virtual

Managing safe removal of a passthrough device in a virtualization system

Methods and systems for managing a removal of a passthrough device from a guest managed by a hypervisor in virtualized computing environment. A hypervisor receives a request from the guest for access to a passthrough device. The hypervisor sets, in a memory, a last accessed state associated with a virtual machine executing the guest. The hypervisor forwards the request to the passthrough device and configures the host CPU to send a subsequent access request directly to the passthrough device. In response to a virtual machine reset, the hypervisor clears the last accessed state and instructs the host CPU to send a post-reset access request to the hypervisor.




virtual

Virtualization and dynamic resource allocation aware storage level reordering

A system and method for reordering storage levels in a virtualized environment includes identifying a virtual machine (VM) to be transitioned and determining a new storage level order for the VM. The new storage level order reduces a VM live state during a transition, and accounts for hierarchical shared storage memory and criteria imposed by an application to reduce recovery operations after dynamic resource allocation actions. The new storage level order recommendation is propagated to VMs. The new storage level order applied in the VMs. A different storage-level order is recommended after the transition.




virtual

Policy enforcement in virtualized environment

Policy enforcement in an environment that includes virtualized systems is disclosed. Virtual machine information associated with a first virtual machine instance executing on a host machine is received. The information can be received from a variety of sources, including an agent, a log server, and a management infrastructure associated with the host machine. A policy is applied based at least in part on the received virtual machine information.




virtual

Methods and apparatus for resource capacity evaluation in a system of virtual containers

Methods and apparatus are provided for evaluating potential resource capacity in a system where there is elasticity and competition between a plurality of containers. A dynamic potential capacity is determined for at least one container in a plurality of containers competing for a total capacity of a larger container. A current utilization by each of the plurality of competing containers is obtained, and an equilibrium capacity is determined for each of the competing containers. The equilibrium capacity indicates a capacity that the corresponding container is entitled to. The dynamic potential capacity is determined based on the total capacity, a comparison of one or more of the current utilizations to one or more of the corresponding equilibrium capacities and a relative resource weight of each of the plurality of competing containers. The dynamic potential capacity is optionally recalculated when the set of plurality of containers is changed or after the assignment of each work element.




virtual

Virtualization support for branch prediction logic enable / disable at hypervisor and guest operating system levels

A hypervisor and one or more guest operating systems resident in a data processing system and hosted by the hypervisor are configured to selectively enable or disable branch prediction logic through separate hypervisor-mode and guest-mode instructions. By doing so, different branch prediction strategies may be employed for different operating systems and user applications hosted thereby to provide finer grained optimization of the branch prediction logic for different operating scenarios.




virtual

Blueprint-driven environment template creation in a virtual infrastructure

A system for blueprint-driven environment template creation in a virtual infrastructure comprises a processor and a memory. The processor is configured to receive a blueprint, receive an environment template configuration, and build an environment template using the blueprint and the environment template configuration. The environment template is for provisioning an environment. The environment is for deploying an application. The memory is coupled to the processor and is configured to provide the processor with instructions.




virtual

System and method for applying a text prediction algorithm to a virtual keyboard

An electronic device for text prediction in a virtual keyboard. The device includes a memory including an input determination module for execution by the microprocessor, the input determination module being configured to: receive signals representing input at the virtual keyboard, the virtual keyboard being divided into a plurality of subregions, the plurality of subregions including at least one subregion being associated with two or more characters and/or symbols of the virtual keyboard; identify a subregion on the virtual keyboard corresponding to the input; determine any character or symbol associated with the identified subregion; and if there is at least one determined character or symbol, provide the at least one determined character or symbol to a text prediction algorithm.




virtual

Virtualizing embedded devices

A device virtualization system is described herein that separates common computer processing tasks of an embedded device from the application-specific peripherals of the embedded device to allow at least some functions of the device to be offloaded to servers or other computing devices. The device virtualization system greatly simplifies management, configuration, and control of virtual embedded devices. Because much of the software of the device runs on the virtualization server, information technology (IT) personnel can be assigned to manage the virtualization server and to apply any updates and diagnose any problems that occur. Moreover, a single server or group of servers can be used to provide virtualization services for a wide variety of virtualized embedded devices for a wide variety of users. Thus, the system enhances the usefulness of embedded devices and allows a longer lifetime and wider variety of uses than embedded devices today.




virtual

Virtualized data storage in a network computing environment

Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device.




