scispace - formally typeset
Search or ask a question
Patent

Resource Optimization and Reuse in Resource Constrained Environment

TL;DR: In this paper, a run-time environment (BRE) for executing applications on a host system is described. The method includes identifying application execution code of an application and a set of application execution dependencies.
Abstract: A computer implemented method for executing applications on a host system. The method includes identifying application execution code of an application and a set of application execution dependencies of the application. The method creates a basic run-time environment (BRE) for the application on the host system. The method maps a root file system of the host system into the BRE. The method copies the application execution code of the application to an application directory in the BRE. The method maps the resource files of the host system to the directories in the BRE for the set of application execution dependencies corresponding to the resource files. The method initiates execution of the application through the BRE using the resource files of the host system that are mapped to the set of application execution dependencies of the application in the BRE.
References
More filters
Patent
31 Jul 2007
TL;DR: In this article, software executables having virtual hardware, operating systems, and networks are described, including a web browser running on a host operating system, a dispatcher that receives a first application to be run on a virtual operating system which is running on an installed on the host operating systems.
Abstract: Software executables having virtual hardware, operating systems, and networks are described herein. In one embodiment, an example of a computing system includes, but is not limited to, a web browser running on a host operating system, a dispatcher that receives a first application to be run on a virtual operating system which is running on a virtual machine installed on the host operating system, a software component adapter that runs the application in the web browser with a native look and feel of the web browser by wrapping the virtual operating system, and the virtual machine for use by the web browser. Other methods and apparatuses are also described.

103 citations

Patent
05 Sep 2017
TL;DR: In this paper, a method and system for real-time cloud bursting is provided. The method is directed to extending a data center with cloud computing resources by decoupling computing resources and storage devices in a virtualized data center and booting the decoupled computing resources in a staged process while storage devices are divided and prioritized into components.
Abstract: A method and system for real-time cloud bursting is provided. The method and system are directed to extending a data center with cloud computing resources by decoupling computing resources and storage devices in a virtualized data center, and booting the decoupled computing resources in a staged process while storage devices are divided and prioritized into components. Data and boot instructions are re-routed and cached as needed through a proxy system.

34 citations

Patent
07 Aug 2001
TL;DR: In this article, a host system for generating a software built-in self-test engine (SBE) is provided for enabling on-chip generation and application of a re-generative functional test on a complex device such as a microprocessor under test.
Abstract: A host system for generating a software built-in self-test engine (SBE) is provided for enabling on-chip generation and application of a re-generative functional test on a complex device such as a microprocessor under test. The host system comprises user directives provided to indicate user desired actions; instruction information provided to define a suite of instructions; and a SBE generation tool arranged to generate a software built-in self-test engine (SBE) based on the user directives, the instruction information and device constraints, for subsequent storage on-board of a complex device such as a microprocessor under test and activation of a re-generative functional test on the complex device under test (DUT).

33 citations

Patent
17 Jan 2013
TL;DR: In this paper, a resource scheduler for managing a distribution of host physical memory (HPM) among a plurality of virtual machines (VMs) monitors usage by each of the VMs of respective guest physical memories (GPM) to determine how much of the HPM should be allocated to each VM.
Abstract: A resource scheduler for managing a distribution of host physical memory (HPM) among a plurality of virtual machines (VMs) monitors usage by each of the VMs of respective guest physical memories (GPM) to determine how much of the HPM should be allocated to each of the VMs. On determining that an amount of HPM allocated to a source VM should be reallocated to a target VM, the scheduler sends allocation parameters to a balloon application executing in the source VM causing it to reserve and write a value to a guest virtual memory (GVM) location in the source VM. The scheduler identifies the HPM location that corresponds to the reserved GVM and allocates it to the target VM by mapping a guest physical memory location of the target VM to the HPM location.

20 citations

Patent
21 Jul 2016
TL;DR: In this article, a risk analysis for a given container is performed by comparing a risk value calculated for the given container to a designated risk threshold, simulating one or more actions in the container responsive to the risk value, and determining whether to accept or reject the given containers responsive to risk analysis and simulated actions.
Abstract: A method includes analyzing a given application to determine one or more packages utilized by the given application, the one or more packages comprising a plurality of libraries, identifying a subset of the plurality of libraries utilized by the given application, determining one or more dependent libraries for each of the identified libraries in the subset, generating a given container for the given application, the given container comprising the identified libraries in the subset and the dependent libraries for each of the identified libraries, performing risk analysis for the given container including comparing a risk value calculated for the given container to a designated risk threshold, simulating one or more actions in the given container responsive to the risk value calculated for the given container exceeding the designated risk threshold, and determining whether to accept or reject the given container responsive to the risk analysis and simulated actions

20 citations