Follow us on Twitter
twitter icon@FreshPatents


Cloud Computing patents

      

This page is updated frequently with new Cloud Computing-related patent applications.




 Operating status display system patent thumbnailnew patent Operating status display system
An operating status display system includes: a configuration information storage storing information indicating a relationship between systems provided on cloud computing systems, business applications operating on the cloud computing systems to realize the systems, virtual servers, one server being used for the business applications, physical servers configuring the virtual servers, and facilities used for the physical servers; an operating information storage storing operating information indicating respective operating statuses of the business applications, the virtual servers, the physical servers, and the facilities; and an operating status display performing switching among system operating statuses indicating operating statuses of some of the systems, cloud computing system operating statuses indicating operating statuses of some of the cloud computing systems, and facility operating statuses indicating operating statuses of some of the facilities according to a user operation and displaying the switched operating statuses, based on the configuration information and the operating information.. .
Nomura Research Institute, Ltd.


 Data center profiling and cloud emulation patent thumbnailnew patent Data center profiling and cloud emulation
Disclosed herein are mechanisms and devices for profiling and emulating a data center in a cloud computing environment. A user requests the data center be emulated through a user interface.
Microsoft Technology Licensing, Llc


 Multi-service application fabric architecture patent thumbnailnew patent Multi-service application fabric architecture
In representative embodiments, multiple cloud computing infrastructures, each having its own application and management fabric, coexist with in the same cloud computing infrastructure. This results in a cloud computing infrastructure where multiple management fabrics and application fabrics coexist to offer their own services and cross platform services.
Microsoft Technology Licensing, Llc


 Platform and knowledge-based instruction engine implemented skill-improvement system through cloud computing patent thumbnailnew patent Platform and knowledge-based instruction engine implemented skill-improvement system through cloud computing
Methods and apparatuses for generating feedback to a human practitioner practicing a skill using a combination of local platform, the internet, and cloud-based analysis engine are disclosed. The local platform is employed to provide physical parameter data pertaining to the human practitioner (or part/parts thereof) and to the object involved in practicing the skill.

 Exploit-explore on heterogeneous data streams patent thumbnailnew patent Exploit-explore on heterogeneous data streams
Machine learning on a heterogeneous event data stream using an exploit-explore model. The heterogeneous event data stream may include any number of different data types.
Microsoft Technology Licensing, Llc


 Reconfigurable cloud computing patent thumbnailReconfigurable cloud computing
A method, system, and computer-readable storage medium for a reconfigurable computing system are disclosed. One method involves configuring one or more computing resources (selected according to a workflow that specifies an application to be executed) of a computing node and executing, using the one or more computing resources, at least a portion of an application at the computing node.
Nimbix, Inc.


 Integrated intranet workspace patent thumbnailIntegrated intranet workspace
A method, a system and a non-transitory memory including a computer readable instructions is disclosed for providing an integrated intranet workspace. One or more independent applications are selected as workspace integrated applications for providing services within the integrated intranet workspace.
Gapps Oy


 Optimizing placement of virtual machines patent thumbnailOptimizing placement of virtual machines
Systems and methods are described for allocating resources in a cloud computing environment. The method includes receiving a computing request, the request for use of at least one virtual machine and a portion of memory.
Cisco Technology, Inc.


 Infrastructure testing patent thumbnailInfrastructure testing
Provided are examples of apparatus and methods which relate to infrastructure testing, such as end-to-end reliability testing of a network deployed across one or more clouds in a cloud computing system. In an example method, a machine-executable order describing a computing network is received at a platform management device.
Cloudbolt Software Inc.


 Method and  duplicated data management in cloud computing patent thumbnailMethod and duplicated data management in cloud computing
An approach is provided for managing data duplication in cloud computing. A method comprising, sending from a first device to a data center, data encrypted with a data encryption key for storing the encrypted data at the data center; encrypting the data encryption key according to an attribute-based encryption (abe) scheme by using identity as an attribute in a deduplication policy for the data; issuing to a second device, a personalized secret attribute key which is derived from a public key of the second device according to the attribute-based encryption (abe) scheme, wherein the personalized secret attribute key is to be used for decrypting the encrypted data encryption key at the second device, in combination with the policy..
Nokia Technologies Oy


Enforcing compliance with administrative requirements relating to using computing resources

Provided are examples of apparatus and methods which relate to enforcing compliance with one or more administrative requirements relating to using computing resources. In an example, one or more objects being used on one or more cloud computing platforms are identified with a computing device.
Cloudbolt Software Inc.

Service request management in cloud computing systems

Techniques for managing service requests in cloud computing systems are disclosed herein. In one embodiment, a method can include in response to determining that a profile of detected service requests substantially deviates from the predetermined profile, identifying a component failure of a service component in the cloud computing system by searching a database containing operational event logs of the cloud computing system based on the detected service requests.
Microsoft Technology Licensing, Llc

Allocating cloud computing resources in a cloud computing environment

A method of allocating cloud computing resources in a cloud computing environment to a user is disclosed. The method comprises determining a prediction accuracy score for each user indicative of their user predictability, and allocating cloud computing resources to each user dependent on their user predictability..
Telefonaktiebolaget Lm Ericsson (publ)

Operational management in cloud computing systems

Techniques for managing operation in cloud computing systems are disclosed herein. In one embodiment, a method can include receiving data representing a guaranteed value of a performance metric of a cloud service and an error budget and deriving a switching threshold based on a combination of the value of the performance metric and the error budget.
Microsoft Technology Licensing, Llc

Method, apparatus, and system for adjusting deployment location of virtual machine

A method, an apparatus, and a system for adjusting a deployment location of a virtual machine in order resolve a problem that an inter-node communication cost has excessively great impact on an adjustment result in an existing solution for adjusting a deployment location of a virtual machine in a cloud computing system, the inter-node communication cost is corrected according to technical solutions provided in the embodiments of the present disclosure. Consequently, not only a corrected inter-node communication cost can exert impact on the result for adjusting a deployment location of a virtual machine, but also communication traffic can play a major role in affecting the adjustment result.
Huawei Technologies Co., Ltd.

Method & a train control system

A method and an apparatus for a train control system are disclosed, and are based on virtualization of train control logic and the use of cloud computing resources. A train control system is configured into two main parts.

Application-based elastic resource provisioning in disaggregated computing systems

Various embodiments for elastic resource provisioning in a disaggregated cloud computing environment, by a processor device, are provided. Respective members of pools of hardware resources within the disaggregated cloud computing environment are provisioned to a tenant according to an application-level service level agreement (sla).
International Business Machines Corporation

Linking instances within a cloud computing environment

Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (gui or the like), and associated with a set of rules.
International Business Machines Corporation

Sla-based agile resource provisioning in disaggregated computing systems

Various embodiments for agile component-level resource provisioning in a disaggregated cloud computing environment, by a processor device, are provided. Respective members of pools of hardware resources within the disaggregated cloud computing environment are allocated to each respective one of a plurality of tenants according to one of a plurality of service level agreement (sla) classes.
International Business Machines Corporation

Multicast traffic management in an overlay network

The use of network virtualization using overlays over layer 3 (nvo3) is a growing trend to address networking issues in data centers that make use of virtualization and cloud computing techniques. Additional considerations may be required to support application-specific multicast traffic in such overlay networks.
Telefonaktiebolaget Lm Ericsson (publ)

System and network address administration and management in federataed cloud computing networks

Techniques for performing network address allocation, administration and management in federated cloud computing networks are described. In one example embodiment, network interface cards (nics) in a local network services appliance and a remote network services appliance register with an associated local network cloud and remote network cloud in the federated cloud computing networks.
Vmware, Inc.

System and methods for scalable packet inspection in cloud computing

A method for packet inspection in a computer network includes receiving a plurality of network streams from a plurality of client systems at a first load balancer; allocating the network streams across a proxy instances; and inspecting and filtering the network streams by the proxy instances. The method further includes forwarding the filtered network streams to a second load balancer; allocating the filtered network streams to a plurality of application instances; and processing and responding to the network streams at the application instances.
Secureworks Corp.

Virtual hybrid texture mapping

A gaming device is configured to provide virtual hybrid texture mapping, which provides a type of virtual placeholder that can be filled in using cloud computing resources. The virtual placeholders are filled in to create more detailed textures whose calculated are offloaded to a cloud computing service provider data center's cluster..
Vmware, Inc.

Providing enterprise product bundles as a cloud-based service

Systems, methods, and computer-readable storage media are provided for creating and delivering product packaging as a cloud-based service to enterprise administrators. Administrators utilize user credentials to access a web-based portal where a name or identifier of each package created by any enterprise administrator of the organization is presented.
Adobe Systems Incorporated

Convergence of cloud and mobile environments

In an approach for converging a cloud computing environment and a mobile device into an integrated environment, a processor receives a request to complete a computing task on a first device. A processor identifies capabilities of the first device.

System and cloud computing on-demand dynamic service management engine

The present arrangement is a system for connecting consumers with services. The system has a mobile application management platform for supporting connection with a plurality of third party service providers.
Tize Technologies Inc. (accomplicetm) C/o Wework

Constructing computing systems with flexible capacity of resources using disaggregated systems

Various embodiments for allocating resources in a disaggregated cloud computing environment, by a processor device, are provided. Respective members of a pool of hardware resources are assigned to each one of a plurality of tenants based upon a classification of the respective members of the pool of hardware resources.
International Business Machines Corporation

System and disaster recovery of cloud applications

cloud computing is continuously growing as a business model for hosting information and communications technology applications. While the on-demand resource consumption and faster deployment time make this model appealing for the enterprise, other concerns arise regarding the quality of service offered by the cloud.
Telefonaktiebolaget Lm Ericsson (publ)

Cloud computing service architecture

A service control system manages a set of storage clients operating within one or more computing hosts. Storage clients may access a consistent storage system regardless which cloud provider the computing hosts come from.

