The image organizing system includes a mobile computing device including an image repository.
Amazon Technologies, Inc.

Automatic back-up scheduling

Techniques are disclosed herein for a cloud computing system for backing up a device. The system includes a scheduling manager to schedule a back-up for the device to occur at a time based on a time zone in which the device is located and based on workday customs local to the device.
Hewlett-packard Indigo B.v.

Distributed computing with cloud computed feedback to process sensors

A process control system for controlling an industrial process includes a cloud-computing dependent (c2d) radar level gauge or ultrasonic flow meter (c2d sensor device) including a sensor, transducer, communications unit, with limited hardware/software incapable of calculating an accurate level calculation or high accuracy gas flow rate. A bus couples the sensed data from the c2d sensor device to an ip communications unit that outputs ip protocol data.
Honeywell International Inc.

Protecting from unintentional malware download

Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application.
International Business Machines Corporation

Systems to implement security in computer systems

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Designer tool for managing cloud computing services

Embodiments of facilitating creation of cloud computing applications are disclosed therein. In one embodiment, a method includes receiving user input of a plurality of workflow items as a sequence of graphical objects on a graphical user interface.
Microsoft Technology Licensing, Llc

Method and system for securely transmitting volumes into cloud

A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a controller that is executable by one or more processors and is configured to instruct a cloud computing device to generate a worker virtual machine.
Citrix Systems, Inc.

Secure deployment of applications in a cloud computing platform

A method of securely deploying an application in a cloud computing platform includes receiving component composition files that define configurations of application components included the application, and receiving an application composition file that defines a connection scheme between the application components. The method further includes retrieving default component configuration files that satisfy requirements of the application components.
International Business Machines Corporation

System for deployment of communication terminals in a cloud computing system

A communication system includes a redirect server and a deployment server configured to configure different terminal devices so that those devices are able to access a network of a service provider. A terminal device, computer readable medium and method are also disclosed that helps deploy such a service.
Unify Gmbh & Co. Kg

Intelligent traffic cloud control system

The application relates to an intelligent traffic cloud control system configured to acquire and centrally analyze a large amount of field data in a traffic system, and to control the traffic system. Unlike a traditional traffic directing and controlling system in such an operating mode that data are acquired and transmitted respectively by different sensing devices, and then collected, analyzed, and processed by a central system, the intelligent traffic cloud control system according to the invention analyzes and processes centrally a large amount of data through field control servers communicating over ip address based broadband buses, and performs adaptive traffic control, traffic regulation enforcement, position tracking, coordinated control, and other service functions through integrating edge computing and cloud computing at a plurality of adjacent field control servers..
Kyland Technology Co.,ltd.

Optimized migration of virtual objects across environments in a cloud computing environment

An appliance migration mechanism (amm) optimizes migration of a live virtual appliance with virtual objects between cloud environments to minimize temporary connections that use significant cloud resources during the migration. The amm determines a cost of connections of each virtual object in the virtual appliance and produces an order of migration for the virtual objects.
International Business Machines Corporation

Activity driven smart home system

A cloud computing server includes a memory, a processor, and a communication unit. The memory is configured to store a plurality of activities, a plurality of actions, and an association model that associates the plurality of activities with the plurality of actions.
Samsung Electronics Co., Ltd

Service location management in computing systems

Techniques for facilitating allocation of cloud services in cloud computing systems are disclosed herein. In one embodiment, a method can include transmitting a request to service controllers configured to manage corresponding cloud services deployable in the cloud computing system, the request including a set of cloud services to be deployed in the cloud computing system.
Microsoft Technology Licensing, Llc

Credential management in cloud-based application deployment

Systems, methods, and computer program products for credential management. An application deployment system receives a deployment manifest for deploying an application in a cloud computing environment.
Pivotal Software, Inc.

Method for verifying information

A method for verifying information in a cloud computing system includes generating, by one or more computation devices, an evaluation key and a verification key in a memory available to at least one of the one or more computation devices based on a security parameter and a function to be evaluated; computing, by the one or more computation devices, an output of the function to be evaluated in a memory available to at least one of the one or more computation devices using an input; computing, by the one or more computation devices, a proof for an outcome using the evaluation key in a memory available to at least one of the computation devices; and verifying, by the one or more computation devices, if the proof is valid based on the verification key in a memory available to at least one of the one or more computation devices.. .
Nec Europe Ltd.

Integrating cloud service functionality by using document metadata

An example system and method for facilitating integrating functionality of different cloud computing environments. A particular example embodiment includes mechanisms for integrating a document cloud service with a process cloud service, such that components, e.g., documents, of software processes developed and/or implemented via the process cloud service can leverage the document cloud service and be maintained thereby.
Oracle International Corporation

Dynamic configuration of inter-chip and on-chip networks in cloud computing system

A server includes a plurality of nodes that are connected by a network that includes an on-chip network or an inter-chip network that connects the nodes. The server also includes a controller to configure the network based on relative priorities of workloads that are executing on the nodes.
Advanced Micro Devices, Inc.

Application monitoring for cloud-based architectures

An example system may include one or more collectors and an analyzer. The one or more collectors receive a plurality of data streams that include operational data for a plurality of application nodes.
Bmc Software, Inc.

Application deployment and management in a cloud computing environment

Methods, devices, and systems for management of a cloud computing environment for use by a software application. The cloud computing environment may be an n-tier environment.
Kaavo, Inc.

Containerization of network services

Techniques, described herein, may enable network services to be efficiently and effectively implemented as containers by computing devices operating in a cloud computing environment. Container images may be built and tested locally by an operator device and pushed to the computing devices for deployment of containers defined by the container images.
Verizon Patent And Licensing Inc.

Automatic virtual machine termination in a cloud

Managing a cloud computing environment including a plurality of resources adapted to host at least one virtual machine includes, in a virtual machine, determining a period of inactivity of the operating system for a user of the virtual machine and comparing, using a processor, the period with a defined threshold. From the virtual machine, a virtual machine termination request is sent to the cloud computing environment responsive to the period exceeding the defined threshold..
International Business Machines Corporation

Optimized migration of virtual objects across environments in a cloud computing environment

An appliance migration mechanism (amm) optimizes migration of a live virtual appliance with virtual objects between cloud environments to minimize temporary connections that use significant cloud resources during the migration. The amm determines a cost of connections of each virtual object in the virtual appliance and produces an order of migration for the virtual objects.
International Business Machines Corporation

Photonic switches, photonic switching fabrics and methods for data centers

Data center interconnections, which encompass wscs as well as traditional data centers, have become both a bottleneck and a cost/power issue for cloud computing providers, cloud service providers and the users of the cloud generally. Fiber optic technologies already play critical roles in data center operations and will increasingly in the future.
Aeponyx Inc.

Efficient scheduling of backups for cloud computing systems

A system and method for backing up virtual machines are disclosed. To better use the backup resources, an optimal set of virtual machines needing backup during a time window is generated.
Vmware, Inc.

Elasticity for highly availabile applications

Cloud computing is continuously growing as a business model for hosting information and communications technology applications. While the on-demand resource consumption and faster deployment time make this model appealing for the enterprise, other concerns arise regarding the quality of service offered by the cloud.
Telefonaktiebolaget Lm Ericsson (publ)

Liquid leak detection in a liquid distribution system

Systems and methods relate to monitoring liquid pressure to detect liquid leaks based on a global sequence alignment technique. A monitoring device in a liquid distribution obtains periodic samples at regular time intervals from a representative node of a liquid distribution system.

Method and operating infrastructure layer in cloud computing architecture

The present disclosure provides a method and apparatus for operating an infrastructure layer of cloud computing architecture. A specific implementation of the method comprises: determining, in response to receiving an operation request sent by a user via a user terminal for the infrastructure layer, whether to execute an operation indicated by the operation request; sending, in response to determining to execute the operation, the operation request to the infrastructure layer; updating, after the infrastructure layer successfully executing the operation and updating the resources related to the infrastructure layer, a state of the resources related to the infrastructure layer stored in the intermediate layer database; acquiring changed data in the resources related to the infrastructure layer, and storing the data in the infrastructure layer database; and synchronizing the data in the infrastructure layer database to the intermediate layer database..
Beijing Baidu Netcom Science And Technology Co., Ltd.

System and delegation of cloud computing processes

The disclosed systems and methods allow cloud services to delegate processing of sensitive data to trusted user devices. In an exemplary method, a cloud service stores data, some of which is encrypted and cannot be decrypted by the service.
Pcms Holdings, Inc.

Low downtime software-defined wide area network service upgrade

Techniques for upgrading virtual appliances in a hybrid cloud computing system are provided. In one embodiment, virtual appliances are upgraded by deploying the upgraded appliances in both a data center and a cloud, configuring the upgraded appliances to have the same ip addresses as original appliances, and disconnecting the original appliances from networks to which they are connected and connecting the upgraded appliances to those networks via the same ports previously used by the original appliances.
Vmware, Inc.

Stateful connection optimization over stretched networks using packet introspection

Techniques for stateful connection optimization over stretched networks are disclosed. In one embodiment, hypervisor filtering modules in a cloud computing system are configured to modify packets sent by virtual computing instances (e.g., virtual machines (vms)) in the cloud to local destinations in the cloud such that those packets have the destination media access control (mac) address of a local router that is also in the cloud.
Vmware, Inc.

Creating layer 2 extension networks in a hybrid cloud computing system

Techniques for creating layer 2 (l2) extension networks are disclosed. One embodiment permits an l2 extension network to be created by deploying, configuring, and connecting a pair of virtual appliances in the data center and the cloud so that the appliances communicate via secure tunnels and bridge networks in the data center and the cloud.
Vmware, Inc.

Determining an availability score based on available resources of different resource types in a cloud computing environment of storage servers providing cloud services to customers in the cloud computing environment to determine whether to perform a failure operation for one of the storage servers

Provided are a computer program product, system, and method for a computer program product, system, and method for determining an availability score based on available resources of different resource types in a distributed computing environment of storage servers to determine whether to perform a failure operation for one of the storage servers. A health status monitor program deployed in the storage servers performs: maintaining information indicating availability of a plurality of storage server resources for a plurality of resource types; calculating an availability score as a function of a number of available resources of the resource types; and transmitting information on the availability score to a management program.
International Business Machines Corporation

Off-site backup of workloads for multi-tenant cloud computing system

A system and method for backing up workloads for multiple tenants of a cloud computing system are disclosed. A method of backing up workloads for multiple tenants of a computing system, includes determining that a first tenant has elected to maintain a copy of backups in an off-site location and a second tenant has elected to not maintain a copy of backups in an off-site location, directing first backup data of the first tenant to a backup storage device within the computing system and to a backup storage device at the off-site location, and directing second backup data of the second tenant to the backup storage device within the computing system, and not to the backup storage device at the off-site location..
Vmware, Inc.

Efficient queueing and scheduling of backups in a multi-tenant cloud computing environment

Backups of workloads in a multi-tenant cloud computing environment are efficiently queued and scheduled. A method of backing up workloads for multiple tenants of a cloud computing system, includes the steps of determining a pool of workloads to be backed up during a time window, the workloads including workloads for a first tenant and workloads for a second tenant, placing a backup task for backing up each of the workloads in the pool in a scheduling queue and prioritizing the backup tasks according to backup parameters specified by the tenants, sizes of workload data to be backed up, and hardware constraints of a backup storage device executing the backups, and instructing the backup storage device to execute the backup tasks according to an order of the backup tasks in the scheduling queue..
Vmware, Inc.

Tiered backup archival in multi-tenant cloud computing system

A system and method for backing up workloads for multiple tenants of a cloud computing system are disclosed. A method of backing up workloads for multiple tenants of a computing system includes triggering an archival process according to an archival policy set by a tenant, and executing the archival process by reading backup data of the tenant stored in a backup storage device of the computer system and transmitting the backup data to an archival store designated in the archival policy, and then deleting or invalidating the backup data stored in the backup storage device..
Vmware, Inc.

Termination policies for scaling compute resources

Approaches are described for enabling a user to specify one or more termination policies that can be used to select which instances in a group of virtual machines (or other compute resources) allocated to the user should be terminated first when scaling down the group of virtual machine instances. The termination policies can be utilized by an automatic scaling service when managing the resources in a multitenant shared resource computing environment, such as a cloud computing environment..
Amazon Technologies, Inc.

Cloud-based application resource files

A cloud computing system can be used to transparently reduce the storage space of an application on a client device. An application can be installed with a minimal set of application resource files.
Apple Inc.

Real time machine vision and point-cloud analysis for remote sensing and vehicle control

Methods and apparatus for real time machine vision and point-cloud data analysis are provided, for remote sensing and vehicle control. Point cloud data can be analyzed via scalable, centralized, cloud computing systems for extraction of asset information and generation of semantic maps.
Solfice Research, Inc.

Statistical resource balancing of constrained microservices in cloud paas environments

A resource balancer for a cluster of nodes in a cloud computing system includes a load calculation module that receives load reports for respective load metrics associated with the nodes, wherein the load reports are indicative of respective loads on a plurality of resources provided by the nodes, calculates, based on the received load reports, an expected distribution of loads across the nodes for each load metric, and calculates, based on the expected distribution of loads, probabilities that each of the load metrics will exceed a respective predetermined capacity for each node. A load balancing module selectively balances, based on the calculated probabilities, the loads on the resources provided by the nodes..
Microsoft Technology Licensing, Llc

Cloud computing environment activity monitoring

A computer-implemented method according to one embodiment includes identifying a cloud computing environment, establishing a baseline associated with input and output requests within the cloud computing environment, monitoring activity associated with the cloud computing environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.. .
International Business Machines Corporation

Database management using a matrix-assisted laser desorption/ionization time-of-flight mass spectrometer

An apparatus, method, or computer program. Spectrometer test data of a sample may be received.

