Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Vmware Inc patents (2016 archive)


Recent patent applications related to Vmware Inc. Vmware Inc is listed as an Agent/Assignee. Note: Vmware Inc may have other listings under different names/spellings. We're not affiliated with Vmware Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "V" | Vmware Inc-related inventors


System and method for deploying an application in a computer system

System and method for deploying an application in a computer system automatically extend an application topology of virtual computing resources of the computer system and application components of the application to be executed on the virtual computing resources to include an affinity-type rule for the virtual computing resources of the computer system based on at least one predefined policy of the application topology and deploy the application in the computer system by provisioning the virtual computing resources to the physical devices in the computer system based on the extended application topology.. . ... Vmware Inc

Load balancing using a client swapping operation

A management server and method for load balancing a cluster of host computers analyzes load metrics of clients naming on the host computers in the cluster to select a first client that can be migrated from a first host computer in the cluster to a second host computer in the cluster to improve load balance for the cluster and a second client running on the second host computer that can be swapped with the first client running on the first host computer for a client swapping operation. The client swapping operation involves simultaneously migrating the first client from the first host computer to the second host computer and migrating the second client from the second host computer to the first host computer.. ... Vmware Inc

Methods and apparatus for generating and using security assertions associated with containers in a computing environment

Methods and apparatus are disclosed to generate a security assertion document associated with a container image, and to use the security assertion document to determine whether a container image is suitable for use to assemble a corresponding container for execution in a host environment. In an example method, the generated security assertion document includes a security assertion resulting from an assessed policy rule. ... Vmware Inc

Container data offline and online scan in a cloud environment

Techniques for security scanning of containers executing within vms. A virtualization system maintains container disk files that store data for containers. ... Vmware Inc

Fast user kiosk access in a non-persistent desktop environment

Techniques for improving logon time for remote desktops a user has not logged onto before. In general, these techniques involve utilizing a pre-logon script to create a profile-specifying registry entry that links to an already created persistent or “mandatory” profile. ... Vmware Inc

Method and apparatus for application awareness in a network

A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is intercepted by an agent prior to the request reaching a transport layer in the first context. ... Vmware Inc

Interference-aware client placement

A management server and method for performing resource management operations in a distributed computer system utilizes interference scores for clients executing different workloads to create an interference affinity-type rule for at least some of the clients contending for a resource based on the interference scores for that resource. The interference affinity-type rule can then be used to recommend a target host computer to place a client.. ... Vmware Inc

Container-aware application dependency identification

Techniques disclosed herein provide an approach for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (os)-less containers. One embodiment provides a computer-implemented method that includes monitoring network traffic at one or more host computer systems, wherein os-less containers run in at least one of the host computer systems. ... Vmware Inc

Interference-based client placement using dynamic weights

A management server and method for performing resource management operations in a distributed computer system utilizes interference scores for clients executing different workloads, including a client to be placed in the distributed computer system, as utilization values of resources, which are assigned continuously variable weights to produce weighted resource utilization values. The weighted resource utilization values are used to generate overall selection scores for host computers of the distributed compute system, which are then used to recommend a target host computer among the host computers of the distributed computer system to place the client.. ... Vmware Inc

Hybrid cloud resource scheduling

In an example, a method of placing a virtual computing instance among a plurality of datacenters includes comparing constraints specified for the virtual computing instance against resource metrics obtained from the plurality of datacenters, and a budget specified for the virtual computing instance against admission prices for a plurality of tiers of the plurality of datacenters, to generate a candidate set of datacenters. The method further includes scoring the candidate set of datacenters. ... Vmware Inc

System and method for performing resource allocation for a host computer cluster

System and method for performing resource allocation for a host computer cluster use resource allocation weight scores for resource nodes in a cluster resource allocation hierarchy of the host computer cluster based on the number of powered-on clients in the resource nodes.. . ... Vmware Inc

Methods and systems to evaluate data center resource allocation costs

This disclosure is directed to methods and systems to evaluate resource allocation costs of a data center. Methods and systems compute resource allocation costs of a cloud computing industry to obtain industry benchmarks that are compared with the resource allocation costs of the data center. ... Vmware Inc

Efficient replacement of clients running large scale applications

A system and method for efficiently replacing clients running a large scale application uses a pool of clients, which includes a group of active clients running the large scale application and at least one standby client. When a particular active client is identified to be replaced, one of the at least one standby client is selected as a replacement client for the particular active client. ... Vmware Inc