Systems and methods for segmenting industrial asset services

Systems and methods are presented for receiving, at a server computer associated with an industrial asset cloud computing system, a request from a user device for industrial asset application development services, the request including a username and password, and verifying, by the server computer, the username and password. The systems and methods further comprise determining, by the server computer, a user profile based on the username, the user profile comprising at least one of an industry, a region of operation, a negotiated contract term, an identity of the user associated with the username as an individual developer or an enterprise, and a role associated with the user; determining, by the server computer, a subset of a plurality of industrial asset application development services based on the user profile, and sending the subset of the plurality of industrial asset development services to the user device to be displayed on the user device..

Pluggable allocation in a cloud computing system

In one embodiment, a cloud computing system provides user extensibility by providing a plugin interface for major systems. Plugin interfaces for a compute service, object service, network service, authentication and authorization service, message service, and image service are disclosed.

Multi-tenant middleware cloud service technology

A system that includes multiple hosts, each running a plurality of virtual machines. The system may be, for example, a cloud computing environment in which there are services and a service coordination system that communicates with the hosts and with the services.

Software verification method and apparatus

A software verification method and apparatus are disclosed, applied to the cloud computing field and the communications field, and can be used to automatically verify whether an installation file of vnf software has been tampered with. The method includes: obtaining installation files of vnf software and signature files of the installation files, where the signature files of the installation files are used to store verification information of the installation files; verifying the installation files according to the signature files of the installation files; and determining, if the verification of the installation files succeeds, that the vnf software has not been tampered with..

Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing

Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk.

Trainable transceiver and cloud computing system architecture systems and methods

A system for installation in a vehicle and for controlling a device, the system including a trainable transceiver, communications electronics, and a processing circuit coupled to the trainable transceiver and the communications electronics. The processing circuit is configured to train the trainable transceiver to control a device using information received from a cloud computing system remote from the device and vehicle via the communications electronics..
Gentex Corporation

Method and system for managing and displaying product images with progressive resolution display

A method and system displaying and managing images of consumer products with cloud computing. One or more consumer products are selected.

Cloud system for controlling outdoor grill with mobile application

Embodiments are directed to communicating with and controlling operation of electronically-controlled appliances. In one scenario, a computer system receives a first input from a computing system indicating that an electronically-controlled appliance is permitted to communicate with a cloud computing platform.
Traeger Pellet Grills, Llc

Cloud tabs

The presently disclosed techniques related to data transfer and synchronization between multiple electronic devices. The multiple electronic devices may be logged onto a user's account with a cloud computing service so that they may transfer data relating to websites that they have accessed to the cloud computing service so that such data may be synchronized amongst the multiple electronic devices.
Apple Inc.

Technologies for deploying dynamic underlay networks in cloud computing infrastructures

Technologies for deploying dynamic underlay networks in a cloud computing infrastructure include a network controller of the cloud computing infrastructure communicatively coupled via disaggregated switches to one or more compute nodes of the cloud computing infrastructure. The network controller is configured to receive tenant network creation requests from a cloud operating system (os) of the cloud computing infrastructure indicating that a tenant network is to be created in the cloud computing infrastructure (e.g., for a new tenant of the cloud computing infrastructure).

Systems for improving performance and security in a cloud computing system

Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key.
Egnyte, Inc.

Methods for improving performance and security in a cloud computing system

Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key.
Egnyte, Inc.

Apparatus and verifying cloud service compatibility

Disclosed herein are an apparatus and method for verifying cloud service compatibility. The apparatus includes a cloud service description management unit, a cloud service relationship analysis unit, a schema mapping information management unit, an interoperability verification unit, and a data portability verification unit.
Electronics And Telecommunications Research Institute

Scaling persistent connections for cloud computing

Examples relate to scaling persistent connections for cloud computing. In some examples, a data packet is used to determine connection information of the first connection.
Hewlett Packard Enterprise Development Lp

Protecting dynamic and short-lived virtual machine instances in cloud environments

The present disclosure relates to protecting temporary virtual machine instances in a cloud computing platform from security risks. An example method generally includes monitoring a cloud platform for the assignment of a temporary virtual machine instance to a workload.
Symantec Corporation

Encryption and decryption of data in a cloud storage based on indications in metadata

Provided are a method, a system, and a computer program product in which metadata associated with encrypted data is maintained in a cloud computing environment, wherein the metadata indicates whether reading of information in the encrypted data is restricted geographically. A controller provides a decryption code for decrypting the encrypted data to a cloud server located in a geographical location, based on whether the metadata indicates whether the reading of information in the encrypted data is restricted geographically..
International Business Machines Corporation

System and secure cloud computing

In a method for secure cloud computing, a virtual machine (vm) associated with a client is executed at a computer within a trusted computing cloud. An image including state information of the vm is obtained; storage of the image is arranged; a freshness hash of the image is determined; and the freshness hash is sent to the client.
Virtustream Ip Holding Company Llc

Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request.
International Business Machines Corporation

System, method, and recording medium for performance management of a service for a database as a service

A performance management method, system, and non-transitory computer readable medium for a service for database as a service (dbaas) in a cloud computing environment, include a receiving and comparing circuit configured to receive a service request from a user and compare the received service request to at least one prior received service request, a similarity calculating circuit configured to calculate a similarity between the service request and the at least one prior received service request based on a requirement that the service request places on the dbaas, and a data verifying circuit configured to verify whether information within the database of the dbaas has changed since an identical prior received service request based on the receiving and comparing circuit identifying the identical prior received service request.. .
International Business Machines Corporation

Migration of network entities to a cloud infrastructure

A method for migrating network entities to a cloud computing infrastructure includes receiving an indication of at least one node of a plurality of nodes to migrate from an enterprise network to a cloud computing infrastructure, identifying one or more related nodes of the plurality of nodes that have direct and indirect communication relationships with the indicated node, and adding the indicated node and at least one node of the related nodes for the indicated node to a migration group. The method includes preparing a migration-configuration file for each node of the migration group, the migration-configuration file comprising service level agreement (sla) information, deploying a migration agent to each node of the migration group, and migrating the migration group to the cloud computing infrastructure, wherein each node of the migration group is migrated using a corresponding migration-configuration file to generate an sla for each node of the migration group with a provider of the cloud computing infrastructure in view of sla information from the corresponding migration configuration file..
Red Hat, Inc.

Efficient vm migration across cloud using catalog aware compression

Techniques for migrating a vm in a hybrid cloud computing system are provided. The techniques include identifying a similar vm at the destination, comparing dictionaries for the vm to be transmitted and the similar vm, and compressing the vm based on the comparison.
Vmware, Inc.

Designer tool for managing cloud computing services

Embodiments of facilitating creation of cloud computing applications are disclosed therein. In one embodiment, a method includes receiving user input of a plurality of workflow items as a sequence of graphical objects on a graphical user interface.
Microsoft Technology Licensing, Llc

Cloud computing service catalog

Provided in an example is a cloud computing service catalog which enables a cloud computing user to prepare and implement a blueprint of service items across multiple different clouds of computing resources. An example method includes discovering a plurality of computer resources which are available from at least one of a first platform and a second platform, and receiving data describing a plurality of service items.
Cloudbolt Software Inc.

Cloud computing configuration form generator

Provided are examples of cloud computing form generators which enable data-driven configuring of cloud computing resources. A configuration form is generated, for example, by an administrator, based at least in part on computing resources available from two or more disparate computing clouds and preconfiguring objects available from the two or more disparate computing clouds.
Cloudbolt Software Inc.

Hybrid cloud operation planning and optimization

Resource usage is monitored for a hybrid cloud computing environment having on-premises computing resources and off-premises computing resources, for at least a first time period. For the time period, the amount of the on-premises computing resources and off-premises computing resources are related to the demand for computing services from the environment.
International Business Machines Corporation

Systems and methods of reading and processing change-of-address forms in a cloud-based architecture

A method for processing change-of-address (coa) forms. The method includes capturing a first image of a first coa form.
Siemens Industry, Inc.

Data movement among distributed data centers

Embodiments of the present disclosure provide a method and an apparatus for data movement among distributed data centers in a peer network. The method comprises: reducing an amount of data to be moved by pre-processing the data; generating a torrent file for the data; distributing the torrent file to a peer data center, and in response to receiving a data request from the peer data center, transmitting a segment of the data to the peer data center.
Emc Ip Holding Company Llc

Systems and methods of enforcing multi-part policies on data-deficient transactions of cloud computing services

The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata..
Netskope, Inc.

Method, apparatus and system for processing attack behavior of cloud application in cloud computing system

An apparatus for processing an attack behavior of a cloud application in a cloud computing system, including a policy manager configured to store a security determining rule and a malicious application processing rule, a security analyzer configured to receive application behavior data from a security detector, and send the application behavior data to a security processor when the cloud application running on the cloud host has an attack behavior, and the security processor is configured to invoke, according to the malicious application processing rule, an interface provided by a cloud controller in order to process the cloud application having an attack behavior. The apparatus performs security protection based on an application level of cloud computing, which can prevent mutual attack between different applications on a same host, and reduce impact on a normal application..
Huawei Technologies Co., Ltd.

