Executing programs based on user-specified constraints

Electrical computers and digital processing systems: multicomput – Computer network managing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S224000, C709S229000

Reexamination Certificate

active

08010651

ABSTRACT:
Techniques are described for managing execution of programs on multiple computing systems, such as based at least in part of user-specified constraints. For example, constraints related to execution of a program may be based on a desired relative location of a host computing system to execute a copy of the program with respect to an indicated target (e.g., computing systems executing other copies of the program or copies of another indicated program), on particular geographic locations, and/or on factors not based on location (e.g., cost of use of a particular computing system, capabilities available from a particular computing system, etc.). Some or all of the multiple computing systems may be part of a program execution service for executing multiple programs on behalf of multiple users, and each may provide multiple virtual machines that are each capable of executing one or more programs for one or more users.

REFERENCES:
patent: 6411967 (2002-06-01), Van Renesse
patent: 6430607 (2002-08-01), Kavner
patent: 6457047 (2002-09-01), Chandra et al.
patent: 6529953 (2003-03-01), Van Renesse
patent: 6724770 (2004-04-01), Van Renesse
patent: 6782398 (2004-08-01), Bahl
patent: 6810291 (2004-10-01), Card et al.
patent: 7139821 (2006-11-01), Shah et al.
patent: 7430610 (2008-09-01), Pace et al.
patent: 7640296 (2009-12-01), Fuchs et al.
patent: 2001/0000811 (2001-05-01), May et al.
patent: 2001/0056500 (2001-12-01), Farber et al.
patent: 2002/0002613 (2002-01-01), Freeman et al.
patent: 2002/0082858 (2002-06-01), Heddaya et al.
patent: 2002/0198953 (2002-12-01), O'Rourke et al.
patent: 2003/0028642 (2003-02-01), Agarwal et al.
patent: 2003/0145038 (2003-07-01), Bin Tariq et al.
patent: 2004/0044731 (2004-03-01), Chen et al.
patent: 2004/0059805 (2004-03-01), Dinker et al.
patent: 2005/0168782 (2005-08-01), Kobashi et al.
patent: 2005/0283759 (2005-12-01), Peteanu et al.
patent: 2005/0283784 (2005-12-01), Suzuki
patent: 2006/0047813 (2006-03-01), Aggarwal et al.
patent: 2006/0184936 (2006-08-01), Abels et al.
patent: 2006/0259581 (2006-11-01), Piersol
“Global Server Load Balancing with ServerIron,” Foundry Networks, retrieved Aug. 30, 2007, from http://www.foundrynet.com/pdf/an-global-server-load-bal.pdf, 7 pages.
“Grid Computing Solutions,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/software/grid, 3 pages.
“Grid Offerings,” Java.net, retrieved May 3, 2006, from http://wiki.java.net/bin/view/Sungrid/OtherGridOfferings, 8 pages.
“Recent Advances Boost System Virtualization,” eWeek.com, retrieved May 3, 2006, from http://www.eweek.com/article2/0,1772626,00.asp, 5 pages.
“Sun EDA Compute Ranch,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://sun.com/processors/ranch/brochure.pdf, 2 pages.
“Sun Microsystems Accelerates UltraSPARC Processor Design Program With New Burlington, Mass. Compute Ranch,” Nov. 6, 2002, Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/smi/Press/sunflash/2002-11/sunflash.20021106.3.xml, 2 pages.
“Sun N1 Grid Engine 6,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/software/gridware/index.xml, 3 pages.
“Sun Opens New Processor Design Compute Ranch,” Nov. 30, 2001, Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/smi/Press/sunflash/2001-11/sunflash.20011130.1.xml, 3 pages.
“The Softricity Desktop,” Softricity, Inc., retrieved May 3, 2006, from http://www.softricity.com/products/, 3 pages.
“Xen—The Xen Virtual Machine Monitor,” University of Cambridge Computer Laboratory, retrieved Nov. 8, 2005, from http://www.cl.cam.ac.uk/Research/SRG
etos/xen/, 2 pages.
“XenFaq,” retrieved Nov. 8, 2005, from http://wiki.xensource.com/xenwiki/XenFaq?action=print, 9 pages.
Abi, Issam, et al., “A Business Driven Management Framework for Utility Computing Environments,” Oct. 12, 2004, HP Laboratories Bristol, HPL-2004-171, retrieved Aug. 30, 2007, from http://www.hpl.hp.com/techreports/2004/HPL-2004-171.pdf, 14 pages.