System status visualization method and system status visualization device

From among the communication packets captured by a capturing unit, the communication packets of the applications for which the response time holds importance from the performance perspective are used by a response time calculating unit to calculate the response time on an application-by-application basis. Then, a normalizing unit calculates the average response time and normalizes the average response time using the representative response time to calculate the normalized response time on an application-by-application basis.
Fujitsu Limited

Systems and methods for content transfer

The present invention provides systems and methods for the virtualization, aggregation, and distributed processing of facsimile communications. The remote fax interconnect known as etherfax® is a system and method that allows for the reception and delivery of information based on cloud computing infrastructure to or from one or more facsimile systems using internet/web based communication protocols such as http(s) as the transport between a facsimile capable application or hardware and the remotely accessible etherfax® services..
Etherfax, Llc

Determination of user reputation regarding data object exposure in cloud computing environments

Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment.
Palo Alto Networks, Inc.

Method for handling network partition in cloud computing

Various embodiments relate to a method, an active management node and a standby management node configured to detect and recover from a network partition the method including determining whether the active management node sees the standby management node on less than all of the plurality of token rings, then restarting the standby management node, determining whether a first active management node with a lower node index sees a second active management node with a higher node index on one or more than one of the plurality of token rings, then restarting the second active management node with a higher node index and determining whether the second active management node with a higher node index sees the second active management node with a lower node index on one or more than one of the plurality of token rings, then restarting the active management node with a higher node index.. .
Alcatel-lucent Canada Inc.

System, method and recording medium for causality analysis for auto-scaling and auto-configuration

Similar to other cloud service, solution as services over cloud, as single tenant technology, also requires support of agility and flexibility as a fundamental feature of cloud computing. Different from other cloud services, the agility and flexibility typically are not triggered by the typical performance metrics, but at the business level of metrics.
International Business Machines Corporation

Automatically detecting distributed concurrency errors in cloud systems

A method for detecting distributed concurrency errors in a distributed cloud computing system includes tracing operations that access objects in functions involving inter-process messaging, applying a set of happens-before rules to the traced operations. Analyzing the traced operations to identify concurrent operations that access a common object to generate a list of potential distributed concurrency errors (dcbugs).
The University Of Chicago

Method for detecting abnormal load in cloud computing oriented online service

Disclosed are a method and device for detecting an abnormal load. The method includes: collecting data of each load item in all hosts; pre-processing to obtain a second sequence corresponding to each load item; obtaining a coefficient matrix and a detail vector; computing a weighted mean of abnormal load probabilities of all the coefficient vectors, to obtain an abnormal load probability of each second sequence; comparing the abnormal load probability with a confidence interval, and judging whether there is an abnormal load, and judging that there is no abnormity in the corresponding second sequence if the abnormal load probability of each second sequence is in the confidence interval; judging whether there is an abnormal load according to data of all load items and the abnormal load probability of each second sequence; and finding a bearing host that has the abnormal load from the current online service..
Tsinghua University

Cloud computing for mobile client devices

Apparatuses, methods and storage medium associated with cloud computing for mobile client devices are disclosed herein. In embodiments, a cloud server may include one or more processors, and a mobile computing operating system to host execution of an application.
Intel Corporation

Data access method based on cloud computing platform, and user terminal

A data access method based on a cloud computing platform, and a user terminal, are provided. The method is performed by a user terminal, and the method includes obtaining an access request for a data ciphertext of the cloud computing platform, the access request including a decryption key, and the decryption key including a user precise identity identifier and a user attribute identifier.
Hunan University

Vehicle-to-pedestrian communication systems

Vehicle-to-pedestrian information systems that use directional sound transmission on autonomous vehicles are disclosed. A cloud computing system manages messages for transmission to pedestrians via autonomous vehicles having directional speakers.
Nio Usa, Inc.

Method and heterogeneous data storage management in cloud computing

Method and apparatus are disclosed for heterogeneous data storage management in cloud computing. According to some embodiments, a method for managing data storage in a communication network comprises: receiving at a data center in the communication network from a first device, a request for storing a data in the data center; checking whether the same data has been stored in the data center; in response to a check result that no same data has been stored in the data center, receiving from the first device a data package containing at least the data in plaintext or ciphertext (ct) in response to a check result that the same data has been stored in the data center, obtaining a deduplication policy for the data; when the deduplication policy indicates deduplication to be controlled by both or either of an authorized party (ap) and an owner of the data, or only the ap, or only the data owner, contacting both or either of the ap and the data owner, or only the ap, or only the data owner to conduct deduplication for the data; and when the deduplication policy indicates deduplication to be controlled by none of the ap and the data owner, conducting deduplication for the data at the data center.
Nokia Technologies Oy

Authentication on a computing device

Systems and/or methods provide a user of a first computing device with the ability to authenticate themselves on a remotely provided process or service using a second computing device on which the user is already authenticated. For example, the techniques of this disclosure provide a user with the ability to securely log into a remotely provided service or application (such as e-mail, cloud computing service, etc.) on a first computing device (e.g., a desktop computer, laptop, tablet, etc.) using a second computing device (e.g., mobile phone) on which the user is already logged into the service or application, without requiring manual entry of authentication information on the first computing device..
Google Llc

System and providing secure collaborative software as a service (saas) attestation service for authentication in cloud computing

An architecture and a method are disclosed for providing secure, scalable, and dynamic user configuration in the distributed network for the cloud computing to provide authentication and authorization for the plurality of the users to use the saas service. The system includes a hierarchical tree structure that configures the cloud-computing model by using the certificate less identity-based cryptography to establish the hierarchical relationship between the participating entities.
Institute For Development And Research In Banking Technology (idrbt)

Fault recovery management in a cloud computing environment

Technologies for managing fault recovery in a cloud computing environment may be used after faults of various sizes, including faults which put total functioning capacity below subscribed capacity. Computing services have repair priorities.
Microsoft Technology Licensing, Llc

Virtual machines deployment in a cloud

Examples described relate to deployment of virtual machines in a cloud. In an example, receipt of a request for deployment of a virtual machine in a cloud computing environment may be determined, wherein the cloud computing environment includes a plurality of hypervisors hosted on a plurality of racks.
Hewlett Packard Enterprise Development Lp

Access services in hybrid cloud computing systems

Techniques for facilitating operations in hybrid cloud computing systems are disclosed herein. In one embodiment, a method can include receiving, at a public cloud, a plurality of applications deployable in a private cloud and informing an access service of the public cloud computing system regarding the received applications deployable in the private cloud.
Microsoft Technology Licensing, Llc

Usage tracking in hybrid cloud computing systems

Techniques for facilitating usage tracking in hybrid cloud computing systems are disclosed herein. In one embodiment, a method can include receiving, from a private cloud computing system, a request for uploading usage data to a storage in a public cloud computing system.
Microsoft Technology Licensing, Llc

Crowd-sourced cloud computing in a multiple resource provider environment

A crowd-sourced cloud environment allows for, and benefits from, modes of interaction between among the service providers (including the “resource providers” and the “cloud provider”) and consumers (also referred to herein as “tenants”) that are not practiced in a dc-centric cloud environment—specifically, the use of internet-based social networking technology and internet-based online marketplace technology to facilitate resource pooling and interaction between crowd-sourced cloud resource providers, the cloud provider, and crowd-sourced cloud consumers.. .
Cisco Technology, Inc.

Precondition exclusivity mapping of tasks to computational locations

Computational tasks are mapped with computational locations in a distributed system such as a cloud computing environment. Mapping does not rely on workload estimates.
Microsoft Technology Licensing, Llc

Distributed key/value store system using asynchronous messaging systems

A distributed key/value store system using asynchronous messaging systems is provided. A plurality of instances in a cloud computing environment each execute software that enables reading from and writing to a respective local cache, and that enables sending messages through a messaging queue to a cloud environment operating system.
Fugue, Inc.

Cloud migration and maintenance controls

Improved cloud migration tools are provided. In some embodiments, improved cloud migration tools may provide complex cloud migration analysis techniques for automated monitoring of aggregate compliance with cloud migration protocols, including user- and/or organizational defined architectural guidelines.
Capital One Services, Llc

Device specific multi-channel data compression

A sensor device may include a computing device in communication with multiple microphones. A neural network executing on the computing device may receive audio signals from each microphone.
Google Inc.

Network system, cloud connector and identification of network devices

A network system includes a first network user having a plurality of network devices, wherein the network devices have identification parameters for identification, a second network user having a cloud computing infrastructure, and a cloud connector having a first interface and a second interface. The cloud connector is connected via the first interface to the first network user and connected via the second interface to the second network user.
Siemens Aktiengesellschaft

End-to-end secure cloud computing

A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy..
At&t Intellectual Property I, L.p.

Crowd-sourced cloud computing resource validation

Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each ip address included in the received specification is determined.
Cisco Technology, Inc.

Cloud computing resource orchestration

Provided are example methods and apparatus for orchestrating cloud computing resources which enable customizing cloud management software to add, via user-provided code, features and functionality which go beyond base features built into the cloud management software, without otherwise modifying the cloud computing management software. The user-provided code can include a plug-in, a script, a webhook, a callout, the like, or a combination thereof..
Cloudbolt Software Inc.

Persistent real-time communication channels with cloud computing systems

Mechanisms for establishing persistent bi-directional communication channels with cloud computing systems are disclosed. A processor device initiates a plurality of persistent bi-directional communication channels with a corresponding plurality of cloud computing systems.
Red Hat, Inc.

Establishing trust within a cloud computing system

A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a common aspect, and a plurality of authentication servers, where an authentication server is associated with one of the plurality of sets of devices based on the common aspect. The cloud computing system functions to establish trust between a corresponding one of the plurality of authentication servers and the one or more devices of one of the plurality of sets of devices, between the corresponding one of the plurality of authentication servers and the cloud system managing unit, and between the cloud system managing unit and the one or more devices.
International Business Machines Corporation

Near-real-time and real-time communications

The present disclosure generally discloses capabilities for supporting new network zones and associated services. The network zones and associated services may include a near-real-time (nrt) zone and associated nrt services, a real-time (rt) zone and associated rt services, or the like.
Alcatel-lucent Canada Inc.

Performance assurance using workload phase detection

Systems described herein operate to improve network performance in a multi-tenant cloud computing environment. Systems can include communication circuitry and processing circuitry to generate a phase sequence matrix that indicates the identity and number of phases of a workload by measuring resources of the compute node during execution of the workload throughout a lifetime of the workload.

Cloud-based reservoir simulation environment

Reservoir simulations may be executed in a high performance computing cloud cluster (530) provisioned within a cloud computing environment (450) and accessible by graphical pre- and/or post-processors (410) resident on a computer system (402) that is external to the cloud computing environment.. .
Schlumberger Technology Corporation

Dynamic deactivation of cold database in database service

Managing databases implemented in a cloud computing environment. A method includes detecting that a database implemented in the cloud computing environment is in a state of non-use.
Microsoft Technology Licensing, Llc

Remote creation of a playback queue for a future event

Example embodiments involve remote creation of a playback queue for an event. An example implementation involves a cloud computing system receiving, from a first mobile device, one or more messages representing an instruction to create a playlist for an event.
Sonos, Inc.

Security policy generation for virtualization, bare-metal server, and cloud computing environments

Methods, systems, and media for security in virtualization, bare-metal server, and cloud computing environments are provided herein. Exemplary methods include: receiving network traffic associated with a primary workload; generating first metadata using the network traffic; determining a primary categorization associated with the primary workload, using the first metadata; confirming the primary categorization is reliable; determining a secondary categorization associated with at least one secondary workload, the at least one secondary workload being communicatively coupled to the primary workload; ascertaining the primary categorization and the secondary categorization are consistent with each other and are each stable; producing a model using the primary categorization and the secondary categorization; checking the model for sustained convergence; and generating a high-level declarative security policy associated with the primary workload using the model, the high-level declarative security policy indicating at least an application or service with which the primary workload can communicate..
Varmour Networks, Inc.

Load adaptation architecture framework for orchestrating and managing services in a cloud computing system

According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a load adaptation architecture framework that performs operations for orchestrating and managing one or more services that may operate within at least one of layers 4 through 7 of the open systems interconnection (“osi”) communication model. The cloud computing system also can include a virtual resource layer.
At&t Intellectual Property I, L.p.

Routing cloud messages using digital certificates

Provided are a system and method for routing messages in a multi-tenant cloud computing environment based on digital certificates. In one example, a server includes a network interface configured to receive a request and a digital certificate from a network object, where the digital certificate includes a plurality of attributes.
General Electric Company

Cross-cloud provider virtual machine migration

A method for migrating a virtual machine (vm) includes establishing a first connection to a first cloud computing system executing a first vm, and establishing a second connection to a second cloud computing system managed by a second cloud provider, which is different form the first cloud provider. The method further includes instantiating a second vm designated as a destination vm in the second cloud computing system, and installing a migration agent on each of the first vm and the second vm.
Vmware, Inc.

Methods and systems to optimize cost and automate a development and operations deployment pipeline

Methods and systems that automate a devops deployment pipeline and optimize devops cost are described. Methods generate a deployment pipeline model based on policies associated with each deployment stage and task.
Vmware, Inc.

Real time cloud workload streaming

A method and system for real-time cloud bursting is provided. The method and system are directed to extending a data center with cloud computing resources by decoupling computing resources and storage devices in a virtualized data center, and booting the decoupled computing resources in a staged process while storage devices are divided and prioritized into components.
Velostrata Ltd.

Service provisioning in cloud computing systems

Techniques for provisioning cloud services in cloud computing systems are disclosed herein. In one embodiment, a method can include providing a user portal configured to communicate with a deployment application configured by a user for provisioning cloud services in the cloud computing system.
Microsoft Technology Licensing, Llc

Organizing data in a virtual computing infrastructure

Organizing data in a cloud computing environment having a plurality of computing nodes is described. An authorization to service a request is received.
Oracle International Corporation

Predictively provisioning cloud computing resources for virtual machines

Methods, computer program products, and systems are presented. The methods include, for instance: predictively provisioning, by one or more processor, cloud computing resources of a cloud computing environment for at least one virtual machine; and initializing, by the one or more processor, the at least one virtual machine with the provisioned cloud computing resources of the cloud computing environment.
International Business Machines Corporation

Update coordination in a multi-tenant cloud computing environment

Software updates within one or more regions of a multi-tenant cloud are coordinated. Tenant vs.
Microsoft Technology Licensing, Llc

Integrated lighting and building management control gateway

The examples herein offer an improved, more integrated implementation of lighting control and building management control, e.g. Within the same gateway or cloud computing/control element(s), via an integrated software architecture.
Abl Ip Holding Llc

Price breaks in a cloud computing system for using an automatic scheduler

Systems and methods and portions thereof are discussed pertaining to a method of adjusting a fee charged for use of a computing resource in a cloud computing environment by establishing a first pricing scheme for the computing resource; monitoring use of the computing resource by a user entity; determining, based on the monitoring, whether the user entity permits an automatic scheduler to make scheduling decisions for use of the computing resource without direction from the user entity; and establishing a second pricing scheme for the computing resource, where the second pricing scheme charges differently for use of the computing resource than the first pricing scheme such that one of the first and second pricing schemes charges less for computing resource usage responsive to a determination that the user entity permits the automatic scheduler to make scheduling decisions for use of the computing resource without direction from the user entity.. .
Google Inc.

