Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Vmware Inc patents


Recent patent applications related to Vmware Inc. Vmware Inc is listed as an Agent/Assignee. Note: Vmware Inc may have other listings under different names/spellings. We're not affiliated with Vmware Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "V" | Vmware Inc-related inventors


Persistent enrollment of a computing device based on a temporary user

Systems and methods are included for causing a computing device to implement a management policy prior to a user logging into an operating system on initial boot. As part of initial boot, the computing device contacts a management server for enrollment. ... Vmware Inc

Techniques for implementing hybrid flash/hdd-based virtual disk files

Techniques for utilizing flash storage as an extension of hard disk (hdd) storage are provided. In one embodiment, a computer system stores a subset of blocks of a logical file in a first physical file, associated with a first data structure that represents a filesystem object, on flash storage and a subset of blocks, associated with a second data structure that represents a filesystem object comprising tiering configuration information that includes an identifier of the first physical file, in a second physical file on hdd storage. ... Vmware Inc

Methods and apparatus to manage asset capabilities in a computing environment using a common agent framework

Methods, apparatus, systems and articles of manufacture are disclosed to manage asset in a computing environment using a common agent framework. An example method includes maintaining a catalog of capabilities available to an asset based on plugins installed at the asset. ... Vmware Inc

Internet recovery of a windows configuration

Systems and methods are included for causing a computing device to assemble and boot from a managed operating system. When the computing device is powered on, it can execute firmware that specifies a server to contact. ... Vmware Inc

Configuring a computing device using managed operating system images

Systems and methods are included for causing a computing device to assemble and boot from a managed operating system. When the computing device is powered on, it can execute firmware that specifies a server to contact. ... Vmware Inc

Persistent enrollment of a computing device using vendor autodsicovery

Systems and methods are included for causing a computing device to request ownership information and configure itself based on which tenant is associated with the computing device. During launch of an operating system, such as windows, the computing device can contact a server that tracks ownership information. ... Vmware Inc

Persistent enrollment of a computing device using a bios

Systems and methods are included for causing a computing device to install a management agent prior to an operating system completing its first boot. A bootstrap loader is flashed into firmware, such as the bios, of a computing device. ... Vmware Inc

Logical to physical sector size adapter

The present disclosure describes processing a write command directed to a block-based main storage device, and having a target logical sector and write data. The processing may include writing an address of a physical sector in the main storage device that contains the target logical sector to a header portion of a scratch block stored in a byte-addressable storage. ... Vmware Inc

User interface control based on pinch gestures

An example method is provided for a computing device to perform user interface control based on a pinch gesture. The computing device includes a touch-sensitive display. ... Vmware Inc

Reserving physical resources based upon a physical identifier

Disclosed are various approaches for facilitating reservation of a physical resource on behalf of a user. A physical identifier can be affixed to a physical resource. ... Vmware Inc

Controlling proxy devices through a managed gateway

Systems and methods are provided for remotely managing proxy devices through a gateway device. An example method can include establishing electronic communication between the gateway device and a remotely located management server. ... Vmware Inc

Propagating affinity data to large file block clusters in a file system

The systems described herein are configured to enhance the efficiency of memory usage and access in a vm file system data store with respect to allocating memory in large and small file block clusters using affinity metadata and propagating and maintaining the affinity metadata in support of the described allocation. In order to maintain affinity metadata of the large file block cluster, affinity generation values stored on the large file block cluster are read and cached affinity generation values for each small file block cluster are read from an in-memory cache associated with the large file block cluster. ... Vmware Inc

Allocating memory resources in a file system based on affinity data

The systems described herein are configured to enhance the efficiency of memory usage and access in a vm file system data store with respect to allocating memory in large and small file block clusters using affinity metadata and propagating and maintaining the affinity metadata in support of the described allocation. During storage of file data, an affinity identifier of the file data is determined. ... Vmware Inc

Granular unmapping with variable addressing in a data store

The systems described herein are configured to enhance the efficiency of memory in a host file system with respect to hosted virtual file systems. In situations when the hosted virtual file systems use smaller file block sizes than the file block sizes of the host file system. ... Vmware Inc

09/20/18 / #20180267838

Open-ended policies for virtual computing instance provisioning

The systems described herein are configured to reduce the number of resource policies created and stored on a cluster for provisioning and/or managing virtual computing instances (vcis) utilization of one or more resources. An open-ended vci policy including at least one open-ended rule having an undefined value and a resource is selected. ... Vmware Inc

09/20/18 / #20180267830

Policy based cross-cloud migration

A policy-driven method of migrating a virtual computing resource that is executing an application workload includes the steps of determining that at least one of multiple policies of the application has been violated by the virtual computing resource while executing the workload in a first virtual data center, and responsive to said determining, programmatically performing: (1) searching for a virtual data center to which the virtual computing resource can be migrated, (2) determining that the virtual computing resource will be able to comply with all of the policies of the application while executing the workload if the virtual computing resource is migrated to the second virtual data center, and (3) based on determining the ability to comply, migrating the virtual computing resource across clouds, namely from the first virtual data center to the second virtual data center.. . ... Vmware Inc

09/06/18 / #20180255087

Container data offline and online scan in a cloud environment

Techniques for security scanning of containers executing within vms. A virtualization system maintains container disk files that store data for containers. ... Vmware Inc

09/06/18 / #20180254977

Coordinated content distribution over network

A coordinated multi-cast content distribution process is used to distribute content, e.g., files, from a source node of a network to target nodes of the network. A minimum spanning tree is identified for the network based on costs of edges connecting the nodes. ... Vmware Inc

09/06/18 / #20180253442

Decoupling the commit and replay of metadata updates in a clustered file system

Techniques for decoupling the commit and replay of file system metadata updates in a clustered file system (cfs) are provided. In one embodiment, a cfs layer of a computer system can receive a file i/o operation from a client application, where the file i/o operation involves an update to a file system metadata resource maintained on persistent storage. ... Vmware Inc

09/06/18 / #20180253438

Teleporting content over network using hash matches

Files, e.g., disk-image files can be teleported from a source node of a network to a target node in that a copy of file can be assembled at least in part using file parts found on the target node. Source hashes can be generated based on segments of the source file. ... Vmware Inc

09/06/18 / #20180253330

Methods and systems for converting a related group of physical machines to virtual machines

A method for processing virtualization of computers that are part of a group into virtual computers is provided. The method includes obtaining relationship data from the computers, where the relationship data identifies parameters used to communicate within the group. ... Vmware Inc