virtual

Virtual machine trigger

A computing system includes a parent partition, child partitions, a hypervisor, shared memories each associated with one of the child partitions, and trigger pages each associated with one of the child partitions. The hypervisor receives a system event signal from one of the child partitions and, in response to receiving the system event signal, accesses the trigger page associated with that child partition. The hypervisor determines whether the trigger page indicates whether data is available to be read from the shared memory associated with the child partition. The hypervisor can send an indication to either the parent partition or the child partitions that data is available to be read from the shared memory associated with the child partition if the hypervisor determines that the trigger page indicates that data is available to be read from the shared memory associated with the child partition.




virtual

System and method for virtual machine conversion

System and method for conversion of virtual machine files without requiring copying of the virtual machine payload (data) from one location to another location. By eliminating this step, applicant's invention significantly enhances the efficiency of the conversion process. In one embodiment, a file system or storage system provides indirections to locations of data elements stored on a persistent storage media. A source virtual machine file includes hypervisor metadata (HM) data elements in one hypervisor file format, and virtual machine payload (VMP) data elements. The source virtual machine file is converted by transforming the HM data elements of the source file to create destination HM data elements in a destination hypervisor format different from the source hypervisor format; maintaining the locations of the VMP data elements stored on the persistent storage media constant during the conversion from source to destination file formats without reading or writing the VMP data elements; and creating indirections to reference the destination HM data elements in the destination hypervisor format and the existing stored VMP data elements.




virtual

Dynamically expandable and contractible fault-tolerant storage system with virtual hot spare

A dynamically expandable and contractible fault-tolerant storage system employs a virtual hot spare that is created from unused storage capacity across a plurality of storage devices. This unused storage capacity is available if and when a storage device fails for storage of data recovered from the remaining storage device(s). On an ongoing basis, the storage system may determine the amount of unused storage capacity that would be required for the virtual hot spare (e.g., based on the number of storage devices, the capacities of the various storage devices, the amount of data stored, and the manner in which the data is stored) and generate a signal if additional storage capacity is needed for a virtual hot spare.




virtual

Dynamic consolidation of virtual machines

A method and apparatus are disclosed of monitoring a number of virtual machines operating in an enterprise network. One example method of operation may include identifying a number of virtual machines currently operating in an enterprise network and determining performance metrics for each of the virtual machines. The method may also include identifying at least one candidate virtual machine from the virtual machines to optimize its active application load and modifying the candidate virtual machine to change its active application load.




virtual

Method and apparatus for power-efficiency management in a virtualized cluster system

A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements.




virtual

Estimating virtual machine energy consumption

A method and apparatus for estimating virtual machine energy consumption, and in particular, a method and apparatus for estimating virtual machine energy consumption in a computer system. The method includes: obtaining system energy consumption of the system hardware resources; obtaining event information of a plurality of functional units into which the system hardware resources are divided, and mapping the event information to the respective virtual machines; and calculating energy consumption of the virtual machines according to a plurality of energy consumption coefficients corresponding to the plurality of functional units and according to the event information mapped to the functional units of the respective virtual machines.




virtual

Leveraging transactional memory hardware to accelerate virtualization and emulation

Various technologies and techniques are disclosed for using transactional memory hardware to accelerate virtualization or emulation. State isolation can be facilitated by providing isolated private state on transactional memory hardware and storing the stack of a host that is performing an emulation in the isolated private state. Memory accesses performed by a central processing unit can be monitored by software to detect that a guest being emulated has made a self modification to its own code sequence. Transactional memory hardware can be used to facilitate dispatch table updates in multithreaded environments by taking advantage of the atomic commit feature. An emulator is provided that uses a dispatch table stored in main memory to convert a guest program counter into a host program counter. The dispatch table is accessed to see if the dispatch table contains a particular host program counter for a particular guest program counter.




virtual

Scrolling virtual music keyboard

Disclosed are systems, methods, and non-transitory computer-readable storage media for scrolling a virtual keyboard on a touch screen device including a display. A first aspect allows detecting a user contact swipe motion in a predetermined direction along said keyboard, scrolling said keyboard across said display in accordance with said motion, and stopping said scrolling upon termination of user contact swipe motion. A second aspect allows scrolling of a virtual keyboard to snap to an intelligent position based on a song key or relative minor of the song key. A third aspect allows a note to be held when a user's finger remains in contact with the display even though the finger is no longer in contact with a key linked to the note on the keyboard as a result of scrolling. A fourth aspect displays a second musical instrument keyboard adjacent to a first musical instrument keyboard, wherein said second musical instrument keyboard is linked to said first musical instrument keyboard such that scrolling of one keyboard causes automatic scrolling of the other keyboard.




