Abstract:
A system and method for automatically generating recurrent neural networks for log anomaly detection uses a controller recurrent neural network that generates an output set of hyperparameters when an input set of controller parameters is applied to the controller recurrent neural network. The output set of hyperparameters is applied to a target recurrent neural network to produce a child recurrent neural network with an architecture that is defined by the output set of hyperparameters. The child recurrent neural network is then trained, and a log classification accuracy of the child recurrent neural network is computed. Using the log classification accuracy, at least one of the controller parameters used to generate the child recurrent neural network is adjusted to produce a different input set of controller parameters to be applied to the controller recurrent neural network so that a different child recurrent neural network for log anomaly detection can be generated.
Abstract:
In a computer-implemented method for integrating a file system of a virtual machine into a native file explorer of a client system, a virtualization infrastructure that manages at least one virtual machine is accessed. The virtual machine is discovered. The file system of virtual machine is accessed. The file system of virtual machines is integrated with the native file explorer of the client system.
Abstract:
A method of managing a virtual machine (VM) image for deployment of the VM across a plurality of software-defined data centers (SDDCs) includes the steps of: separately uploading parts of the VM image to a cloud storage, forming a complete image of the VM from the separately uploaded parts of the VM image, and downloading from the cloud storage the complete VM image to each of the SDDCs in which the VM is to be deployed.
Abstract:
In a computer-implemented method for integrating a file system of a virtual machine into a native file explorer of a client system, a virtualization infrastructure that manages at least one virtual machine is accessed. The virtual machine is discovered. The file system of virtual machine is accessed. The file system of virtual machines is integrated with the native file explorer of the client system.
Abstract:
In a computer-implemented method for modifying a state of a virtual machine, information between two states of a virtual machine is compared, wherein the two states include a current state of the virtual machine and previous state of the virtual machine. The previous state of the virtual machine is included within a snapshot of the virtual machine at the previous state. Information that is different between the two states is identified. The information that is different between the two states is presented, wherein the information that is different is selectable for copying between the two states.
Abstract:
In a computer-implemented method for comparing states of a virtual machine, a plurality of selectable states including a current state of a virtual machine and at least one snapshot of the virtual machine are presented for selection, wherein the at least one snapshot includes a state of the virtual machine at a previous state. Responsive to a selection of at least two states of the plurality of selectable states, a comparison tool for comparing information between the at least two states of the virtual machine is presented.
Abstract:
In a computer-implemented method for viewing a snapshot of a virtual machine, during operation of a virtual machine in a first console, at least one snapshot of the virtual machine is presented for selection, wherein the snapshot includes a previous state of the virtual machine. Responsive to a selection of the snapshot, a second virtual machine of the selected snapshot is deployed in a second console, wherein the second virtual machine is deployed without closing the virtual machine in the first console.