­
­
­
­

Inventi Rapid - Cloud Computing

Patent Watch

  • Tools enabling preferred domain positioning on a registration website

    The present inventions may be implemented by tools enabling preferred domain positioning on a registration website. An example may comprise a computer-readable media storing instructions that, when executed by a server computer, cause the server to receive a bid from a registry seeking such preferred placement for a domain (that may be administered by the registry), generate a quality score for the domain, and determine the preferred placement based upon the bid and the quality score.

  • Collaboration portal (COPO) a scaleable method, system, and apparatus for providing computer-accessible benefits to communities of users

    The present invention, known as The Collaboration Portal (COPO), relates generally to the field of automated entity, data processing, system control, and data communications, and more specifically to an integrated method, system, and apparatus for providing computer-accessible benefits for communities of users. It provides a framework for provisioning computer-accessible benefits for communities of users, and can efficiently and robustly distribute the processing in behalf of those users over a decentralized network of computers. The field of the invention generally encompasses enabling appropriate and desired communication among communities of users and organizations, and providing information, goods, services, a works, opportunities, and connections among users and organizations.

  • Methods and systems for user identity management in cloud-based networks

    An identity management system can reside within the cloud computing environment. The identity management system can be linked to systems, such as virtual machines, applications, and/or appliances, both inside and outside the cloud computing environment to provide identity management to those systems. In order to provide identity management, the identity management system can be configured to link to the systems in order to receive, store, maintain, and provide identity information. The information can identify items (users, devices, products, services) associated with the systems. The identity management system can be configured to store and maintain the information in records. The identity management system can also be configured to charge owners and operators of the systems for the identity management.

  • System, method and program product for distribution of content contained in an electronic mail message

    A system, method and program product for sharing content contained in an e-mail. The method includes determining, using a tool, presence of any file attachments in an e-mail created in an e-mail application, removing, responsive to the determination, any file attachments from the e-mail prior to queuing the e-mail message for delivery, posting, using the tool, the e-mail as a feed document on a feed server on a network, publishing, using the tool, any file attachments removed from the e-mail on a network drive on the network, and sending, using the tool, respective links to the feed document posted and any file attachments published on the network to one or more recipients specified for the e-mail, wherein the respective links notify the one or more recipients of the e-mail and any file attachments. Further, the e-mail application includes a tagging tool for creating tags for the email.

  • System, method, and device for intelligence gathering and position tracking

    A mobile communication device that may be used by an investigator to secretly record a suspect and track the investigator's location includes a microphone for detecting sounds, a communication component for transmitting signals or data representative of the sounds to one of the portable computers via the wireless communication network, a display for displaying information related to operation of the device, a computing device, and a computer program implemented by the computing device. The computer program is operable to place the device in a stealth mode in which the display is turned off or otherwise deactivated to make the entire device appear to be turned off while the microphone continues to detect sounds and the communication component continues to transmit signals or data representative of the sounds to a surveillance or support team operating one of the portable computers. The mobile communication device may also include a location-determining component for determining geographic locations of the device and for transmitting location data to the portable computer.

  • Methods, systems and computer program products for a cloud computing spot market platform

    This disclosure details the implementation of methods, systems and computer program products for a cloud computing spot market platform (hereinafter, "Platform"). Fluctuations in demand for computing resources may engender idle processing capacity within the framework of a cloud computing system. Embodiments of the Platform provide infrastructure for redistributing idle capacity to grid-style batch computing processes, such as may be based on the same processing resources as those used by the cloud computing system. In this manner, Platform embodiments may increase the utilization of idle resources and reduce revenue losses associated with demand variability for cloud computing system administrators. In one embodiment, market-oriented floating prices for gridstyle batch computing utilizing idle resources may be implemented based on monitored and analyzed levels of computing resource supply and demand.

  • System for monitoring regulation of pharmaceuticals from data structure of medical and laboratory records

    A system is provided that integrates of records of clinical laboratory services into the assessment and optimization of patient health care and, in particular, regulation of the use of pharmaceuticals. Laboratory test result records are used in conjunction with other health care benefits records to monitor regulation of use of pharmaceuticals by patients. The incorporation of laboratory tests and results into such a utilization system allows improvement in the management of a patient's therapy based on a more precise picture of the patient's level of illness as revealed by the laboratory test results. The system of the present invention also allows optimization of the selection of laboratory tests to be performed, and also provides an outcome assessment of the risk of hospitalization due to pharmaceutical treatments resulting in physician intervention, leading to a change in physician prescribing behavior and, accordingly, a decrease in drug induced hospitalizations and improved quality of patient care and savings of health care costs.

  • Fault tolerant distributed storage for cloud computing

    Data sets and blocks are stored in a set of independent, functionally equivalent chunks. These chunks are placed on different elements of a distributed network to achieve predefined level of fault tolerance. Terms of fault tolerance are defined in terms of amount of unavailable sites in the network allowing receipt and access to the data block. Maximal and minimal number of chunks available is variable method parameters. The minimal amount of data chunks K needed to restore a data block is defined. The size of each chunk is approximately 1/K of the original block size. The maximal amounts of chunks are defined during distribution operation and depend upon a requested fault tolerance level. Redundancy in data storage is minimized and varies dynamically by changing the total amount of chunks available. Significant increase in data transfer rate is possible because all block chunks could be transferred in parallel and independently.

  • Using virtual networking devices to manage routing communications between connected computer networks

    Techniques are described for providing managed virtual computer networks whose configured logical network topology may have one or more virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of a virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present. The networking functionality provided for a managed computer network may include supporting a connection between that managed computer network and one or more other managed computer networks, such as via a provided virtual peering router to which each of the managed computer networks may connect, with the functionality of the virtual peering router being emulated by modules of the configurable network service without physically providing the virtual peering router, including to manage routing communications between the inter-connected managed computer networks in accordance with client-specified configuration information.

  • Systems and methods for using geo-location information in sensitive internet transactions

    A computer-implemented method for using geo-location information in sensitive Internet transactions is disclosed. In one example, such a method may include: 1) receiving, from a client device, a request to conduct an Internet transaction, 2) requiring geo-location information from the client device in order to conduct the Internet transaction, 3) receiving the geo-location information from the client device, 4) verifying the validity of the geo-location information, and then 5) conducting the Internet transaction. Various other methods, systems, and computer-readable media are also disclosed.

  • Using virtual networking devices to manage external connections

    Techniques are described for providing managed virtual computer networks that may have a configured logical network topology with one or more virtual networking devices, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present. In some situations, the emulating of networking device functionality includes receiving routing communications directed to the networking devices and using included routing information to update the configured network topology for the managed computer network. In addition, the techniques may further include supporting interactions with devices that are external to the virtual computer network, including remote physical networking devices that are part of a remote computer network configured to interoperate with the virtual computer network, and/or specialized network devices that are accessible via a substrate network on which the virtual computer network is overlaid.

  • Providing customer-selected solutions for multiple datacenter website hosting

    Methods of the present inventions allow for providing customer-selected solutions for multiple datacenter website hosting. An exemplary method may comprise the steps of registering, via at least one customer interaction server, a domain name to a registrant, offering, via the at least one customer interaction server, to host at least one customer website resolving from the domain name in a first datacenter, a second datacenter, or the first datacenter and the second datacenter, provisioning, via the at least one customer interaction server, (if the registrant selects hosting the at least one customer website in the first datacenter and the second datacenter) at least one hosting server in the first datacenter and at least one hosting server in the second datacenter to host the at least one customer website; and hosting the at least one customer website on the at least one hosting server in the first datacenter and at the least one hosting server in the second datacenter.

  • Mechanism for Utilization of Virtual Machines by a Community Cloud

    A mechanism for utilization of virtual machines by a community cloud is disclosed. A method of the invention includes authenticating a virtual machine (VM) to be joined to a cloud environment managed by a central administrative computing device as a cloud computing resource, wherein the VM is operating on a workstation that is not a dedicated cloud computing resource, updating a database of VMs utilized as cloud computing resources with information of the VM related to its operational status, and providing instructions for the VM to operate as a cloud computing resource, the instructions based on current demand for cloud services of the cloud environment and an overall current supply of cloud computing resources presently available in the cloud environment.

  • System and method for monitoring changes in databases and websites

    A system and method is described for constructing a differential web in which information including objects, numbers, or text in databases and web pages may be selected using pointing device movements. Once selected, objects may be designated to be monitored for changes, said changes being captured and made browsable on web-like constructs. Changes to the objects that satisfy certain user-stated criteria may result in notifications to specific users who may also setup automatic transactions on the changed objects. Recognition and control units recognize the selected objects and make them available to be executed in a Cloud Computing Environment. Objects may be selected from different web pages and hence monitoring can be effectuated across disparate databases and web pages.

  • LEVERAGING SMART-METERS FOR INITIATING APPLICATION MIGRATION ACROSS CLOUDS FOR PERFORMANCE AND POWER-EXPENDITURE TRADE-OFFS

    Managing power expenditures for hosting computer applications. A smart meter can receive electricity pricing information for a data center or other group of computing resources that host computer applications, such as a cloud computing environment. An application manager to determine how much electricity can be saved by operating the applications at a reduced performance level without compromising performance metrics for the applications. A site broker can determine how to sequence the performance levels of the applications to meet an electricity usage budget or to otherwise reduce electricity consumption or costs, for example during a peak load time period. The site broker can also select one or more applications to migrate to another cloud to meet the electricity usage budget or to reduce electricity consumption or costs. A hybrid cloud broker can interact with the site broker to migrate the selected application(s) to another cloud.

  • Cloud computing appliance

    A cloud computing appliance is provided in exemplary embodiment. The cloud computing device includes a computer server. The computer server is configured to receive a user file having a user filename and a user data content. The computer server is further configured to record an index record for the user file including the user filename and a dynamically generated storage name. The computer server is further configured to encipher the user data content with a symmetric key, encipher the symmetric key with an asymmetric key, and transmit a cloud file having a filename of the dynamically generated storage name and a data content of the enciphered user data content and the enciphered symmetric key.

  • Mobile Device Workload Management For Cloud Computing Using SIP And Presence To Control Workload And Method Thereof

    A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to manage workload for cloud computing by transferring workload to at least one mobile device using Session Initiation Protocol (SIP).

  • MESSAGE BROADCASTING IN A CLUSTERED COMPUTING ENVIRONMENT

    Embodiments of the present invention provide message broadcasting within a clustered computing environment such as a Cloud computing environment. Specifically, under the present invention, a message is received in a message queue (e.g., on a message queue server). From the message queue, the message is sent to a single node of a plurality of heterogeneous nodes within the clustered computing environment. The single node can be selected based on any factor such as a best available node within the plurality of nodes. This single node will process the message and identify a set of message listeners to whom the message should be broadcast. Typically, the set of message listeners is identified based on a topic of the message and an association of the topic to the set of message listeners (e.g., as set forth in a table or the like). In any event, the single node will then publish the message to the set of message listeners. Delivery confirmations, responses, etc. associated with the message will then be tracked, processed, and/or routed by the single node. Thus, embodiments of the present invention obviate the need for a given message from having to be delivered to and/or processed by multiple nodes.

  • End-To-End Secure Cloud Computing

    A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.

  • Mobile Robot System

    A robot system includes a mobile robot having a controller executing a control system for controlling operation of the robot, a cloud computing service in communication with the controller of the robot, and a remote computing device in communication with the cloud computing service. The remote computing device communicates with the robot through the cloud computing service.

