Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual a
Techniques are disclosed for controlling and managing virtual machines and other such virtual systems. VM execution approval is based on compliance with policies controlling various aspects of VM. The techniques can be employed to benefit all virtual environments, such as virtual machines, virtual appliances, and virtual applications. For ease of discussion herein, assume that a virtual machine (VM) represents each of these environments. In one particular embodiment, a systems management partition (SMP) is created inside the VM to provide a persistent and resilient storage for management information (e.g., logical and physical VM metadata). The SMP can also be used as a staging area for installing additional content or agentry on the VM when the VM is executed. Remote storage of management information can also be used. The VM management information can then be made available for pre-execution processing, including policy-based compliance testing.
대표청구항▼
1. An apparatus for optimization of a virtual machine, the apparatus comprising: a memory device storing instructions; and a computing device communicatively coupled to a first virtual machine, the computing device including a processor operably coupled to the memory device, the processor executing
1. An apparatus for optimization of a virtual machine, the apparatus comprising: a memory device storing instructions; and a computing device communicatively coupled to a first virtual machine, the computing device including a processor operably coupled to the memory device, the processor executing the instructions to:receive a virtual machine event request, the virtual machine event request being at least one of a start virtual machine request, a stop virtual machine request, a pause virtual machine request, a move virtual machine request, a clone virtual machine request, a create new virtual machine request, a deploy virtual machine from template request, a snapshot virtual machine request, a register virtual machine request, and a suspend virtual machine request;detect an adaptation of the first virtual machine, the adaption including at least one of software that has been installed on the first virtual machine, software that has been removed from the first virtual machine, and software that has been updated on the first virtual machine;suggest a variant of the first virtual machine that includes the adaptation; and derive the variant of the first virtual machine to create a second different virtual machine, wherein the first virtual machine is evolved to become the second virtual machine;wherein the processor executes instructions to prevent execution of the virtual machine event request until the first virtual machine is determined to be compliant with a virtual machine compliance scheme. 2. The apparatus of claim 1, wherein the computing device is programmed to detect and remove an under-utilized software application from the first virtual machine to create the second virtual machine. 3. The apparatus of claim 2, wherein the removal of the under-utilized software application conserves a license use. 4. The apparatus of claim 1, wherein the computing device is programmed to add a security patch to the first virtual machine to create the second different virtual machine. 5. The apparatus of claim 1, wherein the computing device is programmed to determine that the adaptation occurred a plurality of times during a plurality of executions of the first virtual machine. 6. The apparatus of claim 5, wherein the adaptation that occurred a plurality of times is detected based on historical data. 7. The apparatus of claim 6, wherein the adaptation that occurred a plurality of times is a service pack which was reapplied during each virtual machine use session. 8. The apparatus of claim 6, wherein the adaptation that occurred a plurality of times includes consistently re-installing and removing software during each virtual machine use session. 9. The apparatus of claim 1, wherein the computing device is programmed to include the adaptation in a third virtual machine that is logically associated in a group with the first virtual machine. 10. The apparatus of claim 9, wherein the computing device is programmed to include the adaptation in the third virtual machine prior to a first execution of the third virtual machine. 11. The apparatus of claim 9, wherein the group includes a plurality of virtual machines, and the computing device is programmed to include the adaptation in the third virtual machine if a quorum of the plurality of virtual machines have received the adaptation. 12. The apparatus of claim 1, wherein the virtual machine event request is a start virtual machine request. 13. The apparatus of claim 1, wherein the virtual machine event request is a stop virtual machine request. 14. The apparatus of claim 1, wherein the virtual machine event request is a pause virtual machine request. 15. The apparatus of claim 1, wherein the virtual machine event request is a move virtual machine request. 16. The apparatus of claim 1, wherein the virtual machine event request is a clone virtual machine request. 17. The apparatus of claim 1, wherein the virtual machine event request is a create new virtual machine request. 18. The apparatus of claim 1, wherein the virtual machine event request is a deploy virtual machine from template request. 19. The apparatus of claim 1, wherein the virtual machine event request is a snapshot virtual machine request. 20. The apparatus of claim 1, wherein the virtual machine event request is a register virtual machine request. 21. The apparatus of claim 1, wherein the virtual machine event request is a suspend virtual machine request.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (21)
Campbell, Robert E.; Unruh, Shane; Diamant, John R.; Buck, Keith R.; Zweifel, Evan R., Computer configuration chronology generator.
Luu,Vu V.; Havert,Stephen T; Milne,Matthew W., Disk drive having a protected partition configured to load an operating system for performing a user-selected function.
Fitzgerald Albion J. (Ridgewood NJ) Fitzgerald Joseph J. (New Paltz NY), Distributed computer network including hierarchical resource information structure and related method of distributing re.
Fitzgerald Albion J. ; Fitzgerald Joseph J., Distributed computer network including hierarchical resource information structure and related method of distributing resources.
Lim, Beng-Hong; Bugnion, Edouard; Devine, Scott W., Mechanism for restoring, porting, replicating and checkpointing computer systems using state extraction.
Brent Cameron Beardsley ; Michael Thomas Benhase ; Joseph Smith Hyde ; Thomas Charles Jarvis ; Douglas A. Martin ; Robert Louis Morton, Method and system for staging data into cache.
Fitzgerald, Joseph J.; Kahn, Edward; Burgard, Phillip; Moeller, Harry, System and method for management and installation of operating system images for computers.
Milne, Matthew W.; Luu, Vu L.; Fu, Xuejian; Rothberg, Michael S., System and method for performing disk drive diagnostics and restoration using a host-inaccessible hidden partition.
Merkin, Cynthia M., System and method for storing component information and a program in a hidden partition, and loading the component information to a reserved portion of the memory using the program.
Ikegaya, Naoko; Sekiguchi, Tomoki, Computer system having a virtualization mechanism that executes a judgment upon receiving a request for activation of a virtual computer.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.