Method and system for cloud computing services for use with client devices having memory cards

A system, method and computer program product for cloud computing, including a cloud server including a cloud link module or program and coupled to a communications network; a client device including a device link module or program and coupled to the cloud server via the communications network; and a memory card including a card link module or program and coupled to the client device. The cloud link, client link, and card link modules or programs are configured to allocate processing of content between the cloud server, client device and memory card, such that communications bandwidth usage between the cloud server and the client device are minimized during content delivery..

Operating status display system

An operating status display system includes: a configuration information storage storing information indicating a relationship between systems provided on cloud computing systems, business applications operating on the cloud computing systems to realize the systems, virtual servers, one server being used for the business applications, physical servers configuring the virtual servers, and facilities used for the physical servers; an operating information storage storing operating information indicating respective operating statuses of the business applications, the virtual servers, the physical servers, and the facilities; and an operating status display performing switching among system operating statuses indicating operating statuses of some of the systems, cloud computing system operating statuses indicating operating statuses of some of the cloud computing systems, and facility operating statuses indicating operating statuses of some of the facilities according to a user operation and displaying the switched operating statuses, based on the configuration information and the operating information.. .
Nomura Research Institute, Ltd.

Data center profiling and cloud emulation

Disclosed herein are mechanisms and devices for profiling and emulating a data center in a cloud computing environment. A user requests the data center be emulated through a user interface.
Microsoft Technology Licensing, Llc

Multi-service application fabric architecture

In representative embodiments, multiple cloud computing infrastructures, each having its own application and management fabric, coexist with in the same cloud computing infrastructure. This results in a cloud computing infrastructure where multiple management fabrics and application fabrics coexist to offer their own services and cross platform services.
Microsoft Technology Licensing, Llc

Platform and knowledge-based instruction engine implemented skill-improvement system through cloud computing

Methods and apparatuses for generating feedback to a human practitioner practicing a skill using a combination of local platform, the internet, and cloud-based analysis engine are disclosed. The local platform is employed to provide physical parameter data pertaining to the human practitioner (or part/parts thereof) and to the object involved in practicing the skill.

Exploit-explore on heterogeneous data streams

Machine learning on a heterogeneous event data stream using an exploit-explore model. The heterogeneous event data stream may include any number of different data types.
Microsoft Technology Licensing, Llc

Reconfigurable cloud computing

A method, system, and computer-readable storage medium for a reconfigurable computing system are disclosed. One method involves configuring one or more computing resources (selected according to a workflow that specifies an application to be executed) of a computing node and executing, using the one or more computing resources, at least a portion of an application at the computing node.
Nimbix, Inc.

Integrated intranet workspace

A method, a system and a non-transitory memory including a computer readable instructions is disclosed for providing an integrated intranet workspace. One or more independent applications are selected as workspace integrated applications for providing services within the integrated intranet workspace.
Gapps Oy

Optimizing placement of virtual machines

Systems and methods are described for allocating resources in a cloud computing environment. The method includes receiving a computing request, the request for use of at least one virtual machine and a portion of memory.
Cisco Technology, Inc.

Infrastructure testing

Provided are examples of apparatus and methods which relate to infrastructure testing, such as end-to-end reliability testing of a network deployed across one or more clouds in a cloud computing system. In an example method, a machine-executable order describing a computing network is received at a platform management device.
Cloudbolt Software Inc.

Method and duplicated data management in cloud computing

An approach is provided for managing data duplication in cloud computing. A method comprising, sending from a first device to a data center, data encrypted with a data encryption key for storing the encrypted data at the data center; encrypting the data encryption key according to an attribute-based encryption (abe) scheme by using identity as an attribute in a deduplication policy for the data; issuing to a second device, a personalized secret attribute key which is derived from a public key of the second device according to the attribute-based encryption (abe) scheme, wherein the personalized secret attribute key is to be used for decrypting the encrypted data encryption key at the second device, in combination with the policy..
Nokia Technologies Oy

Enforcing compliance with administrative requirements relating to using computing resources

Provided are examples of apparatus and methods which relate to enforcing compliance with one or more administrative requirements relating to using computing resources. In an example, one or more objects being used on one or more cloud computing platforms are identified with a computing device.
Cloudbolt Software Inc.

Service request management in cloud computing systems

Techniques for managing service requests in cloud computing systems are disclosed herein. In one embodiment, a method can include in response to determining that a profile of detected service requests substantially deviates from the predetermined profile, identifying a component failure of a service component in the cloud computing system by searching a database containing operational event logs of the cloud computing system based on the detected service requests.
Microsoft Technology Licensing, Llc

Allocating cloud computing resources in a cloud computing environment

A method of allocating cloud computing resources in a cloud computing environment to a user is disclosed. The method comprises determining a prediction accuracy score for each user indicative of their user predictability, and allocating cloud computing resources to each user dependent on their user predictability..
Telefonaktiebolaget Lm Ericsson (publ)

Operational management in cloud computing systems

Techniques for managing operation in cloud computing systems are disclosed herein. In one embodiment, a method can include receiving data representing a guaranteed value of a performance metric of a cloud service and an error budget and deriving a switching threshold based on a combination of the value of the performance metric and the error budget.
Microsoft Technology Licensing, Llc

Method, apparatus, and system for adjusting deployment location of virtual machine

A method, an apparatus, and a system for adjusting a deployment location of a virtual machine in order resolve a problem that an inter-node communication cost has excessively great impact on an adjustment result in an existing solution for adjusting a deployment location of a virtual machine in a cloud computing system, the inter-node communication cost is corrected according to technical solutions provided in the embodiments of the present disclosure. Consequently, not only a corrected inter-node communication cost can exert impact on the result for adjusting a deployment location of a virtual machine, but also communication traffic can play a major role in affecting the adjustment result.
Huawei Technologies Co., Ltd.

Method & a train control system

A method and an apparatus for a train control system are disclosed, and are based on virtualization of train control logic and the use of cloud computing resources. A train control system is configured into two main parts.

Application-based elastic resource provisioning in disaggregated computing systems

Various embodiments for elastic resource provisioning in a disaggregated cloud computing environment, by a processor device, are provided. Respective members of pools of hardware resources within the disaggregated cloud computing environment are provisioned to a tenant according to an application-level service level agreement (sla).
International Business Machines Corporation

Linking instances within a cloud computing environment

Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (gui or the like), and associated with a set of rules.
International Business Machines Corporation

Sla-based agile resource provisioning in disaggregated computing systems

Various embodiments for agile component-level resource provisioning in a disaggregated cloud computing environment, by a processor device, are provided. Respective members of pools of hardware resources within the disaggregated cloud computing environment are allocated to each respective one of a plurality of tenants according to one of a plurality of service level agreement (sla) classes.
International Business Machines Corporation

Multicast traffic management in an overlay network

The use of network virtualization using overlays over layer 3 (nvo3) is a growing trend to address networking issues in data centers that make use of virtualization and cloud computing techniques. Additional considerations may be required to support application-specific multicast traffic in such overlay networks.
Telefonaktiebolaget Lm Ericsson (publ)

System and network address administration and management in federataed cloud computing networks

Techniques for performing network address allocation, administration and management in federated cloud computing networks are described. In one example embodiment, network interface cards (nics) in a local network services appliance and a remote network services appliance register with an associated local network cloud and remote network cloud in the federated cloud computing networks.
Vmware, Inc.

System and methods for scalable packet inspection in cloud computing

A method for packet inspection in a computer network includes receiving a plurality of network streams from a plurality of client systems at a first load balancer; allocating the network streams across a proxy instances; and inspecting and filtering the network streams by the proxy instances. The method further includes forwarding the filtered network streams to a second load balancer; allocating the filtered network streams to a plurality of application instances; and processing and responding to the network streams at the application instances.
Secureworks Corp.

Virtual hybrid texture mapping

A gaming device is configured to provide virtual hybrid texture mapping, which provides a type of virtual placeholder that can be filled in using cloud computing resources. The virtual placeholders are filled in to create more detailed textures whose calculated are offloaded to a cloud computing service provider data center's cluster..
Vmware, Inc.

Providing enterprise product bundles as a cloud-based service

Systems, methods, and computer-readable storage media are provided for creating and delivering product packaging as a cloud-based service to enterprise administrators. Administrators utilize user credentials to access a web-based portal where a name or identifier of each package created by any enterprise administrator of the organization is presented.
Adobe Systems Incorporated

Convergence of cloud and mobile environments

In an approach for converging a cloud computing environment and a mobile device into an integrated environment, a processor receives a request to complete a computing task on a first device. A processor identifies capabilities of the first device.

System and cloud computing on-demand dynamic service management engine

The present arrangement is a system for connecting consumers with services. The system has a mobile application management platform for supporting connection with a plurality of third party service providers.
Tize Technologies Inc. (accomplicetm) C/o Wework

Constructing computing systems with flexible capacity of resources using disaggregated systems

Various embodiments for allocating resources in a disaggregated cloud computing environment, by a processor device, are provided. Respective members of a pool of hardware resources are assigned to each one of a plurality of tenants based upon a classification of the respective members of the pool of hardware resources.
International Business Machines Corporation

System and disaster recovery of cloud applications

Cloud computing is continuously growing as a business model for hosting information and communications technology applications. While the on-demand resource consumption and faster deployment time make this model appealing for the enterprise, other concerns arise regarding the quality of service offered by the cloud.
Telefonaktiebolaget Lm Ericsson (publ)

Cloud computing service architecture

A service control system manages a set of storage clients operating within one or more computing hosts. Storage clients may access a consistent storage system regardless which cloud provider the computing hosts come from.

Systems and methods for segmenting industrial asset services

Systems and methods are presented for receiving, at a server computer associated with an industrial asset cloud computing system, a request from a user device for industrial asset application development services, the request including a username and password, and verifying, by the server computer, the username and password. The systems and methods further comprise determining, by the server computer, a user profile based on the username, the user profile comprising at least one of an industry, a region of operation, a negotiated contract term, an identity of the user associated with the username as an individual developer or an enterprise, and a role associated with the user; determining, by the server computer, a subset of a plurality of industrial asset application development services based on the user profile, and sending the subset of the plurality of industrial asset development services to the user device to be displayed on the user device..

Pluggable allocation in a cloud computing system

In one embodiment, a cloud computing system provides user extensibility by providing a plugin interface for major systems. Plugin interfaces for a compute service, object service, network service, authentication and authorization service, message service, and image service are disclosed.

Multi-tenant middleware cloud service technology

A system that includes multiple hosts, each running a plurality of virtual machines. The system may be, for example, a cloud computing environment in which there are services and a service coordination system that communicates with the hosts and with the services.

Software verification method and apparatus

A software verification method and apparatus are disclosed, applied to the cloud computing field and the communications field, and can be used to automatically verify whether an installation file of vnf software has been tampered with. The method includes: obtaining installation files of vnf software and signature files of the installation files, where the signature files of the installation files are used to store verification information of the installation files; verifying the installation files according to the signature files of the installation files; and determining, if the verification of the installation files succeeds, that the vnf software has not been tampered with..

Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing

Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk.

Trainable transceiver and cloud computing system architecture systems and methods

A system for installation in a vehicle and for controlling a device, the system including a trainable transceiver, communications electronics, and a processing circuit coupled to the trainable transceiver and the communications electronics. The processing circuit is configured to train the trainable transceiver to control a device using information received from a cloud computing system remote from the device and vehicle via the communications electronics..
Gentex Corporation

Method and system for managing and displaying product images with progressive resolution display

A method and system displaying and managing images of consumer products with cloud computing. One or more consumer products are selected.

Cloud system for controlling outdoor grill with mobile application

Embodiments are directed to communicating with and controlling operation of electronically-controlled appliances. In one scenario, a computer system receives a first input from a computing system indicating that an electronically-controlled appliance is permitted to communicate with a cloud computing platform.
Traeger Pellet Grills, Llc

Cloud tabs

The presently disclosed techniques related to data transfer and synchronization between multiple electronic devices. The multiple electronic devices may be logged onto a user's account with a cloud computing service so that they may transfer data relating to websites that they have accessed to the cloud computing service so that such data may be synchronized amongst the multiple electronic devices.
Apple Inc.

Technologies for deploying dynamic underlay networks in cloud computing infrastructures

Technologies for deploying dynamic underlay networks in a cloud computing infrastructure include a network controller of the cloud computing infrastructure communicatively coupled via disaggregated switches to one or more compute nodes of the cloud computing infrastructure. The network controller is configured to receive tenant network creation requests from a cloud operating system (os) of the cloud computing infrastructure indicating that a tenant network is to be created in the cloud computing infrastructure (e.g., for a new tenant of the cloud computing infrastructure).

Systems for improving performance and security in a cloud computing system

Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key.
Egnyte, Inc.

Methods for improving performance and security in a cloud computing system

Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key.
Egnyte, Inc.