virtual

Virtual local area network (vlan) coordinator providing access to vlans

A virtual computer system includes virtualization software, and one or more physical network interfaces for connecting to one or more computer networks. The virtualization software supports one or more virtual machines (VMs), and exports one or more virtual network interfaces to the VM(s) to enable the VM(s) to access the computer network(s) through the physical network interface(s). The virtualization software modifies and filters network data frames from the VM(s) and from the physical network interface(s) to restrict one or more VMs to one or more virtual local area networks (VLANs) that are implemented within a VLAN topology. Restricting a VM to a VLAN limits the broadcast domain to which the VM belongs, which may reduce security risks facing the VM. Implementing the VLAN functionality within the virtualization software provides the functionality to every VM in the computer system, without requiring every VM to provide the functionality.




virtual

Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same

A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel.




virtual

Method for virtual channel management, method for retrieving digital contents, and network-based multimedia reproduction system with virtual channels

A method for virtual channel management is provided. The method includes the following steps. In response to a command, a control unit of a network-based multimedia reproduction system determines whether the command is associated with virtual channel switching. When the command is associated with virtual channel switching, the control unit checks whether a channel value corresponding to the command exists in an application virtual channel table. When the channel value exists in the application virtual channel table, the control unit determines an application corresponding to the channel number from the application virtual channel table, and executes the application. According to a first operation parameter set corresponding to the application, the control unit sets the executed application to retrieve digital contents through a network unit of the network-based multimedia reproduction system.




virtual

Virtual Aggregation Processor for incorporating reverse path feedback into content delivered on a forward path

The Virtual Aggregation Processor enables end user devices to share a common wireless forward path of a multicast communication architecture in which the forward path delivered content is dynamically changed or modified based on a real-time, near-real-time, or delay-time basis via aggregated reverse path feedback from at least one of a plurality of end user devices. The Virtual Aggregation Processor periodically or continuously aggregates the feedback input received via the reverse path (having wired and/or wireless connectivity), modifies the forward path multi-media content, and delivers this dynamically modified multi-media content to the then connected population of end user devices via a wireless forward path multicast in a repetitive closed loop fashion.




virtual

Virtual machine migration with direct physical access control

A data processing system facilitates virtual machine migration with direct physical access control. The illustrative data processing system comprises a software-programmable trap control associated with hardware registers of a computer that selectively vectors execution control of a virtual machine (VM) between a host and a guest. The data processing system further comprises a logic which is configured for execution on the computer that programs the trap control to enable the virtual machine to directly access the hardware registers when the virtual machine is not migrated and to revoke direct access of the hardware registers in preparation for virtual machine migration.




virtual

Virtual machine communication

Two or more virtual machines may be co-located on a same physical machine, and the virtual machines may communicate with each other. To establish efficient communication, memory mapping information for respective virtual machines can be exchanged between the respective virtual machines. An instance of a virtualized network interface can be established, and a direct communications channel can be mapped between respective virtualized network interfaces. Data packet routing information can be updated, such that data packets transferred between two of more co-located virtual machines can be transferred using the virtualized network interface communications channel.




virtual

Mobile host using a virtual single account client and server system for network access and management

A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.




virtual

Managing virtual content based on information associated with toy objects

The system described in this disclosure may be configured to read information stored on toy objects that indicates whether the toy objects have been used and/or are being used with other toy objects, gaming systems, and/or other devices. The system described in this disclosure may be configured to facilitate an association of the information stored on the toy objects with virtual entities in a virtual space, update virtual content associated with the virtual entities, determine relationships between users, and/or other perform other functions based on the information stored on the toy objects. The information stored on the toy objects may be updated responsive to the toy objects being used by users with other toy objects, gaming systems, and/or other devices. The use of the toy objects by users may include two or more users playing together with toy objects and/or playing with gaming systems associated with the toy objects.




virtual

Semiconductor integrated circuit having a switch, an electrically-conductive electrode line and an electrically-conductive virtual line

A semiconductor integrated circuit including: a circuit block having an internal voltage line; an annular rail line forming a closed annular line around the circuit block and supplied with one of a power supply voltage and a reference voltage; and a plurality of switch blocks arranged around the circuit block along the annular rail line, the plurality of switch blocks each including a voltage line segment forming a part of the annular rail line and a switch for controlling connection and disconnection between the voltage line segment and the internal voltage line.




