VIRTUAL INFRASTRUCTURE PROVISIONING ON GOVERNMENT CERTIFICATION COMPLIANT AND NON-COMPLIANT ENDPOINTS BASED ON CONFIGURATION
Granted: January 30, 2025
Application Number:
20250037078
The present disclosure is related to devices, systems, and methods for virtual infrastructure provisioning on government compliant and non-compliant endpoints based on configuration. One embodiment includes receiving a request made by a user to provision a catalog item in a cloud computing environment, determining that the user is assigned to a project required to comply with governmental requirements concerning virtual infrastructure, selecting a cloud zone of a cloud region in which to…
ADJUSTED GROUP EXECUTION FRAMEWORK FOR MONOLITHIC APPLICATIONS WITH PREDICTIVE DIAGNOSTICS
Granted: January 30, 2025
Application Number:
20250036455
The present disclosure is directed to an adjusted group execution framework (“AGEF”) that adjusts execution of a monolithic cloud application based on predictive diagnostics. The AGEF aids owners of monolithic applications with offloading existing overloaded tasks to other nodes in a cluster of server computers. The AGEF includes an executor that is responsible for running specified execution flows described in an instruction file and a built-in predictive diagnostic engine that is…
CONFIGURATION OF SERVICE PODS FOR LOGICAL ROUTER
Granted: January 30, 2025
Application Number:
20250036437
Some embodiments provide a method for configuring a first Pod in a container cluster to perform layer 7 (L7) services for a logical router. At a second Pod that performs logical forwarding operations for the logical router, the method receives configuration data for the logical router from a network management system that defines a logical network for which the logical router routes data messages and performs L7 services. The method provides a set of Pod definition data to a cluster…
BLOCKCHAIN-BASED LICENSING AS A SERVICE
Granted: January 23, 2025
Application Number:
20250028791
Example methods and systems for blockchain-based licensing as a service are described. In one example, a computer system may receive a first request to obtain a first license associated with a first product from a first client system. In response, the computer system may (a) select a first blockchain from multiple blockchains, and (b) generate and store a first non-fungible token (NFT) on the first blockchain to issue the first license. Further, the computer system may receive a second…
JAVASCRIPT LIBRARY ISOLATION
Granted: January 16, 2025
Application Number:
20250021347
JavaScript library isolation can include replacing instances of a read/write call to a particular object from JavaScript code of a user interface (UI) plugin to a hosting application with a proxy as the JavaScript code is compiled to a JavaScript file, defining a function by which the proxy operates, directing a first subset of read/write calls to the particular object in runtime according to the function, and redirecting a second subset of read/write calls to a different object in…
CSS LIBRARY ISOLATION
Granted: January 16, 2025
Application Number:
20250021326
Cascading style sheets (CSS) library isolation can include replacing instances of a definition of a base root element font size from CSS code of a user interface (UI) plugin to a hosting application with a CSS variable as the CSS code is compiled to a CSS file, reading a definition of a quantity of pixels per one root element font size from the UI plugin, calculating a ratio between the base root element font size of the UI plugin and a base root element font size of the hosting…
SCALING DATAPATH PODS OF A RIC IN A RAN
Granted: January 2, 2025
Application Number:
20250008345
Some embodiments of the invention provide a method for increasing system capacity of a RIC in a RAN, the RIC including a first datapath pod for forwarding communications between a first set of RAN applications connected to the RIC and a first set of base station components connected to the RIC. The method uses the first datapath pod to forward communications between the first set of RAN applications and the first set of base station components. The method determines that the first…
PLACEMENT IN A VIRTUALIZED COMPUTING ENVIRONMENT BASED ON RESOURCE ALLOCATION
Granted: January 2, 2025
Application Number:
20250004808
The present disclosure is related to devices, systems, and methods for placement in a virtualized computing environment based on resource allocation. One embodiment includes instructions to receive a request made by a customer to create a virtual computing instance (VCI) of a project in cloud computing environment and place the VCI.
