Red Hat, Inc.

United States of America

Back to Profile

1-100 of 4,419 for Red Hat, Inc. and 4 subsidiaries Sort by
Query
Aggregations
IP Type
        Patent 4,240
        Trademark 179
Jurisdiction
        United States 4,262
        World 79
        Europe 46
        Canada 32
Owner / Subsidiary
[Owner] Red Hat, Inc. 3,719
Red Hat Israel, Ltd. 676
ManageIQ, Inc. 14
Gluster, Inc. 7
Permabit Technology Corporation 3
Date
New (last 4 weeks) 41
2024 March (MTD) 30
2024 February 22
2024 January 16
2023 December 30
See more
IPC Class
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines 1,054
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU] 405
H04L 29/06 - Communication control; Communication processing characterised by a protocol 401
G06F 9/44 - Arrangements for executing specific programs 389
G06F 17/30 - Information retrieval; Database structures therefor 348
See more
NICE Class
09 - Scientific and electric apparatus and instruments 139
42 - Scientific, technological and industrial services, research and design 94
41 - Education, entertainment, sporting and cultural services 54
16 - Paper, cardboard and goods made from these materials 36
35 - Advertising and business services 20
See more
Status
Pending 486
Registered / In Force 3,933
  1     2     3     ...     45        Next Page

1.

ANNOTATION DRIVEN JUST IN TIME AND STATE-BASED RBAC POLICY CONTROL

      
Application Number 17950577
Status Pending
Filing Date 2022-09-22
First Publication Date 2024-03-28
Owner Red Hat, Inc. (USA)
Inventor
  • Gallagher, Brian
  • O'Connor, Cathal

Abstract

Systems and methods for implementing an annotation driven just in time and state-based RBAC policy control are disclosed. The method inserts an annotation into a code base that includes a function. The annotation identifies a resource corresponding to the function. The method compiles the code base into compiled code, which includes inserting, based on the annotation, a first request prior to the function that requests permission to access the resource; and inserting, based on the annotation, a second request subsequent to the function to turn off permission to access the resource. The method then deploys the compiled code to a target environment.

IPC Classes  ?

2.

Unikernel For WebAssembly Containers

      
Application Number 17955216
Status Pending
Filing Date 2022-09-28
First Publication Date 2024-03-28
Owner Red Hat, Inc. (USA)
Inventor
  • Scrivano, Giuseppe
  • Walsh, Daniel
  • Pascual, Sergio Lopez

Abstract

The present disclosure provides new and innovative systems and methods for deploying and running webassembly workloads on compute nodes using a webassembly unikernel. In an example method, a computing device having a processor generates, using a container engine, a container runtime. The computing device generates, using the container runtime, a unikernel configured to run a plurality of webassembly applications, thereby resulting in a webassembly unikernel. The computing device may receive a request to run an application. A container image corresponding to the application may be retrieved, via the container engine, from a container registry. A webassembly payload may be stored for the application from the container image. Furthermore, the computing device may cause the webassembly unikernel to run the webassembly payload for the application.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 67/025 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

3.

SMART IMAGE REGISTRIES FOR DYNAMIC IMAGE GENERATION

      
Application Number 17951928
Status Pending
Filing Date 2022-09-23
First Publication Date 2024-03-28
Owner Red Hat, Inc. (USA)
Inventor
  • Douglas, Stuart
  • Goldman, Marek

Abstract

Systems and methods for generating container images are described. An image definition file specifying a set of packages is received at a virtual image server. The image definition file may specify a set of packages and the virtual image server comprises a mapping of the image definition file to an image file corresponding to each of the set of packages. For each of the set of packages, the corresponding image file may be retrieved from an image registry and used to generate, by the virtual image server, an image manifest that references the corresponding image file for each of the set of packages as a separate image layer. The image manifest is provided to a container host, which may build a container image based on the image manifest.

IPC Classes  ?

4.

MANAGING ACCESS LEVEL PERMISSIONS BY A DISTRIBUTED LEDGER NETWORK

      
Application Number 17936359
Status Pending
Filing Date 2022-09-28
First Publication Date 2024-03-28
Owner RED HAT, INC. (USA)
Inventor Ibryam, Bilgin Ismet

Abstract

An access control list is identified that, for a specified data item, defines, for each of a set of access levels, one or more entities that are collectively to authorize access to the data item according to a respective access level. The access control list is translated into a sequence of instructions implementing a smart contract. The smart contract is to transmit requests to entities for authorization to allow a specified requesting entity to access the specified data item. Based on responses to the transmitted requests, the smart contract is to generate a first token that enables access to the specified data item according to a first level of access or a second token that enables access to the specified data item according to a second level of access. The sequence of instructions is transmitted to one or more nodes of a distributed ledger network.

IPC Classes  ?

5.

IDENTIFYING SIGNIFICANT CODE CHANGES VIA SYNTACTIC REPRESENTATION

      
Application Number 17953967
Status Pending
Filing Date 2022-09-27
First Publication Date 2024-03-28
Owner Red Hat, Inc. (USA)
Inventor
  • Bonic, Janos
  • Bonic, Sanja

Abstract

A first syntactic representation of a first version of a codebase and a second syntactic representation of a second version of the codebase are generated, the codebase comprising a plurality of units of software instructions. A portion of the first syntactic representation is determined to be different than a corresponding portion of the second syntactic representation. A first version and a second version of a unit of software instructions of the plurality of units of software instructions is obtained, wherein the portion of the first syntactic representation is based on the first version of the unit of software instructions and the corresponding portion of the second syntactic representation is based on the second version of the unit of software instructions. Information descriptive of a difference between the first version of the unit of software instructions and the second version of the unit of software instructions is generated.

IPC Classes  ?

  • G06F 8/71 - Version control ; Configuration management

6.

DISTRIBUTED ACCESS POLICIES

      
Application Number 17952887
Status Pending
Filing Date 2022-09-26
First Publication Date 2024-03-28
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Moloney, Aoife E.

Abstract

A first computing device of a plurality of computing devices in communication with one another via a communications channel receives, from a requesting computing device, an access request that identifies a subject, a resource identifier that identifies a resource, and an action, the first computing device having a set of access policies, each access policy corresponding to a particular resource of a plurality of resources. The first computing device determines that the resource identifier identifies a resource that is not governed by an access policy in the set of access policies. The first computing device sends, to the communications channel, the access request. The first computing device receives an access request decision from a second computing device of the plurality of computing devices, and the first computing device grants or denies access to the resource by the user based on the access request decision.

IPC Classes  ?

7.

DEPENDENCY ANALYSIS THROUGH CLASS FILE MANIPULATION

      
Application Number 17953576
Status Pending
Filing Date 2022-09-27
First Publication Date 2024-03-28
Owner Red Hat, Inc. (USA)
Inventor Douglas, Stuart Wade

Abstract

A processing device may receive a request for dependency information indicative of one or more class files included in an archive file. The processing device may fetch the archive file from an upstream source, where the archive file may be associated with the dependency information indicative of the one or more class files. The processing device may apply a transformation to the archive file to indicate provenance information for each of the one or more class files included in the archive file. The archive file may be incorporated in an application or a library, such that a scan of the application or the library may be performed for the provenance information associated with the archive file. An indication of each of the one or more class files included in the archive file may be output in view of the provenance information.

IPC Classes  ?

  • G06F 8/41 - Compilation
  • G06F 8/71 - Version control ; Configuration management
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots

8.

CONTAINER IMAGE TOOLING STORAGE MIGRATION

      
Application Number 17953886
Status Pending
Filing Date 2022-09-27
First Publication Date 2024-03-28
Owner Red Hat, Inc. (USA)
Inventor
  • Antinori, Paolo
  • Prasad, Rishab
  • Griffin, Leigh

Abstract

Container image tooling storage migration is generally described. In some examples, a first pull operation for a first container image may be performed. The first container image may be generated using a first container management tool. In various cases, a first binary representation of the first container image may be read. The first binary representation may be associated with the first container management tool. In some examples, a second binary representation of the first container image that corresponds to a second container management tool may be received. In various cases, a first container may be executed by the second container management tool using the second binary representation.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 8/61 - Installation

9.

MANAGING SERVICE LEVEL AGREEMENTS BY A DISTRIBUTED LEDGER NETWORK

      
Application Number 17936358
Status Pending
Filing Date 2022-09-28
First Publication Date 2024-03-28
Owner RED HAT, INC. (USA)
Inventor Ibryam, Bilgin Ismet

Abstract

Terms of a SLA between a user device of a computing system and a service provider of the computing system are identified. The service provider is to provide a service to the user device in accordance with the terms of the SLA. The terms are translated into a sequence of instructions corresponding to a smart contract, where the smart contract is to provide the user device with a service credit based on an availability of a service for the time interval and in accordance with the SLA. The sequence of instructions is transmitted to a first node of a distributed ledger network. Availability data indicating an availability of the service at the user device during each time period of a time interval is obtained. The availability data is provided to a second node of the distributed ledger network to cause the second node to execute the sequence of instructions.

IPC Classes  ?

  • H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 41/5006 - Creating or negotiating SLA contracts, guarantees or penalties
  • H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]

10.

SECURE TRANSMISSION OF CONTENT UPDATES VIA SUPERDENSE CODING

      
Application Number 17945531
Status Pending
Filing Date 2022-09-15
First Publication Date 2024-03-21
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

A method for updating content is disclosed that includes receiving, by a first quantum computing device (QD), a classical encoding of an update for content. The classical encoding is stored in a first set of bits with a first cardinality. The content is stored on a first classical computing device (CD) that is enabled to update the content via a patching protocol. In response to receiving the classical encoding, the first QD causes a transmission of the classical encoding. The transmission of the classical encoding includes transmitting a first set of qubits that have a second cardinality that is less than the first cardinality. Quantum states of the first set of qubits store a quantum-mechanical (QM) encoding of the update. The QM encoding of the update was generated based on a superdense coding protocol.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 8/65 - Updates
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

11.

VOICE CALL IDENTIFICATION AND AUTHENTICATION BASED ON APPLICATION USAGE

      
Application Number 17948824
Status Pending
Filing Date 2022-09-20
First Publication Date 2024-03-21
Owner Red Hat, Inc. (USA)
Inventor
  • Magnezi, Nir
  • Bregman, Arie

Abstract

Systems and methods providing call identification and authentication. In one implementation, a pool of phone numbers is maintained. A request for a phone number for initiating a voice call is received from a client device. A first phone number from the pool of phone numbers is transmitted to the client device. Responsive to receiving, from the client device, the voice call at the first phone number, the client device is declared authenticated.

