-
1.
公开(公告)号:US20210194770A1
公开(公告)日:2021-06-24
申请号:US16802591
申请日:2020-02-27
Applicant: VMWARE, INC.
Inventor: Yash BHATNAGAR , Hemani KATYAL , Chandrashekhar JHA , Mageshwaran RAJENDRAN , Ritesh JHA
Abstract: Example methods and apparatus to determine container priorities in virtualized computing environments are disclosed herein. Examples include: a cluster controller to classify a first container into a cluster based on the first container having a number of distinct allocated resources within a threshold number of distinct allocated resources corresponding to a second container; a container ranking generator to: determine resource utilization rank values for a resource usage type of a number of distinct allocated resources, the resource utilization rank values indicative that the first container utilizes the resource usage type more than the second container; determine an aggregated resource utilization rank value for the first container based on aggregating ones of the resource utilization rank values corresponding to the first container; and a container priority controller to generate a priority class for the first container based on the aggregated resource utilization rank value.
-
公开(公告)号:US20240020391A1
公开(公告)日:2024-01-18
申请号:US17958277
申请日:2022-09-30
Applicant: VMWARE, INC.
Inventor: Chandrashekhar JHA , Hemani KATYAL , Yash BHATNAGAR , Akash SRIVASTAVA , Pranita MORISETTY
IPC: G06F21/57
CPC classification number: G06F21/577 , G06F2221/033
Abstract: In an example, a computer-implemented method may include receiving, during runtime, a plurality of logs of a network activity associated with compute nodes of a protected network. Further, the method may include extracting a vulnerability signature of an attack based on the plurality of logs. Furthermore, the method may include validating the vulnerability signature of the attack by correlating the vulnerability signature with available data on a first public database. Upon validating the vulnerability signature, the method may include retrieving vulnerability information associated with the vulnerability signature from the first public database or a second public database. Further, the method may include presenting the vulnerability information associated with the vulnerability signature on a graphical user interface.
-
公开(公告)号:US20200334022A1
公开(公告)日:2020-10-22
申请号:US16726282
申请日:2019-12-24
Applicant: VMWARE, INC.
Inventor: Yash BHATNAGAR , Dattathreya SATHYAMURTHY , Swarnalatha PASUPULETI , Naveen MUDNAL
Abstract: Various examples are disclosed for generating a prediction of server requirements needed to deploy an application. The application can be deployed in virtualized environment in which virtual machines can execute the application. The predicted server requirements can be generated based upon data from other deployments of the application in other virtualized environments.
-
-