Patent application number | Description | Published |
20110289090 | CLASSIFYING LOCATIONS FOR AD PRESENTATION - This specification describes technologies relating to content presentation. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving data from a plurality of users within a geographic region associated with a location; analyzing the received data to derive a category for the location; annotating the location with the category; and using the category to boost candidate content items for delivery to users in the location in response to future content item requests. | 11-24-2011 |
20120004978 | Call Tracking For Online Content Items - This specification relates to tracking phone calls related to online content items. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of determining a probability that a call to a phone number resulted from a first interaction of a set of interactions. In general, another aspect of the subject matter described in this specification can be embodied in methods that include the actions of determining a rank score for an online content item, including for each call of a plurality of phone calls to the phone number, attributing the call to an online content interaction of a set of online content interactions; determining, using the rank score, whether to provide the online content item to a client device; and providing the online content item to the client device upon determining to do so using the rank score. | 01-05-2012 |
20120155624 | Frequency Capping and Throttling of Calls in a Pay-Per-Call Advertising Solution - Various methods, systems, and computer program products are disclosed for controlling a number of calls based on promotional message impressions. The method may include receiving a request to communicate at least one promotional message, wherein the at least one promotional message is associated with one or more phone numbers. The method may include communicating the at least one promotional message and the one or more phone numbers. The method may include receiving one or more calls associated with the at least one promotional message. The method may include determining a call through rate for the at least one promotional message based on the one or more calls. The method may include determining a number of impressions of the at least one promotional message based on the determined call through rate. | 06-21-2012 |
20120177189 | Displaying Phone Number on the Landing Page Based on Keywords - Various methods, systems, and computer program products are disclosed for determining promotional messages that led to a phone call. The method may include communicating a promotional message, wherein the promotional message is associated with a phone number. The method may include receiving an indication that the promotional message was selected. The method may include receiving a phone call via the phone number, the phone call indicating the phone number that was called. The method may include associating the phone call with the promotional message based on the phone number. The method may include determining that the communicated promotional message led to the phone call based on the associated phone call and promotional message. | 07-12-2012 |
20130332261 | Call Tracking for Online Content Items - This specification relates to tracking phone calls related to online content items. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of determining a probability that a call to a phone number resulted from a first interaction of a set of interactions. In general, another aspect of the subject matter described in this specification can be embodied in methods that include the actions of determining a rank score for an online content item, including for each call of a plurality of phone calls to the phone number, attributing the call to an online content interaction of a set of online content interactions; determining, using the rank score, whether to provide the online content item to a client device; and providing the online content item to the client device upon determining to do so using the rank score. | 12-12-2013 |
20140249923 | CLASSIFYING LOCATIONS FOR AD PRESENTATION - This specification describes technologies relating to content presentation. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving data from a plurality of users within a geographic region associated with a location; analyzing the received data to derive a category for the location; annotating the location with the category; and using the category to boost candidate content items for delivery to users in the location in response to future content item requests. | 09-04-2014 |
20150066633 | DYNAMIC TELEPHONE NUMBER ASSIGNMENT - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium for dynamic telephone number assignment. A method includes: providing a content item to a user device, the content item including a control for initiating a call to a content sponsor associated with the content item; assigning a telephone number from a pool to the content item; receiving a control interaction indication; facilitating a connection between the user and the content sponsor based on the interaction; storing an association between a user identifier, the telephone number, and a content sponsor identifier such that future calls from the user to the telephone number can be routed to the content sponsor, even after the telephone number has been returned to the pool; and linking a content item impression with the connection such that a report can be generated that shows an effectiveness of the content item impression. | 03-05-2015 |