Host management across virtualization management servers

In an example, method of managing hosts across a plurality of virtualization management servers, each of the plurality of virtualization management servers managing a plurality of the hosts, each of the hosts configured with virtualization software executing at least one virtual computing instance is disclosed. The method includes deploying, by a rescue service, a rescue agent on each of the plurality of virtualization management servers; obtaining host inventories and configurations at the rescue service for the plurality of virtualization management servers; assigning each of the plurality of virtualization management servers to a category of a plurality of categories based on configuration maximums of the plurality of virtualization management servers; and updating rescue storage managed by the rescue service to monitor resource usage of the plurality of virtualization management servers based on assigned category and the host inventories. ... Vmware Inc

12/29/16 / #20160379480

Alerting with duplicate suppression

The present disclosure is related to systems, methods, and non-transitory machine readable media for alerting with duplicate suppression. An example non-transitory machine readable medium can store instructions executable by a processing resource to cause a computing system to receive an alert at a first virtual computing instance (vci) from a second vci, compare the alert with at least one previously received alert to determine if the alert is a duplicate alert, and send the alert to an alert notification queue associated with the first vci in response to a determination that the alert is not a duplicate alert. ... Vmware Inc

12/29/16 / #20160379237

Methods and systems to evaluate cost driver and virtual data center costs

This disclosure is directed to methods and systems to evaluate the performance of a virtual data center (“vdc”) running in a data center by comparing costs of cost drivers and vdc costs with cloud computing industry benchmarks. Methods collect costs of cost drivers and total vdc costs of a cloud computing industry. ... Vmware Inc

12/29/16 / #20160378815

Abortable transactions using versioned tuple cache

A transaction manager for handling operations on data in a storage system provides a system for executing transactions that uses a versioned tuple cache to achieve fast, abortable transactions using a redo-only log. The transaction manager updates an in-memory key-value store and also attaches a transaction identifier to the tuple as a minor key. ... Vmware Inc

12/29/16 / #20160378782

Virtual desktop infrastructure private cloud

Techniques presented herein provide an approach for sharing folders and files across devices. In one embodiment, folder redirection is employed to permit a device running a virtual infrastructure (vdi) client which connects to a remote agent to access folders and files shared by other devices. ... Vmware Inc

12/29/16 / #20160378773

Data mover permitting data transfer without transferring data between application and operating system

In a computer system with a disk array that has physical storage devices arranged as logical storage units and is capable of carrying out hardware storage operations on a per logical storage unit basis, data movement operations can be carried out on a per-file basis. A data mover software component for use in a computer or storage system enables cloning and initialization of data to provide high data throughput without moving the data between the kernel and application levels.. ... Vmware Inc

12/29/16 / #20160378730

Systems and methods for applying a residual error image

Systems and methods described herein enable a residual error image to be added and rendered in an existing html canvas using native primitives. A current image and a residual error image containing pixel value differences between the current image and an updated image are received. ... Vmware Inc

12/29/16 / #20160378699

Implementing pseudo non-masking interrupts behavior using a priority interrupt controller

A method is provided for handling interrupts in a processor, the interrupts including regular interrupts having a range of priorities and a pseudo non-maskable interrupt (pnmi) that is of a higher priority than any of the regular interrupts. The method includes obtaining an interrupt vector corresponding to a received interrupt, and if the received interrupt is a pnmi, executing a pnmi interrupt handler. ... Vmware Inc

12/29/16 / #20160378696

Exposing memory-mapped io devices to drivers by emulating pci bus and pci device configuration space

Devices are emulated as pci devices so that existing pci drivers can be used for the devices. This is accomplished by creating a shim pci device with a emulated pci configuration space, accessed via a emulated pci extended configuration access mechanism (ecam) space which is emulated by accesses to trapped unbacked memory addresses. ... Vmware Inc

12/29/16 / #20160378676

Methods and apparatus to re-direct detected access requests in a modularized virtualization topology using virtual hard disks

Methods, apparatus are articles of manufacture are disclosed to re-direct detected access requests in a modularized virtualization topology using virtual hard disks. An example method includes detecting, with a processor, a request to access a software asset at a first path location on a first virtual hard disk. ... Vmware Inc

12/29/16 / #20160378653

Log-structured b-tree for handling random writes

A sorted key-value store is implemented using a write-back cache maintained in memory, a b-tree data structured maintained in disk, and a logical and physical log for providing transactions. The logical log and write-back cache are used to answer client requests, while dirty blocks in the write-back cache are periodically flushed to disk using the physical log.. ... Vmware Inc

12/29/16 / #20160378622

Virtual machine recovery on non-shared storage in a single virtual infrastructure management instance

