Follow us on Twitter
twitter icon@FreshPatents


Cloud Computing patents

      

This page is updated frequently with new Cloud Computing-related patent applications.




 Trainable transceiver and cloud computing system architecture systems and methods patent thumbnailTrainable transceiver and cloud computing system architecture systems and methods
A system for installation in a vehicle and for controlling a device, the system including a trainable transceiver, communications electronics, and a processing circuit coupled to the trainable transceiver and the communications electronics. The processing circuit is configured to train the trainable transceiver to control a device using information received from a cloud computing system remote from the device and vehicle via the communications electronics..
Gentex Corporation


 Method and system for managing and displaying product images with progressive resolution display patent thumbnailMethod and system for managing and displaying product images with progressive resolution display
A method and system displaying and managing images of consumer products with cloud computing. One or more consumer products are selected.

 Cloud system for controlling outdoor grill with mobile application patent thumbnailCloud system for controlling outdoor grill with mobile application
Embodiments are directed to communicating with and controlling operation of electronically-controlled appliances. In one scenario, a computer system receives a first input from a computing system indicating that an electronically-controlled appliance is permitted to communicate with a cloud computing platform.
Traeger Pellet Grills, Llc


 Cloud tabs patent thumbnailCloud tabs
The presently disclosed techniques related to data transfer and synchronization between multiple electronic devices. The multiple electronic devices may be logged onto a user's account with a cloud computing service so that they may transfer data relating to websites that they have accessed to the cloud computing service so that such data may be synchronized amongst the multiple electronic devices.
Apple Inc.


 Technologies for deploying dynamic underlay networks in cloud computing infrastructures patent thumbnailTechnologies for deploying dynamic underlay networks in cloud computing infrastructures
Technologies for deploying dynamic underlay networks in a cloud computing infrastructure include a network controller of the cloud computing infrastructure communicatively coupled via disaggregated switches to one or more compute nodes of the cloud computing infrastructure. The network controller is configured to receive tenant network creation requests from a cloud operating system (os) of the cloud computing infrastructure indicating that a tenant network is to be created in the cloud computing infrastructure (e.g., for a new tenant of the cloud computing infrastructure).

 Systems for improving performance and security in a cloud computing system patent thumbnailSystems for improving performance and security in a cloud computing system
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key.
Egnyte, Inc.


 Methods for improving performance and security in a cloud computing system patent thumbnailMethods for improving performance and security in a cloud computing system
Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key.
Egnyte, Inc.


 Apparatus and  verifying cloud service compatibility patent thumbnailApparatus and verifying cloud service compatibility
Disclosed herein are an apparatus and method for verifying cloud service compatibility. The apparatus includes a cloud service description management unit, a cloud service relationship analysis unit, a schema mapping information management unit, an interoperability verification unit, and a data portability verification unit.
Electronics And Telecommunications Research Institute


 Scaling persistent connections for cloud computing patent thumbnailScaling persistent connections for cloud computing
Examples relate to scaling persistent connections for cloud computing. In some examples, a data packet is used to determine connection information of the first connection.
Hewlett Packard Enterprise Development Lp


 Protecting dynamic and short-lived virtual machine instances in cloud environments patent thumbnailProtecting dynamic and short-lived virtual machine instances in cloud environments
The present disclosure relates to protecting temporary virtual machine instances in a cloud computing platform from security risks. An example method generally includes monitoring a cloud platform for the assignment of a temporary virtual machine instance to a workload.
Symantec Corporation


Encryption and decryption of data in a cloud storage based on indications in metadata

Provided are a method, a system, and a computer program product in which metadata associated with encrypted data is maintained in a cloud computing environment, wherein the metadata indicates whether reading of information in the encrypted data is restricted geographically. A controller provides a decryption code for decrypting the encrypted data to a cloud server located in a geographical location, based on whether the metadata indicates whether the reading of information in the encrypted data is restricted geographically..
International Business Machines Corporation

System and secure cloud computing

In a method for secure cloud computing, a virtual machine (vm) associated with a client is executed at a computer within a trusted computing cloud. An image including state information of the vm is obtained; storage of the image is arranged; a freshness hash of the image is determined; and the freshness hash is sent to the client.
Virtustream Ip Holding Company Llc

Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request.
International Business Machines Corporation

System, method, and recording medium for performance management of a service for a database as a service

A performance management method, system, and non-transitory computer readable medium for a service for database as a service (dbaas) in a cloud computing environment, include a receiving and comparing circuit configured to receive a service request from a user and compare the received service request to at least one prior received service request, a similarity calculating circuit configured to calculate a similarity between the service request and the at least one prior received service request based on a requirement that the service request places on the dbaas, and a data verifying circuit configured to verify whether information within the database of the dbaas has changed since an identical prior received service request based on the receiving and comparing circuit identifying the identical prior received service request.. .
International Business Machines Corporation

Migration of network entities to a cloud infrastructure

A method for migrating network entities to a cloud computing infrastructure includes receiving an indication of at least one node of a plurality of nodes to migrate from an enterprise network to a cloud computing infrastructure, identifying one or more related nodes of the plurality of nodes that have direct and indirect communication relationships with the indicated node, and adding the indicated node and at least one node of the related nodes for the indicated node to a migration group. The method includes preparing a migration-configuration file for each node of the migration group, the migration-configuration file comprising service level agreement (sla) information, deploying a migration agent to each node of the migration group, and migrating the migration group to the cloud computing infrastructure, wherein each node of the migration group is migrated using a corresponding migration-configuration file to generate an sla for each node of the migration group with a provider of the cloud computing infrastructure in view of sla information from the corresponding migration configuration file..
Red Hat, Inc.

Efficient vm migration across cloud using catalog aware compression

Techniques for migrating a vm in a hybrid cloud computing system are provided. The techniques include identifying a similar vm at the destination, comparing dictionaries for the vm to be transmitted and the similar vm, and compressing the vm based on the comparison.
Vmware, Inc.

Designer tool for managing cloud computing services

Embodiments of facilitating creation of cloud computing applications are disclosed therein. In one embodiment, a method includes receiving user input of a plurality of workflow items as a sequence of graphical objects on a graphical user interface.
Microsoft Technology Licensing, Llc

Cloud computing service catalog

Provided in an example is a cloud computing service catalog which enables a cloud computing user to prepare and implement a blueprint of service items across multiple different clouds of computing resources. An example method includes discovering a plurality of computer resources which are available from at least one of a first platform and a second platform, and receiving data describing a plurality of service items.
Cloudbolt Software Inc.

Cloud computing configuration form generator

Provided are examples of cloud computing form generators which enable data-driven configuring of cloud computing resources. A configuration form is generated, for example, by an administrator, based at least in part on computing resources available from two or more disparate computing clouds and preconfiguring objects available from the two or more disparate computing clouds.
Cloudbolt Software Inc.

Hybrid cloud operation planning and optimization

Resource usage is monitored for a hybrid cloud computing environment having on-premises computing resources and off-premises computing resources, for at least a first time period. For the time period, the amount of the on-premises computing resources and off-premises computing resources are related to the demand for computing services from the environment.
International Business Machines Corporation

Systems and methods of reading and processing change-of-address forms in a cloud-based architecture

A method for processing change-of-address (coa) forms. The method includes capturing a first image of a first coa form.
Siemens Industry, Inc.

Data movement among distributed data centers

Embodiments of the present disclosure provide a method and an apparatus for data movement among distributed data centers in a peer network. The method comprises: reducing an amount of data to be moved by pre-processing the data; generating a torrent file for the data; distributing the torrent file to a peer data center, and in response to receiving a data request from the peer data center, transmitting a segment of the data to the peer data center.
Emc Ip Holding Company Llc

Systems and methods of enforcing multi-part policies on data-deficient transactions of cloud computing services

The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata..
Netskope, Inc.

Method, apparatus and system for processing attack behavior of cloud application in cloud computing system

An apparatus for processing an attack behavior of a cloud application in a cloud computing system, including a policy manager configured to store a security determining rule and a malicious application processing rule, a security analyzer configured to receive application behavior data from a security detector, and send the application behavior data to a security processor when the cloud application running on the cloud host has an attack behavior, and the security processor is configured to invoke, according to the malicious application processing rule, an interface provided by a cloud controller in order to process the cloud application having an attack behavior. The apparatus performs security protection based on an application level of cloud computing, which can prevent mutual attack between different applications on a same host, and reduce impact on a normal application..
Huawei Technologies Co., Ltd.

Middle ware security layer for cloud computing services

The technology disclosed relates to enforcing multi-part policies on data-deficient transactions of independent data stores. In particular, it relates to combining active analysis of access requests for the independent object stores with inspection of objects in the independent object stores, each of the analysis and inspection generating and persisting object metadata in a supplemental data store, actively processing data-deficient transactions that apply to the objects by accessing the supplemental data store to retrieve object metadata not available in transaction streams of the data-deficient transactions, and actively enforcing the multi-part policies using the retrieved object metadata..
Netskope, Inc.