20150278881 | AUTOMATIC VERIFICATION OF ADVERTISER IDENTIFIER IN ADVERTISEMENTS - Systems and methods for automatically verifying an identifier of a content provider are provided. A first identifier, a content item, and a uniform resource locator are received from a content provider. The domain of the uniform resource locator is determined. A plurality of second resources under the domain are accessed and stored in memory. From the plurality of second resources, a plurality of second identifiers are detected. A map of domain and a plurality of second identifiers is created. Using the map, the first identifier is compared to each of the plurality of second identifiers. If there is a match, the first identifier is approved to be used with the content item. The first identifier may be displayed on a user device with the content item. | 10-01-2015 |
20150287099 | METHOD TO COMPUTE THE PROMINENCE SCORE TO PHONE NUMBERS ON WEB PAGES AND AUTOMATICALLY ANNOTATE/ATTACH IT TO ADS - Systems and methods for automatically extracting a plurality of contact information from a resource, calculating prominence scores of each contact information, and associating a selected contact information with a content item are provided. A content item and a uniform resource locator are received from a content provider. A resource identified by the uniform resource locator is loaded. A plurality of contact information is detected from the loaded resource. For each of the detected contact information, a prominence score is calculated. One of the plurality of contact information is selected based on the calculated prominence scores. The selected contact information is associated with the content item. | 10-08-2015 |
Patent application number | Description | Published |
20100146303 | PROTECTING EXTERNAL VOLATILE MEMORIES USING LOW LATENCY ENCRYPTION/DECRYPTION - A data processing apparatus includes a volatile memory, a random number generator adapted for generating random numbers from which one or more keys are generated, and a memory encryption unit (MEU). The MEU is configured to receive an N-bit block of data and to divide the N-bit block of data into two more sub-blocks of data, where each sub-block contains fewer than N-bits. The MEU is further configured to encrypt each sub-block of data using the one more keys, to combine the encrypted sub-blocks into an N-bit block of encrypted data, and to write the encrypted N-bit block of data to the volatile memory. | 06-10-2010 |
20110066787 | METHOD AND SYSTEM FOR SECURELY PROGRAMMING OTP MEMORY - A semiconductor chip may be operable to receive and copy an OTP programming vector presented by the semiconductor chip programming device into its memory after it boots up from the boot read-only memory (ROM). The OTP programming vector which is a computer program may comprise an encrypted data to be programmed into the one-time programmable (OTP) memory in the semiconductor chip and may be signed with an electronic signature. The semiconductor chip may be operable to authenticate the OTP programming vector in the memory. The authenticated OTP programming vector in the memory may be executed to decrypt the data and program the data in a random data format into the OTP memory and then report the status via one or more general purpose input/output (GPIO) pins on the semiconductor chip. | 03-17-2011 |
20110066835 | METHOD AND SYSTEM FOR SECURELY PROTECTING A SEMICONDUCTOR CHIP WITHOUT COMPROMISING TEST AND DEBUG CAPABILITIES - A semiconductor chip may be operable to block the debug interfaces when the semiconductor chip boots up from the boot read-only memory (ROM). The semiconductor chip may be operable to authenticate a debug certificate received by the semiconductor chip and enable one or more debug interfaces in the semiconductor chip based on the information resulting from the authentication of the debug certificate. The debug certificate may be in a form of a cryptographic public key certificate. A unique device ID which may be generated at boot and stored in the memory may be used by the semiconductor chip to authenticate the debug certificate. The device ID may be generated using the cryptographic public key that is stored in the one-time programmable (OTP) memory in the semiconductor chip and a cryptographic hash algorithm. | 03-17-2011 |
20110067110 | METHOD AND SYSTEM FOR HARDWARE ENFORCED VIRTUALIZATION IN AN INTEGRATED CIRCUIT - Aspects of a method and system for hardware enforced virtualization in an integrated circuit are provided. In this regard, a mode of operation of an integrated circuit may be controlled such that the integrated circuit alternates between a secure mode of operation and an open mode of operation. Various resources of the integrated circuit may be designated as open or secure, and secure resources may be made inaccessible while the integrated circuit operates in the open mode. Access to the secure resources may be controlled based on a configuration of one or more registers and/or switching elements. Resources designated as secure may comprise, for example, a one-time-programmable memory. The integrated circuit may comprise ROM and/or one-time-programmable memory that stores one or more instructions, wherein execution of the one or more instructions may control transitions between the secure mode and the open mode. | 03-17-2011 |
