METHODS AND SYSTEMS FOR RESOLVING ROOT CAUSES OF PERFORMANCE PROBLEMS WITH APPLICATIONS EXECUTING IN A DATA CENTER
Granted: January 18, 2024
Application Number:
20240020191
Automated methods and systems for resolving potential root causes of performance problems with applications executing in a data center are described. The automated methods use machine learning to train an inference model that relates event types recorded in metrics, log messages, and traces of an application to values of a key performance indicator (“KPI”) of the application. The methods use the trained inference model to determine which of the event types are important event types…
HANDLING LOCAL APPLICATION EVENTS WHILE WORKING ON REMOTE DESKTOPS
Granted: January 18, 2024
Application Number:
20240020080
A method enables events associated with local applications to be handled at a user device while a remote desktop is being used at the user device. A notification of an event is presented on a display screen of the user device, over the remote desktop. The notification prompts a user to handle the event now or handle the event later. In response to the user selecting to handle the event now, a window of a local application associated with the event is displayed over the remote desktop and…
AUTOMATED METHODS AND SYSTEMS FOR SIMULATING A RADIO ACCESS NETWORK
Granted: January 4, 2024
Application Number:
20240007385
This disclosure is directed to a simulation system that verifies functionality and performance of an automated telecommunication cloud platform (“TCP”) which is used to configure hosts of cell sites and a mobile core of a 5G cellular network. The mock hosts are created with a required virtualization platform inventory of objects for implementing a 5G cellular network and registers the mock hosts with a mock centralized server management platform (“mock VC”). The mock hosts are…
DISTRIBUTED VIRTUAL SWITCH FOR VIRTUALIZED COMPUTER SYSTEMS
Granted: December 28, 2023
Application Number:
20230421511
A runtime state of a virtual port associated with a virtual machine (“VM”) is persisted as the VM is migrated from a source host to a destination host. In certain embodiments, a virtual switch forwards network frames between the VM and the physical network interface via the virtual port. During migration of the VM, the runtime state of the virtual port is transferred to the destination host and applied at the second host to a virtual port associated with a second virtual switch at…
BOOTSTRAPPING AN ENCRYPTED SINGLE NODE VSAN CLUSTER
Granted: December 28, 2023
Application Number:
20230421462
The present disclosure relates to bootstrapping an encrypted single node VSAN cluster. One method includes receiving a request to create an encrypted VSAN cluster from a single host in a software-defined datacenter, deploying a virtual server on a VSAN datastore of the software-defined datacenter, registering a native key provider (NKP) in the virtual server, creating an empty VSAN cluster encrypted by the NKP, adding the single host to the encrypted empty cluster to create a one-host…
SMART LINK GENERATION
Granted: December 21, 2023
Application Number:
20230412668
In a method for generating at least one smart link, a plurality of destination digital resources is received. At least one smart link is generated based on the plurality of destination digital resources, wherein the at least one smart link provides configurable access to the plurality of destination digital resources in response to an interaction with the at least one smart link.
DYNAMIC CONFIGURATION OF STATISTICS ENDPOINT IN VIRTUALIZED COMPUTING ENVIRONMENT
Granted: December 21, 2023
Application Number:
20230409366
Example methods and systems associated with dynamic configuration of a statistics endpoint in a virtualized computing environment have been disclosed. One example method includes in response to receiving a first request, by a host in the virtualized computing environment, accepting a configuration file specified in the first request; in response to receiving a second request, by the host, parsing a rule based on the configuration file and collecting statistics based on the rule;…
ECONOMIC PRINTING MODE
Granted: December 21, 2023
Application Number:
20230409254
Example methods and systems to implement an economic printing mode are described. In one example, a computer system may provide a user interface specifying multiple selectable levels associated with economic printing mode. The source printing content may be transformed to generate target printing content that is printable using a lower ink consumption compared to the source printing content. For example, in response to a selection of a first level, print quality may be reduced. In…
STATE CONSISTENCY MONITORING FOR PLANE-SEPARATION ARCHITECTURES
Granted: December 14, 2023
Application Number:
20230403218
Example methods and systems for state consistency monitoring in a network environment are described. In one example, a computer system may identify association chain(s) that associate (a) first state information associated with one or more first network entities residing on a first plane with (b) second state information associated with one or more second network entities residing on a second plane. Based on the association chain(s), a consistency check may be performed to compare…
PERFORMANCE IMPROVEMENT OF IPSEC TRAFFIC USING SA-GROUPS AND MIXED-MODE SAS
Granted: December 14, 2023
Application Number:
20230403252
Some embodiments provide a method of load balancing data message flows across multiple secure connections. The method receives a data message having source and destination addresses formatted according to a first protocol. Based on the source and destination addresses, the method selects one of the multiple secure connections for the data message. Each of the secure connections handles a first set of connections formatted according to the first protocol and a second set of connections…
GRAPH DATABASE AND METHODS WITH IMPROVED FUNCTIONALITY
Granted: December 14, 2023
Application Number:
20230401214