  • DEPLOYING ARTIFACTS FOR PACKAGED SOFTWARE APPLICATION IN CLOUD COMPUTING ENVIRONMENT

    Deploying artifacts and tools in cloud computing environment for provisioning packaged software applications generates a user interface code automatically and dynamically using information from at least structural data representations of cloud computing environment and base configuration requirements for running one or more packaged software applications in the cloud computing environment. In one aspect, the automatically generated code may be augmented using one or more library codes and auxiliary files. Specific configuration requirements are further obtained by running the automatically generated user interface code. One or more components to deploy in the cloud computing environment are determined that meet the base configuration requirements and the specific configuration requirements, by analyzing the structural data representations.

  • System and Method for Providing Energy Efficient Cloud Computing

    In one aspect, a cloud cube for providing energy efficient cloud computing is disclosed, which includes: an internal DC bus for transferring energy, clusters of computing servers coupled to the internal DC bus for performing cloud computing, at least one NAS storage coupled to the internal DC bus, at least one energy storage coupled to the internal DC bus, a plurality of energy sources coupled to the internal DC bus, and at least one energy manager coupled to the internal DC bus for performing energy management or energy routing. In another aspect, a system for providing energy efficient cloud computing is disclosed, which includes: a DC grid having a plurality of interconnected energy sources, and a plurality of cloud cubes connected by the DC grid such that energy can be routed and shared among the cloud cubes.

  • Multimedia Communication Device Within Cloud Computing Techniques

    The present invention provides an improved multimedia communication device within cloud computing techniques including a display mechanism for multimedia playing; an operation mechanism linking with the display mechanism for interpretation and implementation of the display mechanism; and a servo mechanism linking with the display mechanism for certification program of the operation mechanism and transmission of the list of multimedia service to the display mechanism; thus, the multimedia playing frequency channel located in our server cloud computing is detected at any time and the contents of the frequency channel are updated immediately; not only the needed frequency channel is quick found by an user, but also it ensures that all frequency channels located in our server cloud computing are normally linked by the user.

  • MANAGING RUNTIME EXECUTION OF APPLICATIONS ON CLOUD COMPUTING SYSTEMS

    Instances of a same application execute on different respective hosts in a cloud computing environment. Instances of a monitor application are distributed to concurrently execute with each application instance on a host in the cloud environment, which provides user access to the application instances. The monitor application may be generated from a specification, which may define properties of the application/cloud to monitor and rules based on the properties. Each rule may have one or more conditions. Each monitor instance running on a host, monitors execution of the corresponding application instance on that host by obtaining from the host information regarding values of properties on the host per the application instance. Each monitor instance may evaluate the local host information or aggregate information collected from hosts running other instances of the monitor application, to repeatedly determine whether a rule condition has been violated. On violation, a user-specified handler is triggered.

  • CLOUD COMPUTING ASSESSMENT TOOL

    A system is described for providing a cloud computing assessment tool. The system may include a memory, an interface, and a processor. The processor may receive a data center configuration from the user. The data center configuration may include a compute and storage capacity. The processor may determine a cloud computing configuration equivalent to the data center configuration. The processor may identify a time period for transitioning from the data center to cloud computing. The processor may identify a plurality of trend values representing changes in the compute capacity and storage capacity over the period of time. The processor may generate a strategy to transition from the data center to cloud computing over the period of time. The strategy may account for the changes in the compute capacity and the storage capacity. The processor may provide a graphical output and a numerical output of the strategy to the user.

  • SYSTEM AND METHOD FOR UPGRADING KERNELS IN CLOUD COMPUTING ENVIRONMENTS

    The system and method described herein may upgrade kernels in cloud images deployed in cloud computing environments without having to rebuild a machine image that contains a root file system for the cloud image. For example, the cloud image may include a ramdisk that compares the kernel booted in the cloud image to the root file system to verify whether the machine image contains a directory hierarchy matching an operating system release for the kernel. In response to the machine image containing the matching directory hierarchy, the root file system may be mounted for execution in the cloud computing environment. Alternatively, in response to the machine image lacking the matching directory hierarchy, the ramdisk may dynamically create the matching directory hierarchy and inject modules that support the kernel into the root file system prior to mounting and delivering control to the root file system.

  • DECISION SUPPORT SYSTEM FOR MOVING COMPUTING WORKLOADS TO PUBLIC CLOUDS

    An automated approach to analyzing computer workloads and cloud computing environments to support moving and hosting the workloads within the cloud computing environments. A workload may be identified and analyzed based upon business and technical attributes to determine whether the workload is suitable for moving to a cloud computing environment. Similarly, public clouds may be identified and analyzed based upon their business and technical attributes to determine whether the public clouds are suitable for hosting a workload. The analysis of the public clouds may be based on a particular workload, a category of workloads, or irrespective of workloads or workload categories. A best-fit public cloud may be identified for a workload determined to be suitable for moving to a public cloud environment based upon the analyses.

  • CLOUD COMPUTER

    A cloud computer includes a base, a host, and a battery, in which the host includes a motherboard, a memory connected to the motherboard, and a base connector connected to the motherboard, and the base includes a host connector corresponding to the base connector of the host, and a plurality of input/output ports to connect to peripherals. The battery is mounted on the host and connects to the motherboard to provide electronic power to the motherboard, and the host is detachably connected with the base.

  • IDENTITY MANAGEMENT VIA CLOUD

    A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving user profile data from the handheld computer at the shared, scalable computing resource, the user profile data comprising a user security factor. The user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer. The method includes storing the user profile data on the shared, scalable computing resource as a portion of a user profile, the user profile further comprising user preference data. The method further includes receiving the user security factor from a second computing device. The user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device. The method further includes downloading user preference data to the second computing device.

  • FACILITATING THE EXECUTION OF WEB APPLICATIONS IN THE CLOUD

    A facility for executing an application program in a cloud computing environment is described. The facility identifies dependencies of the application program, and identifies support software components that satisfy the identified dependencies. The facility then causes the application to be executed in conjunction with the identified support software components on the nodes of the cloud computing environment on which they were installed.

  • SECURING CUSTOMER VIRTUAL MACHINES IN A MULTI-TENANT CLOUD

    A trusted virtualization platform protects sensitive customer data during operation of virtual machines in a multi-tenant cloud computing center. The trusted virtualization platform limits administrator access to the data and state of the virtual machines running thereon, reports any changes made thereto, and requires keys provided by the customer or a trusted third party of the customer to perform management operations on the virtual machines. By requiring cloud computing centers to use such trusted virtualization platforms, customers uploading their virtual machines into the cloud computing center can be assured that cloud administrators will not be able to access or tamper with their private data. Furthermore, customers can directly audit all important state or configuration changes for their virtual machines as the trusted virtualization platform can be configured to report all such changes according to a security policy set by the customer.

  • ADAPTIVE MOBILE CLOUD SYSTEM USING PRIVATE VIRTUAL INTANCE AND CONSTRUCTION METHOD THEREOF

    An adaptive mobile cloud system using a private virtual instance (PVI) includes: a PVI automatic provisioning for generating a PVI by providing a hardware resource, an operating system and an application which are requested by a user terminal; a PVI image manager for storing and managing an image of an execution state of the PVI by checking a state of the PVI; a mobile interface adaptor that is adaptively operated according to an input/output device and resources of the user terminal; and an adaptive application manager for executing an application by adaptive cooperation between the user terminal and the PVI according to the resource of the user terminal.

  • ADAPTIVE MOBILE CLOUD SYSTEM USING PRIVATE VIRTUAL INTANCE AND CONSTRUCTION METHOD THEREOF

    An adaptive mobile cloud system using a private virtual instance (PVI) includes: a PVI automatic provisioning for generating a PVI by providing a hardware resource, an operating system and an application which are requested by a user terminal; a PVI image manager for storing and managing an image of an execution state of the PVI by checking a state of the PVI; a mobile interface adaptor that is adaptively operated according to an input/output device and resources of the user terminal; and an adaptive application manager for executing an application by adaptive cooperation between the user terminal and the PVI according to the resource of the user terminal.

  • EXTENDING A CUSTOMER RELATIONSHIP MANAGEMENT EVENTING FRAMEWORK TO A CLOUD COMPUTING ENVIRONMENT IN A SECURE MANNER

    A customer relationship management (CRM) eventing framework may be extended to a cloud computing environment. A listening channel may be opened between a service and a service bus in a cloud computing environment. The cloud computing environment may also include an authenticating service. Service information for the service may be registered with a CRM. The CRM may receive a request made by a requester. The request may trigger a request processing pipeline in an eventing framework. The CRM may post event data responsive to the request to the service bus. The service may receive the event data, process it and may send back a confirmation or response. The CRM may finally send a response to the requester.

  • OPTIMIZING STORAGE BETWEEN MOBILE DEVICES AND CLOUD STORAGE PROVIDERS

    Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g., within a certain time period), the link and billing plan can accommodate the transfer of the file (e.g., determined based on the size of the file), and there is sufficient power to make the file transfer.

  • CONFIGURING CLOUD RESOURCES

    A method, system, and program product for identifying cloud resources are provided, and further a method, system, and program product for configuring cloud resources are provided. The method for identifying cloud resources may include receiving a request with respect to at least one resource in a cloud and determining a set of resources among the at least one resource in the cloud in accordance with the received request. Determining the set of resources may include consulting an ontology including metadata associated with the at least one resource in the cloud and computing the set of resources based on the metadata and the received request. Additionally, the method may include computing a cost factor with respect to the determined set of resources. Furthermore, the method may include rendering, in response to the received request, the determined set of resources and the cost factor with respect to the determined set of resources.

  • Managing Sensitive Data in Cloud Computing Environments

    The illustrative embodiments provide a method, computer program product, and apparatus for managing collectively sensitive data. Collectively sensitive data is divided into a first partition for reassembly data, a second partition of the collectively sensitive data, and a third partition of the collectively sensitive data. Each of the second partition and the third partition are collectively nonsensitive in isolation. The first partition is stored in a translation table in a secure database. The translation table is configured for use in assembling collectively sensitive data from the second partition and the third partition. The second partition of the collectively sensitive data is stored in a first database associated with a first cloud computing environment. The third partition of collectively sensitive data is stored in a second database associated with a second cloud computing environment.

  • Systems and methods for management of secure data in cloud-based network

    Embodiments relate to systems and methods for the management of secure data in a cloud-based network. A secure data store can store sensitive or confidential data, such as account numbers, social security numbers, medical or other information in an on-premise data facility. Regulatory and/or operational requirements may prohibit the migration or unprotected transmission of the secure data to the cloud. An operator can instantiate a set of virtual machines to access and process the secure data, for example to process online purchase transactions. To prevent unauthorized disclosure of the secure data, the secure data store can receive data access requests via a translation module that translates the secure data. The secure data store can retrieve and transmit the secure data using a protection mechanism such as a masking and/or encryption mechanism, avoiding the unprotected transport or exposure of that data to the cloud.

  • Systems and methods for resolving split-brain scenarios in computer clusters

    A computer-implemented method for resolving split-brain scenarios in computer clusters may include (1) identifying a plurality of nodes within a computer cluster that are configured to collectively perform at least one task, (2) receiving, from a node within the computer cluster, a failure notification that identifies a link-based communication failure experienced by the node that prevents the nodes within the computer cluster from collectively performing the task, and, upon receiving the failure notification, (3) immediately prompting each node within the computer cluster to participate in an arbitration event in order to identify a subset of the nodes that is to assume responsibility for performing the task subsequent to the link-based communication failure. Various other methods, systems, and computer-readable media are also disclosed.