20110191562 | Apparatus and method for partitioning, sandboxing and protecting external memories - A technique to provide an integrated circuit that performs memory partitioning to partition a memory into a plurality of regions, in which the memory is accessed by a plurality of heterogeneous processing devices that operate to access the memory. The integrated circuit also assigns a security level for each region of the memory and permits a memory access by a transaction to a particular region of the memory, only when a level of security assigned to the transaction meets or exceeds the assigned security level for the particular region. The integrated circuit also performs sandboxing by assigning which of the plurality of processing devices are permitted access to each of the plurality of regions. The integrated circuit may implement only the security level function or only the sandboxing function, or the integrated circuit may implement them both. In some instances, a scrambling/descrambling function is included to scramble/descramble data. In one application, the integrated circuit is included within a mobile phone. | 08-04-2011 |
20110191599 | Apparatus and method for providing hardware security - A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of unauthorized accesses from external sources outside of the secure boundary to obtain the secure key. The hardware security module includes a security processor to unwrap and authenticate a secure key within the secure boundary to decrypt or encrypt data and to provide data through a single interface that communicates with external sources, so that all data transfers between the secure boundary, formed by the hardware security module, and external sources are transferred only through the interface. The hardware security module ensures no unwrapped key leaves the secure boundary established by the hardware security module. | 08-04-2011 |
20130043939 | Integrated Circuit With an Adaptable Contact Pad Reconfiguring Architecture - An apparatus and method are disclosed for providing test mode contact pad reconfigurations that expose individual internal functional modules or block groups in an integrated circuit for testing and for monitoring. A plurality of switches between each functional module switches between passing internal signals among the blocks and passing in/out signals external to the block when one or more contact pads are strapped to input a pre-determined value. Another set of switches between the functional modules and input/output contact pads switch between functional inputs to and from the functional modules and monitored signals or input/output test signals according to the selected mode of operation. | 02-21-2013 |
20130044844 | ELECTRONICS DEVICE CAPABLE OF EFFICIENT COMMUNICATION BETWEEN COMPONENTS WITH ASYNCRONOUS CLOCKS - An electronics device is disclosed that reduces latency resulting from communication between a first electronics component operating based on a fast clock and a second electronics component operating based on a slow clock reduces communication latency. When transferring the data from the first component to the second, the data is written into a buffer using the first clock, and then extracted by the second component using the second clock. Alternatively, when transferring the data from the second component to the first component, the first component reads the data from the second component and monitors whether the data was extracted during a relevant edge of the second clock signal, in which case the first component again extracts the data from the second component. | 02-21-2013 |
20130045779 | Clock Signal Multiplication to Reduce Noise Coupled onto a Transmission Communication Signal of a Communications Device - A communications device is disclosed that implements a phase-locked-loop to multiply a clock signal provided to a power management unit (PMU) by a variable integer value. Multiplying the PMU clock signal provides a second clock signal where the second clock signal is characterized by a fundamental component with one or more harmonics of the fundamental component that differ from the fundamental component and the one or more harmonics of the PMU clock signal. The fundamental component with one or more harmonics of the second clock signal does not occupy the same communication channel as the transmission communication signal of the communications device. Thus, minimizing the degradation of the transmission communication signal. | 02-21-2013 |
20130046915 | Scalable and Configurable System on a Chip Interrupt Controller - Embodiments include a system and method for an interrupt controller that propagates interrupts to a subsystem in a system-on-a-chip (SOC). Interrupts are provided to an interrupt controller that controls access of interrupts to a particular subsystem in the SOC that includes multiple subsystems. Each subsystem in the SOC generates multiple interrupts to other subsystems in the SOC. The interrupt controller processes multiple interrupts and generates an interrupt output. The interrupt output is then transmitted to a particular subsystem. | 02-21-2013 |
20130047000 | INTEGRATED CIRCUIT ALLOWING FOR TESTING AND ISOLATION OF INTEGRATED POWER MANAGEMENT UNIT - An integrated circuit is disclosed that contains both a PMU and another processing portion, such as a baseband. Because of the limited pins devoted to the PMU, the PMU receives most of its signals through the other processing portion of the integrated circuit, Thus, in order to protect the PMU, the integrated circuit isolates the PMU portion from receiving different signals from the other processing portion until after certain conditions are satisfied. In addition, the integrated circuit includes a GPIO pin bank in the other processing portion that can be freely configured so as to allow for testing of the PMU. | 02-21-2013 |
