-
公开(公告)号:US12131189B2
公开(公告)日:2024-10-29
申请号:US18104806
申请日:2023-02-02
Applicant: VMWARE, INC.
Inventor: Thomas James O'Rourke , Brian Davis , Abhinandan Baheti , Matthew Carpenter , Vivek Kumar Singh
CPC classification number: G06F9/5005 , G06F9/54 , H04L41/12
Abstract: A computer-implemented method, computer-readable medium, and computer system that involve operations including receiving, from a computing cluster, a first request for changing a first object type specified by an approval policy resource, where the approval policy resource is a first one of a plurality of custom resources; identifying, in response to receiving the first request and using a second custom resource of the plurality, an approval process associated with the first object type; performing the approval process associated with the first object type; and sending, to the computing cluster, a first notification indicating that the request has been approved.
-
32.
公开(公告)号:US20240357339A1
公开(公告)日:2024-10-24
申请号:US18305089
申请日:2023-04-21
Applicant: VMware, Inc.
Inventor: Yang Yang , Robert Soni , Rittwik Jana , Padma Sudarsan , Islam El abbasy
IPC: H04W8/08
CPC classification number: H04W8/08
Abstract: This disclosure is directed to methods and system for intelligent roaming of user equipment (“UE”) of a home network onto a visited network. The methods and systems monitor performance of voice and data services for UEs in coverage areas of edge cell sites of the home network. The methods and systems determine which UEs in the coverage areas of the edge cell sites to roam on the visited network based on decreases in voice and data services. The UEs in the coverage areas selected for roaming are pushed to roam on the visited network by sending a signal that instructs selected UEs to switch into roaming mode while the UEs are still in the coverage areas of the edge cell sites.
-
公开(公告)号:US20240356853A1
公开(公告)日:2024-10-24
申请号:US18137536
申请日:2023-04-21
Applicant: VMware, Inc.
Inventor: Chandan Ghosh , Anantha Mohan Raj, M.D. , Gaurav Jindal , Siddhant Verma , Saurabh Garg
IPC: H04L47/12 , H04L41/147 , H04L43/0876
CPC classification number: H04L47/12 , H04L41/147 , H04L43/0876
Abstract: Some embodiments provide a novel method for preemptively deploying gateways in a first network to one or more external networks. The first network of some embodiments includes a first gateway connecting to the one or more external networks. The method collects a set of statistics for the first gateway associated with bandwidth usage of the first gateway. The method determines that a second gateway needs to be deployed in the first network (1) by using the collected set of statistics to perform predictive modeling computations to predict a future load on the first gateway, and (2) by determining that the predicted future load exceeds a particular threshold. The method distributes a set of one or more forwarding rules to forward data message flows from a subset of machines in the first network to a particular external network through the second gateway.
-
公开(公告)号:US20240354411A1
公开(公告)日:2024-10-24
申请号:US18335130
申请日:2023-06-15
Applicant: VMware, Inc.
Inventor: Zhe WANG , Wenguang WANG , Enning XIANG , Jianhan ZHAN , Rajesh JOSEPH , Bing JIAO
CPC classification number: G06F21/566 , G06F9/45558 , G06F21/554 , G06F2009/45587 , G06F2221/034
Abstract: Solutions for rapid ransomware detection and recovery include: receiving a first set of in-memory changed data blocks; identifying, within the first set of in-memory changed data blocks, a second set of in-memory changed data blocks addressed for storage within a file index for a virtual machine (VM) disk; determining, relative to a change history of the file index, an anomalous condition; based on at least determining the anomalous condition, identifying a third set of blocks within the file index that are changed between two versions of the VM disk; determining that changes in the third set of blocks indicate ransomware; and based on at least determining that changes in the third set of blocks indicate ransomware, generating an alert. Machine learning (ML) models may perform anomaly/ransomware detection. Remediation activities may include disk restoration storing the VM memory.
-
公开(公告)号:US12124570B2
公开(公告)日:2024-10-22
申请号:US17392449
申请日:2021-08-03
Applicant: VMWARE, INC.
CPC classification number: G06F21/552 , G06F21/554 , G06F21/565 , G06F21/566
Abstract: Example methods are provided to build a smart file reputation cache at a cloud, and to provide the smart file reputation cache to an antivirus (AV) endpoint such as a virtualized computing instance in a virtualized computing environment. Training techniques can be used to build the smart file reputation cache at the cloud, based on information learned from existing AV endpoints and a management server. The smart file reputation can then be provided to newly installed AV endpoints for local access, instead of the AV endpoints sending file reputation requests to the cloud.
-
36.
公开(公告)号:US20240345860A1
公开(公告)日:2024-10-17
申请号:US18299481
申请日:2023-04-12
Applicant: VMware, Inc.
