Persistent enrollment of a computing device based on a temporary user
Systems and methods are included for causing a computing device to implement a management policy prior to a user logging into an operating system on initial boot. As part of initial boot, the computing device contacts a management server for enrollment. ... Vmware Inc
Techniques for implementing hybrid flash/hdd-based virtual disk files
Techniques for utilizing flash storage as an extension of hard disk (hdd) storage are provided. In one embodiment, a computer system stores a subset of blocks of a logical file in a first physical file, associated with a first data structure that represents a filesystem object, on flash storage and a subset of blocks, associated with a second data structure that represents a filesystem object comprising tiering configuration information that includes an identifier of the first physical file, in a second physical file on hdd storage. ... Vmware Inc
Methods, apparatus, systems and articles of manufacture are disclosed to manage asset in a computing environment using a common agent framework. An example method includes maintaining a catalog of capabilities available to an asset based on plugins installed at the asset. ... Vmware Inc
Internet recovery of a windows configuration
Systems and methods are included for causing a computing device to assemble and boot from a managed operating system. When the computing device is powered on, it can execute firmware that specifies a server to contact. ... Vmware Inc
Configuring a computing device using managed operating system images
Systems and methods are included for causing a computing device to assemble and boot from a managed operating system. When the computing device is powered on, it can execute firmware that specifies a server to contact. ... Vmware Inc
Persistent enrollment of a computing device using vendor autodsicovery
Systems and methods are included for causing a computing device to request ownership information and configure itself based on which tenant is associated with the computing device. During launch of an operating system, such as windows, the computing device can contact a server that tracks ownership information. ... Vmware Inc
Persistent enrollment of a computing device using a bios
Systems and methods are included for causing a computing device to install a management agent prior to an operating system completing its first boot. A bootstrap loader is flashed into firmware, such as the bios, of a computing device. ... Vmware Inc
Logical to physical sector size adapter
The present disclosure describes processing a write command directed to a block-based main storage device, and having a target logical sector and write data. The processing may include writing an address of a physical sector in the main storage device that contains the target logical sector to a header portion of a scratch block stored in a byte-addressable storage. ... Vmware Inc
User interface control based on pinch gestures
An example method is provided for a computing device to perform user interface control based on a pinch gesture. The computing device includes a touch-sensitive display. ... Vmware Inc
Reserving physical resources based upon a physical identifier
Disclosed are various approaches for facilitating reservation of a physical resource on behalf of a user. A physical identifier can be affixed to a physical resource. ... Vmware Inc
Controlling proxy devices through a managed gateway
Systems and methods are provided for remotely managing proxy devices through a gateway device. An example method can include establishing electronic communication between the gateway device and a remotely located management server. ... Vmware Inc
Propagating affinity data to large file block clusters in a file system
The systems described herein are configured to enhance the efficiency of memory usage and access in a vm file system data store with respect to allocating memory in large and small file block clusters using affinity metadata and propagating and maintaining the affinity metadata in support of the described allocation. In order to maintain affinity metadata of the large file block cluster, affinity generation values stored on the large file block cluster are read and cached affinity generation values for each small file block cluster are read from an in-memory cache associated with the large file block cluster. ... Vmware Inc
Allocating memory resources in a file system based on affinity data
The systems described herein are configured to enhance the efficiency of memory usage and access in a vm file system data store with respect to allocating memory in large and small file block clusters using affinity metadata and propagating and maintaining the affinity metadata in support of the described allocation. During storage of file data, an affinity identifier of the file data is determined. ... Vmware Inc
Granular unmapping with variable addressing in a data store
The systems described herein are configured to enhance the efficiency of memory in a host file system with respect to hosted virtual file systems. In situations when the hosted virtual file systems use smaller file block sizes than the file block sizes of the host file system. ... Vmware Inc
The systems described herein are configured to reduce the number of resource policies created and stored on a cluster for provisioning and/or managing virtual computing instances (vcis) utilization of one or more resources. An open-ended vci policy including at least one open-ended rule having an undefined value and a resource is selected. ... Vmware Inc
A policy-driven method of migrating a virtual computing resource that is executing an application workload includes the steps of determining that at least one of multiple policies of the application has been violated by the virtual computing resource while executing the workload in a first virtual data center, and responsive to said determining, programmatically performing: (1) searching for a virtual data center to which the virtual computing resource can be migrated, (2) determining that the virtual computing resource will be able to comply with all of the policies of the application while executing the workload if the virtual computing resource is migrated to the second virtual data center, and (3) based on determining the ability to comply, migrating the virtual computing resource across clouds, namely from the first virtual data center to the second virtual data center.. . ... Vmware Inc
Techniques for security scanning of containers executing within vms. A virtualization system maintains container disk files that store data for containers. ... Vmware Inc
A coordinated multi-cast content distribution process is used to distribute content, e.g., files, from a source node of a network to target nodes of the network. A minimum spanning tree is identified for the network based on costs of edges connecting the nodes. ... Vmware Inc
Techniques for decoupling the commit and replay of file system metadata updates in a clustered file system (cfs) are provided. In one embodiment, a cfs layer of a computer system can receive a file i/o operation from a client application, where the file i/o operation involves an update to a file system metadata resource maintained on persistent storage. ... Vmware Inc
Files, e.g., disk-image files can be teleported from a source node of a network to a target node in that a copy of file can be assembled at least in part using file parts found on the target node. Source hashes can be generated based on segments of the source file. ... Vmware Inc