09/06/18 / #20180253257

Trim support for a solid-state drive in a virtualized environment

A computer system that employs a solid-state memory device as a physical storage resource includes a hypervisor that is capable of supporting trim commands issued by virtual machines running in the computer system. When a virtual machine issues a trim command to its corresponding virtual storage device to invalidate data stored therein, the trim command is received at an interface layer in the hypervisor that translates the trim command to a scsi command known as ummap. ... Vmware Inc

08/23/18 / #20180239779

Method and system for thick files in a distributed file system

A distributed file system may be configured with file blocks of a first type and file blocks of a second type, from allocation units that comprise a logical volume containing the file system. File blocks of the second type may be defined from one or more file blocks of the first type. ... Vmware Inc

08/16/18 / #20180232429

Disaster recovery of mobile data center via location-aware cloud caching

A method for copying first data stored at a primary data center to a secondary data center is provided. The method includes initiating a first replication task to copy the first data from the primary data center to the secondary data center. ... Vmware Inc

08/16/18 / #20180232315

Vm inter-process communication

A method is described for enabling inter-process communication between a first application and a second application, the first application running within a first virtual machine (vm) in a host and the second application running within a second vm in the host, the method includes receiving a request to attach a shared region of memory to a memory allocation, identifying a list of one or more physical memory pages defining the shared region that corresponds to the handle, and mapping guest memory pages corresponding to the allocation to the physical memory pages. The request may be received by a framework from the second application and includes a handle that uniquely identifies the shared region of memory as well as an identification of at least one guest memory page corresponding to the memory allocation.. ... Vmware Inc

08/09/18 / #20180227363

Maintaining partition-tolerant distributed metadata

Exemplary methods, apparatuses, and systems include a master node receiving, from a new node, a request indicating the new node is joining a cluster of nodes. The master node transmits, to the new node, an identifier of a delegate node within the cluster. ... Vmware Inc

08/09/18 / #20180225222

Vm inter-process communication

A method is described for enabling inter-process communication between a first application and a second application, the first application running within a first virtual machine (vm) in a host and the second application running within a second vm in the host, the method includes receiving a request to attach a shared region of memory to a memory allocation, identifying a list of one or more physical memory pages defining the shared region that corresponds to the handle, and mapping guest memory pages corresponding to the allocation to the physical memory pages. The request may be received by a framework from the second application and includes a handle that uniquely identifies the shared region of memory as well as an identification of at least one guest memory page corresponding to the memory allocation.. ... Vmware Inc

08/09/18 / #20180225171

Synchronizing replicas with media errors in distributed storage systems

Systems and techniques are described for transferring data. A described technique includes receiving a request to transmit a data block from a first data storage device to a second data storage device. ... Vmware Inc

07/26/18 / #20180213347

Automated provisioning of applications

Disclosed are various embodiments for automating the provision of applications to managed client devices. A search string is passed through an iframe embedded in a web page to a remote computing device that provides an application programming interface (api) for an application store. ... Vmware Inc

07/19/18 / #20180205604

Deploying and monitoring multiplatform cloud-based infrastructures

Embodiments are directed towards managing computer applications. A configuration package may be provided to provision a cloud service stack on a cloud platform such that the cloud service stack corresponds to a main stack model. ... Vmware Inc

07/19/18 / #20180203742

Resource management for containers in a virtualized environment

A virtualized environment includes a pool of vms, each vm configured to run one or more virtual containers. Each virtual container runs as an isolated process in userspace on a guest operating system. ... Vmware Inc

07/19/18 / #20180203730

Synchronous user space function execution from a kernel context

The approaches described herein implement synchronous execution of a user space operation from a kernel context. A thread, executing on a computing device, initializes a second kernel stack based on a first kernel stack. ... Vmware Inc

07/19/18 / #20180203630

Resource allocation in computers

A method and tangible medium embodying code for allocating resource units of an allocatable resource among a plurality of clients in a computer is described. In the method, resource units are initially distributed among the clients by assigning to each of the clients a nominal share of the allocatable resource. ... Vmware Inc

07/05/18 / #20180191855

Efficient communication within hybrid cloud system

Techniques for communicating between service nodes within a hybrid cloud computing system. These techniques include utilizing a messaging provider within an off-premise computing system to pass messages between off-premise servers holding a connection to an on-premise computer system and off-premise servers holding a connection to an end user computer system.. ... Vmware Inc

07/05/18 / #20180189108

Replication of a virtualized computing environment to a computing system with offline hosts

In an example, a method of replication between computing systems includes replicating virtual machine files from primary storage in a primary computing system to secondary storage in a secondary computing system. The virtual machine files implement a plurality of virtual machines in the primary computing system and a plurality of replica virtual machines in the secondary computing system. ... Vmware Inc

07/05/18 / #20180189095

Physical to virtual scheduling system and method

Large-scale data migration processes are managed using a schedule optimizer implemented in software. The schedule optimizer assigns an available data migration window to each server in an inventory of servers based on a scheduling priority determined for that server. ... Vmware Inc

07/05/18 / #20180189041

Prediction mechanism for subroutine returns in binary translation sub-systems of computers

A sequence of input language (il) instructions of a guest system is converted, for example by binary translation, into a corresponding sequence of output language (ol) instructions of a host system, which executes the ol instructions. In order to determine the return address after any il call to a subroutine at a target entry address p, the corresponding ol return address is stored in an array at a location determined by an index calculated as a function of p. ... Vmware Inc

06/28/18 / #20180183762

Secure execution and tracking of workflows in a private data center by components in the cloud

One or more embodiments provide techniques for executing a workflow in a private data center. The cloud data center receives a request from a user. ... Vmware Inc

06/28/18 / #20180183587

Blockchain-assisted public key infrastructure for internet of things applications

An approach is disclosed for registering and authenticating internet of things (iot) devices. In one embodiment, an installation device receives, from an iot device, an identifier (id) and a hash of a public key, where the iot device itself generates the id, the public key, and a private key. ... Vmware Inc

06/28/18 / #20180181655

Handling large streaming file formats in web browsers

An approach for parsing and streaming contents of archive files is disclosed. In one embodiment, a client script executed by a web browser parses an archive file based on its archival format, without loading the entire archive file into memory. ... Vmware Inc

06/28/18 / #20180181434

Remote operation authorization between pairs of sites with pre-established trust

One or more embodiments provide techniques for executing a workflow in a private data center. The cloud data center receives a request from a user. ... Vmware Inc

06/28/18 / #20180181418

True high availability of workloads in a cloud software-defined data center

In accordance with an embodiment of the invention, a cloud computing system is disclosed. The system includes a software-defined data center (sddc), the sddc including at least one cluster supported within the sddc and at least one host computer running within the cluster, wherein the at least one host computer is configured to support at least one workload comprising an operating system and an application, and a cloud infrastructure, the cloud infrastructure including at least one child vm, the at least one child vm configured to virtualize the at least one host computer running within the cluster, and at least one parent virtual machine, wherein additional child vms are deployed by forking the at least one parent vm.. ... Vmware Inc

