Constrained resource management
    111.
    发明授权
    Constrained resource management 失效
    限制资源管理

    公开(公告)号:US08285574B2

    公开(公告)日:2012-10-09

    申请号:US12721706

    申请日:2010-03-11

    IPC分类号: G06Q40/00

    摘要: Implementation of resource management services is provided. A method includes setting a price, per unit of a resource, for a defined time period and based upon a collective projected resource demand corresponding to resource consumption entities (RCEs). For the duration of the time period, the method includes iteratively performing: monitoring actual usage of the resource for each of the RCEs. If, in response to the monitoring, it is determined that a projected shortage exists for an RCE and a projected surplus exists for another RCE, the method includes re-allocating a number of projected surplus units of the resource from the RCE having the projected surplus to the other RCE having the projected shortage. If, in response to the monitoring, it is determined that a projected shortage exists for an RCE and no projected surplus exists for any of the other RCEs, the method includes acquiring additional units of the resource.

    摘要翻译: 提供资源管理服务的实施。 一种方法包括在定义的时间周期内并且基于对应于资源消耗实体(RCE)的集体预计资源需求来设置每单位资源的价格。 在时间段期间,该方法包括迭代执行:监视每个RCE的资源的实际使用。 如果根据监测,确定对于RCE预计存在短缺,并且另一个RCE存在预期的剩余,则该方法包括重新分配来自具有预计剩余的RCE的资源的预计剩余单元数 到另一个预计短缺的RCE。 如果响应于监测,确定对于RCE存在预计的短缺,并且对于任何其他RCE都不存在预期的剩余,则该方法包括获取资源的附加单元。

    Dynamically relocating workloads in a networked computing environment
    112.
    发明授权
    Dynamically relocating workloads in a networked computing environment 有权
    在网络化计算环境中动态重定位工作负载

    公开(公告)号:US09229777B2

    公开(公告)日:2016-01-05

    申请号:US13204910

    申请日:2011-08-08

    IPC分类号: G06F15/173 G06F9/50

    CPC分类号: G06F9/5044 G06F9/505

    摘要: Embodiments of the present invention provide an approach for dynamically relocating a set of workloads among geographic regions of a networked computing environment (e.g., a cloud computing environment) based on infrastructure/computing resource needs. In a typical embodiment, it is determined whether a first geographic region of the networked computing environment has a first set of computing resources with an available capacity that meets a needed capacity for handling a set of workloads that is initially associated with the first geographic region. If not, a second geographic region of the networked computing environment having a second set of computing resources with the needed capacity is identified. In general, this determination can be made based upon multiple factors such as: a set of performance requirements, stored in at least one computer data structure, needed to handle the set of workloads; a set of environmental parameters, stored in the at least one computer data structure, having a potential to affect the handling of the set of workloads; and/or a set of cost parameters, stored in the at least one computer data structure, associated with handling the set of workloads. Once the second geographic region has been identified, the set of workloads can be associated with and handled thereby.

    摘要翻译: 本发明的实施例提供了一种用于基于基础设施/计算资源需求在网络计算环境(例如,云计算环境)的地理区域之间动态地重定位一组工作负载的方法。 在典型的实施例中,确定联网的计算环境的第一地理区域是否具有满足用于处理最初与第一地理区域相关联的一组工作负载的所需能力的可用容量的第一组计算资源。 如果不是,则识别具有所需容量的具有第二组计算资源的联网计算环境的第二地理区域。 一般而言,这种确定可以基于多个因素进行,例如:存储在处理该组工作负载所需的至少一个计算机数据结构中的一组性能要求; 存储在所述至少一个计算机数据结构中的一组环境参数,具有影响所述一组工作负载的处理的潜力; 和/或存储在所述至少一个计算机数据结构中的一组成本参数,其与处理所述工作负载集相关联。 一旦确定了第二个地理区域,就可以将这组工作负载与之相关联并进行处理。

    Migrating data between networked computing environments
    113.
    发明授权
    Migrating data between networked computing environments 有权
    在联网计算环境之间迁移数据

    公开(公告)号:US08909734B2

    公开(公告)日:2014-12-09

    申请号:US13367412

    申请日:2012-02-07

    IPC分类号: G06F15/16

    摘要: Embodiments of the present invention provide an approach for predictively migrating data between network computing environments (e.g., cloud computing environments). Specifically, in a typical embodiment, data access patterns for sets of data utilized by a set of services running in a first networked computing environment may be analyzed. Based on the analysis one or more of the sets of data may be identified as candidates to be migrated from the first networked computing environment to a second networked computing environment. Then, a data migration protocol for the one or more sets of data to be migrated to the second networked computing environment may be generated based on the data access patterns and a predicted data migration time. Based on the data migration protocol, the one or more sets of data may then be migrated to the second networked computing environment.

