-
公开(公告)号:US20240078179A1
公开(公告)日:2024-03-07
申请号:US17929197
申请日:2022-09-01
Applicant: VMware, Inc.
Inventor: Jiaqi ZUO , Junlong Gao , Wenguang Wang , Eric Knauft , Hardik Singh Negi
IPC: G06F12/0804 , G06F12/0882
CPC classification number: G06F12/0804 , G06F12/0882
Abstract: A method for efficient write-back for journal truncation is provided. A method includes maintaining a journal in a memory of a computing system including a plurality of records. Each record indicates a transaction associated with one or more pages in an ordered data structure and maintaining a dirty list including an entry for each page indicated by a record in the journal. Each entry in the dirty list includes a respective first log sequence number (LSN) associated with a least recent record of the plurality of records that indicates the page and a respective second LSN associated with a most recent record of the plurality of records that indicates the page. The method includes determining to truncate the journal. The method includes identifying one or more records, of the plurality of records, from the journal to write back to a disk, where the identifying is based on the dirty list.
-
公开(公告)号:US20240078126A1
公开(公告)日:2024-03-07
申请号:US18139892
申请日:2023-04-26
Applicant: VMware, Inc.
Inventor: Yaron Halperin , Jad Chamcham , Christian Matthew Leroy , Gerald Cheong , Matthew Eccleston , Ji Feng
CPC classification number: G06F9/45558 , G06F9/452 , G06F9/45537 , G06F9/4856 , H04L63/10 , H04L67/10 , G06F2009/45575 , G06F2009/45583 , G06F2009/45595
Abstract: A server-based desktop-virtual machines architecture may be extended to a client machine. In one embodiment, a user desktop is remotely accessed from a client system. The remote desktop is generated by a first virtual machine running on a server system, which may comprise one or more server computers. During execution of the first virtual machine, writes to a corresponding virtual disk are directed to a delta disk file or redo log. A copy of the virtual disk is created on the client system. When a user decides to “check out” his or her desktop, the first virtual machine is terminated (if it is running) and a copy of the delta disk is created on the client system. Once the delta disk is present on the client system, a second virtual machine can be started on the client system using the virtual disk and delta disk to provide local access to the user's desktop at the client system. This allows the user to then access his or her desktop without being connected to a network.
-
公开(公告)号:US20240073742A1
公开(公告)日:2024-02-29
申请号:US18100381
申请日:2023-01-23
Applicant: VMware, Inc.
Inventor: Daniel J. Beveridge
CPC classification number: H04W28/0942 , H04W28/0273
Abstract: Some embodiments provide a novel method for connecting one or more vehicles to a software defined wide area network (SD-WAN). The method deploys an edge router to operate in the vehicle, and configures the edge router to connect to several wireless network links (e.g., 5G cellular links) operating in the vehicle. In some embodiments, the different wireless network links are different mobile hotspot links provided by different telecommunication network providers (e.g., AT&T, Verizon, T-Mobile, Orange, etc.). The method configures the edge router to forward several data message flows from a device operating in the vehicle (e.g., a computer located in the vehicle or a machine (e.g., virtual machine, Pod, container, etc.) executing on a computer located in the vehicle) to the SD-WAN using the several telecommunications network links.
-
公开(公告)号:US20240070322A1
公开(公告)日:2024-02-29
申请号:US17899364
申请日:2022-08-30
Applicant: VMware, Inc.
Inventor: Anant L. Bobde , Ankur Gupta , Ishaan Banerjee , Anima Jain
IPC: G06F21/62
CPC classification number: G06F21/6254
Abstract: System and method for anonymizing logs generated in applications running in a computing environment detects log data being generated in an application and compares the log data to a set of predefined search pattern policies to find sensitive information contained in the log data. The sensitive information contained in the log data is converted into anonymous information to produce anonymized log data within the application. The anonymized log data is then written to a destination.
-
公开(公告)号:US20240069981A1
公开(公告)日:2024-02-29
申请号:US17899288
申请日:2022-08-30
Applicant: VMware, Inc.
Inventor: Kalyan DEVARAKONDA , Praveen TIRUMANYAM
CPC classification number: G06F9/5077 , G06F9/45558 , G06F2009/45575 , G06F2009/45595
Abstract: A method of delivering cloud services from a cloud platform to management appliances of one or more software-defined data centers (SDDCs) through recipe execution agents running on an agent platform appliance, includes the steps of: downloading a first recipe corresponding to a first event initiated by a first cloud service, wherein the first event is associated with a task to be performed for the first cloud service; and executing first commands defined in the downloaded first recipe in one of the recipe execution agents to perform a task of the first cloud service on a first management appliance, said executing of the first commands in the one of the recipe execution agents including transmitting a first command to the first management appliance, receiving a first response from the first management appliance, and reporting the first response to the cloud platform.
-
公开(公告)号:US20240069948A1
公开(公告)日:2024-02-29
申请号:US17896718
申请日:2022-08-26
Applicant: VMware, Inc.