06/28/18 / #20180181282

Providing application and device management using entitlements

Methods and systems for providing virtual workspaces are provided. Example embodiments provide a application workspace system “aws,” which enables users to access remote server-based applications (e.g., thin client applications, terminal server applications, applications on hosted operating systems, etc.) using the same interface that they use to access local applications, without needing to know where the application is being accessed. ... Vmware Inc

06/21/18 / #20180176326

Dynamic runtime interface for device management

Various examples for providing a dynamic runtime interface for device management are described. In one example, a computing environment can access metadata that describes a configuration of a user interface made in a profile template designer application. ... Vmware Inc

06/21/18 / #20180176142

Distributed policy-based provisioning and enforcement for quality of service

Embodiments of the disclosure provide techniques for measuring congestion and controlling quality of service to a shared resource. A module that interfaces with the shared resource monitors the usage of the shared resource by accessing clients. ... Vmware Inc

06/21/18 / #20180176130

System and method for managing public ip addresses for virtual data centers

System and method for managing public internet protocol (ip) addresses for a group of virtual data centers utilize a virtual overlay network to route communications between the virtual data centers and a public network through a virtual edge router of one of the virtual data centers using a public ip address assigned to that virtual edge router.. . ... Vmware Inc

06/21/18 / #20180176074

Load balancing between edge systems in a high availability edge system pair

The technology disclosed herein enables load balancing between a pair of virtual edge systems configured for high availability at an edge of a local network environment. In a particular embodiment, a method provides assigning a virtual network address to the pair of virtual edge systems. ... Vmware Inc

06/21/18 / #20180173884

Application-to-application messaging over an insecure application programming interface

Disclosed are various approaches for a secure communication session between applications installed on a client device. The secure communication session can be provided over an insecure operating system application programming interface (api). ... Vmware Inc

06/21/18 / #20180173646

Memory management in virtualized computing systems having processors with more than two hierarchical privilege levels

An example method of memory management in a virtualized computing system includes: generating a page table hierarchy that includes address translations to first pages of memory that store kernel software and second pages of the memory that store user software; configuring a processor to: 1) implement a first address translation scheme, which uses a first virtual address width, for a hypervisor privilege level; 2) implement a second address translation scheme, which uses a second virtual address width, for supervisor and user privilege levels, where the first virtual address width is larger than the second virtual address width; and 3) use the page table hierarchy for each of the first and second address translation schemes; and executing the kernel software at the hypervisor privilege level and the user software at the user privilege level.. . ... Vmware Inc

06/21/18 / #20180173633

Transparent virtualization of cloud storage

Embodiments present a virtual disk image to applications such as virtual machines (vms) executing on a computing device. The virtual disk image corresponds to one or more subparts of binary large objects (blobs) of data stored by a cloud service, and is implemented in a log structured format. ... Vmware Inc

06/21/18 / #20180173575

Opening unsupported file types through remoting sessions

Viewing and editing operations on a file having an unsupported file type are enabled through a method of opening the file through a remoting session. The method includes the steps of receiving login information from a user and determining if there is a recent open file request. ... Vmware Inc

06/21/18 / #20180173561

Framework for workflow extensibility in a cloud computing system

An example method of extending a cloud director configured to manage a cloud computing system includes: receiving requests to register external services with the cloud director; generating phase associations between the external services and an extensible phase of a workflow of the cloud director; executing the workflow of the cloud director and, in response to reaching the extensible phase, determining an execution order for at least one of the phase associations; and sending a message from the cloud director to each external service of the at least one phase association based on the execution order.. . ... Vmware Inc

06/21/18 / #20180173553

Optimizing host cpu usage based on virtual machine guest os power and performance management

Techniques for optimizing cpu usage in a host system based on vm guest os power and performance management are provided. In one embodiment, a hypervisor of the host system can capture information from a vm guest os that pertains to a target power or performance state set by the guest os for a vcpu of the vm. ... Vmware Inc

06/21/18 / #20180173551

Emulating mode-based execute control for memory pages in virtualized computing systems

An example method of emulating nested page table (npt) mode-based execute control in a virtualized computing system includes: providing npt mode-based execute control from a hypervisor to a virtual machine (vm) executing in the virtualized computing system; generating a plurality of shadow npt hierarchies at the hypervisor based on an npt mode-based execute policy obtained from the vm; configuring a processor of the virtualized computing system to exit from the vm to the hypervisor in response to an escalation from a user privilege level to a supervisor privilege level caused by guest code of the vm; and exposing a first shadow npt hierarchy of the plurality of shadow npt hierarchies to the processor in response to an exit from the vm to the hypervisor due to the escalation from the user privilege level to the supervisor privilege level.. . ... Vmware Inc

06/21/18 / #20180173539

Constructing bootloader address space without guaranteed physical memory layout

Examples construct a bootloader address space using a page fault exception. A bootloader executing in machine address (ma) space determines the ma at which the bootloader has been loaded into memory. ... Vmware Inc

06/21/18 / #20180173517

Operating system update management for enrolled devices

Operating system update management for enrolled devices is disclosed according to various examples. In one example, a computing environment can receive an identifier from at least one of a multitude of client devices enrolled with a management service, where the identifier is indicative of a software update available for the at least one of the plurality of client devices. ... Vmware Inc

06/21/18 / #20180173451

Distributed shared log storage system having an adapter for heterogenous big data workloads

A distributed shared log storage system employs an adapter that translates apis for a big data application to apis of the distributed shared log storage system. The adapter is configured for different big data applications in accordance with a profile thereof, so that storage performance using the distributed shared log storage system can be comparable to the storage performance of the profiled big data application. ... Vmware Inc

06/21/18 / #20180173299

System and method for performing distributed power management without power cycling hosts

Power consumption by a first host included in a plurality of hosts in a clustered computing system, where each of the hosts executes one or more applications, is managed by detecting that a utilization level of the first host falls below a threshold value and, responsive to the detecting, migrating one or more applications executing on the first host to a second host. After the migration is completed, the first host is caused to consume less power while remaining powered on.. ... Vmware Inc

06/14/18 / #20180167491

Co-existence of management applications and multiple user device management

Various examples for providing execution of both a first management application and a second management application on a client device are provided. In one example, a client device can be configured to identify that a first management application, such as a legacy management application, installed on the client device has management privileges with an operating system of the client device. ... Vmware Inc