IPC Classes  ?

  • H04M 3/22 - Arrangements for supervision, monitoring or testing
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

12.

CROSS-DOMAIN DATA ACCESS

      
Application Number 17949573
Status Pending
Filing Date 2022-09-21
First Publication Date 2024-03-21
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Cosentino, Andrea
  • Antinori, Paolo

Abstract

A cross-domain data access service enables data access across two or more computing domains, such as, for example, transient access by a public device to data held in a private cloud. In particular, the cross-domain data access service can identify a data subset from within a secure datastore of a first computing domain. The cross-domain data access service can replicate the data subset within a transient datastore that is segregated from the secured datastore. The cross-domain data access service can implement a data access policy so as to enable a client device from a second domain to access the transient datastore.

IPC Classes  ?

13.

MEMORY DEDUPLICATION FOR ENCRYPTED VIRTUAL MACHINES

      
Application Number 17947840
Status Pending
Filing Date 2022-09-19
First Publication Date 2024-03-21
Owner RED HAT, INC. (USA)
Inventor
  • Tsirkin, Michael
  • Arcangeli, Andrea

Abstract

Memory deduplication for encrypted virtual machines can be performed according to some examples. In one example, a virtual machine can select a target memory page stored in an encrypted memory of the virtual machine. The encrypted memory can be inaccessible to a hypervisor configured to manage the virtual machine. The virtual machine can store a copy of the target memory page to a shared memory that is accessible to the hypervisor. The hypervisor can then execute a deduplication process with respect to the copy of the target memory page stored in the shared memory. Subsequent to storing the copy of the target memory page to the shared memory, the virtual machine can remove the target memory page from the encrypted memory. The virtual machine can also prompt the hypervisor to reallocate the memory space of the encrypted memory that was previously used to store the target memory page.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

14.

PROVIDING A CAPTIVE PORTAL TO MANAGE A DRIVER APPLICATION FOR A PERIPHERAL DEVICE

      
Application Number 18514943
Status Pending
Filing Date 2023-11-20
First Publication Date 2024-03-21
Owner RED HAT, INC. (USA)
Inventor Tsirkin, Michael

Abstract

Aspects of the disclosure provide for mechanisms providing a captive portal to manage a driver application for a peripheral device. Systems and methods of the disclosure include: providing, by a client device, a first request for a connection with a peripheral device over a wireless network provided by the peripheral device; receiving a message granting the connection to the wireless network; providing a second request to access a first web page at an address; receiving a second web page associated with a driver application for the peripheral device instead of the first web page; and launching the driver application by using a first link that facilitates an installation of the driver application and a second link that launches the driver application.

IPC Classes  ?

  • G06F 9/4401 - Bootstrapping
  • G06F 13/10 - Program control for peripheral devices
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • H04L 67/63 - Routing a service request depending on the request content or context

15.

SECURE VIRTUAL MACHINE AND PERIPHERAL DEVICE COMMUNICATION

      
Application Number 18499127
Status Pending
Filing Date 2023-10-31
First Publication Date 2024-03-21
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

A cryptographic data item is generated based on at least a public cryptographic key associated with a peripheral device connected to a virtualized computing system. The cryptographic data is transmitted to the peripheral device. A shared cryptographic key is generated based on the generated cryptographic data. One or more memory access operations are performed to access data at a region of memory associated with the peripheral device using the shared cryptographic key.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/54 - Interprogram communication
  • G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
  • G06F 13/32 - Handling requests for interconnection or transfer for access to input/output bus using combination of interrupt and burst mode transfer
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

16.

PREDICTING AND MINIMIZING QUANTUM DECOHERENCE IN QUANTUM COMPUTER SYSTEMS

      
Application Number 17945158
Status Pending
Filing Date 2022-09-15
First Publication Date 2024-03-21
Owner RED HAT, INC. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

In one example described herein a system can receive, by a gate analysis service, a quantum assembly language (QASM) file. The QASM file can define a quantum algorithm that can include logic gates that can be executed on a quantum computer system. The system can access, by the gate analysis service, a data repository that can include an estimated amount of quantum decoherence associated with each logic gate of a plurality of logic gates that includes the logic gates. The system can determine, by the gate analysis service, a prediction of an amount of quantum decoherence associated with executing at least one logic gate of the logic gates on the quantum computer system. Additionally, the system can adjust, by the gate analysis service, the QASM file to modify the prediction associated with executing the logic gates on the quantum computer system.

IPC Classes  ?

  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
  • G06F 8/30 - Creation or generation of source code

17.

UPDATING EDGE NODES IN DISTRIBUTED COMPUTING ENVIRONMENTS USING PARTITIONS

      
Application Number 17945692
Status Pending
Filing Date 2022-09-15
First Publication Date 2024-03-21
Owner RED HAT, INC. (USA)
Inventor
  • Griffin, Leigh
  • Chibon, Pierre-Yves

Abstract

Edge nodes in distributed computing environments can be updated according to some aspects described herein. For example, a first node in the distributed computing environment can receive an update request from a management node. The update request can include an update file for updating a second node. In response to receiving the update request, the first node can generate a first partition and a second partition, containing the update file, within the first node. Additionally, the first node can generate a network tunnel between the first node and the second node. The first node can mount a file system for the second node onto the first partition and a copy of the file system onto the second partition of the first node via the network tunnel. The first node also can update the file system in the second partition using the update file to generate an updated file system.

IPC Classes  ?

  • G06F 16/17 - File systems; File servers - Details of further file system functions
  • G06F 9/4401 - Bootstrapping
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

18.

REAL TIME QUBIT ALLOCATION FOR ERROR CORRECTION

      
Application Number 17949627
Status Pending
Filing Date 2022-09-21
First Publication Date 2024-03-21
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

A first set of qubits is allocated to an error correcting process, the error correcting process is configured to utilize the first set of qubits to correct errors identified in a second set of qubits being used by a quantum process. Error correcting information is received from the error correcting process. A quantity of qubits in the first set of qubits is altered based on the error correcting information. Information that identifies an alteration of the quantity of qubits in the first set of qubits is communicated to the error correcting process.

IPC Classes  ?

  • G06N 10/70 - Quantum error correction, detection or prevention, e.g. surface codes or magic state distillation
  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

19.

ASYNCHRONOUS COMMUNICATION IN CLUSTER INFRASTRUCTURES

      
Application Number 17945278
Status Pending
Filing Date 2022-09-15
First Publication Date 2024-03-21
Owner Red Hat, Inc. (USA)
Inventor
  • Jain, Vaibhav
  • Rota, Jacopo

Abstract

A first controller application of a control plane of a cluster infrastructure may detect a message from a message queue of a data plane of the cluster infrastructure. The message may include a request to instantiate a new service. Responsive to detecting the message, a request may be transmitted to a second controller application of the control plane. Responsive to the request, the second controller application may instantiate the new service within the data plane.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

20.

PERFORMING DEPULICATION BASED ON ENCRYPTED STORAGE BLOCKS GENERATED USING A SECURE ENCLAVE

      
Application Number 17943350
Status Pending
Filing Date 2022-09-13
First Publication Date 2024-03-14
Owner RED HAT, INC. (USA)
Inventor Tsirkin, Michael

Abstract

Deduplication can be performed based on encrypted storage blocks generated by a secure enclave. For example, a secure enclave can generate a first encrypted storage block and a second encrypted storage block using an encryption key. The first encrypted storage block can be an encrypted version of a first storage block and the second encrypted storage block can be an encrypted version of a second storage block. The secure enclave can then provide the first encrypted storage block and the second encrypted storage block to a supervisory program executable on a processor that is separate from the secure enclave. The supervisory program can be configured to initiate deduplication of the first storage block and the second storage block in response to determining that the first encrypted storage block matches the second encrypted storage block.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

21.

QUBIT LAYERS FOR CONTAINERIZED LIKE EXECUTION

      
Application Number 17943863
Status Pending
Filing Date 2022-09-13
First Publication Date 2024-03-14
Owner Red Hat, Inc. (USA)
Inventor
  • Coady, Stephen
  • Griffin, Leigh

Abstract

Examples relating to qubit layers for containerized like execution are provided. In one example, a method may include obtaining a quantum service definition file. The method may include parsing the quantum service definition file to identify one or more instructions sets associated with qubit physical configuration. The method may include generating a qubit layer specification file based at least in part on the one or more instructions sets. The method may include storing the qubit layer specification file.

IPC Classes  ?

  • G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
  • G06F 9/445 - Program loading or initiating
  • G06F 16/248 - Presentation of query results

22.

DELAYING INTERRUPTS FOR VIRTUAL MACHINES

      
Application Number 17943960
Status Pending
Filing Date 2022-09-13
First Publication Date 2024-03-14
Owner RED HAT, INC. (USA)
Inventor Tsirkin, Michael

Abstract

A computing device can detect an interrupt associated with a virtual machine. Based on detecting the interrupt, the computing device can determine whether the virtual machine is in an idle state. Based on determining that the virtual machine is in the idle state, the computing device can delay the interrupt by storing the interrupt in an interrupt register for a period of time and preventing the interrupt from being transmitted to the virtual machine during the period of time. After storing the interrupt in the interrupt register, the computing device can determine that the virtual machine is in an awake state. In response to determining that the virtual machine is in the awake state, the computing device can transmit the interrupt from the interrupt register to the virtual machine.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

23.

AUTOMATIC GENERATION OF CONTAINER IMAGES

      
Application Number 17944605
Status Pending
Filing Date 2022-09-14
First Publication Date 2024-03-14
Owner Red Hat, Inc. (USA)
Inventor
  • Douglas, Stuart
  • Goldman, Marek

Abstract

Systems and methods for generating container images are described. An image tag comprising a set of code names is received at a virtual image server, wherein the virtual image server comprises a mapping of each code name of the set of code names to a corresponding image file. For each of the set of code names, a corresponding image file is retrieved from an image registry and an image manifest is generated by the virtual image server using the corresponding image file of each of the set of code names. The image manifest may reference the corresponding image file of each of the set of code names as a separate image layer. The virtual image server may provide the image manifest to a container host, which may build a container image based on the image manifest.

IPC Classes  ?

24.

