-
公开(公告)号:US12086032B2
公开(公告)日:2024-09-10
申请号:US18331609
申请日:2023-06-08
Applicant: Salesforce, Inc.
Inventor: Mark F. Wilding
CPC classification number: G06F11/1405 , G06F8/60 , G06F9/4881 , G06F9/541 , G06F11/1415 , G06F11/1482 , G06F11/3664 , G06F11/3692 , G06F21/51 , G06F21/54
Abstract: Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.
-
公开(公告)号:US12056009B2
公开(公告)日:2024-08-06
申请号:US17821390
申请日:2022-08-22
Applicant: salesforce.com, inc.
Inventor: Mark F. Wilding
CPC classification number: G06F11/1405 , G06F8/60 , G06F9/4881 , G06F9/541 , G06F11/1415 , G06F11/1482 , G06F11/3664 , G06F11/3692 , G06F21/51 , G06F21/54
Abstract: Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.
-
公开(公告)号:US12001303B2
公开(公告)日:2024-06-04
申请号:US17507661
申请日:2021-10-21
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Valerie Lotosh , Erez Sharvit
CPC classification number: G06F11/203 , G06F9/45558 , G06F11/1464 , G06F11/1482 , G06F2009/4557 , G06F2009/45579 , G06F2009/45595
Abstract: A system can maintain a first data center that comprises a virtualized overlay network and virtualized volume identifiers. The system can determine to perform a restore of data of the first data center to a second data center, the data comprising first instances of virtualized workloads. The system can transfer the data to the second data center. The system can configure the second data center with the virtualized overlay network and the virtualized volume identifiers. The system can operate the virtualized workloads on the second data center, the second instances of the virtualized workloads invoking the second instance of the virtualized overlay network and the second instance of the virtualized volume identifiers.
-
公开(公告)号:US20230421509A1
公开(公告)日:2023-12-28
申请号:US18244244
申请日:2023-09-09
Applicant: Nicira, Inc.
Inventor: Ganesan Chandrashekhar , Mukesh Hira , Su Wang , Akshay Katrekar
IPC: H04L49/15 , H04L67/10 , G06F15/177 , G06F11/20 , G06F9/455 , G06F11/34 , G06F11/07 , G06F11/14 , G06F11/00 , G06F9/50 , H04L61/2521 , H04L61/2514 , H04L9/40 , H04L41/044 , H04L41/0806 , H04L41/00 , H04L45/00 , H04L47/32 , H04L41/12 , H04L49/00 , H04L67/1097 , H04L12/46 , H04L49/25 , H04L61/2592 , H04L12/66 , H04L61/2539 , H04L9/08 , H04L9/32 , H04L45/74 , H04L61/256
CPC classification number: H04L49/15 , H04L67/10 , G06F15/177 , G06F11/2035 , G06F9/45533 , G06F11/3433 , G06F11/0793 , G06F11/1482 , G06F11/008 , G06F9/5072 , G06F11/1438 , G06F11/07 , G06F11/0709 , H04L61/2521 , H04L61/2514 , H04L63/0209 , H04L63/0272 , H04L41/044 , H04L41/0806 , G06F9/45558 , H04L41/20 , H04L45/38 , H04L45/72 , H04L47/32 , H04L63/0263 , H04L63/20 , H04L41/12 , H04L49/70 , H04L67/1097 , H04L12/4633 , H04L49/25 , H04L61/2592 , H04L12/4641 , H04L12/66 , H04L61/2539 , H04L63/0236 , H04L63/029 , H04L9/0819 , H04L9/3213 , H04L63/0428 , H04L63/062 , H04L45/74 , H04L61/256 , H04L47/125
Abstract: Some embodiments provide a method for a first data compute node (DCN) operating in a public datacenter. The method receives an encryption rule from a centralized network controller. The method determines that the network encryption rule requires encryption of packets between second and third DCNs operating in the public datacenter. The method requests a first key from a secure key storage. Upon receipt of the first key, the method uses the first key and additional parameters to generate second and third keys. The method distributes the second key to the second DCN and the third key to the third DCN in the public datacenter.
-
公开(公告)号:US20230393941A1
公开(公告)日:2023-12-07
申请号:US18331609
申请日:2023-06-08
Applicant: Salesforce, Inc.
Inventor: Mark F. Wilding
CPC classification number: G06F11/1405 , G06F8/60 , G06F9/4881 , G06F9/541 , G06F11/3664 , G06F11/3692 , G06F21/51 , G06F21/54 , G06F11/1415 , G06F11/1482
Abstract: Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.
-
公开(公告)号:US11803451B2
公开(公告)日:2023-10-31
申请号:US17424045
申请日:2019-12-11
Applicant: Huawei Technologies Co., Ltd.
Inventor: Liang Zhang , Zhijun Lu , Yu Li , Zhi Zeng
CPC classification number: G06F11/1471 , G06F9/45504 , G06F11/0751 , G06F11/1482 , G06F21/52
Abstract: An application exception recovery method, an electronic device, a storage medium storing the recovery method, and a recovery apparatus, the method including, storing page information of an exception page, in response to that an exception occurs in at least one application installed on an electronic device, wherein the exception page is a page displayed by the at least one application in response to the exception occurring, displaying a mask, wherein the mask is a picture displayed on at least a window of the at least one application during restart of the at least one application, restarting the at least one application, wherein restarting the at least one application comprises creating the exception page, and removing the mask.