    摘要翻译: 本发明的实施例提供了一种用于在网络计算环境(例如,云计算环境)之间预测性迁移数据的方法。 具体地,在典型的实施例中,可以分析由在第一联网计算环境中运行的一组服务使用的数据集的数据访问模式。 基于分析,一组或多组数据可以被识别为要从第一联网计算环境迁移到第二联网计算环境的候选。 然后,可以基于数据访问模式和预测的数据迁移时间来生成要迁移到第二联网计算环境的一组或多组数据的数据迁移协议。 基于数据迁移协议,可以将一组或多组数据迁移到第二联网计算环境。

    Security enhancements for immersive environments
    114.
    发明授权
    Security enhancements for immersive environments 有权
    沉浸式环境的安全性增强

    公开(公告)号:US08645847B2

    公开(公告)日:2014-02-04

    申请号:US13172947

    申请日:2011-06-30

    IPC分类号: G06F3/048 G06F3/00

    CPC分类号: G06F3/011

    摘要: In some example embodiments, a method includes defining a tracking area for a first avatar in an online immersive environment, wherein the tracking area encompasses the first avatar and some defined area beyond the first avatar. The first avatar represents a first person who is a guardian of a second person in the real world and external to the online immersive environment. A second avatar represents the second person in the online immersive environment. The method includes tracking a path through the online immersive environment of the tracking area for the first avatar. The method includes marking a region in the online immersive environment as a safe zone for the second avatar, after the path of the tracking area for the first avatar has traversed the region. The method includes authorizing access to the region marked as the safe zone for the second avatar in the online immersive environment.

    摘要翻译: 在一些示例性实施例中,一种方法包括为在线沉浸式环境中的第一化身定义跟踪区域,其中所述跟踪区域包含所述第一头像和超出所述第一化身的某些限定区域。 第一个头像代表第一个人,他是现实世界中第二个人的守护者,在网络沉浸环境之外。 第二个头像代表在线沉浸式环境中的第二个人物。 该方法包括跟踪通过第一化身的跟踪区域的在线沉浸环境的路径。 该方法包括在第一化身的跟踪区域的路径经过该区域之后,将在线沉浸环境中的区域标记为第二化身的安全区域。 该方法包括授权访问被标记为在线沉浸式环境中的第二化身的安全区域的区域。

    DYNAMICALLY EXPANDING COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT
    115.
    发明申请
    DYNAMICALLY EXPANDING COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT 有权
    在网络计算环境中动态扩展计算资源

    公开(公告)号:US20130042005A1

    公开(公告)日:2013-02-14

    申请号:US13204905

    申请日:2011-08-08

    IPC分类号: G06F15/173

    摘要: Embodiments of the present invention provide an approach for dynamically expanding cloud capacity (e.g., computing resources), based on infrastructure needs. In a typical embodiment, an available capacity of a set (e.g., at least one) of computing resources in the networked computing environment will be determined. Then, a future capacity needed for processing a set of workloads in the networked computing environment will be forecasted. Such a forecast can be made based on multiple factors/approaches. For example, the forecast can be made based upon at least one of the following: an average consumption of the set of computing resources over a predetermined period of time, a periodic estimation of consumption of the set of computing resources, a scheduled consumption of the set of computing resources, and/or a potential capacity of the set of computing resources. In general, the scheduled consumption can be determined based on at least one resource consumption schedule stored in a computer data structure, while the potential capacity can be determined based upon a set of application events associated with the set of workloads. Regardless of the approach utilized, once the future capacity has been forecasted, it will be determined whether the future capacity exceeds the available capacity. If so, the available capacity of the set of computing resources will be expanded (e.g., hardware and/or software elements will be added to the networked computing infrastructure and/or made available) until the available capacity at least meets the future capacity.

