Virtualization and Cloud Infrastructure Optimization with Hardware Acceleration and Secure VM Migration (Deal 312)

This portfolio is generally related to virtualization. Disclosed are hardware accelerators in datacenters to increase computing efficiency and lower operating costs for parallelizable processes in their applications, techniques for managing resources in a cloud computing environment and secure live migration of virtual machines in public clouds. Techniques are disclosed to integrate hardware accelerators in a datacenter by receiving a customer accelerator block and a hardware accelerator configuration, retrieve a digital file, provide programmable hardware processor to a virtual machine (VM) and monitor accelerator usage. The system physically connects multiple input nodes and output nodes of the programmable hardware processor as specified in the customer accelerator block to multiple input nodes and output nodes of the programmable hardware processor specified in the second accelerator block and provide the programmable hardware processor to a virtual machine executing in the datacenter which is associated with the datacenter customer account. The system monitors the use of the hardware accelerator by the virtual machine at the datacenter to charge the datacenter customer account for use of the second accelerator block. Few patents disclose an improved technique to assign a VM to a physical machine (PM) by sorting multiple VMs based on a dominant resource requirement and PMs based on a power efficiency attribute. The system selects the PM and the VM, allocates the VM to PM and discontinue assignment of the VM to PM when PM’s residual capacity attribute is less than a threshold. Further, disclosed are techniques for live migration of virtual machines in public clouds by incorporating hidden processes in a virtual machine’s kernel and a trusted wireless or wired service to inform the cloud provider or cloud user about possible virtual machine hijacking/theft. The provider or user may also be provided with an approximate physical location of the platform running the compromised virtual machine for further investigation and enforcement measures. The technology may be implemented in virtualization applications, datacenters, cloud applications, cloud services and infrastructure, online services, etc.

How Can We Help?