New Applications on Peer-to-Patent

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Email not displaying correctly? View it in your browser.

Virtual Machines on Peer-to-Patent

New Technology from VMWARE, Inc.

Gone are the days when software must be operated on actual, physical computer systems. Now, virtual machines are in common use and constantly evolving. Peer-to-Patent has recently posted a number of applications pertaining to this technology.

A virtual machine is a software abstraction of an actual physical computer system. If the virtual machine is properly designed, then it will not be apparent to the user that any applications running within the virtual machine are running indirectly, that is, via the guest operating system and virtual processor.

In seven separate patent applications, VMWARE, Inc., proposes potentially innovative technology. Whether using a physical device or a virtual one, the proposed applications are dedicated to migrating the information from one to another. The first application involves a virtual device, which includes an emulation and pass through mode able to be configured to communicate with a physical device using switching logic pertaining to the necessary operation. The second application builds on this technology by describing a system that instructs this virtual device when a physical one is unavailable. A third application discloses a virtualization method and system for which the source virtual machine is migrated to a destination virtual machine while the source virtual machine is still powered on.

Stemming from this technology, VMWARE, Inc. has also focused on trace collection techniques. A virtual machine environment provides a convenient platform for efficient logging and replaying execution, which can be used to improve fault tolerance, trace driven simulations and debugging. While conventional trace collection techniques are often slow due to software tracing overhead, this patent application discloses a method for logging non-deterministic events of a virtual machine executing a sequence of guest instructions.

In efforts to develop a method and system for a virtual machine to transition from replay to live execution mode, VMWARE, Inc. has also developed technology that allows a backup virtual machine to do just that. This application describes a means to enable transition at instruction boundaries that are not in the middle emulation of a single instruction through a series of "go-live" points.

Although no physical network is present, communication over virtual networks still requires breaking up a stream of data into individual network packets. Recent technology presented by VMWARE, Inc. discloses a method for enabling inter-process communication mechanisms that use shared memory or notifications to allow applications running in respective virtual machines to communicate with one another.

VMWARE, Inc. has also recognized the need to develop an anti-virus mechanism that is both effective and can scale easily in a virtual machine environment. In response, this patent application discloses an on-access anti-virus mechanism that is optimized for use in a virtualized computer system. It is operated by scanning the malicious code and communicating this information to the scan engine. A driver portion is also configured for installation in an operating system of the guest virtual machines, acting to intercept and communicate information with the scan engine.

These applications will be available for review on the Peer-to-Patent website until September 27, 2009.


P2P Presents: Patents for Your Thoughts

Don't miss your last chance to review these patent applications! Both of these applications will be up for review on the Peer-to-Patent website until July 23, 2009.


First Time Participant EMC Corp.
Business organizations that manage large amounts of data assets have turned to storage virtualization systems to provide a scaleable way to monitor, optimize, and manage files on network attached storage ("NAS") systems. NAS separates data storage from the client computer and enables the network administrator to centrally manage data files without having to access individual client computers. Users may access their primary NAS system over a network using a file path or domain address for their respective account directories. Using this path address, the users may also save files to storage devices attached to the NAS system. However, a storage virtualization system tasked with migrating files from a primary NAS system to a seconday NAS system may not be compatible with the offline attribute convention present in some NAS systems.
This patent application discloses an invention that allows users to access and preserve the associated metadata attributes for files common to certain NAS systems; the purpose being, to ensure that if these files are migrated, the user will be able to access the migrated file and content without issue.

Business Methods and Workload Scheduling
Medical facilities frequently encounter problems relating to the number of staff they have available at any given time. Because the number of patients can change dramatically in a short period of time, such facilities often find themselves with a disproportionate amount of on-duty employees. This Pro Se
patent application
discloses a method for dynamically controlling the work schedule of staff in a medical care facility through the use of software to meet an initial workload requirement. This software will perform an initial evaluation of the patients when the rotation shift begins and then continually throughout the shift. Each evaluation considers patient activity and other indicators, automatically determining up-to-the-minute workloads for each facility. It then determines whether the assigned staff is within tolerances for an updated workload requirement and notifies management if the assigned staff is not within such tolerances.





Applications Expiring Soon
Below are links to applications that will expire in the next 3 weeks. Please contribute any comments or prior art that you can so that these applications get reviewed before heading to the PTO!

Automated stacking system for wood products (From Weyerhaeuser Co.)
Form factor identification (From Visa)
Fault tree map generation (From Embraer-Empresa Brasileira Aeronautica S.A.)
Method and system for providing improved answers (From Pro Se)
Method and system for image pumping (University of Arkansas)
Method for preventing and detecting hash collisions of data during the data transmission (From Pro Se)
Network accessed storage files system query/set proxy service for a storage virtualization system (From EMC Corp.)
Identity-based address normalization (From Novell Inc.)
Simplified quote sharing calculation (From International Securities Exchange, LLC)
Dynamic staffing control notification method (From Pro Se)
Method and system for identifying a device implementing a digital rights management protocol (From Disney)
Flexible format media content and method for providing same (From Disney)
Method and system for efficiently scaning a computer storage device for pestware (From Webroot Software Inc.)
Multi-source broadcasting in peer to peer network (From Adobe Systems Inc.)
Electronic bidding for maximizing the rate of return for funds in excess of current requirements (From Pro Se)
System and method for representing agreements as a reputation (From Novell Inc.)
Service call data selection and delivery method and system (Xerox Co.)


Expiring Applications
Below are links to applications that are expiring on or before September 1:

Systems and methods for displaying and visualizing information (From GE Co.)
Data processing apparatus with shadow register and method thereof (From Wenshine Technology Ltd.)
Dynamic two-stage clinical data archiving and retrieval solution (From GE Co.)
Method, system and device for enabling the public to access organizations' directories (From Wenshine Technology Ltd.)
Systems and methods for encrypting patient data (From GE Co.)
Systems and methods for obtaining and preserving health care information (From Future Health Strategies, LLC)
Trade strategy monitor tool (From FMR LLC)
Method and system of determining vulnerablity of web application (From NHN Co.)
Method for providing tissue products having coordinated decor features (From Procter and Gamble)
Efficient hash based full-outer join (From Oracle International Corp.)
System and method for masking arbitrary boolean functions (From Discretix Technologies ltd.)
System and method for preventing the reception and transmission of malicious or objectional content transmitted through a network (From Pro Se)
Public electronic document dating list (From Pro Se)
Continual Reorganization of ordered search results based on current user interaction (From IBM)

For more information on how to participate, visit the DoTank at:

http://dotank.nyls.edu/communitypatent

Peer-to-Patent is no longer accepting new patent applications. However, we have a number of applications on our website that will continue to remain open for review for the normal review period.

You are receiving this email because you are a valued member of the Peer-to-Patent community. Feel free to opt out of receiving future correspondence.

Unsubscribe @xxxxxxxxxxx from this list.

Our mailing address is:
Peer-to-Patent
IILP
57 Worth St
New York, NY 10013

Add us to your address book


This work is licensed by Peer-to-Patent under a Creative Commons Attribution-ShareAlike 2.5 License

Forward
this email to a friend
Update your profile

[Index of Archives]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Photo]     [Yosemite]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]     [Linux Resources]

  Powered by Linux