A method for processing virtualization of computers that are part of a group into virtual computers is provided. The method includes obtaining relationship data from the computers, where the relationship data identifies parameters used to communicate within the group. ... Vmware Inc
A computer system that employs a solid-state memory device as a physical storage resource includes a hypervisor that is capable of supporting trim commands issued by virtual machines running in the computer system. When a virtual machine issues a trim command to its corresponding virtual storage device to invalidate data stored therein, the trim command is received at an interface layer in the hypervisor that translates the trim command to a scsi command known as ummap. ... Vmware Inc
A distributed file system may be configured with file blocks of a first type and file blocks of a second type, from allocation units that comprise a logical volume containing the file system. File blocks of the second type may be defined from one or more file blocks of the first type. ... Vmware Inc
A method for copying first data stored at a primary data center to a secondary data center is provided. The method includes initiating a first replication task to copy the first data from the primary data center to the secondary data center. ... Vmware Inc
A method is described for enabling inter-process communication between a first application and a second application, the first application running within a first virtual machine (vm) in a host and the second application running within a second vm in the host, the method includes receiving a request to attach a shared region of memory to a memory allocation, identifying a list of one or more physical memory pages defining the shared region that corresponds to the handle, and mapping guest memory pages corresponding to the allocation to the physical memory pages. The request may be received by a framework from the second application and includes a handle that uniquely identifies the shared region of memory as well as an identification of at least one guest memory page corresponding to the memory allocation.. ... Vmware Inc
Exemplary methods, apparatuses, and systems include a master node receiving, from a new node, a request indicating the new node is joining a cluster of nodes. The master node transmits, to the new node, an identifier of a delegate node within the cluster. ... Vmware Inc
A method is described for enabling inter-process communication between a first application and a second application, the first application running within a first virtual machine (vm) in a host and the second application running within a second vm in the host, the method includes receiving a request to attach a shared region of memory to a memory allocation, identifying a list of one or more physical memory pages defining the shared region that corresponds to the handle, and mapping guest memory pages corresponding to the allocation to the physical memory pages. The request may be received by a framework from the second application and includes a handle that uniquely identifies the shared region of memory as well as an identification of at least one guest memory page corresponding to the memory allocation.. ... Vmware Inc
Systems and techniques are described for transferring data. A described technique includes receiving a request to transmit a data block from a first data storage device to a second data storage device. ... Vmware Inc
Disclosed are various embodiments for automating the provision of applications to managed client devices. A search string is passed through an iframe embedded in a web page to a remote computing device that provides an application programming interface (api) for an application store. ... Vmware Inc
Embodiments are directed towards managing computer applications. A configuration package may be provided to provision a cloud service stack on a cloud platform such that the cloud service stack corresponds to a main stack model. ... Vmware Inc
A virtualized environment includes a pool of vms, each vm configured to run one or more virtual containers. Each virtual container runs as an isolated process in userspace on a guest operating system. ... Vmware Inc
The approaches described herein implement synchronous execution of a user space operation from a kernel context. A thread, executing on a computing device, initializes a second kernel stack based on a first kernel stack. ... Vmware Inc
A method and tangible medium embodying code for allocating resource units of an allocatable resource among a plurality of clients in a computer is described. In the method, resource units are initially distributed among the clients by assigning to each of the clients a nominal share of the allocatable resource. ... Vmware Inc
Techniques for communicating between service nodes within a hybrid cloud computing system. These techniques include utilizing a messaging provider within an off-premise computing system to pass messages between off-premise servers holding a connection to an on-premise computer system and off-premise servers holding a connection to an end user computer system.. ... Vmware Inc
In an example, a method of replication between computing systems includes replicating virtual machine files from primary storage in a primary computing system to secondary storage in a secondary computing system. The virtual machine files implement a plurality of virtual machines in the primary computing system and a plurality of replica virtual machines in the secondary computing system. ... Vmware Inc
Large-scale data migration processes are managed using a schedule optimizer implemented in software. The schedule optimizer assigns an available data migration window to each server in an inventory of servers based on a scheduling priority determined for that server. ... Vmware Inc
A sequence of input language (il) instructions of a guest system is converted, for example by binary translation, into a corresponding sequence of output language (ol) instructions of a host system, which executes the ol instructions. In order to determine the return address after any il call to a subroutine at a target entry address p, the corresponding ol return address is stored in an array at a location determined by an index calculated as a function of p. ... Vmware Inc
One or more embodiments provide techniques for executing a workflow in a private data center. The cloud data center receives a request from a user. ... Vmware Inc
An approach is disclosed for registering and authenticating internet of things (iot) devices. In one embodiment, an installation device receives, from an iot device, an identifier (id) and a hash of a public key, where the iot device itself generates the id, the public key, and a private key. ... Vmware Inc
An approach for parsing and streaming contents of archive files is disclosed. In one embodiment, a client script executed by a web browser parses an archive file based on its archival format, without loading the entire archive file into memory. ... Vmware Inc
One or more embodiments provide techniques for executing a workflow in a private data center. The cloud data center receives a request from a user. ... Vmware Inc