AUTOMATIC GENERATION OF EXPORTER CONFIGURATION RULES

      
Application Number 18508535
Status Pending
Filing Date 2023-11-14
First Publication Date 2024-03-14
Owner Red Hat, Inc. (USA)
Inventor
  • Antinori, Paolo
  • Tarocchi, Andrea

Abstract

Systems and methods for detecting an interaction with an application displayed on a user interface to perform a metric exporting function of the application by using an exporter configuration that is inaccessible to a user. The system and method also includes exporting by a processing device executing an exporter, metrics generated by each of the one or more classes of the application to a monitoring program, wherein the exporter uses the exporter configuration to export the metrics generated by each of the one or more classes.

IPC Classes  ?

  • G06F 8/77 - Software metrics
  • G06F 8/71 - Version control ; Configuration management
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

25.

DYNAMIC ALLOCATION OF ARITHMETIC LOGIC UNITS FOR VECTORIZED OPERATIONS

      
Application Number 18507440
Status Pending
Filing Date 2023-11-13
First Publication Date 2024-03-14
Owner RED HAT, INC. (USA)
Inventor Drepper, Ulrich

Abstract

A method includes identifying, by a processor, one or more first arithmetic logic unit (ALU) operations in a first ALU operation queue, wherein the first ALU operations are associated with a first requested vector length and at least one first input vector; identifying, by the processor, one or more second ALU operations in a second ALU operation queue, wherein the second ALU operations are associated with a second requested vector length and at least one second input vector, wherein the processor comprises a vector logic unit, and the vector logic unit comprises a set of ALUs; determining a first subset of the set of ALUs and a second subset of the set of ALUs, in view of the first requested vector length, the second requested vector length, and one or more allocation criteria, wherein the first subset includes a first number of ALUs of the vector logic unit, and wherein the second subset includes a second number of ALUs of the vector logic unit; identifying one or more first identified operations from the first ALU operations, wherein each first identified operation corresponds to an ALU of the first subset of the set of ALUs; and performing each first identified operation using the corresponding ALU of the first subset of the set of ALUs.

IPC Classes  ?

  • G06F 15/80 - Architectures of general purpose stored program computers comprising an array of processing units with common control, e.g. single instruction multiple data processors
  • G06F 7/57 - Arithmetic logic units [ALU], i.e. arrangements or devices for performing two or more of the operations covered by groups  or for performing logical operations
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

26.

SIZING SERVICE FOR CLOUD MIGRATION TO PHYSICAL MACHINE

      
Application Number 17940475
Status Pending
Filing Date 2022-09-08
First Publication Date 2024-03-14
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Cosentino, Andrea
  • Antinori, Paolo

Abstract

A computing device receives data related to operation of a cloud computing environment having an application comprising several services. The data related to operation of the cloud computing environment can include time-based data related to computing resource use in the cloud computing environment, such as I/O rate, processor utilization, and others. In some implementations the services that compose the application can be orchestrated through an orchestrator, and in those implementations data regarding the orchestration can also be provided to the computing device. The computing device can also request service-related information from the cloud computing environment, where the service-related information can include financial related information for operations in the cloud. The computing device can take as input the data related to operation of the application and services the orchestration, and the service and thereafter provide a recommendation of an on-premises computing infrastructure adequate to replace the cloud computing environment.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 41/0803 - Configuration setting
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

27.

QUANTUM SERVICE MIGRATOR

      
Application Number 17941481
Status Pending
Filing Date 2022-09-09
First Publication Date 2024-03-14
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

Examples relating to transfer of quantum services among quantum computing devices in a quantum computing system are provided. In one example, a request to transfer a quantum service in a quantum computing system is received at a first quantum computing device. A second quantum computing device to which to transfer the quantum service is determined. The quantum service is paused at the first quantum computing device. A service replication for the quantum service is communicated from a first task manager service associated with the first quantum computing device to a second task manager service associated with the second quantum computing device.

IPC Classes  ?

  • G06N 10/70 - Quantum error correction, detection or prevention, e.g. surface codes or magic state distillation
  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

28.

DEPLOYING PATCHES VIA RPMS

      
Application Number 17941889
Status Pending
Filing Date 2022-09-09
First Publication Date 2024-03-14
Owner Red Hat, Inc. (USA)
Inventor
  • Chibon, Pierre-Yves
  • Griffin, Leigh

Abstract

Systems and methods for automated targeted patching of a target system. In one embodiment the present disclosure includes a method for compiling binary files from a source code package; running a diff tool to determine differences between the binary files and an application already installed on a target system; generating, based on the determined differences, a patch that includes at least one file to be installed on the target system; generating, a mapping file, the mapping file including information on where the at least one file will be installed on the target system; combining, the mapping file and the patch into a patch package; and installing the patch package on the target system.

IPC Classes  ?

29.

TRANSMITTING INTERRUPTS FROM A VIRTUAL MACHINE (VM) TO A DESTINATION PROCESSING UNIT WITHOUT TRIGGERING A VM EXIT

      
Application Number 17943437
Status Pending
Filing Date 2022-09-13
First Publication Date 2024-03-14
Owner RED HAT, INC. (USA)
Inventor Tsirkin, Michael

Abstract

One example described herein includes a source processing unit that can detect that guest software of a virtual machine has transmitted an interrupt to a virtual central processing unit (vCPU) identifier, where the vCPU identifier that does not match any vCPUs in the virtual machine. Based on the interrupt, the source processing unit can access an interrupt table that is associated with the virtual machine. The interrupt table can include an entry that maps the interrupt to a destination processing unit. Based on the entry in the interrupt table, the source processing unit can determine that the interrupt is to be transmitted to the destination processing unit. The source processing unit can then transmit the interrupt to the destination processing unit, without triggering an exit of the virtual machine on the source processing unit.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

30.

AUTOMATICALLY GENERATING A TRANSLATION ENGINE FOR FACILITATING REMOTE PROCEDURE CALLS BETWEEN A CLIENT PROGRAM AND A SERVER PROGRAM

      
Application Number 17939274
Status Pending
Filing Date 2022-09-07
First Publication Date 2024-03-07
Owner RED HAT, INC. (USA)
Inventor
  • Sigal, Ronald
  • Soldano, Alessio

Abstract

One example of the present disclosure includes a system that can access a server stub defining a server stub program. The server stub program can be configured to operate as a remote procedure call (RPC) interface for receiving a RPC request from a client program. The RPC request can include a data object in a first format. The system can also generate translator code defining a translation engine. The translator code can be generated based on the server stub. The translation engine can convert the data object from the first format associated with the RPC interface into a second format compatible with a server program. The server program can be separate from the server stub program and the translation engine.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

31.

QUBIT PREDICTABILITY SERVICES

      
Application Number 17893620
Status Pending
Filing Date 2022-08-23
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

Qubit predictability services for a quantum computing system are disclosed. In one example, a processor device of a computing system receives qubit utilization data that encodes a utilization history for each qubit in a set of qubits of a QCS. The processor device further performs one or more hypothesis tests for each qubit of the set of qubits based on the utilization history for the qubit and a set of quantum algorithms. The processor device further generates one or more predictability scores for each qubit of the set of qubits based on the one or more hypothesis tests for the set of qubits. The processor device further provides an indication of the one or more predictability scores for each qubit of the set of qubits to the QCS.

IPC Classes  ?

  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

32.

STREAM BASED COMPRESSIBILITY WITH AUTO-FEEDBACK

      
Application Number 17894692
Status Pending
Filing Date 2022-08-24
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Benhanokh, Gabriel Zvi
  • Wasserman, Orit
  • Salomon, Yehoshua

Abstract

Systems, methods, and apparatus are disclosed for management of data storage with stream based compressibility. In an example, an orchestrator including a storage controller managing one or more storage nodes executes on one or more processors. The orchestrator receives compression ratio measurements associated with attempts to compress data from a plurality of applications running on a plurality of service guests. The orchestrator receives a request for storing a first data stream from a first application running in a first service guest. Based on a compression ratio of previously stored data associated with the first application being less than a threshold, the orchestrator assigns a first compressibility setting to the first data stream. The first compressibility setting causes a storage node to store the first data stream without attempting to compress the first data stream.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

33.

PROTECTIONS AGAINST BROWSER-IN-BROWSER ATTACKS

      
Application Number 17898689
Status Pending
Filing Date 2022-08-30
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

Protections against browser-in-browser attacks are provided by in response to opening a first browser window and a second browser window, retrieving security key information stored by a browser application that are held outside of a document object model accessible by documents through the browser application; displaying a first instance of the security key information in the first browser window; and displaying, contemporaneously with display of the first instance of the security key information, a second instance of the security key information in the second browser window.

IPC Classes  ?

34.

VEHICLE CONTROL USING SERVERLESS FUNCTIONS

      
Application Number 17898855
Status Pending
Filing Date 2022-08-30
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Cosentino, Andrea
  • Antinori, Paolo

Abstract

Systems and methods for cloud-based vehicle control are generally described. In some examples, first vehicle identifier data identifying a first vehicle may be received. In some cases, first state data representing a first software version of a first system associated with the first vehicle identifier data may be received. In some examples, a first condition associated with the first system may be determined based at least in part on the first state data. In further examples, first control data may be sent to a first computing device of a first vehicle based at least in part on the first condition. In various examples, the first control data may be effective to control operation of at least one component of the first vehicle.

IPC Classes  ?

  • B60W 50/04 - Monitoring the functioning of the control system
  • B60W 10/04 - Conjoint control of vehicle sub-units of different type or different function including control of propulsion units
  • G06F 8/65 - Updates

35.

CLASS LOADING OF DEPENDENCY CLASS FILES USING MODIFIED CLASS IDENTIFIERS

      
Application Number 17900106
Status Pending
Filing Date 2022-08-31
First Publication Date 2024-02-29
Owner RED HAT, INC. (USA)
Inventor Veres, Stefan

Abstract

Systems and methods for class loading of dependency class files using modified class identifiers. An example method may comprise packaging one or more class files into a logical group for building an executable module to be deployed in a computing environment; assigning a class identifier to a class file of the logical group, wherein the class identifier comprises a class name and a project identifier; identifying a dependency class file of the class file of the logical group; and adding, to a build management data structure, an entry comprising the class identifier and a class identifier of the dependency class file.

IPC Classes  ?

36.