  • Systems and methods for monitoring physical paths within a computer network

    A computer-implemented method for monitoring physical paths within a computer network may include: 1) identifying a first logical path within a computer network, 2) identifying a physical path that corresponds to the first logical path, 3) probing the physical path to determine whether the first logical path is active, 4) identifying a second logical path within the computer network, 5) determining that the physical path also corresponds to the second logical path, and then 6) using the results of the probe of the physical path to determine whether the second logical path is active without probing the physical path a second time. Additional computer-implemented methods for monitoring physical paths within multi-host computer networks are also disclosed.

  • Streamlined guest networking in a virtualized environment

    Networking speed in a virtualized environment can be improved by utilizing an enhanced protocol and parallel stack to bypass restrictions of a conventional network stack that complies with standard networking protocols. In one embodiment, an enhanced TCP protocol enables large packets received from a guest application to bypass the guest networking stack and be received to a bottom conversion layer of the enhanced stack, which is able to segment the packet into appropriately sized segments that conform to the conventional protocol. These segments can be passed to a network interface card (NIC) or other device for encapsulation, framing, or other such processing to be transmitted to the destination as Ethernet frames or other such packets.

  • System and method for providing total real-time redundancy for a plurality of client-server systems

    An automated and scalable system for total real-time redundancy of a plurality of client-server systems, wherein, data is replicated through a network connection and operationally located on a virtual machine that substitutes for a failed client-server system, wherein the virtual machine is activated and installed on the cloud computing environment. Monitoring applications are installed on both the client-server systems and the cloud computing environment. System components are identified, a network connection is initiated, a heartbeat is established, data replication is automated, system failure is detected, failover is initiated, and subsequent client-server restoration is automated.

  • Effective Memory Clustering to Minimize Page Fault and Optimize Memory Utilization

    An embodiment of the invention provides a method for organizing data addresses within a virtual address space to reduce the number of data fetches to a cloud computing environment. More specifically, data access requests to the cloud computing environment are monitored to identifying data addresses having similar properties. Multi-dimensional clusters are created based on the monitoring to group the data addresses having similar properties. A memory page is created from a multi-dimensional cluster, wherein the creating of the memory page includes creating a cross-sectional partition from the multi-dimensional cluster. The multi-dimensional clusters and the memory page are stored in the cloud computing environment. A request for a data object in the cloud computing environment is received from a user interface. The data address corresponding to the data object is identified and mapped to the multi-dimensional cluster and/or the memory page. The memory page is transferred to the user interface.

  • SOFTWARE LICENSE MANAGEMENT WITHIN A CLOUD COMPUTING ENVIRONMENT

    Embodiments of the present invention provide a solution to manage software licenses within a cloud computing environment. Specifically, aspects of the present invention (among other things): determine a requester's/customer's needs; identify a set (at least one) of providers capable of addressing the requester's licensing needs; and match the customer with the most appropriate provider. The embodiments of the present invention will also analyze current licensing configurations/models of the requesters, providers, and software vendors to identify areas of potential improvement. This provides the functionality necessary to adjust software license level in a dynamic fashion so as to best meet the customer's needs.

  • METHOD FOR TRANSMITTING VIRTUALIZED DATA IN CLOUD COMPUTING ENVIRONMENT

    The invention relates to a method for exchanging virtualized data in Cloud Computing Environment between a first User Equipment and a second User Equipment, said virtualized data being stored in a first memory area allocated to said first User Equipment in a first distant server, a second memory area is allocated to said second User Equipment in a second distant server for receiving said virtualized data, said first User Equipment and said second User Equipment exchanging specific information on said virtualized data over a short range wireless link, method characterized by the following step: the first User Equipment proposes said virtualized data to the second User Equipment by means of a message sent through the short range wireless link, the second User Equipment transmits to the first User Equipment the location in the second memory area where to transfer said virtualized data, and transmits to the first distant server its agreement to receive said virtualized data, the first User Equipment requests said first distant server to transfer said virtualized data from the first memory area to the second memory area over the radio link.

  • Method, System and Computer Programs to Assist Migration to a Cloud Computing Environment

    Disclosed is a computer-implemented method, system and computer program(s) for migration of a source machine instance to a target machine instance of least one heterogeneous virtual server device managed within a cloud computing environment. The method includes discovering machine images of a cloud service provider and storing results in a computer-readable catalog containing cloud metadata comprised of machine image identifiers and information discovered about the machine images. The method further includes, in response to a request for migration document in a computer-readable form that comprises a specification of a required migration target machine instance, specifying weight/priority information for components to be included in the target machine instance, where the weight information indicates weights for operations comprising component installation, component removal and component upgrade in the target machine instance. The method also includes executing a best fit matching algorithm to examine the catalog in accordance with the weight/priority information to identify optimal machine images to be used for the migration of the source machine instance to the target machine instance.

  • SERVICE LEVEL AGREEMENTS-BASED CLOUD PROVISIONING

    In an aspect there is provided a method. The method may include receiving, at a provisioning component, a first selection of one or more infrastructure parameters; receiving, at the provisioning component, a second selection of one or more platform parameters; receiving, at the provisioning component, a third selection of one or more application parameters; accessing metadata based on one or more of the first selection, the second selection, and the third selection; and providing, by the provisioning component, information to provision a cloud computing system, the information based on the accessed metadata and one or more of the first selection, the second selection, and the third selection. Related apparatus, systems, techniques and articles are also described.

  • SYSTEMS AND METHODS FOR TRACKING AND REPORTING PROVENANCE OF DATA USED IN A MASSIVELY DISTRIBUTED ANALYTICS CLOUD

    In the context of cloud computing, effective methods and arrangements for storing and tracking provenance. In accordance with at least one embodiment, a distributed file system is advantageously employed to store large amounts of provenance data. File creation involves the creation both of output files and reduce logs.

  • METHODS AND SYSTEMS FOR ENABLING CONTROL TO A HYPERVISOR IN A CLOUD COMPUTING ENVIRONMENT

    A method for enabling control in a cloud computing environment includes initializing a portion of computing resources identified for enabling service to a user system in a cloud computing environment. The method may also include enabling service to the user system. Further, the method may include initializing another portion of the computing resources. After the service in the cloud computing environment has been enabled, cloud computing services may be provided by the host system to one or more user systems.

  • MULTI-TIERED MEDIA SERVICES USING CLOUD COMPUTING FOR GLOBALLY INTERCONNECTING BUSINESS AND CUSTOMERS

    A multi-tiered communication system for provisioning a cloud computing system to host a media server. The system includes a data center including one or more Interactive Voice Recognition (IVR) functions that are configured for use with a caller who initiates contact with the data center. The system also includes a media server implemented in a cloud computing system. The media server is configured to route an incoming call from one subscriber to another, or in the case of a caller to the data center, to route one or more IVR messages to the caller and to connect the caller with an agent for real-time communication.

  • PROCESS ARCHITECTURE FOR ELASTIC STATEFUL SHARED NOTHING SYSTEM

    A database management system implemented in a cloud computing environment. Operational nodes are assigned as controller-nodes, compute-nodes or storage-nodes. The number of operational nodes, and their assignment as compute-nodes or storage-nodes can vary. Queries specify tables, with each such table assigned to a respective group of storage nodes. The number of operational nodes executing a given query may change by (a) changing the compute-nodegroup associated with a connection, or (b) adding or removing nodes from the compute-nodegroup; and/or distributing data from the tables among the nodes in a storage nodegroup. State information is maintained for each client connection, such that steps are executed assuming that the state exists. State changes are recorded during step execution for a given connection, so that subsequent steps from the same connection are executed with the state as left by a prior step, and so that subsequent queries on the same connection are executed with the state as left by the prior query.

  • MECHANISM FOR FACILITATING COMMUNICATION AUTHENTICATION BETWEEN CLOUD APPLICATIONS AND ON-PREMISE APPLICATIONS

    In accordance with embodiments, there are provided methods and systems for providing communication authentication between cloud applications and on-premise applications. A method of embodiments includes receiving, from a cloud application at a cloud computing device, a first message at an application server of a server computing system, and parsing, at the application server, the first message to determine first identification information contained within the first message. The method further includes authenticating, at the application server, the first message by verifying the first identification information, and forwarding the first authenticated message to an on-premise application at a remote computing device.

  • Cloud Data Management

    The different illustrative embodiments provide a method, computer program product, and apparatus for managing data. An encrypted file containing the data is divided into a plurality of segments. The plurality of segments are sent to a plurality of cloud computing environments for storage in the plurality of cloud computing environments. Each cloud computing environment in the plurality of cloud computing environments receives a portion of the plurality of segments. The portion of the plurality of segments is associated with a cloud computing environment in the plurality of cloud computing environments to which the portion of the plurality of segments was sent.

  • CALIBRATING CLOUD COMPUTING ENVIRONMENTS

    In general, embodiments of present invention provide an approach for calibrating a cloud computing environment. Specifically, embodiments of the present invention provide an empirical approach for obtaining end-to-end performance characteristics for workloads in the cloud computing environment (hereinafter the "environment"). In a typical embodiment, different combinations of cloud server(s) and cloud storage unit(s) are determined. Then, a virtual machine is deployed to one or more of the servers within the cloud computing environment. The virtual machine is used to generate a desired workload on a set of servers within the environment. Thereafter, performance measurements for each of the different combinations under the desired workload will be taken. Among other things, the performance measurements indicate a connection quality between the set of servers and the set of storage units, and are used in calibrating the cloud computingenvironment to determine future workload placement. Along these lines, the performance measurements can be populated into a table or the like, and a dynamic map of a data center having the set of storage units can be generated.

  • MECHANISM FOR CO-LOCATED DATA PLACEMENT IN A PARALLEL ELASTIC DATABASE MANAGEMENT SYSTEM

    A database management system implemented in a cloud computing environment. Operational nodes are assigned as groups of controller-nodes, compute-nodes or storage-nodes. Assignments as compute-nodes or storage-nodes vary during execution of queries. Queries specify tables for an associated database operation, and respective storage nodegroup(s). The number of nodes executing a query may change by (a) changing a compute-nodegroup, or (b) adding or removing nodes from a compute nodegroup; and/or distributing data to the storage nodegroup based on a Distribution Method which may be specified by a Distribution Vector (DV) that determines at least where each row is stored.

  • Integrated Electronic Patient Health Care and Billing Coordination System

    A patient care coordination system that includes a plurality of hand-held computers in communication with a cloud computing network or a remote server that has an accessible database of all patients and the health care information of each. The cloud computing network or remote server synchronizes, in real time, patient health care information input in any one of the plurality of hand-held computers with all the others of the plurality of hand-held computers. The hand-held computers are able to download and view the patient health care information in the database in a user friendly graphic user interface equipped with a touch screen for ease of user data navigation. The cloud computing network or remote server also receives, as input, data from patient care devices that are used to monitor patient condition periodically or continuously and store these in the database for the appropriate patient. In addition, the cloud computing network or remote server transmits encrypted electronic digital patient health care information to a third party and receives acknowledgment of third party receipt of the information. The cloud computing network or remote server monitors fee-bearing information exchanged with the third party and automatically assesses a predetermined fee based on fee-bearing information exchanged and stores the billing information to the appropriate patient in the database.