Apparatus and verifying cloud service compatibility

Disclosed herein are an apparatus and method for verifying cloud service compatibility. The apparatus includes a cloud service description management unit, a cloud service relationship analysis unit, a schema mapping information management unit, an interoperability verification unit, and a data portability verification unit.
Electronics And Telecommunications Research Institute

Scaling persistent connections for cloud computing

Examples relate to scaling persistent connections for cloud computing. In some examples, a data packet is used to determine connection information of the first connection.
Hewlett Packard Enterprise Development Lp

Protecting dynamic and short-lived virtual machine instances in cloud environments

The present disclosure relates to protecting temporary virtual machine instances in a cloud computing platform from security risks. An example method generally includes monitoring a cloud platform for the assignment of a temporary virtual machine instance to a workload.
Symantec Corporation

Encryption and decryption of data in a cloud storage based on indications in metadata

Provided are a method, a system, and a computer program product in which metadata associated with encrypted data is maintained in a cloud computing environment, wherein the metadata indicates whether reading of information in the encrypted data is restricted geographically. A controller provides a decryption code for decrypting the encrypted data to a cloud server located in a geographical location, based on whether the metadata indicates whether the reading of information in the encrypted data is restricted geographically..
International Business Machines Corporation

System and secure cloud computing

In a method for secure cloud computing, a virtual machine (vm) associated with a client is executed at a computer within a trusted computing cloud. An image including state information of the vm is obtained; storage of the image is arranged; a freshness hash of the image is determined; and the freshness hash is sent to the client.
Virtustream Ip Holding Company Llc

Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request.
International Business Machines Corporation

System, method, and recording medium for performance management of a service for a database as a service

A performance management method, system, and non-transitory computer readable medium for a service for database as a service (dbaas) in a cloud computing environment, include a receiving and comparing circuit configured to receive a service request from a user and compare the received service request to at least one prior received service request, a similarity calculating circuit configured to calculate a similarity between the service request and the at least one prior received service request based on a requirement that the service request places on the dbaas, and a data verifying circuit configured to verify whether information within the database of the dbaas has changed since an identical prior received service request based on the receiving and comparing circuit identifying the identical prior received service request.. .
International Business Machines Corporation

Migration of network entities to a cloud infrastructure

A method for migrating network entities to a cloud computing infrastructure includes receiving an indication of at least one node of a plurality of nodes to migrate from an enterprise network to a cloud computing infrastructure, identifying one or more related nodes of the plurality of nodes that have direct and indirect communication relationships with the indicated node, and adding the indicated node and at least one node of the related nodes for the indicated node to a migration group. The method includes preparing a migration-configuration file for each node of the migration group, the migration-configuration file comprising service level agreement (sla) information, deploying a migration agent to each node of the migration group, and migrating the migration group to the cloud computing infrastructure, wherein each node of the migration group is migrated using a corresponding migration-configuration file to generate an sla for each node of the migration group with a provider of the cloud computing infrastructure in view of sla information from the corresponding migration configuration file..
Red Hat, Inc.

Efficient vm migration across cloud using catalog aware compression

Techniques for migrating a vm in a hybrid cloud computing system are provided. The techniques include identifying a similar vm at the destination, comparing dictionaries for the vm to be transmitted and the similar vm, and compressing the vm based on the comparison.
Vmware, Inc.

Designer tool for managing cloud computing services

Embodiments of facilitating creation of cloud computing applications are disclosed therein. In one embodiment, a method includes receiving user input of a plurality of workflow items as a sequence of graphical objects on a graphical user interface.
Microsoft Technology Licensing, Llc

Cloud computing service catalog

Provided in an example is a cloud computing service catalog which enables a cloud computing user to prepare and implement a blueprint of service items across multiple different clouds of computing resources. An example method includes discovering a plurality of computer resources which are available from at least one of a first platform and a second platform, and receiving data describing a plurality of service items.
Cloudbolt Software Inc.

Cloud computing configuration form generator

Provided are examples of cloud computing form generators which enable data-driven configuring of cloud computing resources. A configuration form is generated, for example, by an administrator, based at least in part on computing resources available from two or more disparate computing clouds and preconfiguring objects available from the two or more disparate computing clouds.
Cloudbolt Software Inc.

Hybrid cloud operation planning and optimization

Resource usage is monitored for a hybrid cloud computing environment having on-premises computing resources and off-premises computing resources, for at least a first time period. For the time period, the amount of the on-premises computing resources and off-premises computing resources are related to the demand for computing services from the environment.
International Business Machines Corporation

Systems and methods of reading and processing change-of-address forms in a cloud-based architecture

A method for processing change-of-address (coa) forms. The method includes capturing a first image of a first coa form.
Siemens Industry, Inc.

Data movement among distributed data centers

Embodiments of the present disclosure provide a method and an apparatus for data movement among distributed data centers in a peer network. The method comprises: reducing an amount of data to be moved by pre-processing the data; generating a torrent file for the data; distributing the torrent file to a peer data center, and in response to receiving a data request from the peer data center, transmitting a segment of the data to the peer data center.
Emc Ip Holding Company Llc

Systems and methods of enforcing multi-part policies on data-deficient transactions of cloud computing services

The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata..
Netskope, Inc.

Method, apparatus and system for processing attack behavior of cloud application in cloud computing system

An apparatus for processing an attack behavior of a cloud application in a cloud computing system, including a policy manager configured to store a security determining rule and a malicious application processing rule, a security analyzer configured to receive application behavior data from a security detector, and send the application behavior data to a security processor when the cloud application running on the cloud host has an attack behavior, and the security processor is configured to invoke, according to the malicious application processing rule, an interface provided by a cloud controller in order to process the cloud application having an attack behavior. The apparatus performs security protection based on an application level of cloud computing, which can prevent mutual attack between different applications on a same host, and reduce impact on a normal application..
Huawei Technologies Co., Ltd.

Middle ware security layer for cloud computing services

The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata..
Netskope, Inc.

System for support in the event of intermittent connectivity, a corresponding local device and a corresponding cloud computing platform

A system wherein a request can be processed both in a cloud service and autonomously or locally via a client, and a monitoring of the network quality, for example, the presence of delay, is carried out, and wherein, depending on the current accessibility of the cloud platform, optionally a local alternative calculation is carried out, which may be slower or, for example in the event of real-time requirements, is of a lower quality than the corresponding cloud service, and the result thereof is then temporarily used alternatively by the client is provided. In this way, cloud services can be locally buffered, thereby cushioning connection interruptions between end device and cloud platform, whereby cloud services can be used in a transparent manner for the user and, even in the event of connection interruptions..
Siemens Aktiengesellschaft Ü

Systems and methods for management of cloud computing resources for information systems

The system and methods described herein provide for dynamic provisioning of computing resources for an enterprise resource planning system. The dynamic provisioning system provisions an original configuration of computing resources upon selection from a client device, and then provides for further dynamic provisioning by evaluating the real-time performance of the erp system or by analyzing historical performance and consumption information of the erp system or by using a combination to predict the anticipated stress on the computing resources placed by future performance of the erp system..
Velocity Technology Solutions, Inc.

Master data management for a cloud computing system

Some embodiments provide a program that receives, from a first system, a copy of master data. The program also receives a master data modification rule.
Sap Se

Information security realizing method and system based on digital certificate

A digital certificate based information security realization method and system are provided. The method includes: separately issuing a digital certificate for a cloud management host, a physical cloud computing host and a virtual cloud computing machine; and carrying out a compliance authentication according to a corresponding digital certificate when the cloud management host, the physical cloud computing host and the virtual cloud computing machine start up or are in the running process.
Zte Corporation

Device and system for controlling secure key access using an internet-connected key box device

A system for controlling key access using a phone and internet-connected key box device. The key box device hangs or mounts on a fixture and controls key access to visitors.

Blending enterprise content and web results

Web search results and enterprise search results are combined into a single presentation. A search query is received from a user associated with a tenant of an enterprise cloud computing platform.
Microsoft Technology Licensing, Llc

Secure migration of virtual machines from source to target and transfer of vm descriptor and keys between physical servers

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Reallocating resource capacity among resource pools in a cloud computing environment

In general, the embodiments of the present invention provide an approach for rebalancing/reallocating cloud resource capacities between resource pools that provide variable customer assurances and delivery penalties when assurances are not met. The variables that are considered hereunder include, overall ‘reservations’, total current capacity, remaining capacity against unused reservations and penalties that apply for failing to satisfy ‘reservation’ commitments.
International Business Machines Corporation

Granular permission assignment

A system and method for storing role definitions for cloud provider systems, receiving a first request to assign a user to a first role specifying a first cloud computing resource of a respective resource type, identifying a role definition corresponding to the first role that includes an action set permitted, and creating the first role for the user on the first cloud computing resource by associating the identified role definition with the first cloud computing resource and the user. A second request to assign the user to a second role is received specifying a second cloud computing of the respective resource type, and the second role is created for the user on the second cloud computing resource, where the identified role definition corresponds to the first and second roles, and wherein creating the second role includes associating the identified role definition with the first cloud computing resource and the user..
Red Hat, Inc.

System and communicating with retail customers with a sustainability standard

A cloud computing system and method for communicating product and source information with retail customers with a sustainability standard is disclosed. The system may include a server system with a processor system, a communications interface, a communications system, an input system and an output system, the server system having access to a communications network, a memory system with an operating system, a communications module, a web browser module, a web server application which communicates product and source information with retail customers with a sustainability standard using non-transitory storage media and a website with a plurality of web pages to track and communicate product and source information with retail customers with a sustainability standard..

Network transmitting data in a network system

A network system, and a method of use thereof, includes a first network subscriber arranged in an automation network of an automation system, a second network subscriber having a cloud computing infrastructure, and a communication unit for transmitting acquired data from the first network subscriber to the second network subscriber. The communication unit includes a first interface, which is configured as an input/output module and connected to the first network subscriber, and a second interface, which is configured as an agent and connected to the second network subscriber..
Siemens Aktiengesellschaft

Just-in-time access based on screening criteria to maintain control of restricted data in cloud computing environments

A jit service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for devops personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When jit access to a resource is requested by a devops device, the jit service retrieves a jit policy for the resource that includes screening criteria limiting automatic granting of jit access to devops personnel who meeting the screening criteria.
Microsoft Technology Licensing, Llc

Just-in-time access based on geolocation to maintain control of restricted data in cloud computing environments

A jit service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for devops personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When jit access to a resource is requested by a devops device, the jit service retrieves a jit policy for the resource that includes geolocation criteria limiting the geolocation from which jit access can be automatically granted.
Microsoft Technology Licensing, Llc

System and providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment

A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and trigger data is generated.
Intuit Inc.

Method and system of a cloud-based multipath routing protocol

In one aspect, a computerized system useful for implementing a cloud-based multipath routing protocol to an internet endpoint includes an edge device that provides an entry point into an entity's core network. The entity's core network includes a set of resources to be reliably accessed.

Cloud compute scheduling using a heuristic contention model

Technologies for contention-aware cloud compute scheduling include a number of compute nodes in a cloud computing cluster and a cloud controller. Each compute node collects performance data indicative of cache contention on the compute node, for example, cache misses per thousand instructions.
Intel Corporation

Supplementing network flow analysis with endpoint information

Techniques are disclosed for facilitating analysis of cloud activity. A cloud activity analysis agent may run within a virtual machine in a cloud computing environment to collecting information regarding computing activity within the virtual machine.
Ziften Technologies, Inc.

Secure provisioning of operating systems

Methods, media, and systems for secure provisioning of servers within a cloud computing environment are provided for herein. In some embodiments, a management service can delegate provisioning of a server of the cloud computing environment to an imaging service.
Microsoft Technology Licensing, Llc

Determination of data object exposure in cloud computing environments

Embodiments disclosed herein provide systems, methods, and computer readable media for indicating data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving information about a data object from the cloud computing environment.
Palo Alto Networks, Inc.

Methods and systems for facilitatng communications with storage

Cloud computing platforms having computer-readable media that perform methods for facilitating communications with storage. A request having a first-interface format to access storage is intercepted.
Microsoft Technology Licensing, Llc

Method and system for in-situ identification of working fluids

A system for in-situ identification of a working fluid disposed in at least one piece of equipment, the system including: a working fluid reservoir that contains the working fluid; an in-situ sensor disposed in the working fluid reservoir such that it detects properties of the working fluid or computes properties from the generated spectra of the working fluid; a transmitter that transmits the detected spectra of the working fluid and equipment identification information; and a cloud computing system that receives the detected spectra and the equipment identification information transmitted from the transmitter, wherein the cloud computing system compares the spectra and equipment identification information against a reference database to determine whether or not the spectra of the working fluid substantially matches the stored reference spectra associated with the expected or specified fluid for the equipment.. .
Exxonmobil Research And Engineering Company

System and confirmation of information

A system for information confirmation using a cloud computing platform to provide a service by which an individual's video recorded and fingerprint authenticated sworn affidavit or statement called a “confirmation” can be given upon request of another individual and stored in a third party service provider's cloud based vault for future retrieval in the case of any legal or other forms of action that may need to be taken in the future.. .

System and masking and computing on masked data in a data store

Various embodiments are disclosed for efficiently masking a data set using sparse associative array representations, such that various computations may be performed directly on the masked data set in a data store with low computational overhead. Some embodiments may include transforming a data set into a sparse associative array representation (e.g., a sparse matrix table or graph) and masking the various components of the sparse associative array representation (e.g., row keys, column keys, values) to generate a masked associative array representation using different masking schemes.
Massachusetts Institute Of Technology

Systems and methods for managing digital data in a fault tolerant matrix

Aspects of the present disclosure relate to systems and methods for automatic management of digital data volumes logically maintained in a dynamically scalable fault tolerant matrix. The data volumes may be distributed across a cluster of connected server nodes included in a cloud computing architecture.

Effective and efficient virtual machine template management for cloud environments

Techniques are provided for reducing the amount of data that to be transferred in a hybridcloud system in order to spawn a vm at a private cloud computing system from a template library stored in a public cloud computing system. Instead of storing full virtual machine templates, template libraries at the public cloud computing system are “differential” libraries.
Vmware, Inc.

Multi-level cloud computing system

A cloud computing system includes a physical resource pool that includes a number of information processing devices. Each information processing device includes a processor, a computer-readable medium, and a network interface.
Rackspace Us, Inc.

Quantum computing as a service

A cloud computing architecture and system for interaction with and use of quantum processing devices is presented. In one aspect, the invention comprises a unified platform as a service for interacting with various quantum processing devices.
Qc Ware Corp.

All-connected by virtual wires network of data processing nodes

Embodiments of the present disclosure generally relate to a cloud computing network and a method of transferring information among processing nodes in a cloud computing network. In one embodiment, a cloud computing network is disclosed herein.
Hgst Netherlands B.v.

