MIXED MODE MANAGEMENT
Granted: January 24, 2019
Application Number:
20190028341
The present disclosure is related to mixed mode management. A machine-readable medium may store instructions executable by a processing resource to determine that a first management node is operating according to a different configuration profile than a second management node and, responsive to the determination, transfer a mixed mode management plug-in from the first management node. The machine-readable medium may further store instructions executable by the processing resource to…
METHOD AND SYSTEM FOR IDENTIFYING DRAWING PRIMITIVES FOR SELECTIVE TRANSMISSION TO A REMOTE DISPLAY
Granted: January 17, 2019
Application Number:
20190018639
Remote desktop servers include a display encoder that maintains a secondary framebuffer that contains display data to be encoded and transmitted to a remote client display and a list of display primitives effectuating updated display data in the secondary framebuffer. The display encoder submits requests to receive the list of drawing primitives to a video adapter driver that receives and tracks drawing primitives that, when executed, update a primary framebuffer.
USE MINIMAL VARIANCE TO DISTRIBUTE DISK SLICES TO AVOID OVER-COMMITMENT
Granted: January 17, 2019
Application Number:
20190018592
An example method for balancing disk usages in a virtualized computing environment may include generating, by a storage manager configured to manage the virtualized computing environment, predicted-disk-utilizations for a plurality of physical disks provisioned to a virtual disk in the virtualized computing environment. In response to a determination that a first predicted-disk-utilization for a first physical disk selected from the plurality of physical disks exceeds a…
METHODS AND SYSTEMS THAT GENERATE PROXY OBJECTS THAT PROVIDE AN INTERFACE TO THIRD-PARTY EXECUTABLES
Granted: January 10, 2019
Application Number:
20190012150
The current document is directed to methods and systems that that generate proxy-object interfaces to external executable code for use in workflows executed by a workflow-execution system. The workflow-execution-engine component of a cloud-management system provides one example of a workflow-execution system in which proxy-object interfaces to external executable code are used. In one implementation, an existing automated-code-generation subsystem generates plug-in class declarations…
MULTIPLE DATA STORAGE MANAGEMENT WITH REDUCED LATENCY
Granted: January 3, 2019
Application Number:
20190004735
System and method for managing multiple data storages using a file system of a computer system utilize a primary data storage to cache objects of logical object containers stored in a secondary data storage in caching-tier volumes. When an access request for an object stored in the secondary data storage is received at the file system and the object is not currently cached in the primary data storage, a caching-tier volume in the primary data storage is created that corresponds to a…
DYNAMIC REGISTRATION OF AN APPLICATION WITH AN ENTERPRISE SYSTEM
Granted: December 27, 2018
Application Number:
20180375925
A computer-implemented method for automatically registering an application with an enterprise system is disclosed. The method accesses an application utilizable with the enterprise system. Generates an application access template for the application, including: generating information specific to the application that is able to be utilized with the enterprise system, and generating parameters specific to the application that is able to be utilized with the enterprise system. The method…
MANAGEMENT OF B-TREE LEAF NODES WITH VARIABLE SIZE VALUES
Granted: December 27, 2018
Application Number:
20180373727
System and method for managing leaf nodes of a B-tree for a file system of a computer system utilize used slots in a directory section of a leaf node to index variable size key-value pair entries stored in a data section of the leaf node and free spaces slots in the directory section to index contiguous free spaces in the data section. Contents of the free space slots in the directory section are updated in response to changes in the contiguous free spaces in the data section to manage…
METHODS AND SYSTEMS TO QUANTIZE AND COMPRESS TIME SERIES DATA
Granted: December 20, 2018
Application Number:
20180365301
Methods and systems quantize and compress time series data generated by a resource of a distributed computing system. The time series data is partitioned according to a set of quantiles. Quantized time series data is generated from the time series data and the quantiles. The quantized time series data is compressed by deleting sequential duplicate quantized data points from the quantized time series data to obtain compress time series data. Quantization and compression are performed for…
Remote Service for Executing Resource Allocation Analyses for Distributed Computer Systems
Granted: December 20, 2018
Application Number:
20180367468
A system and method for performing remote resource allocation analyses on distributed computer systems utilizes a snapshot of a target distributed computer system obtained at a distributed computer system, which is transmitted to a remote resource allocation module so that a remote resource allocation analysis can be performed on the snapshot of the target distributed computer system. The snapshot includes configurations and resource usage information of at least some components of the…
METHODS AND SYSTEMS TO ADJUST RESOURCES AND MONITORING CONFIGURATION OF OBJECTS IN A DISTRIBUTED COMPUTING SYSTEM
Granted: December 20, 2018
Application Number:
20180367434
Methods and systems automatically adjusting resources and monitoring configurations of objects of a distributed computing system in response to changes to application programs. Methods search event messages for information indicating a change in execution of an object. The information is used to determine resource allocation rules of infrastructure resources by and a monitoring configuration for the object. Expected impacts on the infrastructure resource are determined from the rules.…