  • SYSTEM ARCHITECTURE AND METHODS FOR DISTRIBUTED MULTI-SENSOR GESTURE PROCESSING

    The techniques discussed herein contemplate methods and systems for providing, for example, interactive virtual experiences that are initiated or controlled using user gestures. In embodiments, the techniques provide for gestures performed by users holding devices to be recognized and processed in a cloud computingenvironment such that the gestures produce a predefined desired result. According to one embodiment, a server communicates with a first device in a cloud computing environment, wherein the first device can detect surrounding devices, and an application program is executable by the server, wherein the application program is controlled by the first device and the output of the application program is directed by the server to one of the devices detected by the first device.

  • Granting Access to a Cloud Computing Environment Using Names in a Virtual Computing Infrastructure

    Access to resources in a cloud computing environment having a plurality of computing nodes is described. A group of users is defined within the cloud computing environment. A first name is assigned to the group. At least one subgroup of users is defined from within the group. A second name is assigned to the at least one subgroup. The second name follows a hierarchical naming structure of the form/group/subgroup.

  • STATEFUL APPLICATIONS OPERATING IN A STATELESS CLOUD COMPUTING ENVIRONMENT

    A cloud computing environment may use a virtualization layer within a stateless cloud computing process to capture, store, and retrieve state information generated by a stateful application executing within the process. The virtualization layer may monitor various state storage systems to identify changes to stateful items and store the stateful items in a state storage mechanism. The virtualization layer may intercept and redirect calls to the stateful items stored in the state storage mechanism. A cloud computing manager may start and stop the stateless cloud computing process, and may recover the state and resume executing the application.

  • SELF-UPDATING NODE CONTROLLER FOR AN ENDPOINT IN A CLOUD COMPUTING ENVIRONMENT

    Embodiments of the present invention provide a self-updating node controller (e.g., for an endpoint/node such as a cloud node). In general, the node controller will autonomously and automatically obtain program code (e.g., scripts) from a central repository. Among other things, the program code enables the node controller to: receive a request message from a cloud node queue associated with the endpoint; process a request corresponding to the request message; automatically update the program code as needed (e.g., when requests cannot be processed/fulfilled); place a state message indicating a state of fulfillment of the request in a cloud manager queue associated with a cloud manager from which the request message was received; update an audit database to reflect the state of fulfillment; and/or place a failure message in a triage queue if the request cannot be processed by the node controller.

  • Building a Cloud Computing Environment Using a Seed Device in a Virtual Computing Infrastructure

    A cloud computing environment having a plurality of computing nodes is described. A seed device is connected to a network. From the seed device, a launching of a cloud computing management configuration is initiated. The seed device includes a repository of software. From the seed device, software is installed on one of the plurality of computing nodes to run a cloud computing management system. The software is loaded from one of the plurality of computing nodes onto each of the plurality of nodes. A computing node is selected from the plurality of computing nodes, to designate as a master node. Operations of the cloud computing management system is controlled from the master node.

  • NODE CONTROLLER FOR AN ENDPOINT IN A CLOUD COMPUTING ENVIRONMENT

    Embodiments of the present invention provide an intelligent node controller (e.g., for an endpoint/node such as a cloud node) to process requests. Specifically, (among other things) the node controller will read a request message from a cloud node queue that is associated with the endpoint. The request message typically includes details related to a request for cloud resources and/or services received from a consumer. The node controller executes program code in an attempt to process the request. As the request is being processed, the node controller can place state messages indicating a state of fulfillment of the request on a cloud manager queue that is associated with a cloud manager from which the request message was received. In addition, the node controller can update an audit via an audit queue with the state messages. When a request cannot be processed, the node controller can place a failure message in a triage queue or the like.

  • System and Method for Transitioning to cloud Computing Environment

    System and method for assessing the transitioning of computing components to a cloud computing environment is described. The system and method comprises of identifying at least one category of service in an organization to be transitioned to a cloud computing environment; collecting relevant information about the category from one or more service category owners and/or users; analyzing the information received based on pre-defined parameters; and classifying the services into high cloud ready, moderate cloud ready, or limited cloud ready based on the analyzed information.

  • PROCESSING REQUESTS IN A CLOUD COMPUTING ENVIRONMENT

    Embodiments of the present invention provide a distributed approach to request processing. Specifically, in a typical embodiment, a request is received via a cloud dispatcher, which generates and places a corresponding message in a cloud manager queue associated with a set (at least one) of cloud managers. The message is then placed in a cloud node queue associated with a set of cloud nodes that process the message and provide state information related to request processing in an audit queue associated with an audit database. In addition, cloud manager state information is placed in a dispatcher queue associated with the cloud dispatcher. This state information is used by the cloud dispatcher to determine where to place incoming requests. Under these embodiments, each cloud resource runs self-contained management code and performs actions by receiving instructions from a queue. Thus, the messages may be directed to a specific resource or broadcasted to a "pool" of resources of which any resource can take the request and process it.

  • RUNNING LEGACY APPLICATIONS ON CLOUD COMPUTING SYSTEMS WITHOUT REWRITING

    Embodiments of the invention enable an application configured to store certain information (e.g., state information) locally to be deployed to a cloud computing environment in which local storage of such information is not permitted. For example, some embodiments create a "package" of resources that the application expects to be available to it during execution, and makes the package available to the application during execution in the cloud computing environment. The package may provide the application with resources it expects to have available during execution, such as the ability to store state information locally. As a result, the application need not be substantially modified to execute in the cloud computing environment.

  • PRIORITIZING JOBS WITHIN A CLOUD COMPUTING ENVIRONMENT

    Embodiments of the present invention provide an approach to prioritize jobs (e.g., within a cloud computing environment) so as to maximize positive financial impacts (or to minimize negative financial impacts) for cloud service providers, while not exceeding processing capacity or failing to meet terms of applicable Service Level Agreements (SLAs). Specifically, under the present invention a respective income (i.e., a cost to the customer), a processing need, and set of SLA terms (e.g., predetermined priorities, time constraints, etc.) will be determined for each of a plurality of jobs to be performed. The jobs will then be prioritized in a way that: maximizes cumulative/collective income; stays within the total processing capacity of the cloud computing environment; and meets the SLA terms.

  • CLOUD FEDERATION IN A CLOUD COMPUTING ENVIRONMENT

    Various methods, devices, and systems are described for cloud federation in a cloud computing network including bridging computing resources between an enterprise and a cloud or among multiple clouds. These techniques involve generating an image of the host system and decoupling it from its underlying computing resources so that it can be migrated across disparate computing resources in a seamless manner. In one embodiment, an enterprise workload can be bridged with cloud resources to receive software as a service. In other embodiments, bridging is performed across multiple public or private clouds, each potentially having disparate computing resources. In addition, users can access and use these cloud services through a web browser or other network interface anywhere in the cloud computing network as if the services were installed locally on their own computer.

  • SYSTEMS AND METHODS FOR IMPLEMENTING BUSINESS RULES DESIGNED WITH CLOUD COMPUTING

    Systems and methods presented herein may involve locally executing rules (e.g., business rules) that are designed in a remote computing cloud. Systems and methods may include receiving a file representing modified rules from the remote computing cloud and compiling the file locally for integration into a local system. By separating the design and execution phases of the rules, new versions of the rule design application(s) may be utilized in the remote cloud to design local rules without upgrading or otherwise changing the applications that implement the rules on the local system.

  • AUTOMATED SERVICE LEVEL MANAGEMENT OF APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT

    Automated service level management of applications can include automated deployment, monitoring, forecasting, and/or predicting based on a plurality of service levels comprising application level, application server platform level, virtual machine level, and/or infrastructure level, and optimizations at multiple levels using a plurality of techniques including automated dynamic application migration. Automated deployment of applications in a cloud computing environment using deployment descriptors comprises receiving values for service level parameters for an application, creating a deployment descriptor based on the parameters, identifying application servers that satisfy the deployment descriptors, and deploying the application to the identified application servers. Automated dynamic migration of applications in a cloud computing environment comprises deciding to migrate an application, obtaining application resource requirements, identifying application server candidates, selecting an application server from one of the candidates, and migrating the application.

  • CLOUD COMPUTING SYSTEM, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM

    A cloud computing system may include a request receiving unit realized by executing a program that causes a storing service to store a message corresponding to a job according to reception of a processing request of the job from an image forming apparatus, and a back-end processing unit realized by executing a program that regularly issues to the storing service an acquisition request for the message. The cloud computing system further may include a registration unit and an instruction unit. The registration unit acquires a queue message issued according to a network pull-print request accepted from an image forming apparatus, determine a priority of the acquired queue message according to a status of the image forming apparatus, and register the queue message. The instruction unit acquires a queue message of high priority from registered queue messages and instruct the storing service to store the acquired queue message of high priority.

  • METHOD AND SYSTEM FOR INTELLIGENT PROCESSING OF ELECTRONIC INFORMATION WITH CLOUD COMPUTING

    A method and system for intelligent electronic information processing with cloud computing. The method and system include selecting one or more portions of a set of electronic information including any unwanted portions that have been reviewed and are to be eliminated from display. The selected portions are recorded on a cloud computing network in a cloud computing object thereby eliminating any unwanted previously reviewed portions of the set of electronic information from display with display of any additional sets of electronic information. The previously reviewed portions without the reviewed and unwanted portions are available to and across plural network devices and across plural login accounts anywhere on the cloud computing network.

  • REAL-TIME LICENSE METERING OF A PROVISIONED APPLICATION IN A CLOUD COMPUTING ENVIRONEMENT

    Provided is a method for the costing of a license based on real-time usage of software on a hardware resource instead of upfront PVU based purchase of licenses. Service provider need not pay for the license charge till the end of life of that application and need not pay for an entire set of N licenses, considering that the service provider expects that the maximum number of application instances could be N.

  • METHOD AND APPARATUS FOR MAINTAINING OPERABILITY WITH A CLOUD COMPUTING ENVIRONMENT

    A method and apparatus for maintaining operability with a cloud computing environment. The apparatus includes a storage module and a local environment module. The storage module may store cloud computing data from a cloud computing environment onto a local storage device. The storage module may communicate with the cloud computing environment through a remote connection. The local environment module may operate a local cloud computing environment from the local storage device while the remote connection to the cloud computing environment is unavailable. The local cloud environment may replicate at least a portion of the cloud computing environment and may be operated from the stored cloud computing data.

  • SYSTEM AND METHOD FOR FINGERPRINTING IN A CLOUD-COMPUTING ENVIRONMENT

    A system and method for uniquely fingerprinting an execution environment instance in a cloud-computing environment in which an application is assigned to the execution environment instance, and a license key is required for the application to access a desired licensed feature. The application requests a fingerprint certificate from a cloud infrastructure management unit via the application's execution environment instance. The management unit identifies the fingerprint assigned to the execution environment instance, digitally signs a fingerprint certificate, and assigns an expiration timestamp. An application programming interface (API) sends the signed certificate and timestamp back to the application. The application verifies the digital signature and the timestamp and utilizes the fingerprint certificate to request a license key from a licensing system. The licensing system verifies the fingerprint certificate before generating the license key, and the application verifies that the license key matches the fingerprint before accessing the licensed feature.

  • APPARATUS AND METHOD FOR AUTOMATIC REALTIME CLOUD COMPUTING PROCESSING FOR LIVE MULTIMEDIA CONTENT

    An apparatus and a method for automatic real-time cloud computing processing of live multimedia content are disclosed. In one embodiment of the invention, a portable electronic device can transmit live event multimedia data to a web/cloud computing storage service in real time, wherein the web/cloud computing storage service segmentizes incoming streams of the live event multimedia data into multiple media files during an ongoing transmission of the live event multimedia data. In one embodiment of the invention, the size of each segmented media file depends on a current network traffic condition and/or a bandwidth availability. By automatically segmentizing the streams of encoded multimedia data into individually-viewable segments for the web or cloud-computing storage service, a user can start viewing the currently-uploading multimedia data faster than a conventional single stream upload which requires a longer waiting time.