06/14/18 / #20180167455

Resource allocation diagnosis on distributed computer systems

Disclosed are aspects of resource allocation diagnosis for distributed computer systems. In one example, a current snapshot of a distributed computing system is created. ... Vmware Inc

06/14/18 / #20180167430

Suppressing broadcasts in cloud environments

A method for suppressing broadcast messages includes receiving a broadcast message from a client that requests configuration information from a configuration server. The method includes queueing the broadcast message in a request queue and then identifying an oldest message in a request queue. ... Vmware Inc

06/14/18 / #20180167351

Tagged messages to facilitate administration of a virtualization infrastructure

In a computer-implemented method to facilitate administration of a virtualization infrastructure, posted messages of members of a virtualization infrastructure are displayed, wherein the posted messages comprise tags identifying operational conditions of the members of the virtualization infrastructure. Responsive to a selection of a particular tag, the members of the virtualization infrastructure that posted a message comprising the particular tag are displayed.. ... Vmware Inc

06/14/18 / #20180167350

Creating a group of members based on monitoring a social network

In a computer-implemented method to facilitate administration of a virtualization infrastructure, operational conditions of members of the virtualization infrastructure are monitored by a social network monitoring agent, wherein the members of the virtualization infrastructure are mapped to a social network such that at least a portion of the members of the virtualization infrastructure are also members of the social network. A group of members of the virtualization infrastructure is automatically created within the social network based at least in part on the operational conditions.. ... Vmware Inc

06/14/18 / #20180167339

Distributed virtual switch for virtualized computer systems

A runtime state of a virtual port associated with a virtual machine (“vm”) is persisted as the vm is migrated from a source host to a destination host. In certain embodiments, a virtual switch forwards network frames between the vm and the physical network interface via the virtual port. ... Vmware Inc

06/14/18 / #20180167275

Methods, systems and apparatus to propagate node configuration changes to services in a distributed environment

Methods, apparatus and articles of manufacture to propagate node changes in a cluster of nodes and reconfigure services based on the node changes in a cloud computing environment are disclosed. Example methods disclosed herein include analyzing a node change event message at a first node of the plurality of nodes to identify a node change event type contained in the node change event message. ... Vmware Inc

06/14/18 / #20180167213

Encrypted file storage

Various systems facilitate encrypted file storage. A client device may generate an encrypted version of a file. ... Vmware Inc

06/14/18 / #20180167162

Unified forward error correction and retransmission in a reliable network protocol

A method of transmitting packets at a first node of a network to a second node of the network, includes the steps of determining whether or not a total number of packets that are in flight is less a threshold number of packets, computing a target number of forward error correction (fec) packets upon determining that the total number is less than the threshold number, transmitting a new fec packet if the number of fec packets that are in flight is less than the target number, and transmitting a data packet if the number of fec packets that are in flight is equal to or greater than the target number.. . ... Vmware Inc

06/14/18 / #20180165698

Methods and systems to determine virtual storage costs of a virtual datacenter

Methods and systems that allocate the total cost of virtual storage created from hard disk drives (“hdds”) and solid state drives (“ssds”) of server computers and mass-storage devices of a cloud-computing facility are described. The virtual storage is used to form virtual disks (“vds”) of virtual machines (“vms”) comprising a virtual datacenter (“vdc”). ... Vmware Inc

06/14/18 / #20180165693

Methods and systems to determine correlated-extreme behavior consumers of data center resources

Methods and systems that identify objects of a data center that exhibit correlated-extreme behavior are described. The objects may be, but are not limited to, virtual machines (“vms”), containers, server computers, clusters of server computers, and the data center itself. ... Vmware Inc

06/14/18 / #20180165584

Predicting application response time based on metrics

The present disclosure is related to predicting application response lime based on metrics. An example machine-readable medium may store instructions executable by a processing resource to determine a particular response time and an average response time of an application based on a plurality of relevant performance metrics associated with the application during a first period of time, classify the particular response time into a group based on the average response time, and determine a relationship between the plurality of relevant performance metrics and the particular response time of the application. ... Vmware Inc

06/14/18 / #20180165447

Enhanced security using remote applications

Described herein are systems, methods, and software to provide enhanced security when opening applications. In one implementation, an application service receives, over a network, an application request from an end user device to support a file open request on the end user device, wherein the application request occurs based on a security status of a file associated with the file open request. ... Vmware Inc

06/14/18 / #20180165176

Decoupling dynamic program analysis from execution in virtual environments

Dynamic program analysis is decoupled from execution in virtual computer environments so that program analysis can be performed on a running computer program without affecting or perturbing the workload of the system on which the program is executing. Decoupled dynamic program analysis is enabled by separating execution and analysis into two tasks: (1) recording, where system execution is recorded with minimal interference, and (2) analysis, where the execution is replayed and analyzed.. ... Vmware Inc

06/14/18 / #20180165173

Method and system for identifying event-message transactions

The current document is directed to methods and systems that process, classify, efficiently store, and display large volumes of event messages generated in modern computing systems. In a disclosed implementation, event messages are assigned types and transformed into event records with well-defined fields that contain field values. ... Vmware Inc

06/14/18 / #20180165170

Fault tolerant application storage volumes for ensuring application availability and preventing data loss using forking techniques

A fault tolerant system is described for deploying an application contained in an application storage volume, which may be a virtual disk, on a virtual machine (vm) in a remote desktop environment. The application can be executed on the vm after mounting the virtual disk. ... Vmware Inc

06/14/18 / #20180165163

Fault tolerant application storage volumes for ensuring application availability and preventing data loss using suspend-resume techniques

A fault tolerant system is described for deploying an application contained in an application storage volume, which may be a virtual disk, on a virtual machine (vm) in a remote desktop environment. The application can be executed on the vm after mounting the virtual disk. ... Vmware Inc

06/14/18 / #20180165158

Failure handling for lifecycle blueprint workflows

An information-technology (it) blueprint is an executable document that, when executed, can be used to create an it application such as an e-commerce site. An it lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an it application. ... Vmware Inc

06/14/18 / #20180165142

Methods and systems to identify anomalous behaving components of a distributed computing system

Methods and system described herein are directed to identifying anomalous behaving components of a distributed computing system. Methods and system collect log messages generated by a set of event log source running in the distributed computing system within an observation time window. ... Vmware Inc