20130047166 | Systems and Methods for Distributing an Aging Burden Among Processor Cores - Systems and methods are presented for reducing the impact of high load and aging on processor cores in a processor. A Power Management Unit (PMU) can monitor aging, temperature, and increased load on the processor cores. The PMU instructs the processor to take action such that aging, temperature, and/or increased load are approximately evenly distributed across the processor cores, so that the processor can continue to efficiently process instructions. | 02-21-2013 |
20130047250 | Methods of On-Chip Memory Partitioning and Secure Access Violation Checking in a System-on-Chip - Systems and methods for partitioning memory into multiple secure and open regions are provided. The systems enable the security level of a given region to be determined without an increase in the time needed to determine the security level. Also, systems and methods for identifying secure access violations are disclosed. A secure trap module is provided for master devices in a system-on-chip. The secure trap module generates an interrupt when an access request for a transaction generates a security error. | 02-21-2013 |
20130047272 | INTEGRATED CIRCUIT FOR PREVENTING CHIP SWAPPING AND/OR DEVICE CLONING IN A HOST DEVICE - An integrated circuit is disclosed that can be included in a host electronic device that can be commonly manufactured, where the integrated circuit can be designated (“locked”) for a specific manufacturer, thereby substantially reducing the likelihood that a third party will be able to successfully clone a host electronic device manufactured by the specific manufacturer and/or swap the chip containing the integrated circuit for one having more enabled features. The integrated circuit includes an ID module that can be programmed after fabrication. Components within the integrated circuit designate manufacturer-specific configurations (e.g., address mapping, pin routing and/or vital function releasing) based on the programmed manufacturer ID. As a result, once the integrated circuit has been programmed with the manufacturer ID, the integrated circuit will function correctly only within a host device manufactured by the manufacturer associated with the programmed manufacturer ID. | 02-21-2013 |
20130082764 | APPARATUS AND METHOD TO COMBINE PIN FUNCTIONALITY IN AN INTEGRATED CIRCUIT - An apparatus and method are disclosed to combine pad functionality in an integrated circuit. A power, ground, or signal pad is connected to a power, ground, or signal source, respectively. The power, ground, or signal pad is additionally connected to an additional signal source, such as automatic test equipment in a testing environment. By temporarily disconnecting either the power, ground, or signal source, from the functional block within the integrated circuit to which the source is delivered, the same pad may pass in another signal to other portions of the integrated circuit. In the alternative, the same pad may pass in another signal to other portions of the integrated circuit without disconnecting the original signal by coupling the additional signal over the original signal. Further, combining pad functionality enables reuse of an input pad as an output pad for signals originating from within the integrated circuit. | 04-04-2013 |
20140223031 | CLOCK DOMAIN CROSSING SERIAL INTERFACE, DIRECT LATCHING, AND RESPONSE CODES - Aspects of a clock domain crossing serial interface, direct latching over the serial interface, and response codes are described. In various embodiments, a data communication command received over a serial interface is identified, and an address received over the serial interface is resolved to access a register bank. In a write operation, depending upon whether the address falls within a direct latch address range of the register bank, data may be directly latched into a direct latch register of the register bank or into a first-in-first-out register. For both read and write operations, reference may be made to a status register of the serial interface to identify or mitigate error conditions, and wait times may be relied upon to account for a clock domain crossing. After each of the read and write operations, a response code including a status indictor may be communicated. | 08-07-2014 |
20150052367 | APPARATUS AND METHOD FOR PROVIDING HARDWARE SECURITY - A technique to provide a hardware security module that provides a secure boundary for retention of a secure key within the secure boundary and prevention of unauthorized accesses from external sources outside of the secure boundary to obtain the secure key. The hardware security module includes a security processor to unwrap and authenticate a secure key within the secure boundary to decrypt or encrypt data and to provide data through a single interface that communicates with external sources, so that all data transfers between the secure boundary, formed by the hardware security module, and external sources are transferred only through the interface. The hardware security module ensures no unwrapped key leaves the secure boundary established by the hardware security module. | 02-19-2015 |
