摘要:
A system for provisioning, allocating, and managing virtual and physical desktop computers in an enterprise network computing environment allows for these physical and desktop computers to be grouped logically based on personnel, organizational, or networking efficiencies without regard to the hardware or server that will ultimately run the virtual machine terminal once it is accessed. A connection broker connects incoming connections to one desktop in a desktop group, based on information relating to that incoming connection.
摘要:
Disclosed herein are systems, methods, and devices for testing deduplication repositories. Methods may include identifying a storage location based on a request for one or more data values associated with a read-only file system, where the read-only file system is a simulated file system, and where the storage location is identified based on a plurality of request parameters included in the request. The methods may also include generating, using a processor and responsive to the request, the one or more data values based on the plurality of request parameters and a plurality of configuration parameters, where the plurality of configuration parameters enable deterministic generation of all data values stored in the tile system. The methods may further include returning the one or more data values as a result of the request.
摘要:
In one embodiment, a method includes identifying a plurality of period combinations for a metric of interest. Each period combination comprises one or more time periods and each of the one or more time periods comprises one or more segments. The method further includes, for each period combination of the plurality of period combinations and each historical value of a plurality of historical values of the metric of interest, incrementally inserting the historical value into corresponding segments of the one or more time periods. Moreover, the method includes ranking the plurality of period combinations based on comparisons of the plurality of historical values to sets of corresponding predicted values. The method also includes selecting a highest-ranked period combination as best characterizing the metric of interest.
摘要:
Systems and methods for blind data leak prevention are provided. A first computer can determine if encrypted data matches a rule even without the encryption key used to encrypt the data. The first computer may encrypt the rule with a second encryption key and send the encrypted rule to a second computer, which may then encrypt the rule with the first encryption key—that is inaccessible to the first computer—and send the doubly encrypted rule back to the first computer. The first computer can then partially decrypt the rule using the second encryption key. The second computer can then encrypt data with the first encryption key and send to the first computer. The first computer can then determine if the partially encrypted rule matches the encrypted data.
摘要:
In one embodiment, a method includes registering as a listener for availability notifications from at least one low-availability device. The method further includes determining a data-collection schedule of the at least one low-availability device. In addition, the method includes maintaining a prioritized queue comprising required data items needed from the at least one low-availability device. Also, the method includes preparing, in advance of the at least one low-availability device becoming available, a request for at least one required data item. The at least one required data item includes a highest-priority data item in the prioritized queue. The method additionally includes, responsive to a notification that the at least one low-availability device is available, transmitting the request to the at least one low-availability device.
摘要:
In one embodiment, a method includes continuously receiving time-series data for end-user transactions occurring on one or more monitored systems. The method further includes continuously processing and storing the time-series data in a plurality of virtual machines. In addition, the method includes, responsive to a determined time-series-data burst, spawning one or more temporary virtual machines. Moreover, the method includes, during the determined time-series-data burst, continuously processing and storing the time-series data in the plurality of virtual machines and in the one or more temporary virtual machines. The method also includes, responsive to a determined conclusion of the determined time-series-data burst, causing the one or more temporary virtual machines to transition to a passive state in which the one or more temporary virtual machines cease processing and storing new time-series data but make previously-stored time-series data available for access.
摘要:
In one embodiment, a method is performed by a computer system. The method includes creating an integrated topology model (ITM) instance of interconnected topology objects. The ITM instance includes a physical infrastructure topology model (PITM) instance comprising first interconnected topology objects, a virtual infrastructure topology model (VITM) instance comprising second interconnected topology objects, a network service topology model (NSTM) instance comprising third interconnected topology objects and inter-model linking information. The method also includes generating dependencies between the interconnected topology objects of the ITM instance based, at least in part, on the inter-model linking information. Further, the method includes generating a dependency graph based, at least in part, on the dependencies. The method also includes outputting at least a portion of the dependency graph for presentation to a user.
摘要:
In one embodiment, a method includes receiving a data-transformation request in relation to a visualization of a first dataset, wherein the data-transformation request expresses at least one transformation of the first dataset without using Structured Query Language (SQL) syntax, wherein the visualization is characterized by a first SQL statement. In addition, the method includes automatically determining based, at least in part, on a mapping of the visualization to the first SQL statement, a second SQL statement operable to return a second dataset. Further, the method includes causing the second SQL statement to be executed on one or more databases. Moreover, the method includes receiving, in response to the causing, the second dataset. The method also includes updating the visualization to reflect the second dataset.
摘要:
In one embodiment, a method is performed by a computer system. The method includes receiving a trigger to setup a target resource for remote control at a management system, wherein an operating system of the target resource enforces a transactional installation process for new software, wherein the operating system designates user-writable storage. The method further includes, responsive to the trigger, retrieving prerequisite client-side software of the management system. In addition, the method includes creating a remote connection to the target resource using an encrypted network protocol. Further, the method includes copying, via the remote connection, the prerequisite client-side software to the user-writable storage. Moreover, the method includes causing the copied prerequisite client-side software to be installed in the user-writable storage of the target resource, thereby bypassing the transactional installation process of the operating system of the target resource.
摘要:
In an embodiment, a method includes accessing a call tree for a transaction, wherein the call tree traces routines called during execution of the transaction. The method further includes generating a graphical representation of the call tree in relation to two or more performance properties. In addition, the method includes causing the graphical representation of the call tree to be displayed. Further, the method includes allowing a user to graphically select a group of routines from the graphical representation of the call tree. In addition, the method includes creating a filtered call tree comprising the graphically selected group of routines. Furthermore, the method includes generating a drill-down visualization of the filtered call tree. The method also includes causing the drill-down visualization to be displayed.