System for support in the event of intermittent connectivity, a corresponding local device and a corresponding cloud computing platform

A system wherein a request can be processed both in a cloud service and autonomously or locally via a client, and a monitoring of the network quality, for example, the presence of delay, is carried out, and wherein, depending on the current accessibility of the cloud platform, optionally a local alternative calculation is carried out, which may be slower or, for example in the event of real-time requirements, is of a lower quality than the corresponding cloud service, and the result thereof is then temporarily used alternatively by the client is provided. In this way, cloud services can be locally buffered, thereby cushioning connection interruptions between end device and cloud platform, whereby cloud services can be used in a transparent manner for the user and, even in the event of connection interruptions..
Siemens Aktiengesellschaft Ü

Systems and methods for management of cloud computing resources for information systems

The system and methods described herein provide for dynamic provisioning of computing resources for an enterprise resource planning system. The dynamic provisioning system provisions an original configuration of computing resources upon selection from a client device, and then provides for further dynamic provisioning by evaluating the real-time performance of the erp system or by analyzing historical performance and consumption information of the erp system or by using a combination to predict the anticipated stress on the computing resources placed by future performance of the erp system..
Velocity Technology Solutions, Inc.

Master data management for a cloud computing system

Some embodiments provide a program that receives, from a first system, a copy of master data. The program also receives a master data modification rule.
Sap Se

Information security realizing method and system based on digital certificate

A digital certificate based information security realization method and system are provided. The method includes: separately issuing a digital certificate for a cloud management host, a physical cloud computing host and a virtual cloud computing machine; and carrying out a compliance authentication according to a corresponding digital certificate when the cloud management host, the physical cloud computing host and the virtual cloud computing machine start up or are in the running process.
Zte Corporation

Device and system for controlling secure key access using an internet-connected key box device

A system for controlling key access using a phone and internet-connected key box device. The key box device hangs or mounts on a fixture and controls key access to visitors.

Blending enterprise content and web results

Web search results and enterprise search results are combined into a single presentation. A search query is received from a user associated with a tenant of an enterprise cloud computing platform.
Microsoft Technology Licensing, Llc

Secure migration of virtual machines from source to target and transfer of vm descriptor and keys between physical servers

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Reallocating resource capacity among resource pools in a cloud computing environment

In general, the embodiments of the present invention provide an approach for rebalancing/reallocating cloud resource capacities between resource pools that provide variable customer assurances and delivery penalties when assurances are not met. The variables that are considered hereunder include, overall ‘reservations’, total current capacity, remaining capacity against unused reservations and penalties that apply for failing to satisfy ‘reservation’ commitments.
International Business Machines Corporation

Granular permission assignment

A system and method for storing role definitions for cloud provider systems, receiving a first request to assign a user to a first role specifying a first cloud computing resource of a respective resource type, identifying a role definition corresponding to the first role that includes an action set permitted, and creating the first role for the user on the first cloud computing resource by associating the identified role definition with the first cloud computing resource and the user. A second request to assign the user to a second role is received specifying a second cloud computing of the respective resource type, and the second role is created for the user on the second cloud computing resource, where the identified role definition corresponds to the first and second roles, and wherein creating the second role includes associating the identified role definition with the first cloud computing resource and the user..
Red Hat, Inc.

System and communicating with retail customers with a sustainability standard

A cloud computing system and method for communicating product and source information with retail customers with a sustainability standard is disclosed. The system may include a server system with a processor system, a communications interface, a communications system, an input system and an output system, the server system having access to a communications network, a memory system with an operating system, a communications module, a web browser module, a web server application which communicates product and source information with retail customers with a sustainability standard using non-transitory storage media and a website with a plurality of web pages to track and communicate product and source information with retail customers with a sustainability standard..

Network transmitting data in a network system

A network system, and a method of use thereof, includes a first network subscriber arranged in an automation network of an automation system, a second network subscriber having a cloud computing infrastructure, and a communication unit for transmitting acquired data from the first network subscriber to the second network subscriber. The communication unit includes a first interface, which is configured as an input/output module and connected to the first network subscriber, and a second interface, which is configured as an agent and connected to the second network subscriber..
Siemens Aktiengesellschaft

Just-in-time access based on screening criteria to maintain control of restricted data in cloud computing environments

A jit service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for devops personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When jit access to a resource is requested by a devops device, the jit service retrieves a jit policy for the resource that includes screening criteria limiting automatic granting of jit access to devops personnel who meeting the screening criteria.
Microsoft Technology Licensing, Llc

Just-in-time access based on geolocation to maintain control of restricted data in cloud computing environments

A jit service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for devops personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When jit access to a resource is requested by a devops device, the jit service retrieves a jit policy for the resource that includes geolocation criteria limiting the geolocation from which jit access can be automatically granted.
Microsoft Technology Licensing, Llc

System and providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment

A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and trigger data is generated.
Intuit Inc.

Method and system of a cloud-based multipath routing protocol

In one aspect, a computerized system useful for implementing a cloud-based multipath routing protocol to an internet endpoint includes an edge device that provides an entry point into an entity's core network. The entity's core network includes a set of resources to be reliably accessed.

Cloud compute scheduling using a heuristic contention model

Technologies for contention-aware cloud compute scheduling include a number of compute nodes in a cloud computing cluster and a cloud controller. Each compute node collects performance data indicative of cache contention on the compute node, for example, cache misses per thousand instructions.
Intel Corporation

Supplementing network flow analysis with endpoint information

Techniques are disclosed for facilitating analysis of cloud activity. A cloud activity analysis agent may run within a virtual machine in a cloud computing environment to collecting information regarding computing activity within the virtual machine.
Ziften Technologies, Inc.

Secure provisioning of operating systems

Methods, media, and systems for secure provisioning of servers within a cloud computing environment are provided for herein. In some embodiments, a management service can delegate provisioning of a server of the cloud computing environment to an imaging service.
Microsoft Technology Licensing, Llc

Determination of data object exposure in cloud computing environments

Embodiments disclosed herein provide systems, methods, and computer readable media for indicating data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving information about a data object from the cloud computing environment.
Palo Alto Networks, Inc.

Methods and systems for facilitatng communications with storage

cloud computing platforms having computer-readable media that perform methods for facilitating communications with storage. A request having a first-interface format to access storage is intercepted.
Microsoft Technology Licensing, Llc

Method and system for in-situ identification of working fluids

A system for in-situ identification of a working fluid disposed in at least one piece of equipment, the system including: a working fluid reservoir that contains the working fluid; an in-situ sensor disposed in the working fluid reservoir such that it detects properties of the working fluid or computes properties from the generated spectra of the working fluid; a transmitter that transmits the detected spectra of the working fluid and equipment identification information; and a cloud computing system that receives the detected spectra and the equipment identification information transmitted from the transmitter, wherein the cloud computing system compares the spectra and equipment identification information against a reference database to determine whether or not the spectra of the working fluid substantially matches the stored reference spectra associated with the expected or specified fluid for the equipment.. .
Exxonmobil Research And Engineering Company

System and confirmation of information

A system for information confirmation using a cloud computing platform to provide a service by which an individual's video recorded and fingerprint authenticated sworn affidavit or statement called a “confirmation” can be given upon request of another individual and stored in a third party service provider's cloud based vault for future retrieval in the case of any legal or other forms of action that may need to be taken in the future.. .

System and masking and computing on masked data in a data store

Various embodiments are disclosed for efficiently masking a data set using sparse associative array representations, such that various computations may be performed directly on the masked data set in a data store with low computational overhead. Some embodiments may include transforming a data set into a sparse associative array representation (e.g., a sparse matrix table or graph) and masking the various components of the sparse associative array representation (e.g., row keys, column keys, values) to generate a masked associative array representation using different masking schemes.
Massachusetts Institute Of Technology

Systems and methods for managing digital data in a fault tolerant matrix

Aspects of the present disclosure relate to systems and methods for automatic management of digital data volumes logically maintained in a dynamically scalable fault tolerant matrix. The data volumes may be distributed across a cluster of connected server nodes included in a cloud computing architecture.

Effective and efficient virtual machine template management for cloud environments

Techniques are provided for reducing the amount of data that to be transferred in a hybridcloud system in order to spawn a vm at a private cloud computing system from a template library stored in a public cloud computing system. Instead of storing full virtual machine templates, template libraries at the public cloud computing system are “differential” libraries.
Vmware, Inc.

Multi-level cloud computing system

A cloud computing system includes a physical resource pool that includes a number of information processing devices. Each information processing device includes a processor, a computer-readable medium, and a network interface.
Rackspace Us, Inc.

Quantum computing as a service

A cloud computing architecture and system for interaction with and use of quantum processing devices is presented. In one aspect, the invention comprises a unified platform as a service for interacting with various quantum processing devices.
Qc Ware Corp.

All-connected by virtual wires network of data processing nodes

Embodiments of the present disclosure generally relate to a cloud computing network and a method of transferring information among processing nodes in a cloud computing network. In one embodiment, a cloud computing network is disclosed herein.
Hgst Netherlands B.v.

Assessing a service offering in a networked computing environment

An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user.
International Business Machines Corporation

Secure electronic transaction

Computing systems, methods and tools for performing a secure electronic transaction between buyer and merchant. The transaction being able to be implemented without either party having to transmit confidential information between the parties of the transaction.
International Business Machines Corporation

Massively scalable object storage system

Several different embodiments of a massively scalable object storage system are described. The object storage system is particularly useful for storage in a cloud computing installation whereby shared servers provide resources, software, and data to computers and other devices on demand.
Rackspace Us, Inc.

Cloud-based platform instrumentation and monitoring system for maintenance of user-configured programs

Systems and methods for using instrumentation for maintaining user-configured programs in a cloud computing environment are herein disclosed as comprising, in an implementation, intercepting operation data pertaining to the user-configured program, including a start time, an execution time interval, and an origin of the operation, canonicalizing the intercepted operation data by stripping operation-specific variable data from the operation data, aggregating the canonicalized operation data based on the start time, the canonicalized operation data, and the origin of the operation, and storing the aggregated operation data within a time series database in the execution time interval based on the start time.. .
Servicenow, Inc.