Middle ware security layer for cloud computing services

The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata..
Netskope, Inc.

System for support in the event of intermittent connectivity, a corresponding local device and a corresponding cloud computing platform

A system wherein a request can be processed both in a cloud service and autonomously or locally via a client, and a monitoring of the network quality, for example, the presence of delay, is carried out, and wherein, depending on the current accessibility of the cloud platform, optionally a local alternative calculation is carried out, which may be slower or, for example in the event of real-time requirements, is of a lower quality than the corresponding cloud service, and the result thereof is then temporarily used alternatively by the client is provided. In this way, cloud services can be locally buffered, thereby cushioning connection interruptions between end device and cloud platform, whereby cloud services can be used in a transparent manner for the user and, even in the event of connection interruptions..
Siemens Aktiengesellschaft Ü

Systems and methods for management of cloud computing resources for information systems

The system and methods described herein provide for dynamic provisioning of computing resources for an enterprise resource planning system. The dynamic provisioning system provisions an original configuration of computing resources upon selection from a client device, and then provides for further dynamic provisioning by evaluating the real-time performance of the erp system or by analyzing historical performance and consumption information of the erp system or by using a combination to predict the anticipated stress on the computing resources placed by future performance of the erp system..
Velocity Technology Solutions, Inc.

Master data management for a cloud computing system

Some embodiments provide a program that receives, from a first system, a copy of master data. The program also receives a master data modification rule.
Sap Se

Information security realizing method and system based on digital certificate

A digital certificate based information security realization method and system are provided. The method includes: separately issuing a digital certificate for a cloud management host, a physical cloud computing host and a virtual cloud computing machine; and carrying out a compliance authentication according to a corresponding digital certificate when the cloud management host, the physical cloud computing host and the virtual cloud computing machine start up or are in the running process.
Zte Corporation

Device and system for controlling secure key access using an internet-connected key box device

A system for controlling key access using a phone and internet-connected key box device. The key box device hangs or mounts on a fixture and controls key access to visitors.

Blending enterprise content and web results

Web search results and enterprise search results are combined into a single presentation. A search query is received from a user associated with a tenant of an enterprise cloud computing platform.
Microsoft Technology Licensing, Llc

Secure migration of virtual machines from source to target and transfer of vm descriptor and keys between physical servers

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Reallocating resource capacity among resource pools in a cloud computing environment

In general, the embodiments of the present invention provide an approach for rebalancing/reallocating cloud resource capacities between resource pools that provide variable customer assurances and delivery penalties when assurances are not met. The variables that are considered hereunder include, overall ‘reservations’, total current capacity, remaining capacity against unused reservations and penalties that apply for failing to satisfy ‘reservation’ commitments.
International Business Machines Corporation

Granular permission assignment

A system and method for storing role definitions for cloud provider systems, receiving a first request to assign a user to a first role specifying a first cloud computing resource of a respective resource type, identifying a role definition corresponding to the first role that includes an action set permitted, and creating the first role for the user on the first cloud computing resource by associating the identified role definition with the first cloud computing resource and the user. A second request to assign the user to a second role is received specifying a second cloud computing of the respective resource type, and the second role is created for the user on the second cloud computing resource, where the identified role definition corresponds to the first and second roles, and wherein creating the second role includes associating the identified role definition with the first cloud computing resource and the user..
Red Hat, Inc.

System and communicating with retail customers with a sustainability standard

A cloud computing system and method for communicating product and source information with retail customers with a sustainability standard is disclosed. The system may include a server system with a processor system, a communications interface, a communications system, an input system and an output system, the server system having access to a communications network, a memory system with an operating system, a communications module, a web browser module, a web server application which communicates product and source information with retail customers with a sustainability standard using non-transitory storage media and a website with a plurality of web pages to track and communicate product and source information with retail customers with a sustainability standard..

Network transmitting data in a network system

A network system, and a method of use thereof, includes a first network subscriber arranged in an automation network of an automation system, a second network subscriber having a cloud computing infrastructure, and a communication unit for transmitting acquired data from the first network subscriber to the second network subscriber. The communication unit includes a first interface, which is configured as an input/output module and connected to the first network subscriber, and a second interface, which is configured as an agent and connected to the second network subscriber..
Siemens Aktiengesellschaft

Just-in-time access based on screening criteria to maintain control of restricted data in cloud computing environments

A jit service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for devops personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When jit access to a resource is requested by a devops device, the jit service retrieves a jit policy for the resource that includes screening criteria limiting automatic granting of jit access to devops personnel who meeting the screening criteria.
Microsoft Technology Licensing, Llc

Just-in-time access based on geolocation to maintain control of restricted data in cloud computing environments

A jit service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for devops personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When jit access to a resource is requested by a devops device, the jit service retrieves a jit policy for the resource that includes geolocation criteria limiting the geolocation from which jit access can be automatically granted.
Microsoft Technology Licensing, Llc

System and providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment

A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and trigger data is generated.
Intuit Inc.

Method and system of a cloud-based multipath routing protocol

In one aspect, a computerized system useful for implementing a cloud-based multipath routing protocol to an internet endpoint includes an edge device that provides an entry point into an entity's core network. The entity's core network includes a set of resources to be reliably accessed.

Cloud compute scheduling using a heuristic contention model

Technologies for contention-aware cloud compute scheduling include a number of compute nodes in a cloud computing cluster and a cloud controller. Each compute node collects performance data indicative of cache contention on the compute node, for example, cache misses per thousand instructions.
Intel Corporation

Supplementing network flow analysis with endpoint information

Techniques are disclosed for facilitating analysis of cloud activity. A cloud activity analysis agent may run within a virtual machine in a cloud computing environment to collecting information regarding computing activity within the virtual machine.
Ziften Technologies, Inc.

Secure provisioning of operating systems

Methods, media, and systems for secure provisioning of servers within a cloud computing environment are provided for herein. In some embodiments, a management service can delegate provisioning of a server of the cloud computing environment to an imaging service.
Microsoft Technology Licensing, Llc

Determination of data object exposure in cloud computing environments

Embodiments disclosed herein provide systems, methods, and computer readable media for indicating data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving information about a data object from the cloud computing environment.
Palo Alto Networks, Inc.

Methods and systems for facilitatng communications with storage

cloud computing platforms having computer-readable media that perform methods for facilitating communications with storage. A request having a first-interface format to access storage is intercepted.
Microsoft Technology Licensing, Llc

Method and system for in-situ identification of working fluids

A system for in-situ identification of a working fluid disposed in at least one piece of equipment, the system including: a working fluid reservoir that contains the working fluid; an in-situ sensor disposed in the working fluid reservoir such that it detects properties of the working fluid or computes properties from the generated spectra of the working fluid; a transmitter that transmits the detected spectra of the working fluid and equipment identification information; and a cloud computing system that receives the detected spectra and the equipment identification information transmitted from the transmitter, wherein the cloud computing system compares the spectra and equipment identification information against a reference database to determine whether or not the spectra of the working fluid substantially matches the stored reference spectra associated with the expected or specified fluid for the equipment.. .
Exxonmobil Research And Engineering Company

System and confirmation of information

A system for information confirmation using a cloud computing platform to provide a service by which an individual's video recorded and fingerprint authenticated sworn affidavit or statement called a “confirmation” can be given upon request of another individual and stored in a third party service provider's cloud based vault for future retrieval in the case of any legal or other forms of action that may need to be taken in the future.. .

System and masking and computing on masked data in a data store

Various embodiments are disclosed for efficiently masking a data set using sparse associative array representations, such that various computations may be performed directly on the masked data set in a data store with low computational overhead. Some embodiments may include transforming a data set into a sparse associative array representation (e.g., a sparse matrix table or graph) and masking the various components of the sparse associative array representation (e.g., row keys, column keys, values) to generate a masked associative array representation using different masking schemes.
Massachusetts Institute Of Technology

Systems and methods for managing digital data in a fault tolerant matrix

Aspects of the present disclosure relate to systems and methods for automatic management of digital data volumes logically maintained in a dynamically scalable fault tolerant matrix. The data volumes may be distributed across a cluster of connected server nodes included in a cloud computing architecture.

Effective and efficient virtual machine template management for cloud environments

Techniques are provided for reducing the amount of data that to be transferred in a hybridcloud system in order to spawn a vm at a private cloud computing system from a template library stored in a public cloud computing system. Instead of storing full virtual machine templates, template libraries at the public cloud computing system are “differential” libraries.
Vmware, Inc.

Multi-level cloud computing system

A cloud computing system includes a physical resource pool that includes a number of information processing devices. Each information processing device includes a processor, a computer-readable medium, and a network interface.
Rackspace Us, Inc.

Quantum computing as a service

A cloud computing architecture and system for interaction with and use of quantum processing devices is presented. In one aspect, the invention comprises a unified platform as a service for interacting with various quantum processing devices.
Qc Ware Corp.

All-connected by virtual wires network of data processing nodes

Embodiments of the present disclosure generally relate to a cloud computing network and a method of transferring information among processing nodes in a cloud computing network. In one embodiment, a cloud computing network is disclosed herein.
Hgst Netherlands B.v.

Assessing a service offering in a networked computing environment

An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user.
International Business Machines Corporation

Secure electronic transaction

Computing systems, methods and tools for performing a secure electronic transaction between buyer and merchant. The transaction being able to be implemented without either party having to transmit confidential information between the parties of the transaction.
International Business Machines Corporation

Massively scalable object storage system

Several different embodiments of a massively scalable object storage system are described. The object storage system is particularly useful for storage in a cloud computing installation whereby shared servers provide resources, software, and data to computers and other devices on demand.
Rackspace Us, Inc.