SECURED PERIPHERAL DEVICE COMMUNICATION VIA BRIDGE DEVICE IN VIRTUALIZED COMPUTER SYSTEM

      
Application Number 17900845
Status Pending
Filing Date 2022-08-31
First Publication Date 2024-02-29
Owner RED HAT, INC. (USA)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Systems and methods for secured peripheral device communication via a bridge device in virtualized computer systems. An example method may comprise receiving, by a virtualized execution environment running on a computing system, a state measurement associated with a bridge device of the computing system; generating an ephemeral key; responsive to validating the state measurement, transmitting, to the bridge device, the ephemeral key encrypted using a device key associated with the bridge device; and transmitting, to the bridge device, an access request directed to a peripheral device accessible via the bridge device, wherein the access request is encrypted using a value derived from the ephemeral key. Systems and methods for secured peripheral device communication via a bridge device in virtualized computer systems. An example method may comprise receiving, by a virtualized execution environment running on a computing system, a state measurement associated with a bridge device of the computing system; generating an ephemeral key; responsive to validating the state measurement, transmitting, to the bridge device, the ephemeral key encrypted using a device key associated with the bridge device; and transmitting, to the bridge device, an access request directed to a peripheral device accessible via the bridge device, wherein the access request is encrypted using a value derived from the ephemeral key. accessible via

IPC Classes  ?

37.

UNIKERNELS FOR PRIVATE/PUBLIC KEY DISTRIBUTION

      
Application Number 17898564
Status Pending
Filing Date 2022-08-30
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Zuccarelli, Luigi Mario

Abstract

An identifier for a public unikernel of a plurality of public unikernels is provided to a client computing system, the public unikernel storing a first key paired to a second key stored within a private unikernel of a plurality of private unikernels accessible to a server computing system that serves the client computing system. An encoding based on the identifier for the public unikernel is generated, the encoding being configured to identify, to the server computing system, the private unikernel that stores the second key. The encoding is provided to the server computing system.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/40 - Network security protocols

38.

MANAGING CLOUD RESOURCE CONSUMPTION USING DISTRIBUTED LEDGERS

      
Application Number 17898638
Status Pending
Filing Date 2022-08-30
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Gallagher, Brian
  • O'Connor, Cathal

Abstract

Systems and methods of the disclosure include: identifying, by a cloud resource management system, a cloud resource consumption model associated with one or more cloud resources; generating, by the cloud resource management system, a sequence of instructions implementing a smart contract based on the cloud resource consumption model; sending, to a distributed ledger network, the smart contract; receiving, by the cloud resource management system, cloud resource usage data associated with the one or more cloud resources; and causing, by transmitting a message reflecting the cloud resource usage data to the distributed ledger, the smart contract to be executed.

IPC Classes  ?

  • G06Q 30/04 - Billing or invoicing
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

39.

MEMORY DEDUPLICATION FOR ENCRYPTED VIRTUAL MACHINES

      
Application Number 17898707
Status Pending
Filing Date 2022-08-30
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

Memory deduplication for encrypted virtual machines is provided by identifying a page in a private memory of an encrypted virtual machine to place into a public memory in a virtualization environment; calculating a checksum for the page and storing the checksum in the private memory of the encrypted virtual machine; passing the page to a hypervisor of the virtualization environment to place into the public memory; calling the page via an application running in the encrypted virtual machine; and in response to verifying the page received from the public memory against the checksum stored in the private memory, proceeding with operation of the application using the page.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures

40.

USER-CUSTOMIZED VEHICLE CONTROL USING SERVERLESS FUNCTIONS

      
Application Number 17899098
Status Pending
Filing Date 2022-08-30
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Cosentino, Andrea
  • Antinori, Paolo

Abstract

Systems and methods for cloud-based vehicle control are generally described. In some examples, first vehicle identifier data identifying a first vehicle may be received. In some cases, first state data may be received by a serverless function. The first state data may representing a first condition of the first vehicle. In some examples, a first user-defined rule may be evaluated using the first state data. In further examples, first control data may be sent to a first computing device of the first vehicle based on the evaluation of the first user-defined rule using the first state data. The first control data may be effective to control operation of at least one component of the first vehicle.

IPC Classes  ?

41.

VERSION CONTROL OF FILES ENCODING INFORMATION VIA QUBITS

      
Application Number 17900059
Status Pending
Filing Date 2022-08-31
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Chibon, Pierre-Yves

Abstract

Quantum version control (QVC) services are disclosed that manage, track, and archives updates to the contents of a quantum file (QF). The QVC service tracks versions of a QF as updates are made to the QF, assigns a unique identifier to each version of the QF, and generates a version history for the QF. The QVC service enables a recovery of each version of the QF within the version history. The version history is encoded in metadata for the QF. The metadata for the QF enables the access of any version of the QF in the QF's version history. A set of qubits is prepared, such that quantum states of the set of qubits are in a superposition. The superposition of the quantum states of the set of qubits simultaneously encodes each version of the version history.

IPC Classes  ?

42.

TIMEOUT HANDLING FOR VIRTUAL DEVICES

      
Application Number 17900128
Status Pending
Filing Date 2022-08-31
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

A virtual device can be provided to a virtual machine from a hypervisor. The virtual can correspond to a backend element accessible to the VM via communications with the virtual device. The hypervisor can intercept a communication from the VM directed to the backend element via the virtual device. The hypervisor can set a timer. The timer can track an elapsed time from the communication to a response from the backend element. The hypervisor can send the communication from the virtual machine to the backend element. The timer can then be determined to have expired without a response being received. The virtual device can then be disabled.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

43.

DERIVING A CONTAINER FROM A PACKAGE SET

      
Application Number 17900237
Status Pending
Filing Date 2022-08-31
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Chibon, Pierre-Yves

Abstract

Deriving a container from a package set is disclosed. Package set metadata that identifies a plurality of packages to be included in a container image based on a package set is accessed. A container configuration file referencing the plurality of packages is generated based at least in part on the package set metadata. The container configuration file includes one or more commands complying with a container builder syntax that are implementable by a container builder to generate a container image including the plurality of packages. The container configuration file is stored in a memory of a computer system.

IPC Classes  ?

44.

PREFETCHING CACHED DATA FOR PREDICTED ACCESSES

      
Application Number 17900615
Status Pending
Filing Date 2022-08-31
First Publication Date 2024-02-29
Owner Red Hat, Inc. (USA)
Inventor
  • Benhanokh, Gabriel Zvi
  • Salomon, Yehoshua

Abstract

An example method may include identifying one or more requested data items requested by a client system, identifying, in view of one or more requested data items, a plurality of predicted data items and, for each predicted data item, a respective probability that the predicted data item will be requested by a subsequent access request, identifying a plurality of cacheable data items, where the cacheable data items comprise one or more of the predicted data items, wherein each cacheable data item comprises a predicted data item that satisfies caching criteria, wherein the caching criteria are evaluated in view of the respective probability that the predicted data item will be requested by a subsequent access request, and storing each of the plurality of cacheable data items in a cache memory of a respective storage server at which the cacheable data item is located.

IPC Classes  ?

  • G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch

45.

AUTOMATICALLY DEPLOYING A DEVELOPMENT ENVIRONMENT ON A TARGET SYSTEM

      
Application Number 17888688
Status Pending
Filing Date 2022-08-16
First Publication Date 2024-02-22
Owner RED HAT, INC. (USA)
Inventor
  • Bregman, Arie
  • Sariel, David

Abstract

A deployment engine executing on a computing device can receive a command from a user via a command line interface of the deployment engine. The command can include a predesignated flag for replicating a software development environment that is local to the computing device. The deployment engine can obtain configuration data describing characteristics of the software development environment. The deployment engine can, in response to receiving the command, build an image file based on the configuration data. The image file can be configured for deploying the software development environment inside a virtual guest on a remote computing device.

IPC Classes  ?

46.

DISTRIBUTED DEBUGGING ENVIRONMENT FOR A CONTINUOUS INTEGRATION PIPELINE

      
Application Number 17888713
Status Pending
Filing Date 2022-08-16
First Publication Date 2024-02-22
Owner RED HAT, INC. (USA)
Inventor
  • Bregman, Arie
  • Magnezi, Nir

Abstract

Some examples of the present disclosure relate to generating a distributed debugging environment for a continuous integration (CI) pipeline. For example, a system can detect a failure of a CI pipeline in relation to a code submission for a software project, the CI pipeline being performed in a distributed CI environment including CI nodes. The system can determine a configuration of the distributed CI environment in response to detecting the failure. The system can generate a distributed debugging environment based on the configuration of the distributed CI environment, the distributed debugging environment including debugging nodes that are separate from the CI nodes. The system can modify a configuration setting of the distributed debugging environment for use in determining a source of the failure of the CI pipeline with respect to the code submission.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

47.

MONITORING ENERGY CONSUMPTION ASSOCIATED WITH USERS OF A DISTRIBUTED COMPUTING SYSTEM USING TRACING

      
Application Number 17889497
Status Pending
Filing Date 2022-08-17
First Publication Date 2024-02-22
Owner RED HAT, INC. (USA)
Inventor
  • Chen, Huamin
  • Zeneva, Omri
  • Lifshitz, Yuval
  • Singh, Parul

Abstract

Energy consumption associated with users of a distributed computing system can be monitored using tracing according to some examples described herein. In one such example, a system can execute tracing software configured to track usage of a software service and generate tracing information. The tracing information cant attribute the usage of the software service to a group of users. The system can analyze the tracing information to determine a portion of the usage to attribute to a given user. The system can then determine an energy consumption estimate for the user, for example based on the portion of the usage associated with the user and an energy consumption amount associated with the software service. A graphical user interface can be generated indicating the energy consumption estimate for the user.

IPC Classes  ?

  • G06F 1/3296 - Power saving characterised by the action undertaken by lowering the supply or operating voltage
  • G06F 1/3231 - Monitoring the presence, absence or movement of users

48.

ITERATIVE WORKLOAD PROCESSING HAVING A MANDATORY PROCESSING TASK AND A PREFERRED PROCESSING TASK

      
Application Number 18491964
Status Pending
Filing Date 2023-10-23
First Publication Date 2024-02-22
Owner Red Hat, Inc. (USA)
Inventor
  • Ok, Ali
  • Griffin, Leigh

Abstract

Iterative workload processing having a mandatory processing task and a preferred processing task. A processor device iteratively performs a processing workload that comprises a mandatory processing task and a preferred processing task. The mandatory processing task includes accessing a plurality of input messages that have not yet been processed, and the preferred processing task has a target timeframe within which to be performed. For each iteration, a maximum preferred processing task amount of time to perform the preferred processing task is determined based on a moving average of mandatory processing task times of previous iterations and based on the target timeframe. The preferred processing task is performed for a period of time no greater than the maximum preferred processing task amount of time.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • A63F 13/35 - Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers - Details of game servers
  • A63F 13/577 - Simulating properties, behaviour or motion of objects in the game world, e.g. computing tyre load in a car race game using determination of contact between game characters or objects, e.g. to avoid collision between virtual racing cars
  • A63F 13/69 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor by enabling or updating specific game elements, e.g. unlocking hidden features, items, levels or versions

49.

