Abstract:
A computer system image is executed on a computing node over a network. A system specification file transmitted over the network specifies the computer system image by specifying components of the computer system image. The components include an operating system and at least one resource. The system specification file also contains a signature associated with the resource. A resource is determined to be authorized to be incorporated into the computer system image by verifying the signature. A computer system image can then be formed based on the components specified by the system specification file and executed locally.
Abstract:
A method and apparatus for configuring an overlay network are provided. In the method and apparatus, an application source comprising an executable portion is obtained. A computer system instance is caused to execute at least some of the executable portion, and a snapshot of the computer system instance after partial but incomplete execution of the executable portion is obtained such that the snapshot is usable to instantiate another computer system instance to continue execution of the executable portion from a point in execution at which the snapshot was obtained.
Abstract:
Systems and methods are described for analyzing and verifying distributed application programs. In one embodiment, an application program is divided into as one or more independently executable components. During execution of the independently executable components, non-deterministic events are modified in order to effectuate deterministic results. The non-deterministic events may be modified in accordance with a predetermined set of constraints.
Abstract:
Remote computing resource service providers allow customers to reduce overhead by using computer hardware resources of the service provider to execute a variety of operations. Computer hardware resources of the service provider may be widely distributed between various geographic locations and may have differing computing capacity. Therefore it may be advantageous to coordinate processing of customer operations between computer hardware resource locations of the service provider. Customer requests to perform operations may be distributed to various locations and coordinated by the service provider using various techniques such as a cancellation manager to terminate unprocessed requests distributed to the various locations once one or more of the distributed requests have been processed.
Abstract:
A server obtains a challenge from another computer system during a negotiation with a client according to a protocol. The server injects the challenge into a message of the protocol to the client. The client uses the challenge in an authentication request. The server submits the authentication request to the other computer system for verification. The other computer system verifies the authentication request using a key registered to the client. The server operates further dependent at least in part on whether verification of the authentication request was successful.
Abstract:
Execution of an executable portion of an application source executing in a first computer instance is monitored at least up to a point relative to a variation point. The execution is halted at the point. An application image of the first computer instance usable to instantiate a second computer instance is copied based at least in part on the variation point such that the second computer instance continues execution of the executable portion of the application source from the variation point, and the application image is caused to be stored.
Abstract:
Remote computing resource service providers allow customers to execute virtual computer systems in a virtual environment on hardware provided by the computing resource service provider. The virtual computer systems may be suspended for an indeterminate amount of time and saved as images in one or more storage systems of the service provider. Periodically, updates for the virtual computer systems are required. In order to update virtual computer systems that are stored in a suspended state, an offline patch and indirection map is generated and used to update the virtual computer systems.
Abstract:
A computing resource service provider may store user data in a distributed data storage system. The distributed data storage system may contain one or more storage nodes configured to store hierarchical data in one or more data stores such as a column data store. Data in the data stores may be compressed or otherwise encoded, by a storage optimizer, in order to reduce that redundancy in the hierarchical data stored in the one or more data stores. Responses to user queries may be fulfilled based at least in part on data stored in the one or more data stores. A query processor may scan multiple different data stores across various storage nodes in order to obtain items responsive to the user query.
Abstract:
Techniques for identifying tamper-resistant characteristics for kernel data structures are disclosed herein. A set of kernel data structures is received, the set based on an operating system kernel. A plurality of virtual machines are instantiated based on the operating system kernel, each virtual machine of the plurality of virtual machine instances based on one or more modifications to one or more values to the virtual machine, the modifications based on the kernel data structures. Those modifications which cause virtual machine failures indicate which kernel data structures may be tamper-resistant.
Abstract:
A method and apparatus for configuring an overlay network are provided. In the method and apparatus, a first application is caused to be deployed for execution on the first computer system, with the application being member of an application group. First information is provided to the first computer system, with the first information being usable for securing communication between at least the first application and a second application deployed to a second computer system. Second information usable for establishing a routing entity for the first computer system is provided to the first computer system, with the routing entity established to route data from or to the first application.