-
公开(公告)号:US12175290B2
公开(公告)日:2024-12-24
申请号:US17382848
申请日:2021-07-22
Applicant: VMware, Inc.
Inventor: Marcos Kawazoe Aguilera , Renu Raman , Pratap Subrahmanyam , Praveen Vegulla , Rajesh Venkatasubramanian
Abstract: Disclosed are various embodiments for optimized memory tiering. An ideal tier size for a first memory and an ideal tier size for a second memory can be determined for a process. Then, a host computing device can be identified that can accommodate the ideal tier size for the first memory and the second memory. Subsequently, the process can be assigned to the host computing device.
-
公开(公告)号:US20240419473A1
公开(公告)日:2024-12-19
申请号:US18348902
申请日:2023-07-07
Applicant: VMware, Inc.
Inventor: Bo LIN , Caixia JIANG , Xi ZENG , Xiao LIANG , Kai LOU , Chuntao CHEN , Danyang LI , Qi WU
Abstract: An example method of configuring an entitlement service that manages entitlement of software in a virtualized computing system includes: receiving, at a plug-in of the entitlement service, software component data that specifies a component type and offerings of the component type, the offerings associated with feature sets, the entitlement service executing on a cloud platform in the virtualized computing system; storing, by the plug-in, the software component data in a database; and notifying, by the plug-in, the entitlement service to support entitlement of components of the software having the component type.
-
公开(公告)号:US20240402933A1
公开(公告)日:2024-12-05
申请号:US18229179
申请日:2023-08-02
Applicant: VMWARE, INC.
Inventor: Kashish Bhatia , Zubraj Singha , Goresh Vitthalrao Musalay
IPC: G06F3/06
Abstract: A data structure tracks the usage of an eager-zeroed virtual disk on a per block basis and this data structure is referenced during migration or cloning of the eager-zeroed virtual disk so that copying of the zero blocks can be avoided. A method of migrating or cloning the eager-zeroed virtual disk stored in a first storage device comprises: determining for each of a plurality of unique sets of blocks using this data structure, whether or not any of the blocks in the unique set has been written to since the initialization of the virtual disk; and for each unique set determined to have at least one block that has been written to since the initialization of the virtual disk, issuing a copy command to make a copy of all blocks in the unique set in a second storage device.
-
公开(公告)号:US20240385765A1
公开(公告)日:2024-11-21
申请号:US18199898
申请日:2023-05-19
Applicant: VMware, Inc.
Inventor: Simona Svetozarova Lyubenova , Antonio Kristiyanov Filipov , Dimitar Veskov Petkov , Davor Roglic , Michael Cooper
IPC: G06F3/06
Abstract: The disclosure provides an approach for storage of a large volume of data. Embodiments include: receiving, from a data source, an event comprising data. Embodiments also include determining a storage object associated with the event based on both the event and the storage object being associated with a first key. Embodiments also include appending the event to the storage object. Embodiments include, in response to the storage object satisfying a flush threshold flushing the storage object to the object storage, and generating a new storage object associated with the first key.
-
公开(公告)号:US20240380670A1
公开(公告)日:2024-11-14
申请号:US18195551
申请日:2023-05-10
Applicant: VMware, Inc.
Inventor: Giri Prashanth Subramanian , Wenxuan Zhou , Satyandra Guthula , Santhosh Prabhu Muraleedhara Prabhu , Philip Brighten Godfrey
IPC: H04L41/14
Abstract: Some embodiments provide a method for identifying anomalies in a network. The method uses a model of the network to determine connectivity for each of multiple network endpoints to other network endpoints. The method quantifies differences in the determined connectivity for pairs of the network endpoints. The method uses the quantified differences to identify (i) clusters of network endpoints with similar properties and connectivity and (ii) anomalous network endpoints that do not fit the clusters. The anomalous endpoints are reported as potential network anomalies.
-
公开(公告)号:US12143362B2
公开(公告)日:2024-11-12
申请号:US17673841
申请日:2022-02-17
Applicant: VMWARE, INC.