In accordance with an embodiment of the invention, a cloud computing system is disclosed. The system includes a software-defined data center (sddc), the sddc including at least one cluster supported within the sddc and at least one host computer running within the cluster, wherein the at least one host computer is configured to support at least one workload comprising an operating system and an application, and a cloud infrastructure, the cloud infrastructure including at least one child vm, the at least one child vm configured to virtualize the at least one host computer running within the cluster, and at least one parent virtual machine, wherein additional child vms are deployed by forking the at least one parent vm.. ... Vmware Inc
Methods and systems for providing virtual workspaces are provided. Example embodiments provide a application workspace system “aws,” which enables users to access remote server-based applications (e.g., thin client applications, terminal server applications, applications on hosted operating systems, etc.) using the same interface that they use to access local applications, without needing to know where the application is being accessed. ... Vmware Inc
Various examples for providing a dynamic runtime interface for device management are described. In one example, a computing environment can access metadata that describes a configuration of a user interface made in a profile template designer application. ... Vmware Inc
Embodiments of the disclosure provide techniques for measuring congestion and controlling quality of service to a shared resource. A module that interfaces with the shared resource monitors the usage of the shared resource by accessing clients. ... Vmware Inc
System and method for managing public internet protocol (ip) addresses for a group of virtual data centers utilize a virtual overlay network to route communications between the virtual data centers and a public network through a virtual edge router of one of the virtual data centers using a public ip address assigned to that virtual edge router.. . ... Vmware Inc
The technology disclosed herein enables load balancing between a pair of virtual edge systems configured for high availability at an edge of a local network environment. In a particular embodiment, a method provides assigning a virtual network address to the pair of virtual edge systems. ... Vmware Inc
Disclosed are various approaches for a secure communication session between applications installed on a client device. The secure communication session can be provided over an insecure operating system application programming interface (api). ... Vmware Inc
An example method of memory management in a virtualized computing system includes: generating a page table hierarchy that includes address translations to first pages of memory that store kernel software and second pages of the memory that store user software; configuring a processor to: 1) implement a first address translation scheme, which uses a first virtual address width, for a hypervisor privilege level; 2) implement a second address translation scheme, which uses a second virtual address width, for supervisor and user privilege levels, where the first virtual address width is larger than the second virtual address width; and 3) use the page table hierarchy for each of the first and second address translation schemes; and executing the kernel software at the hypervisor privilege level and the user software at the user privilege level.. . ... Vmware Inc
Embodiments present a virtual disk image to applications such as virtual machines (vms) executing on a computing device. The virtual disk image corresponds to one or more subparts of binary large objects (blobs) of data stored by a cloud service, and is implemented in a log structured format. ... Vmware Inc
Viewing and editing operations on a file having an unsupported file type are enabled through a method of opening the file through a remoting session. The method includes the steps of receiving login information from a user and determining if there is a recent open file request. ... Vmware Inc
An example method of extending a cloud director configured to manage a cloud computing system includes: receiving requests to register external services with the cloud director; generating phase associations between the external services and an extensible phase of a workflow of the cloud director; executing the workflow of the cloud director and, in response to reaching the extensible phase, determining an execution order for at least one of the phase associations; and sending a message from the cloud director to each external service of the at least one phase association based on the execution order.. . ... Vmware Inc
Techniques for optimizing cpu usage in a host system based on vm guest os power and performance management are provided. In one embodiment, a hypervisor of the host system can capture information from a vm guest os that pertains to a target power or performance state set by the guest os for a vcpu of the vm. ... Vmware Inc
An example method of emulating nested page table (npt) mode-based execute control in a virtualized computing system includes: providing npt mode-based execute control from a hypervisor to a virtual machine (vm) executing in the virtualized computing system; generating a plurality of shadow npt hierarchies at the hypervisor based on an npt mode-based execute policy obtained from the vm; configuring a processor of the virtualized computing system to exit from the vm to the hypervisor in response to an escalation from a user privilege level to a supervisor privilege level caused by guest code of the vm; and exposing a first shadow npt hierarchy of the plurality of shadow npt hierarchies to the processor in response to an exit from the vm to the hypervisor due to the escalation from the user privilege level to the supervisor privilege level.. . ... Vmware Inc
Examples construct a bootloader address space using a page fault exception. A bootloader executing in machine address (ma) space determines the ma at which the bootloader has been loaded into memory. ... Vmware Inc
Operating system update management for enrolled devices is disclosed according to various examples. In one example, a computing environment can receive an identifier from at least one of a multitude of client devices enrolled with a management service, where the identifier is indicative of a software update available for the at least one of the plurality of client devices. ... Vmware Inc
A distributed shared log storage system employs an adapter that translates apis for a big data application to apis of the distributed shared log storage system. The adapter is configured for different big data applications in accordance with a profile thereof, so that storage performance using the distributed shared log storage system can be comparable to the storage performance of the profiled big data application. ... Vmware Inc
Power consumption by a first host included in a plurality of hosts in a clustered computing system, where each of the hosts executes one or more applications, is managed by detecting that a utilization level of the first host falls below a threshold value and, responsive to the detecting, migrating one or more applications executing on the first host to a second host. After the migration is completed, the first host is caused to consume less power while remaining powered on.. ... Vmware Inc