Cloud-based platform instrumentation and monitoring system for maintenance of user-configured programs

Systems and methods for using instrumentation for maintaining user-configured programs in a cloud computing environment are herein disclosed as comprising, in an implementation, intercepting operation data pertaining to the user-configured program, including a start time, an execution time interval, and an origin of the operation, canonicalizing the intercepted operation data by stripping operation-specific variable data from the operation data, aggregating the canonicalized operation data based on the start time, the canonicalized operation data, and the origin of the operation, and storing the aggregated operation data within a time series database in the execution time interval based on the start time.. .
Servicenow, Inc.

On-demand mailbox synchronization and migration system

A system for managing physical and logical resources to provide on-demand synchronization or migration of mailboxes and their corresponding content. Physical resources are managed by automatically assigning mailbox processing tasks to either reserved computing resources, or computing resources dynamically obtained from cloud computing services.
Bittitan Inc.

Synchronization an interconnection network using parallel-headerless tdma routing

Embodiments of the present disclosure generally relate to a cloud computing network, or datacenter network, and a method of transferring information among processing nodes in a cloud computing network or datacenter. The network may include a hub that is coupled to a plurality of nodes so that data is transferred between nodes through the hub.
Hgst Netherlands B.v.

Event processing via industrial asset cloud computing system

Systems and methods are presented for receiving, at a server computer associated with an industrial asset cloud computing system, a command representing an event, from a mobile device of a plurality of mobile devices, the command comprising instructions for changing a data object in a data domain, determining, a command processor responsible for processing the command, and routing the command to the command processor responsible for processing the command, wherein the command processor accesses the data domain associated with the command to change the data object in the data domain according to the instructions of the command. Systems and methods are further presented for detecting, by the server computer, a state change in the data domain indicating that the data object has been changed, and preparing the changed data object to be consumed by mobile devices operated by users authorized to access the data object..

Message processing method and apparatus, and message processing system

A message processing method and apparatus on a cloud computing platform, and a message processing system on a cloud computing platform are provided. In the message processing method, after an input request message sent to an active server and a standby server is received, the input request message is sent to all active servers and standby servers.
Huawei Technologies Co., Ltd.

User abstracted rbac in a multi tenant environment

Role based access control (rbac) identity management tools, computing systems, computer products and methods of abstracting individual users from the role assignment and revalidation process of traditional rbac. The rbac tools, products and systems of the present disclosure organize and manage multi-tenanted networks and cloud computing environments by organizing individual users by service providers having a single or unified identity, which are separately managed by the service provider owners.
International Business Machines Corporation

Context sensitive security help

Embodiments of the present invention provide systems and methods for providing security in a computing environment. These systems and methods can be applied to cloud computing environments.
International Business Machines Corporation

System and providing key-encrypted storage in a cloud computing environment

System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads.
Micro Focus Software Inc.

Initial resource provisioning in cloud systems

A method of provisioning cloud-based applications includes receiving requests from computer systems to provision applications available in a cloud computing environment, assigning each of the computer systems to a first resource instance in the cloud computing environment such that the applications are executed for each of the plurality of computer systems on the first resource instance, monitoring usage of resources for each of the computer systems, grouping each of the computer systems into groups based on the usage of the resources, allocating a second resource instance, and reassigning computer systems in a first group from the first resource instance to the second resource instance.. .
Oracle International Corporation

System and providing virtual desktop extensions on a client desktop

The system and method described herein may identify one or more virtual desktop extensions available in a cloud computing environment and launch virtual machine instances to host the available virtual desktop extensions in the cloud. For example, a virtual desktop extension manager may receive a virtual desktop extension request from a client desktop and determine whether authentication credentials for the client desktop indicate that the client desktop has access to the requested virtual desktop extension.
Micro Focus Software Inc.

Policy engine for cloud platform

A policy engine is situated within the communications path of a cloud computing environment and a user of the cloud computing environment to comply with an organization's policies for deploying web applications in the cloud computing environment. The policy engine intercepts communications packets to the cloud computing environment from a user, such as a web application developer, for example, in preparation for deploying a web application in the cloud computing environment.
Pivotal Software, Inc.

System and streamlined registration and management of products over a communication network related thereto

The system and method of the present invention to provide at least one unique identification code (uid) registration center comprises of plural authorized parties' account. Each account comprises at least one product data file with uid, in which uid is associated with a product, to enable over at least one communication network (such as cloud computing), to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item, including ownership right related to the product transfer between each party, etc.

Monitoring cloud resource objects during deployment of a blueprint

Tools are provided to assist users of cloud computing systems to create, monitor, and debug the resource instances they need. Specifically, resource instances are created in a cloud computing system based on a blueprint that is provided to a blueprint processor.
Oracle International Corporation

Cloud computing system, vehicle cloud processing use therewith

A cloud computing system includes a network interface for interfacing with a wide area network. At least one wireless transceiver engages in bidirectional communication with a plurality of vehicle cloud processing devices within a corresponding plurality of vehicles in at least one vehicle aggregation location.
William Reber, Llc

Methods, systems, and computer readable media for performing image compression

Methods, systems, and computer readable media for performing image compression are disclosed. According to one exemplary method, the method includes identifying a canonical image set from a plurality of images uploaded to or existing on a cloud computing and/or a storage environment.
The University Of North Carolina At Chapel Hill

Device enrollment in a cloud service using an authenticated application

In various example embodiments, systems and methods for administering machine access to a cloud service are presented. An edge manager device in a cloud computing environment can establish a first client for a first application that is executed externally to the cloud computing environment.
General Electric Company

Method and system for identity-based authentication of virtual machines

A cloud computing system configured to run virtual machine instances is disclosed. The cloud computing system assigns an identity to each virtual machine instance.
Rackspace Us, Inc.

Self-terminating or self-shelving virtual machines and workloads

Methods comprise receiving a request to perform a predefined operation on at least one of a virtual machine and a workload executing on a host in a first cloud computing environment, identifying a set of credentials to access the first cloud computing environment, and initiating performance of the predefined operation on the at least one of the virtual machine and the workload, wherein the predefined operation comprises at least one of: (i) deleting, and (ii) shelving the at least one of the virtual machine and the workload.. .
International Business Machines Corporation

Self-terminating or self-shelving virtual machines and workloads

Systems and computer program products to perform an operation comprising receiving a request to perform a predefined operation on at least one of a virtual machine and a workload executing on a host in a first cloud computing environment, identifying a set of credentials to access the first cloud computing environment, and initiating performance of the predefined operation on the at least one of the virtual machine and the workload, wherein the predefined operation comprises at least one of: (i) deleting, and (ii) shelving the at least one of the virtual machine and the workload.. .
International Business Machines Corporation

Cloud computing simulator

A method for simulating a virtual computing environment includes specifying one or more flavors of resource consumers and one or more flavors of datastores to be provisioned on a tree of hosts for a simulation of a distributed virtualization scheduler. The method also includes generating a tree of hosts for the resource consumers and datastores based on the specified flavors and using a tree generator component of the distributed virtualization scheduler.
Vmware, Inc.

Method and enabling agile development of services in cloud computing and traditional environments

Prepending a name object or setting a type of a software object to a name and prepending a value object to the software object provides inheritance of a name value pattern by the software object to establish particular types or classes of attributes of the software object without modification of the software object itself that is thus strongly typed and accessible by type.. .
International Business Machines Corporation

Cloud computing managing storage resources therein

A cloud computing system and a method therein. The cloud computing system includes: a resource server cluster, where the resource server cluster includes at least two resource servers, each resource server in the resource server cluster has at least one type of resources of computing resources and storage resources, and at least one resource server in the resource server cluster has computing resources and storage resources; a computing resource management module configured to manage the computing resources in the resource server cluster, so as to provide a virtual computing service; and a storage resource management module configured to manage a shared storage resource pool established using the storage resources in the resource server cluster, so as to provide a virtual storage service, where storage resources included in each storage resource pool are from at least two resource servers in the resource server cluster..
Huawei Technologies Co., Ltd.

Call processing method and control apparatus, automatic call distribution apparatus, and agent terminal

Embodiments of the present invention provide a call processing method and control apparatus, an automatic call distribution apparatus, and an agent terminal. The call processing method, which executed by the call control apparatus, includes: receiving, a processing request for a call, and extracting a media connection address and a media capability of an automatic call distribution apparatus; performing, media negotiation based on a media capability of an agent terminal and the automatic call distribution apparatus; and establishing, a media session between the agent terminal and the automatic call distribution apparatus according to a media connection address of the agent terminal, the media connection address of the automatic call distribution apparatus, and a media negotiation result.
Huawei Technologies Co., Ltd.

Monitoring element hierarchies in a cloud computing system

An example method of monitoring elements in a cloud computing system includes partitioning, an address space of a hierarchy of service elements into a plurality of address subspaces managed by a respective plurality of processing nodes. The method further includes receiving time series data from a service element, routing the time series data to a first processing node based on an address of the service element within the hierarchy, and processing the time series data at the first processing node to update metric data maintained for the service element.
Vmware, Inc.

Pre-cloud data protection

The present disclosure includes a method comprising encrypting sensitive data, generating a token comprising a data identifier, tokenizing the encrypted sensitive data, and/or storing the encrypted sensitive data in association with the token to a token vault. Tokenizing may comprise mapping the encrypted sensitive data to the token.
American Express Travel Related Services Company, Inc.

