Distributed user interfaces as a service
    123.
    发明授权
    Distributed user interfaces as a service 有权
    分布式用户界面作为服务

    公开(公告)号:US09565075B2

    公开(公告)日:2017-02-07

    申请号:US14373026

    申请日:2013-10-07

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described to send distributed user interface elements to a customer. In some examples, a virtualization server may receive an application to be provided to a customer. The virtualization server may separate the application into multiple user interface elements and encapsulate each user interface element with virtualization components for individual delivery to the customer. Subsequently, the virtualization server may then forward the encapsulated element(s) to one or more customer devices.

    Abstract translation: 技术通常被描述为向客户发送分布式用户界面元素。 在一些示例中,虚拟化服务器可以接收要提供给客户的应用。 虚拟化服务器可以将应用程序分成多个用户界面元素,并将每个用户界面元素封装到虚拟化组件中,以便单独传递给客户。 随后,虚拟化服务器然后可以将封装的元件转发到一个或多个客户设备。

    Instruction set extension concealment in data centers
    124.
    发明授权
    Instruction set extension concealment in data centers 有权
    数据中心指令集扩展隐藏

    公开(公告)号:US09552228B2

    公开(公告)日:2017-01-24

    申请号:US14479945

    申请日:2014-09-08

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for systems, devices and methods effective to execute a first computing task by a processor of a data center. In some examples, the first computing task may be executed using an instruction set extension. Execution of the first computing task using the instruction set extension may require a first number of clock cycles. In other examples, execution of the first computing task without using the instruction set extension may require a second number of clock cycles. In some examples, a savings value may be determined. The savings value may represent a difference between the first number of clock cycles and the second number of clock cycles. An amount of processing time may be allocated on the processor to a second computing task. The amount of processing time may be based on the savings value. The second computing task may be different from the first computing task.

    Abstract translation: 一般来说,对于由数据中心的处理器执行第一计算任务有效的系统,设备和方法来描述技术。 在一些示例中,可以使用指令集扩展来执行第一计算任务。 使用指令集扩展执行第一计算任务可能需要第一数量的时钟周期。 在其他示例中,在不使用指令集扩展的情况下执行第一计算任务可能需要第二数量的时钟周期。 在一些示例中,可以确定储蓄值。 节省值可以表示第一数量的时钟周期与第二数量的时钟周期之间的差异。 可以在处理器上将处理时间量分配给第二计算任务。 处理时间的数量可以基于储蓄值。 第二计算任务可能与第一计算任务不同。

    Network injected storage redirection for embedded applications
    125.
    发明授权
    Network injected storage redirection for embedded applications 有权
    针对嵌入式应用程序的网络注入存储重定向

    公开(公告)号:US09549036B2

    公开(公告)日:2017-01-17

    申请号:US14376133

    申请日:2013-11-20

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described to redirect local storage for embedded applications. In some examples, a computing device such as a redirection router, coupled to network-attached storage, may detect a request for an application being delivered from a server to a destination device such as a ubicomp device and intercept the requested application. The redirection router may determine whether the destination device has sufficient local storage. In response to determination that the destination device does not have sufficient local storage or a predefined configuration such as requesting device being configured for local storage, a reference to the client-side storage associated with the application may be replaced with a link, to the network-attached storage prior to delivery of the application. Subsequent retrievals of the application or portions thereof may be from the network-attached storage directly or via the redirection router.

    Abstract translation: 技术通常被描述为重定向用于嵌入式应用的本地存储。 在一些示例中,耦合到网络连接存储器的诸如重定向路由器的计算设备可以检测对从服务器传递到诸如ubicomp设备的目的地设备的应用的请求,并拦截所请求的应用。 重定向路由器可以确定目的地设备是否具有足够的本地存储。 响应于确定目的地设备不具有足够的本地存储或诸如请求设备被配置为用于本地存储的预定义配置,可以将与应用相关联的客户端存储器的引用替换为链路到网络 在交付应用程序之前的附加存储。 应用程序或其部分的后续检索可以直接地或经由重定向路由器来自网络连接的存储器。

    Datacenter border-issued analytics for monitoring federated services
    126.
    发明授权
    Datacenter border-issued analytics for monitoring federated services 有权
    数据中心边界发布的监测联合服务的分析

    公开(公告)号:US09515902B2

    公开(公告)日:2016-12-06

    申请号:US14114732

    申请日:2013-04-17

    Inventor: Ezekiel Kruglick

    CPC classification number: H04L43/04 H04L41/5096

    Abstract: Technologies are generally described for providing datacenter border-issued analytics for monitoring federated services. In some examples, a deployment manager, which manages placement of application deployment instances across a federation and thus already knows which datacenter each instance is in, may register a package trigger with a gateway at each datacenter when an application is placed in each datacenter. The datacenter gateway(s) may then search through data packets for registered package properties such as content of a packet header that indicates it is a monitoring packet, and inject additional data according to instructions from the deployment manager. For example, the deployment manager may instruct the gateway(s) to inject a datacenter identifier or a network location identifier to each monitoring data packet. The additional data may be customer-defined and the modified monitoring data including the additional data may be sent to a monitoring system to be analyzed.