Various examples for providing execution of both a first management application and a second management application on a client device are provided. In one example, a client device can be configured to identify that a first management application, such as a legacy management application, installed on the client device has management privileges with an operating system of the client device. ... Vmware Inc
Disclosed are aspects of resource allocation diagnosis for distributed computer systems. In one example, a current snapshot of a distributed computing system is created. ... Vmware Inc
A method for suppressing broadcast messages includes receiving a broadcast message from a client that requests configuration information from a configuration server. The method includes queueing the broadcast message in a request queue and then identifying an oldest message in a request queue. ... Vmware Inc
In a computer-implemented method to facilitate administration of a virtualization infrastructure, posted messages of members of a virtualization infrastructure are displayed, wherein the posted messages comprise tags identifying operational conditions of the members of the virtualization infrastructure. Responsive to a selection of a particular tag, the members of the virtualization infrastructure that posted a message comprising the particular tag are displayed.. ... Vmware Inc
In a computer-implemented method to facilitate administration of a virtualization infrastructure, operational conditions of members of the virtualization infrastructure are monitored by a social network monitoring agent, wherein the members of the virtualization infrastructure are mapped to a social network such that at least a portion of the members of the virtualization infrastructure are also members of the social network. A group of members of the virtualization infrastructure is automatically created within the social network based at least in part on the operational conditions.. ... Vmware Inc
A runtime state of a virtual port associated with a virtual machine (“vm”) is persisted as the vm is migrated from a source host to a destination host. In certain embodiments, a virtual switch forwards network frames between the vm and the physical network interface via the virtual port. ... Vmware Inc
Methods, apparatus and articles of manufacture to propagate node changes in a cluster of nodes and reconfigure services based on the node changes in a cloud computing environment are disclosed. Example methods disclosed herein include analyzing a node change event message at a first node of the plurality of nodes to identify a node change event type contained in the node change event message. ... Vmware Inc
Various systems facilitate encrypted file storage. A client device may generate an encrypted version of a file. ... Vmware Inc
A method of transmitting packets at a first node of a network to a second node of the network, includes the steps of determining whether or not a total number of packets that are in flight is less a threshold number of packets, computing a target number of forward error correction (fec) packets upon determining that the total number is less than the threshold number, transmitting a new fec packet if the number of fec packets that are in flight is less than the target number, and transmitting a data packet if the number of fec packets that are in flight is equal to or greater than the target number.. . ... Vmware Inc
Methods and systems that allocate the total cost of virtual storage created from hard disk drives (“hdds”) and solid state drives (“ssds”) of server computers and mass-storage devices of a cloud-computing facility are described. The virtual storage is used to form virtual disks (“vds”) of virtual machines (“vms”) comprising a virtual datacenter (“vdc”). ... Vmware Inc
Methods and systems that identify objects of a data center that exhibit correlated-extreme behavior are described. The objects may be, but are not limited to, virtual machines (“vms”), containers, server computers, clusters of server computers, and the data center itself. ... Vmware Inc
The present disclosure is related to predicting application response lime based on metrics. An example machine-readable medium may store instructions executable by a processing resource to determine a particular response time and an average response time of an application based on a plurality of relevant performance metrics associated with the application during a first period of time, classify the particular response time into a group based on the average response time, and determine a relationship between the plurality of relevant performance metrics and the particular response time of the application. ... Vmware Inc
Described herein are systems, methods, and software to provide enhanced security when opening applications. In one implementation, an application service receives, over a network, an application request from an end user device to support a file open request on the end user device, wherein the application request occurs based on a security status of a file associated with the file open request. ... Vmware Inc
Dynamic program analysis is decoupled from execution in virtual computer environments so that program analysis can be performed on a running computer program without affecting or perturbing the workload of the system on which the program is executing. Decoupled dynamic program analysis is enabled by separating execution and analysis into two tasks: (1) recording, where system execution is recorded with minimal interference, and (2) analysis, where the execution is replayed and analyzed.. ... Vmware Inc
The current document is directed to methods and systems that process, classify, efficiently store, and display large volumes of event messages generated in modern computing systems. In a disclosed implementation, event messages are assigned types and transformed into event records with well-defined fields that contain field values. ... Vmware Inc
A fault tolerant system is described for deploying an application contained in an application storage volume, which may be a virtual disk, on a virtual machine (vm) in a remote desktop environment. The application can be executed on the vm after mounting the virtual disk. ... Vmware Inc
A fault tolerant system is described for deploying an application contained in an application storage volume, which may be a virtual disk, on a virtual machine (vm) in a remote desktop environment. The application can be executed on the vm after mounting the virtual disk. ... Vmware Inc
An information-technology (it) blueprint is an executable document that, when executed, can be used to create an it application such as an e-commerce site. An it lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an it application. ... Vmware Inc
Methods and system described herein are directed to identifying anomalous behaving components of a distributed computing system. Methods and system collect log messages generated by a set of event log source running in the distributed computing system within an observation time window. ... Vmware Inc
A method to present information associated with a group of virtual components in a virtualized environment includes collecting a first resource usage data and a second resource usage data associated with a virtual component of the group of virtual components. In response to a region of the graphical representation associated with a difference between the first resource usage data and the second resource usage data exceeding a threshold, the method also includes collecting first graphical representation rendering information to render the first resource usage data as a first graphic in the graphical representation, collecting second graphical representation rendering information to render the second resource usage data as a second graphic in the graphical representation, and collecting third graphical representation rendering information including a reduction factor to reduce the region in the graphical representation to a third graphic in the graphical representation.. ... Vmware Inc
