Abstract:
A method may include identifying a virtualized application that has a read-only virtualization sublayer and a read-write virtualization sublayer. The read-only virtualization sublayer may represent a base state of the virtualized application and the read-write virtualization sublayer may be configured to store changes to the base state of the virtualized application. The method may also include determining a first difference between the read-only virtualization sublayer and the read-write virtualization sublayer at a first point in time and using the first difference between the read-only virtualization sublayer and the read-write virtualization sublayer to create a first snapshot that represents a state of the virtualized application at the first point in time. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosure is directed to dynamic insertion and removal of virtual software sub-layers. In one example, a virtual layer associated with a software application is virtually installed and activated in a computing device. A virtual sub-layer associated with a component of the software application is dynamically inserted in the virtual layer. The virtual layer remains active during the dynamic insertion of the virtual sub-layer. In certain embodiments, a process is executed from the virtual layer, a determination is made as to whether the process launched before or after the insertion of the virtual sub-layer, and the inserted virtual sub-layer is selectively made visible or invisible to the process based on the determination.
Abstract:
A directory services system includes a resource object, such as an application object for accessing a resource associated with the resource object. Attributes of the resource object contain licensing control information. The licensing attributes may be used by executables to control access by a user to properly licensed instances of a resource corresponding to the resource object. Also, a utility may be provided to manage the licensing attributes in the resource object. A licensing function may thus control a resource, via its resource object in the directory services database. Licensing maybe easily implemented by setting a new disabling attribute in the object.
Abstract:
The disclosure is directed to dynamic insertion and removal of virtual software sub-layers. In one example, a virtual layer associated with a software application is virtually installed and activated in a computing device. A virtual sub-layer associated with a component of the software application is dynamically inserted in the virtual layer. The virtual layer remains active during the dynamic insertion of the virtual sub-layer. In certain embodiments, a process is executed from the virtual layer, a determination is made as to whether the process launched before or after the insertion of the virtual sub-layer, and the inserted virtual sub-layer is selectively made visible or invisible to the process based on the determination.
Abstract:
A computer-implemented method for replacing sensitive information stored within non-secure environments with secure references to the same may include (1) identifying sensitive information stored within a non-secure environment on a computing device, (2) removing the sensitive information from the non-secure environment, (3) storing the sensitive information within a secure environment, (4) replacing the sensitive information originally stored within the non-secure environment with a reference that identifies the sensitive information stored within the secure environment, (5) identifying a request to access at least a portion of the sensitive information identified in the reference, (6) determining that at least a portion of the request satisfies a data-loss-prevention policy, and then (7) providing access to at least a portion of the sensitive information via the secure environment. Various other systems, methods, and computer-readable media are also disclosed.
Abstract:
A computer-implemented method for classifying files may include identifying data to be written to a file on a storage system. The method may also include, before the data is written to the storage system, 1) identifying a characteristic of the data, 2) determining, based on the characteristic of the data, a classification for the file, and 3) using the classification of the file to select a location within the storage system where the file should be stored. The method may further include writing the data to the file at the selected location within the storage system. Various other methods, systems, and computer-readable media are also disclosed herein.
Abstract:
The disclosure is directed to feature based software virtualization. In one example, a first virtual sub-layer associated with a first feature set of a software package is virtually installed to a computing device. The first feature set includes a first subset of features associated with the software package. The first virtual sub-layer is enabled to activate the first feature set. A second virtual sub-layer associated with a second feature set of the software package is virtually installed to the computing device. The second feature set includes a second subset of the features associated with the software package. The second virtual sub-layer is enabled to activate the second feature set. In certain embodiments, a first fee is charged for the first feature set and a second fee is charged for the second feature set.
Abstract:
The disclosure is directed to systems and methods for patching computer programs. In one example, a patch is virtually installed to a computing device having a base file system and configuration, a computer program, and a patch layering subsystem. The virtual installation may include storing content of the patch to a patch layer, and generating and storing mapping data defining at least one relationship between the content in the patch layer and content in the base file system and configuration. The virtually installed patch may be enabled, including applying the mapping data to the patch layering subsystem such that the patch layering subsystem is configured for selectively redirecting access requests from the base file system and configuration to the patch layer. In certain embodiments, the enabled patch may be disabled by reversing the application of the mapping data to the patch layering subsystem.
Abstract:
A method may include identifying a first version of a virtualized application. The first version of the virtualized application may include a first read-only virtualization sublayer, and the first read-only virtualization sublayer may provide a base state of the first version of the virtualized application. The method may also include identifying a second version of the virtualized application. The second version of the virtualized application may include a second read-only virtualization sublayer, which may provide a base state of the second version of the virtualized application. The method may further include determining a difference between the first read-only virtualization sublayer and the second read-only virtualization sublayer and using the difference to create a patch configured to update an instance of the first version of the virtualized application to an instance of the second version of the virtualized application. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
Systems and methods for delivery of user profile data are disclosed. An exemplary method includes detecting a request for a full copy of a user profile data package maintained by a user profile data source subsystem, creating an illusion that the request has been fulfilled, and copying on demand a portion of the user profile data package from the source subsystem to a target location for access by a data consuming subsystem. In certain embodiments, the method further includes utilizing the copied portion of the user profile data package for execution of a computing operation, without fully copying the user profile data package from the source subsystem. In certain embodiments, the portion of the user profile data package is streamed from the source subsystem to the target location over a network connection.