Abstract:
A system and method for performing an operational metric analysis for a virtual appliance uses application operational data from multiple instances of the virtual appliance. The application operational data is then used to generate an operational metric prediction for the virtual appliance.
Abstract:
In a computer-implemented method to facilitate administration of a virtualization infrastructure, operational conditions of members of the virtualization infrastructure are monitored, wherein the members of the virtualization infrastructure are mapped to a social network such that at least a portion of the members of the virtualization infrastructure are also members of the social network. A group of members of the virtualization infrastructure is created within the social network based at least in part on the operational conditions.
Abstract:
In a computer-implemented method for generating a graph of relative health of virtualization management servers, performance information of virtualization management servers of a virtualization infrastructure is accessed and the performance information is aggregated. A graph of relative health of the virtualization management servers based on the aggregating of the performance information for the virtualization server is generated, and the graph is posted to a social network of members of the virtualization infrastructure.
Abstract:
In a computer-implemented method to facilitate administration of a member of a network, performance of a member of a network is monitored by an agent, wherein members of the network are provided with access to a shared message stream such that the members of the network are able to monitor messages generated by other members of the network posted to the shared message stream. Responsive to the agent identifying a specific operational condition of the member, the shared message stream is monitored for a message related to the specific operational condition. Provided the shared message stream comprises a message related to the specific operational condition identified by the agent, an association of the message with an indication that the member identifies with the specific operational condition is established, wherein the agent is configured to establish the association.
Abstract:
A method for symmetric authentication is provided. This method includes generating a first challenge message containing a first string; encrypting the first challenge message; transmitting the encrypted first challenge message to a second device; receiving a first answer message from the second device; decrypting the first answer message; and authenticating the second device based on determining the decrypted first answer message contains the first string. Upon successful authentication of the second device, the method further includes receiving an encrypted second challenge message from the second device; decrypting the encrypted second challenge message; generating a second answer message containing a second string; encrypting the second answer message; and transmitting the encrypted second answer message to the second device.
Abstract:
Method and system for training a neural network. The neural network is split into first and second portions. A k-layer first portion is sent to a client training/inference engine and the second portion is retained by a server training/inference engine. At the splitting point, the kth layer is a one-way function in output computation has a number of nodes that are less than any other layer of the first portion. The client training/inference engine trains the first portion with input data in a set of training data. The server training/inference engine receives a batch of outputs from the client training and applies them to the second portion to train the entire neural network.
Abstract:
In a computer-implemented method to facilitate administration of a virtualization infrastructure, posted messages of members of a virtualization infrastructure are displayed, wherein the posted messages comprise tags identifying operational conditions of the members of the virtualization infrastructure. Responsive to a selection of a particular tag, the members of the virtualization infrastructure that posted a message comprising the particular tag are displayed.
Abstract:
Methods, systems, and computer programs for performing management tasks in a virtual infrastructure are presented. The method includes detecting a change, beyond a predetermined threshold, in a number of tasks waiting to be processed by a plurality of management modules executing as execution environments in the virtual infrastructure, each of the plurality of management modules being a management execution environments for the managed objects. If the detected change is a decrease, the method includes selecting one or more of the management modules to be removed and distributing managed objects handled by the selected management modules to one or more non-selected management modules. If the detected change is an increase, the method includes spawning one or more additional management modules executing as execution environments and distributing selected managed objects from the existing management modules to the additional management modules.
Abstract:
Methods, systems, and computer programs for performing management tasks in a virtual infrastructure are presented. The method includes detecting a decrease, below a predetermined threshold, in a number of tasks waiting to be processed by a plurality of virtual centers (VCs) executing as virtual machines (VMs) in a virtual infrastructure, wherein each of the plurality of VCs is a management VM for the managed objects of the virtual infrastructure. The method further includes, based on the detected decrease in the number of tasks waiting to be processed, selecting one or more VCs of the plurality of VCs to be removed, distributing managed objects handled by the selected one or more VCs to one or more non-selected VCs of the plurality of VCs, and removing the selected one or more VCs.