20150186209 | CLOCK DOMAIN CROSSING SERIAL INTERFACE - A method for serial interface clock domain crossing includes identifying a data communication command received over a serial interface. An address is decoded to determine whether the address falls within a direct latch address range of a register bank. Data is communicated over the serial interface. A multiplexed output clock is generated, for writing to and reading from the register bank, based on at least one of a current system operating state and a refresh control signal from a host processor. | 07-02-2015 |
Patent application number | Description | Published |
20110289509 | METHODS AND SYSTEMS FOR AUTOMATING DEPLOYMENT OF APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT - In accordance with embodiments disclosed herein, there are provided mechanisms and methods for automating deployment of applications in a multi-tenant database environment. For example, in one embodiment, mechanisms include managing a plurality of machines operating as a machine farm within a datacenter by executing an agent provisioning script at a control hub, instructing the plurality of machines to download and instantiate a lightweight agent; pushing a plurality of URL (Uniform Resource Locator) references from the control hub to the instantiated lightweight agent on each of the plurality of machines specifying one or more applications to be provisioned and one or more dependencies for each of the applications; and loading, via the lightweight agent at each of the plurality of machines, the one or more applications and the one or more dependencies for each of the one or more applications into memory of each respective machine. | 11-24-2011 |
20110295814 | Methods and Systems for Detecting Skewed Data in a Multitenant Database Environment - Detection of skew in an on-demand database services environment is provided. A request is generated to scan a multitenant database for skew indicated by relationship depth exceeding an expected limit. A database crawler calculates skew for tenant identifier for a particular table in the database. Any skew that is detected is identified for later resolution. | 12-01-2011 |
20120005537 | IDENTIFYING BUGS IN A DATABASE SYSTEM ENVIRONMENT - A system and method for identifying bugs in a database system. In one embodiment, a method includes running a plurality of tests on a software application, and rerunning one or more tests of the plurality of tests. The method also includes identifying one or more bugs in the one or more tests based on inconsistent test results. | 01-05-2012 |
20120151479 | HORIZONTAL SPLITTING OF TASKS WITHIN A HOMOGENOUS POOL OF VIRTUAL MACHINES - Horizontal splitting of tasks within a homogenous pool of virtual machines. A primary virtual machine is provided to service requests from a request source during a session. The primary virtual machine services requests having a first priority received during the session. A secondary virtual machine is provided to service requests from the request source during the session. The secondary virtual machine services requests having a second priority received during the session. The first virtual machine and the second virtual machine run on a single physical computing platform. | 06-14-2012 |
20130054668 | MECHANISM FOR FACILITATING SPIN MODE-BASED DYNAMIC UPDATING OF APPLICATION SERVERS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating spin mode-based dynamic updating of application servers. In one embodiment and by way of example, a method includes upgrading a first set of application servers of a plurality of application servers at one or more computing devices, holding a first set of requests received at the first set of application servers from being processed while the first set of application servers is being upgraded, and upgrading a second set of application servers of the plurality of application servers upon completion of the first set of application servers. The method may further include holding a second set of requests received at the second set of application servers from being processed while the second set of application servers is being upgraded, and resuming processing of the first set of requests at the upgraded first set of application servers. | 02-28-2013 |
20130055232 | MECHANISM FOR FACILITATING DYNAMIC FORMAT TRANSFORMATION OF SOFTWARE APPLICATIONS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic zero-downtime updating of formats of software applications in an on-demand services environment. In one embodiment and by way of example, a method includes receiving a request to facilitate a format change to a current version of a software application at a computing device, and retrieving a trigger corresponding to the format change, where a trigger may include a version indicator to indicate a past version of the software application relating to the format change. The method may further include comparing the current version and the indicated past version of the software application, and invoking the format change to the current version of the software application based on the retrieved trigger and the version indicator. | 02-28-2013 |