Aspects of the disclosure allocate shares of processing resources or other physical resources among virtual machines (vms) operating as, for example, virtual desktops on a plurality of host computing devices. Allocations of resources are adjusted based on the user activity, vm activity, and/or application activity detected by an agent executing on each vm. ... Vmware Inc
A workflow is expressed as an arrangement of a set of executable tile. In some embodiments, the tiles include operations expressed in different programming languages. ... Vmware Inc
A disclosed example method to automate deployment of a software defined data center includes generating, by executing an instruction with at least one processor, a task list based on tasks provided in an automation plan to deploy the software defined data center; determining, by executing an instruction with the at least one processor, dependencies between the tasks prior to executing the tasks; determining, by executing an instruction with the at least one processor, whether a resource that is to be an output of a first one of the tasks exists before execution of the first one of the tasks; removing, by executing an instruction with the at least one processor, the first one of the tasks from the task list when the resource exists before execution of the first one of the tasks; generating an execution schedule, by executing an instruction with the at least one processor, based on the dependencies and ones of the tasks remaining in the task list; and executing, with the at least one processor, the ones of the tasks based on the execution schedule to deploy the software defined data center.. . ... Vmware Inc
A workflow is expressed as an arrangement of a set of executable tile. In some embodiments, the tiles include operations expressed in different programming languages. ... Vmware Inc
An information-technology (it) blueprint is an executable document that, when executed, can be used to create an it application such as an e-commerce site. An it lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an it application. ... Vmware Inc
Methods and apparatus to reduce application deployment sizes are disclosed. An example apparatus includes a build generator to generate a build profile associated with a virtual appliance in a virtualization environment, the build profile including a plurality of application components including archive files associated with the virtual appliance. ... Vmware Inc
An information-technology (it) blueprint is an executable document that, when executed, can be used to create an it application such as an e-commerce site. An it lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an it application. ... Vmware Inc
An information-technology (it) blueprint is an executable document that, when executed, can be used to create an it application such as an e-commerce site. An it lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an it application. ... Vmware Inc
A workflow is expressed as an arrangement of a set of executable tile. In some embodiments, the tiles include operations expressed in different programming languages. ... Vmware Inc
A workflow is expressed as an arrangement of a set of executable tiles. In some embodiments, the tiles include operations expressed in different programming languages. ... Vmware Inc
An example method for utilizing custom properties in a user interface may include receiving, by an application configuration window, a custom property cluster definition. The custom property cluster definition may include a workflow configuration. ... Vmware Inc
Described herein are systems, methods, and software to provide secure browsers to end user devices. In one implementation, a secure browsing service receives, over a network, a request for an internet browser from an end user device. ... Vmware Inc
Methods and apparatus to facilitate certificate and trust management across a distributed environment are disclosed. An example apparatus includes a first virtual appliance including a first management endpoint and a first authentication provider including a first certificate validator, the first certificate validator to validate that a first certificate received by the first authentication provider is authentic, virtual appliance to communicate the first certificate via the first management endpoint; and a first component server including a first management agent and a first certificate evaluator, the first management agent to communicate with the first virtual appliance via the first management endpoint, the first management agent to receive the first certificate via the first management endpoint, the first certificate evaluator to evaluate the first certificate to determine a signing authority, the first management agent to restart the first component server and notify the first virtual appliance of acceptance of the first certificate.. ... Vmware Inc
Methods and apparatus to clone an agent in a distributed environment are disclosed. An example apparatus includes a first management agent associated with a first component server in a virtualization environment, the first management agent configured to facilitate communication between the first component server and a virtual appliance, the virtual appliance to authenticate the first management agent based on first credentials including a first identifier and a first certificate. ... Vmware Inc
To establish a sign on session among single sign on (sso)-enabled applications, a user can be prompted by an application for an access code. An access interval key can be generated using a key derivative function based on the access code. ... Vmware Inc
Described herein are systems, methods, and software to enhance network traffic management for virtual machines. In one implementation, a host for a virtual machine may identify applications available for execution on the virtual machine from mounted application volumes and identify firewall rules for the applications. ... Vmware Inc
Methods and apparatus to orchestrate infrastructure installation of a hybrid system are disclosed. An example apparatus includes a first virtual appliance including a management endpoint. ... Vmware Inc
Examples allocate and schedule use of graphics processing unit (gpu) resources among a plurality of users executing virtual machines (vms) or processes. During initialization, shares representing proportional access to the gpu resources are assigned and then adjusted based on graphics command characteristics. ... Vmware Inc
Techniques for implementing trapless shadow page tables in a virtualized host system are provided. In one embodiment, an spt accelerator device of the host system can intercept a memory write operation originating from a virtual machine (vm) and directed to a guest os page table of the vm, where the guest os page table is stored in a device memory of the spt accelerator device. ... Vmware Inc