STATE MAPS FOR QUANTUM COMPUTING

      
Application Number 17889936
Status Pending
Filing Date 2022-08-17
First Publication Date 2024-02-22
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

Examples relating to configuration of quantum computing devices using state maps are provided. In one example, data associated with one or more quantum service runs executed by a quantum computing device is obtained. A current state map for the quantum computing device is generated based at least in part on the data associated with the one or more quantum service runs. A simulated state map is generated based at least in part by performing a simulated execution of the one or more quantum service runs. A difference between the current state map and the simulated state map is determined. One or more configuration settings for the quantum computing device are determined based at least in part on the difference between the current state map and the simulated state map.

IPC Classes  ?

  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

50.

INDUSTRY OPINIONATED API MANAGED SERVICE

      
Application Number 17890640
Status Pending
Filing Date 2022-08-18
First Publication Date 2024-02-22
Owner Red Hat, Inc. (USA)
Inventor
  • Pinto, Ilan
  • Mihalache, Tudor
  • Shishov, Ilona
  • Montes, Ruben Romero

Abstract

Systems and methods for implementing an industry opinionated managed service are disclosed. A request from a client is received that includes a set of application programming interface (API) parameters comprising an industry type selection. An API managed service is implemented based on the set of API parameters, which includes creating a client-specific API and provisioning a set of backend resources based on the set of API parameters. The API managed service is deployed to an operational cloud, and one or more commands are processed at the operational cloud through the client-specific API utilizing the provisioned set of backend resources.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

51.

MULTI-CLUSTER NETWORKING USING HUB AND SPOKE ELASTIC MESH

      
Application Number 18494581
Status Pending
Filing Date 2023-10-25
First Publication Date 2024-02-15
Owner Red Hat, Inc. (USA)
Inventor
  • Magnezi, Nir
  • Kolesnik, Michael

Abstract

A method is provided that includes receiving, from a first cluster, data intended for a second cluster and routing the data to the second cluster, thereby forming an indirect connection between a first cluster and the second cluster. A network usage of the indirect connection may be monitored and in response to determining that the network usage of the indirect connection exceeds a network usage threshold, a respective remote agent of each of the first and second clusters may be instructed to form a direct connection between the first and second clusters and remove the indirect connection.

IPC Classes  ?

52.

FUNCTION POINTER PROTECTION

      
Application Number 18489545
Status Pending
Filing Date 2023-10-18
First Publication Date 2024-02-08
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

A system includes a memory and a processor in communication with the memory. The processor is configured to supply a library with a list of safe callback values, protect the list of safe callback values, invoke a callback, and validate the callback against the list of safe callback values to determine a status of the callback. The status of the callback is one of safe and unsafe. Additionally, the processor is configured to execute the callback responsive to determining the status of the callback is safe. The processor is also configured to abort the callback responsive to determining the status of the callback is unsafe.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 9/54 - Interprogram communication

53.

PROACTIVE INTEGRITY CHECKS

      
Application Number 17874138
Status Pending
Filing Date 2022-07-26
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Cosentino, Andrea
  • Antinori, Paolo

Abstract

A request to validate a project object model (POM) is received from a client device. The POM references one or more modules, each of which is associated with one or more artifacts. The artifacts associated with a module are downloaded to a staging repository along with checksums of the artifacts. The downloaded checksum is compared to a checksum calculated on the staging repository. Upon determining that the downloaded checksum matches the calculated checksum for all artifacts of all modules, the POM is moved to the staging repository.

IPC Classes  ?

  • G06F 11/10 - Adding special bits or symbols to the coded information, e.g. parity check, casting out nines or elevens
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 8/20 - Software design

54.

QUANTUM COMPUTING NETWORK WITH PHYSICAL MESH SERVICE

      
Application Number 17874605
Status Pending
Filing Date 2022-07-27
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Coady, Stephen
  • Griffin, Leigh

Abstract

Examples relating to quantum computing networks are provided. In one example, data indicative of a quantum computing device joining a quantum computing network is received. A plurality of quantum simulator nodes are generated for the quantum computing device. Each quantum simulator node simulates one of a plurality of different operating states of the quantum computing device. Each of the quantum simulator nodes is stored as an execution node of the quantum computing network for execution of a quantum service.

IPC Classes  ?

  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

55.

PACKAGE MAINTENANCE ARCHITECTURE

      
Application Number 17875037
Status Pending
Filing Date 2022-07-27
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Rossetti, Leonardo

Abstract

A package maintenance architecture can be provided for a computing system. For instance, a change status can be determined, the change status corresponding to a difference between reference content and endpoint content of at least one package storage location of a plurality of package storage locations. An update for the at least one package storage location can be determined based on the change status, wherein the update is configured according to a respective configuration scheme of a plurality of configuration schemes respectively associated with the plurality of package storage locations, and wherein the respective configuration scheme is associated with the at least one package storage location. Updating of the at least one package storage location according to the update can be initiated.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

56.

ADAPTIVE COMPRESSION FOR IDEMPOTENT DATA STORES IN COMPUTER MESSAGING

      
Application Number 17876095
Status Pending
Filing Date 2022-07-28
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Cosentino, Andrea
  • Antinori, Paolo

Abstract

Systems and methods for adaptive compression for idempotent data stores in computer messaging are generally described. In some examples, a first node may receive a first message that includes a first message identifier and first payload data. In some examples, the first node may determine that a respective available amount of storage of each node of a plurality of nodes is below a first threshold available amount of storage. In some cases, the plurality of nodes may include the first node. The first node may receive a compression key from a primary node of a cluster including the plurality of nodes. The first node may compress a second message identifier stored in a data structure of the first node using the compression key.

IPC Classes  ?

  • H04L 69/04 - Protocols for data compression, e.g. ROHC
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures

57.

HYBRID CLOUD PACKAGE BUILD ARCHITECTURE

      
Application Number 17876192
Status Pending
Filing Date 2022-07-28
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Rossetti, Leonardo

Abstract

A hybrid cloud package build architecture can be provided for a computer system. For instance, a trigger can be determined for fetching an external package component for integration with a local package component. Based on the trigger, a request can be transmitted to an external package repository to obtain the external package component. The external package component can be received responsive to the request. The external package component can be cached for integration with the local package component.

IPC Classes  ?

  • G06F 8/65 - Updates
  • G06F 12/0868 - Data transfer between cache memory and other subsystems, e.g. storage devices or host systems
  • G06N 20/00 - Machine learning

58.

QUBIT-IMPLEMENTED ROLE-BASED ACCESS CONTROL

      
Application Number 17876947
Status Pending
Filing Date 2022-07-29
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

A quantum computing system receives, from a requestor, a first access request that identifies a subject, an action, and a resource. A mapping structure that identifies a plurality of qubits that are in superposition and encoded with a plurality of rules that govern access to the resource is accessed. Based on the mapping structure it is determined that a set of qubits of the plurality of qubits applies to the access request. Data encoded in the set of qubits or a reference to each qubit in the set of qubits is provided to the requestor.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

59.

QUICK PRESENTATION OF CAMERA VIDEO IN A VEHICLE USING LINUX

      
Application Number 18486725
Status Pending
Filing Date 2023-10-13
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Curtin, Eric
  • Griffin, Leigh

Abstract

During a boot process of a computing device, a boot loader loads a kernel and an initial RAM disk image from a persistent storage device into RAM. The initial RAM disk image includes a file system that includes a camera application. The kernel is invoked, and the kernel mounts a RAM disk from the initial RAM disk image as a root file system. The kernel causes an initiation of the camera application into a user space. The camera application obtains an image frame from a camera. The camera application processes the image frame to generate a processed image frame, and provides the processed image frame to a frame buffer for presentation of the processed image frame on a display device.

IPC Classes  ?

  • G06F 9/4401 - Bootstrapping
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
  • G06F 9/445 - Program loading or initiating
  • H04N 5/268 - Signal distribution or switching
  • H04N 5/262 - Studio circuits, e.g. for mixing, switching-over, change of character of image, other special effects

60.

CONTAINER IMAGE MANAGEMENT

      
Application Number 17873860
Status Pending
Filing Date 2022-07-26
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor Scrivano, Giuseppe

Abstract

Implementations of the disclosure provide a method including calculating, by a processing device, a time required to have a container image ready for use; determining whether the time satisfies a threshold criterion; and responsive to determining that the time satisfies the threshold criterion, performing a synchronization operation that stores the container image in a persistent storage.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

61.

RUNTIME ENVIRONMENT OPTIMIZER FOR JVM-STYLE LANGUAGES

      
Application Number 17874155
Status Pending
Filing Date 2022-07-26
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Foley, Christopher
  • Griffin, Leigh

Abstract

A continuous optimizer detects a code promotion of a candidate release of an application. In response to the code promotion, the continuous optimizer instantiates a JVM and profiles the application to obtain a JVM profile. The continuous optimizer benchmarks the candidate release against the JVM and JVM profile. The continuous optimizer further compares the benchmark results with previous benchmark results. Based upon the comparison and a set of rules, the continuous optimizer causes the candidate release to be promoted.

IPC Classes  ?

  • G06F 8/60 - Software deployment
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

62.

QUBIT MAPPED DIAMOND DEPENDENCY RECOMMENDATION SERVICE

      
Application Number 17874167
Status Pending
Filing Date 2022-07-26
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

Embodiments of the present disclosure provide techniques for performing a quantum computing-based diamond dependency analysis. A classical diamond dependency service may analyze a service and determine a set of dependencies that the service requires to execute. The classical DDS may then generate a quantum assembly language (QASM) file comprising a diamond dependency algorithm (DDA) and a mapping of a configuration file of the service and a configuration file of each of the set of dependencies to a respective qubit among a plurality of qubits. The classical DDS may interface with one or more quantum DDSs (QDDSs) that are each part of a respective quantum environment in order to determine qubits that are available to be mapped to the configuration files of the service and its dependencies. The classical DDS may execute the QASM file using the one or more QDDSs to detect one or more diamond dependencies.

IPC Classes  ?

  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
  • G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control

63.