Inventor: Alexander Julian THOMAS , Amit CHOPRA , Anjali MANGAL , Xiaosheng WU , Ereli ERAN
IPC: G06F9/455
CPC classification number: G06F9/45558 , G06F2009/4557 , G06F2009/45583 , G06F2009/45595
Abstract: Mapping of applications by the most common file path in which they are installed or found to be running. Embodiments of the disclosure may determine the most commonly occurring hash values appearing in events generated by a virtualized network. These most commonly occurring hash values may correspond to the hash values of file paths associated with the greatest number of detected events. The database may then be queried to determine the most commonly occurring file path for each of these hash values. A table of such most commonly occurring file paths and their associated hash values may then be compiled and stored. Use of the most commonly occurring file path in lieu of an alert's actual file path may prevent undesired or malicious processes from going undetected by simply adopting a new file path that has yet to be recognized as being associated with undesired behavior.
-
公开(公告)号:US11916950B1
公开(公告)日:2024-02-27
申请号:US17228027
申请日:2021-04-12
Applicant: VMware, Inc.
Inventor: Sean Huntley , Akeem Jenkins , Marc Wayne Brotherson
CPC classification number: H04L63/1433
Abstract: The disclosure provides an approach for coordinating a distributed vulnerability network scan. Embodiments include sending, by a computing node, a check-in message to a scanning coordinator, the check-in message indicating attributes of the computing node. Embodiments include receiving, by the computing node, a scan configuration message from the scanning coordinator, the scan configuration message comprising: scan timing information for the computing node; and a list of scanning targets for the computing node. Embodiments include determining, by the computing node, a scanning time window based on the scan timing information for the computing node. Embodiments include scanning, by the computing node, one or more scanning targets in the list of scanning targets for the computing node during the scanning time window.
-
108.
公开(公告)号:US11915049B2
公开(公告)日:2024-02-27
申请号:US16953202
申请日:2020-11-19
Applicant: VMware, Inc.
Inventor: Fangyuan Li
CPC classification number: G06F9/50 , G06F9/45558 , G06F9/542 , G06F2009/4557
Abstract: A method and apparatus for autoscaling a custom resource of a containerized application handling system utilizes a metric value defined for a system object of the custom resource to scale the system object of the custom resource. An API request for the metric value is sent from an autoscaler to a control plane of the containerized application handling system to receive the metric value, which is compared to a desired metric value. A target scale metric value is then determined based on the comparison and posted in a database of the containerized application handling system. The system object of the custom resource is scaled by an operator of the containerized application handling system based on the posted target scale metric value.
-
公开(公告)号:US11907742B2
公开(公告)日:2024-02-20
申请号:US16838573
申请日:2020-04-02
Applicant: VMware, Inc.
Inventor: Brian Masao Oki , Venkata N. V. Mukkavilli , Swapnil Dattatraya Tiwari , Vasantha K. Tammana
CPC classification number: G06F9/45558 , G06F9/547 , H04L12/4679 , H04L12/66 , H04L41/20 , H04L61/5007 , G06F2009/45595
Abstract: An example method of orchestrating a software-defined (SD) network layer of a virtualized computing system is described, the virtualized computing system including a host cluster, a virtualization management server, and a network management server each connected to a physical network, the host cluster having hosts and a virtualization layer executing on hardware platforms of the hosts. The method includes receiving, at the virtualization management server, a declarative specification describing a proposed state of an SD network for the host cluster, deploying, by the virtualization management server, virtualized infrastructure components in the host cluster in response to the proposed state in the declarative specification, and deploying, by the virtualization management server in cooperation with the network management server, logical network services supported by the virtualized infrastructure components in response to the proposed state in the declarative specification.
-
公开(公告)号:US11900099B2
公开(公告)日:2024-02-13
申请号:US17741496
申请日:2022-05-11
Applicant: VMWARE, INC.
Inventor: Tomo Vladimirov Simeonov , Ivaylo Radoslavov Radev , Roman Romanov Petrov , George Daskalov , Andrey Karabelyov , Dimitar Dimitrov , Denis Denislavov Belinov , Vladislav Milenov Atanasov , Ramesh Vepuri Lakshminarayana
IPC: G06F8/65
CPC classification number: G06F8/65
Abstract: A method of upgrading an application in a software-defined data center (SDDC) includes: deploying, by lifecycle management software executing in the SDDC, a second appliance, a first appliance executing services of the application at a first version, the second appliance having services of the application at a second version, the services in the first appliance being active and the services in the second appliance being inactive; expanding, by the lifecycle management software, state of the first appliance to support both the services at the first version and the services at the second version; replicating, by the lifecycle management software, the state of the first appliance to the second appliance; performing, by the lifecycle management software, a switchover to stop the services of the first appliance and start the services of the second appliance; and contracting, by the lifecycle management software, state of the second appliance to remove a portion unused by the services at the second version.
-
-
-
-
-
-
-
-
-