Patent application number | Description | Published |
20090144420 | Efficient monitoring of heterogeneous applications - A heterogeneous environment having applications and application enablers operating on application servers organized as a cluster is managed. The application servers are managed by a cluster management application. A system management application permits access to computing performance data provided by an operating system and reported to the system management application. Performance data of the applications and application enablers is collected from an application agent through the application servers. Topology information regarding the application servers is collected via the cluster management application. The performance data and the topology information are retrieved and sent to the system management application. Access to the performance data via the system management application is permitted. The system management application links to the computing performance data using the topology information. | 06-04-2009 |
20100017512 | Method and System For Improvements In or Relating to Off-Line Virtual Environments - The compliance of a virtual machine image to a set of requirements is determined during a process to potentially introduce the virtual machine image into a network. One or more virtual machine images are identified. During compliance testing, the identified virtual machine image is controlled such that it cannot connect to the network. One or more tests are carried out to determine if the virtual machine image is compliant with one or more predetermined requirements. If a virtual machine is compliant with said one or more predetermined requirements, the virtual machine image is connected to the network. | 01-21-2010 |
20110093957 | METHOD AND SYSTEM FOR ADMINISTERING A SECURE DATA REPOSITORY - A method, system and computer program product for administering a secure data repository. Rather than using a specific database, an application may use an existing hierarchical file structure, such as provided by conventional operating systems, to store structured data in a number of files. To detect unauthorized, malicious or inadvertent changes to these files, either within one or more files, or by deletion, replacement or movement of files in their entirety, each file incorporates a last change timestamp and the contents of the file are digitally signed. Furthermore, every file in the secure repository is logged in an index file together with its respective change date stamp, and the index file as a whole is also digitally signed. Unauthorized changes can be identified by comparison of the file date stamps with the content of the index as well as verifying the validity of each digital signature. | 04-21-2011 |
20110113402 | REPRESENTING NON-FUNCTIONAL REQUIREMENTS (NFRS) IN UNIFIED MODELING LANGUAGE (UML) - Modeling non-functional requirements (NFRs) in a computer programming environment. In one aspect, this further comprises: identifying use case (UC) artifacts having one or more NFRs; retrieving the one or more NFRs and any data associated therewith; analysing the associated data to define a test case therefor; retrieving a UC realisation from a model to determine one or more possible program flows; and testing each possible program flow to select the test case which verifies the use case required, thereby modeling the NFR. | 05-12-2011 |
20110154329 | METHOD AND SYSTEM FOR OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk. | 06-23-2011 |
20120131578 | Optimization of Virtual Appliance Deployment - In an embodiment for deploying a new virtual appliance ( | 05-24-2012 |
20120159485 | OPTIMIZING VIRTUAL STORAGE SIZE - A method, system and computer program product for optimizing virtual storage in a virtual computer system including at least one virtual machine, each virtual machine being associated with one or more virtual disks. A target set of virtual machines among the virtual machines comprised in the virtual computer system is determined based on information related to the virtual machines and on shrinking constraints. For each virtual machine in the target set of virtual machines, each virtual disk associated with the virtual machine is identified. Furthermore, for each virtual disk associated with the virtual machine, the following occurs: the virtual disk is analyzed, a virtual disk saving quantity based on the virtual disk analysis is estimated, a resized virtual disk based on the estimated virtual disk saving quantity is generated, and the current virtual disk is replaced with the resized virtual disk. | 06-21-2012 |
20120216181 | AUTOMATIC UPGRADE OF VIRTUAL APPLIANCES - A software application distributed as a virtual appliance is automatically installed, updated and removed in a virtual machine system running on top of a virtual machine monitor in a computer. The software application virtual appliance comprises a virtual disk, which is automatically detected and installed or removed at the customer by a virtual disk activation manager program, which executes scripts including commands through an API to the virtual machine monitor. The virtual appliance virtual disk is also created automatically by the software manufacturing using the virtual disk activation manager program. The virtual appliance virtual disk stores the binaries of the software application, a software package created by the software manufacturer using a software package tool, an installer to execute the software package, installation and un-installation scripts and a unique identifier which is a signature for the virtual machine virtual disk. | 08-23-2012 |
20120246647 | MANAGING SOFTWARE CONTENT IN VIRTUAL DESKTOP ENVIRONMENTS - Software is managed in a virtual desktop environment by discovering virtual appliances contained in the virtual desktop environment, and for each virtual appliance discovering the virtual machines belonging to the virtual appliance. Software is further managed by discovering the standalone virtual machines comprised in the virtual desktop environment, and for each discovered virtual machine, introspecting each virtual machine to detect non-virtual applications and virtualized applications running in the virtual machine. For each detected application, identification is made of the operating system on which the application is running | 09-27-2012 |
20130014111 | Optimization of Virtual Appliance Deployment - In an embodiment for deploying a new virtual appliance ( | 01-10-2013 |
20130091498 | MAINTENANCE OF VIRTUAL APPLIANCES - Maintenance of a virtual appliance is provided. The virtual appliance comprises a set of software components each one installed on a corresponding virtual machine. A maintenance descriptor is provided comprising an indication of a new level of at least each one of the software components to be updated thereto. For each software component indicated in the maintenance descriptor, a current level is determined of the software component that is installed on the corresponding virtual machine. A set of old ones of the software components to be actually updated is determined according to a comparison between the corresponding current levels and new levels. The virtual appliance is then cloned. The cloned virtual appliance is updated by updating each old software component thereof to the new level. The virtual appliance is now replaced by the updated cloned virtual appliance. | 04-11-2013 |
20130152084 | Controlling Usage of Virtual Disks Before Their Attachment to Virtual Machines - Controlling usage of virtual disks in a data-processing center hosting a set of virtual machines is described where each virtual disk comprises a set of software artifacts. A corresponding method comprises detecting a request of adding a new virtual disk comprising a set of new software artifacts to a selected one of the virtual machines, determining composition information of the new virtual disk, which includes an indication of the new software artifacts, retrieving an indication of usage entitlements of the new software artifacts in the data-processing center, enabling or preventing the attachment of the new virtual disk to the selected virtual machine according to a comparison between the composition information and the usage entitlements, attaching the new virtual disk to the selected virtual machine in response to the enabling thereof, and updating the usage entitlements in response to the attachment of the new virtual disk. | 06-13-2013 |
20130159973 | ACTIVATION LOGIC GENERATION FOR A SOFTWARE APPLIANCE - Embodiments relate to generating an activation logic component for a software appliance. An aspect includes analyzing configuration settings of a software component, the software component being installed in a first system environment. Another aspect includes generating an image-based installation version of the software component for a second system environment, the second system environment being distinct from the first system environment. Yet another aspect includes generating an activation logic component, such that the image-based installation version of the software component and the activation logic component are generated by an activation logic generator. | 06-20-2013 |