-
公开(公告)号:US11792138B2
公开(公告)日:2023-10-17
申请号:US17307983
申请日:2021-05-04
Applicant: Nicira, Inc.
Inventor: Jia Yu , Su Wang , Akshay Katrekar , Mukesh Hira , Saurabh Shah
IPC: H04L12/933 , H04L49/15 , H04L67/10 , G06F15/177 , G06F11/20 , G06F9/455 , G06F11/34 , G06F11/07 , G06F11/14 , G06F11/00 , G06F9/50 , H04L61/2521 , H04L61/2514 , H04L9/40 , H04L41/044 , H04L41/0806 , H04L41/00 , H04L45/00 , H04L47/32 , H04L41/12 , H04L49/00 , H04L67/1097 , H04L12/46 , H04L49/25 , H04L61/2592 , H04L12/66 , H04L61/2539 , H04L9/08 , H04L9/32 , H04L45/74 , H04L61/256 , H04L47/125 , H04L61/5014
CPC classification number: H04L49/15 , G06F9/45533 , G06F9/45558 , G06F9/5072 , G06F11/008 , G06F11/07 , G06F11/0709 , G06F11/0793 , G06F11/1438 , G06F11/1482 , G06F11/2035 , G06F11/3433 , G06F15/177 , H04L9/0819 , H04L9/3213 , H04L12/4633 , H04L12/4641 , H04L12/66 , H04L41/044 , H04L41/0806 , H04L41/12 , H04L41/20 , H04L45/38 , H04L45/72 , H04L45/74 , H04L47/32 , H04L49/25 , H04L49/70 , H04L61/256 , H04L61/2514 , H04L61/2521 , H04L61/2539 , H04L61/2592 , H04L63/0209 , H04L63/029 , H04L63/0236 , H04L63/0263 , H04L63/0272 , H04L63/0428 , H04L63/062 , H04L63/20 , H04L67/10 , H04L67/1097 , G06F2009/4557 , G06F2009/45595 , H04L47/125 , H04L61/5014 , H04L2209/24 , H04L2212/00
Abstract: Some embodiments provide a method for a first data compute node (DCN) operating in a public datacenter. The method receives an encryption rule from a centralized network controller. The method determines that the network encryption rule requires encryption of packets between second and third DCNs operating in the public datacenter. The method requests a first key from a secure key storage. Upon receipt of the first key, the method uses the first key and additional parameters to generate second and third keys. The method distributes the second key to the second DCN and the third key to the third DCN in the public datacenter.
-
公开(公告)号:US11734118B2
公开(公告)日:2023-08-22
申请号:US17272801
申请日:2018-09-18
Applicant: HITACHI KOKUSAI ELECTRIC INC.
Inventor: Tomoya Shoji
CPC classification number: G06F11/1438 , G06F8/61 , G06F9/453 , G06F11/1482 , G06F11/27 , H04W88/02
Abstract: This software wireless device comprises framework software that installs wireless communication software; and interface service software that is provided so as to be directly managed by an OS, and that manages a user interface service and the framework software. The framework software has user interface software, domain management software, hardware management software, and hardware control software. The interface service software issues a running status monitoring request to the user interface software and the domain management software, and determines that there is an abnormality if there is no response from the user interface software or the domain management software.
-
9.
公开(公告)号:US20230214240A1
公开(公告)日:2023-07-06
申请号:US18089311
申请日:2022-12-27
Applicant: Dynatrace LLC
Inventor: Delfin Pereiro PAREJO , Lluis CRIADO , Carlos MUNOZ
CPC classification number: G06F9/451 , G06F11/1482
Abstract: A technology is disclosed for the efficient capturing of monitoring data capable to reconstruct the experience of a user during the interaction with an application on a mobile device. The proposed approach uses instrumentation to detect the occurrence of events that change the user interface of the monitored application and that, in response to such an event, identifies the fraction of the user interface that was altered by the event and then captures only the changed portion of the user interface display. Additionally, privacy configuration data is evaluated during the capturing process to identify portions of the user interface that contain data that is protected due to privacy policy settings. In case an event changes such a privacy protected user interface portion, only the occurrence of the event and the affected screen area are captured, but no actual display data.
-
10.
公开(公告)号:US11656954B1
公开(公告)日:2023-05-23
申请号:US17578413
申请日:2022-01-18
Applicant: PHILIPS NORTH AMERICA LLC
Inventor: Allan Havemose
CPC classification number: G06F11/1469 , G06F11/1407 , G06F11/1438 , G06F11/1446 , G06F11/1451 , G06F11/1471 , G06F11/1482 , G06F2201/82 , G06F2201/84
Abstract: A system, method, and computer readable medium for hybrid kernel-mode and user-mode checkpointing of multi-process applications. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
-
-
-
-
-
-
-
-
-