Follow us on Twitter
twitter icon@FreshPatents


Virtual Machine patents

      

This page is updated frequently with new Virtual Machine-related patent applications.




 Customized browser images patent thumbnailCustomized browser images
A process is directed to the generation and processing of browser virtual machines. A network computing provider determines browser settings and other optimizations for improved performance when a browser is processing a specific type of web page or other network resource.
Amazon Technologies, Inc.


 Secure, anonymous browsing with a remote browsing server patent thumbnailSecure, anonymous browsing with a remote browsing server
A client device may connect to a remote browsing server, which may browse to a uniform resource identifier, render a web service or other content, and stream the content back to the client device. The client device may have a web browser through which the server may stream rendered images and which may capture various inputs, such as mouse operations, keyboard inputs, and other input.
Colorado Code Craft Patent Holdco, Llc


 Automated server cluster selection for virtual machine deployment patent thumbnailAutomated server cluster selection for virtual machine deployment
A device receives a virtual machine (vm) to be deployed, and identifies multiple network device clusters for possible vm deployment. The device applies a weighting parameter to at least one of the multiple network device clusters to favor selection of the at least one of the multiple network device clusters over other network device clusters.
Verizon Patent And Licensing Inc.


 Method and  provisioning virtual network functions from a network service provider patent thumbnailMethod and provisioning virtual network functions from a network service provider
A method and apparatus facilitates an enterprise to lease virtual appliances from network services provider. The method operates by deploying a converged networking and computing device at a service location, downloading a virtual network function to the converged networking and computing device, activating the virtual network function by a service in the wide area network, and connecting the virtual network function to a provisioned network path over the wide area network.
Ciena Corporation


 Method and  advanced statistics collection patent thumbnailMethod and advanced statistics collection
Systems, methods, and computer-readable media provide for collection of statistics relating to network traffic between virtual machines (vms) in a network. In an example embodiment, a virtual switch hosted on a physical server provides network address information of vms deployed on the physical server to a virtual switch controller.
Cisco Technology, Inc.


 Micro-virtual machine forensics and detection patent thumbnailMicro-virtual machine forensics and detection
An isolated environment is instantiated in response to receiving a request to execute a process. One or more events occurring within the isolated environment in which the process executes are identified.
Bromium, Inc.


 Creating host-level application-consistent backups of virtual machines patent thumbnailCreating host-level application-consistent backups of virtual machines
A host server hosting one or more virtual machines can back up host volumes and the one or more virtual machines installed thereon in an application-consistent manner. In one implementation, a host-level requestor instructs a host-level writer to identify which virtual machines qualify for application-consistent backups.
Microsoft Technology Licensing, Llc


 Selective processing of file system objects for image level backups patent thumbnailSelective processing of file system objects for image level backups
Systems, methods, and computer program products are provided for reducing the size of image level backups. An example method receives backup parameters identifying a physical or virtual machine (vm) to backup and at least one file system object to include in the backup.
Veeam Software Ag


 Server, control apparatus, operation method, and control method patent thumbnailServer, control apparatus, operation method, and control method
A technique making it possible to perform flexible virtual machine control is provided. A server according to the present invention is characterized by including: a first means capable of operating a plurality of network functions executed by a network node on a plurality of virtual machines corresponding respectively to the network functions; and a second means capable of forwarding a received signal to a virtual machine that operates a network function corresponding to the received signal, wherein the first means is capable of controlling a resource to allocate to the virtual machine corresponding to the network function, depending on a type of the network function..
Nec Corporation


 Determining a computing capacity of one of a physical or a virtual machine patent thumbnailDetermining a computing capacity of one of a physical or a virtual machine
The estimation of a computing capacity of a machine. The computing capacity is estimated by iteratively adding and removing calibrated computer processes on the machine, and performing a sum of computing loads of processes that execute on the machine.
Harmonic, Inc.


System and controlling resource revocation in a multi-guest computer system

At least one guest system, for example, a virtual machine, is connected to a host system, which includes a system resource such as system machine memory. Each guest system includes a guest operating system (os).
Vmware, Inc.