virtual

Security using EPCIS data and a virtual private database

An RFID event tracking and management system provides a standardized approach that can be utilized by various industry verticals. Loss of captured event data, such as RFID generated through an RFID event, can be prevented through a series of guarantee semantics. Approaches also provide for role-based data visibility. Queries received from a user or entity can be dynamically modified based on the role of the user/entity using a virtual private database (VPD). The modified query can result in a virtual private database automatically hiding or restricting access to event data at row, column, and/or cell levels, so that an authorized user/entity is only able to access data to which that user/entity should have access.




virtual

Virtual RF sensor

A radio frequency (RF) generation system includes an impedance determination module that receives an RF voltage and an RF current. The impedance determination module further determines an RF generator impedance based on the RF voltage and the RF current. The RF generation system also includes a control module that determines a plurality of electrical values based on the RF generator impedance. The matching module further matches an impedance of a load based on the RF generator impedance and the plurality of electrical components. The matching module also determines a 2 port transfer function based on the plurality of electrical values. The RF generation system also includes a virtual sensor module that estimates a load voltage, a load current, and a load impedance based on the RF voltage, the RF generator, the RF generator impedance, and the 2 port transfer function.




virtual

Virtual omnimover

A ride control system for controlling a plurality of vehicles on a path includes a path processor and a bi-directional voting circuit in circuit with the path processor. Each vehicle of the plurality of vehicles may include a vehicle processor supported by the at least one vehicle and shunt relays in circuit with the at least one vehicle processor. Each vehicle processor may be configured to close a respective shunt relay upon a predetermined condition of the vehicle whereby the bi-directional voting circuit is activated to notify all other vehicles.




virtual

EMULATING VIRTUAL PORT CONTROL OF AIRTIME FAIRNESS USING PER STATION ENHANCED DISTRIBUTED CHANNEL ACCESS (EDCA) PARAMETERS

A technique for emulating virtual port control of airtime fairness for wireless stations using per station Enhanced Distributed Channel Access (EDCA) parameters. Specific parameters are received for each of a plurality of stations connected to the access point. An EDCA field of a beacon that stores a general EDCA parameter is set to an empty state. The beacon is broadcast to a plurality stations on the wireless communication network and within range of an access point. The beacon comprises a BSSID (Basic Service Set Identifier) for use by the plurality of stations to connect with the access point for access to the wireless communication network. The beacon also comprises an empty EDCA field. In response to broadcasting the empty EDCA parameter, receiving a direct inquiry from each of the plurality of stations for the general EDCA parameter. Each of the plurality of stations is responded to with a direct communication of a specific parameter corresponding to each station. A transmission is received from at least one of the stations complying with the specific parameter.




virtual

Network context triggers for activating virtualized computer applications

A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the vulnerability profiles, and to cause the remedial action.




virtual

INTERPRETING RELATIONAL DATABASE STATEMENTS USING A VIRTUAL MULTIDIMENSIONAL DATA MODEL

The present disclosure provides improved systems, methods, and computer program products suited to address the issues with legacy approaches. Specifically, the present disclosure provides a detailed description of techniques used in systems, methods, and in computer program products for interpreting relational database statements using a virtual multidimensional data model. Certain embodiments are directed to technological solutions for receiving a relational database statement comprising relational metadata mapped to a virtual multidimensional representation of a subject database, and generating a subject database statement based at least in part on the relational database statement and the virtual multidimensional representation, and configurable to operate on the subject database to produce a visualization result set, which embodiments advance the technical fields for addressing the problem of projecting a multidimensional data view of a subject database on to a relational data analysis environment to enable real time data analyses, as well as advancing peripheral technical fields.




virtual

SYSTEMS AND METHODS FOR ESTABLISHING AND MAINTAINING VIRTUAL COMPUTING CLOUDS

Networking systems and methods for establishing and maintaining virtual computing clouds are disclosed. A networking system can comprise a server and various instances of a software agent, each agent being installed on a computing device participating in a virtual computing cloud. The server can maintain account setting for a user, wherein the settings can indicate which files on indicated computing devices are included in the virtual computing cloud. The networking system can selectively synchronize data between the computing devices automatically and in a secure manner, and can transmit data in real time to simulate local storage when synchronization of certain files is inappropriate in light of file incompatibility. As a result, the networking system can provide the user with a seamless, automatic system and method for accessing a total computing environment.