06/14/18 / #20180165132

Graphical display for illustrating resource management

A method to present information associated with a group of virtual components in a virtualized environment includes collecting a first resource usage data and a second resource usage data associated with a virtual component of the group of virtual components. In response to a region of the graphical representation associated with a difference between the first resource usage data and the second resource usage data exceeding a threshold, the method also includes collecting first graphical representation rendering information to render the first resource usage data as a first graphic in the graphical representation, collecting second graphical representation rendering information to render the second resource usage data as a second graphic in the graphical representation, and collecting third graphical representation rendering information including a reduction factor to reduce the region in the graphical representation to a third graphic in the graphical representation.. ... Vmware Inc

06/14/18 / #20180165130

Dynamic resource configuration based on context

Aspects of the disclosure allocate shares of processing resources or other physical resources among virtual machines (vms) operating as, for example, virtual desktops on a plurality of host computing devices. Allocations of resources are adjusted based on the user activity, vm activity, and/or application activity detected by an agent executing on each vm. ... Vmware Inc

06/14/18 / #20180165124

Information-technology workflows using executable tiles distributed between workflow instances

A workflow is expressed as an arrangement of a set of executable tile. In some embodiments, the tiles include operations expressed in different programming languages. ... Vmware Inc

06/14/18 / #20180165122

Methods and apparatus to automate deployments of software defined data centers

A disclosed example method to automate deployment of a software defined data center includes generating, by executing an instruction with at least one processor, a task list based on tasks provided in an automation plan to deploy the software defined data center; determining, by executing an instruction with the at least one processor, dependencies between the tasks prior to executing the tasks; determining, by executing an instruction with the at least one processor, whether a resource that is to be an output of a first one of the tasks exists before execution of the first one of the tasks; removing, by executing an instruction with the at least one processor, the first one of the tasks from the task list when the resource exists before execution of the first one of the tasks; generating an execution schedule, by executing an instruction with the at least one processor, based on the dependencies and ones of the tasks remaining in the task list; and executing, with the at least one processor, the ones of the tasks based on the execution schedule to deploy the software defined data center.. . ... Vmware Inc

06/14/18 / #20180165113

Information-technology workflow using tiles that declaratively specify datatypes

A workflow is expressed as an arrangement of a set of executable tile. In some embodiments, the tiles include operations expressed in different programming languages. ... Vmware Inc

06/14/18 / #20180165090

Out-of-deployment-scope modification of information-technology application using lifecycle blueprint

An information-technology (it) blueprint is an executable document that, when executed, can be used to create an it application such as an e-commerce site. An it lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an it application. ... Vmware Inc

06/14/18 / #20180165080

Methods and apparatus to reduce application deployments sizes

Methods and apparatus to reduce application deployment sizes are disclosed. An example apparatus includes a build generator to generate a build profile associated with a virtual appliance in a virtualization environment, the build profile including a plurality of application components including archive files associated with the virtual appliance. ... Vmware Inc

06/14/18 / #20180165071

Post-deployment modification of information-technology application using lifecycle blueprint

An information-technology (it) blueprint is an executable document that, when executed, can be used to create an it application such as an e-commerce site. An it lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an it application. ... Vmware Inc

06/14/18 / #20180165069

Topological lifecycle-blueprint interface for modifying information-technology application

An information-technology (it) blueprint is an executable document that, when executed, can be used to create an it application such as an e-commerce site. An it lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an it application. ... Vmware Inc

06/14/18 / #20180165066

Information-technology workflows using executable tiles

A workflow is expressed as an arrangement of a set of executable tile. In some embodiments, the tiles include operations expressed in different programming languages. ... Vmware Inc

06/14/18 / #20180164997

Information-technology workflows using executable tiles with plural user interfaces

A workflow is expressed as an arrangement of a set of executable tiles. In some embodiments, the tiles include operations expressed in different programming languages. ... Vmware Inc

06/14/18 / #20180164965

Custom property cluster definition for a graphic user interface

An example method for utilizing custom properties in a user interface may include receiving, by an application configuration window, a custom property cluster definition. The custom property cluster definition may include a workflow configuration. ... Vmware Inc

06/07/18 / #20180159896

Enhanced computing system security using a secure browser

Described herein are systems, methods, and software to provide secure browsers to end user devices. In one implementation, a secure browsing service receives, over a network, a request for an internet browser from an end user device. ... Vmware Inc

06/07/18 / #20180159845

Systems and methods to facilitate certificate and trust management across a distributed environment

Methods and apparatus to facilitate certificate and trust management across a distributed environment are disclosed. An example apparatus includes a first virtual appliance including a first management endpoint and a first authentication provider including a first certificate validator, the first certificate validator to validate that a first certificate received by the first authentication provider is authentic, virtual appliance to communicate the first certificate via the first management endpoint; and a first component server including a first management agent and a first certificate evaluator, the first management agent to communicate with the first virtual appliance via the first management endpoint, the first management agent to receive the first certificate via the first management endpoint, the first certificate evaluator to evaluate the first certificate to determine a signing authority, the first management agent to restart the first component server and notify the first virtual appliance of acceptance of the first certificate.. ... Vmware Inc

06/07/18 / #20180159844

Systems and methods for cloning an agent in a distributed environment

Methods and apparatus to clone an agent in a distributed environment are disclosed. An example apparatus includes a first management agent associated with a first component server in a virtualization environment, the first management agent configured to facilitate communication between the first component server and a virtual appliance, the virtual appliance to authenticate the first management agent based on first credentials including a first identifier and a first certificate. ... Vmware Inc

06/07/18 / #20180159843

Secure asymmetric key application data sharing

To establish a sign on session among single sign on (sso)-enabled applications, a user can be prompted by an application for an access code. An access interval key can be generated using a key derivative function based on the access code. ... Vmware Inc

06/07/18 / #20180159826

Application based network traffic management

Described herein are systems, methods, and software to enhance network traffic management for virtual machines. In one implementation, a host for a virtual machine may identify applications available for execution on the virtual machine from mounted application volumes and identify firewall rules for the applications. ... Vmware Inc

06/07/18 / #20180159721

Systems and methods to orchestrate infrastructure installation of a hybrid system

Methods and apparatus to orchestrate infrastructure installation of a hybrid system are disclosed. An example apparatus includes a first virtual appliance including a management endpoint. ... Vmware Inc

06/07/18 / #20180158169

Host-based gpu resource scheduling

Examples allocate and schedule use of graphics processing unit (gpu) resources among a plurality of users executing virtual machines (vms) or processes. During initialization, shares representing proportional access to the gpu resources are assigned and then adjusted based on graphics command characteristics. ... Vmware Inc

06/07/18 / #20180157596

Trapless shadow page tables

Techniques for implementing trapless shadow page tables in a virtualized host system are provided. In one embodiment, an spt accelerator device of the host system can intercept a memory write operation originating from a virtual machine (vm) and directed to a guest os page table of the vm, where the guest os page table is stored in a device memory of the spt accelerator device. ... Vmware Inc

