Abstract:
A method to improve virtual desktop infrastructure (VDI) user experience includes providing a user access to a first virtual desktop executing a first set of applications and having a first virtual machine (VM) configuration, collecting VDI performance metrics associated with the first virtual desktop, detecting a problem from the VDI performance metrics, and changing a first remote display protocol configuration to address the problem. The method further includes collecting the user's feedback, training a model with the first VM configuration, the first set of applications, the user's feedback, and the first remote display protocol configuration, receiving a second VM configuration for a second virtual machine providing a second virtual desktop and a second set of applications on the second virtual desktop, using the model to generate a second remote display protocol configuration for the second virtual desktop, and configuring the second virtual desktop with the second remote display protocol configuration.
Abstract:
Intelligent maintenance may be planned and performed for hosts in a pool of hosts that run virtual desktop sessions. A number of hosts to be shut down for maintenance, as well as a start time for a maintenance window, may be determined based on a first risk model and on a capacity risk level. A second risk model may be used to determine whether a capacity risk is still less than the capacity risk level, if some hosts have sessions that take longer than expected to log off and so delay the start time of the maintenance window.
Abstract:
A method of rebooting a computing system in which a virtual machine (VM) runs on top of a hypervisor and a host operating system (OS) includes the following steps. Those steps are sending, from the host OS to the hypervisor, a pre-reboot notification that the host OS is going to reboot, in response to reception of the pre-reboot notification, saving by the hypervisor state of a session that is executing in the VM, rebooting the host OS, after the host OS is rebooted, logging on to the host OS using a credential provider that was previously registered with the host OS and sending a post-reboot notification from the host OS to the hypervisor, and in response to reception of the post-reboot notification, instantiating by the hypervisor a VM in which the session is resumed using the saved state of the session.
Abstract:
Techniques are disclosed herein for managing network bandwidth in a distributed system having multiple endpoints that upload data to a central server or server cluster. One embodiment provides a computer-implemented method that includes receiving a logical topology of the network that is determined based on network measurements. The method further includes resolving a convex optimization problem over the logical topology to determine a bandwidth allocation scheme for the endpoints uploading data. In addition, the method includes controlling bandwidth consumption by the endpoints based on the determined bandwidth allocation scheme.
Abstract:
Techniques are disclosed herein for managing network bandwidth in a distributed system having multiple endpoints that upload data to a central server or server cluster. One embodiment provides a computer-implemented method that includes receiving a logical topology of the network that is determined based on network measurements. The method further includes generating a tree having links of the logical network topology as nodes, and allocating bandwidth during a traversal of the tree to obtain a bandwidth allocation scheme for the endpoints uploading data. In addition, the method includes controlling bandwidth consumption by the endpoints based on the determined bandwidth allocation scheme.
Abstract:
Techniques are disclosed herein for managing network bandwidth in a distributed system having multiple endpoints that upload data to a central server or server cluster. One embodiment provides a computer-implemented method that includes collecting network measurements from traffic flows in a network over which the endpoints upload the data to the central server or server cluster. The method further includes determining a logical topology of the network based on the network measurements, and solving an optimization problem to determine a bandwidth allocation scheme for the endpoints uploading data, wherein capacity of links in the logical topology are constraints in the optimization problem. In addition, the method includes controlling bandwidth consumption by the endpoints based on the determined bandwidth allocation scheme.