Abstract:
Methods, systems and computer readable media for efficient state change support for hierarchical data models in a virtualized system are described. In some implementations, the method can include determining a system status including a system-level bit masked word having a plurality of bits, each bit corresponding to a status of a different hierarchical level of the system, and receiving a change notification. The method can also include querying an entity at a lower hierarchy level if a cascaded state change is identified for that entity. The method can further include continuing to query one or more entities in successively lower hierarchy levels so long as a cascaded state change is identified for a corresponding entity in a lower hierarchy level. The method can also include determining the current status for one or more entities having a changed status. Identifying a cascaded state change can include performing a logical exclusive OR operation on a previous status bit masked word and a current status bit masked word of an entity.
Abstract:
Methods, systems and computer readable media for efficient state change support for hierarchical data models in a virtualized system are described. In some implementations, the method can include determining a system status including a system-level bit masked word having a plurality of bits, each bit corresponding to a status of a different hierarchical level of the system, and receiving a change notification. The method can also include querying an entity at a lower hierarchy level if a cascaded state change is identified for that entity. The method can further include continuing to query one or more entities in successively lower hierarchy levels so long as a cascaded state change is identified for a corresponding entity in a lower hierarchy level. The method can also include determining the current status for one or more entities having a changed status. Identifying a cascaded state change can include performing a logical exclusive OR operation on a previous status bit masked word and a current status bit masked word of an entity.
Abstract:
Embodiments disclosed herein provide systems and methods for hash based management of a communication network. In a particular embodiment, a method provides receiving a plurality of hashes for a plurality of network elements, wherein each hash of the plurality of hashes represents at least one attribute associated with at least one network element of the plurality of network elements and the plurality of hashes includes a first hash for a first network element of the plurality of network elements. After receiving the plurality of hashes, the method provides receiving a second hash for the first network element and determining whether the second hash matches the first hash. In response to determining that the second hash does not match the first hash, the method provides determining at least one attribute associated with the first network element.
Abstract:
Methods, systems and computer readable media for efficient state change support for hierarchical data models in a virtualized system are described. In some implementations, the method can include determining a system status including a system-level bit masked word having a plurality of bits, each bit corresponding to a status of a different hierarchical level of the system, and receiving a change notification. The method can also include querying an entity at a lower hierarchy level if a cascaded state change is identified for that entity. The method can further include continuing to query one or more entities in successively lower hierarchy levels so long as a cascaded state change is identified for a corresponding entity in a lower hierarchy level. The method can also include determining the current status for one or more entities having a changed status. Identifying a cascaded state change can include performing a logical exclusive OR operation on a previous status bit masked word and a current status bit masked word of an entity.
Abstract:
Disclosed is a system and method for selection of objects appearing in a rotational user interface list. A rotational list in a user interface is enabled to provide text, images, icons, links and scrolling abilities to either end to make components visible or invisible. The rotational list can be made to incorporate variable size icons or images and spacing can be adjusted. A rotational list may respond to priority settings and preferences to provide priority positioning in a geometric shape. Higher priority items may ascent to a narrower portion of the geometric shape and lower priority items may descend to a broader portion of the geometric shape.
Abstract:
In some implementations, a method can include determining a virtual machine (VM) inventory baseline of a system, including identifying VMs in a baseline configuration and generating a VM fingerprint for each VM in the inventory baseline, and detecting a user onboarded VM and moving the user onboarded VM to a quarantine operating area for a period of time. The operational posture of the user onboarded VM can be compared to an operational posture policy of the system. When the operational posture of the user onboarded VM meets the operational posture policy of the system, the user onboarded VM is moved from the quarantine area to an operational area, and, when the operational posture of the user onboarded system does not meet the operational policy posture of the system and the period of time has expired, the user onboarded VM is terminated.
Abstract:
Systems and methods of efficient software replication are provided. This is accomplished by a first communication device that determines if a second communication device needs to have a software upgrade. In response to determining that the second communication device needs to have the software upgrade, the software upgrade is downloaded onto the second communication device. In response to downloading the software upgrade onto the second communication device, the second communication device determines if a third communication device needs to have the software upgrade. In response to determining that the third communication device needs to have the software upgrade, the second communication device downloads the software upgrade to the third communication device. This process can be repeated for any number of communication devices or the process may be completed in different orders.