The current document is directed to graph databases and, in particular, to improvements in the operational efficiencies of, and the range of functionalities provided by, graph databases. One currently disclosed improvement provides for associating user-defined and developer-defined functions with node and relationship entities stored within the graph database. These entity-associated functions are executed in entity-associated execution environments provided to the entities during query…
PROCESSES AND SYSTEMS FOR DECENTRALIZATION OF DATA PRODUCED AT THE EDGE OF A DISTRIBUTED COMPUTING SYSTEM
Granted: December 7, 2023
Application Number:
20230394076
Computer-implemented processes and systems described herein are directed to reducing volumes of data sent from edge devices to a data center. Each edge device runs an agent that collects event information generated by event sources of the edge device in a runtime interval. Each agent reduces the event information to relevant event information at the edge device in accordance with instructions received from a controller server of the data center. The relevant event information contains…
HEALTH EVALUATION FOR A DISTRIBUTED STORAGE SYSTEM
Granted: December 7, 2023
Application Number:
20230393775
The health of a distributed storage system provided by a virtualized computing environment may be evaluated. The evaluation techniques categorize health issues based on at least three categories (e.g., storage data availability and accessibility, storage data performance, and storage space utilization and efficiency), and provide priority levels for the health issues within each category. In this manner, a more user-oriented approach is provided wherein in addition to identifying health…
INTRUSION DETECTION WITH ADAPTIVE PATTERN SELECTION
Granted: November 30, 2023
Application Number:
20230388320
Example methods and systems for intrusion detection with adaptive pattern selection are described. In one example, a computer system may perform pattern selection by selecting a subset from a set of multiple patterns based on metric information. In response to receiving a packet belonging to a flow between a source endpoint and a destination endpoint, a first matching operation may be performed to determine whether the packet is matchable to a particular pattern from the set of multiple…
BYPASSING A USER PASSCODE WHEN ACCESSING A GATEWAY OF A VIRTUAL DISKTOP INFRASTRUCTURE SYSTEM
Granted: November 30, 2023
Application Number:
20230388289
A method enables a user to bypass a pass code, such as personal identification number (PIN), when performing an authentication process between a client device and a gateway/broker of a virtual desktop infrastructure (VDI) provided by a virtualized computing environment. A customized operating system (OS) of the client device includes pre-installed certificates and keys that are used in the authentication process and which are protected by the PIN. Through a public interface, a client…
DECENTRALIZED NETWORK TOPOLOGY ADAPTATION IN PEER-TO-PEER (P2P) NETWORKS
Granted: November 16, 2023
Application Number:
20230370520
Example methods and systems for decentralized network topology adaptation in a in a peer-to-peer (P2P) network are described. In one example, a first computer system may obtain first attribute information associated with the first computer system; and second attribute information associated with a second computer system. Based on the first and second attribute information, the first computer system may generate a connection confidence prediction associated with a connection between the…
PACKET FLOW MONITORING WITH ATTRIBUTE-TO-IDENTIFIER MAPPING
Granted: November 16, 2023
Application Number:
20230370346
Example methods and systems for packet flow monitoring are described. In one example, a first computer system may detect a flow of packets along a datapath between a source and a destination and determine source attribute information associated with the source and destination attribute information associated with the destination. The first computer system may perform attribute-to-identifier mapping by (a) mapping the source attribute information to a source identifier having a reduced…
FLOW-BASED SECURE PACKET FORWARDING
Granted: November 2, 2023
Application Number:
20230353543
Example methods and systems for flow-based secure packet forwarding are described. In one example, a first computer system may assess validity of a security token associated with a flow of one or more packets. In response to determination that the security token is valid, a security association associated with the flow and the security token may be negotiated with a second computer system. The first computer system may process a packet associated with the flow and the security token to…
PRIVACY-PRESERVING MACHINE-LEARNING FOR CAPACITY FORECASTING IN A HYPER-CONVERGED SOFTWARE-DEFINED STORAGE PLATFORM
Granted: October 26, 2023
Application Number:
20230342171
Capacity forecasting may be performed for distributed storage resources in a virtualized computing environment. Historical data indicative of usage of the storage resources is transformed into a privacy-preserving format and is preprocessed to remove outliers, to fill in missing values, and to perform normalization. The preprocessed historical data is inputted into a machine-learning model, which applies a piecewise regression to the historical data to generate a prediction output.
INTELLIGENT CAPACITY PLANNING FOR STORAGE IN A HYPERCONVERGED INFRASTRUCTURE
Granted: October 26, 2023
Application Number:
20230342174
Intelligent capacity planning is provided for storage in a hyperconverged infrastructure environment. The storage may be a logical storage unit that is supported by storage space of a plurality of hardware disks in a virtualized computing environment. Failure predictions can be obtained for each individual hardware disk, and a failure prediction for a number of hardware disk in a hardware disk set can also be obtained. A failure prediction and/or a reduced availability prediction for the…