20140372578 | MECHANISM FOR FACILITATING SPIN MODE-BASED DYNAMIC UPDATING OF APPLICATION SERVERS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating spin mode-based dynamic updating of application servers in an on-demand services environment. In one embodiment and by way of example, a method includes upgrading a first set of application servers of a plurality of application servers at one or more computing devices, holding a first set of requests received at the first set of application servers from being processed while the first set of application servers is being upgraded, and upgrading a second set of application servers of the plurality of application servers upon completion of the first set of application servers. The method may further include holding a second set of requests received at the second set of application servers from being processed while the second set of application servers is being upgraded, and resuming processing of the first set of requests at the upgraded first set of application servers. | 12-18-2014 |
20150309833 | METHODS AND SYSTEMS FOR AUTOMATING DEPLOYMENT OF APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT - In accordance with embodiments disclosed herein, there are provided mechanisms and methods for automating deployment of applications in a multi-tenant database environment. For example, in one embodiment, mechanisms include managing a plurality of machines operating as a machine farm within a datacenter by executing an agent provisioning script at a control hub, instructing the plurality of machines to download and instantiate a lightweight agent; pushing a plurality of URL (Uniform Resource Locator) references from the control hub to the instantiated lightweight agent on each of the plurality of machines specifying one or more applications to be provisioned and one or more dependencies for each of the applications; and loading, via the lightweight agent at each of the plurality of machines, the one or more applications and the one or more dependencies for each of the one or more applications into memory of each respective machine. | 10-29-2015 |
Patent application number | Description | Published |
20130308492 | Configuration Management of Distributed Virtual Switch - A method, non-transitory storage medium, and apparatus are presented for configuration management of a distributed virtual switch including components distributed on different entities in a computing system is provided. In an exemplary embodiment, a snapshot of a configuration of the distributed virtual switch is received from a management plane configured to manage the distributed virtual switch. The snapshot may include settings for the configuration at a time of taking the snapshot. A persistent storage location independent from the management plane is designated for storing the received snapshot of the configuration. After the snapshot is taken, the configuration may be retrieved from the persistent storage location and the settings of the configuration may be applied to the distributed virtual switch, a new distributed virtual switch, or an existing distributed virtual switch. | 11-21-2013 |
20140012966 | Distributed Virtual Switch Configuration and State Management - Techniques are disclosed for pushing configuration changes of a distributed virtual switch from a management server to a plurality of host servers underlying the distributed virtual switch. The approach includes sending, in parallel, by the management server, a message to each of the plurality of host servers. The message specifies a final configuration state for one or more virtual ports emulated via virtualization layers of the host servers. The approach further includes determining, by each of the plurality of host servers, port state configuration changes to make to the virtual ports to achieve the final configuration state, and reconfiguring, by each of the plurality of host servers, their respective virtual ports, to match the final configuration state. | 01-09-2014 |
20140115576 | Extensible Network Configuration Management - Techniques are disclosed for a management application running on a virtualization management platform and a module on a virtual machine host to communicate via an opaque pass-through channel for transporting data through the management platform and intermediate layer(s) of the virtual machine host between the management application and the module. In one embodiment, the data is identified by a key which is unique across management applications and includes a namespace registered by the management application on the management platform and registered by the module on the virtual machine host. In another embodiment, the namespace may indicate an association of the data with one or more entities such as a distributed virtual switch, port groups, ports, and virtual machine hosts. Configuration property settings for an entity may be propagated to its sub-entities based on inheritance. Further, the data may be persisted in database(s) of the management platform and/or the intermediate layer(s). | 04-24-2014 |
20150071110 | METHOD AND SYSTEM FOR RECOVERING FROM NETWORK DISCONNECTS BY CLONING A VIRTUAL PORT - Techniques for managing the configuration of managed nodes in a virtual machine network are disclosed. In an embodiment, managing the configuration of a managed node involves creating a clone of a virtual port on the managed node and using the cloned virtual port as an alternative communication channel between the managed node and a virtual machine management system to modify the virtual port. This technique can be used to restore connectivity to a managed node, such as a virtual switch, when connectivity is lost due to a misconfigured virtual port. | 03-12-2015 |