On-demand mailbox synchronization and migration system

A system for managing physical and logical resources to provide on-demand synchronization or migration of mailboxes and their corresponding content. Physical resources are managed by automatically assigning mailbox processing tasks to either reserved computing resources, or computing resources dynamically obtained from cloud computing services.
Bittitan Inc.

Synchronization an interconnection network using parallel-headerless tdma routing

Embodiments of the present disclosure generally relate to a cloud computing network, or datacenter network, and a method of transferring information among processing nodes in a cloud computing network or datacenter. The network may include a hub that is coupled to a plurality of nodes so that data is transferred between nodes through the hub.
Hgst Netherlands B.v.

Event processing via industrial asset cloud computing system

Systems and methods are presented for receiving, at a server computer associated with an industrial asset cloud computing system, a command representing an event, from a mobile device of a plurality of mobile devices, the command comprising instructions for changing a data object in a data domain, determining, a command processor responsible for processing the command, and routing the command to the command processor responsible for processing the command, wherein the command processor accesses the data domain associated with the command to change the data object in the data domain according to the instructions of the command. Systems and methods are further presented for detecting, by the server computer, a state change in the data domain indicating that the data object has been changed, and preparing the changed data object to be consumed by mobile devices operated by users authorized to access the data object..

Message processing method and apparatus, and message processing system

A message processing method and apparatus on a cloud computing platform, and a message processing system on a cloud computing platform are provided. In the message processing method, after an input request message sent to an active server and a standby server is received, the input request message is sent to all active servers and standby servers.
Huawei Technologies Co., Ltd.

User abstracted rbac in a multi tenant environment

Role based access control (rbac) identity management tools, computing systems, computer products and methods of abstracting individual users from the role assignment and revalidation process of traditional rbac. The rbac tools, products and systems of the present disclosure organize and manage multi-tenanted networks and cloud computing environments by organizing individual users by service providers having a single or unified identity, which are separately managed by the service provider owners.
International Business Machines Corporation

Context sensitive security help

Embodiments of the present invention provide systems and methods for providing security in a computing environment. These systems and methods can be applied to cloud computing environments.
International Business Machines Corporation

System and providing key-encrypted storage in a cloud computing environment

System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads.
Micro Focus Software Inc.

Initial resource provisioning in cloud systems

A method of provisioning cloud-based applications includes receiving requests from computer systems to provision applications available in a cloud computing environment, assigning each of the computer systems to a first resource instance in the cloud computing environment such that the applications are executed for each of the plurality of computer systems on the first resource instance, monitoring usage of resources for each of the computer systems, grouping each of the computer systems into groups based on the usage of the resources, allocating a second resource instance, and reassigning computer systems in a first group from the first resource instance to the second resource instance.. .
Oracle International Corporation

System and providing virtual desktop extensions on a client desktop

The system and method described herein may identify one or more virtual desktop extensions available in a cloud computing environment and launch virtual machine instances to host the available virtual desktop extensions in the cloud. For example, a virtual desktop extension manager may receive a virtual desktop extension request from a client desktop and determine whether authentication credentials for the client desktop indicate that the client desktop has access to the requested virtual desktop extension.
Micro Focus Software Inc.

Policy engine for cloud platform

A policy engine is situated within the communications path of a cloud computing environment and a user of the cloud computing environment to comply with an organization's policies for deploying web applications in the cloud computing environment. The policy engine intercepts communications packets to the cloud computing environment from a user, such as a web application developer, for example, in preparation for deploying a web application in the cloud computing environment.
Pivotal Software, Inc.

System and streamlined registration and management of products over a communication network related thereto

The system and method of the present invention to provide at least one unique identification code (uid) registration center comprises of plural authorized parties' account. Each account comprises at least one product data file with uid, in which uid is associated with a product, to enable over at least one communication network (such as cloud computing), to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item, including ownership right related to the product transfer between each party, etc.

Monitoring cloud resource objects during deployment of a blueprint

Tools are provided to assist users of cloud computing systems to create, monitor, and debug the resource instances they need. Specifically, resource instances are created in a cloud computing system based on a blueprint that is provided to a blueprint processor.
Oracle International Corporation

Cloud computing system, vehicle cloud processing use therewith

A cloud computing system includes a network interface for interfacing with a wide area network. At least one wireless transceiver engages in bidirectional communication with a plurality of vehicle cloud processing devices within a corresponding plurality of vehicles in at least one vehicle aggregation location.
William Reber, Llc

Methods, systems, and computer readable media for performing image compression

Methods, systems, and computer readable media for performing image compression are disclosed. According to one exemplary method, the method includes identifying a canonical image set from a plurality of images uploaded to or existing on a cloud computing and/or a storage environment.
The University Of North Carolina At Chapel Hill

Device enrollment in a cloud service using an authenticated application

In various example embodiments, systems and methods for administering machine access to a cloud service are presented. An edge manager device in a cloud computing environment can establish a first client for a first application that is executed externally to the cloud computing environment.
General Electric Company

Method and system for identity-based authentication of virtual machines

A cloud computing system configured to run virtual machine instances is disclosed. The cloud computing system assigns an identity to each virtual machine instance.
Rackspace Us, Inc.

Self-terminating or self-shelving virtual machines and workloads

Methods comprise receiving a request to perform a predefined operation on at least one of a virtual machine and a workload executing on a host in a first cloud computing environment, identifying a set of credentials to access the first cloud computing environment, and initiating performance of the predefined operation on the at least one of the virtual machine and the workload, wherein the predefined operation comprises at least one of: (i) deleting, and (ii) shelving the at least one of the virtual machine and the workload.. .
International Business Machines Corporation

Self-terminating or self-shelving virtual machines and workloads

Systems and computer program products to perform an operation comprising receiving a request to perform a predefined operation on at least one of a virtual machine and a workload executing on a host in a first cloud computing environment, identifying a set of credentials to access the first cloud computing environment, and initiating performance of the predefined operation on the at least one of the virtual machine and the workload, wherein the predefined operation comprises at least one of: (i) deleting, and (ii) shelving the at least one of the virtual machine and the workload.. .
International Business Machines Corporation

Cloud computing simulator

A method for simulating a virtual computing environment includes specifying one or more flavors of resource consumers and one or more flavors of datastores to be provisioned on a tree of hosts for a simulation of a distributed virtualization scheduler. The method also includes generating a tree of hosts for the resource consumers and datastores based on the specified flavors and using a tree generator component of the distributed virtualization scheduler.
Vmware, Inc.

Method and enabling agile development of services in cloud computing and traditional environments

Prepending a name object or setting a type of a software object to a name and prepending a value object to the software object provides inheritance of a name value pattern by the software object to establish particular types or classes of attributes of the software object without modification of the software object itself that is thus strongly typed and accessible by type.. .
International Business Machines Corporation

Cloud computing managing storage resources therein

A cloud computing system and a method therein. The cloud computing system includes: a resource server cluster, where the resource server cluster includes at least two resource servers, each resource server in the resource server cluster has at least one type of resources of computing resources and storage resources, and at least one resource server in the resource server cluster has computing resources and storage resources; a computing resource management module configured to manage the computing resources in the resource server cluster, so as to provide a virtual computing service; and a storage resource management module configured to manage a shared storage resource pool established using the storage resources in the resource server cluster, so as to provide a virtual storage service, where storage resources included in each storage resource pool are from at least two resource servers in the resource server cluster..
Huawei Technologies Co., Ltd.

Call processing method and control apparatus, automatic call distribution apparatus, and agent terminal

Embodiments of the present invention provide a call processing method and control apparatus, an automatic call distribution apparatus, and an agent terminal. The call processing method, which executed by the call control apparatus, includes: receiving, a processing request for a call, and extracting a media connection address and a media capability of an automatic call distribution apparatus; performing, media negotiation based on a media capability of an agent terminal and the automatic call distribution apparatus; and establishing, a media session between the agent terminal and the automatic call distribution apparatus according to a media connection address of the agent terminal, the media connection address of the automatic call distribution apparatus, and a media negotiation result.
Huawei Technologies Co., Ltd.

Monitoring element hierarchies in a cloud computing system

An example method of monitoring elements in a cloud computing system includes partitioning, an address space of a hierarchy of service elements into a plurality of address subspaces managed by a respective plurality of processing nodes. The method further includes receiving time series data from a service element, routing the time series data to a first processing node based on an address of the service element within the hierarchy, and processing the time series data at the first processing node to update metric data maintained for the service element.
Vmware, Inc.

Pre-cloud data protection

The present disclosure includes a method comprising encrypting sensitive data, generating a token comprising a data identifier, tokenizing the encrypted sensitive data, and/or storing the encrypted sensitive data in association with the token to a token vault. Tokenizing may comprise mapping the encrypted sensitive data to the token.
American Express Travel Related Services Company, Inc.

Cloud wan overlay network

A network device obtains credentials of a customer associated with multiple different cloud providers of which the customer is a subscriber, and establishes, using the credentials of the customer, a cloud wide area network (wan) overlay network across multiple different cloud computing networks associated with the multiple different cloud providers. The network device, when establishing the cloud wan overlay network, spins up multiple virtual routers in the cloud resources of the customer at each of the multiple different cloud computing networks, with a different one of the multiple virtual routers being spun up in each of the multiple different cloud computing networks, where each of the multiple different cloud computing networks is associated with a different one of the multiple different cloud providers, and where the multiple virtual routers route data traffic between the different cloud computing networks via the cloud wan overlay network..
Verizon Patent And Licensing Inc.