Assessing a service offering in a networked computing environment

An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user.
International Business Machines Corporation

Secure electronic transaction

Computing systems, methods and tools for performing a secure electronic transaction between buyer and merchant. The transaction being able to be implemented without either party having to transmit confidential information between the parties of the transaction.
International Business Machines Corporation

Massively scalable object storage system

Several different embodiments of a massively scalable object storage system are described. The object storage system is particularly useful for storage in a cloud computing installation whereby shared servers provide resources, software, and data to computers and other devices on demand.
Rackspace Us, Inc.

Cloud-based platform instrumentation and monitoring system for maintenance of user-configured programs

Systems and methods for using instrumentation for maintaining user-configured programs in a cloud computing environment are herein disclosed as comprising, in an implementation, intercepting operation data pertaining to the user-configured program, including a start time, an execution time interval, and an origin of the operation, canonicalizing the intercepted operation data by stripping operation-specific variable data from the operation data, aggregating the canonicalized operation data based on the start time, the canonicalized operation data, and the origin of the operation, and storing the aggregated operation data within a time series database in the execution time interval based on the start time.. .
Servicenow, Inc.

On-demand mailbox synchronization and migration system

A system for managing physical and logical resources to provide on-demand synchronization or migration of mailboxes and their corresponding content. Physical resources are managed by automatically assigning mailbox processing tasks to either reserved computing resources, or computing resources dynamically obtained from cloud computing services.
Bittitan Inc.

Synchronization an interconnection network using parallel-headerless tdma routing

Embodiments of the present disclosure generally relate to a cloud computing network, or datacenter network, and a method of transferring information among processing nodes in a cloud computing network or datacenter. The network may include a hub that is coupled to a plurality of nodes so that data is transferred between nodes through the hub.
Hgst Netherlands B.v.

Event processing via industrial asset cloud computing system

Systems and methods are presented for receiving, at a server computer associated with an industrial asset cloud computing system, a command representing an event, from a mobile device of a plurality of mobile devices, the command comprising instructions for changing a data object in a data domain, determining, a command processor responsible for processing the command, and routing the command to the command processor responsible for processing the command, wherein the command processor accesses the data domain associated with the command to change the data object in the data domain according to the instructions of the command. Systems and methods are further presented for detecting, by the server computer, a state change in the data domain indicating that the data object has been changed, and preparing the changed data object to be consumed by mobile devices operated by users authorized to access the data object..

Message processing method and apparatus, and message processing system

A message processing method and apparatus on a cloud computing platform, and a message processing system on a cloud computing platform are provided. In the message processing method, after an input request message sent to an active server and a standby server is received, the input request message is sent to all active servers and standby servers.
Huawei Technologies Co., Ltd.

User abstracted rbac in a multi tenant environment

Role based access control (rbac) identity management tools, computing systems, computer products and methods of abstracting individual users from the role assignment and revalidation process of traditional rbac. The rbac tools, products and systems of the present disclosure organize and manage multi-tenanted networks and cloud computing environments by organizing individual users by service providers having a single or unified identity, which are separately managed by the service provider owners.
International Business Machines Corporation

Context sensitive security help

Embodiments of the present invention provide systems and methods for providing security in a computing environment. These systems and methods can be applied to cloud computing environments.
International Business Machines Corporation

System and providing key-encrypted storage in a cloud computing environment

System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads.
Micro Focus Software Inc.

Initial resource provisioning in cloud systems

A method of provisioning cloud-based applications includes receiving requests from computer systems to provision applications available in a cloud computing environment, assigning each of the computer systems to a first resource instance in the cloud computing environment such that the applications are executed for each of the plurality of computer systems on the first resource instance, monitoring usage of resources for each of the computer systems, grouping each of the computer systems into groups based on the usage of the resources, allocating a second resource instance, and reassigning computer systems in a first group from the first resource instance to the second resource instance.. .
Oracle International Corporation

System and providing virtual desktop extensions on a client desktop

The system and method described herein may identify one or more virtual desktop extensions available in a cloud computing environment and launch virtual machine instances to host the available virtual desktop extensions in the cloud. For example, a virtual desktop extension manager may receive a virtual desktop extension request from a client desktop and determine whether authentication credentials for the client desktop indicate that the client desktop has access to the requested virtual desktop extension.
Micro Focus Software Inc.

Policy engine for cloud platform

A policy engine is situated within the communications path of a cloud computing environment and a user of the cloud computing environment to comply with an organization's policies for deploying web applications in the cloud computing environment. The policy engine intercepts communications packets to the cloud computing environment from a user, such as a web application developer, for example, in preparation for deploying a web application in the cloud computing environment.
Pivotal Software, Inc.

System and streamlined registration and management of products over a communication network related thereto

The system and method of the present invention to provide at least one unique identification code (uid) registration center comprises of plural authorized parties' account. Each account comprises at least one product data file with uid, in which uid is associated with a product, to enable over at least one communication network (such as cloud computing), to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item, including ownership right related to the product transfer between each party, etc.

Monitoring cloud resource objects during deployment of a blueprint

Tools are provided to assist users of cloud computing systems to create, monitor, and debug the resource instances they need. Specifically, resource instances are created in a cloud computing system based on a blueprint that is provided to a blueprint processor.
Oracle International Corporation

Cloud computing system, vehicle cloud processing use therewith

A cloud computing system includes a network interface for interfacing with a wide area network. At least one wireless transceiver engages in bidirectional communication with a plurality of vehicle cloud processing devices within a corresponding plurality of vehicles in at least one vehicle aggregation location.
William Reber, Llc

Methods, systems, and computer readable media for performing image compression

Methods, systems, and computer readable media for performing image compression are disclosed. According to one exemplary method, the method includes identifying a canonical image set from a plurality of images uploaded to or existing on a cloud computing and/or a storage environment.
The University Of North Carolina At Chapel Hill

Device enrollment in a cloud service using an authenticated application

In various example embodiments, systems and methods for administering machine access to a cloud service are presented. An edge manager device in a cloud computing environment can establish a first client for a first application that is executed externally to the cloud computing environment.
General Electric Company

Method and system for identity-based authentication of virtual machines

A cloud computing system configured to run virtual machine instances is disclosed. The cloud computing system assigns an identity to each virtual machine instance.
Rackspace Us, Inc.

Self-terminating or self-shelving virtual machines and workloads

Methods comprise receiving a request to perform a predefined operation on at least one of a virtual machine and a workload executing on a host in a first cloud computing environment, identifying a set of credentials to access the first cloud computing environment, and initiating performance of the predefined operation on the at least one of the virtual machine and the workload, wherein the predefined operation comprises at least one of: (i) deleting, and (ii) shelving the at least one of the virtual machine and the workload.. .
International Business Machines Corporation

Self-terminating or self-shelving virtual machines and workloads

Systems and computer program products to perform an operation comprising receiving a request to perform a predefined operation on at least one of a virtual machine and a workload executing on a host in a first cloud computing environment, identifying a set of credentials to access the first cloud computing environment, and initiating performance of the predefined operation on the at least one of the virtual machine and the workload, wherein the predefined operation comprises at least one of: (i) deleting, and (ii) shelving the at least one of the virtual machine and the workload.. .
International Business Machines Corporation

Cloud computing simulator

A method for simulating a virtual computing environment includes specifying one or more flavors of resource consumers and one or more flavors of datastores to be provisioned on a tree of hosts for a simulation of a distributed virtualization scheduler. The method also includes generating a tree of hosts for the resource consumers and datastores based on the specified flavors and using a tree generator component of the distributed virtualization scheduler.
Vmware, Inc.

Method and enabling agile development of services in cloud computing and traditional environments

Prepending a name object or setting a type of a software object to a name and prepending a value object to the software object provides inheritance of a name value pattern by the software object to establish particular types or classes of attributes of the software object without modification of the software object itself that is thus strongly typed and accessible by type.. .
International Business Machines Corporation

Federated collaborative medical records system utilizing cloud computing network and methods

A cloud-based, federated collaborative medical records system and methods, in the preferred embodiments, features a variety of mechanisms to enable end users to store, access, edit, and share health information, on demand. A key aspect of said embodiments involves the circumvention of barriers preventing the transfer of health information placed upon other electronic medical records systems and related systems preventing users who are not part of a specific business entity from accessing the records.
Chrysanthemum Breeders Association Research B. V.

Cloud computing managing storage resources therein

A cloud computing system and a method therein. The cloud computing system includes: a resource server cluster, where the resource server cluster includes at least two resource servers, each resource server in the resource server cluster has at least one type of resources of computing resources and storage resources, and at least one resource server in the resource server cluster has computing resources and storage resources; a computing resource management module configured to manage the computing resources in the resource server cluster, so as to provide a virtual computing service; and a storage resource management module configured to manage a shared storage resource pool established using the storage resources in the resource server cluster, so as to provide a virtual storage service, where storage resources included in each storage resource pool are from at least two resource servers in the resource server cluster..
Huawei Technologies Co., Ltd.

Call processing method and control apparatus, automatic call distribution apparatus, and agent terminal

Embodiments of the present invention provide a call processing method and control apparatus, an automatic call distribution apparatus, and an agent terminal. The call processing method, which executed by the call control apparatus, includes: receiving, a processing request for a call, and extracting a media connection address and a media capability of an automatic call distribution apparatus; performing, media negotiation based on a media capability of an agent terminal and the automatic call distribution apparatus; and establishing, a media session between the agent terminal and the automatic call distribution apparatus according to a media connection address of the agent terminal, the media connection address of the automatic call distribution apparatus, and a media negotiation result.
Huawei Technologies Co., Ltd.

Monitoring element hierarchies in a cloud computing system

An example method of monitoring elements in a cloud computing system includes partitioning, an address space of a hierarchy of service elements into a plurality of address subspaces managed by a respective plurality of processing nodes. The method further includes receiving time series data from a service element, routing the time series data to a first processing node based on an address of the service element within the hierarchy, and processing the time series data at the first processing node to update metric data maintained for the service element.
Vmware, Inc.

Pre-cloud data protection

The present disclosure includes a method comprising encrypting sensitive data, generating a token comprising a data identifier, tokenizing the encrypted sensitive data, and/or storing the encrypted sensitive data in association with the token to a token vault. Tokenizing may comprise mapping the encrypted sensitive data to the token.
American Express Travel Related Services Company, Inc.

Cloud wan overlay network

A network device obtains credentials of a customer associated with multiple different cloud providers of which the customer is a subscriber, and establishes, using the credentials of the customer, a cloud wide area network (wan) overlay network across multiple different cloud computing networks associated with the multiple different cloud providers. The network device, when establishing the cloud wan overlay network, spins up multiple virtual routers in the cloud resources of the customer at each of the multiple different cloud computing networks, with a different one of the multiple virtual routers being spun up in each of the multiple different cloud computing networks, where each of the multiple different cloud computing networks is associated with a different one of the multiple different cloud providers, and where the multiple virtual routers route data traffic between the different cloud computing networks via the cloud wan overlay network..
Verizon Patent And Licensing Inc.

System and managing virtual hard disks in cloud environments

A system, method, and computer-readable storage medium for managing virtual hard disks in a cloud computing/storage environment are provided. The method includes associating, using a virtual hard disk (vhd) management system of a server device, a plurality of data blocks of a virtual hard disk stored at a cloud vendor to a corresponding plurality of cloud objects.
Ca, Inc.

Secured home network

Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and intended for a destination device of the home network, the destination device comprising a security client. The malware detection logic may establish a secure communication channel between the malware detection logic of the secured device and the security client of the destination device.
Nagravision S.a.

Cloud computing gateway, cloud computing hypervisor, and methods for implementing same

Embodiments of the present invention provide a cloud gateway system, a cloud hypervisor system, and methods for implementing same. The cloud gateway system extends the security, manageability, and quality of service membrane of a corporate enterprise network into cloud infrastructure provider networks, enabling cloud infrastructure to be interfaced as if it were on the enterprise network.
Servicemesh, Inc.

Method, apparatus, and system for implementing software-defined network sdn

This application discloses a method for implementing a software-defined network (sdn), including: receiving, by an sdn controller, virtual network information sent by a cloud computing platform, where the virtual network information includes a correspondence between information about a virtual machine (vm) and information about a server running the vm. The method also includes acquiring, by the sdn controller, physical network information, where the physical network information includes a correspondence between information about a top-of-rack (tor) switch and the information about the server.
Huawei Technologies Co., Ltd.

System and enabling end-user license enforcement of isv applications in a hybrid cloud system

System and computer-implemented method for enabling end-user license enforcement of an application in a hybrid cloud system use data associated with at least one component of a public cloud computing environment of the hybrid cloud system to detect an environment-changing event involving at least one processing entity in the hybrid cloud system. Once the environment-changing event is detected, one or more operating environment identifiers are injected into the processing entity.
Vmware, Inc.

Property models on mobile devices

A method for synchronizing business data in a networked or cloud computing arrangement between a model-based business application server and a client-side computing device, which can operate in either online or offline modes, involves providing, on the client-side computing device, a copy of a property model used on the server-side by the application server to process business data. The method further includes, when the client-side computing device is offline, processing locally stored business data on the client-side computing device with reference to the copy of the property model, and later, when the client-side computing device comes online, synchronizing the locally stored business data on the client-side computing device and business data stored on the application server side..
Sap Se

Techniques for communication in hybrid cloud system

Techniques for communication in a hybrid cloud computing system. The techniques include utilizing cross-origin resource sharing to allow a web-based application to communicate with both a public host computer and a private host computer of the hybrid cloud computing system.
Vmware, Inc.