Inventor: Nidhin Urmese , Ivaylo Radoslavov Radev , Krishnendu Gorai , Narasimha Gopal Gorthi , Rashmi Badavanahalli Nagaraja Gupta
IPC: G06F9/455
CPC classification number: G06F9/45558 , G06F2009/4557 , G06F2009/45587
Abstract: An example method of enabling a virtual infrastructure management (VIM) appliance for lifecycle management includes: identifying, by a cloud platform executing in a public cloud, a manager VIM appliance for the VIM appliance, the manager VIM appliance and the VIM appliance executing in at least one on-premises data center of an on-premises environment; obtaining information related to a management cluster having the manager VIM appliance and a virtual machine (VM) executing the VIM appliance; creating and applying, by the cloud platform in response to the information, a desired state for both the manager VIM appliance and the VIM appliance; and updating the cloud platform with a topology of the manager VIM appliance and the VIM appliance in the management cluster.
-
公开(公告)号:US20240330272A1
公开(公告)日:2024-10-03
申请号:US18194259
申请日:2023-03-31
Applicant: VMware, Inc.
Inventor: Michael W. Achenbach , Vianney Rancurel , Shruti Gandhi
CPC classification number: G06F16/2379 , G06F21/602 , G06F21/6218
Abstract: Various shared infrastructure governance decision-making systems and methods are disclosed. One such method comprises receiving, by at least one blockchain node from a client device, a reconfiguration request for changing infrastructure of a blockchain service by performing a reconfiguration action; triggering, by the at least one blockchain node, an infrastructure governance approval process to approve or deny the reconfiguration request for changing the infrastructure of the blockchain service; and invoking, by the at least one blockchain node, initiation of the reconfiguration action by the blockchain service upon approval of the reconfiguration request. Other methods and system are also disclosed.
-
38.
公开(公告)号:US12106136B2
公开(公告)日:2024-10-01
申请号:US17506069
申请日:2021-10-20
Applicant: VMware, Inc.
Inventor: Sisimon Soman , Vignesh Raja Jayaraman
CPC classification number: G06F9/45558 , G06F9/44505 , G06F21/31 , G06F2009/45587 , G06F2009/45595
Abstract: Systems and methods can enable select virtual session capabilities on a user device configured to access a virtual session, which is an instance of a virtual machine. The user device can receive and forward to a gateway sever, a request to launch a virtual session. Based on the virtual session launch request, the gateway server can obtain a compliance profile determined from operational data for the user device and compare it to a minimum access policy (“MAP”). The MAP can include threshold or binary values for states of a group of user device operational aspects. Where the compliance profile satisfies the MAP, the gateway can permit user device access a virtual session hosted on a virtual machine (“VM”) server. The virtual session can be configured at the VM server based on the compliance profile so as to allow access to a portion of a full virtual session capability scheme.
-
公开(公告)号:US12106113B2
公开(公告)日:2024-10-01
申请号:US17191835
申请日:2021-03-04
Applicant: VMWARE, INC.
Inventor: Gaurav Verma , Ashok Kumar , Abhijeet Padole , Amogha Varsha Annegowda , Karthikeyan Palanisamy
CPC classification number: G06F9/3836 , G06F9/4401 , G06F9/541 , G06K7/143
Abstract: Disclosed are various embodiments for managing deployment model migrations for enrolled devices. A client application can transmit a capability status to a management service in an instance in which a plurality of device conditions of the client device are validated. The client application can obtain and execute instructions that cause the client application to manage a migration of the client device from a first configuration to a second configuration. A user interface can be pinned on a display of the client device in an instance in which an enterprise environment endpoint is identified and a migration interface on the client device executed. The client application can transmit samples of device conditions of the second configuration of the client device to the management service.
-
公开(公告)号:US20240320025A1
公开(公告)日:2024-09-26
申请号:US18195394
申请日:2023-05-10
Applicant: VMWARE, INC.
Inventor: Abhishek Singh , Vinothkumar D , Atreyee Bhaduri , Bhuvaneswari Addanki , Akansha Srivastava
IPC: G06F9/455
CPC classification number: G06F9/45558 , G06F2009/4557 , G06F2009/45591
Abstract: An example system may include a first endpoint executing a remote collector and a second endpoint in communication with the first endpoint. The remote collector may monitor the second endpoint. The remote collector may include an agent installation unit to install a monitoring agent with configuration data on the second endpoint. The configuration data may specify a configuration for the monitoring agent to monitor a first program executing in the second endpoint. Further, the second endpoint may include a buffer limit configuration unit to execute the monitoring agent in a test mode to determine a first number of metrics to be collected in one cycle based on the configuration data. Furthermore, the buffer limit configuration unit may configure a buffer limit of the monitoring agent based on the first number of metrics and, upon configuring the buffer limit, enable the monitoring agent to monitor the first program.
-
-
-
-
-
-
-
-
-