AUTOMATIC GENERATION OF INTERFACES FOR OPTIMIZING CODEBASES

      
Application Number 17875545
Status Pending
Filing Date 2022-07-28
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Bonic, Janos
  • Bonic, Sanja
  • Griffin, Leigh

Abstract

A plurality of invoking units of software instructions that each directly invoke one or more functions of an invoked unit of software instructions are identified. Based on at least one criterion a first function of the one or more functions is selected for inclusion in an interface. An interfacing unit of software instructions that implements the interface is generated, the interface being configured to be invoked by at least one of the plurality of invoking units of software instructions, and when invoked, to invoke the first function.

IPC Classes  ?

  • G06F 8/76 - Adapting program code to run in a different environment; Porting
  • G06F 8/71 - Version control ; Configuration management

64.

POLYMORPHIC UNIKERNAL FACTORY FOR NODE MANAGEMENT

      
Application Number 17876226
Status Pending
Filing Date 2022-07-28
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor
  • Zuccarelli, Luigi Mario
  • Griffin, Leigh

Abstract

The present disclosure provides new and innovative systems and methods for managing nodes using polymorphic unikernals. In an example, a method includes generating, by a polymorphic unikernal service (PUS) system having a processor, a virtual machine. A generic unikernal may be created, retrieved, and/or embedded within the virtual machine. The PUS system may receive, from an Internet of Things (IoT) device (e.g., one of a plurality of nodes communicatively linked to the PUS system), a configuration file indicating a configuration of the IoT device. The PUS system may modify the generic unikernal to generate a modified unikernal based on the configuration of the IoT device. Furthermore, the PUS sytem may deploy the virtual machine on the IoT device. The deployed virtual machine may be embedded with the modified unikernal.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

65.

SECURED PERIPHERAL DEVICE COMMUNICATION IN VIRTUALIZED COMPUTER SYSTEM

      
Application Number 17876370
Status Pending
Filing Date 2022-07-28
First Publication Date 2024-02-01
Owner RED HAT, INC. (USA)
Inventor
  • Tsirkin, Michael
  • Ilan, Amnon

Abstract

Systems and methods for securing assigned peripheral device in virtualized computer system. An example method may comprise receiving, by a virtualized execution environment, a state measurement associated with a peripheral device of the computing system. Generating a guest cryptographic key. Responsive to validating the state measurement, transmitting, to the peripheral device, the guest cryptographic key encrypted using the device cryptographic key. Transmitting, to the peripheral device, an access request that is cryptographically signed using a first value derived from the device cryptographic key or a second value derived from the guest cryptographic key and encrypted using a third value derived from the guest cryptographic key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

66.

VERIFICATION OF CORE FILE DEBUGGING RESOURCES

      
Application Number 17877528
Status Pending
Filing Date 2022-07-29
First Publication Date 2024-02-01
Owner Red Hat, Inc. (USA)
Inventor Merey, Aaron

Abstract

Systems and methods for implementing a verification of core file debugging resources are disclosed. A plurality of mappings are created from a core file comprising a plurality of filenames and a plurality of target build identifiers (IDs). The core file corresponds to a computer program crash event and each one of the plurality of mappings map one of the plurality of filenames to a corresponding one of the plurality of target build IDs. Responsive to creating the plurality of mappings, a first file is located that corresponds to a first filename included in a first mapping from the plurality of mappings. The first comprises a first target build ID. A processing device utilizes the first file to analyze the computer program crash event in response to determining that the first file build ID matches the first target build ID.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine

67.

Implementing network function logic in a virtual switch

      
Application Number 17877184
Grant Number 11888737
Status In Force
Filing Date 2022-07-29
First Publication Date 2024-01-30
Grant Date 2024-01-30
Owner Red Hat, Inc. (USA)
Inventor
  • Fontaine, Christophe
  • K R, Saravanan
  • Marchand, David
  • Coquelin, Maxime

Abstract

Techniques for configuring a packet session are disclosed. An example method includes receiving, at a network function, a packet from a virtual connection device. The method also includes identifying, by the network function, an action to perform on the packet and modifying the header based on the action to create a modified packet with a modified header. The method also includes copying the modified packet from the network function to the virtual connection device for the virtual connection device to perform the action on the modified packet based on the modified header. The method also includes configuring, by a processing device executing the network function, the virtual connection device to perform the action on subsequent packets of the packet session. The virtual connection device performs the action on the subsequent packets without copying the subsequent packets to the network function.

IPC Classes  ?

  • H04L 45/586 - Association of routers of virtual routers
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 49/00 - Packet switching elements

68.

RANKING GRAPH ELEMENTS BASED ON NODE PROPERTY CRITERIA

      
Application Number 17867886
Status Pending
Filing Date 2022-07-19
First Publication Date 2024-01-25
Owner RED HAT, INC. (USA)
Inventor
  • Loffay, Pavol
  • Fox, Nicholas
  • Mazzitelli, John Joseph

Abstract

Graph elements can be ranked based on node property criteria. For example, a computing system can present, via a user interface of a user device, a graph that includes a plurality of nodes and a plurality of edges between the plurality of nodes. The plurality of nodes represent entities and the plurality of edges represent relationships between the entities. The computing device can receive a criteria related to node properties of the plurality of nodes for ranking the plurality of nodes in the graph. The computing device can generate a ranking of the plurality of nodes based on the criteria. The computing device can receive a condition associated with the ranking of the plurality of nodes and determine a subset of the plurality of nodes that satisfy the condition. The computing device can perform an action associated with the subset of the plurality of nodes that satisfy the condition.

IPC Classes  ?

  • G06F 16/901 - Indexing; Data structures therefor; Storage structures
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/26 - Visual data mining; Browsing structured data

69.

OPTIMIZATION OF A PIPELINE OF SERVICES

      
Application Number 17870515
Status Pending
Filing Date 2022-07-21
First Publication Date 2024-01-25
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Carroll, Anthony F.

Abstract

For at least some services in a pipeline of interrelated services that process transactions, a corresponding service lead time is obtained. The corresponding service lead time quantifies, for a corresponding service of the at least some services a first amount of time that an input transaction awaits servicing by the corresponding service. It is determined that a lead time of a first service of the at least some services is below a lead time threshold. In response to determining that the lead time of the first service is below the lead time threshold, a throughput enhancement of an upstream service is caused.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

70.

RUNTIME GUIDED OPTIMIZATION OF BUSINESS ASSET COMPONENTS

      
Application Number 17871309
Status Pending
Filing Date 2022-07-22
First Publication Date 2024-01-25
Owner Red Hat, Inc. (USA)
Inventor
  • Vacchi, Edoardo
  • Antinori, Paolo

Abstract

Trace data generated by a set of executing business asset components of a plurality of business asset components that form a business process application are received. Source code that defines the plurality of business asset components is received. Based on the trace data and the source code, native binary executable code is generated for a first subset of the business asset components and interpretable code for a second subset of business asset components is maintained.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

71.

REAL TIME QUBIT ALLOCATION FOR DYNAMIC NETWORK TOPOGRAPHIES

      
Application Number 17871365
Status Pending
Filing Date 2022-07-22
First Publication Date 2024-01-25
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

Qubit allocation for dynamic network topographies is disclosed. In one example, a processor device of a computing system implements a configuration to quantum definition (C2Q) service that performs real time qubit allocation for dynamic network topographies. The C2Q service can ensure synchronization between a configuration file for a network topography and a quantum definition file for qubits allocated to the network topography.

IPC Classes  ?

  • H04L 41/12 - Discovery or management of network topologies
  • H04B 10/70 - Photonic quantum communication

72.

Optimizing quantum teleportation as a service

      
Application Number 17870601
Grant Number 11893455
Status In Force
Filing Date 2022-07-21
First Publication Date 2024-01-25
Grant Date 2024-02-06
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

A method for providing teleportation services includes receiving, by a computing device, a first signal. The first signal indicates a request for a teleportation event between a first quantum computing system (QCS) and a second QCS. A first set of qubits is associated with the first QCS. A second set of qubits is associated with the second QCS. In response to receiving the first signal, the computing device causes an allocation of a first qubit of the first set of qubits for the teleportation event. In response to receiving the signal, the computing device causes an allocation of a second qubit of the second set of qubits for the teleportation event. The computing device receives a second signal that indicates a successful completion of the teleportation event. In response to receiving the second signal, the computing system causes a deallocation of the first qubit of the first set of qubits.

IPC Classes  ?

  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms
  • G06F 13/42 - Bus transfer protocol, e.g. handshake; Synchronisation

73.

Noisy intermediate-scale quantum service analysis for cloud based support

      
Application Number 17899266
Grant Number 11880745
Status In Force
Filing Date 2022-08-30
First Publication Date 2024-01-23
Grant Date 2024-01-23
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

A system and method of selectively distributing blocks of a quantum assembly language (QASM) file over resources of a quantum computing environment to optimize performance of the quantum computing environment. The method includes receiving a quantum assembly language (QASM) file comprising a plurality of blocks. The method includes calculating a plurality of complexity scores each indicative of a degree of complexity to process a respective block of the plurality of blocks. The method includes calculating a plurality of risk scores associated with a pool of quantum computers, each risk score is indicative of a likelihood of a respective quantum computer of the pool of quantum computers entering an undesired state responsive to processing a respective block of the plurality of blocks. The method includes selectively distributing, based on the plurality of risk scores, each of the plurality of blocks to a single quantum computer of the pool of quantum computers.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

74.

MULTI-ELEMENT SELECTION OF SUBTREES IN FIXED-DEPTH TREES

      
Application Number 17864175
Status Pending
Filing Date 2022-07-13
First Publication Date 2024-01-18
Owner Red Hat, Inc. (USA)
Inventor
  • Rukletsov, Alexander
  • Isberner, Malte

Abstract

Systems and methods are disclosed for dynamic selection of resource objects in a cloud-based system. The method may comprise defining a scope group from a scope tree, via a dynamic query, wherein the dynamic query comprises executing a query on the scope tree, the query including a name-type rule, a label-type rule, or a combination thereof; and selecting a subtree of the scope tree, to include in the scope group, based on the query. One or more subtrees may be selected as part of a scope group which are then applied by a cloud operating system to control, allow, or prevent access and determine a user's worldview in regards to a networked cloud-based system with all its various components, applications and resources.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

75.

