SYSTEM FOR PROVISIONING, ALLOCATING, AND MANAGING VIRTUAL AND PHYSICAL DESKTOP COMPUTERS IN A NETWORK COMPUTING ENVIRONMENT
    121.
    发明申请
    SYSTEM FOR PROVISIONING, ALLOCATING, AND MANAGING VIRTUAL AND PHYSICAL DESKTOP COMPUTERS IN A NETWORK COMPUTING ENVIRONMENT 有权
    在网络计算环境中提供,分配和管理虚拟和物理桌面计算机的系统

    公开(公告)号:US20140040354A1

    公开(公告)日:2014-02-06

    申请号:US14047562

    申请日:2013-10-07

    发明人: Peter E. Ghostine

    IPC分类号: H04L29/06

    摘要: A system for provisioning, allocating, and managing virtual and physical desktop computers in an enterprise network computing environment allows for these physical and desktop computers to be grouped logically based on personnel, organizational, or networking efficiencies without regard to the hardware or server that will ultimately run the virtual machine terminal once it is accessed. A connection broker connects incoming connections to one desktop in a desktop group, based on information relating to that incoming connection.

    摘要翻译: 用于在企业网络计算环境中配置,分配和管理虚拟和物理桌面计算机的系统允许将这些物理和台式计算机按照人员,组织或网络效率进行逻辑分组,而不考虑将最终的硬件或服务器 访问虚拟机终端后,运行虚拟机终端。 连接代理根据与该传入连接相关的信息将进入连接连接到桌面组中的一个桌面。

    Read-only file system for testing de-duplication

    公开(公告)号:US10783118B2

    公开(公告)日:2020-09-22

    申请号:US15009617

    申请日:2016-01-28

    IPC分类号: G06F16/00 G06F16/174

    摘要: Disclosed herein are systems, methods, and devices for testing deduplication repositories. Methods may include identifying a storage location based on a request for one or more data values associated with a read-only file system, where the read-only file system is a simulated file system, and where the storage location is identified based on a plurality of request parameters included in the request. The methods may also include generating, using a processor and responsive to the request, the one or more data values based on the plurality of request parameters and a plurality of configuration parameters, where the plurality of configuration parameters enable deterministic generation of all data values stored in the tile system. The methods may further include returning the one or more data values as a result of the request.

    Data metric resolution ranking system and method

    公开(公告)号:US10586189B2

    公开(公告)日:2020-03-10

    申请号:US14014637

    申请日:2013-08-30

    IPC分类号: G06Q10/00 G06Q10/06 G06N5/02

    摘要: In one embodiment, a method includes identifying a plurality of period combinations for a metric of interest. Each period combination comprises one or more time periods and each of the one or more time periods comprises one or more segments. The method further includes, for each period combination of the plurality of period combinations and each historical value of a plurality of historical values of the metric of interest, incrementally inserting the historical value into corresponding segments of the one or more time periods. Moreover, the method includes ranking the plurality of period combinations based on comparisons of the plurality of historical values to sets of corresponding predicted values. The method also includes selecting a highest-ranked period combination as best characterizing the metric of interest.

    Blind cloud data leak protection
    124.
    发明授权

    公开(公告)号:US10397193B2

    公开(公告)日:2019-08-27

    申请号:US15206805

    申请日:2016-07-11

    发明人: Hui Ling Zhong Chen

    IPC分类号: H04L29/06 G06F21/62

    摘要: Systems and methods for blind data leak prevention are provided. A first computer can determine if encrypted data matches a rule even without the encryption key used to encrypt the data. The first computer may encrypt the rule with a second encryption key and send the encrypted rule to a second computer, which may then encrypt the rule with the first encryption key—that is inaccessible to the first computer—and send the doubly encrypted rule back to the first computer. The first computer can then partially decrypt the rule using the second encryption key. The second computer can then encrypt data with the first encryption key and send to the first computer. The first computer can then determine if the partially encrypted rule matches the encrypted data.

    System and method for collecting data from low-availability devices

    公开(公告)号:US10291490B1

    公开(公告)日:2019-05-14

    申请号:US14178165

    申请日:2014-02-11

    IPC分类号: G06F15/173 H04L12/26

    摘要: In one embodiment, a method includes registering as a listener for availability notifications from at least one low-availability device. The method further includes determining a data-collection schedule of the at least one low-availability device. In addition, the method includes maintaining a prioritized queue comprising required data items needed from the at least one low-availability device. Also, the method includes preparing, in advance of the at least one low-availability device becoming available, a request for at least one required data item. The at least one required data item includes a highest-priority data item in the prioritized queue. The method additionally includes, responsive to a notification that the at least one low-availability device is available, transmitting the request to the at least one low-availability device.