Cloud wan overlay network

A network device obtains credentials of a customer associated with multiple different cloud providers of which the customer is a subscriber, and establishes, using the credentials of the customer, a cloud wide area network (wan) overlay network across multiple different cloud computing networks associated with the multiple different cloud providers. The network device, when establishing the cloud wan overlay network, spins up multiple virtual routers in the cloud resources of the customer at each of the multiple different cloud computing networks, with a different one of the multiple virtual routers being spun up in each of the multiple different cloud computing networks, where each of the multiple different cloud computing networks is associated with a different one of the multiple different cloud providers, and where the multiple virtual routers route data traffic between the different cloud computing networks via the cloud wan overlay network..
Verizon Patent And Licensing Inc.

System and managing virtual hard disks in cloud environments

A system, method, and computer-readable storage medium for managing virtual hard disks in a cloud computing/storage environment are provided. The method includes associating, using a virtual hard disk (vhd) management system of a server device, a plurality of data blocks of a virtual hard disk stored at a cloud vendor to a corresponding plurality of cloud objects.
Ca, Inc.

Secured home network

Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and intended for a destination device of the home network, the destination device comprising a security client. The malware detection logic may establish a secure communication channel between the malware detection logic of the secured device and the security client of the destination device.
Nagravision S.a.

Cloud computing gateway, cloud computing hypervisor, and methods for implementing same

Embodiments of the present invention provide a cloud gateway system, a cloud hypervisor system, and methods for implementing same. The cloud gateway system extends the security, manageability, and quality of service membrane of a corporate enterprise network into cloud infrastructure provider networks, enabling cloud infrastructure to be interfaced as if it were on the enterprise network.
Servicemesh, Inc.

Method, apparatus, and system for implementing software-defined network sdn

This application discloses a method for implementing a software-defined network (sdn), including: receiving, by an sdn controller, virtual network information sent by a cloud computing platform, where the virtual network information includes a correspondence between information about a virtual machine (vm) and information about a server running the vm. The method also includes acquiring, by the sdn controller, physical network information, where the physical network information includes a correspondence between information about a top-of-rack (tor) switch and the information about the server.
Huawei Technologies Co., Ltd.

System and enabling end-user license enforcement of isv applications in a hybrid cloud system

System and computer-implemented method for enabling end-user license enforcement of an application in a hybrid cloud system use data associated with at least one component of a public cloud computing environment of the hybrid cloud system to detect an environment-changing event involving at least one processing entity in the hybrid cloud system. Once the environment-changing event is detected, one or more operating environment identifiers are injected into the processing entity.
Vmware, Inc.

Property models on mobile devices

A method for synchronizing business data in a networked or cloud computing arrangement between a model-based business application server and a client-side computing device, which can operate in either online or offline modes, involves providing, on the client-side computing device, a copy of a property model used on the server-side by the application server to process business data. The method further includes, when the client-side computing device is offline, processing locally stored business data on the client-side computing device with reference to the copy of the property model, and later, when the client-side computing device comes online, synchronizing the locally stored business data on the client-side computing device and business data stored on the application server side..
Sap Se

Techniques for communication in hybrid cloud system

Techniques for communication in a hybrid cloud computing system. The techniques include utilizing cross-origin resource sharing to allow a web-based application to communicate with both a public host computer and a private host computer of the hybrid cloud computing system.
Vmware, Inc.

Extensible support system for service offerings

Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for implementing an extensible support system for multiple service offerings.
International Business Machines Corporation

Dynamic/on-demand packaging as part of deployment

A cloud declarative language is used to configure and reconfigure cloud computing environments. The language includes physical and logical topology declarations as well as cloud operations commands, and allows users to declare commands at multiple topology hierarchies.
Microsoft Technology Licensing, Llc

Packaging tool for first and third party component deployment

A cloud declarative language is used to configure and reconfigure cloud computing environments. The language includes physical and logical topology declarations as well as cloud operations commands, and allows users to declare commands at multiple topology hierarchies.
Microsoft Technology Licensing, Llc

End-to-end automated servicing model for cloud computing platforms

The application is directed to a cloud computing platform. The cloud computing platform includes a memory having instructions stored thereon for managing updates the cloud computing platform.
Microsoft Technology Licensing, Llc

Systems and methods for securely provisioning the geographic location of physical infrastructure elements in cloud computing environments

Systems and methods relating to improved security in cloud computing environments are disclosed. According to one illustrative implementation, a method for provisioning physical geographic location of a physical infrastructure device associated with a hypervisor host is provided.
Virtustream Ip Holding Company Llc

System and real-time processing of medical imaging raw data using cloud computing

The present invention relates to a system and apparatus for managing and processing raw medical imaging data.. .
The United States Of America, As Represented By The Secretary, Dept. Of Health And Human Services

Using images of a monitored scene to identify windows

A camera system includes memory, image sensors, illuminators, and a processor. The processor operates the illuminators and the image sensors in a first mode to capture a two-dimensional image of the scene using light transmitted by the illuminators and reflected from the scene.
Google Inc.

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Method of detecting attacks in a cloud computing architecture

A method and a detection entity for detecting attacks in a system including at least two host servers. Each host server hosts a set of virtual machines.
Orange

Managing user privileges for computer resources in a networked computing environment

Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed.
International Business Machines Corporation

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Discovering and publishing device changes in a cloud environment

A method for discovering and publishing device changes in a cloud computing environment. The method includes scanning, by a processor, a computing environment to detect a multiple computing elements.
International Business Machines Corporation

Migration assessment for cloud computing platforms

Various embodiments provide an assessment tool that enables an automated functional assessment of applications for migration to target cloud computing platforms, such as a platform as a service (paas). The technical capabilities of various types of applications in a traditional non-platform deployment are studied and support for these technical capabilities is evaluated relative to the target platform..
Accenture Global Services Limited

Location based trusted computing nodes in a cloud computing architecture

The invention discloses trusted computing nodes (tcns) configured to control their location and migration of applications run on virtual machines resident thereon. The invention allows a controlled use of cloud computing resources and virtual network functions by sensitive applications.
France Brevets

Method for determining parking spaces and free-parking space assistance system

A method for determining parking spaces, traffic participants ascertaining information about free parking spaces and communicating the information to a cloud computing system, the cloud computing system storing information about the free parking spaces in retrievable fashion in a parking space map, information about the provided parking space being visually presented on a display device of the traffic participant. A computer program and a free parking space assistance system, which are suitable in particular for carrying out the method, are also provided..
Robert Bosch Gmbh

Cloud computing operating system and method

A cloud computing operating system is described. The system, in one aspect, includes a plurality of code encapsulating data structures each configured to define executable code and to define the structure of one or more encapsulating data structures.
Disos Pty Ltd., C/o W.f. Titchener & Co. Pty. Ltd.

System and a multi-tenant datacenter with layer 2 cloud interconnection

Provided is a system and method for a multi-tenant datacenter with layer 2 cloud interconnection. More specifically the multi-tenant datacenter includes a plurality of client systems in a first datacenter each client system having a set of physical infrastructure resources.

Ontology based resource provisioning and management for services

Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services.

Controlled transfer of data over an elastic network

Controlled transfer of data over an elastic network is provided and includes analyzing properties of a set of data for transfer from a source storage location to a target storage location across an elastic cloud computing network as part of a staged transfer of the set of data, assigning transfer queue weightings to data subsets of the set of data based on weighting parameters, the transfer queue weightings dictating order of transfer of the data subsets from the source storage location to the target storage location, and controlling transfer of the data subsets from the source storage location to the target storage location consistent with the transfer queue weightings assigned to the data subsets, the controlling transfer including controlling, based on costs to transfer the data subsets, bandwidth allocation of the elastic cloud computing network and a transfer schedule for the data subsets.. .

Dynamic configuration of network features

Dynamic configuration of network features is provided by performing real-time traffic analysis on network traffic flowing between an elastic cloud computing network and an edge appliance, evaluating effects of modifying elastic network bandwidth allocation and applying network traffic optimizations in routing traffic flowing between the elastic cloud computing network and the edge appliance, and dynamically configuring, based on the real-time traffic analysis and on the evaluating, one or more of (i) elastic network bandwidth allocation from the network service provider or (ii) at least one of the network traffic optimizations for performance by the edge appliance in routing traffic flowing between the elastic cloud computing network and the edge appliance.. .

System and a multi-tenant datacenter with layer 2 cloud interconnection

Provided is a system and method for a multi-tenant datacenter with layer 2 cloud interconnection. More specifically the multi-tenant datacenter includes a plurality of client systems in a first datacenter each client system having a set of physical infrastructure resources.

Precondition exclusivity mapping of tasks to computational locations

Computational tasks are mapped with computational locations in a distributed system such as a cloud computing environment. Mapping does not rely on workload estimates.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.

Policy-based virtual machine selection during an optimization cycle

Systems, methods, and computer program products configured to perform an operation comprising determining that use of a system resource of a first host system exceeds a threshold, wherein the first host system executes a plurality of virtual machines in a cloud computing environment, identifying a first virtual machine, of the plurality of virtual machines, for migration based on a first migration policy, of a plurality of migration policies, wherein the plurality of migration policies specify a respective set of rules for identifying virtual machines for migration, and migrating the first virtual machine to a second host system in the cloud computing environment to reduce the use of the system resource on the first host system.. .

Method and processing alarm information in cloud computing

Disclosed are a method and an apparatus for processing alarm information in a cloud computing. The method includes: establishing a corresponding relation between services and physical resources of nodes at all levels, wherein the physical resources relied on for executing the services; and generating aggregated alarm information based on the corresponding relation between the services and the physical resources when a physical resource or a service gives alarms..
Lecloud Computing Co., Ltd.

