会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Prioritizing tasks from virtual machines
    • 从虚拟机优先处理任务
    • US08424007B1
    • 2013-04-16
    • US12242685
    • 2008-09-30
    • Brian HernackiSourabh SatishWilliam E. Sobel
    • Brian HernackiSourabh SatishWilliam E. Sobel
    • G06F9/46
    • G06F9/4881G06F9/485G06F2209/503
    • A computer-implemented method for prioritizing virtual machine tasks may include receiving a request to perform a first task from a virtual machine. The request may include information relevant to determining a priority of the task. The method may include determining the priority of the task based on the information. The method may further include scheduling the first task based on the priority of the task. The method may include selecting the first task for execution based on the scheduling. The method may include notifying the virtual machine that the first task has been selected for execution. Various related methods, computer-readable media, and systems are also disclosed.
    • 用于对虚拟机任务进行优先级的计算机实现的方法可以包括从虚拟机接收执行第一任务的请求。 该请求可以包括与确定任务的优先级有关的信息。 该方法可以包括基于该信息确定任务的优先级。 该方法还可以包括基于任务的优先级调度第一任务。 该方法可以包括基于调度来选择用于执行的第一任务。 该方法可以包括通知虚拟机第一任务已经被选择用于执行。 还公开了各种相关方法,计算机可读介质和系统。
    • 4. 发明授权
    • Policy control of virtual environments
    • 虚拟环境的策略控制
    • US08214878B1
    • 2012-07-03
    • US12238356
    • 2008-09-25
    • Brian HernackiSourabh SatishWilliam E. Sobel
    • Brian HernackiSourabh SatishWilliam E. Sobel
    • H04L29/00
    • G06F9/45558G06F2009/4557
    • When copying a guest from a source virtual environment to a target virtual environment, policy control of the target environment is provided. A configuration specification is created based on the source virtual environment and the guest to be copied. The configuration specification contains specific policies and/or requirements of the guest. The guest and the configuration specification are copied to the target virtual environment. The target virtual environment is examined to determine whether it is compliant with the copied configuration specification. If so, the copied guest runs in the target virtual environment. If not, the target virtual environment can be modified to be in compliance with the configuration specification.
    • 将guest虚拟机从源虚拟环境复制到目标虚拟环境时,将提供目标环境的策略控制。 基于源虚拟环境和要复制的guest虚拟机创建配置规范。 配置规范包含客户的特定策略和/或要求。 guest虚拟机和配置规范被复制到目标虚拟环境中。 检查目标虚拟环境以确定其是否符合复制的配置规范。 如果是这样,复制的客户端将在目标虚拟环境中运行。 如果没有,则可以修改目标虚拟环境以符合配置规范。
    • 5. 发明授权
    • Application streaming and network file system optimization via feature popularity
    • 应用流和网络文件系统优化通过功能普及
    • US07908391B1
    • 2011-03-15
    • US12055021
    • 2008-03-25
    • Sourabh SatishWilliam E. SobelBrian Hernacki
    • Sourabh SatishWilliam E. SobelBrian Hernacki
    • G06F15/16
    • G06F9/445
    • The performance of a remotely originated application is improved by determining the most popular application features, and proactively making the corresponding application content available to local computers on which the application runs. An application streaming or network file system transmits an application to a plurality of endpoints for execution. The server determines the relative popularity of the application features, and maps the features to corresponding application content. The server proactively pushes the application content corresponding to the most popular features to the endpoints. The popularity of application features is dynamically updated on a regular, ongoing basis. The proactive pushing of code pages is kept current with the updated popularity determinations.
    • 通过确定最流行的应用程序功能,并主动使相应的应用程序内容可用于运行应用程序的本地计算机,可以提高远程发起的应用程序的性能。 应用流或网络文件系统将应用发送到多个端点以供执行。 服务器确定应用程序功能的相对受欢迎程度,并将功能映射到相应的应用程序内容。 服务器主动将与最受欢迎的功能相对应的应用内容推送到端点。 应用功能的普及可以定期,持续地进行动态更新。 主动推送代码页面保持最新的流行度确定。
    • 7. 发明授权
    • Systems and methods for creating and managing backups based on health information
    • 基于健康信息创建和管理备份的系统和方法
    • US08949187B1
    • 2015-02-03
    • US12130786
    • 2008-05-30
    • Sourabh SatishWilliam E. Sobel
    • Sourabh SatishWilliam E. Sobel
    • G06F7/00G06F17/30
    • G06F11/1461G01R31/3679G06F11/1441
    • A computer-implemented method may include performing an evaluation of the computing system's health. The computer-implemented method may also include comparing results of the evaluation with the results of at least one prior evaluation of the computing system's health and then determining, based on the comparison, that a current state of health of the computing system is healthier than at least one prior state of health of the computing system. In addition, the computer-implemented method may include creating a backup of the computing system. A computer-implemented method for managing backups of a computing system based on health information is also disclosed. Corresponding systems and computer-readable media are also disclosed.
    • 计算机实现的方法可以包括对计算系统的健康进行评估。 计算机实现的方法还可以包括将评估的结果与计算系统的健康的至少一个先前评估的结果进行比较,然后基于比较来确定计算系统的当前健康状况比在 至少一个计算系统的健康状况。 此外,计算机实现的方法可以包括创建计算系统的备份。 还公开了一种用于管理基于健康信息的计算系统的备份的计算机实现的方法。 还公开了相应的系统和计算机可读介质。
    • 8. 发明授权
    • Systems and methods for looking up anti-malware metadata
    • 查找反恶意软件元数据的系统和方法
    • US08667592B2
    • 2014-03-04
    • US13048380
    • 2011-03-15
    • William E. SobelSourabh Satish
    • William E. SobelSourabh Satish
    • G06F11/00
    • G06F21/564
    • A computer-implemented method for looking up anti-malware metadata may include identifying a plurality of executable objects to be scanned for malware before execution. The computer-implemented method may also include, for each executable object within the plurality of executable objects, assessing an imminence of execution of the executable object. The computer-implemented method may further include prioritizing, based on the assessments, a retrieval order for anti-malware metadata corresponding to the plurality of executable objects. The computer-implemented method may additionally include retrieving anti-malware metadata corresponding to an executable object within the plurality of executable objects based on the retrieval order. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于查找反恶意软件元数据的计算机实现的方法可以包括在执行之前识别要扫描恶意软件的多个可执行对象。 对于多个可执行对象中的每个可执行对象,计算机实现的方法还可以包括执行可执行对象的即将来临。 计算机实现的方法还可以包括基于评估来优先考虑与多个可执行对象相对应的反恶意软件元数据的检索顺序。 计算机实现的方法可以另外包括基于检索顺序检索对应于多个可执行对象内的可执行对象的反恶意软件元数据。 还公开了各种其它方法,系统和计算机可读介质。