Methods and apparatus for distribution and execution of instructions in a distributed computing environment are disclosed. An example method includes accessing, by executing a first instruction with a processor implementing a management agent within a deployment environment, an indication of a second instruction to be executed, the indication of the second instruction to be executed provided by a management endpoint within the deployment environment. ... Vmware Inc
Methods, apparatus, and systems to perform transparent database switching using master-replica high availability setup in relational databases are disclosed. An example system includes a first virtual appliance including a first proxy and a master database, the first proxy to forward service traffic to the master database, the master database to read and/or write data based on the service traffic; a second virtual appliance including a second proxy and a first replica database, the second proxy to determine data stored in the master database, the first replica database to replicate the master database; and a third virtual appliance including a third proxy and a second replica database, the third proxy to, in response to determining the master database of the first virtual appliance is to power down, promote the second replica database to the master database.. ... Vmware Inc
Methods and apparatus to facilitate infrastructure installation checks and corrections in a distributed environment are disclosed. An example apparatus includes a virtual appliance including a management endpoint. ... Vmware Inc
Methods and systems to narrow a search for potential sources of problems in a distributed computing system are described. A volatile event type of event messages recorded in an event-log file is identified. ... Vmware Inc
Methods and apparatus to customize deployment are disclosed. An example deployment customization manager can generate a first notification payload including an uncustomized application component property of an application component that provides a logical template of an application. ... Vmware Inc
Methods and apparatus to customize deployment using metaproperties are disclosed. An example deployment metaproperty manager can generate a first metaproperty payload including an initial application component metaproperty of an application component that provides a logical template of an application. ... Vmware Inc
Methods and apparatus to manage workload domains in virtual server racks are disclosed. An example apparatus includes a policy enforcer to evaluate whether capacities of the plurality of workload domains comply with policy capacity levels of respective user-defined policies for the plurality of workload domains, and a resource manager to, when a first workload domain has a first quantify of resources that exceeds a first policy capacity level of a first user-defined policy, identify a second workload domain requesting a second quantity of resources, when the second quantity of resources is equal to the first quantity of resources, allocate the first quantity of resources from the first workload domain to the second workload domain to satisfy the first policy capacity level, when the second quantity of resources is less than the first quantity of resources, allocate the second quantity of resources from the first workload domain to the second workload domain, and de-allocate remaining resources from the first workload domain to a shared resource pool to satisfy the first policy capacity level.. ... Vmware Inc
Systems and techniques are described for determining timeouts for computer-executed processes. A described technique includes obtaining previous running times for a particular process. ... Vmware Inc
Methods and apparatus to customize deployment using approvals are disclosed. An example deployment approval manager can generate a first approval payload including an initial application component approval proposal of an application component that provides a logical template of an application. ... Vmware Inc
A number of hosts in a logical cluster is adjusted up or down in an elastic manner by tracking membership of hosts in the cluster using a first data structure and tracking membership of hosts in a spare pool using a second data structure, and upon determining that a triggering condition for adding another host is met and that all hosts in the cluster are being used, selecting a host from the spare pool, and programmatically adding an identifier of the selected host to the first data structure and programmatically deleting the identifier of the selected host from the second data structure.. . ... Vmware Inc
Methods and apparatus for distribution and execution of instructions in a distributed computing environment are disclosed. An example method includes accessing, by executing an instruction with a processor implementing a management agent within a deployment environment, an indication of an instruction to be executed, the indication of the instruction to be executed provided by a management endpoint operated at a virtual appliance within the deployment environment. ... Vmware Inc
An example method for managing application deployment in a cloud environment may maintain a state machine. The state machine may include a plurality of application states, a plurality of state operations, and relationships among the plurality of application states and the plurality of state operations. ... Vmware Inc
To extend a sign on session among applications, an inter-application workflow request can be initiated from a first to a second application. The workflow request can identify one or more memory locations in a shared memory for secure data transfer between the applications. ... Vmware Inc
Methods, apparatus and articles of manufacture to provide workflow subscription management in a cloud computing environment are disclosed. Example disclosed methods include, in response to a first input identifying an event topic, causing, by executing an instruction with a processor, a corresponding event schema to be displayed, accessing a second input identifying a field included in the event topic schema and a third input identifying a threshold value corresponding to the field. ... Vmware Inc
Disclosed are various approaches for providing single sign-on capabilities for a user on a client device. A user's credentials can be authenticated by an identity provider application. ... Vmware Inc
Disclosed are various approaches for providing single sign-on capabilities for a user on a client device. A user's credentials can be authenticated by an identity provider application. ... Vmware Inc
User data of different snapshots for the same virtual disk are stored in the same storage object. Similarly, metadata of different snapshots for the same virtual disk are stored in the same storage object, and log data of different snapshots for the same virtual disk are stored in the same storage object. ... Vmware Inc
Disclosed are various examples for an architecture to distribute win32 applications. In one example, a specification of a win32 application and deployment options are received. ... Vmware Inc
Embodiments perform live migration of a virtual machine (vm) decoding a video stream including suspending and resuming the video stream. A software decoder operating on the vm is able to use dedicated video decoding hardware resources of the host computing device upon which the vm is operating. ... Vmware Inc
