Abstract:
A method for symmetric authentication is provided. This method includes generating a first challenge message containing a first string; encrypting the first challenge message; transmitting the encrypted first challenge message to a second device; receiving a first answer message from the second device; decrypting the first answer message; and authenticating the second device based on determining the decrypted first answer message contains the first string. Upon successful authentication of the second device, the method further includes receiving an encrypted second challenge message from the second device; decrypting the encrypted second challenge message; generating a second answer message containing a second string; encrypting the second answer message; and transmitting the encrypted second answer message to the second device.
Abstract:
Methods, systems, and computer programs for performing management tasks in a virtual infrastructure are presented. The method includes detecting a change, beyond a predetermined threshold, in a number of tasks waiting to be processed by a plurality of management modules executing as execution environments in the virtual infrastructure, each of the plurality of management modules being a management execution environments for the managed objects. If the detected change is a decrease, the method includes selecting one or more of the management modules to be removed and distributing managed objects handled by the selected management modules to one or more non-selected management modules. If the detected change is an increase, the method includes spawning one or more additional management modules executing as execution environments and distributing selected managed objects from the existing management modules to the additional management modules.
Abstract:
Method and system for training a neural network. The neural network is split into first and second portions. A k-layer first portion is sent to a client training/inference engine and the second portion is retained by a server training/inference engine. At the splitting point, the kth layer is a one-way function in output computation has a number of nodes that are less than any other layer of the first portion. The client training/inference engine trains the first portion with input data in a set of training data. The server training/inference engine receives a batch of outputs from the client training and applies them to the second portion to train the entire neural network.
Abstract:
In a computer-implemented method for generating a graph of relative health of virtualization management servers, performance information of virtualization management servers of a virtualization infrastructure is accessed and the performance information is aggregated. A graph of relative health of the virtualization management servers based on the aggregating of the performance information for the virtualization server is generated, and the graph is posted to a social network of members of the virtualization infrastructure.
Abstract:
In a computer-implemented method to facilitate administration of a virtualization infrastructure, operational conditions of members of the virtualization infrastructure are monitored by a social network monitoring agent, wherein the members of the virtualization infrastructure are mapped to a social network such that at least a portion of the members of the virtualization infrastructure are also members of the social network. A group of members of the virtualization infrastructure is automatically created within the social network based at least in part on the operational conditions.
Abstract:
In a computer-implemented method for providing management of a virtualization infrastructure, a query related to the virtualization infrastructure is received. A graph database of the virtualization infrastructure is accessed, the graph database including nodes associated with members of the virtualization infrastructure and edges associated with relationships of the members of the virtualization infrastructure, wherein the nodes and the relationships include types. An answer to the query is received from the graph database.
Abstract:
In a computer-implemented method to facilitate administration of a virtualization infrastructure, posted messages of members of a virtualization infrastructure are displayed, wherein the posted messages comprise tags identifying operational conditions of the members of the virtualization infrastructure. Responsive to a selection of a particular tag, the members of the virtualization infrastructure that posted a message comprising the particular tag are displayed.
Abstract:
In a computer-implemented method for creating a graph database of a virtualization infrastructure, data defining entities and relationships of the entities of a virtualization infrastructure is received at a graph database, wherein the relationships of the entities are in accordance with an inventory structure of the virtualization infrastructure. The graph database is populated with the entities and the relationships of the entities of the virtualization infrastructure.
Abstract:
Methods, systems, and computer programs for performing management tasks in a virtual infrastructure are presented. The method includes detecting a decrease, below a predetermined threshold, in a number of tasks waiting to be processed by a plurality of virtual centers (VCs) executing as virtual machines (VMs) in a virtual infrastructure, wherein each of the plurality of VCs is a management VM for the managed objects of the virtual infrastructure. The method further includes, based on the detected decrease in the number of tasks waiting to be processed, selecting one or more VCs of the plurality of VCs to be removed, distributing managed objects handled by the selected one or more VCs to one or more non-selected VCs of the plurality of VCs, and removing the selected one or more VCs.