Techniques for enabling virtual machine (vm) recovery on non-shared storage in a single virtual infrastructure management server (vims) instance are provided. In one set of embodiments, a vims instance can receive an indication that a vm in a first cluster of the vims instance has failed, and can determine whether the vm's files were being replicated to a storage component of the vims instance at the time of the vm's failure. ... Vmware Inc

12/29/16 / #20160378612

Data protection for a document database system

In an example, method of data protection in a document database system includes grouping documents input to the document database system into super documents, each of the super documents including a plurality of chunks, each of the plurality of chunks including one of the documents. The method further includes operating an object storage system according to a storage policy that implements parity processing, where the parity processing includes computing parity chunks for the super documents and storing the parity chunks in an object store, where a plurality of the parity chunks are computed for each of the super documents. ... Vmware Inc

12/29/16 / #20160378564

Virtual resource scheduling for containers without migration

A method for scheduling computing resources without container migration includes determining a resource availability for one or more hosts, a resource allocation for one or more virtual machines (vms), and a resource usage for one or more containers. The method further includes calculating a target resource configuration for one or more vms, wherein calculating a target resource configuration comprises determining an upper limit of resource demand on a vm from one or more containers allocated on the vm, based at least in part on the resource usage. ... Vmware Inc

12/29/16 / #20160378563

Virtual resource scheduling for containers with migration

A method for scheduling computing resources with container migration includes determining a resource availability for one or more hosts, a resource allocation for one or more virtual machines (vms), and a resource usage for one or more containers. The method includes identifying the hosts on which vms and containers can be consolidated based on resource availability. ... Vmware Inc

12/29/16 / #20160378554

Parallel and distributed computing using multiple virtual machines

Systems and techniques are described for using virtual machines to write parallel and distributed applications. One of the techniques includes receiving a job request, wherein the job request specifies a first job to be performed by a plurality of a special purpose virtual machines, wherein the first job includes a plurality of tasks; selecting a parent special purpose virtual machine from a plurality of parent special purpose virtual machines to perform the first job; instantiating a plurality of child special purpose virtual machines from the selected parent special purpose virtual machine; partitioning the plurality of tasks among the plurality of child special purpose virtual machines by assigning one or more of the plurality of tasks to each of the child special purpose virtual machines; and performing the first job by causing each of the child special purpose virtual machines to execute the tasks assigned to the child special purpose virtual machine.. ... Vmware Inc

12/29/16 / #20160378543

Implementing pseudo non-masking interrupts behavior using a priority interrupt controller

A method is provided for handling interrupts in a processor, the interrupts including regular interrupts having a range of priorities and a pseudo non-maskable interrupt (pnmi) that is of a higher priority than any of the regular interrupts. The method includes the steps of obtaining an interrupt vector corresponding to a received interrupt, and if the received interrupt is a regular interrupt, enabling interrupts in the processor so that a pnmi can be received while handling the regular interrupt, executing a regular interrupt handler using the interrupt vector, and disabling interrupts in the processor. ... Vmware Inc

12/29/16 / #20160378530

Remote-direct-memory-access-based virtual machine live migration

The current document is directed to methods and systems for moving executing virtual machines between host systems in a virtual data center. In described implementations, remote-direct memory access is used for transferring memory contents and, in certain implementations, additional data between the host systems to facilitate live migration of virtual machines. ... Vmware Inc

12/29/16 / #20160378528

Propagating changes from a virtual machine clone to a physical host device

Techniques are described for creating a virtual machine clone of a physical host computing device. A hosted hypervisor running within a host operating system on the physical computing device receives a request to boot a virtual machine clone of the device. ... Vmware Inc

12/29/16 / #20160378527

Cloning a virtual machine from a physical device based on a local snapshot

Techniques are described for creating a virtual machine clone of a physical host computing device. A hosted hypervisor running within a host operating system on the physical computing device receives a request to boot a virtual machine clone of the device. ... Vmware Inc

12/29/16 / #20160378524

Optimizing order of migrating virtual computing instances for increased cloud services engagement

The order of migrating virtual computing instances from a private data center to a public cloud is optimized using a tsp solver. The method of migrating a plurality of virtual computing instances that are in communication with each other within a private data center to a public cloud includes the steps of assigning, for each different pair of virtual computing instances, a numerical value that represents an amount of data transmission between the pair over a predetermined period of time, determining a recommended order of migration for the virtual computing instances based on the assigned numerical values, and migrating the virtual computing instances according to the recommended order.. ... Vmware Inc

12/29/16 / #20160378519

Method and system for anticipating demand for a computational resource by containers running above guest operating systems within a distributed, virtualized computer system