06/07/18 / #20180157592

Distribution and execution of instructions in a distributed computing environment

Methods and apparatus for distribution and execution of instructions in a distributed computing environment are disclosed. An example method includes accessing, by executing a first instruction with a processor implementing a management agent within a deployment environment, an indication of a second instruction to be executed, the indication of the second instruction to be executed provided by a management endpoint within the deployment environment. ... Vmware Inc

06/07/18 / #20180157560

Methods and apparatus for transparent database switching using master-replica high availability setup in relational databases

Methods, apparatus, and systems to perform transparent database switching using master-replica high availability setup in relational databases are disclosed. An example system includes a first virtual appliance including a first proxy and a master database, the first proxy to forward service traffic to the master database, the master database to read and/or write data based on the service traffic; a second virtual appliance including a second proxy and a first replica database, the second proxy to determine data stored in the master database, the first replica database to replicate the master database; and a third virtual appliance including a third proxy and a second replica database, the third proxy to, in response to determining the master database of the first virtual appliance is to power down, promote the second replica database to the master database.. ... Vmware Inc

06/07/18 / #20180157550

Systems and methods to facilitate infrastructure installation checks and corrections in a distributed environment

Methods and apparatus to facilitate infrastructure installation checks and corrections in a distributed environment are disclosed. An example apparatus includes a virtual appliance including a management endpoint. ... Vmware Inc

06/07/18 / #20180157544

Methods and systems that use volatile event types in log files to narrow a search for potential sources of problems in a distributed computing system

Methods and systems to narrow a search for potential sources of problems in a distributed computing system are described. A volatile event type of event messages recorded in an event-log file is identified. ... Vmware Inc

06/07/18 / #20180157542

Methods and apparatus for event-based extensibility of system logic

Methods and apparatus to customize deployment are disclosed. An example deployment customization manager can generate a first notification payload including an uncustomized application component property of an application component that provides a logical template of an application. ... Vmware Inc

06/07/18 / #20180157538

Methods and apparatus for limiting data transferred over the network by interpreting part of the data as a metaproperty

Methods and apparatus to customize deployment using metaproperties are disclosed. An example deployment metaproperty manager can generate a first metaproperty payload including an initial application component metaproperty of an application component that provides a logical template of an application. ... Vmware Inc

06/07/18 / #20180157532

Methods and apparatus to manage workload domains in virtual server racks

Methods and apparatus to manage workload domains in virtual server racks are disclosed. An example apparatus includes a policy enforcer to evaluate whether capacities of the plurality of workload domains comply with policy capacity levels of respective user-defined policies for the plurality of workload domains, and a resource manager to, when a first workload domain has a first quantify of resources that exceeds a first policy capacity level of a first user-defined policy, identify a second workload domain requesting a second quantity of resources, when the second quantity of resources is equal to the first quantity of resources, allocate the first quantity of resources from the first workload domain to the second workload domain to satisfy the first policy capacity level, when the second quantity of resources is less than the first quantity of resources, allocate the second quantity of resources from the first workload domain to the second workload domain, and de-allocate remaining resources from the first workload domain to a shared resource pool to satisfy the first policy capacity level.. ... Vmware Inc

06/07/18 / #20180157528

Dynamic timeout as a service

Systems and techniques are described for determining timeouts for computer-executed processes. A described technique includes obtaining previous running times for a particular process. ... Vmware Inc

06/07/18 / #20180157512

Apparatus and methods to incorporate external system to approve deployment provisioning

Methods and apparatus to customize deployment using approvals are disclosed. An example deployment approval manager can generate a first approval payload including an initial application component approval proposal of an application component that provides a logical template of an application. ... Vmware Inc

06/07/18 / #20180157511

System and method for managing size of clusters in a computing environment

A number of hosts in a logical cluster is adjusted up or down in an elastic manner by tracking membership of hosts in the cluster using a first data structure and tracking membership of hosts in a spare pool using a second data structure, and upon determining that a triggering condition for adding another host is met and that all hosts in the cluster are being used, selecting a host from the spare pool, and programmatically adding an identifier of the selected host to the first data structure and programmatically deleting the identifier of the selected host from the second data structure.. . ... Vmware Inc

06/07/18 / #20180157480

Distribution and execution of instructions in a distributed computing environment

Methods and apparatus for distribution and execution of instructions in a distributed computing environment are disclosed. An example method includes accessing, by executing an instruction with a processor implementing a management agent within a deployment environment, an indication of an instruction to be executed, the indication of the instruction to be executed provided by a management endpoint operated at a virtual appliance within the deployment environment. ... Vmware Inc

06/07/18 / #20180157472

Customized application state transition

An example method for managing application deployment in a cloud environment may maintain a state machine. The state machine may include a plurality of application states, a plurality of state operations, and relationships among the plurality of application states and the plurality of state operations. ... Vmware Inc

06/07/18 / #20180157433

Inter-application secure data sharing workflow

To extend a sign on session among applications, an inter-application workflow request can be initiated from a first to a second application. The workflow request can identify one or more memory locations in a shared memory for secure data transfer between the applications. ... Vmware Inc

06/07/18 / #20180157384

Methods, systems, and apparatus to trigger a workflow in a cloud computing environment

Methods, apparatus and articles of manufacture to provide workflow subscription management in a cloud computing environment are disclosed. Example disclosed methods include, in response to a first input identifying an event topic, causing, by executing an instruction with a processor, a corresponding event schema to be displayed, accessing a second input identifying a field included in the event topic schema and a third input identifying a threshold value corresponding to the field. ... Vmware Inc

05/31/18 / #20180152440

Single sign-on framework for browser-based applications and native applications

Disclosed are various approaches for providing single sign-on capabilities for a user on a client device. A user's credentials can be authenticated by an identity provider application. ... Vmware Inc

05/31/18 / #20180152439

Single sign-on framework for browser-based applications and native applications

Disclosed are various approaches for providing single sign-on capabilities for a user on a client device. A user's credentials can be authenticated by an identity provider application. ... Vmware Inc

05/31/18 / #20180150492

Tracking data of virtual disk snapshots using tree data structures

User data of different snapshots for the same virtual disk are stored in the same storage object. Similarly, metadata of different snapshots for the same virtual disk are stored in the same storage object, and log data of different snapshots for the same virtual disk are stored in the same storage object. ... Vmware Inc

05/31/18 / #20180150288

Win32 software distribution architecture

Disclosed are various examples for an architecture to distribute win32 applications. In one example, a specification of a win32 application and deployment options are received. ... Vmware Inc