  • DYNAMICALLY ORGANIZING CLOUD COMPUTING RESOURCES TO FACILITATE DISCOVERY

    Pieces of hardware on which pieces of software are executed are configured to organize computing resources from different computing resource providers so as to facilitate their discovery. A catalog, which stores instances of cloud computing resources and their providers, and a knowledge base, which stores types of computing resources including rules which reveal their discovery, are formed by the software. A curating method is performed to enable semantic search including searching for cloud computing resources that in combination cooperate to satisfy a workload or a task in addition to having a simple computational function. Semantic indexing is performed to facilitate the semantic search.

  • SYSTEM AND METHOD FOR EXECUTING A CLOUD COMPUTING TASK

    According to one embodiment system and method provides executing at least a portion of a cloud computing task on a client terminal. The system and method further includes checking whether the client terminal is recharging or not and accessing a server for executing the cloud computing task if the terminal is recharging.

  • SYSTEM AND METHOD FOR A CLOUD COMPUTING ABSTRACTION LAYER WITH SECURITY ZONE FACILITIES

    In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload. This allows a developer to define a security zone and to apply at least one type of security policy with respect to the security zone including the type of security zone policy in the metamodel framework such that the type of security zone policy can be associated with the software workload upon development of the software workload, and if the type of security zone policy is associated with the software workload, automatically applying the security policy to the software workload when the software workload is deployed within the security zone.

  • PATTERN-BASED CONSTRUCTION AND EXTENSION OF ENTERPRISE APPLICATIONS IN A CLOUD COMPUTING ENVIRONMENT

    Methods, software programs and systems for extending and modifying software functionality, and, more particularly, for using one or more patterns for an enterprise software object to express desired functionality and configuration, and to generate the enterprise software object using the patterns, in an enterprise environment are disclosed. A method according to certain of these embodiments includes selecting one or more patterns from a number of patterns, where the one or more patterns are for an enterprise software object. The enterprise software object can then be generated. The enterprise software object is generated using the one or more patterns. Each of the patterns is configured to describe a solution within a corresponding one of a number of problem domains.

  • Secure cloud computing system

    The present invention provides a method and apparatus for securing electronic systems, including computers, information appliances and communication devices. The invention in question addresses the problem of preventing compromise by severe attacks directed at the protected systems. A severe attack could mean any of the following: low level debugging, use of in-circuit emulators or logic analyzers, removal of silicon dice and inspection including by lapping and micro-photography, and other well-known methods of attack such as distributed denial of service. In order to protect systems and data from such severe attacks, a mechanism is required whose operation is irreparably altered by the attempt to understand its operation through such attacks. Moreover, the mechanism must cease operation instantly upon detection of any intrusion associated with an attack, whether by software or by hardware based means.

  • DYNAMIC APPLICATION PROVISIONING IN CLOUD COMPUTING ENVIRONMENTS

    A method for dynamically provisioning a machine with applications to assist with work is a cloud computing environment is described. In one embodiment, such a method includes identifying a machine available for provisioning with at least one application. The method identifies work associated with a cloud computing environment. Responsive to identifying the work, the method determines how the machine can most optimally assist with the work. The method then dynamically provisions the machine with at least one application selected to enable the machine to most optimally assist with the work. A corresponding apparatus and computer program product are also disclosed.

  • METHOD AND SYSTEM FOR ALPHANUMERIC INDEXING FOR ADVERTISING VIA CLOUD COMPUTING

    A method and system for alphanumeric identifier indexing for advertising with cloud computing. Alphanumeric identifiers (e.g., telephone number, voice-over-Internet Protocol (VoIP) identifier, Internet Protocol (IP) identifier, a text message identifier, an instant message (IM) identifier, an e-mail address identifier, a social network identifier, a social networking hash code, etc.) are used to categorize and associate pre-determined advertising with the alphanumeric identifiers. When the alphanumeric identifier is received anywhere on a cloud computing network, the pre-determined advertising associated with the alphanumeric identifier is sent to a target device.

  • APPARATUS AND METHOD FOR PROVIDING A GAME SERVICE IN CLOUD COMPUTING ENVIRONMENT

    An apparatus and method for providing a game service in cloud computing environment. A method may be provided for providing a streaming game service using a plurality of cloud computing servers. The method may include receiving user inputs from at least one user equipments, executing and progressing at least one game program in response to the user inputs, capturing audio and video data as progress results of the executed at least one game program, and streaming the captured audio and video data to a respective user equipment.

  • SYSTEM AND METHOD OF BROKERING CLOUD COMPUTING RESOURCES

    System, method, and tangible computer-readable storage media are disclosed for providing a brokering service for compute resources. The method includes, at a brokering service, polling a group of separately administered compute environments to identify resource capabilities and information, each compute resource environment including the group of managed nodes for processing workload, receiving a request for compute resources at the brokering service system, the request for compute resources being associated with a service level agreement (SLA) and based on the resource capabilities across the group of compute resource environments, selecting compute resources in one or more of the group of compute resource environments. The brokering service system receives workload associated with the request and communicates the workload to the selected resources for processing. The brokering services system can aggregate resources for multiple cloud service providers and act as an advocate for or a guarantor of the SLA associated with the workload.

  • TECHNIQUES FOR PROVISIONING CLOUD COMPUTING ENVIRONMENT RESOURCES BASED ON SOCIAL MEDIA ANALYSIS

    A technique for provisioning computing environment resources based on social media analysis includes monitoring, using a data processing system, references (e.g., hyperlinks) provided by a first website to detect an anticipated flash crowd for a web-accessible resource (e.g., second website). The technique also includes generating, using the data processing system, a notice to allocate resources associated with the web-accessible resource to service the anticipated flash crowd.

  • SYSTEM AND METHOD FOR STARTING CLOUD COMPUTING SERVICE ACCORDING TO USER LOCATION

    A system and a method for starting a cloud computing service according to a user location are disclosed, the system comprises an authentication server, a central management server, a central database management server, a central storage server, a local management server, a local computing server, and a local storage server to determine a user access location, and to distribute cloud computing resources, thereby providing a simple, convenient and efficient cloud computing service.

  • SYSTEM AND METHOD FOR STARTING CLOUD COMPUTING SERVICE ACCORDING TO USER LOCATION

    A system and a method for starting a cloud computing service according to a user location are disclosed, the system comprises an authentication server, a central management server, a central database management server, a central storage server, a local management server, a local computing server, and a local storage server to determine a user access location, and to distribute cloud computing resources, thereby providing a simple, convenient and efficient cloud computing service.

  • HYPERVISOR CONTROLLED USER DEVICE THAT ENABLES AVAILABLE USER DEVICE RESOURCES TO BE USED FOR CLOUD COMPUTING

    A user device starts a host operating system provided on the user device, when the user device is powered on, and launches a hypervisor with the host operating system. The user device also launches a first guest operating system, provided on the user device, with the hypervisor of the user device, and controls, via the hypervisor, resource usage by the first guest operating system. The user device further provides an interface to display the first guest operating system to a user of the user device, and provides, via the hypervisor, available resource information, associated with the user device, to a management server.

  • METHOD AND SYSTEM FOR ELECTRONIC CONTENT STORAGE AND RETRIEVAL WITH GALOIS FIELDS ON CLOUD COMPUTING NETWORKS

    A method and system for electronic content storage and retrieval with Galois Fields on cloud computing networks. The electronic content is divided into plural portions and stored in plural cloud storage objects. Storage locations for the plural cloud storage objects are selected using a Galois field and the plural cloud storage objects are distributed across the cloud network. When the electronic content is requested, the plural portions are retrieved and transparently combined back into the original electronic content. No server network devices or target network devices can individually determine locations of all portions of the electronic content on the cloud communications network, thereby providing layers of security and privacy for the electronic content on the cloud communications network.

  • MOBILE DEVICE WORKLOAD MANAGEMENT FOR CLOUD COMPUTING USING SIP AND PRESENCE TO CONTROL WORKLOAD AND METHOD THEREOF

    A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to manage workload for cloud computing by transferring workload to at least one mobile device using Session Initiation Protocol (SIP).

  • CROSS-CLOUD COMPUTING FOR CAPACITY MANAGEMENT AND DISASTER RECOVERY

    A cloud migration system is described herein that provides capacity management and disaster recovery by detecting peak load conditions and automatically moving computing to another computing resource (and back) and by providing computing across two or more clouds and moving completely to one in the case of a disaster at one site. The system monitors loads within a datacenter and detects a threshold that indicates that the current load is nearing the datacenter's capacity. Upon detecting that the threshold will be reached, the system facilitates an orderly move of at least some datacenter load to another datacenter or cloud-based resources. The system can also be used as a disaster recovery architecture at a datacenter/network level to manage fast workload transition in case of disaster. Thus, the system allows enterprises to build smaller and more efficient datacenters that leverage other resources for rare extra loads.

  • CLOUD COMPUTING METHOD AND SYSTEM

    Methods and systems integrating sensitive or private data with cloud computing resources while mitigating security, privacy and confidentiality risks associated with cloud computing. In one embodiment, a computer network system includes a firewall separating a public portion of the computer network from an on-premises portion of the computer network, a database storing private data behind the firewall, and a user device connected with the computer network. The user device accesses an application hosted in the public portion of the computer network. In response, the application generates return information. The user device receives the return information and generates a request for private data based on at least a portion of the returned information. The request is transmitted to the database which generates a response including the requested private data. The response is transmitted in an encrypted form from the database via the computer network to the user device.

  • CENTRALLY MANAGING AND MONITORING OF CLOUD COMPUTING SERVICES

    An apparatus, system, method and program providing a multi-tenant software as a service (SaaS) application or cloud computing service that manages and monitors the use of other SaaS applications or cloud computing services via a common connection and database framework. An Internet-based interface is provided as a single portal for monitoring and managing the use of SaaS applications or cloud computing services. Objects and the state of these objects including all associated attributes related to the SaaS applications or cloud computing services are stored in databases associated with the Internet-based interface. The Internet-based interface also provides a social networking infrastructure and an application exchange infrastructure that allows sharing of information related to the SaaS applications or cloud computing services.

  • METHODS AND SYSTEMS FOR SELECTIVE ENCRYPTION AND SECURED EXTENT QUOTA MANAGEMENT FOR STORAGE SERVERS IN CLOUD COMPUTING

    Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk. The method further includes accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk.

  • METHOD FOR SECURELY CREATING A NEW USER IDENTITY WITHIN AN EXISTING CLOUD ACCOUNT IN A CLOUD COMPUTING SYSTEM

    The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and resources, said cloud account comprising cloud user identities, said method comprising enabling a first user to access the cloud services and resources using a first security device, wherein it comprises authenticating to the first security device, creating a new user identity within the cloud account for a second user using the first security device.

  • TASK ASSIGNMENT IN CLOUD COMPUTING ENVIRONMENT

    Technologies are generally described for a system and method for assigning a task in a cloud. In some examples, the method may include receiving a task request relating to a task and determining service related data relating to the task based on the task request. In some examples, the method may include receiving resource data relating to a first and second resource in the cloud. In some examples, the method may include determining a first correlation value between the task and the first resource and a second correlation value between the task and the second resource based on the service related data and the resource data. In some examples, the method may include assigning the task to the first resource based on the first and second correlation value.