Techniques are described for performing an offline domain join and login on behalf of a computing device in order to enable the device to access corporate resources without local access to the domain controller. A slave service is described that can start a virtual machine on a local network of the enterprise, perform an offline domain join of the virtual machine, perform a first login to the virtual machine using credentials of a remote user and then capture the changes made on the virtual machine and deliver those changes to the remote user's device. ... Vmware Inc
Methods, apparatus, systems and articles of manufacture manage credentials in hyper-converged infrastructure s are disclosed. An example method includes establishing, by executing an instruction with at least one processor, a communication between a software defined data center manager of the hyper-converged infrastructure and a component of the hyper-converged infrastructure using first credentials included in a known hosts file. ... Vmware Inc
The present disclosure is related to packet generation and injection. An example testing system for packet generation and injection can include a packet generation and injection apparatus connected to a host. ... Vmware Inc
An example method of managing virtualized computing resources provided by a public cloud includes: grouping subscriptions in the public cloud into reservations, each of the reservations including constraints on virtualized computing resources provided by at least one of the subscriptions; allocating the reservations among a plurality of principals; receiving a request to provision a workload from a user associated with a first principal of the plurality of principals, wherein the workload includes metadata describing constraints of the workload; generating a deployment plan for the workload based on the metadata therein and at least one of the reservations allocated to the first principal, the deployment plan specifying a first subscription of the subscriptions; and transmitting a deployment. . ... Vmware Inc
An example method of deploying a workload to a public cloud includes: receiving a request to provision a first workload from a first user, wherein the first workload includes metadata describing constraints; generating a first deployment plan for the first workload based on the metadata thereof. The step of generating comprises identifying a plurality of reservations assigned to the first user, each of the plurality of reservations including computing resources backed by a subscription provided by the public cloud; and selecting a first reservation from the plurality of reservations having available computing resources backed by a first subscription provided by the public cloud and satisfying the constraints of the first workload. ... Vmware Inc
An example method for allocating resources in a multi-cloud environment may include receiving, by an allocation broker executing in the multi-cloud environment, a client request to create an allocation of cloud resource in a plurality of clouds. The method may include receiving, by the allocation broker from a reservation broker, a reservation candidate based on a reservation type. ... Vmware Inc
The present disclosure is related to devices, systems, and methods for routing requests for an external service, originating from a plurality of cluster nodes, through an outbound request manager. An example method can include receiving a first request for an external service originating from a first cluster node having a first network address, receiving a second request for the external service originating from a second cluster node having a second network address, transmitting the first request with a particular network address to an address associated with the external service, and transmitting the second request with the particular network address to the address associated with the external service.. ... Vmware Inc
Methods, apparatus and articles of manufacture to provide lifecycle management of custom resources in a cloud computing environment are disclosed. Example methods disclosed herein for custom resource lifecycle management include accepting, with an extensibility service implemented by a virtual appliance, a resource definition and a lifecycle definition for a custom resource to be executed in a cloud computing environment. ... Vmware Inc
An example method of extending a cloud manager configured to manage a public cloud includes: receiving a content package at the cloud manager, the content package including a component entity, the component entity including a resource type entity that represents a resource provided by the public cloud, a user interface (ui) form entity that defines a ui for configuring the resource, and a lifecycle operations logic that extends at least one phase of a workflow of the cloud manager; receiving a request from a user through the ui defined by the ui form entity to create the resource in the public cloud; executing the workflow of the cloud manager in response to the request; and executing the lifecycle operations logic during execution of the workflow.. . ... Vmware Inc
The present disclosure is related to devices, systems, and methods for alerts provided based on responder profile. An example device can include instructions to receive an alert message via an operations management server, access a plurality of alert responder profiles in storage, each associated with a respective alert responder and determined based on historical actions of the respective alert responder, and communicate the alert message to an alert responder having an alert responder profile that exceeds a threshold correlation with the alert message.. ... Vmware Inc
The present disclosure is related to devices and systems for immutable file storage. An example device can include instructions to hash a log file received from a log source to produce a hash value, store the hash value and information describing the log file, communicate the hash value and the information to a third party service, wherein the third party service maintains the communicated hash value and the communicated information such that the communicated hash value and the communicated information are immutable, access the communicated hash value and the communicated information, and compare the stored hash value and the stored information with the communicated hash value and the communicated information to determine whether the log file is unmodified.. ... Vmware Inc
The present disclosure is related to devices, systems, and methods for taking an action in response to detection of an unsupported language in a log. An example system can include instructions to analyze a log of a log source, detect an unsupported language in the log, and take an action in response to detecting the unsupported language in the log.. ... Vmware Inc
Methods and apparatus to perform a workflow in a software defined data center are disclosed herein. An example software defined data center includes a first workflow engine associated with a first processor to execute a workflow and to generate status information identifying the status of tasks included in the workflow and further includes a status tracker associated with a second processor. ... Vmware Inc
An adaptive virtual desktop architecture is provided. Application install or assignment is evaluated, such as by using heuristics to identify applications that may present compatibility problems. ... Vmware Inc
