METHODS AND SYSTEMS FOR INCORPORATING USER FEEDBACK IN DISCOVERING AND CORRECTING INCIDENTS IN A DATA CENTER
Granted: December 19, 2024
Application Number:
20240419530
Automated computer-implemented methods and systems for discovering incidents occurring with objects running in a data center and executing remedial measures that correct the incidents are described herein. The methods and systems discover clusters of alerts in a stream of alerts triggered by a stream of events occurring with objects in the data center. User feedback is used to identify alerts with related event types in each cluster of alerts that corresponds to separate incidents…
CLOUD NATIVE NETWORK FUNCTION DEPLOYMENT
Granted: November 14, 2024
Application Number:
20240378092
Example methods and systems for cloud native network function deployment are described. One example may involve a computer system obtaining cluster configuration information associated with multiple single node clusters (SNCs). Based on the cluster configuration information, the computer system may configure (a) a first SNC on a first node and (b) a second SNC on a second node. The computer system may configure (a) a first virtual agent associated with the first SNC, and (b) a second…
LOCALIZING A REMOTE DESKTOP
Granted: November 14, 2024
Application Number:
20240378069
A remote desktop may be localized to a local operating system (OS), such that remote applications and remote files are accessible via the local OS, without having to launch a remote desktop client that renders a user interface (UI) for connection with the remote desktop. The remote desktop client runs in a background as one or more services without any UI. A user may access and use remote applications/files via the same UIs of the local OS that are used to access and use local…
METHOD AND SYSTEM TO PERFORM COMPLIANCE AND AVAILABILITY CHECK FOR INTERNET SMALL COMPUTER SYSTEM INTERFACE (ISCSI) SERVICE IN DISTRIBUTED STORAGE SYSTEM
Granted: November 7, 2024
Application Number:
20240370383
One example method for a host in a virtual storage area network (vSAN) cluster to support vSAN Internet small computer system interface (iSCSI) target services in a distributed storage system of a virtualization system is disclosed. The method includes obtaining ownership information of a target and determining, from the ownership information, whether the host is an owner of the target. In response to determining that the host is the owner of the target, the method further includes…
METHODS AND SYSTEMS FOR USING SMART NETWORK INTERFACE CARDS TO SECURE DATA TRANSMISSION OF DISAGGREGATED HARDWARE
Granted: October 31, 2024
Application Number:
20240364501
This disclosure is directed to methods and systems that establish a secure data channel between a host and a disaggregated hardware device (“DHD”) of a data center. The system comprises an initiator host that runs objects, such as virtual machines and containers. The host includes an initiator smart network interface card (“SNIC”). The initiator SNIC includes a virtual device, a trust platform module (“TPM”) and a security engine. The system also comprises a target host…
METHODS AND SYSTEMS FOR INTELLIGENT ROAMING USING RADIO ACCESS NETWORK INTELLIGENT CONTROLLERS
Granted: October 24, 2024
Application Number:
20240357339
This disclosure is directed to methods and system for intelligent roaming of user equipment (“UE”) of a home network onto a visited network. The methods and systems monitor performance of voice and data services for UEs in coverage areas of edge cell sites of the home network. The methods and systems determine which UEs in the coverage areas of the edge cell sites to roam on the visited network based on decreases in voice and data services. The UEs in the coverage areas selected for…
EXTENSIBILITY FOR CUSTOM DAY-2 OPERATIONS ON CLOUD RESOURCES
Granted: October 24, 2024
Application Number:
20240354168
The present disclosure is related to devices, systems, and methods for extensibility for custom day-2 operations on cloud resources. One example includes receiving an indication of a resource type of a software-defined datacenter via an interface of a cloud automation platform, receiving an indication of an ABX action via the interface, associating the resource type with the ABX action to create a resource action responsive to an input via the interface, and deploying a blueprint…
METHODS AND SYSTEMS THAT PROVIDE EFFICIENT CONTENTION CONTROL IN DISTRIBUTED COMPUTER SYSTEMS
Granted: October 3, 2024
Application Number:
20240330077
The current document is directed to contention control for computational resources in distributed computer systems and, in particular, to contention control for memory in distributed metrics collection systems that collect and aggregate metric data in distributed computer systems. In one implementation, parallel metric-data collectors in a first distributed computer system collect metric data and one or more aggregators aggregate collected metric data and forward the aggregated metric…
REDIRECTING APPLICATIONS BETWEEN REMOTE DESKTOPS
Granted: September 26, 2024
Application Number:
20240319949
A remote application installed on a first remote desktop can be shared with a second remote desktop. The first remote desktop can be associated with a first user, and the second remote desktop can be associated with the first user and/or some other user(s) different from the first user. The sharing of the remote application can be terminated from the first remote desktop and/or from the second remote desktop.