CONFIGURING PLATFORM SERVICES ASSOCIATED WITH A CONTAINER ORCHESTRATION SYSTEM
Granted: January 2, 2025
Application Number:
20250004743
A request to configure a platform service associated with a container orchestration system can be received. A plurality of ConfigMaps can be collected from a deployment chart of an application service managed by the container orchestration system. Each of the plurality of ConfigMaps can include platform service configuration data associated with a different version of the platform service. One of the plurality of ConfigMaps can be selected based on a current version of the platform…
METHODS AND SYSTEMS FOR INCORPORATING USER FEEDBACK IN DISCOVERING AND CORRECTING INCIDENTS IN A DATA CENTER
Granted: December 19, 2024
Application Number:
20240419530
Automated computer-implemented methods and systems for discovering incidents occurring with objects running in a data center and executing remedial measures that correct the incidents are described herein. The methods and systems discover clusters of alerts in a stream of alerts triggered by a stream of events occurring with objects in the data center. User feedback is used to identify alerts with related event types in each cluster of alerts that corresponds to separate incidents…
CLOUD NATIVE NETWORK FUNCTION DEPLOYMENT
Granted: November 14, 2024
Application Number:
20240378092
Example methods and systems for cloud native network function deployment are described. One example may involve a computer system obtaining cluster configuration information associated with multiple single node clusters (SNCs). Based on the cluster configuration information, the computer system may configure (a) a first SNC on a first node and (b) a second SNC on a second node. The computer system may configure (a) a first virtual agent associated with the first SNC, and (b) a second…
LOCALIZING A REMOTE DESKTOP
Granted: November 14, 2024
Application Number:
20240378069
A remote desktop may be localized to a local operating system (OS), such that remote applications and remote files are accessible via the local OS, without having to launch a remote desktop client that renders a user interface (UI) for connection with the remote desktop. The remote desktop client runs in a background as one or more services without any UI. A user may access and use remote applications/files via the same UIs of the local OS that are used to access and use local…
METHOD AND SYSTEM TO PERFORM COMPLIANCE AND AVAILABILITY CHECK FOR INTERNET SMALL COMPUTER SYSTEM INTERFACE (ISCSI) SERVICE IN DISTRIBUTED STORAGE SYSTEM
Granted: November 7, 2024
Application Number:
20240370383
One example method for a host in a virtual storage area network (vSAN) cluster to support vSAN Internet small computer system interface (iSCSI) target services in a distributed storage system of a virtualization system is disclosed. The method includes obtaining ownership information of a target and determining, from the ownership information, whether the host is an owner of the target. In response to determining that the host is the owner of the target, the method further includes…
METHODS AND SYSTEMS FOR USING SMART NETWORK INTERFACE CARDS TO SECURE DATA TRANSMISSION OF DISAGGREGATED HARDWARE
Granted: October 31, 2024
Application Number:
20240364501
This disclosure is directed to methods and systems that establish a secure data channel between a host and a disaggregated hardware device (“DHD”) of a data center. The system comprises an initiator host that runs objects, such as virtual machines and containers. The host includes an initiator smart network interface card (“SNIC”). The initiator SNIC includes a virtual device, a trust platform module (“TPM”) and a security engine. The system also comprises a target host…
METHODS AND SYSTEMS FOR INTELLIGENT ROAMING USING RADIO ACCESS NETWORK INTELLIGENT CONTROLLERS
Granted: October 24, 2024
Application Number:
20240357339
This disclosure is directed to methods and system for intelligent roaming of user equipment (“UE”) of a home network onto a visited network. The methods and systems monitor performance of voice and data services for UEs in coverage areas of edge cell sites of the home network. The methods and systems determine which UEs in the coverage areas of the edge cell sites to roam on the visited network based on decreases in voice and data services. The UEs in the coverage areas selected for…
EXTENSIBILITY FOR CUSTOM DAY-2 OPERATIONS ON CLOUD RESOURCES
Granted: October 24, 2024
Application Number:
20240354168
The present disclosure is related to devices, systems, and methods for extensibility for custom day-2 operations on cloud resources. One example includes receiving an indication of a resource type of a software-defined datacenter via an interface of a cloud automation platform, receiving an indication of an ABX action via the interface, associating the resource type with the ABX action to create a resource action responsive to an input via the interface, and deploying a blueprint…
METHODS AND SYSTEMS THAT PROVIDE EFFICIENT CONTENTION CONTROL IN DISTRIBUTED COMPUTER SYSTEMS
Granted: October 3, 2024
Application Number:
20240330077
The current document is directed to contention control for computational resources in distributed computer systems and, in particular, to contention control for memory in distributed metrics collection systems that collect and aggregate metric data in distributed computer systems. In one implementation, parallel metric-data collectors in a first distributed computer system collect metric data and one or more aggregators aggregate collected metric data and forward the aggregated metric…
REDIRECTING APPLICATIONS BETWEEN REMOTE DESKTOPS
Granted: September 26, 2024
Application Number:
20240319949
A remote application installed on a first remote desktop can be shared with a second remote desktop. The first remote desktop can be associated with a first user, and the second remote desktop can be associated with the first user and/or some other user(s) different from the first user. The sharing of the remote application can be terminated from the first remote desktop and/or from the second remote desktop.
MULTI-ENGINE INTRUSION DETECTION SYSTEM
Granted: September 19, 2024
Application Number:
20240314141
Example methods and systems for multi-engine intrusion detection are described. In one example, a computer system may configure a set of multiple intrusion detection system (IDS) engines that include at least a first IDS engine and a second IDS engine. In response to detecting establishment of a first packet flow and a second packet flow, the computer system may assign the first packet flow to the first IDS engine and second packet flow to the second engine based on an assignment policy.…
CUSTOM RESOURCE SCHEMA MODIFICATION
Granted: September 12, 2024
Application Number:
20240303227
Custom resource schema modification is described herein. One example method includes providing an interface for modifying a schema of a custom resource in a virtualized environment. The interface can include a first portion configured to receive modifications to summary information corresponding to the custom resource and a second portion configured to receive modifications to properties corresponding to the schema of the custom resource. The method can include validating the modified…