The current document is directed to methods and systems for efficiently executing osl-virtualization containers within the execution environments provided by virtual machines that execute above traditional virtualization layers within large, virtualized, distributed computing systems. The currently disclosed methods and systems anticipate the need for additional virtual machines in order to meet anticipated demands for one or more computational resources by the containers. ... Vmware Inc

12/29/16 / #20160378518

Policy based provisioning of containers

Techniques for placing containers in a cloud (e.g., into virtual machines (“vms”)) based on container policies. The container policies may specify compute-related qualities, storage-related quality, and/or network-related qualities that are to be met by the underlying software and hardware that supports execution of the virtual machines. ... Vmware Inc

12/29/16 / #20160378517

Methods and apparatus to monitor virtual computing environments

Methods, apparatus, systems and articles of manufacture to monitor virtual computing environments are described. An example method includes determining a computing resource status of a computing host that is operating a container engine, comparing the computing resource status to a threshold, and in response to determining that computing resource status does not exceed the threshold, executing a monitoring operation in a container hosted by the container engine.. ... Vmware Inc

12/29/16 / #20160378516

Modifying an instance catalog to perform operations

The present disclosure is related to methods, systems, and machine-readable media for modifying an instance catalog to perform operation. A storage system can include a plurality of packfiles that store data. ... Vmware Inc

12/29/16 / #20160378449

Artifact manager for release automation

An artifact manager generates an abstraction for artifacts and repositories in a deployment platform such that the artifacts may be located uniformly and securely in each deployment environment during the deployment process. The described system includes a release automation platform having a release pipeline which is responsible for deploying build artifacts into multiple deployment environments, testing the build artifacts thoroughly in each environment, and follow organization-specific approval processes to promote the build artifacts to a next deployment environment.. ... Vmware Inc

12/29/16 / #20160378423

Method and system for identifying drawing primitives for selective transmission to a remote display

Remote desktop servers include a display encoder that maintains a secondary framebuffer that contains display data to be encoded and transmitted to a remote client display and a list of display primitives effectuating updated display data in the secondary framebuffer. The display encoder submits requests to receive the list of drawing primitives to a video adapter driver that receives and tracks drawing primitives that, when executed, update a primary framebuffer.. ... Vmware Inc

12/29/16 / #20160378365

Efficient data deployment for a parallel data processing system

This document describes techniques for efficient data deployment for a parallel data processing system. In one embodiment, a virtualization platform running a parallel processing application that includes one or more virtual data nodes receives a first command to write a data block to a storage device. ... Vmware Inc

12/29/16 / #20160378361

Methods and apparatus to apply a modularized virtualization topology using virtual hard disks

Methods, apparatus and articles of manufacture are disclosed to apply a modularized virtualization topology using virtual hard disks. An example modularized virtualized computing environment includes a processor, a hypervisor, a virtual machine deployed by the hypervisor, and a plurality of virtual hard drives, each virtual hard drive encapsulating one respective logical functionality or one logical data set, the virtual hard drives cooperating to implement an overall functionality or service.. ... Vmware Inc

12/29/16 / #20160378360

Methods and apparatus to enforce life cycle rules in a modularized virtualization topology using virtual hard disks

Methods, apparatus and articles of manufacture are disclosed to enforce life cycle rules in a modularized virtualization topology using virtual hard disks. An example method includes, in response to a request to access a first virtual hard disk in a virtual computing environment, identifying, with a processor, a life cycle stage. ... Vmware Inc

12/29/16 / #20160378348

Methods and apparatus to manage inter-virtual disk relations in a modularized virtualization topology using virtual hard disks

Methods, apparatus and articles of manufacture are disclosed to manage inter-virtual disk relations in a modularized virtualization topology using virtual hard disks. An example method includes, in response to a request to access a first virtual hard disk in a virtual computing environment, determining, with a machine, whether an inter-virtual hard disk rule associated with a second virtual hard disk is invoked and whether a condition of the inter-virtual hard disk rule is satisfied. ... Vmware Inc

12/22/16 / #20160373609

Pixel perturbation for transmission of meta-information

Techniques disclosed herein provide an approach using pixel perturbation to transmit information. In one embodiment, a pixel perturbation engine perturbs pixels of an image to encode meta-information therein. ... Vmware Inc

12/22/16 / #20160373532

Distributed self-served application remoting

Techniques disclosed herein provide an approach for distributed self-served application remoting. In one embodiment, a user's own computing device, on which a remoted application runs, transmits user interface updates to a destination device which displays the updates and communicates back inputs (e.g., keyboard and mouse inputs) made at the destination device. ... Vmware Inc