System and managing virtual hard disks in cloud environments

A system, method, and computer-readable storage medium for managing virtual hard disks in a cloud computing/storage environment are provided. The method includes associating, using a virtual hard disk (vhd) management system of a server device, a plurality of data blocks of a virtual hard disk stored at a cloud vendor to a corresponding plurality of cloud objects.
Ca, Inc.

Secured home network

Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and intended for a destination device of the home network, the destination device comprising a security client. The malware detection logic may establish a secure communication channel between the malware detection logic of the secured device and the security client of the destination device.
Nagravision S.a.

Cloud computing gateway, cloud computing hypervisor, and methods for implementing same

Embodiments of the present invention provide a cloud gateway system, a cloud hypervisor system, and methods for implementing same. The cloud gateway system extends the security, manageability, and quality of service membrane of a corporate enterprise network into cloud infrastructure provider networks, enabling cloud infrastructure to be interfaced as if it were on the enterprise network.
Servicemesh, Inc.

Method, apparatus, and system for implementing software-defined network sdn

This application discloses a method for implementing a software-defined network (sdn), including: receiving, by an sdn controller, virtual network information sent by a cloud computing platform, where the virtual network information includes a correspondence between information about a virtual machine (vm) and information about a server running the vm. The method also includes acquiring, by the sdn controller, physical network information, where the physical network information includes a correspondence between information about a top-of-rack (tor) switch and the information about the server.
Huawei Technologies Co., Ltd.

System and enabling end-user license enforcement of isv applications in a hybrid cloud system

System and computer-implemented method for enabling end-user license enforcement of an application in a hybrid cloud system use data associated with at least one component of a public cloud computing environment of the hybrid cloud system to detect an environment-changing event involving at least one processing entity in the hybrid cloud system. Once the environment-changing event is detected, one or more operating environment identifiers are injected into the processing entity.
Vmware, Inc.

Property models on mobile devices

A method for synchronizing business data in a networked or cloud computing arrangement between a model-based business application server and a client-side computing device, which can operate in either online or offline modes, involves providing, on the client-side computing device, a copy of a property model used on the server-side by the application server to process business data. The method further includes, when the client-side computing device is offline, processing locally stored business data on the client-side computing device with reference to the copy of the property model, and later, when the client-side computing device comes online, synchronizing the locally stored business data on the client-side computing device and business data stored on the application server side..
Sap Se

Techniques for communication in hybrid cloud system

Techniques for communication in a hybrid cloud computing system. The techniques include utilizing cross-origin resource sharing to allow a web-based application to communicate with both a public host computer and a private host computer of the hybrid cloud computing system.
Vmware, Inc.

Extensible support system for service offerings

Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for implementing an extensible support system for multiple service offerings.
International Business Machines Corporation

Dynamic/on-demand packaging as part of deployment

A cloud declarative language is used to configure and reconfigure cloud computing environments. The language includes physical and logical topology declarations as well as cloud operations commands, and allows users to declare commands at multiple topology hierarchies.
Microsoft Technology Licensing, Llc

Packaging tool for first and third party component deployment

A cloud declarative language is used to configure and reconfigure cloud computing environments. The language includes physical and logical topology declarations as well as cloud operations commands, and allows users to declare commands at multiple topology hierarchies.
Microsoft Technology Licensing, Llc

End-to-end automated servicing model for cloud computing platforms

The application is directed to a cloud computing platform. The cloud computing platform includes a memory having instructions stored thereon for managing updates the cloud computing platform.
Microsoft Technology Licensing, Llc

Systems and methods for securely provisioning the geographic location of physical infrastructure elements in cloud computing environments

Systems and methods relating to improved security in cloud computing environments are disclosed. According to one illustrative implementation, a method for provisioning physical geographic location of a physical infrastructure device associated with a hypervisor host is provided.
Virtustream Ip Holding Company Llc

System and real-time processing of medical imaging raw data using cloud computing

The present invention relates to a system and apparatus for managing and processing raw medical imaging data.. .
The United States Of America, As Represented By The Secretary, Dept. Of Health And Human Services

Using images of a monitored scene to identify windows

A camera system includes memory, image sensors, illuminators, and a processor. The processor operates the illuminators and the image sensors in a first mode to capture a two-dimensional image of the scene using light transmitted by the illuminators and reflected from the scene.
Google Inc.

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Method of detecting attacks in a cloud computing architecture

A method and a detection entity for detecting attacks in a system including at least two host servers. Each host server hosts a set of virtual machines.
Orange

Managing user privileges for computer resources in a networked computing environment

Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed.
International Business Machines Corporation

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Managing provisioning for cloud resource allocations

Resource provisioning to a process in a distributed computing system, such as a cloud computing system. An instruction to provision a resource is received.
International Business Machines Corporation

Discovering and publishing device changes in a cloud environment

A method for discovering and publishing device changes in a cloud computing environment. The method includes scanning, by a processor, a computing environment to detect a multiple computing elements.
International Business Machines Corporation

Migration assessment for cloud computing platforms

Various embodiments provide an assessment tool that enables an automated functional assessment of applications for migration to target cloud computing platforms, such as a platform as a service (paas). The technical capabilities of various types of applications in a traditional non-platform deployment are studied and support for these technical capabilities is evaluated relative to the target platform..
Accenture Global Services Limited

Location based trusted computing nodes in a cloud computing architecture

The invention discloses trusted computing nodes (tcns) configured to control their location and migration of applications run on virtual machines resident thereon. The invention allows a controlled use of cloud computing resources and virtual network functions by sensitive applications.
France Brevets

Method for determining parking spaces and free-parking space assistance system

A method for determining parking spaces, traffic participants ascertaining information about free parking spaces and communicating the information to a cloud computing system, the cloud computing system storing information about the free parking spaces in retrievable fashion in a parking space map, information about the provided parking space being visually presented on a display device of the traffic participant. A computer program and a free parking space assistance system, which are suitable in particular for carrying out the method, are also provided..
Robert Bosch Gmbh

Cloud computing operating system and method

A cloud computing operating system is described. The system, in one aspect, includes a plurality of code encapsulating data structures each configured to define executable code and to define the structure of one or more encapsulating data structures.
Disos Pty Ltd., C/o W.f. Titchener & Co. Pty. Ltd.

System and a multi-tenant datacenter with layer 2 cloud interconnection

Provided is a system and method for a multi-tenant datacenter with layer 2 cloud interconnection. More specifically the multi-tenant datacenter includes a plurality of client systems in a first datacenter each client system having a set of physical infrastructure resources.

Ontology based resource provisioning and management for services

Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services.

Controlled transfer of data over an elastic network

Controlled transfer of data over an elastic network is provided and includes analyzing properties of a set of data for transfer from a source storage location to a target storage location across an elastic cloud computing network as part of a staged transfer of the set of data, assigning transfer queue weightings to data subsets of the set of data based on weighting parameters, the transfer queue weightings dictating order of transfer of the data subsets from the source storage location to the target storage location, and controlling transfer of the data subsets from the source storage location to the target storage location consistent with the transfer queue weightings assigned to the data subsets, the controlling transfer including controlling, based on costs to transfer the data subsets, bandwidth allocation of the elastic cloud computing network and a transfer schedule for the data subsets.. .

Dynamic configuration of network features

Dynamic configuration of network features is provided by performing real-time traffic analysis on network traffic flowing between an elastic cloud computing network and an edge appliance, evaluating effects of modifying elastic network bandwidth allocation and applying network traffic optimizations in routing traffic flowing between the elastic cloud computing network and the edge appliance, and dynamically configuring, based on the real-time traffic analysis and on the evaluating, one or more of (i) elastic network bandwidth allocation from the network service provider or (ii) at least one of the network traffic optimizations for performance by the edge appliance in routing traffic flowing between the elastic cloud computing network and the edge appliance.. .

System and a multi-tenant datacenter with layer 2 cloud interconnection

Provided is a system and method for a multi-tenant datacenter with layer 2 cloud interconnection. More specifically the multi-tenant datacenter includes a plurality of client systems in a first datacenter each client system having a set of physical infrastructure resources.

Precondition exclusivity mapping of tasks to computational locations

Computational tasks are mapped with computational locations in a distributed system such as a cloud computing environment. Mapping does not rely on workload estimates.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.

Policy-based virtual machine selection during an optimization cycle

Systems, methods, and computer program products configured to perform an operation comprising determining that use of a system resource of a first host system exceeds a threshold, wherein the first host system executes a plurality of virtual machines in a cloud computing environment, identifying a first virtual machine, of the plurality of virtual machines, for migration based on a first migration policy, of a plurality of migration policies, wherein the plurality of migration policies specify a respective set of rules for identifying virtual machines for migration, and migrating the first virtual machine to a second host system in the cloud computing environment to reduce the use of the system resource on the first host system.. .

Method and processing alarm information in cloud computing

Disclosed are a method and an apparatus for processing alarm information in a cloud computing. The method includes: establishing a corresponding relation between services and physical resources of nodes at all levels, wherein the physical resources relied on for executing the services; and generating aggregated alarm information based on the corresponding relation between the services and the physical resources when a physical resource or a service gives alarms..
Lecloud Computing Co., Ltd.

Method and system for utilizing spare cloud resources

A cloud computing system including a computing device configured to run virtual machine instances is disclosed. The computing device includes a hypervisor program for managing the virtual machine instances.
Rackspace Us, Inc.

Deploying an application in a multiple cloud computing environments

An example method is provided to deploy an application in multiple cloud computing environments. The method may comprise a computing system generating a first request to deploy an application in a first cloud computing environment according to a first deployment plan and a second request to deploy the application in a second cloud computing environment according to a second deployment plan.
Vmware, Inc.