05/24/18 / #20180146020

Live migration of virtualized video stream decoding

Embodiments perform live migration of a virtual machine (vm) decoding a video stream including suspending and resuming the video stream. A software decoder operating on the vm is able to use dedicated video decoding hardware resources of the host computing device upon which the vm is operating. ... Vmware Inc

05/24/18 / #20180145960

Cached credentials for offline domain join and login without local access to the domain controller

Techniques are described for performing an offline domain join and login on behalf of a computing device in order to enable the device to access corporate resources without local access to the domain controller. A slave service is described that can start a virtual machine on a local network of the enterprise, perform an offline domain join of the virtual machine, perform a first login to the virtual machine using credentials of a remote user and then capture the changes made on the virtual machine and deliver those changes to the remote user's device. ... Vmware Inc

05/24/18 / #20180145955

Methods and apparatus to manage credentials in hyper-converged infrastructures

Methods, apparatus, systems and articles of manufacture manage credentials in hyper-converged infrastructure s are disclosed. An example method includes establishing, by executing an instruction with at least one processor, a communication between a software defined data center manager of the hyper-converged infrastructure and a component of the hyper-converged infrastructure using first credentials included in a known hosts file. ... Vmware Inc

05/24/18 / #20180145932

Packet generation and injection

The present disclosure is related to packet generation and injection. An example testing system for packet generation and injection can include a packet generation and injection apparatus connected to a host. ... Vmware Inc

05/24/18 / #20180145930

Pooling public cloud resources from different subscriptions using reservations

An example method of managing virtualized computing resources provided by a public cloud includes: grouping subscriptions in the public cloud into reservations, each of the reservations including constraints on virtualized computing resources provided by at least one of the subscriptions; allocating the reservations among a plurality of principals; receiving a request to provision a workload from a user associated with a first principal of the plurality of principals, wherein the workload includes metadata describing constraints of the workload; generating a deployment plan for the workload based on the metadata therein and at least one of the reservations allocated to the first principal, the deployment plan specifying a first subscription of the subscriptions; and transmitting a deployment. . ... Vmware Inc

05/24/18 / #20180145925

Subscription-agnostic deployment of workloads to a public cloud

An example method of deploying a workload to a public cloud includes: receiving a request to provision a first workload from a first user, wherein the first workload includes metadata describing constraints; generating a first deployment plan for the first workload based on the metadata thereof. The step of generating comprises identifying a plurality of reservations assigned to the first user, each of the plurality of reservations including computing resources backed by a subscription provided by the public cloud; and selecting a first reservation from the plurality of reservations having available computing resources backed by a first subscription provided by the public cloud and satisfying the constraints of the first workload. ... Vmware Inc

05/24/18 / #20180145923

Multi-cloud resource allocation

An example method for allocating resources in a multi-cloud environment may include receiving, by an allocation broker executing in the multi-cloud environment, a client request to create an allocation of cloud resource in a plurality of clouds. The method may include receiving, by the allocation broker from a reservation broker, a reservation candidate based on a reservation type. ... Vmware Inc

05/24/18 / #20180145922

Outbound request management

The present disclosure is related to devices, systems, and methods for routing requests for an external service, originating from a plurality of cluster nodes, through an outbound request manager. An example method can include receiving a first request for an external service originating from a first cluster node having a first network address, receiving a second request for the external service originating from a second cluster node having a second network address, transmitting the first request with a particular network address to an address associated with the external service, and transmitting the second request with the particular network address to the address associated with the external service.. ... Vmware Inc

05/24/18 / #20180145884

Lifecycle management of custom resources in a cloud computing environment

Methods, apparatus and articles of manufacture to provide lifecycle management of custom resources in a cloud computing environment are disclosed. Example methods disclosed herein for custom resource lifecycle management include accepting, with an extensibility service implemented by a virtual appliance, a resource definition and a lifecycle definition for a custom resource to be executed in a cloud computing environment. ... Vmware Inc

05/24/18 / #20180145878

Content driven public cloud resource partitioning and governance

An example method of extending a cloud manager configured to manage a public cloud includes: receiving a content package at the cloud manager, the content package including a component entity, the component entity including a resource type entity that represents a resource provided by the public cloud, a user interface (ui) form entity that defines a ui for configuring the resource, and a lifecycle operations logic that extends at least one phase of a workflow of the cloud manager; receiving a request from a user through the ui defined by the ui form entity to create the resource in the public cloud; executing the workflow of the cloud manager in response to the request; and executing the lifecycle operations logic during execution of the workflow.. . ... Vmware Inc

05/24/18 / #20180144588

Alerts provided based on responder profile

The present disclosure is related to devices, systems, and methods for alerts provided based on responder profile. An example device can include instructions to receive an alert message via an operations management server, access a plurality of alert responder profiles in storage, each associated with a respective alert responder and determined based on historical actions of the respective alert responder, and communicate the alert message to an alert responder having an alert responder profile that exceeds a threshold correlation with the alert message.. ... Vmware Inc

05/24/18 / #20180144125

Immutable file storage

The present disclosure is related to devices and systems for immutable file storage. An example device can include instructions to hash a log file received from a log source to produce a hash value, store the hash value and information describing the log file, communicate the hash value and the information to a third party service, wherein the third party service maintains the communicated hash value and the communicated information such that the communicated hash value and the communicated information are immutable, access the communicated hash value and the communicated information, and compare the stored hash value and the stored information with the communicated hash value and the communicated information to determine whether the log file is unmodified.. ... Vmware Inc

05/24/18 / #20180143972

Taking an action in response to detecting an unsupported language in a log

The present disclosure is related to devices, systems, and methods for taking an action in response to detection of an unsupported language in a log. An example system can include instructions to analyze a log of a log source, detect an unsupported language in the log, and take an action in response to detecting the unsupported language in the log.. ... Vmware Inc

05/24/18 / #20180143854

Methods, systems and apparatus to perform a workflow in a software defined data center

Methods and apparatus to perform a workflow in a software defined data center are disclosed herein. An example software defined data center includes a first workflow engine associated with a first processor to execute a workflow and to generate status information identifying the status of tasks included in the workflow and further includes a status tracker associated with a second processor. ... Vmware Inc

05/24/18 / #20180143849

Auto-adaptive virtual desktop persistence

An adaptive virtual desktop architecture is provided. Application install or assignment is evaluated, such as by using heuristics to identify applications that may present compatibility problems. ... Vmware Inc