12/22/16 / #20160373520

Sticky session data migration

Techniques for managing session data in a computer system having a plurality of servers establishing sessions with clients. Communications from any particular client are forwarded to the server assigned to handle that client. ... Vmware Inc

12/22/16 / #20160373293

Method and system for clustering event messages and managing event-message clusters

The current document is directed to methods and systems that process, classify, efficiently store, and display large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are assigned to event-message clusters based on non-parameter tokens identified within the event messages. ... Vmware Inc

12/22/16 / #20160371825

Pixel perturbation for image quality measurement

Techniques disclosed herein provide an approach using pixel perturbation to measure image quality. In one embodiment, a pixel perturbation engine perturbs pixels in an image with a reference image for measuring quality of the image after transmission. ... Vmware Inc

12/22/16 / #20160371322

Efficient management of large number of file descriptors

A file descriptor data structure is configured as a hierarchy of tables. File descriptors are stored as entries in tables that are at the bottom of the hierarchy. ... Vmware Inc

12/22/16 / #20160371149

Crash management of host computing systems in a cluster

Techniques for managing crash in a host computing system in a cluster are disclosed. In one embodiment, a core dump partition may be configured in memory associated with a remote access controller (rac) within the host computing system. ... Vmware Inc

12/22/16 / #20160371135

Automatic discovery and prioritization of fault domains

A recovery management system and recovery method uses dependency information between clients running in a distributed computer system to automatically determine logical fault domains for the clients. The logical fault domains are then prioritized for a recovery process.. ... Vmware Inc

12/22/16 / #20160371127

Resource management for containers in a virtualized environment

A virtualized environment includes a pool of vms, each vm configured to run one or more virtual containers. Each virtual container runs as an isolated process in userspace on a guest operating system. ... Vmware Inc

12/22/16 / #20160371119

Managing resource reservations in a highly parallel application

A method for managing computing resource reservations comprises receiving a first reservation, at a reservation system, for a requested amount of computing resources for a virtual application from a total pool of available resources. The method further comprises adding the first reservation to a database of existing reservations if the requested amount of computing resources is available and associating the first reservation with a universal timestamp. ... Vmware Inc

12/22/16 / #20160371112

User interface for managing a distributed virtual switch

A user interface for managing allocations of network resources in a virtualized computing environment provides a graphical overview of the virtual computing environment that allows the user to visualize the virtual network, including the connections between the virtual network adapters and the uplink port groups that provide physical network resources for the virtual machines included in the virtualized computing environment. The user interface also provides graphical elements that allow the user to modify the virtual network, to migrate virtual machines from individual virtual switches to a distributed virtual switch, and/or to modify the arrangement of physical network adapters that provide network backing for the virtual machines. ... Vmware Inc

12/22/16 / #20160371111

Extending server-based desktop virtual machine architecture to client machines

A server-based desktop-virtual machines architecture may be extended to a client machine. In one embodiment, a user desktop is remotely accessed from a client system. ... Vmware Inc

12/22/16 / #20160371110

High availability for virtual machines in nested hypervisors

Techniques for providing high availability to virtual machines executing in a nested hypervisor. A high availability agent executing within a slave computer in a cluster detects when a master server becomes unavailable and restarts virtual machines from the master server in response. ... Vmware Inc

12/22/16 / #20160371109

Methods and systems to determine application license costs in a virtualized data center

Methods and systems to compute application license costs of a number of applications run on virtual machines of a virtualized data center are described. In one aspect, one or more of the virtual machines (“vms”) that form the virtual data center are determined. ... Vmware Inc

12/22/16 / #20160371108

Reservation for a multi-machine application

A system for a reservation for a multi-machine application can include a server virtualization engine configured to create a mixed reservation of information technology resources from a cluster of hosts including a virtual machine host and a container host. The system can include a cloud management engine configured to create a multi-machine blueprint from the mixed reservation including a virtual machine template, a container image, and a definition of networking. ... Vmware Inc

12/22/16 / #20160371104

Provisioning virtual desktops with stub virtual disks

A system is described allowing a virtual desktop to be booted directly from a desktop image stored in a backup database without requiring content from the desktop image to be copied into the virtual disk of the virtual machine hosting the virtual desktop. The hosting virtual machine contains a synthetic virtual disk acting as a stub disk by redirecting read requests targeted for the synthetic disk from the guest operating system to corresponding locations of the storage where the desktop image is kept.. ... Vmware Inc

12/22/16 / #20160371086

Efficient recording and replaying of non-deterministic instructions in a virtual machine and cpu therefor

