PROVISIONING IMAGES TO DEPLOY CONTAINERIZED WORKLOADS IN A VIRTUALIZED ENVIRONMENT
Granted: August 1, 2024
Application Number:
20240256315
A method for provisioning images to deploy containerized workloads in a virtualized environment can include bringing up a containerized workload in a virtualized computing environment responsive to receiving a request to run a containerized workload in the virtualized computing environment. Bringing up the containerized workload can include creating a VMDK that includes a container image in shared storage of an image registry responsive to authenticating with the image registry,…
TRUSTED PLATFORM MODULE ATTESTATION FOR SOFT REBOOTS
Granted: August 1, 2024
Application Number:
20240256287
TPM attestation for soft reboots is described herein. One embodiment includes instructions to receive a request to perform a soft reboot of a computing device executing an existing OS instance and having a TPM, and perform a soft reboot process on the computing device responsive to receiving the request. The soft reboot process can include loading a new kernel and boot modules associated with a new OS instance into a memory of the computing device, measuring the boot modules into PCRs of…
EFFICIENT FORWARD-ERROR-CORRECTION PROTOCOL BASED ON XOR OPERATIONS AND A SPARSE GRAPH
Granted: August 1, 2024
Application Number:
20240256275
The current document is directed to an improved communications protocol that encompasses XOR-based forward error correction and that uses dynamic check-packet graphs that provide for efficient recovery of packets for which transmission has failed. During the past 20 years, XOR-based forward-error-correction (“FEC”) communications protocols have been developed to provide reliable multi-packet message transmission with relatively low latencies and computational complexity. These…
SELECTIVELY PREVENTING RESOURCE OVERALLOCATION IN A VIRTUALIZED COMPUTING ENVIRONMENT
Granted: July 25, 2024
Application Number:
20240248770
The present disclosure is related to devices, systems, and methods for selectively preventing resource overallocation in a virtualized computing environment. One example includes instructions to receive a request to prevent overallocation of a resource in a software-defined datacenter associated with a customer, determine an amount of the resource available to the customer, and assign a respective portion of the amount of the resource available to the customer to each of a plurality of…
WORKLOAD PLACEMENT RESPONSIVE TO FAULT
Granted: July 25, 2024
Application Number:
20240248736
The present disclosure relates to workload placement responsive to fault. One embodiment includes instructions to remove a first host from a first cluster of a software-defined datacenter (SDDC) responsive to a determination of a fault in a hypervisor of the first host, place the first host into a second cluster of the SDDC, wherein the second cluster is designated to run stateless workloads, and add a second host to the first cluster.
ELASTIC PROVISIONING OF CONTAINER-BASED GRAPHICS PROCESSING UNIT (GPU) NODES
Granted: July 18, 2024
Application Number:
20240241760
Example methods and systems for elastic provisioning of container-based graphics processing unit (GPU) nodes are described. In one example, a computer system may monitor usage information associated with a pool of multiple container-based GPU nodes. Based on the usage information, the computer system may apply rule(s) to determine whether capacity adjustment is required. In response to determination that capacity expansion is required, the computer system may configure the pool to expand…
ASYNCHRONOUS, EFFICIENT, ACTIVE AND PASSIVE CONNECTION HEALTH MONITORING
Granted: July 18, 2024
Application Number:
20240241741
The disclosure provides an example method for connection health monitoring and troubleshooting. The method generally includes monitoring a plurality of connections established between a first application running on a first host and a second application running on a second host; based on the monitoring, detecting two or more connections of the plurality of connections have failed within a first time period; in response to detecting the two or more connections have failed within the first…
CLUSTER AFFINITY OF VIRTUAL MACHINES
Granted: July 18, 2024
Application Number:
20240241740
The disclosure provides a method for tracking virtual machines (VMs) associated with a plurality of hosts in an inventory. The method generally includes determining to remove a first host of the plurality of hosts, the first host running a first VM, wherein: the first host and a second host are associated with a first host cluster in the inventory; the first host is the associated-host and the registered-host of the first VM in the inventory; determining the first VM is associated with…
ADDING A WATERMARK ON A DOCUMENT FOR PRINTING IN A VIRTUAL DESKTOP INFRASTRUCTURE (VDI) ENVIRONMENT
Granted: July 18, 2024
Application Number:
20240241678
Example methods and systems are described to add a watermark for printing in a virtual desktop environment having an agent side and a client side. A watermark can be configured at the agent side for printing at the client side. At the agent side, a fallback font can be determined for text of the watermark, and coordinate space calculation can be performed, so that the watermark prints correctly at the client side.