Method and system for utilizing spare cloud resources

A cloud computing system including a computing device configured to run virtual machine instances is disclosed. The computing device includes a hypervisor program for managing the virtual machine instances.
Rackspace Us, Inc.

Deploying an application in a multiple cloud computing environments

An example method is provided to deploy an application in multiple cloud computing environments. The method may comprise a computing system generating a first request to deploy an application in a first cloud computing environment according to a first deployment plan and a second request to deploy the application in a second cloud computing environment according to a second deployment plan.
Vmware, Inc.

Maintaining control over restricted data during deployment to cloud computing environments

Releases to the production environment of a cloud computing environment are deployed in a manner that maintains control over restricted data and the data plane of the cloud computing environment. A devops personnel is tasked with developing the release.
Microsoft Technology Licensing, Llc

Virtual machine compliance checking in cloud environments

A method of transferring a virtual machine between a virtualized computing system and a cloud computing system includes determining that a virtual machine is to be transferred from a virtualized computing system to a cloud computing system and determining a connection between a first resource in the virtualized computing system and a second resource in the cloud computing system. Files that enable implementation of the virtual machine at the virtualized computing system and identified, as are file portions of the files for transfer from the virtualized computing system to the cloud computing system.
Vmware, Inc.

Protecting from unintentional malware download

Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application.
International Business Machines Corporation

Incident management to maintain control of restricted data in cloud computing environments

Techniques allow devops personnel to perform incident management for cloud computing environments in a manner that maintains control over restricted data and the data plane. The devops personnel do not have access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data.
Microsoft Technology Licensing, Llc

Deploying an application in a hybrid cloud computing environment

An example method is provided for a computing system in a private cloud computing environment to deploy an application in a hybrid cloud computing environment. The method may comprise generating a request to deploy an application in a public cloud environment, the request including a deployment plan that specifies one or more tasks to be executed by a virtual computing resource from a cloud provider to deploy the application.
Vmware, Inc.

Using discovered virtual-infrastructure attributes to automatically generate a service-catalog entry

A method and associated system of automatically generating an entry of a service catalog of a cloud-computing environment as a function of discovered attributes of a virtual machine provisioned in a non-cloud computing environment. A cloud-management platform of the cloud-computing environment analyzes and compares results of infrastructure-discovery and application-discovery tools that describe a business application or a virtual service provisioned on the virtual machine.
International Business Machines Corporation

System and a cloud computing abstraction with self-service portal for publishing resources

In embodiments of the present invention, improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload.. .
Csc Agility Platform, Inc.

Message broadcasting in a clustered computing environment

Approaches are provided for message broadcasting within a clustered computing environment such as a cloud computing environment. Specifically, a message received from message queue (e.g., on a message queue server) is processed at a single node of a plurality of nodes within the clustered computing environment.
International Business Machines Corporation

Dynamic resources planning mechanism based on cloud computing and smart device

A dynamic resource management method for remote management of resources of resources devices by a cloud server is provided. The method includes: detecting resource-using-statuses of the resource devices to generate using-load parameters for the resources devices according to the resource-using-statuses of the resources devices by control devices installed on the resources devices; timely collecting, by the cloud server, the using-load parameters for the resources devices outputted by the control devices via a network; and upon receiving a using request corresponding to the resources devices from at least one smart device, performing, by the cloud server, a comparison according to the using-load parameters for the resources devices and the using request and performing resource using distribution on the resources devices to obtain resource-use planning based on the comparison result, thereby controlling the operation of the resource devices and replying to the using request of the smart device..
Quanta Computer Inc.

Cloud computing service architecture

A service control system manages a set of containers operating within one or more computing hosts. Containers may access a consistent runtime environment regardless which cloud provider the computing hosts come from.
Rancher Labs, Inc.

Method for monitoring the security of a virtual machine in a cloud computing architecture

One embodiment relates to a method for monitoring the security of a virtual machine hosted by a host system, the virtual machine comprising an operating system communicating with a hypervisor of the host system. The hypervisor interfaces between the operating system and hardware resources of the host system.
Orange

Methods and apparatus to control a virtual machine

Methods and apparatus, to control a virtual machine, include: sending identification of virtual machines within a recovery domain, receiving a request to control one the virtual machines, authorizing the request, and forwarding the request to a virtual machine manager of the one of the virtual machines. Other methods and apparatus, to control a virtual machine, include: sending a request for identification of virtual machines within a recovery domain directly to a cloud computing device without passing the request through another computing device, determining that one of the virtual machines needs to be controlled, and sending a request to control the one of the virtual machines directly to the cloud computing device without passing the request through another computing device..
Nokia Solutions And Networks Oy

Establishing trust within a cloud computing system

A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a common aspect, and a plurality of authentication servers, where an authentication server is associated with one of the plurality of sets of devices based on the common aspect. The cloud computing system functions to establish trust between a corresponding one of the plurality of authentication servers and the one or more devices of one of the plurality of sets of devices, between the corresponding one of the plurality of authentication servers and the cloud system managing unit, and between the cloud system managing unit and the one or more devices.
International Business Machines Corporation

Network resource balancing method and apparatus

A network balancing method and apparatus, where the method includes obtaining, by a processor in a cloud computing platform, identifier information of a virtual machine and identifier information of a domain including virtual machines that are sent by a controller in the cloud computing platform, where a correspondence exists between the identifier information of the virtual machine and the identifier information of the domain including the virtual machines, and after receiving an access request packet, determining, by the processor, the virtual machines in the domain according to the identifier information of the domain in the access request packet, further selecting a virtual machine according to load information of the virtual machines in the domain, and sending the access request packet to the selected virtual machine.. .
Huawei Technologies Co., Ltd.

Service elastic method and apparatus in cloud computing

A service-based elastic method in a cloud environment includes detecting, an elastic event that occurs in running of a service, determining, a node that needs to be elastic and corresponds to the elastic event, determining, according to an identifier of the node that needs to be elastic, a service topology diagram of the service, and an elastic method identifier of the service in a cloud service archive, a connection relationship that needs to be established, and creating and running the newly added node instance according to information of the node that needs to be elastic in the cloud service archive and the connection relationship. The present disclosure, running of a service can be optimized more effectively..
Huawei Technologies Co., Ltd.

Control architecture including a programmable logic controller and a cloud computing system

A control architecture includes at least one programmable logic controller and at least one cloud computing system. An automation program of the controller includes at least one predefined control module.
Schneider Electric Industries Sas

Monitoring cloud computing environments

An example method of monitoring computing resources in a cloud computing environment may include receiving a request to subscribe to a monitoring service with respect to computing resources associated with a user account, the request specifying access information for a cloud computing system comprising a plurality of virtual machines associated with the computing resources. The method may further include monitoring, using the access information, the plurality of virtual machines.
Red Hat, Inc.

Efficient communication within hybrid cloud system

Techniques for communicating between service nodes within a hybrid cloud computing system. These techniques include utilizing a messaging provider within an off-premise computing system to pass messages between off-premise servers holding a connection to an on-premise computer system and off-premise servers holding a connection to an end user computer system..
Vmware, Inc.

System and building, optimizing, and enforcing infrastructure on a cloud based computing environment

A method for building, optimizing, and maintaining a computing infrastructure on a cloud computing environment is provided. A user provides a high-level declaration to a cloud environment operating system, specifying the details of the infrastructure that is intended to be built on the cloud.
Fugue, Inc.

Method and deploying industrial plant simulators using cloud computing technologies

A system and method for operating a remote plant simulation system is disclosed. The system and method uses a light application at the plant to collect relevant data and communicate it to a remote plant simulation.
Emerson Process Management Power & Water Solutions, Inc.

Automatic virtual machine termination in a cloud

Managing a cloud computing environment including a plurality of resources adapted to host at least one virtual machine includes, in a virtual machine, determining a period of inactivity of the operating system for a user of the virtual machine and comparing, using a processor, the period with a defined threshold. From the virtual machine, a virtual machine termination request is sent to the cloud computing environment responsive to the period exceeding the defined threshold..
International Business Machines Corporation

Public cloud system and public resource allocation method

A management center, coupled to a plurality of data centers, which can be included in an open or public cloud computing system. The management center includes a monitoring unit and an allocation unit coupled to the monitoring unit.
Hon Hai Precision Industry Co., Ltd.

Faster ip address allocation in a hybrid cloud environment using subnet selective randomization

Multiple tenants within a hybrid cloud computing system may need ip addresses to communicate over a computer network external to the hybrid cloud system (such as the internet). Ip addresses are a scarce resource, and each address can only be assigned to a single tenant.
Vmware, Inc.

Cloud-based services exchange

In general, a cloud-based services exchange (or “cloud exchange”) for interconnecting multiple cloud service providers with multiple cloud service customers is described. The cloud exchange may enable cloud customers to bypass the public internet to directly connect to cloud services providers so as to improve performance, reduce costs, increase the security and privacy of the connections, and leverage cloud computing for additional applications.
Equinix, Inc.

System and improving integration testing in a cloud computing environment

A system and method for improving integration testing in a cloud computing environment includes collecting one or more input parameters associated with each of one or more products, deployed in cloud computing environment, from one or more external resources and test management systems. The input parameters include one or more defect parameters, user requirements, test parameters or performance parameters associated with the product.
Wipro Limited

Displaying interactive topology maps of cloud computing resources

Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view visualizations using an application platform referred to herein as a cloud computing management application.
Splunk Inc.