Abstract: Example methods and systems for a computer system to perform context-aware service query filtering are described. One example may involve a computer system intercepting a service query from a virtualized computing instance to pause forwarding of the service query towards a destination; and obtaining context information associated with an application running on the virtualized computing instance. In response to determination that the service query is a potential security threat based on the context information, service query filtering may be performed to inspect the service query for malicious activity. Otherwise, in response to determination that the service query is not a potential security threat based on the context information, the service query filtering may be skipped and the service query forwarded towards the destination.
-
公开(公告)号:US12141616B2
公开(公告)日:2024-11-12
申请号:US17366006
申请日:2021-07-01
Applicant: VMware, Inc.
IPC: G06F9/50 , G06F16/901
Abstract: Systems and methods presented herein provide examples for distributing resources in a UEM system. In one example, the UEM system can receive a request to check out a user device enrolled in the UEM system. The request can include a profile identifier (“ID”) of a user profile making the request and attributes of the user device. The UEM system can create a hash of group IDs associated with the profile ID. The UEM system can create a device context that includes the device attributes and the hash. The UEM system can then determine if the device context matches to a resource context. Resource contexts can identify a set of UEM resources associated with a device context. Where a match is found, the UEM system can provide the corresponding resources to the user device.
-
公开(公告)号:US12137167B2
公开(公告)日:2024-11-05
申请号:US16276692
申请日:2019-02-15
Applicant: VMware, Inc.
Inventor: Jinxing Hu , Kar Fai Tse , Lina Li , Shengbo Teng , Lu Liu
Abstract: Disclosed are examples of embedding watermarks in a VDI session of a user. The watermark is based upon the user's identity and can be embedded into the VDI session to aid in the identification of data that is compromised from the VDI session. The watermark can be extracted from an image without needing the original image for extraction purposes.
-
29.
公开(公告)号:US20240362050A1
公开(公告)日:2024-10-31
申请号:US18306950
申请日:2023-04-25
Applicant: VMware, Inc.
Inventor: Kashish Bhatia
CPC classification number: G06F9/45558 , G06F13/1668 , G06F2009/45579 , G06F2009/45583
Abstract: The disclosure provides a method for handling heterogeneous input/output (I/O) load for containers running in a virtualized environment. The method generally includes receiving, from an application running in a container, an I/O indicating to write data to a persistent volume backed by a virtual disk file in storage, determining a maximum number of in-flight write I/Os allowed for the persistent volume based on a share of a total write I/O bandwidth assigned to the virtual disk file and allocated to the persistent volume, determining a current number of in-flight write I/Os for the persistent volume, and determining whether the current number of in-flight write I/Os for the persistent volume is greater than or equal to the maximum number of in-flight write I/Os allowed for the persistent volume to determine whether the received I/O is to be rejected or processed.
-
公开(公告)号:US12132835B2
公开(公告)日:2024-10-29
申请号:US17879931
申请日:2022-08-03
Applicant: VMware, Inc.
Inventor: Erich Stuntebeck , Ramani Panchapakesan , Akshay Laxminarayan , Kumar Ashish , Gangadhar Nittala
IPC: H04L29/06 , G06F16/13 , G06F16/16 , G06F16/17 , G06F16/182 , G06F16/185 , G06F21/60 , G06F21/62 , H04L9/08 , H04L9/14 , H04L9/40 , H04L67/1097 , H04L67/303 , G06F8/61
CPC classification number: H04L9/0894 , G06F16/13 , G06F16/16 , G06F16/1727 , G06F16/182 , G06F16/185 , G06F21/602 , G06F21/6209 , G06F21/6218 , H04L9/14 , H04L63/0428 , H04L67/1097 , H04L67/303 , G06F8/61
Abstract: Various systems facilitate encrypted file storage. A client device may generate an encrypted version of a file. The client device may obtain at least one reference to at least one storage location for the encrypted version of the file. The client device may cause the encrypted version of the file to be store at the at least one storage location using the at least one reference to the at least one storage location.
-
-
-
-
-
-
-
-
-