Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0246665 METHODS, MEDIA AND SYSTEMS FOR DETECTING ANOMALOUS PROGRAM EXECUTIONS
Methods, media, and systems for detecting anomalous program executions are provided. In some embodiments, methods for detecting anomalous program executions...
2016/0246664 MICRO CONTROLLER UNIT INCLUDING AN ERROR INDICATOR MODULE
A micro controller unit including an error indicator hardware module, the error indicator module being arranged to respond to event signals representative of...
2016/0246663 CREATING ENVIRONMENTAL SNAPSHOTS OF STORAGE DEVICE FAILURE EVENTS
A storage device failure in a computer storage system can be analyzed by the storage system by examining relevant information about the storage device and its...
2016/0246662 AUTOMATIC TROUBLESHOOTING
A method for automatically detecting and diagnosing problems in computer system functioning includes determining changed objects from computer system...
2016/0246661 ANALYZING THE AVAILABILITY OF A SYSTEM
An apparatus and method for analyzing availability of a system including subsystems each having at least one failure mode with a corresponding failure effect...
2016/0246660 STORAGE SYSTEM AND METHOD FOR CONTROLLING SAME
Provided is a storage system which is connected to a host computer and whereby data is read and written. The storage system comprises: a storage device which...
2016/0246659 FAILURE PREDICTION SYSTEM OF CONTROLLER
From an error information containing a content of a correctable error that has occurred in a controller of a failure prediction system and an ID of the...
2016/0246658 ACQUIRING DIAGNOSTIC DATA SELECTIVELY
One or more processors execute one or more software commands that are capable of command failure on one or more computing devices. One or more processors...
2016/0246657 RECEPTION ACCORDING TO A DATA TRANSFER PROTOCOL OF DATA DIRECTED TO ANY OF A PLURALITY OF DESTINATION ENTITIES
A data processing system arranged for receiving over a network, according to a data transfer protocol, data directed to any of a plurality of destination...
2016/0246656 EVENT MANAGEMENT METHOD AND DISTRIBUTED SYSTEM
A first information processing apparatus executes a first process, while a second information processing apparatus executes a second process. The first...
2016/0246655 CACHE AFFINITY AND PROCESSOR UTILIZATION TECHNIQUE
A cache affinity and processor utilization technique efficiently load balances work in a storage input/output (I/O) stack among a plurality of processors and...
2016/0246654 HINT INSTRUCTION FOR MANAGING TRANSACTIONAL ABORTS IN TRANSACTIONAL MEMORY COMPUTING ENVIRONMENTS
When executed, a transaction-hint instruction specifies a transaction-count-to-completion (CTC) value for a transaction. The CTC value indicates how far a...
2016/0246653 Parallel hardware hypervisor for virtualizing application-specific supercomputers
A parallel hypervisor system for virtualizing application-specific supercomputers is disclosed. The hypervisor system comprises (a) at least one...
2016/0246652 Techniques to Dynamically Allocate Resources of Configurable Computing Resources
Examples may include techniques to coordinate the sharing of resources among virtual elements, including service chains, supported by a shared pool of...
2016/0246651 Dynamic Recommendation Framework for Information Technology Management
Embodiments are provided for managing performance of a computer system. Both implicit and explicit recommendations for processing of tasks are provided. System...
2016/0246650 TRANSPARENT HIGH AVAILABILITY FOR STATEFUL SERVICES
One embodiment of the present invention provides a system. The system includes a high availability module and a data transformation module. During operation,...
2016/0246649 Dynamic Guest Virtual Machine Identifier Allocation
An example method of updating a virtual machine (VM) identifier (ID) stored in a memory buffer allocated from guest memory includes supplying firmware to a...
2016/0246648 INFORMATION TECHNOLOGY RESOURCE PLANNING
Methods and systems for planning IT resources for delivering high availability of applications in an IT environment are described. In one implementation, a...
2016/0246647 Adaptive Contention-Aware Thread Placement for Parallel Runtime Systems
An adaptive contention-aware thread scheduler may place software threads for pairs of application on the same socket of a multi-socket machine for execution in...
2016/0246646 METHOD FOR EXECUTING TASKS IN A COMPUTER NETWORK
Method for executing tasks in a computer network, wherein said computer network comprises nodes and optionally at least one starcoupler, wherein said nodes are...
2016/0246645 PARALLEL UTILIZATION OF AN ELECTRONIC DEVICE
A method of parallel utilization of an electronic device is disclosed. The method comprises concurrently processing a first operation and a second operation,...
2016/0246644 Method And System For Transition From Direct Interrupt State To Virtual Interrupt State Of Emulated Computing...
A system and method for configuring a virtual computing environment to operate in direct interrupt mode; receiving a triggering event triggering a transition...
2016/0246643 METHOD AND APPARATUS FOR SCHEDULING BLOCKING TASKS
Method, system, and computer-readable medium for scheduling blocking tasks are disclosed. A method includes: executing each of a plurality of task functions in...
2016/0246642 HINT INSTRUCTION FOR MANAGING TRANSACTIONAL ABORTS IN TRANSACTIONAL MEMORY COMPUTING ENVIRONMENTS
When executed, a transaction-hint instruction specifies a transaction-count-to-completion (CTC) value for a transaction. The CTC value indicates how far a...
2016/0246641 Fine-grained Hardware Transactional Lock Elision
Concurrent threads may be synchronized at the level of the memory words they access rather than at the level of the lock that protects the execution of...