  • METHOD AND SYSTEM FOR ELECTRONIC CONTENT STORAGE AND RETRIEVAL WITH GALOIS FIELDS ON CLOUD COMPUTING NETWORKS

    A method and system for electronic content storage and retrieval with Galois Fields on cloud computing networks. The electronic content is divided into plural portions and stored in plural cloud storage objects. Storage locations for the plural cloud storage objects are selected using a Galois field and the plural cloud storage objects are distributed across the cloud network. When the electronic content is requested, the plural portions are retrieved and transparently combined back into the original electronic content. No server network devices or target network devices can individually determine locations of all portions of the electronic content on the cloud communications network, thereby providing layers of security and privacy for the electronic content on the cloud communications network.

  • SYSTEM AND METHOD FOR CLOUD COMPUTING

    A system and method for creating, deploying, selecting and associating cloud computing services from many cloud vendors to effectuate a large-scale information technology data processing center implemented in a software only form. Services may be employed from any number of different service providers and user define policies provides for switching to or aggregating different service providers when necessary. Configurations can be created that allow for service provider selection based on user-selectable parameters such as cost, availability, performance and service level agreement terms. The system employs measurement, aggregation, reporting and decision support of system usage and costing, performance, Service level, feature set, to automate the construction, operation and ongoing management of software based cloud. Drag and drop, non list based UI for the construction and modification of clouds implemented and modeled in software.

  • MANAGING SERVICABILITY OF CLOUD COMPUTING RESOURCES

    The management of serviceability in a cloud of computing resources. The computing resources available in the cloud are represented for access control purposes as a hierarchy of nodes. Upon receiving a request to perform an action on a computing resource, the associated hierarchical node that controls the action with respect to the requestor is identified. Then, the associated access privilege of that hierarchical node is identified. In some embodiments, if it is determined that the requestor has rights to perform the action on the computing resource, the action is facilitated.

  • Cloud computing method capable of hiding real file paths

    The present invention is to provide a cloud computing method capable of hiding real file paths, which includes the steps of: triggering a web browsing button of an application program and sending a browsing activation signal to a management server by a terminal device; reading a directory list of at least one file from a file server and sending a file browsing program and the directory list to the terminal device by the management server; displaying the directory list via the file browsing program and sending a file processing signal to the management server by the terminal device; downloading from the file server a file specified by the file processing signal and sending the specified file to the terminal device by the management server; and sending the specified file to a third-party application server via the application program and terminating the file browsing program by the terminal device.

  • FORECASTING BASED SERVICE ASSIGNMENT IN CLOUD COMPUTING

    A mechanism is provided for reassigning virtual machines to resources in a computing environment. Monitoring data is collected about virtual machine request history and resource usage in a form of time series for measured indicators. Forecasted time series are computed for the measured indicators over a time window by utilizing time series forecasting. A new assignment is computed by executing a snapshot based assignment algorithm on the forecasted time series. The new assignment is used for reassignment of virtual machines on the resources in the computing environment.

  • MOBILE DEVICE WORKLOAD MANAGEMENT FOR CLOUD COMPUTING USING SIP AND PRESENCE TO CONTROL WORKLOAD AND METHOD THEREOF

    A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to manage workload for cloud computing by transferring workload to at least one mobile device using Session Initiation Protocol (SIP).

  • METHOD AND SYSTEM FOR ANTIVIRUS BY SIM CARD COMBINED WITH CLOUD COMPUTING

    The invention provides a method and a system of antivirus solution by using a SIM card combined with cloud antivirus. The method comprises that the signature data of a file of a present mobile device is sent to a cloud server; the cloud server receives the file the signature data and checks the received file the signature data by using a cloud virus database stored at the cloud server; and the cloud server sends the checking result back to the SIM card of the mobile device via OTA (Over-the-Air). The invention has the advantage of using the SIM card as the media of antivirus and communication so as to be convenient for the cooperation between a telecommunication service provider and an antivirus software vendor.

  • Pluggable Allocation in a Cloud Computing System

    In one embodiment, a cloud computing system provides user extensibility by providing a plugin interface for major systems. Plugin interfaces for a compute service, object service, network service, authentication and authorization service, message service, and image service are disclosed. One or more of the plugin interfaces can be used to alter the allocation of virtual to physical resources across multiple services. Compound services and smart allocation facilities are possible with user-directed modification.

  • Authentication and authorization methods for cloud computing security platform

    An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.

  • WEB BROWSING ENHANCED BY CLOUD COMPUTING

    Methods and devices include a server and at least two web browsers operable on at least two different computing devices. Each browser reports results of processing and rendering of webpages to the server. The server aggregates the data. The server generates metadata from the aggregated browsers. The server transmits the generated metadata to at least one computing device. The computing device renders a webpage using at least a portion of the provided metadata. The metadata may identify portions of JavaScript that can be processed in parallel. The metadata may identify a library portion that does not have to be loaded. The metadata may identify a portion of the webpage that may be rendered first before a second portion of the webpage. Returning metadata to the computing device can assist the computing device in parsing, analyzing or executing the request for the webpage.

  • Exchange System Supporting Cloud Computing

    A cloud exchange system processes transactions for cloud computing services. Cloud resources may be viewed as commodities, in which cloud customers may be dependent on cloud providers to provide hosted centralized computer facilities. The cloud customer may move computing services in the form of one or more virtual machines by buying a contract that specifies the cloud services and is purchased through the cloud exchange system. The cloud exchange system may receive a request from the cloud customer and an offer from a cloud provider for a cloud service and may match the request and the offer to obtain matched attributes. One of the available contracts may be selected by the cloud exchange system based on the matched attributes of the request and the offer, where the selected contract specifies the cloud service. A transaction charge for the transaction may be determined from at least one of the matched attributes.

  • Method and system for terminal access and management in cloud computing

    The disclosure discloses a method for terminal access and management in cloud computing, including: a terminal with a management and control module accesses a bidirectional data transmission network and acts as a node; the node searches for a first responding control node or agent control node and connects with a network management server via an agent control node connected to the found control node or via the found agent control node; a management and control module of a node at each level collects running information of the terminal and reports the running information level by level, and a nearest super-ordinate node performs a management operation. The disclosure further discloses a system for terminal access and management in cloud computing. With the method and the system, the problems that the system status has to be pre-estimated and a proper node has to be selected when new equipment access an original system can be solved, and after the access, a super-ordinate node can perform actively a control operation on the topological structure.

  • APPLYING SETTINGS IN A CLOUD COMPUTING ENVIRONMENT BASED ON GEOGRAPHICAL REGION

    A method, data processing system, and computer program product for applying a setting. A request for a set of resources is received. The request is to use the set of resources over a network connection. An address associated with a device from the request is identified. A geographic location of the device is identified based on the address. A set of settings for the set of resources is identified based on the geographic location of the device. The set of settings is applied to the set of resources.

  • NETWORK CONNECTIVITY WIZARD TO SUPPORT AUTOMATED CREATION OF CUSTOMIZED CONFIGURATIONS FOR VIRTUAL PRIVATE CLOUD COMPUTING NETWORKS

    A method of implementing a cloud computing network includes defining, for a cloud computing network including tangible network storage elements and tangible network computing elements, a library of network connectivity building blocks for designing a virtual private cloud computing network within the cloud computing network. Each building block has user-definable attributes and each building block is translatable into a set of network element configuration statements that instantiate an action particular to the building block. Usage rules specifying how the building blocks can be used are defined for the cloud computing network. Dynamically-selected building blocks from the library are accepted and assembled into a configuration template. The configuration template is validated against the usage rules. The virtual private cloud computing network is implemented in accordance with the validated configuration template.

  • METHOD AND SYSTEM FOR PRESENTING A MEETING IN A CLOUD COMPUTING ENVIRONMENT

    A method for presenting a meeting in a cloud computing environment is disclosed. The method embodiment includes providing by a server a virtual planning space in a cloud computing environment, wherein the virtual planning space is associated with a meeting and is associated with planning content comprising data objects loaded by a plurality of meeting collaborators. The method also includes receiving by the server an indication to launch the meeting, and in response, generating a virtual meeting room associated with the meeting and an identifier for the virtual meeting room. Thereafter, the server is configured to transmit a message to a plurality of meeting participants that includes an invitation to attend the meeting and the identifier for the virtual meeting room, and to present meeting content comprising at least one data object of the planning content to the meeting participants via the virtual meeting room.

  • METHOD AND SYSTEM FOR PLANNING A MEETING IN A CLOUD COMPUTING ENVIRONMENT

    A method for planning a meeting in a cloud computing environment is disclosed. The method embodiment includes receiving by a server a meeting configuration file including information identifying a meeting, a plurality of meeting collaborators, and/or a plurality of meeting participants. When the meeting configuration file is received, the server is configured to generate a virtual planning space associated with the meeting and located in a cloud computing environment, to transmit a message to the plurality of meeting collaborators that includes an invitation to collaborate in the meeting via the virtual planning space, and to receive an indication to load planning content that includes at least one data object. In response to receiving the indication, the server associates the planning content with the virtual planning space so that the planning content is accessible by the meeting collaborators via the virtual planning space in the cloud computing environment.

  • USER-DRIVEN MENU GENERATION SYSTEM WITH DYNAMIC GENERATION OF TARGET FILES WITH PLACEHOLDERS FOR PERSISTENT CHANGE OR TEMPORARY SECURITY CHANGE OVER CLOUD COMPUTING VIRTUAL STORAGE FROM TEMPLATE FILES

    Dynamic generation of target files is described. A user can select a template file. The template file includes: at least first and second changeable fields configured to be changed persistently, and a third changeable field. The second changeable field is configured to receive a security-related value. A third changeable field includes a first value configured to be changed temporarily to receive an encrypted version of the first value. The template file is parsed to generate a user interface, including: a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data. An encrypted version of the first value corresponding to the third changeable field is generated. The first value is temporarily replaced with the encrypted value. The target file is then generated.

  • Authentication and authorization methods for cloud computing security platform

    An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.

  • MONITORING RESOURCES IN A CLOUD-COMPUTING ENVIRONMENT

    Provided are a computer program product, system, and method for monitoring resources in a cloud computing environment. A set of cloud resources is provisioned to a user of the cloud-computing environment. A set of private resources is provided for the user, each private resource being provisioned within the set of cloud resources of the user. Monitoring templates are exposed, each one for a corresponding type of a private resource to the user. A user subscription is received to at least one of the monitoring templates, wherein each of the subscribed monitoring templates is for one of the user private resources. A private monitoring agent is provided within the cloud resources of the user housing the private resource of the user to monitor the private resource according to the corresponding selected monitoring template.

  • OPTIMIZING PROVISIONING WORKFLOWS IN CLOUD COMPUTING

    A method for optimizing provisioning workflows in cloud computing is provided. The method comprises determining a time coefficient for each resource type or aggregated resource types which define the installation time of a current workflow; accessing the current workflow and creating a tree topology based on the current workflow which defines serialized and parallelized provisioning steps; dividing the tree topology into independent sub-paths; determining a timing condition for an execution time of an optimized workflow; creating an optimized workflow template maintaining the timing condition by: selecting cheapest installation methods and cheapest resources; and reducing the parallelization of the tree topology; creating the optimized workflow by merging the optimized workflow template with data and the resource types of the current workflow.