    摘要翻译: 本发明的实施例提供了一种基于基础设施需求动态扩展云容量(例如,计算资源)的方法。 在典型的实施例中,将确定网络计算环境中的一组(例如,至少一个)计算资源的可用容量。 然后,将预测在网络化计算环境中处理一组工作负载所需的未来容量。 这样的预测可以基于多种因素/方法。 例如,可以基于以下中的至少一个进行预测:在预定时间段内该组计算资源的平均消耗,该组计算资源的消耗的周期性估计, 一组计算资源,和/或一组计算资源的潜在容量。 通常,可以基于存储在计算机数据结构中的至少一个资源消耗调度来确定调度消耗,同时可以基于与该组工作负载相关联的一组应用事件来确定潜在容量。 无论采用何种方法,一旦预测未来能力,将确定未来能力是否超过可用容量。 如果是这样,则将扩展该组计算资源的可用容量(例如,硬件和/或软件元素将被添加到联网计算基础设施和/或可用),直到可用容量至少满足将来容量。

    Dynamically acquiring computing resources in a networked computing environment
    116.
    发明授权
    Dynamically acquiring computing resources in a networked computing environment 有权
    在网络计算环境中动态获取计算资源

    公开(公告)号:US09158590B2

    公开(公告)日:2015-10-13

    申请号:US13204892

    申请日:2011-08-08

    IPC分类号: G06F15/173 G06F9/50

    CPC分类号: G06F9/5061

    摘要: The present invention provides an approach for dynamically acquiring computing resources in a networked computing environment (e.g., a cloud computing environment) based on infrastructure/computing resource needs. In a typical embodiment, a set of computing resources (needed to process a set of workloads) external to a first portion of a networked computing environment is identified. Once identified, electronic negotiations with at least one provider of the set of computing resources may be held for utilizing the provider's set of computing resources to process the set of workloads. In general, the negotiations are based on at least one resource registration (setting forth terms for utilizing the set of computing resources such as usage rates, usage limitations, etc.) associated with the at least one provider stored in at least one computer data structure. Responsive to successful completion of the negotiations, the set of computing resources will be associated with the first portion.

    摘要翻译: 本发明提供了一种基于基础设施/计算资源需求在网络计算环境(例如,云计算环境)中动态获取计算资源的方法。 在典型的实施例中,识别在网络化计算环境的第一部分外部的一组计算资源(处理一组工作负载所需的)。 一旦确定,可以保持与该组计算资源的至少一个提供者的电子谈判,以利用提供者的一组计算资源来处理该组工作负载。 通常,协商基于至少一个资源注册(提出利用与至少一个计算机数据结构中存储的至少一个提供者相关联的计算资源集合,例如使用率,使用限制等) 。 响应成功完成谈判,这套计算资源将与第一部分相关联。

    SECURE TRANSACTION AUTHORIZATION
    117.
    发明申请
    SECURE TRANSACTION AUTHORIZATION 审中-公开
    安全交易授权

    公开(公告)号:US20130185205A1

    公开(公告)日:2013-07-18

    申请号:US13348695

    申请日:2012-01-12

    IPC分类号: G06Q40/00

    CPC分类号: G06Q20/405

    摘要: Provided is an approach for credit transaction authorization/approval. Specifically, a particular transaction payment device/mechanism (e.g., credit card, etc.) may be associated with a set of purchase authorization criteria/rules that sets forth specific conditions (e.g., an authorization protocol) under which the transaction payment device may be utilized. When a user later attempts to conduct a proposed credit transaction using the transaction payment device, it will be determined whether the proposed credit transaction complies with this set of purchase authorization criteria (e.g., the authorization protocol). Based on this determination, the proposed credit transaction can be approved or declined.

    摘要翻译: 提供信用交易授权/批准的方法。 具体来说,特定交易支付设备/机制(例如,信用卡等)可以与一组购买授权标准/规则相关联,这些准则/规则规定了交易支付设备可能在哪个特定条件(例如,授权协议) 利用。 当用户稍后尝试使用交易支付设备进行建议的信用交易时,将确定建议的信用交易是否符合该组购买授权准则(例如,授权协议)。 根据这一决定,可以批准或拒绝拟议的信贷交易。

    Security Enhancements for Immersive Environments
    118.
    发明申请
    Security Enhancements for Immersive Environments 有权
    沉浸式环境的安全性增强

    公开(公告)号:US20130007636A1

    公开(公告)日:2013-01-03

    申请号:US13172947

    申请日:2011-06-30

    IPC分类号: G06F3/048

    CPC分类号: G06F3/011

    摘要: In some example embodiments, a method includes defining a tracking area for a first avatar in an online immersive environment, wherein the tracking area encompasses the first avatar and some defined area beyond the first avatar. The first avatar represents a first person who is a guardian of a second person in the real world and external to the online immersive environment. A second avatar represents the second person in the online immersive environment. The method includes tracking a path through the online immersive environment of the tracking area for the first avatar. The method includes marking a region in the online immersive environment as a safe zone for the second avatar, after the path of the tracking area for the first avatar has traversed the region. The method includes authorizing access to the region marked as the safe zone for the second avatar in the online immersive environment.