Maintaining control over restricted data during deployment to cloud computing environments

Releases to the production environment of a cloud computing environment are deployed in a manner that maintains control over restricted data and the data plane of the cloud computing environment. A devops personnel is tasked with developing the release.
Microsoft Technology Licensing, Llc

Virtual machine compliance checking in cloud environments

A method of transferring a virtual machine between a virtualized computing system and a cloud computing system includes determining that a virtual machine is to be transferred from a virtualized computing system to a cloud computing system and determining a connection between a first resource in the virtualized computing system and a second resource in the cloud computing system. Files that enable implementation of the virtual machine at the virtualized computing system and identified, as are file portions of the files for transfer from the virtualized computing system to the cloud computing system.
Vmware, Inc.

Protecting from unintentional malware download

Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application.
International Business Machines Corporation

Incident management to maintain control of restricted data in cloud computing environments

Techniques allow devops personnel to perform incident management for cloud computing environments in a manner that maintains control over restricted data and the data plane. The devops personnel do not have access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data.
Microsoft Technology Licensing, Llc

Deploying an application in a hybrid cloud computing environment

An example method is provided for a computing system in a private cloud computing environment to deploy an application in a hybrid cloud computing environment. The method may comprise generating a request to deploy an application in a public cloud environment, the request including a deployment plan that specifies one or more tasks to be executed by a virtual computing resource from a cloud provider to deploy the application.
Vmware, Inc.

Using discovered virtual-infrastructure attributes to automatically generate a service-catalog entry

A method and associated system of automatically generating an entry of a service catalog of a cloud-computing environment as a function of discovered attributes of a virtual machine provisioned in a non-cloud computing environment. A cloud-management platform of the cloud-computing environment analyzes and compares results of infrastructure-discovery and application-discovery tools that describe a business application or a virtual service provisioned on the virtual machine.
International Business Machines Corporation

System and a cloud computing abstraction with self-service portal for publishing resources

In embodiments of the present invention, improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload.. .
Csc Agility Platform, Inc.

Message broadcasting in a clustered computing environment

Approaches are provided for message broadcasting within a clustered computing environment such as a cloud computing environment. Specifically, a message received from message queue (e.g., on a message queue server) is processed at a single node of a plurality of nodes within the clustered computing environment.
International Business Machines Corporation

Dynamic resources planning mechanism based on cloud computing and smart device

A dynamic resource management method for remote management of resources of resources devices by a cloud server is provided. The method includes: detecting resource-using-statuses of the resource devices to generate using-load parameters for the resources devices according to the resource-using-statuses of the resources devices by control devices installed on the resources devices; timely collecting, by the cloud server, the using-load parameters for the resources devices outputted by the control devices via a network; and upon receiving a using request corresponding to the resources devices from at least one smart device, performing, by the cloud server, a comparison according to the using-load parameters for the resources devices and the using request and performing resource using distribution on the resources devices to obtain resource-use planning based on the comparison result, thereby controlling the operation of the resource devices and replying to the using request of the smart device..
Quanta Computer Inc.

Cloud computing service architecture

A service control system manages a set of containers operating within one or more computing hosts. Containers may access a consistent runtime environment regardless which cloud provider the computing hosts come from.
Rancher Labs, Inc.

Method for monitoring the security of a virtual machine in a cloud computing architecture

One embodiment relates to a method for monitoring the security of a virtual machine hosted by a host system, the virtual machine comprising an operating system communicating with a hypervisor of the host system. The hypervisor interfaces between the operating system and hardware resources of the host system.
Orange

Methods and apparatus to control a virtual machine

Methods and apparatus, to control a virtual machine, include: sending identification of virtual machines within a recovery domain, receiving a request to control one the virtual machines, authorizing the request, and forwarding the request to a virtual machine manager of the one of the virtual machines. Other methods and apparatus, to control a virtual machine, include: sending a request for identification of virtual machines within a recovery domain directly to a cloud computing device without passing the request through another computing device, determining that one of the virtual machines needs to be controlled, and sending a request to control the one of the virtual machines directly to the cloud computing device without passing the request through another computing device..
Nokia Solutions And Networks Oy

Establishing trust within a cloud computing system

A cloud computing system includes a cloud system managing unit, a plurality of sets of devices, where a set of devices includes one or more devices having a common aspect, and a plurality of authentication servers, where an authentication server is associated with one of the plurality of sets of devices based on the common aspect. The cloud computing system functions to establish trust between a corresponding one of the plurality of authentication servers and the one or more devices of one of the plurality of sets of devices, between the corresponding one of the plurality of authentication servers and the cloud system managing unit, and between the cloud system managing unit and the one or more devices.
International Business Machines Corporation

Network resource balancing method and apparatus

A network balancing method and apparatus, where the method includes obtaining, by a processor in a cloud computing platform, identifier information of a virtual machine and identifier information of a domain including virtual machines that are sent by a controller in the cloud computing platform, where a correspondence exists between the identifier information of the virtual machine and the identifier information of the domain including the virtual machines, and after receiving an access request packet, determining, by the processor, the virtual machines in the domain according to the identifier information of the domain in the access request packet, further selecting a virtual machine according to load information of the virtual machines in the domain, and sending the access request packet to the selected virtual machine.. .
Huawei Technologies Co., Ltd.

Service elastic method and apparatus in cloud computing

A service-based elastic method in a cloud environment includes detecting, an elastic event that occurs in running of a service, determining, a node that needs to be elastic and corresponds to the elastic event, determining, according to an identifier of the node that needs to be elastic, a service topology diagram of the service, and an elastic method identifier of the service in a cloud service archive, a connection relationship that needs to be established, and creating and running the newly added node instance according to information of the node that needs to be elastic in the cloud service archive and the connection relationship. The present disclosure, running of a service can be optimized more effectively..
Huawei Technologies Co., Ltd.

Control architecture including a programmable logic controller and a cloud computing system

A control architecture includes at least one programmable logic controller and at least one cloud computing system. An automation program of the controller includes at least one predefined control module.
Schneider Electric Industries Sas

Monitoring cloud computing environments

An example method of monitoring computing resources in a cloud computing environment may include receiving a request to subscribe to a monitoring service with respect to computing resources associated with a user account, the request specifying access information for a cloud computing system comprising a plurality of virtual machines associated with the computing resources. The method may further include monitoring, using the access information, the plurality of virtual machines.
Red Hat, Inc.

Efficient communication within hybrid cloud system

Techniques for communicating between service nodes within a hybrid cloud computing system. These techniques include utilizing a messaging provider within an off-premise computing system to pass messages between off-premise servers holding a connection to an on-premise computer system and off-premise servers holding a connection to an end user computer system..
Vmware, Inc.

System and building, optimizing, and enforcing infrastructure on a cloud based computing environment

A method for building, optimizing, and maintaining a computing infrastructure on a cloud computing environment is provided. A user provides a high-level declaration to a cloud environment operating system, specifying the details of the infrastructure that is intended to be built on the cloud.
Fugue, Inc.

Method and deploying industrial plant simulators using cloud computing technologies

A system and method for operating a remote plant simulation system is disclosed. The system and method uses a light application at the plant to collect relevant data and communicate it to a remote plant simulation.
Emerson Process Management Power & Water Solutions, Inc.

Automatic virtual machine termination in a cloud

Managing a cloud computing environment including a plurality of resources adapted to host at least one virtual machine includes, in a virtual machine, determining a period of inactivity of the operating system for a user of the virtual machine and comparing, using a processor, the period with a defined threshold. From the virtual machine, a virtual machine termination request is sent to the cloud computing environment responsive to the period exceeding the defined threshold..
International Business Machines Corporation

Public cloud system and public resource allocation method

A management center, coupled to a plurality of data centers, which can be included in an open or public cloud computing system. The management center includes a monitoring unit and an allocation unit coupled to the monitoring unit.
Hon Hai Precision Industry Co., Ltd.

Faster ip address allocation in a hybrid cloud environment using subnet selective randomization

Multiple tenants within a hybrid cloud computing system may need ip addresses to communicate over a computer network external to the hybrid cloud system (such as the internet). Ip addresses are a scarce resource, and each address can only be assigned to a single tenant.
Vmware, Inc.

Cloud-based services exchange

In general, a cloud-based services exchange (or “cloud exchange”) for interconnecting multiple cloud service providers with multiple cloud service customers is described. The cloud exchange may enable cloud customers to bypass the public internet to directly connect to cloud services providers so as to improve performance, reduce costs, increase the security and privacy of the connections, and leverage cloud computing for additional applications.
Equinix, Inc.

System and improving integration testing in a cloud computing environment

A system and method for improving integration testing in a cloud computing environment includes collecting one or more input parameters associated with each of one or more products, deployed in cloud computing environment, from one or more external resources and test management systems. The input parameters include one or more defect parameters, user requirements, test parameters or performance parameters associated with the product.
Wipro Limited

Displaying interactive topology maps of cloud computing resources

Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view visualizations using an application platform referred to herein as a cloud computing management application.
Splunk Inc.

Resource planning system for cloud computing

A resource planning system is disclosed for planning reserved instance server requirements for a user of cloud computing services that comprise reserved instance servers and on-demand servers accessible by the user. The system is arranged to receive historical usage data indicative of a historical usage of the cloud computing services by a user, the historical usage data covering a defined time period including a plurality of time units, and the historical usage data including information indicative of a number of server instances that were required by the user in each time unit of the time period.
Singapore Telecommunications Limited

System and automating data generation and data management for a next generation sequencer

A web-based server/cloud computing system for a next generation sequencer (ngs) to integrate data generation, data analysis and data management. When a user intends to sequence a biological sample, the user is asked to login to the ngsinform, select and submits sets of software analysis bioinformatics programs, which schedules the sequencing, quality control, data analysis and management of that data, all done simultaneously and sequentially.
Yotta Biomed, Llc.