    Abstract translation: 技术通常被描述为提供用于监视联合服务的数据中心边界发布分析。 在一些示例中,部署管理器管理跨联合的应用程序部署实例的布局,从而已经知道每个实例在哪个数据中心,当应用程序放置在每个数据中心时,可以在每个数据中心注册带有网关的包触发器。 然后,数据中心网关可以通过数据分组搜索注册的包属性,例如指示它是监视分组的分组报头的内容,并且根据来自部署管理器的指令注入附加数据。 例如,部署管理器可以指示网关向每个监视数据分组注入数据中心标识符或网络位置标识符。 附加数据可以是客户定义的,并且包括附加数据的修改的监视数据可以被发送到要分析的监视系统。

    Speculative rendering using historical player data
    127.
    发明授权
    Speculative rendering using historical player data 有权
    使用历史玩家资料的投机呈现

    公开(公告)号:US09498715B2

    公开(公告)日:2016-11-22

    申请号:US14476648

    申请日:2014-09-03

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are presented for reducing lag time via speculative graphics rendering in cloud based gaming. In some examples, historical data about statistically relevant large populations of players is provided. The historical data may include state transitions through various game locations or situations. In some of the game locations there may be a correlation between a probability of a particular upcoming scene and a player state. Example game locations or situations may include areas that players tend to cross in one or more straight lines, corners that players may round in a particular fashion, spots where certain player motions are commonly engaged in, such as looking up, and the like. The historical data may be tested against a certain predictive strength and rendered predicted game states may be prepared ahead of player need.

    Abstract translation: 提出了通过基于云计算游戏的投机图形渲染来减少滞后时间的技术。 在一些例子中,提供了关于统计学上相关的大量玩家的历史数据。 历史数据可以包括通过各种游戏位置或情况的状态转换。 在一些游戏位置中,特定即将到来的场景和玩家状态的概率之间可能存在相关性。 示例游戏位置或情况可以包括玩家倾向于以一个或多个直线交叉的区域,玩家可以以特定方式圆角的角落,某些玩家动作通常参与的点,例如查找等。 历史数据可以针对某种预测力量进行测试,并且可以在玩家需要之前准备预测的游戏状态。

    VIRTUAL MACHINE PLACEMENT
    128.
    发明申请
    VIRTUAL MACHINE PLACEMENT 有权
    虚拟机配置

    公开(公告)号:US20160285906A1

    公开(公告)日:2016-09-29

    申请号:US14665726

    申请日:2015-03-23

    CPC classification number: G06F9/45558 G06F2009/4557 G06F2009/45591

    Abstract: Technologies for virtual machine placement within a data center are described herein. An example method may include determining a shared threat potential for a virtual machine based, at least in part, on a degree of co-location the virtual machine has with a current virtual machine operating on a physical machine, determining a workload threat potential for the virtual machine based, at least in part, on a level of advantage associated with placing the virtual machine on the physical machine, determining a threat potential for the virtual machine based, at least in part, on a combination of the shared threat potential and the workload threat potential, and placing the virtual machine on the physical machine based on the threat potential.

    Abstract translation: 本文描述了数据中心内的虚拟机放置技术。 至少部分地基于虚拟机与在物理机器上操作的当前虚拟机的共位度确定虚拟机的共享威胁潜力,确定用于虚拟机的工作负载威胁潜力的示例性方法可以包括: 至少部分地基于将所述虚拟机放置在所述物理机器上的优点级别来确定所述虚拟机的威胁潜力,所述威胁潜力至少部分地基于共享威胁潜力和所述虚拟机的组合, 工作负载威胁潜力,并将虚拟机置于基于威胁潜力的物理机上。

    Fail-safe licensing for software applications
    129.
    发明授权
    Fail-safe licensing for software applications 有权
    软件应用程序的故障安全许可

    公开(公告)号:US09436814B2

    公开(公告)日:2016-09-06

    申请号:US14426157

    申请日:2013-01-22

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F21/105 G06F21/121 G06F2221/0775

    Abstract: Technologies are generally described to provide a fail-safe licensing system. An example system may include a quorum detection module of an instance of a software program configured to query a licensing queue corresponding to the software program for messages to determine a number of active instances of the software program. Based on a comparison of the determined number of active instances and a maximum number of allowed instances of the software program, the quorum detection module may be configured to determine whether the instance of the software program is authorized. In response to a determination that the instance of the software program is authorized, the quorum detection module may generate a unique instance identification tag and post a message to the licensing queue, where the message includes an indication that the instance of the software program is active and an indication of the generated unique instance identification tag.

    Abstract translation: 技术通常被描述为提供故障安全许可系统。 示例系统可以包括软件程序的实例的法定人数检测模块,该软件程序的实例被配置为查询对应于软件程序的许可队列以确定消息的多个活动实例。 基于所确定的活动实例数与所述软件程序允许实例的最大数目的比较,所述法定检测模块可以被配置为确定所述软件程序的实例是否被授权。 响应于确定软件程序的实例被授权,法定人数检测模块可以生成唯一的实例标识标签并将消息发布到许可队列,其中消息包括软件程序的实例是活动的指示 以及所生成的唯一实例识别标签的指示。

    Observer filtered activity recommendations

    公开(公告)号:US09411894B2

    公开(公告)日:2016-08-09

    申请号:US14873401

    申请日:2015-10-02

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F17/30867 G06F17/30598 G06Q30/0255 H04L67/22

    Abstract: Technologies related to observer filtered activity recommendations are generally described. In some examples, a computing device may collect activity and observer information for a device user, may identify limited observer activities, and may generate observer filtered activity recommendations for the device user, the observer filtered activity recommendations corresponding to the identified limited observer activities. Observer filtered activity recommendations may optionally be restricted in the presence of current observers outside a limited observer group. In some examples, the computing device may provide automated access to observer information and/or to observer filtered activity information to enable observer filtered activity recommendations by applications accessing the observer information and/or the observer filtered activity information.

Patent Agency Ranking