MULTI-ENGINE INTRUSION DETECTION SYSTEM
Granted: September 19, 2024
Application Number:
20240314141
Example methods and systems for multi-engine intrusion detection are described. In one example, a computer system may configure a set of multiple intrusion detection system (IDS) engines that include at least a first IDS engine and a second IDS engine. In response to detecting establishment of a first packet flow and a second packet flow, the computer system may assign the first packet flow to the first IDS engine and second packet flow to the second engine based on an assignment policy.…
CUSTOM RESOURCE SCHEMA MODIFICATION
Granted: September 12, 2024
Application Number:
20240303227
Custom resource schema modification is described herein. One example method includes providing an interface for modifying a schema of a custom resource in a virtualized environment. The interface can include a first portion configured to receive modifications to summary information corresponding to the custom resource and a second portion configured to receive modifications to properties corresponding to the schema of the custom resource. The method can include validating the modified…
PROVISIONING IMAGES TO DEPLOY CONTAINERIZED WORKLOADS IN A VIRTUALIZED ENVIRONMENT
Granted: August 1, 2024
Application Number:
20240256315
A method for provisioning images to deploy containerized workloads in a virtualized environment can include bringing up a containerized workload in a virtualized computing environment responsive to receiving a request to run a containerized workload in the virtualized computing environment. Bringing up the containerized workload can include creating a VMDK that includes a container image in shared storage of an image registry responsive to authenticating with the image registry,…
TRUSTED PLATFORM MODULE ATTESTATION FOR SOFT REBOOTS
Granted: August 1, 2024
Application Number:
20240256287
TPM attestation for soft reboots is described herein. One embodiment includes instructions to receive a request to perform a soft reboot of a computing device executing an existing OS instance and having a TPM, and perform a soft reboot process on the computing device responsive to receiving the request. The soft reboot process can include loading a new kernel and boot modules associated with a new OS instance into a memory of the computing device, measuring the boot modules into PCRs of…
EFFICIENT FORWARD-ERROR-CORRECTION PROTOCOL BASED ON XOR OPERATIONS AND A SPARSE GRAPH
Granted: August 1, 2024
Application Number:
20240256275
The current document is directed to an improved communications protocol that encompasses XOR-based forward error correction and that uses dynamic check-packet graphs that provide for efficient recovery of packets for which transmission has failed. During the past 20 years, XOR-based forward-error-correction (“FEC”) communications protocols have been developed to provide reliable multi-packet message transmission with relatively low latencies and computational complexity. These…
SELECTIVELY PREVENTING RESOURCE OVERALLOCATION IN A VIRTUALIZED COMPUTING ENVIRONMENT
Granted: July 25, 2024
Application Number:
20240248770
The present disclosure is related to devices, systems, and methods for selectively preventing resource overallocation in a virtualized computing environment. One example includes instructions to receive a request to prevent overallocation of a resource in a software-defined datacenter associated with a customer, determine an amount of the resource available to the customer, and assign a respective portion of the amount of the resource available to the customer to each of a plurality of…
WORKLOAD PLACEMENT RESPONSIVE TO FAULT
Granted: July 25, 2024
Application Number:
20240248736
The present disclosure relates to workload placement responsive to fault. One embodiment includes instructions to remove a first host from a first cluster of a software-defined datacenter (SDDC) responsive to a determination of a fault in a hypervisor of the first host, place the first host into a second cluster of the SDDC, wherein the second cluster is designated to run stateless workloads, and add a second host to the first cluster.
ADDING A WATERMARK ON A DOCUMENT FOR PRINTING IN A VIRTUAL DESKTOP INFRASTRUCTURE (VDI) ENVIRONMENT
Granted: July 18, 2024
Application Number:
20240241678
Example methods and systems are described to add a watermark for printing in a virtual desktop environment having an agent side and a client side. A watermark can be configured at the agent side for printing at the client side. At the agent side, a fallback font can be determined for text of the watermark, and coordinate space calculation can be performed, so that the watermark prints correctly at the client side.
ELASTIC PROVISIONING OF CONTAINER-BASED GRAPHICS PROCESSING UNIT (GPU) NODES
Granted: July 18, 2024
Application Number:
20240241760
Example methods and systems for elastic provisioning of container-based graphics processing unit (GPU) nodes are described. In one example, a computer system may monitor usage information associated with a pool of multiple container-based GPU nodes. Based on the usage information, the computer system may apply rule(s) to determine whether capacity adjustment is required. In response to determination that capacity expansion is required, the computer system may configure the pool to expand…
ASYNCHRONOUS, EFFICIENT, ACTIVE AND PASSIVE CONNECTION HEALTH MONITORING
Granted: July 18, 2024
Application Number:
20240241741
The disclosure provides an example method for connection health monitoring and troubleshooting. The method generally includes monitoring a plurality of connections established between a first application running on a first host and a second application running on a second host; based on the monitoring, detecting two or more connections of the plurality of connections have failed within a first time period; in response to detecting the two or more connections have failed within the first…
CLUSTER AFFINITY OF VIRTUAL MACHINES
Granted: July 18, 2024
Application Number:
20240241740
The disclosure provides a method for tracking virtual machines (VMs) associated with a plurality of hosts in an inventory. The method generally includes determining to remove a first host of the plurality of hosts, the first host running a first VM, wherein: the first host and a second host are associated with a first host cluster in the inventory; the first host is the associated-host and the registered-host of the first VM in the inventory; determining the first VM is associated with…