    摘要翻译: 在一些示例性实施例中,一种方法包括为在线沉浸式环境中的第一化身定义跟踪区域,其中所述跟踪区域包含所述第一头像和超出所述第一化身的某些限定区域。 第一个头像代表第一个人,他是现实世界中第二个人的守护者,在网络沉浸环境之外。 第二个头像代表在线沉浸式环境中的第二个人物。 该方法包括跟踪通过第一化身的跟踪区域的在线沉浸环境的路径。 该方法包括在第一化身的跟踪区域的路径经过该区域之后,将在线沉浸环境中的区域标记为第二化身的安全区域。 该方法包括授权访问被标记为在线沉浸式环境中的第二化身的安全区域的区域。

    PROXY DIGITAL VIDEO RECORDER
    119.
    发明申请
    PROXY DIGITAL VIDEO RECORDER 审中-公开
    PROXY数字视频录像机

    公开(公告)号:US20120134652A1

    公开(公告)日:2012-05-31

    申请号:US12955723

    申请日:2010-11-29

    IPC分类号: H04N5/92 H04N5/76

    摘要: A proxy-based digital video recording system and method, including receiving a request to record a video program from a requesting user and transmitting a request for the video program over a network to a first provider server. The requested video program is received and stored in memory according to a first provider format. A digital video format of a digital video recorder associated with the requesting user is determined, the stored video program is converted from the first provider format to the digital video format, and the converted video program is transmitted to the digital video recorder.

    摘要翻译: 一种基于代理的数字视频记录系统和方法,包括从请求用户接收记录视频节目的请求,并通过网络向第一提供商服务器发送对视频节目的请求。 所请求的视频节目根据第一提供者格式被接收并存储在存储器中。 确定与请求用户相关联的数字视频记录器的数字视频格式,将存储的视频节目从第一提供者格式转换为数字视频格式,并将转换的视频节目传送到数字录像机。

    MIGRATING VIRTUAL MACHINES BETWEEN NETWORKED COMPUTING ENVIRONMENTS BASED ON RESOURCE UTILIZATION
    120.
    发明申请
    MIGRATING VIRTUAL MACHINES BETWEEN NETWORKED COMPUTING ENVIRONMENTS BASED ON RESOURCE UTILIZATION 有权
    基于资源利用的网络计算环境之间的迁移虚拟机

    公开(公告)号:US20130311988A1

    公开(公告)日:2013-11-21

    申请号:US13473664

    申请日:2012-05-17

    IPC分类号: G06F9/455 G06F15/16

    摘要: Embodiments of the present invention relate to the migration of virtual machines (VMs) between networked computing environments (e.g., cloud computing environments) based on resource utilization. Specifically, embodiments of the present invention provide an approach to select an optimal set (one or more) of VMs as candidates for pre-staged migration. In a typical embodiment, when a first cloud environment nears physical resource capacity, an optimal set of VMs will be identified for migration to a second cloud environment that has sufficient capacity to accommodate workload(s) from the first cloud environment. To make this process more efficient, data associated with the set of virtual machines may be “pre-stage” replicated from the first cloud environment to the second cloud environment (e.g., in advance of the migration of the identified set of VMs).

    摘要翻译: 本发明的实施例涉及基于资源利用的网络计算环境(例如,云计算环境)之间的虚拟机(VM)的迁移。 具体地,本发明的实施例提供了一种选择VM的最优集合(一个或多个)作为预先迁移的候选的方法。 在典型的实施例中,当第一云环境接近物理资源容量时,将识别最佳的一组VM,以便迁移到具有足够容量以适应来自第一云环境的工作负载的第二云环境。 为了使该过程更有效率,与该组虚拟机相关联的数据可以从第一云环境复制到第二云环境(例如,在所识别的VM的迁移之前)的“预阶段”。