Resource planning system for cloud computing

A resource planning system is disclosed for planning reserved instance server requirements for a user of cloud computing services that comprise reserved instance servers and on-demand servers accessible by the user. The system is arranged to receive historical usage data indicative of a historical usage of the cloud computing services by a user, the historical usage data covering a defined time period including a plurality of time units, and the historical usage data including information indicative of a number of server instances that were required by the user in each time unit of the time period.
Singapore Telecommunications Limited

System and automating data generation and data management for a next generation sequencer

A web-based server/cloud computing system for a next generation sequencer (ngs) to integrate data generation, data analysis and data management. When a user intends to sequence a biological sample, the user is asked to login to the ngsinform, select and submits sets of software analysis bioinformatics programs, which schedules the sequencing, quality control, data analysis and management of that data, all done simultaneously and sequentially.
Yotta Biomed, Llc.

Method, system and computer program for cloud based computing clusters for simulated operator training systems

The present invention provides methods, systems and computer programs for implementing a simulation based operator training system on a cloud computing cluster. The invention receives information identifying one or more parameters of an operator training simulation, and retrieves virtual machine (vm) images corresponding to a master vm, operator vm and instructor vm.
Yokogawa Electric Corporation

Security allocation of virtual machines in a cloud computing network

A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a security-aware fashion. The invention solves the cloud user risk problem by inducing a state such that, unless there is a change in the conditions under which the present invention operates, the cloud users do not gain by deviating from the allocation induced by the present invention.
Government Of The United States As Represetned By The Secretary Of The Air Force

Generating and displaying topology map time-lapses of cloud computing resources

Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view visualizations using an application platform referred to herein as a cloud computing management application.
Splunk Inc.

Support to customer platform system, method, and server

The disclosure provides a support to customer platform system, method, and server to serve as a marketing service platform providing various channel functions including sales, planning, technical support, maintenance, and customer management and perform an interactive support service with internet protocol (ip) connected devices based on cloud computing. Accordingly, a vendor may realize a comprehensive support service by applying the embodiments of the disclosure without complicated professional training..
Ruby Tech Corporation

System, method, article of manufacture of mixed reality based, biometrically signed reusable physical financial instrument

The present invention relates to a reusable physical financial instrument and a system and a method for enabling the financial instrument to perform multiple financial transactions. The financial instrument is capable of creating mixed reality experience when it comes in vicinity of the payor or payee device or atm.
Tata Consultancy Services Limited

High-performance computing framework for cloud computing environments

Disclosed are various embodiments for a high-performance computing framework for cloud computing environments. A parallel computing application executable by at least one computing device of the cloud computing environment can call a message passing interface (mpi) to cause a first one of a plurality of virtual machines (vms) of a cloud computing environment to store a message in a queue storage of the cloud computing environment, wherein a second one of the plurality of virtual machines (vms) is configured to poll the queue storage of the cloud computing environment to access the message and perform a processing of data associated with the message.
Georgia State University Research Foundation, Inc.

Method and system for crowd-sourced algorithm development

A system for development of an algorithm for analysis of sensor data includes one or more wearable sensor devices, a smart device, and a cloud computing platform. The sensors in the wearable sensor device produce sensor data (e.g., physiological data) from a user that can be processed by a software algorithm in the wearable sensor device or by a connected smart device (e.g., a smartphone) via cloud computing, producing an algorithm output.
Mc10, Inc.

Methods and systems for multirobotic management

Multirobotic management can involve communications between a command or leader robot and one or more client or follower robots through a cloud computing system. In an example implementation, a leader robot can receive first sensory data captured by a first follower robot and second sensory data captured by a second follower robot, determine a command function based on at least one of the first sensory data and the second sensory data, and communicate with at least one of the first follower robot and the second follower robot based on the command function..
X Development Llc

Flow imaging and monitoring for synchronized management of wide area drainage

A flow imaging and monitoring system for synchronized management of wide area drainage that includes an interposer for supporting monitoring and management equipment in a manhole, a module for illuminating water flowing in pipes at the base of the manhole, a module for monitoring responses to reflected light, a sealed and rechargeable battery pack, and a data analysis and management system to interpret data streams in real time. The interposer can be adjusted to fit the diameter of the manhole and can be adjusted to be placed under the manhole cover.
Urbanalta Corp

Cloud image renderer

Cloud image rendering may be provided. First, a first request for a multi-layered image may be received.
Cisco Technology, Inc.

Method and detecting security anomalies in a public cloud environment using network activity monitoring, application profiling and self-building host mapping

The disclosed computer-implemented method for detecting security anomalies in a public cloud environment using network activity monitoring, application profiling, and self-building host mapping may include (1) collecting host information that identifies (a) at least one communication channel that has previously facilitated communication between at least one host computing platform within a cloud computing environment and at least one additional computing platform and/or (b) at least one application that has previously run on the host computing platform, (2) monitoring network traffic involving the host computing platform, (3) detecting, while monitoring the network traffic, network activity that is inconsistent with the collected host information, and then (4) determining that the detected network activity represents a potential security threat within the cloud computing environment due at least in part to the detected network activity being inconsistent with the collected host information. Various other methods, systems, and computer-readable media are also disclosed..
Symantec Corporation

Type-to-type analysis for cloud computing technical components with translation through a reference type

cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge.
Accenture Global Services Limited

Type-to-type analysis for cloud computing technical components with translation scripts

cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge.
Accenture Global Services Limited

Distributed neural networks for scalable real-time analytics

Techniques related to implementing distributed neural networks for data analytics are discussed. Such techniques may include generating sensor data at a device including a sensor, implementing one or more lower level convolutional neural network layers at the device, optionally implementing one or more additional lower level convolutional neural network layers at another device such as a gateway, and generating a neural network output label at a computing resource such as a cloud computing resource based on optionally implementing one or more additional lower level convolutional neural network layers and at least implementing a fully connected portion of the neural network..
Intel Corporation

Acquiring information dynamically regarding a hardware component in the cloud computing system while on the floor of the data center

A method, system and computer program product for managing hardware components in a cloud computing environment. A mobile device captures an image of a bar code placed on a rack that is associated with an identifier that references an internet resource of the management software that manages the rack.
International Business Machines Corporation

Predictively provisioning cloud computing resources for virtual machines

Methods, computer program products, and systems are presented. The methods include, for instance: predictively provisioning, by one or more processor, cloud computing resources of a cloud computing environment for at least one virtual machine; and initializing, by the one or more processor, the at least one virtual machine with the provisioned cloud computing resources of the cloud computing environment.
International Business Machines Corporation

Mechanism and constraint based fine-grained cloud resource controls

A method implemented in a network element (ne) configured to operate as a rest server, the method comprising receiving, through a receiver, a constraint from a rest client, wherein the constraint relates an independent control variable to a derived control variable, wherein the derived control variable is mapped to a first cloud computing resource employed by a cloud computing implementation; receiving, through the receiver, an independent value for the independent control variable from the rest client; computing, via a processor coupled to the receiver, a derived value for the derived control variable based on the constraint and the value for the independent control variable; determining, via a processor, a first instruction regarding the first cloud computing resource based on the derived value; and altering, via a resource controller coupled to the processor, one of a plurality of first behaviors of the first cloud computing resource based on the first instruction.. .
Futurewei Technologies, Inc.

Method to configure network bonds as a port on an integration bridge for a virtualized multilayer switch

Techniques are disclosed for configuring a physical computing system (e.g., in a cloud computing network) to connect a network bond with a virtual multilayer switch. An operating system process executing in the physical computing system receives a selection of one or more network interfaces.
International Business Machines Corporation

Method to configure network bonds as a port on an integration bridge for a virtualized multilayer switch

Techniques are disclosed for configuring a physical computing system (e.g., in a cloud computing network) to connect a network bond with a virtual multilayer switch. An operating system process executing in the physical computing system receives a selection of one or more network interfaces.
International Business Machines Corporation

Personal cloud case cover with a plurality of modular capabilities

A personal cloud contained in a case for a portable computing device such as a tablet personal computer (pc), mobile phones, portable media players, or the like. The personal cloud case may be fitted with memory, a network connection, two-way wireless charging, external memory slots, external connections and other components for portable personal cloud computing..
Micro Mobio Corporation

Action execution architecture for virtualized technical components

cloud computing technical components are provisioned into many different service platforms provided by many different service providers. Once provisioned, it is often the case that actions need to be performed against the technical components.
Accenture Global Services Limited

Secure virtual network platform for enterprise hybrid cloud computing environments

Clusters of virtual network switches (vns) and controllers are provided. The controller cluster is connected to the vns cluster which is between first and second network domains.
Zentera Systems, Inc.

Fair decentralized throttling in distributed cloud-based systems

A cloud availability manager configured to execute a recovery workflow that fails over one or more virtual machines (vms) to and from a cloud computing system. In doing so, the cloud availability manager typically performs multiple operations for each vms.
Vmware, Inc.

Linking instances within a cloud computing environment

Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (gui or the like), and associated with a set of rules.
International Business Machines Corporation

Resource exchange service transaction for cloud computing

A method, a computer program product, and a computer system for exchanging cloud resources between tenants. A mediator system receives from a user a request for a cloud resource, aggregates the cloud resource from one or more of the tenants, and replies the request for a cloud resource with a description of the cloud resource.
International Business Machines Corporation

Enterprise connectivity to the hybrid cloud

A cloud computing system retrieves routing entries associated with a particular tenant of the cloud computing system and are a subset of a routing table of the entire cloud computing system. The routing entries are loaded into a networking switch, which is configured to route network packets using the loaded subset of routing entries, using a general-purpose processor rather than a costly dedicated asic..
Vmware, Inc.