05/24/18 / #20180143845

Independent access to virtual machine desktop content

Methods, systems, and techniques for facilitating access to content stored remotely, for example, as part of a virtual machine infrastructure or elsewhere in a networked environment, using a uniform mechanism are provided. Example embodiments provide an enhanced virtual desktop management server/system with a content abstraction layer which enables users to access their data stored as part of a virtual machine environment, or replicated otherwise on a network, using a generic api. ... Vmware Inc

05/24/18 / #20180143839

Conversion tool for moving from block-based persistence to byte-based persistence

Techniques for facilitating conversion of an application from a block-based persistence model to a byte-based persistence model are provided. In one embodiment, a computer system can receive source code of the application and automatically identify data structures in the source code that are part of the application's semantic persistent state. ... Vmware Inc

05/24/18 / #20180143836

Dynamic application overlay for remote desktop servers

Examples disclosed herein provide systems, methods, and software to provide individualized applications to remote desktop sessions. In one example, a method of operating a remote desktop server to provide individualized applications to remote desktop users includes identifying a request from a user for a remote desktop session. ... Vmware Inc

05/24/18 / #20180143773

Maintaining quorum of storage objects in nested levels of a distributed storage system

Exemplary methods, apparatuses, and systems determine that quorum can be maintained for a storage object in a distributed storage system in the event a defined maximum number of first partitions in a first level of storage and a second partitions in a second level of storage fail. When it is determined that there are insufficient numbers of first partitions and/or second partitions, additional first partitions and/or second partitions are associated with the storage object in the distributed storage system. ... Vmware Inc

05/24/18 / #20180143744

User interface customization based on user tendencies

The present disclosure is related to devices, systems, and methods for user interface customization. An example device can include instructions executable by a processor to receive indications of user actions with respect to an application, wherein the actions are made using a plurality of selectable elements of an interface, determine a user tendency based on the user actions, and provide a customized interface to the user based on the determined user tendency, wherein the customized interface includes at least one customized selectable element.. ... Vmware Inc

05/17/18 / #20180139192

Adaptive token cache management

Embodiments perform token cache management by renewing tokens heuristically. A token renewal request interval is defined based on a configurable lifetime of a token and an acquisition duration. ... Vmware Inc

05/17/18 / #20180139174

Central namespace controller for multi-tenant cloud environments

A centralized namespace controller allocates addresses in a distributed cloud infrastructure on-demand. Upon receiving a request to allocate addresses for a network to be provisioned by a cloud computing system included in the distributed cloud infrastructure, the centralized namespace controller allocates a network address that is unique within the distributed cloud infrastructure. ... Vmware Inc

05/17/18 / #20180139149

Multi-cloud resource reservations

An example method for reserving resources in a multi-cloud environment may include receiving, by a reservation broker executing in the multi-cloud environment, a first client request to reserve a first cloud resource in a plurality of clouds. The plurality of clouds includes a corresponding plurality of cloud brokers. ... Vmware Inc

05/17/18 / #20180139148

Distributed resource scheduling based on network utilization

Examples provide a network-utilization based scheduler that considers network utilization when load balancing virtual computing instances (vcis) in a cluster. The scheduler also periodically evaluates proposed migrations based on a current cluster snapshot including network utilization data of the hosts. ... Vmware Inc

05/17/18 / #20180137014

System and method for checking and characterizing snapshot metadata using snapshot metadata database

System and method for checking and characterizing metadata of snapshots utilize a snapshot metadata database to execute at least one of checking and characterizing operations on the metadata of snapshots. The snapshot metadata database includes information extracted from backing storage elements containing the metadata of snapshots.. ... Vmware Inc

05/17/18 / #20180136988

Devops management

The present disclosure is related to devices and methods for devops management. One or more devices can include instructions to receive indications associated with execution events of a release of an application over a period of time, wherein the execution events include positive execution events and negative execution events, and provide a graphical user interface (gui) configured to display a timeline in a first portion of the gui corresponding to the release of the application over the period of time, wherein the timeline includes a display element for each of the execution events in a respective portion of the timeline corresponding to an execution time of the execution event, and provide a plurality of selectable options, wherein each option, upon being selected, causes a different section of the timeline to be displayed by a second portion of the gui.. ... Vmware Inc

05/17/18 / #20180136970

Methods and systems for configuration-file inheritance

The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. ... Vmware Inc

05/17/18 / #20180136957

Distributed iscsi target for distributed hyper-converged storage

A given host machine in a virtualization system having a virtual distributed storage system may receive an iscsi protocol packet from a computer system separate from the given host machine. Processing the iscsi protocol may include accessing distributed storage device (iscsi target) comprising storage connected to the two or more host machines in the virtualization system. ... Vmware Inc

05/17/18 / #20180136951

Policy enabled application-release-management subsystem

The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. ... Vmware Inc

05/17/18 / #20180136870

Heterogeneous disk to apply service level agreement levels

In one embodiment, a guest operating system in a host computer receives a write command for a partition in a plurality of partitions of a heterogeneous disk. The heterogeneous disk is mounted in the guest operating system. ... Vmware Inc

05/10/18 / #20180130171

Virtual machine graphics resource usage

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for calculating graphics resources for a virtual machine. One of the methods includes determining resources available on a graphics card device included in a computer executing a plurality of virtual machines, each virtual machine configured to execute a virtual desktop; determining, based on data received from a hypervisor that manages execution of at least one of the plurality of virtual machines, a graphics profile for a virtual machine included in the plurality of virtual machines executing on the computer; determining a portion of the available resources on the graphics card device allocated to the virtual machine using the graphics profile; and computing an amount of resources on the graphics card device consumed by a virtual desktop of the virtual machine based on the portion of the available resources on the graphics card device allocated to the virtual machine.. ... Vmware Inc

05/10/18 / #20180129584

Collaborative debugging

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing a framework for collaborative debugging. In one aspect, a method includes generating a session for an application executing on a remote debugging system and during the session, receiving one or more application inputs for the application from one or more remote users and providing outputs generated by the application for presentation to the one or more remote users. ... Vmware Inc

05/10/18 / #20180129540

Graphic user interface for managing virtual machines

Described are embodiments for management of virtual machines that are executed in one or more hosts. In one example, virtual machines are identified using a search criteria. ... Vmware Inc

05/10/18 / #20180129527

Virtual machine placement with automatic deployment error recovery

Described are embodiments for selection of hardware candidates for deployment of a plurality of virtual machines. Resource requirements are determined for a particular virtual machine of a plurality of virtual machines to be deployed. ... Vmware Inc

05/10/18 / #20180129526

Dynamic virtual machine sizing

A technique is described for managing processor (cpu) resources in a host having virtual machines (vms) executed thereon. A target size of a vm is determined based on its demand and cpu entitlement. ... Vmware Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Vmware Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Vmware Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###