System for inferring dependencies among computing systems

    公开(公告)号:US10333820B1

    公开(公告)日:2019-06-25

    申请号:US13658724

    申请日:2012-10-23

    摘要: Systems and methods are described for identifying, tracking, and customizing dependencies between components of a computing environment. By providing greater insight and transparency into dependencies, the systems and methods can facilitate modeling the underlying architecture of applications and computer hardware. As a result, IT personnel can better track relationships between components. Custom filtering tools can also provide IT personnel with tools to switch from different types of dependency views that focus on application-oriented views, hardware-oriented views, or other custom views. Model annotation tools can also enable IT personnel to customize a dependency model to reflect real-world application and hardware monitoring conditions.

    System and method for determining relevant computer performance events

    公开(公告)号:US10291493B1

    公开(公告)日:2019-05-14

    申请号:US14562474

    申请日:2014-12-05

    IPC分类号: G06F7/00 H04L12/26

    摘要: In one embodiment, a method includes identifying at least one transaction-path node as a problem node based, at least in part, on an analysis of end-to-end response times for a group of transactions. The method further includes determining one or more event types for the at least one transaction-path node. Also, the method includes, for each of the one or more event types, inferring a first event-relevance weight from an abstract model. The method also includes, for each of the one or more event types, inferring a second event-relevance weight from a concrete model. Furthermore, the method includes, for each of the one or more event types, determining an event relevance based, at least in part, on the first event-relevance weight and the second event-relevance weight. Additionally, the method includes identifying most-relevant events among a set of active events based, at least in part, on the determined event relevance.

    Systems and methods for dynamic discovery of container-based microservices

    公开(公告)号:US10289457B1

    公开(公告)日:2019-05-14

    申请号:US15084677

    申请日:2016-03-30

    发明人: Dorzak Slawomir

    IPC分类号: G06F9/54

    摘要: In one embodiment, a method includes determining a particular microservice to connect to an instance of a first container to provide a service. The method further includes identifying, from container metadata, one or more inputs of the first container. The method also includes searching the container metadata for containers that provide the particular microservice and whose outputs satisfy the one or more inputs of the first container. In addition, the method includes selecting a second container based on the searching, the second container comprising one or more outputs. Also, the method includes creating an instance of the second container. Furthermore, the method includes connecting the instance of the second container to the instance of the first container using the one or more outputs of the second container and the one or more inputs of the first container.

    Virtualizing a secure active directory environment

    公开(公告)号:US10268550B2

    公开(公告)日:2019-04-23

    申请号:US15289769

    申请日:2016-10-10

    IPC分类号: G06F11/14 G06F9/455

    摘要: A recovery solution can employ virtualization software to create a virtualized Active Directory forest from a source Active Directory forest. A recovery agent can be installed on the domain controllers prior to creating copies of the domain controllers in the virtualized forest. Additionally, the recovery agent can be added to a list of trusted applications if the domain controller includes security software. The recovery solution can employ the virtualization software to store a command file at a known directory path. This command file can include commands that should be executed on the virtualized domain controller to configure it properly. The recovery agent can be configured to periodically scan the known directory path to determine whether a command file has been stored in the directory. If the recovery agent locates a command file, it can extract and execute any commands in the command file.

    Privilege elevation system and method for desktop administration

    公开(公告)号:US10263986B1

    公开(公告)日:2019-04-16

    申请号:US14325074

    申请日:2014-07-07

    IPC分类号: H04L29/06

    摘要: In one embodiment, a method is executed by an information handling system comprising computer hardware. The method includes monitoring a desktop environment of a user for a desktop-administration event. The method further includes, responsive to a detected occurrence of the desktop-administration event, identifying at least one script-execution process to invoke. The at least one script-execution process executes at least one privilege-agnostic desktop-administration script. The method also includes determining whether the at least one script-execution process is designated for privilege elevation. Moreover, the method includes, responsive to a determination that the at least one script-execution process is designated for privilege elevation, injecting a security token of the at least one script-execution process with elevated privileges to yield a privilege-injected script-execution process. Also, the method includes invoking the privilege-injected script-execution process in the desktop environment so that the desktop-administration script executes as the user with the elevated privileges.

    Content-based encryption keys
    66.
    发明授权

    公开(公告)号:US10256978B2

    公开(公告)日:2019-04-09

    申请号:US15806198

    申请日:2017-11-07

    摘要: Techniques and mechanisms described herein facilitate the encryption of content using content-based encryption keys. According to various embodiments, data stream may include one or more data chunks. A client machine may apply a hash function to a data chunk to determine a fingerprint value. A cryptographic protocol shared with a remote server may be applied to the fingerprint value to determine a data chunk encryption key. The data chunk encryption key may be used to encrypt the data chunk, and the encrypted data chunk may be sent to the remote server for storage.

    Migrate nickname cache for email systems and devices

    公开(公告)号:US10248314B2

    公开(公告)日:2019-04-02

    申请号:US14731278

    申请日:2015-06-04

    IPC分类号: G06F3/06

    摘要: A method for migrating a nickname cache via a migration manager is described. The method includes the migration manager locating where the nickname cache is stored and locating where the nickname cache is to be migrated. Once the source and target devices are located, the migration manager can generate any necessary transformations so that the data migrated from the source device to the target device is compatible. The nickname cache can then be extracted from the source device, transformed and stored into the nickname cache of the target device.

    Systems and methods for multi-stream performance patternization and interval-based prediction

    公开(公告)号:US10157358B1

    公开(公告)日:2018-12-18

    申请号:US15080755

    申请日:2016-03-25

    IPC分类号: G06Q10/06 G06Q10/10

    摘要: In one embodiment, a method includes receiving a future virtual-meeting time interval and a set of virtual-meeting attributes in relation to a future virtual meeting. The method also includes correlating the future virtual-meeting time interval to at least one recurring time interval of a time map. In addition, the method includes retrieving a time-based performance pattern. The method further includes determining, from the time-based performance pattern, a stream quality for the virtual-meeting attributes at the at least one recurring time interval. In addition, the method includes publishing information related to the determined stream quality to a requestor.

    Systems and methods of diagnosing down-layer performance problems via multi-stream performance patternization

    公开(公告)号:US10142391B1

    公开(公告)日:2018-11-27

    申请号:US15081104

    申请日:2016-03-25

    摘要: In one embodiment, a method includes retrieving a time-based performance pattern of virtual meetings previously mediated by a communications platform executing in a computing environment, wherein the computing environment comprises a plurality of resources. The method further includes determining, from the time-based performance pattern, at least one virtual-meeting attribute associated with relatively poor virtual-meeting performance. Also, the method includes determining a performance relationship between the at least one virtual-meeting attribute and a particular resource of the computing environment. In addition, the method includes generalizing the performance relationship to overall, non-meeting-specific performance of the particular resource.

    File and move data to shrink datafiles

    公开(公告)号:US10067945B2

    公开(公告)日:2018-09-04

    申请号:US14629583

    申请日:2015-02-24

    IPC分类号: G06F3/06 G06F17/30

    摘要: A system, method, and computer-readable medium for consolidating all the currently used areas to the beginning of the datafile by performing a datafile reorganization operation. With this consolidation, more space can be recovered from the datafile. More specifically, with the consolidation, because each used area can contain extents related to several different segments, locating all the segments that have extents in a used area and relocate these segments to lower addresses in the datafile can be challenging.