Routing optimization for inter-cloud connectivity

A cloud computing system may include multiple cloud data centers. A gateway may establish connections between a cloud providers' multiple data centers using knowledge about the types of applications workloads executing within the cloud computing system, and may be further based on determines policies indicating priorities for routing traffic for the application workloads..
Vmware, Inc.

Multi-spoke connectivity of private data centers to the cloud

A hybrid computing system includes an on-premise data center and a cloud computing system. To connect between an organization's multiple data centers, a gateway may instead utilize the connections between the private data center and the cloud computing system rather than a direct connection to the other of the organizations' data centers..
Vmware, Inc.

Framework for provisioning network services in cloud computing environment

This disclosure relates generally to provisioning network services in a cloud computing environment, and more particularly to framework for provisioning network services in a heterogeneous cloud computing environment. In one embodiment, the disclosure includes a network as a service (naas) layer under a cloud provisioning platform.
Tata Consultancy Services Limited

Optimizing connectivity between data centers in a hybrid cloud computing system

Connectivity between data centers in a hybrid cloud system having a first data center managed by a first organization and a second data center managed by a second organization, the first organization being a tenant in the second data center, is optimized. According to the described technique, a path-optimized connection is established through a wide area network (wan) between a first gateway of a first data center and a second gateway of a second data center for an application executing in the first data center based on performance of paths across a set of internet protocol (ip) flows.
Vmware, Inc.

Quantitative metrics for assessing status of a platform architecture for cloud computing

An architecture for realizing a customer system on a cloud computing platform is defined in terms of a plurality of architecture types, each type (at) defined by plural architecture type units (atus), each atu comprising a set of atu details. The atu details are ordered into a series of discrete stages.
Salesforce.com, Inc.

System, method, and data access in a cloud computing environment

A data access method in a cloud computing environment is disclosed. The method may comprise, in a service object space of the cloud computing environment, receiving a request of a user for accessing a data package, the request including a user identification, determining a service object space of the data package corresponding to the request, and providing the data package to the user according to the service object space of the data package and the user identification..
Alibaba Group Holding Limited

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.
International Business Machines Corporation

Hybrid task framework

Techniques for executing jobs in a hybrid cloud computing system. A job defines multiple states and tasks for transitioning between states.
Vmware, Inc.

Hybrid infrastructure provisioning framework tethering remote datacenters

Techniques are disclosed for deploying and maintaining appliances in a hybrid cloud computing system which includes an on-premise data center and a public cloud computing system configured to provide a common platform for managing and executing virtual workloads. Appliances to be deployed may include those required (or useful) for hybrid operations, including a cloud gateway appliance, a wide area network (wan) optimizer, a layer 2 (l2) concentrator, and a mobility agent that handles virtual machine (vm) migration traffic.
Vmware, Inc.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.
International Business Machines Corporation

Wireless intelligent ultrasound fetal imaging system

A wireless intelligent ultrasound fetal imaging system includes an ultrasound transducer, an ultrasound afe module, a zynq module, a machine vision module and a mobile terminal. The ultrasound transducer transmits ultrasound wave toward a pregnant mother's fetal, and receives echo wave from the fetal.
Aningbo Youchang Ultrasonic Technology Co.,ltd

Method, apparatus and system pertaining to cloud computing

The present disclosure outlines a system, method, and apparatus for the design of network services, including the automatic sourcing an aggregatng of data on the available resources. In a further aspect, the present disclosure outlines a system, method, and apparatus for the allocation of cloud resources.
Anuta Networks, Inc.

System, method, and software for providing access control enforcement capabilities in cloud computing systems

According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager.
Ca, Inc.

Allocation of cloud computing resources

The invention concerns a method, arrangement (26), computer program and a computer program product for allocating physical cloud computing resources (12, 16, 18) to processes, where at least some of the cloud computing resources (12, 16, 18) have different ages, said cloud computing resources (12, 16, 18) having individual primary failure probabilities, each being based on an age dependent failure probability function of the cloud computing resource. The receives requests for performing computational tasks for a number of processes, where the processes have different process priorities, investigates the availability of the cloud computing resources for performing the tasks of the requests, and assigns the available cloud computing resources to the based on the process priorities, where processes with the highest process priorities are assigned to the cloud computing resources (12, 16, 18) having the lowest primary failure probabilities..
Telefonaktiebolaget Lm Ericsson (publ)

System and streamlined registration and management of products over a communication network related thereto

The system and method of the present invention to provide at least one unique identification code (uid) registration center comprises of plural authorized parties' account. Each account comprises at least one product data file with uid, in which uid is associated with a product, to enable over at least one communication network (such as cloud computing), to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item, including ownership right related to the product transfer between each party, etc.

Gaze-directed content delivery

Methods and systems may provide for associating content in a cloud computing infrastructure with geo-panes and sending it to a location aware device based on user gaze. The content may be restricted by rules, including distance from user to the geo-pane.
Intel Corporation

System and managing heterogeneous data for cloud computing applications

A method, system, and computer-readable storage medium for managing heterogeneous data for cloud computing applications are disclosed. For example, a method involves identifying data to be used by an application.
Nimbix, Inc.

Method and device for managing resources with an external account

Method and device for managing cloud computing resources with an external account, the resources being associated with one or more internal main accounts. The method includes verifying an identity of the external account via a server, determining, if the identity of the external account is verified, whether a virtual sub-account is bound to the external account, the virtual sub-account being subordinate to an internal main account of the one or more internal main accounts, and allowing, if it is determined that the virtual sub-account is bound to the external account, the external account to manage the resources associated with the internal main account based on pre-configured rights of the virtual sub-account..
Alibaba Group Holding Limited

Automatic determination of device specific interoperability

Device specific interoperability is provided automatically utilizing remote service and/or cloud computing. Functionality of devices like mobile phones is tested to ensure that the device is properly configured to work with infotainment systems by using the phone to connect with the cloud services..
Microsoft Technology Licensing, Llc

Data backup and transfer across multiple cloud computing providers

Data may be stored across the clouds of multiple cloud computing providers to improve data security. Software infrastructure components of an original cloud computing provider storing data via a first virtual machine (vm) may be identified.
Whp Workflow Solutions, Llc

Dynamic provisioning of a virtual storage appliance

Systems, methods, and apparatus for facilitating dynamic provisioning of a virtual storage appliance in a cloud computing environment are presented herein. A storage system management component can provision storage from a storage medium to facilitate access of at least a portion of the storage by a virtual storage appliance (vsa) based on a request for at least one resource associated with the vsa.
Os Nexus, Inc.

System and key management and user authentication

A system and method are presented for key management and user authentication. Secure ssh access may be performed through a public/private set of ssh keys where a user uploads a public ssh key to a key management application.
Interactive Intelligence Group, Inc.

Secure comparison of information

The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in particular an asymmetric method of secure computation that relies on the private-key/public key paradigm with homomorphic encryption.
Openeye Scientific Software, Inc.

Smart shift selection in a cloud video service

A cloud-based network service provides intelligent access to surveillance camera views across multiple locations and environments. A cloud computing server maintains a database of time periods of interest captured by the cameras connected to the network.
Pelco, Inc.

System and remote fax interconnect technology

The present invention provides systems and methods for the virtualization, aggregation, and distributed processing of facsimile communications. The remote fax interconnect known as etherfax® is a system and method that allows for the reception and delivery of information based on cloud computing infrastructure to or from one or more facsimile systems using internet/web based communication protocols such as http(s) as the transport between a facsimile capable application or hardware and the remotely accessible etherfax® services..
Etherfax, Llc

Method and configuring redundancy solution in cloud computing architecture

The present invention relates to the field of communications and information technologies, and in particular, to a method and an apparatus for configuring a redundancy solution in a cloud computing architecture, so as to solve a problem that a manner of manually planning a redundancy solution has poor flexibility and is unfavorable to overall management of a system. The method in the present invention includes: receiving a redundancy solution configuration request; determining, according to the redundancy solution configuration request, redundancy capability information and redundancy constraint requirement information of an application object to be configured; and determining, according to infrastructure information, infrastructure manager information, and application object information in an established redundancy capability information base, and the redundancy capability information and the redundancy constraint requirement information of the application object to be configured..
Huawei Technologies Co., Ltd.

Virtual zones for open systems interconnection layer 4 through layer 7 services in a cloud computing system

Concepts and technologies disclosed herein are directed to virtual zones for open systems interconnection (“osi”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone.
At&t Intellectual Property I, L.p.

Fast provisioning service for cloud computing

A cloud-based system and method for provisioning it infrastructure systems is disclosed. The system and method provided constructs an infrastructure generally comprised of a processing component supplying the computational capacity for a platform element, comprising one or more processing elements, memory and i/o subsystems, a storage component utilizing commodity disk drives and comprised of one or more physical storage devices, and a network component providing a high speed connection among processing elements and the processing component to storage components.
Digital River, Inc.



Cloud Computing topics:
  • Cloud Computing
  • Communications
  • Short Message Service
  • Internet Of Things
  • Data Processing
  • Data Storage
  • Mobile Phone
  • Addressing
  • Network Device
  • Virtualization
  • Distributed
  • Instruments
  • Executable
  • Database Server
  • Third Party


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Cloud Computing for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cloud Computing with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.4365

    file did exist - 13071

    1 - 1 - 251