The output of a non-deterministic instruction is handled during record and replay in a virtual machine. An output of a non-deterministic instruction is stored to a buffer during record mode and retrieved from a buffer during replay mode without exiting to the hypervisor. ... Vmware Inc

12/22/16 / #20160371085

Branch trace compression

Exemplary methods, apparatuses, and systems assign a plurality of branch instructions within a computer program to a plurality of prime numbers. Each branch instruction is assigned a unique prime number within the plurality of prime numbers. ... Vmware Inc

12/22/16 / #20160371020

Virtual machine data placement in a virtualized computing environment

An example method is provided for virtual machine data placement on a distributed storage system accessible by a duster in a virtualized computing environment. The method may comprise, based on location data relating to the cluster, identifying a first fault domain and a second fault domain of the distributed storage system. ... Vmware Inc

12/15/16 / #20160364467

Event notification system with cluster classification

An event-notification system provides for monitoring resource-status parameters so as to repeatedly generate resource-status values for each of n resource-status parameters applicable to the resources. Each datapoint specifies a resource, a time of collection, and the values of parameters for the resource at the time. ... Vmware Inc

12/15/16 / #20160364304

Providing availability of an agent virtual computing instance during a storage failure

The present disclosure includes detecting a failure associated with a first storage location on which a first agent virtual computing instance (avci) is deployed, wherein the first avci is being executed by a first hypervisor, stopping the execution of the first avci, determining whether a second avci that provides services analogous to the first avci is being executed by a second hypervisor and is deployed on a second storage location, creating a linked clone of the second avci on the second storage location responsive to the second avci being executed by the second hypervisor and deployed on the second storage location, redeploying the first avci on the second storage location responsive to the second avci not being executed by the second hypervisor or not deployed on the second storage location, and deleting files of the first avci from the first storage location after the failure is corrected.. . ... Vmware Inc

12/15/16 / #20160364201

Remote desktop mirroring

Files are mirrored between a desktop device and a mobile device in a seamless manner so that a user may work on the mirrored files on either device without having to save or send files beforehand. The user may interact with a mirrored file on a desktop, physically leave the desktop, and take a mobile device that has the mirrored file with him or her and continue interacting with the file.. ... Vmware Inc

12/15/16 / #20160364200

Remote desktop exporting

A selected screen, such as a monitoring tool, operating on a remote desktop is exported to a mobile client device, such as a smart phone, tablet, smart watch, etc. The client device polls the remote desktop for images, pointers, commands, etc. ... Vmware Inc

12/15/16 / #20160364174

Online virtual machine disk migration

A method for migrating a virtual machine disk (vm disk) from first physical storage to second physical storage while the virtual machine (vm) is running, the method comprising: (a) creating a first child vm disk to which writes are redirected from a first parent vm disk, the first parent vm disk being on the first physical storage; (b) copying the first parent vm disk to the second physical storage as a second parent vm disk; (c) re-parenting the first vm child disk to the second parent vm disk; and (d) consolidating the first child vm disk and the second parent vm disk.. . ... Vmware Inc

12/08/16 / #20160359981

Triggering application attachment based on service login

Described herein are systems, methods, and software to provide virtualized computing sessions with attachable volumes to requesting users. In one implementation, a virtual computing service identifies a service login for an end user to initiate a virtual computing session. ... Vmware Inc

12/08/16 / #20160359972

Cross-file differential content synchronization

Methods, systems and techniques for synchronizing content, such as a file, between one or more clients and one or more servers are provided. Example embodiments provide a cross-file differential content synchronization system (cdcss) to synchronize files between remote systems in a nearly instantaneous manner without necessitating the transfer of the entire contents of a file. ... Vmware Inc

12/08/16 / #20160359908

Automatic real-time alerting of security hardening non-compliance

In a computer-implemented method for automatic real-time alerting of security hardening non-compliance security policies of virtual machines in a virtualization infrastructure are accessed. Impending non-compliance of at least one of said security policies is determined. ... Vmware Inc

12/08/16 / #20160359907

Automatically auditing virtual machines for security hardening compliance

In a computer-implemented method for automatically auditing virtual machines for security hardening compliance security policies of virtual machines in a virtualization infrastructure are accessed by a centralized compliance manager of the virtualization infrastructure. Security hardening compliance of the virtual machines automatically audited based on the security policies by the centralized compliance manager.. ... Vmware Inc

12/08/16 / #20160359906

Automatic security hardening of an entity

In a computer-implemented method for automatic security hardening of an entity at time of creation in a virtualization infrastructure, creation of an entity is initiated in the virtualization infrastructure. In response to initiating provisioning of the entity, security policy is automatically associated to the entity such that the entity is automatically security hardened at the time of provisioning.. ... Vmware Inc