Cloud-based virtual machines and offices

Cloud-based virtual machines and offices are provided herein. Methods may include establishing a cloud-based virtual office using a runbook that is pre-configured with computing resource settings for vms as well as vm dependencies and sequences that create the virtual office or virtual private cloud.
Axcient, Inc.

Method and apparatus of accessing data of virtual machine

A methods and device for accessing virtual machine (vm) data are described. A computing device for accessing virtual machine comprises an access request process module, a data transfer proxy module and a virtual disk.
Alibaba Group Holding Limited

Virtual machine homogenization to enable migration across heterogeneous computers

Described is a technology by which a virtual machine may be safely migrated to a computer system with a different platform. Compatibility of the virtual machine may be checked by comparing the virtual machine's capabilities against those of the new platform.
Microsoft Technology Licensing, Llc

Automated scaling of application in virtual data centers

A system and method for autoscaling a multi-tier application, that has components executing on a plurality of tiers of a virtual data center, allocates resources to each of the plurality of tiers based on cost and performance. An application performance is determined, and a new application performance is estimated based at least partially on an application reservation and an application limit.
Vmware, Inc.

Presenting hypervisor data for a virtual machine with associated operating system data

The disclosed embodiments relate to a system for presenting data for virtual machines. During operation, the system obtains hypervisor data for a set of virtual machines, wherein the hypervisor data was received from one or more hypervisors while the set of virtual machines was running on the hypervisors.
Splunk Inc.

Dispatching the processing of a computer process amongst a plurality of virtual machines

Scheduling of processes in a cluster of physical machines. Complex processes are split into elementary processes.
Harmonic, Inc.

Identifying application usage roles for devices provided to virtual machines

Embodiments of the disclosure provide techniques for or managing devices for a virtual machine. A method is provided that includes associating, by a processing device of a cloud management system, a device with a virtual machine.
Red Hat, Inc.

Predictively provisioning cloud computing resources for virtual machines

Methods, computer program products, and systems are presented. The methods include, for instance: predictively provisioning, by one or more processor, cloud computing resources of a cloud computing environment for at least one virtual machine; and initializing, by the one or more processor, the at least one virtual machine with the provisioned cloud computing resources of the cloud computing environment.
International Business Machines Corporation

Using emulated input/output devices in virtual machine migration

Systems and methods for using emulated i/o devices in virtual machine live migration. An example method comprises: creating an emulated input/output (i/o) device corresponding to a virtual function i/o device associated with a virtual machine being migrated from a first host computer system to a second host computer system; intercepting, by a processing device of the first host computer system, virtual machine calls to the virtual function i/o device; processing the intercepted virtual machine calls using the emulated i/o device; and disassociating the virtual function i/o device from the virtual machine..
Red Hat Israel, Ltd.

Selective compiling method, device, and corresponding computer program product

A method and compiling device are provided for compiling a software application to be executed on a virtual machine of a physical platform. The software application originally is in the form of a set of codes to be compiled.
Google Inc.

Instantiating a virtual machine with a virtual non-uniform memory architecture

Techniques for effectuating a virtual numa architecture for virtual machines are disclosed herein. In an embodiment, a system determines the physical topology of a datacenter.
Microsoft Technology Licensing, Llc

Secure browsing via a transparent network proxy

A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource.
At&t Intellectual Property I, L.p.

Richer model of cloud app markets

In a cloud app market, a cloud infrastructure customer can purchase apps for performing services such as rootkit detection and network security for a customer virtual machine run by the cloud infrastructure customer. A cloud infrastructure provider executes a provider virtual machine monitor or hypervisor on cloud infrastructure.
Rutgers, The State University Of New Jersey

Communication with a virtual trusted runtime bios

A secure communication channel is established between a virtual trusted runtime basic input output system (bios) and a virtual machine that includes a virtual bios. The virtual trusted runtime bios communicates with the virtual machine according to a web-based protocol over the secure communication channel using a secure socket layer..
Hewlett-packard Development Company, L.p.