Method, system and computer program for cloud based computing clusters for simulated operator training systems

The present invention provides methods, systems and computer programs for implementing a simulation based operator training system on a cloud computing cluster. The invention receives information identifying one or more parameters of an operator training simulation, and retrieves virtual machine (vm) images corresponding to a master vm, operator vm and instructor vm.
Yokogawa Electric Corporation

Security allocation of virtual machines in a cloud computing network

A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a security-aware fashion. The invention solves the cloud user risk problem by inducing a state such that, unless there is a change in the conditions under which the present invention operates, the cloud users do not gain by deviating from the allocation induced by the present invention.
Government Of The United States As Represetned By The Secretary Of The Air Force

Generating and displaying topology map time-lapses of cloud computing resources

Techniques and mechanisms are disclosed that enable collection of various types of data from cloud computing services and the generation of various dashboards and visualizations to view information about collections of cloud computing resources. A user can configure collection of data from one or more cloud computing services and view visualizations using an application platform referred to herein as a cloud computing management application.
Splunk Inc.

Support to customer platform system, method, and server

The disclosure provides a support to customer platform system, method, and server to serve as a marketing service platform providing various channel functions including sales, planning, technical support, maintenance, and customer management and perform an interactive support service with internet protocol (ip) connected devices based on cloud computing. Accordingly, a vendor may realize a comprehensive support service by applying the embodiments of the disclosure without complicated professional training..
Ruby Tech Corporation

System, method, article of manufacture of mixed reality based, biometrically signed reusable physical financial instrument

The present invention relates to a reusable physical financial instrument and a system and a method for enabling the financial instrument to perform multiple financial transactions. The financial instrument is capable of creating mixed reality experience when it comes in vicinity of the payor or payee device or atm.
Tata Consultancy Services Limited

High-performance computing framework for cloud computing environments

Disclosed are various embodiments for a high-performance computing framework for cloud computing environments. A parallel computing application executable by at least one computing device of the cloud computing environment can call a message passing interface (mpi) to cause a first one of a plurality of virtual machines (vms) of a cloud computing environment to store a message in a queue storage of the cloud computing environment, wherein a second one of the plurality of virtual machines (vms) is configured to poll the queue storage of the cloud computing environment to access the message and perform a processing of data associated with the message.
Georgia State University Research Foundation, Inc.

Method and system for crowd-sourced algorithm development

A system for development of an algorithm for analysis of sensor data includes one or more wearable sensor devices, a smart device, and a cloud computing platform. The sensors in the wearable sensor device produce sensor data (e.g., physiological data) from a user that can be processed by a software algorithm in the wearable sensor device or by a connected smart device (e.g., a smartphone) via cloud computing, producing an algorithm output.
Mc10, Inc.

Methods and systems for multirobotic management

Multirobotic management can involve communications between a command or leader robot and one or more client or follower robots through a cloud computing system. In an example implementation, a leader robot can receive first sensory data captured by a first follower robot and second sensory data captured by a second follower robot, determine a command function based on at least one of the first sensory data and the second sensory data, and communicate with at least one of the first follower robot and the second follower robot based on the command function..
X Development Llc

Flow imaging and monitoring for synchronized management of wide area drainage

A flow imaging and monitoring system for synchronized management of wide area drainage that includes an interposer for supporting monitoring and management equipment in a manhole, a module for illuminating water flowing in pipes at the base of the manhole, a module for monitoring responses to reflected light, a sealed and rechargeable battery pack, and a data analysis and management system to interpret data streams in real time. The interposer can be adjusted to fit the diameter of the manhole and can be adjusted to be placed under the manhole cover.
Urbanalta Corp

Cloud image renderer

Cloud image rendering may be provided. First, a first request for a multi-layered image may be received.
Cisco Technology, Inc.

Method and detecting security anomalies in a public cloud environment using network activity monitoring, application profiling and self-building host mapping

The disclosed computer-implemented method for detecting security anomalies in a public cloud environment using network activity monitoring, application profiling, and self-building host mapping may include (1) collecting host information that identifies (a) at least one communication channel that has previously facilitated communication between at least one host computing platform within a cloud computing environment and at least one additional computing platform and/or (b) at least one application that has previously run on the host computing platform, (2) monitoring network traffic involving the host computing platform, (3) detecting, while monitoring the network traffic, network activity that is inconsistent with the collected host information, and then (4) determining that the detected network activity represents a potential security threat within the cloud computing environment due at least in part to the detected network activity being inconsistent with the collected host information. Various other methods, systems, and computer-readable media are also disclosed..
Symantec Corporation

Type-to-type analysis for cloud computing technical components with translation through a reference type

cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge.
Accenture Global Services Limited

Type-to-type analysis for cloud computing technical components with translation scripts

cloud computing has emerged as an extremely popular implementation option for a wide range of computing services. However, provisioning services into the cloud is an extremely difficult technical challenge.
Accenture Global Services Limited

Distributed neural networks for scalable real-time analytics

Techniques related to implementing distributed neural networks for data analytics are discussed. Such techniques may include generating sensor data at a device including a sensor, implementing one or more lower level convolutional neural network layers at the device, optionally implementing one or more additional lower level convolutional neural network layers at another device such as a gateway, and generating a neural network output label at a computing resource such as a cloud computing resource based on optionally implementing one or more additional lower level convolutional neural network layers and at least implementing a fully connected portion of the neural network..
Intel Corporation

Acquiring information dynamically regarding a hardware component in the cloud computing system while on the floor of the data center

A method, system and computer program product for managing hardware components in a cloud computing environment. A mobile device captures an image of a bar code placed on a rack that is associated with an identifier that references an internet resource of the management software that manages the rack.
International Business Machines Corporation

Predictively provisioning cloud computing resources for virtual machines

Methods, computer program products, and systems are presented. The methods include, for instance: predictively provisioning, by one or more processor, cloud computing resources of a cloud computing environment for at least one virtual machine; and initializing, by the one or more processor, the at least one virtual machine with the provisioned cloud computing resources of the cloud computing environment.
International Business Machines Corporation

Mechanism and constraint based fine-grained cloud resource controls

A method implemented in a network element (ne) configured to operate as a rest server, the method comprising receiving, through a receiver, a constraint from a rest client, wherein the constraint relates an independent control variable to a derived control variable, wherein the derived control variable is mapped to a first cloud computing resource employed by a cloud computing implementation; receiving, through the receiver, an independent value for the independent control variable from the rest client; computing, via a processor coupled to the receiver, a derived value for the derived control variable based on the constraint and the value for the independent control variable; determining, via a processor, a first instruction regarding the first cloud computing resource based on the derived value; and altering, via a resource controller coupled to the processor, one of a plurality of first behaviors of the first cloud computing resource based on the first instruction.. .
Futurewei Technologies, Inc.

Method to configure network bonds as a port on an integration bridge for a virtualized multilayer switch

Techniques are disclosed for configuring a physical computing system (e.g., in a cloud computing network) to connect a network bond with a virtual multilayer switch. An operating system process executing in the physical computing system receives a selection of one or more network interfaces.
International Business Machines Corporation

Method to configure network bonds as a port on an integration bridge for a virtualized multilayer switch

Techniques are disclosed for configuring a physical computing system (e.g., in a cloud computing network) to connect a network bond with a virtual multilayer switch. An operating system process executing in the physical computing system receives a selection of one or more network interfaces.
International Business Machines Corporation

Personal cloud case cover with a plurality of modular capabilities

A personal cloud contained in a case for a portable computing device such as a tablet personal computer (pc), mobile phones, portable media players, or the like. The personal cloud case may be fitted with memory, a network connection, two-way wireless charging, external memory slots, external connections and other components for portable personal cloud computing..
Micro Mobio Corporation

Action execution architecture for virtualized technical components

cloud computing technical components are provisioned into many different service platforms provided by many different service providers. Once provisioned, it is often the case that actions need to be performed against the technical components.
Accenture Global Services Limited

Secure virtual network platform for enterprise hybrid cloud computing environments

Clusters of virtual network switches (vns) and controllers are provided. The controller cluster is connected to the vns cluster which is between first and second network domains.
Zentera Systems, Inc.

Fair decentralized throttling in distributed cloud-based systems

A cloud availability manager configured to execute a recovery workflow that fails over one or more virtual machines (vms) to and from a cloud computing system. In doing so, the cloud availability manager typically performs multiple operations for each vms.
Vmware, Inc.

Linking instances within a cloud computing environment

Embodiments of the present invention provide an approach to allow a user to link multiple cloud instances (e.g., virtual machines) together such that an action on one (cloud) instance is triggered when a second instance's state changes thereby invoking a predefined set of rules. Specifically, instances can be linked to one another via a graphical user interface (gui or the like), and associated with a set of rules.
International Business Machines Corporation

Resource exchange service transaction for cloud computing

A method, a computer program product, and a computer system for exchanging cloud resources between tenants. A mediator system receives from a user a request for a cloud resource, aggregates the cloud resource from one or more of the tenants, and replies the request for a cloud resource with a description of the cloud resource.
International Business Machines Corporation

Enterprise connectivity to the hybrid cloud

A cloud computing system retrieves routing entries associated with a particular tenant of the cloud computing system and are a subset of a routing table of the entire cloud computing system. The routing entries are loaded into a networking switch, which is configured to route network packets using the loaded subset of routing entries, using a general-purpose processor rather than a costly dedicated asic..
Vmware, Inc.