12/08/16 / #20160357968

Security hardening of virtual machines at time of creation

In a computer-implemented method for security hardening of a virtual machine at time of creation, creation of a virtual machine hosted by a pre-configured hyper-converged computing device is initiated in a virtualization infrastructure, wherein a centralized management tool is for centralized management of the virtualization infrastructure. User selected parameters for a security policy are accessed via the centralized management tool. ... Vmware Inc

12/08/16 / #20160357809

Dynamically converting search-time fields to ingest-time fields

Large amounts of unstructured or semi-structured log data generated by software and infrastructure components of a computing system are processed to identify anomalies and potential problems within the computing system. Stored log messages may be queried and analyzed according to dynamic fields constructed from the content of the log messages. ... Vmware Inc

12/08/16 / #20160357589

Methods and apparatus to scale application deployments in cloud computing environments using virtual machine pools

Methods and apparatus are disclosed to scale application deployments in cloud computing environments using virtual machine pools. An example method disclosed herein includes preparing a virtual machine pool including a virtual machine for use in a scaling operation, the virtual machine prepared in accordance with a blueprint of the application deployed in a deployment environment separate from the virtual machine pool, in response to receiving a request to scale the application, determining by executing an instruction with a processor, whether configuration information of the virtual machine pool satisfies a scaling requirement included in the request, and based on the determination, executing an instruction with the processor to transfer the virtual machine from the virtual machine pool to the deployment environment to perform the scaling operation in accordance with the request to scale.. ... Vmware Inc

12/08/16 / #20160357585

Triggering application attachment based on state changes of virtual machines

Described herein are systems, methods, and software to provide virtualized computing sessions with attachable volumes to requesting users. In one implementation, a virtual computing service identifies a service login for an end user to initiate a virtual computing session. ... Vmware Inc

12/08/16 / #20160357541

Systems and methods for managing distributed applications

Systems and methods of executing and/or provisioning an application in an application specific runtime environment or general runtime environment are disclosed. The application specific runtime environment or general runtime environment are optionally defined by an application environment specification to include a minimal or reduced set of software resources required for execution of the application. ... Vmware Inc

12/01/16 / #20160352745

Extensible multi-tenant cloud-management system and methods for extending functionalities and services provided by multi-tenant cloud-management system

The current document is directed to an interface and authorization service that allows users of a cloud-director management subsystem of distributed, multi-tenant, virtual data centers to extend the services and functionalities provided by the cloud-director management subsystem. A cloud application programming interface (“api”) entrypoint represents a request/response restful interface to services and functionalities provided by the cloud-director management subsystem as well as to service extensions provided by users. ... Vmware Inc

12/01/16 / #20160350325

Data deduplication in a block-based storage system

A method and system are disclosed for storing client data objects in a deduplicated storage system. Deduplicated data may be stored in a plurality of physical data blocks. ... Vmware Inc

12/01/16 / #20160350324

Predictive probabilistic deduplication of storage

Examples perform predictive probabilistic deduplication of storage, such as virtualized or physical disks. Incoming input/output (i/o) commands include data, which is written to storage and tracked in a key-value store. ... Vmware Inc

12/01/16 / #20160350143

Methods and systems to assess efficient usage of data-center resources by virtual machines

Methods and systems that compute an efficiency coefficient of a set of virtual machines (“vms”) running in a cloud-computing facility are described. The set of vms may be a collection of vms that form a vdc or the set of vms may be a subset of a larger set of vms that comprises a vdc. ... Vmware Inc

12/01/16 / #20160350010

Providing block size compatibility with a storage filter

Examples provide input and output request block size compatibility. A storage filter converts input and output (io) requests associated with a first data block size into modified io requests compatible with a data storage organized in a second data block size where the first data block size is different than the first data block size. ... Vmware Inc

12/01/16 / #20160350006

Snapshots and clones in a block-based data deduplication storage system

A deduplication storage system with snapshot and clone capability includes storing logical pointer objects and organizing a first set of the logical pointer objects into a hierarchical structure. A second set of the logical pointer objects may be associated with corresponding logical data blocks of a client data object. ... Vmware Inc

11/24/16 / #20160344819

Remote document signing

Documents or other files opened on a remote desktop are mirrored onto a mobile client device that allows a user to seamlessly work on such documents or files in either a stationary or mobile fashion. The mirrored files may be presented to the user on the mobile client device with the capacity for the user to sign his or her name—or otherwise mark—the mirrored document on the client device. ... Vmware Inc