METHODS AND SYSTEMS TO REDUCE TIME SERIES DATA AND DETECT OUTLIERS
Granted: December 20, 2018
Application Number:
20180365298
Automated methods and systems to reduce the size of time series data while maintaining outlier data points are described. The time series data may be read from a data-storage device of a physical data center. Clusters of data points of the time series data are determined. A normalcy domain of the time series data and outlier data points of the time series data is determined. The normalcy domain of the time series data comprises ranges of values associated with each clusters of data…
METHODS AND SYSTEMS TO ADJUST A MONITORING TOOL AND AUXILIARY SERVERS OF A DISTRIBUTED COMPUTING SYSTEM
Granted: December 20, 2018
Application Number:
20180365044
Methods and systems adjust resources and monitoring configuration of a monitoring tool and auxiliary servers of a distributed computing system. Any new virtual object installed in the distributed computing system or change in functionality of an existing virtual object of the distributed computing system is identified. Expected configuration rules and resource allocation rules are determined for the virtual object. The expected configured rules are used to adjust a monitoring…
VIRTUAL COMPUTING SERVICES DEPLOYMENT NETWORK
Granted: December 6, 2018
Application Number:
20180351877
A virtual computing services deployment network provides a consistent user experience from a variety of locations via a connection fabric for accessing a virtual desktop. The connection fabric identifies a user profile defining the virtualized desktop resources required for a particular user. The connection fabric includes distributed data and processing in nodes distributed throughout a public access network accessible from a user access device. Each of the fabric nodes is operable to…
METHODS AND SYSTEMS THAT DIAGNOSE AND MANAGE UNDESIRABLE OPERATIONAL STATES OF COMPUTING FACILITIES
Granted: December 6, 2018
Application Number:
20180351838
The current document is directed to automatically, semi-automatically, and/or manually monitoring a computing facility to detect and address undesirable operational states in computing facilities, including large distributed computing systems. The currently disclosed monitoring methods and systems employ case-based inference to diagnose and ameliorate undesirable operational states. In disclosed implementations, a database is maintained to store and provide access to records of…
METHODS AND SYSTEMS THAT USE FEEDBACK TO DISTRIBUTE AND MANAGE ALERTS
Granted: December 6, 2018
Application Number:
20180351781
The current document is directed to methods and systems that employ user feedback and user-initiated alert-generation-and-distribution-system modifications to provide for flexibility and responsiveness. In a described implementation, participants in a social environment provided by a collaborative alert-generation-and-distribution-system suggest modifications which are automatically or semi-automatically incorporated in an alert-generation-and-distribution-system when the participants…
METHODS AND SYSTEMS THAT IMPLEMENT AN APPLICATION-LEVEL TUNNEL THROUGH WHICH LONG SYSLOG MESSAGES ARE TRANSMITTED
Granted: December 6, 2018
Application Number:
20180351780
The current document is directed to methods and systems that implement an application-level tunnel through which syslog messages are transmitted. In one implementation, the message portion of syslog messages transmitted through the application-level tunnel includes both a unique message identifier and a long-message-indication field. Syslog messages that contain message portions of greater lengths than a specified maximum length, referred to as “long syslog messages,” are transmitted…
IDENTIFYING COMMON FILE-SEGMENT SEQUENCES
Granted: December 6, 2018
Application Number:
20180349397
Virtual-machine images (VMIs) can be compressed by identifying common cluster sequences shared across VMIs. To identify these sequences, hashes are generated for each cluster in each VMI, resulting in hash files for respective VMIs. The hashes are partitioned to address memory constraints. For each partition, its hashes are entered into buckets of a hash map according to their respective hash values. Each (non-empty) bucket associates a key hash value with one or more pointers to…
FILE SYNCHRONIZATION USING DELTA BITMAPS
Granted: December 6, 2018
Application Number:
20180349233
A synchronization process for virtual-machine images (and other segmented files) provides for generating a “delta” bitmap indicating which segments (e.g., clusters) of a first virtual-machine image were changed to obtain a second (e.g., updated) virtual-machine image on a source node. The delta bitmap can be applied to the second-virtual-machine image to generate a delta file. The delta file can be sent along with the delta bitmap to a target node that already has a copy of the first…
METHODS AND SYSTEMS TO DETECT AND CLASSIFY CHANGES IN A DISTRIBUTED COMPUTING SYSTEM
Granted: December 6, 2018
Application Number:
20180349221
Methods and systems are directed to detecting and classifying changes in a distributed computing system. Divergence value are computed from distributions of different types of event messages generated in time intervals of a sliding time window. Each divergence value is a measure of change in types of events generated in each time interval. When a divergence value, or a rate of change in divergence values, exceeds a threshold, the time interval associated with the threshold violation is…
METHODS AND SYSTEMS TO PRIORITIZE ALERTS WITH QUANTIFICATION OF ALERT IMPACTS
Granted: November 29, 2018
Application Number:
20180341566
Methods and systems are directed to quantifying and prioritizing the impact of problems or changes in a computer system. Resources of a computer system are monitored by management tools. When a change occurs at a resource of a computer system or in log data generated by event sources of the computer system, one or more of the management tools generates an alert. The alert may be an alert that indicates a problem with the computer system resource or the alert may be an alert trigger…