Routing optimization for inter-cloud connectivity

A cloud computing system may include multiple cloud data centers. A gateway may establish connections between a cloud providers' multiple data centers using knowledge about the types of applications workloads executing within the cloud computing system, and may be further based on determines policies indicating priorities for routing traffic for the application workloads..
Vmware, Inc.

Multi-spoke connectivity of private data centers to the cloud

A hybrid computing system includes an on-premise data center and a cloud computing system. To connect between an organization's multiple data centers, a gateway may instead utilize the connections between the private data center and the cloud computing system rather than a direct connection to the other of the organizations' data centers..
Vmware, Inc.

Framework for provisioning network services in cloud computing environment

This disclosure relates generally to provisioning network services in a cloud computing environment, and more particularly to framework for provisioning network services in a heterogeneous cloud computing environment. In one embodiment, the disclosure includes a network as a service (naas) layer under a cloud provisioning platform.
Tata Consultancy Services Limited

Optimizing connectivity between data centers in a hybrid cloud computing system

Connectivity between data centers in a hybrid cloud system having a first data center managed by a first organization and a second data center managed by a second organization, the first organization being a tenant in the second data center, is optimized. According to the described technique, a path-optimized connection is established through a wide area network (wan) between a first gateway of a first data center and a second gateway of a second data center for an application executing in the first data center based on performance of paths across a set of internet protocol (ip) flows.
Vmware, Inc.

Quantitative metrics for assessing status of a platform architecture for cloud computing

An architecture for realizing a customer system on a cloud computing platform is defined in terms of a plurality of architecture types, each type (at) defined by plural architecture type units (atus), each atu comprising a set of atu details. The atu details are ordered into a series of discrete stages.
Salesforce.com, Inc.

System, method, and data access in a cloud computing environment

A data access method in a cloud computing environment is disclosed. The method may comprise, in a service object space of the cloud computing environment, receiving a request of a user for accessing a data package, the request including a user identification, determining a service object space of the data package corresponding to the request, and providing the data package to the user according to the service object space of the data package and the user identification..
Alibaba Group Holding Limited

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.
International Business Machines Corporation

Hybrid task framework

Techniques for executing jobs in a hybrid cloud computing system. A job defines multiple states and tasks for transitioning between states.
Vmware, Inc.

Hybrid infrastructure provisioning framework tethering remote datacenters

Techniques are disclosed for deploying and maintaining appliances in a hybrid cloud computing system which includes an on-premise data center and a public cloud computing system configured to provide a common platform for managing and executing virtual workloads. Appliances to be deployed may include those required (or useful) for hybrid operations, including a cloud gateway appliance, a wide area network (wan) optimizer, a layer 2 (l2) concentrator, and a mobility agent that handles virtual machine (vm) migration traffic.
Vmware, Inc.

Virtual machine placement in a cloud computing environment based on factors including optimized processor-memory affinity

Optimized placement of virtual machines in a cloud environment is based on factors that include processor-memory affinity. A smart migration mechanism (smm) predicts an optimization score for multiple permutations of placing virtual machines on a target system to create an optimal move list.
International Business Machines Corporation

Wireless intelligent ultrasound fetal imaging system

A wireless intelligent ultrasound fetal imaging system includes an ultrasound transducer, an ultrasound afe module, a zynq module, a machine vision module and a mobile terminal. The ultrasound transducer transmits ultrasound wave toward a pregnant mother's fetal, and receives echo wave from the fetal.
Aningbo Youchang Ultrasonic Technology Co.,ltd

Method, apparatus and system pertaining to cloud computing

The present disclosure outlines a system, method, and apparatus for the design of network services, including the automatic sourcing an aggregatng of data on the available resources. In a further aspect, the present disclosure outlines a system, method, and apparatus for the allocation of cloud resources.
Anuta Networks, Inc.

System, method, and software for providing access control enforcement capabilities in cloud computing systems

According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager.
Ca, Inc.

Allocation of cloud computing resources

The invention concerns a method, arrangement (26), computer program and a computer program product for allocating physical cloud computing resources (12, 16, 18) to processes, where at least some of the cloud computing resources (12, 16, 18) have different ages, said cloud computing resources (12, 16, 18) having individual primary failure probabilities, each being based on an age dependent failure probability function of the cloud computing resource. The receives requests for performing computational tasks for a number of processes, where the processes have different process priorities, investigates the availability of the cloud computing resources for performing the tasks of the requests, and assigns the available cloud computing resources to the based on the process priorities, where processes with the highest process priorities are assigned to the cloud computing resources (12, 16, 18) having the lowest primary failure probabilities..
Telefonaktiebolaget Lm Ericsson (publ)

System and streamlined registration and management of products over a communication network related thereto

The system and method of the present invention to provide at least one unique identification code (uid) registration center comprises of plural authorized parties' account. Each account comprises at least one product data file with uid, in which uid is associated with a product, to enable over at least one communication network (such as cloud computing), to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item, including ownership right related to the product transfer between each party, etc.

Gaze-directed content delivery

Methods and systems may provide for associating content in a cloud computing infrastructure with geo-panes and sending it to a location aware device based on user gaze. The content may be restricted by rules, including distance from user to the geo-pane.
Intel Corporation

System and managing heterogeneous data for cloud computing applications

A method, system, and computer-readable storage medium for managing heterogeneous data for cloud computing applications are disclosed. For example, a method involves identifying data to be used by an application.
Nimbix, Inc.

Method and device for managing resources with an external account

Method and device for managing cloud computing resources with an external account, the resources being associated with one or more internal main accounts. The method includes verifying an identity of the external account via a server, determining, if the identity of the external account is verified, whether a virtual sub-account is bound to the external account, the virtual sub-account being subordinate to an internal main account of the one or more internal main accounts, and allowing, if it is determined that the virtual sub-account is bound to the external account, the external account to manage the resources associated with the internal main account based on pre-configured rights of the virtual sub-account..
Alibaba Group Holding Limited

Automatic determination of device specific interoperability

Device specific interoperability is provided automatically utilizing remote service and/or cloud computing. Functionality of devices like mobile phones is tested to ensure that the device is properly configured to work with infotainment systems by using the phone to connect with the cloud services..
Microsoft Technology Licensing, Llc

Data backup and transfer across multiple cloud computing providers

Data may be stored across the clouds of multiple cloud computing providers to improve data security. Software infrastructure components of an original cloud computing provider storing data via a first virtual machine (vm) may be identified.
Whp Workflow Solutions, Llc

Dynamic provisioning of a virtual storage appliance

Systems, methods, and apparatus for facilitating dynamic provisioning of a virtual storage appliance in a cloud computing environment are presented herein. A storage system management component can provision storage from a storage medium to facilitate access of at least a portion of the storage by a virtual storage appliance (vsa) based on a request for at least one resource associated with the vsa.
Os Nexus, Inc.

System and key management and user authentication

A system and method are presented for key management and user authentication. Secure ssh access may be performed through a public/private set of ssh keys where a user uploads a public ssh key to a key management application.
Interactive Intelligence Group, Inc.

Secure comparison of information

The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in particular an asymmetric method of secure computation that relies on the private-key/public key paradigm with homomorphic encryption.
Openeye Scientific Software, Inc.

Smart shift selection in a cloud video service

A cloud-based network service provides intelligent access to surveillance camera views across multiple locations and environments. A cloud computing server maintains a database of time periods of interest captured by the cameras connected to the network.
Pelco, Inc.

System and remote fax interconnect technology

The present invention provides systems and methods for the virtualization, aggregation, and distributed processing of facsimile communications. The remote fax interconnect known as etherfax® is a system and method that allows for the reception and delivery of information based on cloud computing infrastructure to or from one or more facsimile systems using internet/web based communication protocols such as http(s) as the transport between a facsimile capable application or hardware and the remotely accessible etherfax® services..
Etherfax, Llc

Method and configuring redundancy solution in cloud computing architecture

The present invention relates to the field of communications and information technologies, and in particular, to a method and an apparatus for configuring a redundancy solution in a cloud computing architecture, so as to solve a problem that a manner of manually planning a redundancy solution has poor flexibility and is unfavorable to overall management of a system. The method in the present invention includes: receiving a redundancy solution configuration request; determining, according to the redundancy solution configuration request, redundancy capability information and redundancy constraint requirement information of an application object to be configured; and determining, according to infrastructure information, infrastructure manager information, and application object information in an established redundancy capability information base, and the redundancy capability information and the redundancy constraint requirement information of the application object to be configured..
Huawei Technologies Co., Ltd.

Virtual zones for open systems interconnection layer 4 through layer 7 services in a cloud computing system

Concepts and technologies disclosed herein are directed to virtual zones for open systems interconnection (“osi”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone.
At&t Intellectual Property I, L.p.

Fast provisioning service for cloud computing

A cloud-based system and method for provisioning it infrastructure systems is disclosed. The system and method provided constructs an infrastructure generally comprised of a processing component supplying the computational capacity for a platform element, comprising one or more processing elements, memory and i/o subsystems, a storage component utilizing commodity disk drives and comprised of one or more physical storage devices, and a network component providing a high speed connection among processing elements and the processing component to storage components.
Digital River, Inc.

Mechanism for resource utilization metering in a computer system

Systems, apparatuses, and methods for tracking system resource utilization of guest virtual machines (vms). Counters may be maintained to track resource utilization of different system resources by different guest vms executing on the system.
Advanced Micro Devices, Inc.