  • OPTIMIZING VIRTUAL MACHINES PLACEMENT IN CLOUD COMPUTING ENVIRONMENTS

    Placement of instances of virtual machine (VM) images in a cloud computing environment is optimized. A request is received to deploy a new VM image instance. User-specific and generic VM resource usage profiles are read that include resource consumption data. Resource pool profiles for multiple resource pools are read that include resource consumption data for the resource pools. For each of the resource pool profiles, a selected VM resource usage profile is analyzed and aligned with the resource pool profiles. An aggregated resource consumption profile is calculated. A determination is made of one of multiple resource pools with the least aggregated resource consumption.

  • CLOUD COMPUTING INTEGRATION FOR SENSOR NETWORKS

    A sensor network may be coupled to a cloud computing system for improved reliability, flexibility, and functionality. The sensor network may communicate with the cloud computing system through a coordinator gateway device through a wireless network. Data recording and data processing is offloaded from the individual sensors to the cloud computing system, which has significantly better reliability and processing capability and is not restricted by battery life. The recorded and processed data residing on the cloud computing system may be viewed, manipulated and modified through a client device displaying an application, web page, and/or application program interface (API).

  • METHOD AND APPARATUS FOR IMPROVING VOICE OR VIDEO TRANSMISSION QUALITY IN CLOUD COMPUTING MODE

    A method for improving voice or video transmission quality in the cloud computing mode includes performing, by a cloud client, media negotiation with a communication peer end according to obtained media negotiation information of a corresponding local client; and establishing, according to a result of the media negotiation, a media channel between the local client and the communication peer end to perform voice or video transmission. An embodiment of the present invention further provides a corresponding cloud client and a corresponding local client. According to the method disclosed in the embodiments of the present invention, two client ends work collaboratively and a media channel is established on the local client, thereby ensuring voice or video transmission quality in the cloud computing mode.

  • SYSTEMS AND METHODS FOR MANAGING CLOUD COMPUTING RESOURCES

    Systems and methods for managing cloud computing resources are provided. A plurality of available cloud computing servers may be identified by a cloud computing resource manager ("CCRM"). The CCRM may include one or more computers. The initiation of one or more processes on one or more servers included in the plurality of cloud computing servers may be directed by the CCRM. Operational data associated with the operation of the one or more processes and network data associated with network timing delays between the one or more servers and one or more client devices in communication with the one or more servers may be obtained by the CCRM. Based at least in part upon the operational data and the network data, the distribution of resources among the plurality of cloud computing servers may be managed by the CCRM.

  • USING CLOUD COMPUTING FOR GENERATING PERSONALIZED DYNAMIC AND BROADCAST QUALITY VIDEOS

    Embodiments of the present invention relate to a method of obtaining parameters of a digital video to be provided to users of a network. The method includes modifying one or more of the obtained parameters, such that the modification is based on information relating to segments of the users of the network. In addition, the method includes creating a plurality of versions of the digital video. Each one of the plurality of versions comprises a broadcast quality digital video adapted to appeal to at least one of the segments of the users of the network. Further, the method includes monitoring the computing cloud to obtain an assessment of rendering resources available to the computing cloud in rendering the plurality of digital videos, and coordinating allocations of the rendering resources in rendering the plurality of digital videos based on the real time assessment.

  • FLOW-OPTIMIZATION SYSTEM AND METHOD FOR CLOUD COMPUTING

    A cloud computing interface includes a high-level compiler uses a modified flow language referred-to as "Resilient Optimizing Flow Language" (ROFL) that converts inputs relating to source program and data definitions to generate bytecode objects that can be used by an execution engine to allocate input data to "processes" created by the execution engine based on available resources, so as to evaluate or perform particular tasks on the input data.

  • USING MPLS FOR VIRTUAL PRIVATE CLOUD NETWORK ISOLATION IN OPENFLOW-ENABLED CLOUD COMPUTING

    Embodiments of the invention include a method performed by a cloud network manager flow entries in a cloud network. The CNM is coupled to virtualized servers for hosting virtual machines ("VM") that each comprise a virtual switch coupled to a top of rack switch ("TORS"). The CNM receives notification messages that indicate virtual machines have been scheduled for activation on virtualized servers. The CNM determines a VM media access control ("MAC") address associated with the VM and a virtual switch MAC address associated with that virtualized server's virtual switch. The CNM records an association between the VM MAC address and the virtual switch MAC address. The CNM further determines a label that associates the TORS with the virtual switch. The CNM sends a modifies flow entries in the virtual switch to indicate data packets matching the MPLS label and the VM MAC address should be forwarded to the VM.

  • EDGE-BASED RESOURCE SPIN-UP FOR CLOUD COMPUTING

    Aspects of the present invention include distributing new resources closer to end-users which are making increased demands by spinning-up additional virtualized instances (as part of a cloud provisioning) within servers that are physically near to the network equipment (i.e., web servers, switches, routers, load balancers) that are receiving the requests.

  • EDGE-BASED RESOURCE SPIN-UP FOR CLOUD COMPUTING

    Aspects of the present invention include distributing new resources closer to end-users which are making increased demands by spinning-up additional virtualized instances (as part of a cloud provisioning) within servers that are physically near to the network equipment (i.e., web servers, switches, routers, load balancers) that are receiving the requests.

  • CLOUD COMPUTING ACCESS GATEWAY AND METHOD FOR PROVIDING A USER TERMINAL ACCESS TO A CLOUD PROVIDER

    A cloud computing access gateway includes a cloud management module configured to store a cloud provider and information of a cloud computing service provided by the cloud provider. A user terminal interface module is configured to provide an interface with a user terminal, receive a service request indicating a cloud computing service from the user terminal, and send a result of the cloud computing service to the user terminal. A request analysis module is configured to analyze the received service request to identify the cloud computing service. A cloud selection module is configured to select a best cloud provider based on the cloud computing service. A cloud interface module is configured to provide an interface with the cloud provider, transmit the service request to the best cloud provider, and receive the result of the cloud computing service from the best cloud provider.

  • WELDING SYSTEM AND METHOD UTILIZING CLOUD COMPUTING AND DATA STORAGE

    A welding system or an enterprise using welding systems can communicate with cloud-based resources for the provision of services and products to facilitate the welding operations. The communications may be via wired or wireless media, and may be direct, or through other components, such as enterprise networks, peripheral devices, and so forth. The cloud-based resources may provide for storage of data, particularly welding data, processing of data, welding protocols, specifications and processes, financial transactions for the purchase, licensing or use of welding-related products and services, welding training, and so forth.

  • Authentication routing system and method for cloud computing service and authentication router

    The disclosure discloses an authentication routing system and method for a cloud computing service and an authentication router. The method comprises the following steps: an authentication router registers a cloud computing service and saves the registration information of a cloud computing service registered successfully (401), wherein the registration information includes but is not limited to: an index number of a cloud computing service, an authentication mechanism chosen by the cloud computing service, an address of an authentication server address providing the authentication mechanism and a routing strategy of the authentication server; when a user terminal requests a cloud computing service, the authentication router receives an authentication request for the user terminal from the requested cloud computing service (402); and the authentication router routes the authentication request for the user terminal to a corresponding authentication server for authentication according to the saved registration information corresponding to the cloud computing service (403). Through the disclosure, a cloud computing service can provide a consistent user authentication experience and a relatively high authentication security level and effectively ensures the privacy security of the user when being used by the user.

  • UNIFIED CLOUD COMPUTING NETWORK INTERFACE

    A cloud computing network device is disclosed. The device is configured to receive a request from a joining device for access to the cloud computing network, and in response to the request, authenticate the joining device according to an authentication protocol. The device is also configured to receive from the joining device an indication of one or more items local to the joining device to be made available to other devices on the cloud computing network, and in response to the indication, provide information identifying items to the other devices on the cloud computing network.

  • PRIORITIZING JOBS WITHIN A CLOUD COMPUTING ENVIRONMENT

    Embodiments of the present invention provide an approach to prioritize jobs (e.g., within a cloud computing environment) so as to maximize positive financial impacts (or to minimize negative financial impacts) for cloud service providers, while not exceeding processing capacity or failing to meet terms of applicable Service Level Agreements (SLAs). Specifically, under the present invention a respective income (i.e., a cost to the customer), a processing need, and set of SLA terms (e.g., predetermined priorities, time constraints, etc.) will be determined for each of a plurality of jobs to be performed. The jobs will then be prioritized in a way that: maximizes cumulative/collective income; stays within the total processing capacity of the cloud computing environment; and meets the SLA terms.

  • Systems and Methods for Software Evaluation in a Cloud Computing Environment

    System and methods for software evaluation in a cloud computing environment are disclosed. In some implementations, a method includes: at a computer system, maintaining session information for a plurality of remote user sessions between one or more users and the computer system and formatting for display a plurality of graphical representations corresponding to the plurality of remote user sessions. A respective graphical representation in the plurality of graphical representations indicates a current or historical state of a corresponding remote user session, in the plurality of remote user sessions. The method further includes obtaining a user selection of a graphical representation in the plurality of graphical representations. In response to user selection of the graphical representation, a session is established between a client device associated with the user and the computer system and the session is initiated in the state as indicated in the graphical representation.

  • CLOUD COMPUTING DEVICE AND DISTRIBUTED DATA MANAGEMENT METHOD

    A distributed data management method implemented by a cloud computing device, the cloud computing device is in communication with a plurality of client devices through a network. Basic information of various data of the client devices are received and stored by the cloud computing device through the network. Whether a first client device is authorized to access a target data is verified, when the first client device requests access to the target data through the cloud computing device. The target data is acquired from a second client device according to the basic information of the target data, and the acquired data is transmitted to the first client device through the network, upon the condition that the first client device is authorized to access the target data.

  • MULTIPLE MEDIA DEVICES THROUGH A GATEWAY SERVER OR SERVICES TO ACCESS CLOUD COMPUTING SERVICE STORAGE

    A system, method, and computer program product are provided for enabling client devices to transparently access cloud computing services, service storage, and related data via a gateway server that connects to an external network such as the internet or a social network. Data requests are transmitted from at least one client device to the gateway server. The gateway server determines if the data request cannot be satisfied by data stored in its memory, and responsively transmits a second data request to the external network and stores data received in response to the second data request in its memory. The gateway server then satisfies the data request using the stored data, which may include a web computing service, an application program interface, streaming data, metadata, and/or media data.

  • MULTIPLE MEDIA DEVICES THROUGH A GATEWAY SERVER OR SERVICES TO ACCESS CLOUD COMPUTING SERVICE STORAGE

    A system, method, and computer program product are provided for enabling client devices to transparently access cloud computing services, service storage, and related data via a gateway server that connects to an external network such as the internet or a social network. Data requests are transmitted from at least one client device to the gateway server. The gateway server determines if the data request cannot be satisfied by data stored in its memory, and responsively transmits a second data request to the external network and stores data received in response to the second data request in its memory. The gateway server then satisfies the data request using the stored data, which may include a web computing service, an application program interface, streaming data, metadata, and/or media data.

  • Systems and Methods for Project Collaboration in a Cloud Computing Environment

    A method for project collaboration includes: at a computer system, hosting a collaboration software application and a plurality of data sets associated with the collaboration software application; establishing a first remote user session between the computer system and a first client device running on a first operating system; wherein the first client device is associated with a first user; establishing a second remote user session between the computer system and a second client device running on a second operation system, distinct from the first operating system; wherein the second client device is associated with a second user distinct from the first user; merging the first remote user session and the second remote user session into a single remote user session; and enabling, using the single remote user session, the first user and the second user to concurrently control the collaboration software application and the plurality of data sets.

  • METHOD AND APPARATUS FOR PROVIDING RECOMMENDATIONS TO A USER OF A CLOUD COMPUTING SERVICE

    A method and apparatus is disclosed for transferring digital content from a computing cloud to a computing device and generating recommendations for the user of the computing device.