QUANTUM SIMULATOR NETWORK FOR SIMULATING A QUANTUM SERVICE

      
Application Number 17864206
Status Pending
Filing Date 2022-07-13
First Publication Date 2024-01-18
Owner Red Hat, Inc. (USA)
Inventor
  • Coady, Stephen
  • Griffin, Leigh

Abstract

Examples relating to simulating quantum services are provided. In one example, a quantum service definition file comprising a plurality of instructions is obtained. One or more instruction sets are determined from the plurality of instructions. Each instruction set is communicated to a plurality of quantum simulator nodes. Each quantum simulator node is associated with a different configuration profile for a quantum computing device. For each instruction set, a result set is obtained from each quantum simulator node. The result set includes data indicative of one or more performance metrics associated with an execution of the instruction set by a quantum computing device. A composite result set is determined based at least in part on the result set from each quantum simulator node.

IPC Classes  ?

  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

76.

Software Testing Using a Quantum Computer System

      
Application Number 17864493
Status Pending
Filing Date 2022-07-14
First Publication Date 2024-01-18
Owner RED HAT, INC. (USA)
Inventor
  • Griffin, Leigh
  • Reddy, Veera Raghava Beri
  • Kanta, Srinivasa Bharath

Abstract

In one example described herein a system can receive, by a server, a software test suite comprising a plurality of data files. Each data file of the plurality of data files can correspond to a test of the software test suite. The system can generate, by the server, a mapping that assigns, for each data file, a qubit of a quantum computer system to the data file. The system can generate, by the server, a quantum assembly language (QASM) file that indicates the mapping and one or more properties associated with the qubit for each data file. The system can send, by the server, the QASM file to the quantum computer system for execution by the quantum computer system. The system can cause, by the server, an action based on an output generated by the quantum computer system.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

77.

SOFTWARE AIDED GOVERNANCE FOR PROJECT CONTRIBUTION ON SOURCE CODE MANAGEMENT (SCM) AND CONTINUOUS INTEGRATION (CI) ENVIRONMENTS

      
Application Number 17860948
Status Pending
Filing Date 2022-07-08
First Publication Date 2024-01-11
Owner Red Hat, Inc. (USA)
Inventor
  • Soldano, Alessio
  • Antinori, Paolo

Abstract

Techniques for processing change requests for software projects are disclosed. An example method includes generating a contributor score for a contributor of source code to a software project and saving the contributor score to a storage device. The contributor score reflects a degree to which source code submissions by the contributor are trustworthy. The method also includes receiving a change request from the contributor to change a part of the software project. The change request includes new or updated source code for the software project. The method also includes, in response to receiving the change request, retrieving the contributor score from the storage device, comparing, by a processing device, the contributor score to a threshold to identify an action to be performed in relation to the change request, and executing the action.

IPC Classes  ?

  • G06F 8/71 - Version control ; Configuration management
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

78.

DYNAMIC API GATEWAY ROUTING BASED ON REQUEST METADATA

      
Application Number 18369029
Status Pending
Filing Date 2023-09-15
First Publication Date 2024-01-11
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Chibon, Pierre-Yves

Abstract

A gateway device receives a request from a client device, the gateway to provide access to a plurality of services provided by a plurality of compute nodes. A manifest is created based on metadata associated with the request and characteristics of the plurality of services, the manifest identifying a logical view of a subset of the plurality of services provided by a subset of the plurality of compute nodes. The request is routed to one of the subset of the plurality of services based on the manifest.

IPC Classes  ?

  • H04L 45/12 - Shortest path evaluation
  • H04L 67/561 - Adding application-functional data or data for application control, e.g. adding metadata
  • H04L 45/302 - Route determination based on requested QoS

79.

GIT-BASED DELTA RPM

      
Application Number 17858947
Status Pending
Filing Date 2022-07-06
First Publication Date 2024-01-11
Owner Red Hat, Inc. (USA)
Inventor
  • Chibon, Pierre-Yves
  • Griffin, Leigh

Abstract

Embodiments of the present disclosure involve determining that a first subsequent version of a plurality of subsequent versions of a package is available, a repository is generated and a delta difference between a current version of the package and the first subsequent version of the package is committed to the repository. For each further subsequent version of the plurality of subsequent version of the package that is determined to be available, a delta difference between the further subsequent version of the package and an immediately preceding version of the package is generated and committed to the repository. In this way, a volume of discreet repositories that includes the delta difference history between each of the existing versions of the package is maintained and can be accessed to enable a client to build a subsequent (or previous) version of a package even if the current version they are running is multiple versions behind (or ahead).

IPC Classes  ?

  • G06F 8/71 - Version control ; Configuration management
  • G06F 8/73 - Program documentation
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

80.

SYNCHRONIZING CONCURRENT TASKS USING INTERRUPT DEFERRAL INSTRUCTIONS

      
Application Number 17853686
Status Pending
Filing Date 2022-06-29
First Publication Date 2024-01-04
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

An example method may include responsive to receiving, by a processing device, an interrupt deferral instruction requesting that interrupts be deferred, disabling delivery of interrupts by the processing device, receiving one or more interrupt requests subsequent to disabling delivery of interrupts, and responsive to determining that a deferral termination criterion is satisfied, delivering one or more interrupts, wherein each of the one or more interrupts is specified by a respective one of the interrupt requests. The method may further include receiving a resume interrupt delivery instruction requesting that deferred and subsequent interrupts be delivered, wherein the deferral termination criterion is satisfied in response to receiving the resume interrupt delivery instruction. The method may further include, responsive to receiving the resume interrupt delivery instruction, enabling delivery of the one or more interrupts and subsequent interrupts by the processing device.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

81.

MITIGATION OF QUBIT DECOHERENCE IN QUANTUM COMPUTING AND INFORMATION PROCESSING SYSTEMS

      
Application Number 17853048
Status Pending
Filing Date 2022-06-29
First Publication Date 2024-01-04
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

The ability to employ a qubit for computation and/or information processing is fragile. A qubit is employable for calculation purposes only when the qubit is in “coherence” with other qubits of the quantum computation system and isolated from other elements of the universe. Temperatures near absolute zero are often required for such isolation. Heat, as well as other conditions may cause a qubit to become decohered and “entangled” with other elements of the universe. The invention mitigates adverse issues associated with qubit decoherence in quantum computing and information processing systems. During the execution of a quantum computation, the utilized qubits are monitored for signatures indicating qubit decoherence and/or likely decoherence. Rising heat and/or temperature of a qubit may be one signal of decoherence. During the calculation, when a qubit is determined to be anomalous, the invention “swaps-out” the anomalous qubit and “swaps-in” a non-anomalous qubit.

IPC Classes  ?

  • G06N 10/70 - Quantum error correction, detection or prevention, e.g. surface codes or magic state distillation
  • G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing

82.

DISTRIBUTED PROCESS ENGINE IN A DISTRIBUTED COMPUTING ENVIRONMENT

      
Application Number 17856803
Status Pending
Filing Date 2022-07-01
First Publication Date 2024-01-04
Owner RED HAT, INC. (USA)
Inventor
  • Dolphine, Tiago
  • Vacchi, Edoardo

Abstract

A distributed computing environment can include a distributed process engine. For example, a computing device can receive, by a process engine distributed across a plurality of nodes of a distributed computing environment, a description of a process comprising a plurality of deployment units. The process can be associated with a graph representing a plurality of tasks to be performed to complete the process. The description can define relationships between the plurality of deployment units. The computing device can deploy, by the process engine, the plurality of deployment units in the distributed computing environment. The computing device can cause, by the process engine, an action associated with an execution of one or more deployment units of the plurality of deployment units.

IPC Classes  ?

83.

DYNAMIC CONTAINER LAYER SWITCHING

      
Application Number 17848209
Status Pending
Filing Date 2022-06-23
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Coady, Stephen

Abstract

A system and method for dynamically switching layers of a container image for adapting performance to a computing environment. The method includes receiving a request to generate a container image including a plurality of unique layers. The method includes determining a set of optional layers for each unique layer of the container image based on a plurality of tags associated with the container image. The method includes defining one or more container image versions of the container image, wherein each container image version is defined by selecting, for each unique layer of the container image based on the plurality of tags, the unique layer of the container image or one of the optional layers of the set of optional layers associated with the unique layer. The method includes generating a first container image based on a first container image version of the one or more container image versions.

IPC Classes  ?

  • G06F 8/71 - Version control ; Configuration management

84.

REPLACING STALE CLUSTERS IN A CLUSTER POOL

      
Application Number 17850573
Status Pending
Filing Date 2022-06-27
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor Fried, Eric

Abstract

Systems and methods are disclosed for replacing stale clusters in a cluster pool. An example method includes changing a configuration status of a resource pool managed by a resource pool manager from a first configuration to a second configuration. The resource pool may comprise a plurality of clusters. A portion of the plurality of clusters may be configured according to the first configuration and may store a first hash encoding configuration fields for the first configuration. The resource pool manager device may procure, at predetermined periods until a discontinuation cue, new clusters to include as part of the resource pool. Each new cluster procured at each predetermined period can be configured according to the second configuration. A second hash encoding configuration fields for the second configuration may be stored in each new cluster. Clusters that are not storing the second hash may be deleted from the resource pool.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/445 - Program loading or initiating

85.

CLOUD CLUSTER STORAGE RESOURCE AUTOSCALER

      
Application Number 17850774
Status Pending
Filing Date 2022-06-27
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Chen, Huamin
  • Wang, Chen
  • Lifshitz, Yuval

Abstract

Methods, systems, and computer program products herein provide operations or techniques for managing resource allocation in a data storage environment. According to aspects of the present disclosure, one or more storage nodes of hierarchy on a common hierarchy level are identified as a management group. For example, the one or more storage nodes of hierarchy may include one or more object storage daemons (OSDs) of a controlled replication under scalable hashing (CRUSH) group or the like. The resource utilization in a subset of the one or more storage nodes in the management group are monitored. Based on the monitored resource utilization, a processing device may determine respective scaling factors for allocating resources to the one or more storage nodes in the management group. The processing device may then adjust the resource allocation using the respective scaling factors in the one or more storage nodes.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

86.

ENERGY EFFICIENT COMPUTING WORKLOAD PLACEMENT

      
Application Number 17851409
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Wang, Chen
  • Chen, Huamin

Abstract

A method includes obtaining an energy consumption profile for a plurality of computing nodes, determining resource utilization characteristics of each of the plurality of computing nodes, and estimating energy consumption for each of the plurality of computing nodes in view of the energy consumption profile and resource utilization characteristics of the plurality of computing nodes. The method further includes determining placement of a new workload on one or more of the plurality of computing nodes in view of the estimated energy consumption for each of the plurality of computing nodes and resource requirements of the new workload.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

87.