Extensible support system for service offerings

Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for implementing an extensible support system for multiple service offerings.
International Business Machines Corporation

Dynamic/on-demand packaging as part of deployment

A cloud declarative language is used to configure and reconfigure cloud computing environments. The language includes physical and logical topology declarations as well as cloud operations commands, and allows users to declare commands at multiple topology hierarchies.
Microsoft Technology Licensing, Llc

Packaging tool for first and third party component deployment

A cloud declarative language is used to configure and reconfigure cloud computing environments. The language includes physical and logical topology declarations as well as cloud operations commands, and allows users to declare commands at multiple topology hierarchies.
Microsoft Technology Licensing, Llc

End-to-end automated servicing model for cloud computing platforms

The application is directed to a cloud computing platform. The cloud computing platform includes a memory having instructions stored thereon for managing updates the cloud computing platform.
Microsoft Technology Licensing, Llc

Systems and methods for securely provisioning the geographic location of physical infrastructure elements in cloud computing environments

Systems and methods relating to improved security in cloud computing environments are disclosed. According to one illustrative implementation, a method for provisioning physical geographic location of a physical infrastructure device associated with a hypervisor host is provided.
Virtustream Ip Holding Company Llc

System and real-time processing of medical imaging raw data using cloud computing

The present invention relates to a system and apparatus for managing and processing raw medical imaging data.. .
The United States Of America, As Represented By The Secretary, Dept. Of Health And Human Services

Using images of a monitored scene to identify windows

A camera system includes memory, image sensors, illuminators, and a processor. The processor operates the illuminators and the image sensors in a first mode to capture a two-dimensional image of the scene using light transmitted by the illuminators and reflected from the scene.
Google Inc.

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Method of detecting attacks in a cloud computing architecture

A method and a detection entity for detecting attacks in a system including at least two host servers. Each host server hosts a set of virtual machines.
Orange

Managing user privileges for computer resources in a networked computing environment

Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed.
International Business Machines Corporation

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Discovering and publishing device changes in a cloud environment

A method for discovering and publishing device changes in a cloud computing environment. The method includes scanning, by a processor, a computing environment to detect a multiple computing elements.
International Business Machines Corporation

Migration assessment for cloud computing platforms

Various embodiments provide an assessment tool that enables an automated functional assessment of applications for migration to target cloud computing platforms, such as a platform as a service (paas). The technical capabilities of various types of applications in a traditional non-platform deployment are studied and support for these technical capabilities is evaluated relative to the target platform..
Accenture Global Services Limited

Location based trusted computing nodes in a cloud computing architecture

The invention discloses trusted computing nodes (tcns) configured to control their location and migration of applications run on virtual machines resident thereon. The invention allows a controlled use of cloud computing resources and virtual network functions by sensitive applications.
France Brevets

Method for determining parking spaces and free-parking space assistance system

A method for determining parking spaces, traffic participants ascertaining information about free parking spaces and communicating the information to a cloud computing system, the cloud computing system storing information about the free parking spaces in retrievable fashion in a parking space map, information about the provided parking space being visually presented on a display device of the traffic participant. A computer program and a free parking space assistance system, which are suitable in particular for carrying out the method, are also provided..
Robert Bosch Gmbh

Cloud computing operating system and method

A cloud computing operating system is described. The system, in one aspect, includes a plurality of code encapsulating data structures each configured to define executable code and to define the structure of one or more encapsulating data structures.
Disos Pty Ltd., C/o W.f. Titchener & Co. Pty. Ltd.

System and a multi-tenant datacenter with layer 2 cloud interconnection

Provided is a system and method for a multi-tenant datacenter with layer 2 cloud interconnection. More specifically the multi-tenant datacenter includes a plurality of client systems in a first datacenter each client system having a set of physical infrastructure resources.

Ontology based resource provisioning and management for services

Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services.

Controlled transfer of data over an elastic network

Controlled transfer of data over an elastic network is provided and includes analyzing properties of a set of data for transfer from a source storage location to a target storage location across an elastic cloud computing network as part of a staged transfer of the set of data, assigning transfer queue weightings to data subsets of the set of data based on weighting parameters, the transfer queue weightings dictating order of transfer of the data subsets from the source storage location to the target storage location, and controlling transfer of the data subsets from the source storage location to the target storage location consistent with the transfer queue weightings assigned to the data subsets, the controlling transfer including controlling, based on costs to transfer the data subsets, bandwidth allocation of the elastic cloud computing network and a transfer schedule for the data subsets.. .

Dynamic configuration of network features

Dynamic configuration of network features is provided by performing real-time traffic analysis on network traffic flowing between an elastic cloud computing network and an edge appliance, evaluating effects of modifying elastic network bandwidth allocation and applying network traffic optimizations in routing traffic flowing between the elastic cloud computing network and the edge appliance, and dynamically configuring, based on the real-time traffic analysis and on the evaluating, one or more of (i) elastic network bandwidth allocation from the network service provider or (ii) at least one of the network traffic optimizations for performance by the edge appliance in routing traffic flowing between the elastic cloud computing network and the edge appliance.. .

System and a multi-tenant datacenter with layer 2 cloud interconnection

Provided is a system and method for a multi-tenant datacenter with layer 2 cloud interconnection. More specifically the multi-tenant datacenter includes a plurality of client systems in a first datacenter each client system having a set of physical infrastructure resources.

Precondition exclusivity mapping of tasks to computational locations

Computational tasks are mapped with computational locations in a distributed system such as a cloud computing environment. Mapping does not rely on workload estimates.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.

Policy-based virtual machine selection during an optimization cycle

Systems, methods, and computer program products configured to perform an operation comprising determining that use of a system resource of a first host system exceeds a threshold, wherein the first host system executes a plurality of virtual machines in a cloud computing environment, identifying a first virtual machine, of the plurality of virtual machines, for migration based on a first migration policy, of a plurality of migration policies, wherein the plurality of migration policies specify a respective set of rules for identifying virtual machines for migration, and migrating the first virtual machine to a second host system in the cloud computing environment to reduce the use of the system resource on the first host system.. .

Method and processing alarm information in cloud computing

Disclosed are a method and an apparatus for processing alarm information in a cloud computing. The method includes: establishing a corresponding relation between services and physical resources of nodes at all levels, wherein the physical resources relied on for executing the services; and generating aggregated alarm information based on the corresponding relation between the services and the physical resources when a physical resource or a service gives alarms..
Lecloud Computing Co., Ltd.

Method and system for utilizing spare cloud resources

A cloud computing system including a computing device configured to run virtual machine instances is disclosed. The computing device includes a hypervisor program for managing the virtual machine instances.
Rackspace Us, Inc.

Deploying an application in a multiple cloud computing environments

An example method is provided to deploy an application in multiple cloud computing environments. The method may comprise a computing system generating a first request to deploy an application in a first cloud computing environment according to a first deployment plan and a second request to deploy the application in a second cloud computing environment according to a second deployment plan.
Vmware, Inc.

Maintaining control over restricted data during deployment to cloud computing environments

Releases to the production environment of a cloud computing environment are deployed in a manner that maintains control over restricted data and the data plane of the cloud computing environment. A devops personnel is tasked with developing the release.
Microsoft Technology Licensing, Llc

Virtual machine compliance checking in cloud environments

A method of transferring a virtual machine between a virtualized computing system and a cloud computing system includes determining that a virtual machine is to be transferred from a virtualized computing system to a cloud computing system and determining a connection between a first resource in the virtualized computing system and a second resource in the cloud computing system. Files that enable implementation of the virtual machine at the virtualized computing system and identified, as are file portions of the files for transfer from the virtualized computing system to the cloud computing system.
Vmware, Inc.

Protecting from unintentional malware download

Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application.
International Business Machines Corporation

Incident management to maintain control of restricted data in cloud computing environments

Techniques allow devops personnel to perform incident management for cloud computing environments in a manner that maintains control over restricted data and the data plane. The devops personnel do not have access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data.
Microsoft Technology Licensing, Llc

Deploying an application in a hybrid cloud computing environment

An example method is provided for a computing system in a private cloud computing environment to deploy an application in a hybrid cloud computing environment. The method may comprise generating a request to deploy an application in a public cloud environment, the request including a deployment plan that specifies one or more tasks to be executed by a virtual computing resource from a cloud provider to deploy the application.
Vmware, Inc.

Using discovered virtual-infrastructure attributes to automatically generate a service-catalog entry

A method and associated system of automatically generating an entry of a service catalog of a cloud-computing environment as a function of discovered attributes of a virtual machine provisioned in a non-cloud computing environment. A cloud-management platform of the cloud-computing environment analyzes and compares results of infrastructure-discovery and application-discovery tools that describe a business application or a virtual service provisioned on the virtual machine.
International Business Machines Corporation

System and a cloud computing abstraction with self-service portal for publishing resources

In embodiments of the present invention, improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload.. .
Csc Agility Platform, Inc.

Message broadcasting in a clustered computing environment

Approaches are provided for message broadcasting within a clustered computing environment such as a cloud computing environment. Specifically, a message received from message queue (e.g., on a message queue server) is processed at a single node of a plurality of nodes within the clustered computing environment.
International Business Machines Corporation

Dynamic resources planning mechanism based on cloud computing and smart device

A dynamic resource management method for remote management of resources of resources devices by a cloud server is provided. The method includes: detecting resource-using-statuses of the resource devices to generate using-load parameters for the resources devices according to the resource-using-statuses of the resources devices by control devices installed on the resources devices; timely collecting, by the cloud server, the using-load parameters for the resources devices outputted by the control devices via a network; and upon receiving a using request corresponding to the resources devices from at least one smart device, performing, by the cloud server, a comparison according to the using-load parameters for the resources devices and the using request and performing resource using distribution on the resources devices to obtain resource-use planning based on the comparison result, thereby controlling the operation of the resource devices and replying to the using request of the smart device..
Quanta Computer Inc.

Cloud computing service architecture

A service control system manages a set of containers operating within one or more computing hosts. Containers may access a consistent runtime environment regardless which cloud provider the computing hosts come from.
Rancher Labs, Inc.

Method for monitoring the security of a virtual machine in a cloud computing architecture

One embodiment relates to a method for monitoring the security of a virtual machine hosted by a host system, the virtual machine comprising an operating system communicating with a hypervisor of the host system. The hypervisor interfaces between the operating system and hardware resources of the host system.
Orange

Methods and apparatus to control a virtual machine

Methods and apparatus, to control a virtual machine, include: sending identification of virtual machines within a recovery domain, receiving a request to control one the virtual machines, authorizing the request, and forwarding the request to a virtual machine manager of the one of the virtual machines. Other methods and apparatus, to control a virtual machine, include: sending a request for identification of virtual machines within a recovery domain directly to a cloud computing device without passing the request through another computing device, determining that one of the virtual machines needs to be controlled, and sending a request to control the one of the virtual machines directly to the cloud computing device without passing the request through another computing device..
Nokia Solutions And Networks Oy

Establishing trust within a cloud computing system

A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a common aspect, and a plurality of authentication servers, where an authentication server is associated with one of the plurality of sets of devices based on the common aspect. The cloud computing system functions to establish trust between a corresponding one of the plurality of authentication servers and the one or more devices of one of the plurality of sets of devices, between the corresponding one of the plurality of authentication servers and the cloud system managing unit, and between the cloud system managing unit and the one or more devices.
International Business Machines Corporation

Network resource balancing method and apparatus

A network balancing method and apparatus, where the method includes obtaining, by a processor in a cloud computing platform, identifier information of a virtual machine and identifier information of a domain including virtual machines that are sent by a controller in the cloud computing platform, where a correspondence exists between the identifier information of the virtual machine and the identifier information of the domain including the virtual machines, and after receiving an access request packet, determining, by the processor, the virtual machines in the domain according to the identifier information of the domain in the access request packet, further selecting a virtual machine according to load information of the virtual machines in the domain, and sending the access request packet to the selected virtual machine.. .
Huawei Technologies Co., Ltd.

Service elastic method and apparatus in cloud computing

A service-based elastic method in a cloud environment includes detecting, an elastic event that occurs in running of a service, determining, a node that needs to be elastic and corresponds to the elastic event, determining, according to an identifier of the node that needs to be elastic, a service topology diagram of the service, and an elastic method identifier of the service in a cloud service archive, a connection relationship that needs to be established, and creating and running the newly added node instance according to information of the node that needs to be elastic in the cloud service archive and the connection relationship. The present disclosure, running of a service can be optimized more effectively..
Huawei Technologies Co., Ltd.

Control architecture including a programmable logic controller and a cloud computing system

A control architecture includes at least one programmable logic controller and at least one cloud computing system. An automation program of the controller includes at least one predefined control module.
Schneider Electric Industries Sas

Monitoring cloud computing environments

An example method of monitoring computing resources in a cloud computing environment may include receiving a request to subscribe to a monitoring service with respect to computing resources associated with a user account, the request specifying access information for a cloud computing system comprising a plurality of virtual machines associated with the computing resources. The method may further include monitoring, using the access information, the plurality of virtual machines.
Red Hat, Inc.

Efficient communication within hybrid cloud system

Techniques for communicating between service nodes within a hybrid cloud computing system. These techniques include utilizing a messaging provider within an off-premise computing system to pass messages between off-premise servers holding a connection to an on-premise computer system and off-premise servers holding a connection to an end user computer system..
Vmware, Inc.

System and building, optimizing, and enforcing infrastructure on a cloud based computing environment

A method for building, optimizing, and maintaining a computing infrastructure on a cloud computing environment is provided. A user provides a high-level declaration to a cloud environment operating system, specifying the details of the infrastructure that is intended to be built on the cloud.
Fugue, Inc.

Method and deploying industrial plant simulators using cloud computing technologies

A system and method for operating a remote plant simulation system is disclosed. The system and method uses a light application at the plant to collect relevant data and communicate it to a remote plant simulation.
Emerson Process Management Power & Water Solutions, Inc.

Automatic virtual machine termination in a cloud

Managing a cloud computing environment including a plurality of resources adapted to host at least one virtual machine includes, in a virtual machine, determining a period of inactivity of the operating system for a user of the virtual machine and comparing, using a processor, the period with a defined threshold. From the virtual machine, a virtual machine termination request is sent to the cloud computing environment responsive to the period exceeding the defined threshold..
International Business Machines Corporation

Public cloud system and public resource allocation method

A management center, coupled to a plurality of data centers, which can be included in an open or public cloud computing system. The management center includes a monitoring unit and an allocation unit coupled to the monitoring unit.
Hon Hai Precision Industry Co., Ltd.

Faster ip address allocation in a hybrid cloud environment using subnet selective randomization

Multiple tenants within a hybrid cloud computing system may need ip addresses to communicate over a computer network external to the hybrid cloud system (such as the internet). Ip addresses are a scarce resource, and each address can only be assigned to a single tenant.
Vmware, Inc.