virtual

VIRTUAL IMPACTOR FILTER ASSEMBLY AND METHOD

A filter system and method use a filter housing that defines an interior chamber and that includes an inlet opening extending into the interior chamber. The outer air flow housing has an outlet conduit through which a flow of air having particles is directed toward the inlet opening of the filter housing along a flow direction toward the interior chamber of the filter housing. The outer air flow housing engages the filter housing such that the filter housing is separated from the outer air flow housing along the flow direction to permit at least some of the air to pass around an exterior of the filter housing and exit the outer air flow housing while the particles in the at least some of the air pass into the interior chamber of the filter housing through the inlet opening.




virtual

City orchestra attracts music lovers from around the world as it goes virtual

A SOUTHAMPTON orchestra is going virtual - and global.




virtual

Reader's letter: Why we've gone virtual for Christian Aid Week in Chandler's Ford

CHRISTIAN AID Week, known for its red envelopes, collections and Big Brekkies, faced a big challenge this year, with all its traditional fund-raising events out of reach.




virtual

Hampshire wine school goes virtual

A HAMPSHIRE wine tutor has taken her popular tasting sessions online.




virtual

Friday Feature: Virtual Dinner Concert Series - Helping Boone, NC Musicians & Restaurants

Thanks to Michael Greene of Boone, NC - a virtual dinner concert series, online, was organized as a way to help raise money for local restaurants, servers, and musicians in the Boone area that have been unable to work due to the mandatory closures of businesses because of the Coronavirus. This includes a Go Fund Me page set up to donate a little extra in the case someone can. Maybe this virtual idea spreads all over as a way to say thank you to someone for serving and entertaining all of us in the past. You can find them on Facebook @BooneRelief Posted by Host and Producer of The Friday Feature Interview of the Week, Paul Foster- WNCW Senior Producer, News Director, and Morning Edition Regional Host




virtual

Shawn Mendes, Beyonce, Taylor Swift, Ariana Grande Among Winners at Virtual Kids' Choice Awards

The complete winners for the 2020 Nickelodeon Kids' Choice Awards have been announced at an online event which is hosted by 'Victorious' actress Victoria Justice.




virtual

'La La Land' Creators to Help Jamie Lee Curtis Introduce Their Musical During Virtual Watch Party

Oscar winners Damien Chazelle and Justin Hurwitz are expected to take part in the 'Lionsgate Live! A Night at the Movies' event that will benefit the Will Rogers Motion Picture Pioneers Foundation.



  • movie
  • La La Land
  • Jamie Lee Curtis



virtual

Be our (virtual) guest

ScanTech Digital presents virtual tours of historic Midlands places.





virtual

Virtual viewing available for new Birmingam development

Urban Splash & Places for People lead the way at Port Loop.





virtual

Apparel, jewellery, electronic retailers to roll out store-on-wheels; launches virtual tour of stores

“The idea of store-on-wheels is that customers should not feel suffocated that they can’t go out and shop, and feel the same pleasure right at their doorsteps,” said Vishnu Prasad, managing director of Future Lifestyle Fashions that owns Central and Brand Factory.




virtual

Apparel, jewellery, electronic retailers to roll out store-on-wheels; launches virtual tour of stores

“The idea of store-on-wheels is that customers should not feel suffocated that they can’t go out and shop, and feel the same pleasure right at their doorsteps,” said Vishnu Prasad, managing director of Future Lifestyle Fashions that owns Central and Brand Factory.




virtual

Wavesfactory releases Le Parisien virtual accordion library for Kontakt

Wavesfactory has announced the release of an accordion collection of Native Instruments Kontakt. Le Parisien is based on three accordions, with a faithful recreation of the sound and behavior of the real instruments. The library features Rouge, Blanc and Noir accordions, each one of them sampled with all registers, giving different sound characteristics, and mechanical […]

The post Wavesfactory releases Le Parisien virtual accordion library for Kontakt appeared first on rekkerd.org.




virtual

Save 90% on Ugritone’s Assault Drums & Koji virtual instruments

Ugritone has launched a weekend sale on two of its virtual instruments. Assault Drums is a virtual drum instrument with the sound of 80s/90s Heavy Metal/Rock. Multiple routing options and advanced humanizing scripts give each and every drum a natural feel so you can dial tones from Assault Drums as if you were processing real […]

The post Save 90% on Ugritone’s Assault Drums & Koji virtual instruments appeared first on rekkerd.org.