Abstract:
A method may include identifying a virtualized application that has a read-only virtualization sublayer and a read-write virtualization sublayer. The read-only virtualization sublayer may represent a base state of the virtualized application and the read-write virtualization sublayer may be configured to store changes to the base state of the virtualized application. The method may also include determining a first difference between the read-only virtualization sublayer and the read-write virtualization sublayer at a first point in time and using the first difference between the read-only virtualization sublayer and the read-write virtualization sublayer to create a first snapshot that represents a state of the virtualized application at the first point in time. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosure is directed to feature based software virtualization. In one example, a first virtual sub-layer associated with a first feature set of a software package is virtually installed to a computing device. The first feature set includes a first subset of features associated with the software package. The first virtual sub-layer is enabled to activate the first feature set. A second virtual sub-layer associated with a second feature set of the software package is virtually installed to the computing device. The second feature set includes a second subset of the features associated with the software package. The second virtual sub-layer is enabled to activate the second feature set. In certain embodiments, a first fee is charged for the first feature set and a second fee is charged for the second feature set.
Abstract:
A method may include identifying a first version of a virtualized application. The first version of the virtualized application may include a first read-only virtualization sublayer, and the first read-only virtualization sublayer may provide a base state of the first version of the virtualized application. The method may also include identifying a second version of the virtualized application. The second version of the virtualized application may include a second read-only virtualization sublayer, which may provide a base state of the second version of the virtualized application. The method may further include determining a difference between the first read-only virtualization sublayer and the second read-only virtualization sublayer and using the difference to create a patch configured to update an instance of the first version of the virtualized application to an instance of the second version of the virtualized application. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
Systems and methods for delivery of user profile data are disclosed. An exemplary method includes detecting a request for a full copy of a user profile data package maintained by a user profile data source subsystem, creating an illusion that the request has been fulfilled, and copying on demand a portion of the user profile data package from the source subsystem to a target location for access by a data consuming subsystem. In certain embodiments, the method further includes utilizing the copied portion of the user profile data package for execution of a computing operation, without fully copying the user profile data package from the source subsystem. In certain embodiments, the portion of the user profile data package is streamed from the source subsystem to the target location over a network connection.
Abstract:
A method is proposed. The method includes receiving a file operation request from a process and performing a census of instances of a file applicable to the file operation request to populate a data structure. The data structure including a listing of the instances of the file applicable to the file operation request. The data structure also includes characteristics for a first instance from among the instances of the file applicable to the file operation request, and characteristics for a second instance of a selected file from among the instances of the file applicable to the file operation request. The method also includes eliminating the first instance from among the instances of the file applicable to the file operation request on the basis of a rule associated with properties from a record for the process, and the characteristics for the first instance.
Abstract:
A computer-implemented method for filtering input/output communications of guest operating systems may include: 1) identifying a guest operating system running in a virtual machine, 2) creating an input/output filtering layer that resides outside the guest operating system, 3) intercepting, at the input/output filtering layer, an input/output communication involving the guest operating system, and then 4) performing a filtering operation on the input/output communication. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
A computer-implemented method for remediation of a computing device attempting to access a network. The method may include detecting that the computing device is attempting to access the network. The method may also include determining that the computing device does not comply with a network-access-control policy of the network. The method may include using a virtualization layer to bring the computing device into compliance with the network-access-control policy. The method may include permitting the computing device to access the network after the computing device is brought into compliance with the network-access-control policy. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
The disclosure is directed to dynamic insertion and removal of virtual software sub-layers. In one example, a virtual layer associated with a software application is virtually installed and activated in a computing device. A virtual sub-layer associated with a component of the software application is dynamically inserted in the virtual layer. The virtual layer remains active during the dynamic insertion of the virtual sub-layer. In certain embodiments, a process is executed from the virtual layer, a determination is made as to whether the process launched before or after the insertion of the virtual sub-layer, and the inserted virtual sub-layer is selectively made visible or invisible to the process based on the determination.
Abstract:
A directory services system includes a resource object, such as an application object for accessing a resource associated with the resource object. Attributes of the resource object contain licensing control information. The licensing attributes may be used by executables to control access by a user to properly licensed instances of a resource corresponding to the resource object. Also, a utility may be provided to manage the licensing attributes in the resource object. A licensing function may thus control a resource, via its resource object in the directory services database. Licensing maybe easily implemented by setting a new disabling attribute in the object.
Abstract:
Distributed application virtualization provides for the distribution, configuration and control of multiple application components, layered file systems, and configuration settings that may be applied on top of an operating system of each system configured to work in conjunction with other systems within a single distributed virtualization layer. A distributed software virtualization manager or service handles communication between systems within each distributed virtual layer. One distributed virtualization operation activates components, selected based on user-defined parameters, on systems across the network belonging to a selected distributed virtual application layer. Other virtualization operations, whether local and/or distributed, include capturing file system and configuration activity associated with the detected event and storing data representative of the captured file system and configuration activity to a virtual layer, such as a local or distributed application layer.