2016/0246640 VIRTUAL MACHINE MORPHING FOR HETEROGENEOUS MIGRATION ENVIRONMENTS
Virtual machines may migrate between heterogeneous sets of implementation resources in a manner that allows the virtual machines to efficiently and effectively...
2016/0246639 WAKE-ON-LAN AND INSTANTIATE-ON-LAN IN A CLOUD COMPUTING SYSTEM
Several different embodiments of a flexible virtual machine management system are described. The virtual machine management system is used to instantiate,...
2016/0246638 SETTING UP A VIRTUAL MACHINE FOR AN IP DEVICE
The present disclosure relates to a method performed by an IP capable network node in a communication network. The method comprises receiving an IP message...
2016/0246637 Determining Trustworthiness of a Virtual Machine Operating System Prior To Boot UP
This disclosure relates generally to systems, apparatuses, methods, and computer readable media for intercepting a virtual machine boot process. More...
2016/0246636 CROSS HYPERVISOR MIGRATION OF VIRTUAL MACHINES WITH VM FUNCTIONS
A hypervisor executing on a source host receives a request to migrate a virtual machine from the source host to a destination host. Responsive to determining...
2016/0246635 DYNAMIC MANAGEMENT OF VIRTUAL FUNCTIONS ON SR-IOV CAPABLE HYPERVISORS
A virtualization manager receives a request to change a current number of virtual functions associated with at least one physical interface that provides...
2016/0246634 SERVICE DRIVEN VIRTUAL MACHINE SCHEDULING
The method including, receiving, from a management interface, an external services request, wherein the external services request comprises external service...
2016/0246633 READ-ONLY VM FUNCTION CHAINING FOR SECURE HYPERVISOR ACCESS
A hypervisor configures a first VM function component for execution on behalf of a virtual machine, the first VM function component to execute a second VM...
2016/0246632 GUEST CONTROLLED VIRTUAL DEVICE PACKET FILTERING
In response to detecting a change to a host hardware configuration, a hypervisor sends a notification of the change to a guest operating of a first virtual...
2016/0246631 Methods and Systems for Establishing Connections Associated with Virtual Machine Migrations
An example method of establishing one or more connections between a target host machine and a remote endpoint connected to a virtual machine (VM) running on a...
2016/0246630 GUEST CONTROLLED MALICIOUS PAYLOAD PROTECTION
A system, methods, and apparatus for guest controlled malicious payload protection. A request is received from a virtual machine to enable privileged access to...
2016/0246629 GPU BASED VIRTUAL SYSTEM DEVICE IDENTIFICATION
A hypervisor identifies a physical GPU device accessible by the hypervisor to be assigned to a virtual machine and retrieves a GPU device identifier from the...
2016/0246628 STATUS INDICATOR FOR A MERGE OPERATION ASSOCIATED WITH A VIRTUAL MACHINE
A virtual machine may be identified. A status indicator associated with a last volume of a series of volumes of a virtual disk that is associated with the...
2016/0246627 DETECTING AN INTERRUPTED OPERATION ASSOCIATED WITH A VIRTUAL MACHINE
A first identification of a series of volumes associated with a virtual disk that is associated with a virtual machine is received. A second identification of...
2016/0246626 RESOURCE RECONCILIATION IN A VIRTUALIZED COMPUTER SYSTEM
Implementations of the disclosure provide for mechanisms for resource reconciliation in a virtualized computer system. A method of the disclosure includes...
2016/0246625 COMPUTER SYSTEM AND MANAGEMENT COMPUTER CONTROLLING METHOD
In a computer system having a plurality of integrated systems of servers and storage apparatuses and having a management computer, each of the plurality of...
2016/0246624 VIRTUAL MACHINE NETWORK ASSIGNMENT
A processing device of a data center may receive a request to run a virtual machine. Responsive to determining that the virtual machine comprises a virtual...
2016/0246623 PER TENANT INITIALIZATION CHECK REMOVAL
In an approach for removing tenant initialization check per tenant for compiled code, a processor receives a request to create a tenant. A processor creates...
2016/0246622 Method and system for implementing invocation stubs for the application programming interfaces embedding with...
Systems and methods for increasing the execution speed of external API functions invocation and runtime checks. The techniques for generating invocation stubs...
2016/0246621 PER TENANT INITIALIZATION CHECK REMOVAL
In an approach for removing tenant initialization check per tenant for compiled code, a processor receives a request to create a tenant. A processor creates...
2016/0246620 ON-DEMAND LOADING OF DYNAMIC SCRIPTING LANGUAGE CODE FOR REDUCED MEMORY USAGE
A computer-implemented method and system for reducing the amount of memory space required to store applications written in dynamic scripting languages loads a...
2016/0246619 METHOD FOR HANDLING MODE SWITCHING WITH LESS UNNECESSARY REGISTER DATA ACCESS AND RELATED NON-TRANSITORY...
A mode switching handling method includes: when an operating system mode is switched from a first mode to a second mode, saving only a portion of register data...
2016/0246618 AUTOMATIC DISCOVERY AND CONFIGURATION OF STACK PORTS
A method of forming a stack is presented. According to some embodiments, a stack can be formed by determining stack ports in a group of units and converting...
2016/0246617 USING PUBLIC KEY INFRASTRUCTURE FOR AUTOMATIC DEVICE CONFIGURATION
A device may receive a digital voucher, a customer certificate, and configuration information for automatically configuring the device. The digital voucher may...
2016/0246616 Framework for Custom Actions on an Information Feed
Systems and methods for providing a custom action for an information post are described. In one embodiment, data for generating a user interface component for...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.