Clark, C., “Live Migration of Virtual Machines,” May 2005, NSDI '05: 2ndSymposium on Networked Systems Design and Implementation, Boston, MA May 2-4, 2005, retrieved from http://www.usenix.org/events
sdi05/tech/full—papers/clark/clark.pdf, 14 pages.
Demers, A., “Epidemic Algorithms for Replicated Database Maintenance,” 1987, Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing, Vancouver, British Columbia, Canada, Aug. 10-12, 1987, 12 pages.
Gruener, J., “A Vision of Togetherness,” May 24, 2004, Network World, retrieved May 3, 2006, from, http://www.networkworld.com/supp/2004
dc3/0524virt.html, 9 pages.
Joseph, Joshy, et al., “Introduction to Grid Computing,” Apr. 16, 2004, retrieved Aug. 30, 2007, from http://www.informit.com/articles/printerfriendly.aspx?p=169508, 19 pages.
Shankland, S., “Sun to Buy Start-Up to Bolster N1,” Jul. 30, 2003, CNet News.com, retrieved May 3, 2006, http:/
ews.zdnet.com/2100-3513—22-50557752.html, 8 pages.
Van Renesse, R., “Astrolabe: A Robust and Scalable Technology for Distributed System Monitoring, Management, and Data Mining,” May 2003,ACM Transactions on Computer Systems(TOCS), 21(2):164-206, 43 pages.
Vijayan, J., “Terraspring Gives Sun's N1 a Boost,” Nov. 25, 2002, Computerworld, retrieved May 3, 2006, from http://www.computerworld.com/printthis/2002/0,4814,76159,00.html, 3 pages.
Virtual Iron Software Home, Virtual Iron®, retrieved May 3, 2006, from http://www.virtualiron.com/, 1 page.
Waldspurger, C.A., “Spawn: A Distributed Computational Economy,” Feb. 1992,IEEE Transactions on Software Engineering, 18(2):103-117, 15 pages.
Zhu, Xiaoyun, et al., “Utility-Driven Workload Management Using Nested Control Design,” Mar. 29, 2006, HP Laboratories Palo Alto, HPL-2005-193(R.1), retrieved Aug. 30, 2007, from http://www.hpl.hp.com/techreports/2005/HPL-2005-193R1.pdf, 9 pages.
“Scalable Trust of Next Generation Management (STRONGMAN),” retrieved May 17, 2006, from http://www.cis.upenn.edu/˜dsl/STRONGMAN/, 4 pages.
“The Reverse Firewall™: Defeating DDoS Attacks Emerging from Local Area Networks,” Cs3, Inc., retrieved Nov. 11, 2005, from http://www.cs3-inc.com/rfw.html, 4 pages.
Bellovin, S., “Distributed Firewalls,” Nov. 1999, issue of ;login:, pp. 37-39, retrieved Nov. 11, 2005, from http://www.cs.columbia.edu/˜smb/papers/distfw.html, 10 pages.
Blaze, M., “Using the KeyNote Trust Management System,” Mar. 1, 2001, retrieved May 17, 2006, from http://www.crypto.com/trustmgt/kn.html, 4 pages.
Brenton, C., “What is Egress Filtering and How Can I Implement It?—Egress Filtering v 0.2,” Feb. 29, 2000, SANS Institute, http://www.sans.org/infosecFAQ/firewall/egress.htm, 6 pages.
Coulson, D., “Network Security Iptables,” Apr. 2003, Linuxpro, Part 2, retrieved from http://davidcoulson.net/writing/lxf/39/iptables.pdf, 4 pages.
Coulson, D., “Network Security Iptables,” Mar. 2003, Linuxpro, Part 1, retrieved from http://davidcoulson.net/writing/lxf/38/iptables.pdf, 4 pages.
Ioannidis, S., “Implementing a Distributed Firewall,” Nov. 2000, (ACM) Proceedings of the ACM Computer and Communications Security (CCS) 2000, Athens, Greece, pp. 190-199, retrieved from http://www.cis.upenn.edu/˜dsl/STRONGMAN/Papers/df.pdf, 10 pages.
Kenshi, P., “Help File Library: Iptables Basics,” Justlinux, retrieved Dec. 1, 2005, from http://www.justlinux.com
hf/Security/Iptables—Basics.html, 4 pages.
Strand, L., “Adaptive distributed firewall using intrusion detection,” Nov. 1, 2004, University of Oslo Department of Informatics, retrieved Mar. 8, 2006, from http://gnist.org/˜lars/studies/master/StrandLars-master.pdf, 158 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Executing programs based on user-specified constraints does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Executing programs based on user-specified constraints, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Executing programs based on user-specified constraints will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2680457

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.