Data suppression for faster migration

The subject technology addresses the need in the art for improving intra-cloud migration of virtual machines in a cloud computing environment. A hash database may be prepopulated with key-value pairs corresponding to hash ids and associated data chunks of a virtual machine image.
Cisco Technology, Inc.

Optimizing virtual machines placement in cloud computing environments

Placement of instances of virtual machine (vm) images in a cloud computing environment is optimized. A request is received to deploy a new vm image instance.
International Business Machines Corporation

Method and configuring redundancy data center in cloud computing architecture

The present disclosure relates to a method and an apparatus for configuring a redundancy data center in a cloud computing architecture. The method includes receiving a request for configuring a redundancy data center dc for a specified network service ns; acquiring, from an affinity relationship information bank of application objects according to the request for configuring a redundancy dc, information about an affinity and/or anti-affinity relationship among application objects that support the specified network service, where application objects having an affinity relationship rare deployed in a same dc, and application objects having an anti-affinity relationship are deployed in different dcs; and selecting, from deployed dcs, a redundancy dc for the specified network service according to redundancy resource information of the deployed dcs and the acquired information about an affinity and/or anti-affinity relationship..
Huawei Technologies Co., Ltd.

Wireless network cloud computing resource management

A method, performed by a server device, may include receiving a request to activate an application session, the request being received from a user equipment on behalf of a particular application installed on the user equipment. The method may further include determining one or more application requirements associated with the particular application; determining conditions associated with one or more application servers; selecting a particular one of the one or more application servers based on the determined one or more application requirements and based on the determined conditions; and setting up the application session between the user equipment and between the selected particular one of the one or more application servers..
Cellco Partnership (d/b/a Verizon Wireless)

Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request.
International Business Machines Corporation

Microapplications software marketplace for digital systems and use

Disclosed is a system and method for provisioning and deploying digital systems using microapplications running natively and securely on top of cloud computing providers. The system includes a software marketplace that allows users to purchase microapplications on a subscription basis in order to build, deploy, and manage the microapplications as a custom digital system in their accounts from the cloud-computing providers..
Mitoc Group Inc.

Dynamic snapshots for sharing network boot volumes

The subject technology addresses the need in the art for improving provisioning and booting of virtual machines in a cloud computing environment. Different versions of boot volume images may be shared in a storage repository accessible by one or more host computers.
Cisco Technology, Inc.

Frictionless interface for virtual collaboration, communication and cloud computing

Described herein are systems and methods for a virtual communication and collaboration application platform which automates the setup and operation of a virtual collaboration session, senses and reacts to user activity and contextual cues, and provides real-time intuitive interaction steps to enable users to easily interact in a simple and user-friendly manner. The virtual collaboration and computing platform provides a shared application window visible to multiple users on different displays for which users can easily share multiple types of data and applications through basic drag-and-drop interactions..
Coscreen, Inc.

Online advancing information organization sharing and collective action

Methods and systems and mobile device interfaces for creating, joining, organizing and managing via mobile devices affinity groups in a cloud computing environment for social and business purposes.. .

Data-driven semi-global alignment technique for masquerade detection in stand-alone and cloud computing systems

Systems and methods are provided for intrusion detection, specifically, identifying masquerade attacks in large scale, multiuser systems, which improves the scoring systems over conventional masquerade detection systems by adopting distinct alignment parameters for each user. For example, the use of ddsga may result in a masquerade intrusion detection hit ratio of approximately 88.4% with a small false positive rate of approximately 1.7%.
Qatar University, Office Of Academic Research

A generic model to implement a cloud computing service

Example implementations relate to using a generic model to provision a computing resource to implement a cloud computing service. For example, a computing device may include a processor.
Hewlett Packard Enterprise Development Lp

Methods and systems relating to optical networks

Data center interconnections, which encompass wscs as well as traditional data centers, have become both a bottleneck and a cost/power issue for cloud computing providers, cloud service providers and the users of the cloud generally. Fiber optic technologies already play critical roles in data center operations and will increasingly in the future.
Aeponyx Inc.

Method and system for intelligent cloud planning and decommissioning

A method for decommissioning an application operating on a computer system or a computer system includes receiving, at a decommissioning system, information that specifies a server to analyze. The decommissioning system determines one or more applications operating on the server, one or more instruction code libraries that are being utilized by the one or more applications, and hardware dependencies of the one or more instruction code libraries.
Accenture Global Solutions Limited

3d virtual reality model sharing and monetization electronic platform system

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

Holoportal and holocloud system and operation

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

Integrated configuration engine for interference mitigation in cloud computing

A cloud computing system which is configured to monitor operating status of a plurality of virtual computing machines running on a physical computing machine, wherein said monitoring includes monitoring a cycles per instruction (cpi) parameter and a cache miss rate (cmr) parameter of at least one of the plurality of virtual computing machines. The system detects interference in the operation of the at least one virtual machine, with the detection including determining when at least one of the cpi and cmr values exceed a predetermined threshold.
Purdue Research Foundation

Real-time 3d virtual or physical model generating holoportal and holocloud system

A novel electronic system provides fast three-dimensional model generation, social content sharing of dynamic three-dimensional models, and monetization of the dynamic three-dimensional models created by casual consumers. In one embodiment, a casual consumer utilizes a dedicated real-time 3d model reconstruction studio with multiple camera angles, and then rapidly create dynamic 3d models with novel computational methods performed in scalable graphics processing units.
Doubleme, Inc.

Cloud computing system and method based on distributed consumer electronic devices

In accordance with a method a plurality of subscriber systems are provided, the systems being coupled via a wide area network (wan) and comprising a first subscriber system. The first subscriber system has processing and non-volatile storage and is suitably programmed for providing a subscriber service to a first subscriber.
Leonovus Usa

Data encryption service

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Image vulnerability repair in a networked computing environment

Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities.
International Business Machines Corporation

Automatically preventing and remediating network abuse

Various embodiments described herein are directed to optimizing cloud computing infrastructures functionality based on an abuse prevention and remediation platform. A tenant profile may have a tenant confidence score for a tenant, the tenant confidence score being an indicator of the reputation of the tenant usage of cloud computing resources.
Microsoft Technology Licensing Llc

Methods and apparatus to grant access to cloud computing resources

An example method to grant authorization to a user for accessing a cloud computing resource involves receiving a first message from a user via a social media interface. The first message includes a request to access a cloud computing resource.
Vmware, Inc.

Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Methods and apparatus to generate knowledge base articles

An example method to generate knowledge base articles involves analyzing user-satisfaction indicators of a plurality of user response messages in a forum message board of a cloud computing system. The user response messages are posted in response to a first message requesting assistance related to a computing resource.
Vmware, Inc.

Systems and methods to create highly scalable network services

Various embodiments of the invention provide for an unparalleled scalable and reliable load distribution design for use in a large class of network applications, including cloud computing in modern data center networks and similar services, which can benefit from the invention by taking advantage of commonly available network components and systems. In particular, various embodiments of the invention extend a logical load distributor model to include distributed clusters of loosely coupled components.
Dell Products L.p.

Cloud system order and configuration using customized templates

The present disclosure relates to brokering requests for cloud computing resources between a user and multiple infrastructure providers. According to one embodiment, an infrastructure manager acting as a broker receives a template including configuration information for one or more servers.
International Business Machines Corporation

Cloud system order and configuration using customized templates

The present disclosure relates to brokering requests for cloud computing resources between a user and multiple infrastructure providers. According to one embodiment, an infrastructure manager acting as a broker receives a template including configuration information for one or more servers.
International Business Machines Corporation

Cloud computing systems

A multi-tier cloud-metering framework for metering cloud resources is presented. The proposed framework is capable of relating metering indicator of distributed resources contributing to the same application and located at different architectural levels.
The American University In Cairo

Data encryption service and customized encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Monitoring and alert services and data encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

System and monitoring changes in databases and websites

A system and method is described for constructing a differential web in which information including objects, numbers, or text in databases and web pages may be selected using pointing device movements. Once selected, objects may be designated to be monitored for changes, said changes being captured and made browsable on web-like constructs.
Tksn Holdings, Llc

Allocating, configuring and maintaining cloud computing resources using social media

An example method involves receiving an electronic message from a user via a social media interface. The electronic message includes a query associated with a resource of a cloud computing system.
Vmware, Inc.

Cloud virtual machine customization using extension framework

In various embodiments, methods and systems for remotely customizing a virtual machine in a cloud computing infrastructure are provided. A vm agent component provided on a virtual machine, while in communication with a vm deployment service associated therewith, can be configured to detect an incoming configuration payload that corresponds to a selected one or more extension packages cataloged on a vm marketplace component in communication with the vm deployment service component.
Microsoft Technology Licensing, Llc

System and automatic porting of software applications into a cloud computing environment

In accordance with an embodiment, described herein is a system and method for automatic porting of software applications into a cloud computing environment (cloud environment, cloud). A cloud service enables software developers to deploy user applications to run within the cloud environment.
Oracle International Corporation



Cloud Computing topics:
  • Cloud Computing
  • Communications
  • Short Message Service
  • Internet Of Things
  • Data Processing
  • Data Storage
  • Mobile Phone
  • Addressing
  • Network Device
  • Virtualization
  • Distributed
  • Instruments
  • Executable
  • Database Server
  • Third Party


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Cloud Computing for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cloud Computing with additional patents listed. Browse our RSS directory or Search for other possible listings.


    2.6624

    file did exist - 13123

    2 - 1 - 252