SECURITY THREAT ANALYSIS
Granted: July 11, 2024
Application Number:
20240236142
Example methods and systems for security threat analysis are described. One example may involve a first computer system configuring a test packet that includes malicious content for forwarding along a network path between (a) a first network element that is connected with a first virtualized computing instance and (b) a second network element that is connected with a second virtualized computing instance. The test packet may be injected at the first network element and forwarded towards…
VALIDATION-BASED SERVICE REQUEST HANDLING
Granted: July 11, 2024
Application Number:
20240236037
Example methods and systems for validation-based service request handling are described. In one example, a computer system may obtain, from a management entity, configuration information specifying a unicast service address associated with a service node capable of providing a network service. In response to detecting a service request from the virtualized computing instance, the computer system may generate a modified service request that (a) is destined for the unicast service address…
PRIORITY-BASED NETWORK BANDWIDTH ALLOCATION
Granted: July 11, 2024
Application Number:
20240236016
Example methods and systems for priority-based network bandwidth allocation are described. In one example, a first computer system may detect an event indicating that network bandwidth allocation is required for a virtualized computing instance. The first computer system may identify, from multiple priority levels, a first priority level that is associated with (a) the virtualized computing instance, (b) a logical network element to which the virtualized computing instance is attached,…
DISPLAYING A TRANSCRIPTION WITH ADJUSTABLE TRANSPARENCY
Granted: July 11, 2024
Application Number:
20240233710
A transcription, such as text of audio occurring at to a remote desktop and which may include a translation, may be presented concurrently with an image of the remote desktop on an unused area of a display screen. The transcription may be presented with a selectable and adjustable transparency, and can continue to be presented after the image of the remote desktop is minimized.
ZERO-INPUT INTELLIGENCE MAINTENANCE ASSISTANT FOR A VIRTUALIZED COMPUTING ENVIRONMENT
Granted: July 11, 2024
Application Number:
20240232818
Intelligent maintenance may be planned and performed for hosts in a pool of hosts that run virtual desktop sessions. A number of hosts to be shut down for maintenance, as well as a start time for a maintenance window, may be determined based on a first risk model and on a capacity risk level. A second risk model may be used to determine whether a capacity risk is still less than the capacity risk level, if some hosts have sessions that take longer than expected to log off and so delay…
METHODS AND SYSTEMS THAT MONITOR SYSTEM-CALL-INTEGRITY
Granted: July 11, 2024
Application Number:
20240232328
The current document is directed to automated methods and systems that monitor system-call execution by operating systems in order to detect operating-system corruption. A disclosed implementation of the currently disclosed automated system-call-integrity monitor generate operational system-call fingerprints for randomly selected system calls executed by guest operating systems of randomly selected virtual machines and compares the operational system-call fingerprints to reference…
OBJECT INPUT/OUTPUT SAMPLING FOR PERFORMANCE DIAGNOSIS IN VIRTUALIZED COMPUTING ENVIRONMENT
Granted: July 11, 2024
Application Number:
20240231877
An example method for sampling an input/output (I/O) to an object owned by an object owner is disclosed. The method includes receiving an I/O and determining whether a predetermined time interval exceeds. In response that the predetermined time interval does not exceed, the example method includes calculating a first sample score associated with the object owner, obtaining a second sample score associated with a component owner of the object and calculating a weighted sample score based…
DISPLAYING REMOTE DESKTOP INFORMATION WITH ADJUSTABLE TRANSPARENCY
Granted: July 11, 2024
Application Number:
20240231859
Information, such as information pertaining to a remote desktop, may be presented concurrently with an image of the remote desktop on an unused area of a display screen. The information may be presented with a selectable and adjustable transparency.
DISPLAYING A REMOTE DESKTOP WITH CONTROLLABLE TRANSPARENCY
Granted: July 11, 2024
Application Number:
20240231609
A remote desktop can be displayed with controllable transparency over a local desktop. The transparency may be varied using hotkeys. Hotkeys may also be used to control/switch the direction of user input, such as mouse and keyboard events, so as to direct the user input to the remote desktop or to the local desktop.
SCALABLE NETWORK LATENCY MEASUREMENT DESIGN IN DISTRIBUTED STORAGE SYSTEMS
Granted: June 27, 2024
Application Number:
20240214290
The disclosure provides a method for measuring network latency between hosts in a cluster. The method generally includes receiving, by a first host, a first ping list indicating the first host is to engage in a first ping round with a second host; executing the first ping round with the second host, wherein executing the first ping round comprises: transmitting first ping requests to the second host; calculating a network latency for each of the first ping requests; and determining a…
METHODS AND SYSTEMS THAT GENERATE COMPONENT QUANTITIES FOR SYSTEM CONFIGURATIONS
Granted: June 20, 2024
Application Number:
20240202196
The current document is directed to methods and systems that generate lists of component types and quantities needed for system installations based on parameter values that characterize the system, environment, and application domain, referred to as “input values.” An implementation of a private-5G-network component-type-and-quantity-determination system is disclosed. An initial model used to generate component types and quantities is generated from information acquired from various…