METHODS AND APPARATUS TO DETERMINE CONTAINER PRIORITIES IN VIRTUALIZED COMPUTING ENVIRONMENTS

    公开(公告)号:US20210194770A1

    公开(公告)日:2021-06-24

    申请号:US16802591

    申请日:2020-02-27

    Applicant: VMWARE, INC.

    Abstract: Example methods and apparatus to determine container priorities in virtualized computing environments are disclosed herein. Examples include: a cluster controller to classify a first container into a cluster based on the first container having a number of distinct allocated resources within a threshold number of distinct allocated resources corresponding to a second container; a container ranking generator to: determine resource utilization rank values for a resource usage type of a number of distinct allocated resources, the resource utilization rank values indicative that the first container utilizes the resource usage type more than the second container; determine an aggregated resource utilization rank value for the first container based on aggregating ones of the resource utilization rank values corresponding to the first container; and a container priority controller to generate a priority class for the first container based on the aggregated resource utilization rank value.

    LOG-BASED VULNERABILITIES DETECTION AT RUNTIME

    公开(公告)号:US20240020391A1

    公开(公告)日:2024-01-18

    申请号:US17958277

    申请日:2022-09-30

    Applicant: VMWARE, INC.

    CPC classification number: G06F21/577 G06F2221/033

    Abstract: In an example, a computer-implemented method may include receiving, during runtime, a plurality of logs of a network activity associated with compute nodes of a protected network. Further, the method may include extracting a vulnerability signature of an attack based on the plurality of logs. Furthermore, the method may include validating the vulnerability signature of the attack by correlating the vulnerability signature with available data on a first public database. Upon validating the vulnerability signature, the method may include retrieving vulnerability information associated with the vulnerability signature from the first public database or a second public database. Further, the method may include presenting the vulnerability information associated with the vulnerability signature on a graphical user interface.

Patent Agency Ranking