    Systems and methods for archiving time-series data during high-demand intervals

    公开(公告)号:US10228958B1

    公开(公告)日:2019-03-12

    申请号:US14562502

    申请日:2014-12-05

    IPC分类号: G06F9/455 G06F9/48 G06F17/30

    摘要: In one embodiment, a method includes continuously receiving time-series data for end-user transactions occurring on one or more monitored systems. The method further includes continuously processing and storing the time-series data in a plurality of virtual machines. In addition, the method includes, responsive to a determined time-series-data burst, spawning one or more temporary virtual machines. Moreover, the method includes, during the determined time-series-data burst, continuously processing and storing the time-series data in the plurality of virtual machines and in the one or more temporary virtual machines. The method also includes, responsive to a determined conclusion of the determined time-series-data burst, causing the one or more temporary virtual machines to transition to a passive state in which the one or more temporary virtual machines cease processing and storing new time-series data but make previously-stored time-series data available for access.

    Systems and methods for multilayer monitoring of network function virtualization architectures

    公开(公告)号:US10187260B1

    公开(公告)日:2019-01-22

    申请号:US14725778

    申请日:2015-05-29

    摘要: In one embodiment, a method is performed by a computer system. The method includes creating an integrated topology model (ITM) instance of interconnected topology objects. The ITM instance includes a physical infrastructure topology model (PITM) instance comprising first interconnected topology objects, a virtual infrastructure topology model (VITM) instance comprising second interconnected topology objects, a network service topology model (NSTM) instance comprising third interconnected topology objects and inter-model linking information. The method also includes generating dependencies between the interconnected topology objects of the ITM instance based, at least in part, on the inter-model linking information. Further, the method includes generating a dependency graph based, at least in part, on the dependencies. The method also includes outputting at least a portion of the dependency graph for presentation to a user.

    Systems and methods for transforming datasets

    公开(公告)号:US10157234B1

    公开(公告)日:2018-12-18

    申请号:US14633826

    申请日:2015-02-27

    IPC分类号: G06F17/30

    摘要: In one embodiment, a method includes receiving a data-transformation request in relation to a visualization of a first dataset, wherein the data-transformation request expresses at least one transformation of the first dataset without using Structured Query Language (SQL) syntax, wherein the visualization is characterized by a first SQL statement. In addition, the method includes automatically determining based, at least in part, on a mapping of the visualization to the first SQL statement, a second SQL statement operable to return a second dataset. Further, the method includes causing the second SQL statement to be executed on one or more databases. Moreover, the method includes receiving, in response to the causing, the second dataset. The method also includes updating the visualization to reflect the second dataset.

    Systems and methods of configuring managed resources

    公开(公告)号:US10140108B1

    公开(公告)日:2018-11-27

    申请号:US14970186

    申请日:2015-12-15

    发明人: Daniel A. Ford

    摘要: In one embodiment, a method is performed by a computer system. The method includes receiving a trigger to setup a target resource for remote control at a management system, wherein an operating system of the target resource enforces a transactional installation process for new software, wherein the operating system designates user-writable storage. The method further includes, responsive to the trigger, retrieving prerequisite client-side software of the management system. In addition, the method includes creating a remote connection to the target resource using an encrypted network protocol. Further, the method includes copying, via the remote connection, the prerequisite client-side software to the user-writable storage. Moreover, the method includes causing the copied prerequisite client-side software to be installed in the user-writable storage of the target resource, thereby bypassing the transactional installation process of the operating system of the target resource.

    Systems and methods for graphically filtering code call trees

    公开(公告)号:US09996577B1

    公开(公告)日:2018-06-12

    申请号:US14619897

    申请日:2015-02-11

    IPC分类号: G06F17/30 G06F3/0484

    CPC分类号: G06F17/30371 G06F3/04842

    摘要: In an embodiment, a method includes accessing a call tree for a transaction, wherein the call tree traces routines called during execution of the transaction. The method further includes generating a graphical representation of the call tree in relation to two or more performance properties. In addition, the method includes causing the graphical representation of the call tree to be displayed. Further, the method includes allowing a user to graphically select a group of routines from the graphical representation of the call tree. In addition, the method includes creating a filtered call tree comprising the graphically selected group of routines. Furthermore, the method includes generating a drill-down visualization of the filtered call tree. The method also includes causing the drill-down visualization to be displayed.