Cloud-based services exchange

In general, a cloud-based services exchange (or “cloud exchange”) for interconnecting multiple cloud service providers with multiple cloud service customers is described. The cloud exchange may enable cloud customers to bypass the public internet to directly connect to cloud services providers so as to improve performance, reduce costs, increase the security and privacy of the connections, and leverage cloud computing for additional applications.
Equinix, Inc.

System and improving integration testing in a cloud computing environment

A system and method for improving integration testing in a cloud computing environment includes collecting one or more input parameters associated with each of one or more products, deployed in cloud computing environment, from one or more external resources and test management systems. The input parameters include one or more defect parameters, user requirements, test parameters or performance parameters associated with the product.
Wipro Limited

Displaying interactive topology maps of cloud computing resources

Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view visualizations using an application platform referred to herein as a cloud computing management application.
Splunk Inc.

Resource planning system for cloud computing

A resource planning system is disclosed for planning reserved instance server requirements for a user of cloud computing services that comprise reserved instance servers and on-demand servers accessible by the user. The system is arranged to receive historical usage data indicative of a historical usage of the cloud computing services by a user, the historical usage data covering a defined time period including a plurality of time units, and the historical usage data including information indicative of a number of server instances that were required by the user in each time unit of the time period.
Singapore Telecommunications Limited

System and automating data generation and data management for a next generation sequencer

A web-based server/cloud computing system for a next generation sequencer (ngs) to integrate data generation, data analysis and data management. When a user intends to sequence a biological sample, the user is asked to login to the ngsinform, select and submits sets of software analysis bioinformatics programs, which schedules the sequencing, quality control, data analysis and management of that data, all done simultaneously and sequentially.
Yotta Biomed, Llc.

Method, system and computer program for cloud based computing clusters for simulated operator training systems

The present invention provides methods, systems and computer programs for implementing a simulation based operator training system on a cloud computing cluster. The invention receives information identifying one or more parameters of an operator training simulation, and retrieves virtual machine (vm) images corresponding to a master vm, operator vm and instructor vm.
Yokogawa Electric Corporation

Security allocation of virtual machines in a cloud computing network

A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a security-aware fashion. The invention solves the cloud user risk problem by inducing a state such that, unless there is a change in the conditions under which the present invention operates, the cloud users do not gain by deviating from the allocation induced by the present invention.
Government Of The United States As Represetned By The Secretary Of The Air Force

Generating and displaying topology map time-lapses of cloud computing resources

Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view visualizations using an application platform referred to herein as a cloud computing management application.
Splunk Inc.

Support to customer platform system, method, and server

The disclosure provides a support to customer platform system, method, and server to serve as a marketing service platform providing various channel functions including sales, planning, technical support, maintenance, and customer management and perform an interactive support service with internet protocol (ip) connected devices based on cloud computing. Accordingly, a vendor may realize a comprehensive support service by applying the embodiments of the disclosure without complicated professional training..
Ruby Tech Corporation

System, method, article of manufacture of mixed reality based, biometrically signed reusable physical financial instrument

The present invention relates to a reusable physical financial instrument and a system and a method for enabling the financial instrument to perform multiple financial transactions. The financial instrument is capable of creating mixed reality experience when it comes in vicinity of the payor or payee device or atm.
Tata Consultancy Services Limited

High-performance computing framework for cloud computing environments

Disclosed are various embodiments for a high-performance computing framework for cloud computing environments. A parallel computing application executable by at least one computing device of the cloud computing environment can call a message passing interface (mpi) to cause a first one of a plurality of virtual machines (vms) of a cloud computing environment to store a message in a queue storage of the cloud computing environment, wherein a second one of the plurality of virtual machines (vms) is configured to poll the queue storage of the cloud computing environment to access the message and perform a processing of data associated with the message.
Georgia State University Research Foundation, Inc.

Method and system for crowd-sourced algorithm development

A system for development of an algorithm for analysis of sensor data includes one or more wearable sensor devices, a smart device, and a cloud computing platform. The sensors in the wearable sensor device produce sensor data (e.g., physiological data) from a user that can be processed by a software algorithm in the wearable sensor device or by a connected smart device (e.g., a smartphone) via cloud computing, producing an algorithm output.
Mc10, Inc.

Methods and systems for multirobotic management

Multirobotic management can involve communications between a command or leader robot and one or more client or follower robots through a cloud computing system. In an example implementation, a leader robot can receive first sensory data captured by a first follower robot and second sensory data captured by a second follower robot, determine a command function based on at least one of the first sensory data and the second sensory data, and communicate with at least one of the first follower robot and the second follower robot based on the command function..
X Development Llc

Flow imaging and monitoring for synchronized management of wide area drainage

A flow imaging and monitoring system for synchronized management of wide area drainage that includes an interposer for supporting monitoring and management equipment in a manhole, a module for illuminating water flowing in pipes at the base of the manhole, a module for monitoring responses to reflected light, a sealed and rechargeable battery pack, and a data analysis and management system to interpret data streams in real time. The interposer can be adjusted to fit the diameter of the manhole and can be adjusted to be placed under the manhole cover.
Urbanalta Corp

Cloud image renderer

Cloud image rendering may be provided. First, a first request for a multi-layered image may be received.
Cisco Technology, Inc.

Method and detecting security anomalies in a public cloud environment using network activity monitoring, application profiling and self-building host mapping

The disclosed computer-implemented method for detecting security anomalies in a public cloud environment using network activity monitoring, application profiling, and self-building host mapping may include (1) collecting host information that identifies (a) at least one communication channel that has previously facilitated communication between at least one host computing platform within a cloud computing environment and at least one additional computing platform and/or (b) at least one application that has previously run on the host computing platform, (2) monitoring network traffic involving the host computing platform, (3) detecting, while monitoring the network traffic, network activity that is inconsistent with the collected host information, and then (4) determining that the detected network activity represents a potential security threat within the cloud computing environment due at least in part to the detected network activity being inconsistent with the collected host information. Various other methods, systems, and computer-readable media are also disclosed..
Symantec Corporation

Type-to-type analysis for cloud computing technical components with translation through a reference type

Cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge.
Accenture Global Services Limited

Type-to-type analysis for cloud computing technical components with translation scripts

Cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge.
Accenture Global Services Limited

Distributed neural networks for scalable real-time analytics

Techniques related to implementing distributed neural networks for data analytics are discussed. Such techniques may include generating sensor data at a device including a sensor, implementing one or more lower level convolutional neural network layers at the device, optionally implementing one or more additional lower level convolutional neural network layers at another device such as a gateway, and generating a neural network output label at a computing resource such as a cloud computing resource based on optionally implementing one or more additional lower level convolutional neural network layers and at least implementing a fully connected portion of the neural network..
Intel Corporation

Acquiring information dynamically regarding a hardware component in the cloud computing system while on the floor of the data center

A method, system and computer program product for managing hardware components in a cloud computing environment. A mobile device captures an image of a bar code placed on a rack that is associated with an identifier that references an internet resource of the management software that manages the rack.
International Business Machines Corporation

Predictively provisioning cloud computing resources for virtual machines

Methods, computer program products, and systems are presented. The methods include, for instance: predictively provisioning, by one or more processor, cloud computing resources of a cloud computing environment for at least one virtual machine; and initializing, by the one or more processor, the at least one virtual machine with the provisioned cloud computing resources of the cloud computing environment.
International Business Machines Corporation

Mechanism and constraint based fine-grained cloud resource controls

A method implemented in a network element (ne) configured to operate as a rest server, the method comprising receiving, through a receiver, a constraint from a rest client, wherein the constraint relates an independent control variable to a derived control variable, wherein the derived control variable is mapped to a first cloud computing resource employed by a cloud computing implementation; receiving, through the receiver, an independent value for the independent control variable from the rest client; computing, via a processor coupled to the receiver, a derived value for the derived control variable based on the constraint and the value for the independent control variable; determining, via a processor, a first instruction regarding the first cloud computing resource based on the derived value; and altering, via a resource controller coupled to the processor, one of a plurality of first behaviors of the first cloud computing resource based on the first instruction.. .
Futurewei Technologies, Inc.

Method to configure network bonds as a port on an integration bridge for a virtualized multilayer switch

Techniques are disclosed for configuring a physical computing system (e.g., in a cloud computing network) to connect a network bond with a virtual multilayer switch. An operating system process executing in the physical computing system receives a selection of one or more network interfaces.
International Business Machines Corporation

Method to configure network bonds as a port on an integration bridge for a virtualized multilayer switch

Techniques are disclosed for configuring a physical computing system (e.g., in a cloud computing network) to connect a network bond with a virtual multilayer switch. An operating system process executing in the physical computing system receives a selection of one or more network interfaces.
International Business Machines Corporation

Personal cloud case cover with a plurality of modular capabilities

A personal cloud contained in a case for a portable computing device such as a tablet personal computer (pc), mobile phones, portable media players, or the like. The personal cloud case may be fitted with memory, a network connection, two-way wireless charging, external memory slots, external connections and other components for portable personal cloud computing..
Micro Mobio Corporation

Action execution architecture for virtualized technical components

Cloud computing technical components are provisioned into many different service platforms provided by many different service providers. Once provisioned, it is often the case that actions need to be performed against the technical components.
Accenture Global Services Limited

Secure virtual network platform for enterprise hybrid cloud computing environments

Clusters of virtual network switches (vns) and controllers are provided. The controller cluster is connected to the vns cluster which is between first and second network domains.
Zentera Systems, Inc.

Fair decentralized throttling in distributed cloud-based systems

A cloud availability manager configured to execute a recovery workflow that fails over one or more virtual machines (vms) to and from a cloud computing system. In doing so, the cloud availability manager typically performs multiple operations for each vms.
Vmware, Inc.

Linking instances within a cloud computing environment

Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (gui or the like), and associated with a set of rules.
International Business Machines Corporation

Resource exchange service transaction for cloud computing

A method, a computer program product, and a computer system for exchanging cloud resources between tenants. A mediator system receives from a user a request for a cloud resource, aggregates the cloud resource from one or more of the tenants, and replies the request for a cloud resource with a description of the cloud resource.
International Business Machines Corporation

Enterprise connectivity to the hybrid cloud

A cloud computing system retrieves routing entries associated with a particular tenant of the cloud computing system and are a subset of a routing table of the entire cloud computing system. The routing entries are loaded into a networking switch, which is configured to route network packets using the loaded subset of routing entries, using a general-purpose processor rather than a costly dedicated asic..
Vmware, Inc.

Routing optimization for inter-cloud connectivity

A cloud computing system may include multiple cloud data centers. A gateway may establish connections between a cloud providers' multiple data centers using knowledge about the types of applications workloads executing within the cloud computing system, and may be further based on determines policies indicating priorities for routing traffic for the application workloads..
Vmware, Inc.

Multi-spoke connectivity of private data centers to the cloud

A hybrid computing system includes an on-premise data center and a cloud computing system. To connect between an organization's multiple data centers, a gateway may instead utilize the connections between the private data center and the cloud computing system rather than a direct connection to the other of the organizations' data centers..
Vmware, Inc.

Framework for provisioning network services in cloud computing environment

This disclosure relates generally to provisioning network services in a cloud computing environment, and more particularly to framework for provisioning network services in a heterogeneous cloud computing environment. In one embodiment, the disclosure includes a network as a service (naas) layer under a cloud provisioning platform.
Tata Consultancy Services Limited

Optimizing connectivity between data centers in a hybrid cloud computing system

Connectivity between data centers in a hybrid cloud system having a first data center managed by a first organization and a second data center managed by a second organization, the first organization being a tenant in the second data center, is optimized. According to the described technique, a path-optimized connection is established through a wide area network (wan) between a first gateway of a first data center and a second gateway of a second data center for an application executing in the first data center based on performance of paths across a set of internet protocol (ip) flows.
Vmware, Inc.

Quantitative metrics for assessing status of a platform architecture for cloud computing

An architecture for realizing a customer system on a cloud computing platform is defined in terms of a plurality of architecture types, each type (at) defined by plural architecture type units (atus), each atu comprising a set of atu details. The atu details are ordered into a series of discrete stages.
Salesforce.com, Inc.

System, method, and data access in a cloud computing environment

A data access method in a cloud computing environment is disclosed. The method may comprise, in a service object space of the cloud computing environment, receiving a request of a user for accessing a data package, the request including a user identification, determining a service object space of the data package corresponding to the request, and providing the data package to the user according to the service object space of the data package and the user identification..
Alibaba Group Holding Limited

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.
International Business Machines Corporation

Hybrid task framework

Techniques for executing jobs in a hybrid cloud computing system. A job defines multiple states and tasks for transitioning between states.
Vmware, Inc.

Hybrid infrastructure provisioning framework tethering remote datacenters

Techniques are disclosed for deploying and maintaining appliances in a hybrid cloud computing system which includes an on-premise data center and a public cloud computing system configured to provide a common platform for managing and executing virtual workloads. Appliances to be deployed may include those required (or useful) for hybrid operations, including a cloud gateway appliance, a wide area network (wan) optimizer, a layer 2 (l2) concentrator, and a mobility agent that handles virtual machine (vm) migration traffic.
Vmware, Inc.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.
International Business Machines Corporation

Wireless intelligent ultrasound fetal imaging system

A wireless intelligent ultrasound fetal imaging system includes an ultrasound transducer, an ultrasound afe module, a zynq module, a machine vision module and a mobile terminal. The ultrasound transducer transmits ultrasound wave toward a pregnant mother's fetal, and receives echo wave from the fetal.
Aningbo Youchang Ultrasonic Technology Co.,ltd

Method, apparatus and system pertaining to cloud computing

The present disclosure outlines a system, method, and apparatus for the design of network services, including the automatic sourcing an aggregatng of data on the available resources. In a further aspect, the present disclosure outlines a system, method, and apparatus for the allocation of cloud resources.
Anuta Networks, Inc.

System, method, and software for providing access control enforcement capabilities in cloud computing systems

According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager.
Ca, Inc.