FAIR AND EFFICIENT GUEST TO HYPERVISOR VIRTUAL MACHINE SOCKET PROTOCOL

      
Application Number 17851442
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

A fair and efficient guest to hypervisor virtual machine socket protocol may be provided by: in response to a host determining to reject a message received from a guest that was previously accepted for processing by the host, transmitting a rejection to the guest; in response to receiving, at the guest, the rejection, adding the message to a processing request queue on the guest; in response to determining that resources to handle the message have become available for the guest, transmitting an indication to the guest that the host is able to reaccept the message; in response to receiving, at the guest, the indication, retransmitting the message to the host according to the processing request queue; and in response to receiving the message from the guest a second time, accepting the message in an execution queue in a virtual memory of the host.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

88.

DEBUGGING OPERATOR ERRORS IN A DISTRIBUTED COMPUTING ENVIRONMENT

      
Application Number 17851521
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner RED HAT, INC. (USA)
Inventor
  • Fitzgerald, Laura
  • Griffin, Leigh

Abstract

Some examples described herein relate to debugging operator errors in a distributed computing environment. In one example, a system can identify a custom resource managed by an operator in a distributed computing environment. Based on identifying the custom resource, the system can initiate a monitoring process involving detecting events associated with the custom resource. In response to detecting the events, the system can generate log data indicating one or more operations performed by the operator to trigger the events. The system can then store the log data in a debugging log for use in detecting a functional error related to the operator.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 8/33 - Intelligent editors

89.

IMPROVED MEMORY MANAGEMENT FOR BUSY VIRTUAL MACHINE GUESTS

      
Application Number 17851593
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Tsirkin, Michael
  • Arcangeli, Andrea

Abstract

Systems and methods for enhancing memory management for virtual machines. An example method may comprise: accessing, by a hypervisor running on a host computer system, a data structure exposed by a virtual machine managed by the hypervisor, wherein the data structure includes an estimated next access time for one or more memory pages of a plurality of memory pages associated with the virtual machine; estimating a read latency time associated with the virtual machine; identifying, using the data structure, a memory page associated with an estimated next access time that satisfies a predefined condition with respect to the read latency time; and swapping out the memory page.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

90.

EFFICIENT MEMORY SWAP FOR VIRTUAL MACHINES

      
Application Number 17851669
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Tsirkin, Michael
  • Arcangeli, Andrea

Abstract

Systems and methods for enhancing efficient memory swap for virtual machines. An example method may comprise: receiving, by a hypervisor running on a host computer system, a request, from a virtual machine managed by the hypervisor, to write to a virtual disk a content of a memory page identified by a guest physical address (GPA); detecting, by the hypervisor, that the content of the memory page is stored on a storage device; storing, on the virtual disk, an identifier of a location of the content of the memory page on the storage device; and un-mapping the GPA from the storage device.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/02 - Addressing or allocation; Relocation

91.

RELATIVE LOCATION CONDITIONED STAGED DOWNLOAD SERVICE FOR INTERNET-OF-THINGS (IOTS)

      
Application Number 17850797
Status Pending
Filing Date 2022-06-27
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Chibon, Pierre-Yves

Abstract

Methods, systems, and computer program products of this disclosure provide a staged transmission service (e.g., a data transfer service for downloading or uploading) at a transfer node to a device in motion (DIM) wirelessly paired to the transfer node. When a DIM accepts a download task, the download node paired with the DIM receives a notice from the DIM of the acceptance. The download node retrieves, from a data repository, a dataset specified by the download task. A processing device of the download node may stage the dataset in a staged download service in preparation to transfer the dataset to the DIM. The processing device may initiate a transfer of at least a portion of the dataset to the DIM responsive to one or more data transfer properties satisfying a predefined set of conditions. The data transfer properties are determined based on a location and a movement of the DIM.

IPC Classes  ?

  • H04W 8/24 - Transfer of terminal data
  • G06F 8/65 - Updates
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications

92.

INTELLIGENT LAYER DERIVED DEPLOYMENT OF CONTAINERS

      
Application Number 17850900
Status Pending
Filing Date 2022-06-27
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Coady, Stephen
  • Griffin, Leigh

Abstract

Systems and methods for intelligently scheduling containers are described. A set of different layers that is locally available on each of a set of compute nodes may be determined. In response to receiving a request to deploy a container, a specification file of the container may be decomposed to determine a set of layers required for execution of the container. The set of required layers may be compared to the set of different layers that is locally available on each of the set of compute nodes to determine which of the set of compute nodes has a largest number of the set of required layers locally available. The container may be assigned to one of the set of compute nodes based on a number of required layers locally available on each of the set of compute nodes and resource information of each of the set of compute nodes.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

93.

SWITCHING MEMORY CONSISTENCY MODELS IN ACCORDANCE WITH EXECUTION PRIVILEGE LEVEL

      
Application Number 17850916
Status Pending
Filing Date 2022-06-27
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

An example method may include executing one or more first instructions that cause the processing device to enter a privileged execution mode, switching a memory consistency model of the processing device to a strong instruction ordering mode, and executing one or more second instructions in the privileged execution mode, where the one or more second instructions are executed using the strong instruction ordering mode. The method may further include executing one or more third instructions that cause the processing device to exit the privileged execution mode, and, responsive to executing the one or more third instructions, switching the memory consistency model of the processing device to a relaxed instruction ordering mode.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

94.

GENERATING CUSTOMIZED POLICY DECISION POINT SERVICES FOR CONTROLLING ACCESS TO COMPUTING RESOURCES

      
Application Number 17851349
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Griffin, Leigh
  • Moloney, Aoife

Abstract

Customized policy decision point (PDP) services for policy-based access control systems can be generated according to some examples. In one example, a system can select an access control policy to apply to an access request received from a client that is attempting to access a computing resource. In response to selecting the access control policy, the system can select a code block from among a group of code blocks based on the access control policy. The system can then generate a customized PDP service by incorporating the code block into a PDP template, the customized PDP service being configured to execute the code block for applying the access control policy to the access request.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

95.

SYSTEMS AND METHODS FOR PROCESSING PRIVILEGED INSTRUCTIONS USING USER SPACE MEMORY

      
Application Number 17851777
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

Systems and methods for enabling a hypervisor that is implemented in the user space to execute privileged instructions on behalf of the virtual machines without triggering VM exits. An example method may comprise detecting, by an exception handler of a virtual machine running on a host computer system, a request to execute a privileged instruction by the virtual machine; storing at least a part of a state of the virtual machine in a memory associated with the virtual machine; signaling, by modifying a predefined memory location in the memory associated with the VM, a request to execute a privileged instruction by a user space processing thread running on the host computer system; and pausing execution of the virtual machine.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

96.

AUTOMATED CONTAINER SIZE REDUCTION

      
Application Number 17851923
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Benhanokh, Gabriel Zvi
  • Wasserman, Orit

Abstract

A container image is received, the container image including a container manifest referencing a first base operating system layer and an application layer. An execution compatibility is determined between the application layer and a second base operating system layer, different from the first operating system layer. An updated container image, an updated container manifest, or the updated container image and the updated container manifest is generated in which the first base operating system layer is replaced with the second base operating system layer.

IPC Classes  ?

  • G06F 8/71 - Version control ; Configuration management
  • G06F 8/61 - Installation
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

97.

EFFICIENTLY MOVING VIRTUAL MACHINES BETWEEN NETWORK HOSTS

      
Application Number 17851970
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Tsirkin, Michael
  • Gilbert, David

Abstract

An example method may include generating a block list comprising a plurality of list items, wherein each list item identifies a respective block of a source virtual machine image, and the list items are ordered in the block list according to a timestamp of each respective block, wherein the timestamp indicates a time of a last access of the respective block, sending the block list to a destination computing device, receiving, from the destination computing device, one or more candidate blocks, determining whether the one or more candidate blocks are included in the source virtual machine image, and sending, to the destination computing device, a result indicating whether the one or more candidate blocks are included in the source virtual machine image.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

98.

IDENTIFICATION AND REMOVAL OF REDUNDANT INTERFACES

      
Application Number 17852108
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Bonic, Janos
  • Bonic, Sanja
  • Griffin, Leigh

Abstract

An interface in a first unit of software instructions is identified, the interface being configured to be invoked by an invoking unit of software instructions and when invoked, to invoke a function in a second unit of software instructions. A plurality of other units of software instructions are analyzed to identify a set of units of software instructions that are configured to invoke the interface. Based on the set of the units of software instructions and at least one criterion, data descriptive of modifications that modify the first unit of software instructions to remove software instructions that implement the interface is provided.

IPC Classes  ?

99.

EFFICIENT NETWORK DEVICE FAILOVER MANAGEMENT FOR VIRTUAL MACHINES

      
Application Number 17852200
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor Tsirkin, Michael

Abstract

Systems and methods for virtual machine networking can include detecting, by a virtual machine (VM), a primary virtual Network Interface Controller (vNIC) configured with a first media access control (MAC) address assigned to the VM by a hypervisor running on a host computer system, and detecting a standby vNIC configured with a second MAC address. They can further include binding a software Network Interface Controller (NIC) configured with a third MAC address to the primary vNIC and the standby vNIC, and selecting a vNIC from among those two vNICs for use by the software NIC for communicating network data packets. Additionally, they can include assigning the third MAC address to the selected vNIC, and communicating network data packets through the software NIC using the third MAC address.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

100.

COPYLESS NUMA BALANCING HYPERVISOR MEMORY MIGRATION

      
Application Number 17852258
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Red Hat, Inc. (USA)
Inventor
  • Tsirkin, Michael
  • Arcangeli, Andrea

Abstract

Systems and method for automated efficient memory migration in Non-uniform Memory Access (NUMA) based virtual machines are introduced, comprising exporting one or more informative data objects, from a host machine to at least one virtual machine, wherein the informative data objects include references to pages that have been migrated from a physical source memory node (source node) on the host machine to a new source location on the host machine; inspecting, the informative data objects, by the at least one virtual machine; detecting, by the at least one virtual machine, the pages that have been migrated to the new source location; sending a request, by the at least one virtual machine, to the host machine via the hypervisor, to map the pages to a physical destination memory node (destination node) corresponding to a desired virtual destination memory node (destination vNode); and undertaking at least one efficient data migration operation.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  1     2     3     ...     45        Next Page