Abstract:
Systems and methods are disclosed herein to automatically replicate virtual machine image (VM) files on secondary VM computing devices, from a primary VM computing device. The secondary VM computing devices are automatically selected by constantly reviewing the operating parameter values (e.g., cost of resources, power consumption, etc.) of a number of secondary VM computing devices available of storing VM image replicas. The replica of the primary VM image is stored in the secondary VM computing devices in geographically disparate cloud locations. The primary VM image is automatically broken into constituent data blocks stored in an active index, which is compared against a stale index of data blocks. When an update is detected in the primary VM image, the comparison of indices will indicate that there is new data. Only the new data is used to update the secondary VM images, thereby reducing network traffic and latency issues.
Abstract:
A method for disseminating Early Warning Messages (EWMs) to subscriber terminals by an Early Warning Unit (EWU) in a mobile communication network is provided. The method comprises identifying at least one base station in a first region and sending a trigger signal to the identified base station for initiating the dissemination of the EWMs. The method further comprises sending an invitation request to one or more peer base stations in a second region and receiving subscriber details from one or more base stations. The method furthermore comprises selectively disseminating the EWMs to the one or more subscriber terminals based on location details of the subscriber terminals using a grid computing architecture. The grid computing architecture facilitates parallel dissemination of the EWMs to the one or more subscriber terminals by splitting the subscriber details into one or more data fragments.
Abstract:
The present invention relates to oral taste masked pharmaceutical composition comprising ciprofloxacin or salts or esters thereof. It further relates to processes of preparing it.
Abstract:
A system and method for consolidating a plurality of resources on a plurality of data processing units (DPUs) in a data processing network is provided. The method includes selecting a first DPU having a highest DPU volume among the plurality of DPUs. The method further includes calculating an angle made by a first DPU vector of the first DPU with a horizontal dimension of a multi-dimensional chart using first DPU co-ordinates from the plurality of DPU co-ordinates. Further, the method includes calculating an angle made by a first resource vector of a first resource to be assigned to the first DPU with a horizontal dimension of the multi-dimensional chart. Thereafter, the first resource is assigned to the first DPU, when a deviation of the first resource vector from the first DPU vector is minimum among the plurality of resources.
Abstract:
This disclosure enables various technologies for tracking various objects (e.g., mammals, animals, humans, pets) within various defined areas (e.g., rooms, apartments, residences, vehicles, tents) to determine whether those objects satisfy or do not satisfy various criteria, signatures, or thresholds, which may relate to health, safety, or security of those objects within those defined areas. These technologies may be enabled via various radars (e.g., time-of-flight radars, Doppler radars) positioned within those defined areas to track those objects therein. For example, some of such radars may operate in a Ku-band inclusively between about 12 GHz and about 18 GHz, a K-band inclusively between about 18 GHz and about 27 GHz, or a Ka-band inclusively between about 26.5 GHz and about 40 GHz, each of which has been unexpectedly found to be technologically beneficial for tracking those objects within those defined areas.
Abstract:
Data loss prevention systems and methods begin protecting data upon the creation of the data. One such method involves detecting a file system operation targeting data on a storage device. The file system operation creates or modifies the data or a set of permissions associated with the data. In response to detecting the file system operation, the method prevents unauthorized access to the data. The method begins preventing unauthorized access after the detection of the file system operation and before any subsequent read access to the data via the file system.
Abstract:
A computer implemented method is disclosed, the method including but not limited to detecting an event of interest in video conference data for a plurality of video conference participants and notifying an end user of the event of interest. A computer readable medium is also disclosed for containing a computer program for performing the method. A computer implemented method is also disclosed for receiving at an end user device, a notification of an event of interest in a video teleconference, the method including but not limited to receiving at an end user device from a notification indicating a detection of the event of interest in video conference data from the video teleconference for a plurality of video conference participants; and sending data from the end user device to the server requesting a transcription of comments from the speaker in video teleconference.
Abstract:
Technology is described for determining a location at which a computing device is positioned. For example, a computing device is positioned in an area (e.g., building), and a map (e.g., floor plan) is retrieved that depicts the area. An initial location of the computing device is determined with respect to the map. Inertial sensors record motion inputs (e.g., acceleration, orientations, etc.), which are analyzed to determine a path along which the computing device moves. The path is applied to the initial location to determine an updated location at which the computing device may be located.
Abstract:
In one embodiment, an initialization script including instructions to define a value of a parameter at a cloned virtual machine instance is generated and stored at a virtual disk of a source virtual machine instance. The value of the parameter at the cloned virtual machine instance is different from the value of the parameter at the source virtual machine instance. An image of the virtual disk is then sent to a virtual machine module. The cloned virtual machine instance is instantiated at the virtual machine module based on the image of the virtual disk.
Abstract:
A system and method of selectively migrating at least one virtual machine to another physical machine is disclosed. Consumption information of a plurality of virtual machines and capacity information of a plurality of physical machines is retrieved. A first virtual machine to be potentially migrated is identified based on a consumption metric representing consumption of at least one resource dimension by the first virtual machine running on a first physical machine. A second physical machine to potentially accept migration of the first virtual machine is identified based on time window information, wherein an available capacity of the second physical machine is analyzed to determine if the first virtual machine's resource consumption exceeds the capacity of the second physical machine. The first virtual machine is migrated to the second physical machine if the first virtual machine's resource consumption does not exceed the available capacity of the second physical machine.