  • DYNAMICALLY OPTIMIZED DISTRIBUITED CLOUD COMPUTING-BASED BUSINESS PROCESS MANAGEMENT (BPM) SYSTEM

    A workflow server can receive requests, each for a business process workflow conforming to a business process model. Each business process workflow can include a set of interdependent tasks. The workflow server can satisfy received requests by assigning tasks to different service providers that provide software services. Each of the tasks can be assigned to corresponding ones of the software services. For each task, the workflow server can also defines an allocated cost per software service, and a time allocation per software service for completing the corresponding one of the tasks. Different service providers, including those assigned to tasks, can receive information for ones of the tasks not directly assigned to them by the workflow server. The different service providers can then bid on these tasks. Wherein when bids are won, tasks for a business process flow can be reassigned based on winning bids.

  • Tagging Physical Resources in a Cloud Computing Environment

    A cloud system may create physical resource tags to store relationships between cloud computing offerings, such as computing service offerings, storage offerings, and network offerings, and the specific physical resources in the cloud computing environment. Cloud computing offerings may be presented to cloud customers, the offerings corresponding to various combinations of computing services, storage, networking, and other hardware or software resources. After a customer selects one or more cloud computing offerings, a cloud resource manager or other component within the cloud infrastructure may retrieve a set of tags and determine a set of physical hardware resources associated with the selected offerings. The physical hardware resources associated with the selected offerings may be subsequently used to provision and create the new virtual machine and its operating environment.

  • LOCALITY-AWARE RESOURCE ALLOCATION FOR CLOUD COMPUTING

    Computing resource allocation for map-reduce job execution comprises determining the volume of input data to the map-phase and the reduce-phase of a map-reduce job prior to execution. Based on said determination, data blocks and virtual machines (VMs) are selectively placed for locality aware map-reduce job execution on a cluster of computing nodes in a network. Selectively placing data blocks and VMs comprises integrally placing the data and the VMs at selected nodes to lower data transfer network hops for a map-phase and a shuffle-phase of the map-reduce job upon execution by the VMs.

  • SYSTEM AND METHOD FOR UPGRADING KERNELS IN CLOUD COMPUTING ENVIRONMENTS

    The system and method described herein may upgrade kernels in cloud images deployed in cloud computing environments without having to rebuild a machine image that contains a root file system for the cloud image. For example, the cloud image may include a ramdisk that compares the kernel booted in the cloud image to the root file system to verify whether the machine image contains a directory hierarchy matching an operating system release for the kernel. In response to the machine image containing the matching directory hierarchy, the root file system may be mounted for execution in the cloud computing environment. Alternatively, in response to the machine image lacking the matching directory hierarchy, the ramdisk may dynamically create the matching directory hierarchy and inject modules that support the kernel into the root file system prior to mounting and delivering control to the root file system.

  • RECONFIGURABLE CLOUD COMPUTING

    A method, system, and computer-readable storage medium for using a distributed computing system are disclosed. For example, one method involves receiving one or more parameters. The one or more parameters indicate one or more operations. The method also involves selecting one or more computing resources from computing resources. This selecting is based on the parameter(s). An application is configured to be executed using the computing resource(s). The method also involves generating a workflow. The workflow indicates that the application is to be executed using the computing resource(s). The workflow indicates that the application performs the operation(s). The method also involves communicating at least a part of the workflow to one or more nodes, where the node(s) include the computing resource(s).

  • RECONFIGURABLE CLOUD COMPUTING

    A method, system, and computer-readable storage medium for using a distributed computing system are disclosed. For example, one method involves receiving one or more parameters. The one or more parameters indicate one or more operations. The method also involves selecting one or more computing resources from computing resources. This selecting is based on the parameter(s). An application is configured to be executed using the computing resource(s). The method also involves generating a workflow. The workflow indicates that the application is to be executed using the computing resource(s). The workflow indicates that the application performs the operation(s). The method also involves communicating at least a part of the workflow to one or more nodes, where the node(s) include the computing resource(s).

  • Data Handling in a Cloud Computing Environment

    The present invention relates to a method for data handling in a computing environment. A data access request is generated to access data by a requesting VM. VMs of an ordered list are sequentially checked for data cache hit corresponding to the data in an order given by a ranking. The data is read from the checked VM in response to at least one data cache hit of a checked VM being found, and thereafter a ranking value of the checked VM is updated, thereby updating ranking based on the ranking value. The data is requested from the at least one storage server in response to no data cache hot being found.

  • SECURING SENSITIVE DATA FOR CLOUD COMPUTING

    A method and associated system for securing sensitive data in a cloud computing environment. A system has proprietary data as a record stored in a database. The system associates a hashing directive with the record prior to sending the data out to a cloud for computing services. The hashing directive classifies each data field of the record into sensitive and transactional. The hashing directive controls a mode of hashing, either one-way hashing or two-way hashing for each sensitive data field associated with the hashing directive. A cloud receives the record secured according to the hashing directive and process the record to generate a result value for a cloud process result field of the record. The system reconstitutes the record the record according to the mode of hashing indicated in the hashing directive.

  • SECURING SENSITIVE DATA FOR CLOUD COMPUTING

    A method and associated system for securing sensitive data in a cloud computing environment. A system has proprietary data as a record stored in a database. The system associates a hashing directive with the record prior to sending the data out to a cloud for computing services. The hashing directive classifies each data field of the record into sensitive and transactional. The hashing directive controls a mode of hashing, either one-way hashing or two-way hashing for each sensitive data field associated with the hashing directive. A cloud receives the record secured according to the hashing directive and process the record to generate a result value for a cloud process result field of the record. The system reconstitutes the record the record according to the mode of hashing indicated in the hashing directive.

  • CLOUD COMPUTING DATA CENTER MACHINE MONITOR AND CONTROL

    Systems, methods and computer-readable media provide for identifying a physical machine corresponding to a virtual machine. A system assigns a data center machine identifier to a physical computing device in a data center, along with a physical location for the physical computing system. In response to creating a virtual machine on the physical computing device, the system creates a mapping from a virtual machine identifier for the virtual machine to the data center machine identifier for the physical computing system.

  • EDGE-BASED RESOURCE SPIN-UP FOR CLOUD COMPUTING

    Aspects of the present invention include distributing new resources closer to end-users which are making increased demands by spinning-up additional virtualized instances (as part of a cloud provisioning) within servers that are physically near to the network equipment (i.e., web servers, switches, routers, load balancers) that are receiving the requests.

  • CLOUD COMPUTING SYSTEM, VEHICLE CLOUD PROCESSING DEVICE AND METHODS FOR USE THEREWITH

    A cloud computing system includes a network interface for interfacing with a wide area network. At least one wireless transceiver engages in bidirectional communication with a plurality of vehicle cloud processing devices within a corresponding plurality of vehicles in at least one vehicle aggregation location. A network control device receives requests for at least one cloud computing service via the wide area network and facilitates the at least one cloud computing service via the bidirectional communication with the plurality of vehicle cloud processing devices.

  • METHOD FOR SECURE SINGLE-PACKET AUTHORIZATION WITHIN CLOUD COMPUTING NETWORKS

    A method for secure single-packet authorization and secure transparent access to software services residing on cloud-based servers other than the host system where the SPA server itself is running. A single packet authorization (SPA) server running on a host system passively monitors a network for a valid SPA packet while maintaining a default deny stance on a gateway packet filter. The SPA server stores the MD5 sum of every valid SPA packet that it monitors and flags any duplicate access attempts. This way, if any SPA packet has the same MD5 hash as a previously monitored packet the SPA server treats the packet as malicious. After a valid SPA packet is sent, the SPA host server provides a Network Address Translation (NAT) which essentially creates an "SPA gateway" within a Cloud network independent of any other border gateway devices that already exist within the Cloud. The client system may then request access via the SPA gateway to services that are on other Cloud systems besides the one where the SPA server is running.

  • CARTRIDGES IN A MULTI-TENANT PLATFORM-AS-A-SERVICE (PaaS) SYSTEM IMPLEMENTED IN A CLOUD COMPUTING ENVIRONMENT

    A mechanism for providing cartridges in a multi-tenant PaaS system implemented in a cloud computing environment is disclosed. A method of embodiments includes maintaining, by a virtual machine (VM) executing on a computing device, a cartridge library comprising cartridge packages that provide functionality for multi-tenant applications executed by the VM, receiving a request to configure a cartridge on the VM, wherein the cartridge to provide functionality for a multi-tenant application executed by the VM, establishing a container to provide process space for the functionality of the cartridge, calling a configure hook for a type of the cartridge, and in response to calling the configure hook, embedding an instance of the cartridge in the container, the instance of the cartridge obtained from a cartridge package of the cartridge library.

  • SECURITY ACCESS PROTECTION FOR USER DATA STORED IN A CLOUD COMPUTING FACILITY

    In embodiments of the present invention improved capabilities are described for a method and system including storing a plurality of proxy access credentials for a user to securely access each of a plurality of cloud computing facilities; receiving a request from a client device for access to one of the plurality of cloud computing facilities; securing a communication link to the client device, thereby providing a secure link; receiving access credentials from the user through the secure link; verifying an identity of the user with the access credentials; assessing a security state of the client device to determine if the client is in compliance with a security policy; and if the client is in compliance with the security policy, coupling the client to one of the plurality of cloud computing facilities through a second secure link using a corresponding one of the plurality of proxy access credentials for the user

  • METHOD AND APPARATUS FOR MANAGING CONNECTION PATH FAILURE BETWEEN DATA CENTERS FOR CLOUD COMPUTING

    A first cloud computing data center and a second cloud computing data center are connected through a provider backbone bridge network (PBBN), and a plurality of working connection paths and protection connection paths are formed between end points between the first cloud computing data center and the second cloud computing data center and between end points within a cloud computing data center through the PBBN. When a failure occurs in the working connection path, the working connection path is switched to a corresponding protection connection path.

  • METHOD AND SYSTEM FOR CREATING ELECTRONIC BUSINESS REFERRALS WITH CLOUD COMPUTING FROM SOCIAL MEDIA SITES

    A method and system for creating electronic business referrals with cloud computing from social media sites. Plural unique referral identifier tracking codes are generated for a same target network device from a same social media site (e.g. FACEBOOK, TWITTER, etc.) or for the same target network device from plural different social media sites. The plural unique referral tracking codes are processed by a cloud referral application on a cloud communications network. The plural unique referral codes include appointment requests or referrals of new patients or customers for professional services or reservations or coupons or electronic purchase requests for goods or services. A thank you and referral bonus is automatically generated from the cloud referral application for the target network devices that send the plural unique referral identifier tracking codes. The plural unique referral codes include analytic data that is used by vendors providing professional services or goods or services.

  • CONCEALING ACCESS PATTERNS TO ELECTRONIC DATA STORAGE FOR PRIVACY

    Methods and systems of concealing access patterns to data storage, such as within servers of a cloud computing environment are presented. Server data storage is securely partitioned into smaller electronic data storage partitions of predetermined size. The client side maintains a shuffling buffer and position map for these blocks as stored on the electronic data storage partitions of the server. Concealment is performed with respect to accesses from the client to server using an oblivious sorting protocol. Access operation is concealed with each block being randomly assigned to any of the data storage partitions, and whenever a block is accessed, the block is logically removed from its current partition and logically assigned to a fresh random partition selected from all partitions, while the client maintains tracking of which partition each block is associated with at any point of time.