20150074661 | SYSTEM AND METHOD FOR MANAGING CONFIGURATION OF VIRTUAL SWITCHES IN A VIRTUAL MACHINE NETWORK - Techniques for managing configuration of virtual switches in a virtual machine network are disclosed. In an embodiment, a virtual machine network that includes virtual switches is configured to revert back to a saved network configuration if a configuration change causes the connection between the VM management system and a managed node to be lost. For example, before any configuration changes are made, the active configuration is saved. If the new configuration supports a working connection between the managed node and the VM management system, then the saved configuration is no longer needed and can be flushed from memory. If, however, the new configuration causes the managed node to be disconnected from the VM management system, then the system reverts back to the saved configuration that was previously known to work. The saved configuration is used to reestablish the connection so that the network continues to function. | 03-12-2015 |
Patent application number | Description | Published |
20090106191 | SEARCH CENTER DYNAMIC CONFIGURATION USING FIELD MAPPINGS - A mechanism for dynamically configuring searchable fields of interest within a search provided. A field mappings file is used to define relationships between searchable interest in searchable objects and fields within a search index accessible to an se-wide search center. The field mappings file can provide the defined relationships searchable object fields and search index fields at runtime of a user session, thus a rigid configuration at the time of search center initialization. | 04-23-2009 |
20090106196 | TRANSFERRING RECORDS BETWEEN TABLES USING A CHANGE TRANSACTION LOG - A method and apparatus for transferring records between database tables using a transaction log. In one embodiment of the method, a first application generates a transaction for deleting a record from a first table in a database. In response to the generation of the first transaction, a copy of the record is stored in an entry of a transaction log before the record is deleted from the first table. A second application generates an instruction for copying the record from the transaction log to a second table, and the record is copied from the entry to the second table. | 04-23-2009 |
20090106216 | PUSH-MODEL BASED INDEX UPDATING - A method and apparatus for push-model based index updating. In one embodiment of the method, a first transaction generated for modifying or inserting a first data object into a memory. A first message is generated in response to generating the first transaction, wherein the first message comprises information related to an identifier of the first data object, wherein the first message comprises information that indicates that the first data object was or will be modified or inserted into the memory, and wherein the first message comprises a copy of some or all of the data contents of the first data object; transmitting the first message to a computer system that implements a search engine. | 04-23-2009 |
20090106294 | METHOD AND APPARATUS FOR EMPLOYING A SEARCHABLE ABSTRACTION LAYER OVER ENTERPRISE-WIDE SEARCHABLE OBJECTS - A mechanism for dynamically configuring searchable fields of interest within an enterprise-wide search center is provided. Such functionality is provided through the creation and maintaining of an abstraction layer that represents the searchable fields of interest, which are gathered from the total available fields from enterprise-wide searchable objects. The abstraction layer is defined through the use of a field mappings file that relates searchable fields of interest in searchable objects with fields within a search index accessible to the search center. The field mappings file can provide the defined relationships between searchable object fields and search index fields at runtime of a user session, thus avoiding a rigid configuration at the time of search center initialization. Through such runtime modification of the abstraction layer, costly downtime due to revision of a configuration of the search center can be avoided and a dynamic flexibility in the presentation of the fields in the searchable objects can be provided without a need for modification of the searchable objects themselves. | 04-23-2009 |
20090106324 | PUSH-MODEL BASED INDEX DELETION - A method and apparatus for push-model based index deletion. In one embodiment of the method, a first transaction is generated for deleting a first data object from memory. A first message is generated in response to generating the first transaction, wherein the first message comprises information related to an identifier of the first data object, and wherein the first message comprises information that indicates that the first data object was or will be deleted. The first message is then transmitted to a computer system that implements a search engine. | 04-23-2009 |
20090106325 | RESTORING RECORDS USING A CHANGE TRANSACTION LOG - In one embodiment of the method, a first transaction is generated for deleting a record from a table of a database. In response the record is deleted from the table. Further in response to the generation of the first transaction, a copy of data of the record is stored in an entry of a transaction log before the record is deleted from the table. An instruction is then generated, and in response the record is restored to the table after the record is deleted, wherein the record is restored in the table using the copy of the data in the transaction log entry. | 04-23-2009 |