Methods, systems, and techniques for facilitating access to content stored remotely, for example, as part of a virtual machine infrastructure or elsewhere in a networked environment, using a uniform mechanism are provided. Example embodiments provide an enhanced virtual desktop management server/system with a content abstraction layer which enables users to access their data stored as part of a virtual machine environment, or replicated otherwise on a network, using a generic api. ... Vmware Inc
Techniques for facilitating conversion of an application from a block-based persistence model to a byte-based persistence model are provided. In one embodiment, a computer system can receive source code of the application and automatically identify data structures in the source code that are part of the application's semantic persistent state. ... Vmware Inc
Examples disclosed herein provide systems, methods, and software to provide individualized applications to remote desktop sessions. In one example, a method of operating a remote desktop server to provide individualized applications to remote desktop users includes identifying a request from a user for a remote desktop session. ... Vmware Inc
Exemplary methods, apparatuses, and systems determine that quorum can be maintained for a storage object in a distributed storage system in the event a defined maximum number of first partitions in a first level of storage and a second partitions in a second level of storage fail. When it is determined that there are insufficient numbers of first partitions and/or second partitions, additional first partitions and/or second partitions are associated with the storage object in the distributed storage system. ... Vmware Inc
The present disclosure is related to devices, systems, and methods for user interface customization. An example device can include instructions executable by a processor to receive indications of user actions with respect to an application, wherein the actions are made using a plurality of selectable elements of an interface, determine a user tendency based on the user actions, and provide a customized interface to the user based on the determined user tendency, wherein the customized interface includes at least one customized selectable element.. ... Vmware Inc
Embodiments perform token cache management by renewing tokens heuristically. A token renewal request interval is defined based on a configurable lifetime of a token and an acquisition duration. ... Vmware Inc
A centralized namespace controller allocates addresses in a distributed cloud infrastructure on-demand. Upon receiving a request to allocate addresses for a network to be provisioned by a cloud computing system included in the distributed cloud infrastructure, the centralized namespace controller allocates a network address that is unique within the distributed cloud infrastructure. ... Vmware Inc
An example method for reserving resources in a multi-cloud environment may include receiving, by a reservation broker executing in the multi-cloud environment, a first client request to reserve a first cloud resource in a plurality of clouds. The plurality of clouds includes a corresponding plurality of cloud brokers. ... Vmware Inc
Examples provide a network-utilization based scheduler that considers network utilization when load balancing virtual computing instances (vcis) in a cluster. The scheduler also periodically evaluates proposed migrations based on a current cluster snapshot including network utilization data of the hosts. ... Vmware Inc
System and method for checking and characterizing metadata of snapshots utilize a snapshot metadata database to execute at least one of checking and characterizing operations on the metadata of snapshots. The snapshot metadata database includes information extracted from backing storage elements containing the metadata of snapshots.. ... Vmware Inc
The present disclosure is related to devices and methods for devops management. One or more devices can include instructions to receive indications associated with execution events of a release of an application over a period of time, wherein the execution events include positive execution events and negative execution events, and provide a graphical user interface (gui) configured to display a timeline in a first portion of the gui corresponding to the release of the application over the period of time, wherein the timeline includes a display element for each of the execution events in a respective portion of the timeline corresponding to an execution time of the execution event, and provide a plurality of selectable options, wherein each option, upon being selected, causes a different section of the timeline to be displayed by a second portion of the gui.. ... Vmware Inc
The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. ... Vmware Inc
A given host machine in a virtualization system having a virtual distributed storage system may receive an iscsi protocol packet from a computer system separate from the given host machine. Processing the iscsi protocol may include accessing distributed storage device (iscsi target) comprising storage connected to the two or more host machines in the virtualization system. ... Vmware Inc
The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. ... Vmware Inc
In one embodiment, a guest operating system in a host computer receives a write command for a partition in a plurality of partitions of a heterogeneous disk. The heterogeneous disk is mounted in the guest operating system. ... Vmware Inc
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for calculating graphics resources for a virtual machine. One of the methods includes determining resources available on a graphics card device included in a computer executing a plurality of virtual machines, each virtual machine configured to execute a virtual desktop; determining, based on data received from a hypervisor that manages execution of at least one of the plurality of virtual machines, a graphics profile for a virtual machine included in the plurality of virtual machines executing on the computer; determining a portion of the available resources on the graphics card device allocated to the virtual machine using the graphics profile; and computing an amount of resources on the graphics card device consumed by a virtual desktop of the virtual machine based on the portion of the available resources on the graphics card device allocated to the virtual machine.. ... Vmware Inc
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing a framework for collaborative debugging. In one aspect, a method includes generating a session for an application executing on a remote debugging system and during the session, receiving one or more application inputs for the application from one or more remote users and providing outputs generated by the application for presentation to the one or more remote users. ... Vmware Inc
Described are embodiments for management of virtual machines that are executed in one or more hosts. In one example, virtual machines are identified using a search criteria. ... Vmware Inc
Described are embodiments for selection of hardware candidates for deployment of a plurality of virtual machines. Resource requirements are determined for a particular virtual machine of a plurality of virtual machines to be deployed. ... Vmware Inc
A technique is described for managing processor (cpu) resources in a host having virtual machines (vms) executed thereon. A target size of a vm is determined based on its demand and cpu entitlement. ... Vmware Inc