Allocation of cloud computing resources

The invention concerns a method, arrangement (26), computer program and a computer program product for allocating physical cloud computing resources (12, 16, 18) to processes, where at least some of the cloud computing resources (12, 16, 18) have different ages, said cloud computing resources (12, 16, 18) having individual primary failure probabilities, each being based on an age dependent failure probability function of the cloud computing resource. The receives requests for performing computational tasks for a number of processes, where the processes have different process priorities, investigates the availability of the cloud computing resources for performing the tasks of the requests, and assigns the available cloud computing resources to the based on the process priorities, where processes with the highest process priorities are assigned to the cloud computing resources (12, 16, 18) having the lowest primary failure probabilities..
Telefonaktiebolaget Lm Ericsson (publ)

System and streamlined registration and management of products over a communication network related thereto

The system and method of the present invention to provide at least one unique identification code (uid) registration center comprises of plural authorized parties' account. Each account comprises at least one product data file with uid, in which uid is associated with a product, to enable over at least one communication network (such as cloud computing), to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item, including ownership right related to the product transfer between each party, etc.

Gaze-directed content delivery

Methods and systems may provide for associating content in a cloud computing infrastructure with geo-panes and sending it to a location aware device based on user gaze. The content may be restricted by rules, including distance from user to the geo-pane.
Intel Corporation

System and managing heterogeneous data for cloud computing applications

A method, system, and computer-readable storage medium for managing heterogeneous data for cloud computing applications are disclosed. For example, a method involves identifying data to be used by an application.
Nimbix, Inc.

Method and device for managing resources with an external account

Method and device for managing cloud computing resources with an external account, the resources being associated with one or more internal main accounts. The method includes verifying an identity of the external account via a server, determining, if the identity of the external account is verified, whether a virtual sub-account is bound to the external account, the virtual sub-account being subordinate to an internal main account of the one or more internal main accounts, and allowing, if it is determined that the virtual sub-account is bound to the external account, the external account to manage the resources associated with the internal main account based on pre-configured rights of the virtual sub-account..
Alibaba Group Holding Limited

Automatic determination of device specific interoperability

Device specific interoperability is provided automatically utilizing remote service and/or cloud computing. Functionality of devices like mobile phones is tested to ensure that the device is properly configured to work with infotainment systems by using the phone to connect with the cloud services..
Microsoft Technology Licensing, Llc

Data backup and transfer across multiple cloud computing providers

Data may be stored across the clouds of multiple cloud computing providers to improve data security. Software infrastructure components of an original cloud computing provider storing data via a first virtual machine (vm) may be identified.
Whp Workflow Solutions, Llc

Dynamic provisioning of a virtual storage appliance

Systems, methods, and apparatus for facilitating dynamic provisioning of a virtual storage appliance in a cloud computing environment are presented herein. A storage system management component can provision storage from a storage medium to facilitate access of at least a portion of the storage by a virtual storage appliance (vsa) based on a request for at least one resource associated with the vsa.
Os Nexus, Inc.

System and key management and user authentication

A system and method are presented for key management and user authentication. Secure ssh access may be performed through a public/private set of ssh keys where a user uploads a public ssh key to a key management application.
Interactive Intelligence Group, Inc.

Secure comparison of information

The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in particular an asymmetric method of secure computation that relies on the private-key/public key paradigm with homomorphic encryption.
Openeye Scientific Software, Inc.

Smart shift selection in a cloud video service

A cloud-based network service provides intelligent access to surveillance camera views across multiple locations and environments. A cloud computing server maintains a database of time periods of interest captured by the cameras connected to the network.
Pelco, Inc.

System and remote fax interconnect technology

The present invention provides systems and methods for the virtualization, aggregation, and distributed processing of facsimile communications. The remote fax interconnect known as etherfax® is a system and method that allows for the reception and delivery of information based on cloud computing infrastructure to or from one or more facsimile systems using internet/web based communication protocols such as http(s) as the transport between a facsimile capable application or hardware and the remotely accessible etherfax® services..
Etherfax, Llc

Method and configuring redundancy solution in cloud computing architecture

The present invention relates to the field of communications and information technologies, and in particular, to a method and an apparatus for configuring a redundancy solution in a cloud computing architecture, so as to solve a problem that a manner of manually planning a redundancy solution has poor flexibility and is unfavorable to overall management of a system. The method in the present invention includes: receiving a redundancy solution configuration request; determining, according to the redundancy solution configuration request, redundancy capability information and redundancy constraint requirement information of an application object to be configured; and determining, according to infrastructure information, infrastructure manager information, and application object information in an established redundancy capability information base, and the redundancy capability information and the redundancy constraint requirement information of the application object to be configured..
Huawei Technologies Co., Ltd.

Virtual zones for open systems interconnection layer 4 through layer 7 services in a cloud computing system

Concepts and technologies disclosed herein are directed to virtual zones for open systems interconnection (“osi”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone.
At&t Intellectual Property I, L.p.

Fast provisioning service for cloud computing

A cloud-based system and method for provisioning it infrastructure systems is disclosed. The system and method provided constructs an infrastructure generally comprised of a processing component supplying the computational capacity for a platform element, comprising one or more processing elements, memory and i/o subsystems, a storage component utilizing commodity disk drives and comprised of one or more physical storage devices, and a network component providing a high speed connection among processing elements and the processing component to storage components.
Digital River, Inc.

Mechanism for resource utilization metering in a computer system

Systems, apparatuses, and methods for tracking system resource utilization of guest virtual machines (vms). Counters may be maintained to track resource utilization of different system resources by different guest vms executing on the system.
Advanced Micro Devices, Inc.

Data suppression for faster migration

The subject technology addresses the need in the art for improving intra-cloud migration of virtual machines in a cloud computing environment. A hash database may be prepopulated with key-value pairs corresponding to hash ids and associated data chunks of a virtual machine image.
Cisco Technology, Inc.

Optimizing virtual machines placement in cloud computing environments

Placement of instances of virtual machine (vm) images in a cloud computing environment is optimized. A request is received to deploy a new vm image instance.
International Business Machines Corporation

Method and configuring redundancy data center in cloud computing architecture

The present disclosure relates to a method and an apparatus for configuring a redundancy data center in a cloud computing architecture. The method includes receiving a request for configuring a redundancy data center dc for a specified network service ns; acquiring, from an affinity relationship information bank of application objects according to the request for configuring a redundancy dc, information about an affinity and/or anti-affinity relationship among application objects that support the specified network service, where application objects having an affinity relationship rare deployed in a same dc, and application objects having an anti-affinity relationship are deployed in different dcs; and selecting, from deployed dcs, a redundancy dc for the specified network service according to redundancy resource information of the deployed dcs and the acquired information about an affinity and/or anti-affinity relationship..
Huawei Technologies Co., Ltd.

Wireless network cloud computing resource management

A method, performed by a server device, may include receiving a request to activate an application session, the request being received from a user equipment on behalf of a particular application installed on the user equipment. The method may further include determining one or more application requirements associated with the particular application; determining conditions associated with one or more application servers; selecting a particular one of the one or more application servers based on the determined one or more application requirements and based on the determined conditions; and setting up the application session between the user equipment and between the selected particular one of the one or more application servers..
Cellco Partnership (d/b/a Verizon Wireless)

Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request.
International Business Machines Corporation

Microapplications software marketplace for digital systems and use

Disclosed is a system and method for provisioning and deploying digital systems using microapplications running natively and securely on top of cloud computing providers. The system includes a software marketplace that allows users to purchase microapplications on a subscription basis in order to build, deploy, and manage the microapplications as a custom digital system in their accounts from the cloud-computing providers..
Mitoc Group Inc.

Dynamic snapshots for sharing network boot volumes

The subject technology addresses the need in the art for improving provisioning and booting of virtual machines in a cloud computing environment. Different versions of boot volume images may be shared in a storage repository accessible by one or more host computers.
Cisco Technology, Inc.

Frictionless interface for virtual collaboration, communication and cloud computing

Described herein are systems and methods for a virtual communication and collaboration application platform which automates the setup and operation of a virtual collaboration session, senses and reacts to user activity and contextual cues, and provides real-time intuitive interaction steps to enable users to easily interact in a simple and user-friendly manner. The virtual collaboration and computing platform provides a shared application window visible to multiple users on different displays for which users can easily share multiple types of data and applications through basic drag-and-drop interactions..
Coscreen, Inc.

Online advancing information organization sharing and collective action

Methods and systems and mobile device interfaces for creating, joining, organizing and managing via mobile devices affinity groups in a cloud computing environment for social and business purposes.. .

Data-driven semi-global alignment technique for masquerade detection in stand-alone and cloud computing systems

Systems and methods are provided for intrusion detection, specifically, identifying masquerade attacks in large scale, multiuser systems, which improves the scoring systems over conventional masquerade detection systems by adopting distinct alignment parameters for each user. For example, the use of ddsga may result in a masquerade intrusion detection hit ratio of approximately 88.4% with a small false positive rate of approximately 1.7%.
Qatar University, Office Of Academic Research

A generic model to implement a cloud computing service

Example implementations relate to using a generic model to provision a computing resource to implement a cloud computing service. For example, a computing device may include a processor.
Hewlett Packard Enterprise Development Lp

Methods and systems relating to optical networks

Data center interconnections, which encompass wscs as well as traditional data centers, have become both a bottleneck and a cost/power issue for cloud computing providers, cloud service providers and the users of the cloud generally. Fiber optic technologies already play critical roles in data center operations and will increasingly in the future.
Aeponyx Inc.

Method and system for intelligent cloud planning and decommissioning

A method for decommissioning an application operating on a computer system or a computer system includes receiving, at a decommissioning system, information that specifies a server to analyze. The decommissioning system determines one or more applications operating on the server, one or more instruction code libraries that are being utilized by the one or more applications, and hardware dependencies of the one or more instruction code libraries.
Accenture Global Solutions Limited

3d virtual reality model sharing and monetization electronic platform system

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

Holoportal and holocloud system and operation

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

Integrated configuration engine for interference mitigation in cloud computing

A cloud computing system which is configured to monitor operating status of a plurality of virtual computing machines running on a physical computing machine, wherein said monitoring includes monitoring a cycles per instruction (cpi) parameter and a cache miss rate (cmr) parameter of at least one of the plurality of virtual computing machines. The system detects interference in the operation of the at least one virtual machine, with the detection including determining when at least one of the cpi and cmr values exceed a predetermined threshold.
Purdue Research Foundation

Real-time 3d virtual or physical model generating holoportal and holocloud system

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

System and a multi-tenant datacenter with layer 2 cloud interconnection

Provided is a system and method for a multi-tenant datacenter with layer 2 cloud interconnection. More specifically the multi-tenant datacenter includes a plurality of physical client systems in a first datacenter each physical client system having a set of physical infrastructure resources.
Klemm+sohn Gmbh & Co. Kg

Cloud computing system and method based on distributed consumer electronic devices

In accordance with a method a plurality of subscriber systems are provided, the systems being coupled via a wide area network (wan) and comprising a first subscriber system. The first subscriber system has processing and non-volatile storage and is suitably programmed for providing a subscriber service to a first subscriber.
Leonovus Usa

Data encryption service

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Image vulnerability repair in a networked computing environment

Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities.
International Business Machines Corporation

Automatically preventing and remediating network abuse

Various embodiments described herein are directed to optimizing cloud computing infrastructures functionality based on an abuse prevention and remediation platform. A tenant profile may have a tenant confidence score for a tenant, the tenant confidence score being an indicator of the reputation of the tenant usage of cloud computing resources.
Microsoft Technology Licensing Llc

Methods and apparatus to grant access to cloud computing resources

An example method to grant authorization to a user for accessing a cloud computing resource involves receiving a first message from a user via a social media interface. The first message includes a request to access a cloud computing resource.
Vmware, Inc.

Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Methods and apparatus to generate knowledge base articles

An example method to generate knowledge base articles involves analyzing user-satisfaction indicators of a plurality of user response messages in a forum message board of a cloud computing system. The user response messages are posted in response to a first message requesting assistance related to a computing resource.
Vmware, Inc.

Systems and methods to create highly scalable network services

Various embodiments of the invention provide for an unparalleled scalable and reliable load distribution design for use in a large class of network applications, including cloud computing in modern data center networks and similar services, which can benefit from the invention by taking advantage of commonly available network components and systems. In particular, various embodiments of the invention extend a logical load distributor model to include distributed clusters of loosely coupled components.
Dell Products L.p.

Cloud system order and configuration using customized templates

The present disclosure relates to brokering requests for cloud computing resources between a user and multiple infrastructure providers. According to one embodiment, an infrastructure manager acting as a broker receives a template including configuration information for one or more servers.
International Business Machines Corporation

Cloud system order and configuration using customized templates

The present disclosure relates to brokering requests for cloud computing resources between a user and multiple infrastructure providers. According to one embodiment, an infrastructure manager acting as a broker receives a template including configuration information for one or more servers.
International Business Machines Corporation

Cloud computing systems

A multi-tier cloud-metering framework for metering cloud resources is presented. The proposed framework is capable of relating metering indicator of distributed resources contributing to the same application and located at different architectural levels.
The American University In Cairo

Data encryption service and customized encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Monitoring and alert services and data encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

System and monitoring changes in databases and websites

A system and method is described for constructing a differential web in which information including objects, numbers, or text in databases and web pages may be selected using pointing device movements. Once selected, objects may be designated to be monitored for changes, said changes being captured and made browsable on web-like constructs.
Tksn Holdings, Llc

Allocating, configuring and maintaining cloud computing resources using social media

An example method involves receiving an electronic message from a user via a social media interface. The electronic message includes a query associated with a resource of a cloud computing system.
Vmware, Inc.

Cloud virtual machine customization using extension framework

In various embodiments, methods and systems for remotely customizing a virtual machine in a cloud computing infrastructure are provided. A vm agent component provided on a virtual machine, while in communication with a vm deployment service associated therewith, can be configured to detect an incoming configuration payload that corresponds to a selected one or more extension packages cataloged on a vm marketplace component in communication with the vm deployment service component.
Microsoft Technology Licensing, Llc

System and automatic porting of software applications into a cloud computing environment

In accordance with an embodiment, described herein is a system and method for automatic porting of software applications into a cloud computing environment (cloud environment, cloud). A cloud service enables software developers to deploy user applications to run within the cloud environment.
Oracle International Corporation