Detection of malware using an instrumented virtual machine environment

Various techniques for detection of malware using an instrumented virtual machine environment are disclosed. In some embodiments, detection of malware using an instrumented virtual machine environment includes instantiating a first virtual machine in the instrumented virtual machine environment, in which the first virtual machine is configured to support installation of two or more versions of a resource; installing a first version of the resource on the first virtual machine and monitoring the instrumented virtual machine environment while executing the first version of the resource with a malware sample opened using the first version of the resource; and installing a second version of the resource on the first virtual machine and monitoring the instrumented virtual machine environment while executing the second version of the resource with the malware sample opened using the second version of the resource..
Palo Alto Networks, Inc.

Asynchronous mapping of hot-plugged device associated with virtual machine

Systems and methods for asynchronous mapping of a hot-plugged i/o device associated with a virtual machine. An example method comprises: executing, by a first processing thread running on a host computer system, a virtual processor associated with a virtual machine; initializing, by a second processing thread, a table entry of a guest input/output (i/o) table associated with the virtual machine, wherein the table entry maps a device identifier of an i/o device to a memory buffer associated with the i/o device; pinning the memory buffer associated with the i/o device; responsive to receiving, by a hypervisor running on the host computer system, a completion signal from the second processing thread, notifying the virtual machine of the i/o device being hot-plugged..
Red Hat Israel, Ltd.

Machine identity persistence for users of non-persistent virtual desktops

Examples perform creation of a non-persistent virtual machine with a persistent machine identity associated with the user of the virtual machine, to provide consistent virtual desktop sessions to the user. Some examples contemplate that the machine identity is inserted into a virtual machine created through cloning, forking, or from a virtual machine pool..
Vmware, Inc.

Systems and methods of host-aware resource management involving cluster-based resource pools

Systems and methods are disclosed for managing resources associated with cluster-based resource pool(s). According to illustrative implementations, innovations herein may include or involve one or more of best fit algorithms, infrastructure based service provision, tolerance and/or ghost processing features, dynamic management service having monitoring and/or decision process features, as well as virtual machine and resource distribution features..
Virtustream Ip Holding Company Llc

Virtual non-uniform memory architecture for virtual machines

Techniques for effectuating a virtual numa architecture for virtual machines and adjusting memory in virtual numa nodes are described herein.. .
Microsoft Technology Licensing, Llc

Automated exploitation of virtual machine resource modifications

At least one application in a distributed computing environment is deployed. At least one resource of a virtual machine is provided to the at least one application in the distributed computing environment.
International Business Machines Corporation

Systems and methods involving features of hardware virtualization, hypervisor, pages of interest, and/or other features

Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or memory access. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a detection mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or notification of, and action by a monitoring guest upon access by a monitored guest to predetermined physical memory locations..
Lynx Software Technologies, Inc.

Virtual machine management system and method therefor

In the present invention, a virtual machine (vm) management system comprises: a vm operating status obtaining unit that obtains the usage status of resources according to a vm; a vm communication status obtaining unit that obtains the communication status between the vm and another vm; and a sprawl handling unit that deletes the vm and recovers resources allocated to the vm if the operating status and communication status of the vm do not satisfy prescribed standards. The usage status of resources to be obtained at least includes the cpu usage rate..
Hitachi, Ltd.

Operation-specific virtual machine placement constraints

A cloud manager includes operation-specific placement constraints so a system administrator has more flexibility in placing virtual machines on physical hosts. The operation-specific placement constraints may include an override parameter that allows the placement constraints to be overridden by a system administrator.
International Business Machines Corporation

Operation-specific virtual machine placement constraints

A cloud manager includes operation-specific placement constraints so a system administrator has more flexibility in placing virtual machines on physical hosts. The operation-specific placement constraints may include an override parameter that allows the placement constraints to be overridden by a system administrator.
International Business Machines Corporation

Hypervisor driven gradual balloon inflation

A hypervisor determines a target cpu usage of a virtual machine in responding to a request to allocate guest memory. Then the hypervisor receives a first balloon request for a first quantity of guest memory to be ballooned.
Red Hat Israel, Ltd.





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Virtual Machine for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Virtual Machine with additional patents listed. Browse our RSS directory or Search for other possible listings.


0.2266

file did exist - 1838

2 - 1 - 36