11/24/16 / #20160344650

Performance-driven resource management in a distributed computer system

A system and method for managing resources in a distributed computer system that includes at least one resource pool for a set of virtual machines (vms) utilizes a set of desired individual vm-level resource settings that corresponds to target resource allocations for observed performance of an application running in the distributed computer system. The set of desired individual vm-level resource settings are determined by constructing a model for the observed application performance as a function of current vm-level resource allocations and then inverting the function to compute the target resource allocations in order to meet at least one user-defined service level objective (slo). ... Vmware Inc

11/24/16 / #20160342814

Maintaing encryption keys to provide encryption on top of data deduplication

Exemplary methods, apparatuses, and systems generate an encryption key based upon data content of a portion of data to be encrypted by the encryption key. The encryption key is stored as one of a plurality of encryption keys within a subset of storage. ... Vmware Inc

11/24/16 / #20160342784

Mobile device authentication

A desktop is unlocked or locked using a mobile client device, such as a smart phone, tablet, smart watch, etc. The authentication mechanism of the mobile client device, such as fingerprint, facial recognition, voice recognition, username and password, is leveraged for faster, less-cumbersome user authentication on the desktop. ... Vmware Inc

11/24/16 / #20160342641

Using checksums to reduce the write latency of logging

Techniques for reducing write latency when logging write operations are provided. In one embodiment, a computer system can receive a write operation originating from a storage client, where the write operation is directed to a data object stored on a nonvolatile storage of the computer system. ... Vmware Inc

11/24/16 / #20160342616

Distributed transactions with redo-only write-ahead log

Examples perform transactions across a distributed system of elements, such as nodes, computing devices, objects, and virtual machines. The elements of the distributed system maintain data (e.g, tables) which include information on transactions previously received and the source of the transactions. ... Vmware Inc

11/24/16 / #20160342488

Mechanism for providing virtual machines for use by multiple users

According to one aspect of the invention, a request to generate a state checkpoint of a computer is initiated within a user-level software entity, such as a virtual machine. Upon sensing the request, a checkpointing mechanism generates and stores at least one checkpoint, each checkpoint comprising a representation of the total state of the computer system. ... Vmware Inc

11/24/16 / #20160342468

Maintaining hole boundary information for restoring snapshots from parity

Exemplary methods, apparatuses, and systems maintain hole boundary information by calculating a block attribute parity value. For example, a request is received to write to a first block of a stripe of data. ... Vmware Inc

11/24/16 / #20160342462

Providing end-to-end checksum within a distributed virtual storage area network module

Exemplary methods, apparatuses, and systems include a first layer of a virtual storage area network (vsan) module receiving a write request from a data compute node. The write request includes data to be written and the vsan module is distributed across a plurality of computers to provide an aggregate object store using storage attached to each of the plurality of computers. ... Vmware Inc

11/24/16 / #20160342448

Tracking changes that affect performance of deployed applications

An application monitoring infrastructure that enables application configuration changes on multiple machines across multiple os types to be tracked by identifying data containers that are to be monitored for changes, detecting a change to a monitored data container, and storing data representative of a changed version of the monitored data container responsive to detecting that the monitored container was changed. The data containers that are to be monitored for changes are identified from templates, and a unique template is provisioned for each of the applications.. ... Vmware Inc

11/24/16 / #20160342441

Unified storage/vdi provisioning methodology

Methods, computer-readable storage medium, and systems described herein facilitate provisioning a virtual desktop infrastructure having virtual shared storage. A provisioning manager receives a desktop pool type and provisions virtual shared storage among a cluster of hosts. ... Vmware Inc

11/24/16 / #20160342403

Application management in enterprise environments using cloud-based application recipes

A cloud-based system is described for producing application deltas based on application recipes that identify components of the application deltas using unique identifiers, without the recipe containing all or any content of the actual application. The application recipe can be conveyed to an organization operating on an enterprise network, where the application recipe can be matched with application files in the organization's backup storage containing copies of content of endpoint devices on the network to retrieve components identified by the recipe and produce the application delta for the application. ... Vmware Inc

11/24/16 / #20160342338

Opportunistic asynchronous deduplication using an in-memory cache

Examples perform asynchronous deduplication of storage, such as virtualized or physical disks. Incoming input/output (i/o) commands containing data are subdivided into blocks which are written both to storage and to an in-memory cache. ... Vmware Inc

11/24/16 / #20160342313

Optimizing window move actions for remoted applications

Techniques for optimizing window move actions for a remoted application are provided, where the remoted application has an application window running within a remote desktop of a server system, and where the application window is made accessible to a user of a client system in the form of a client-side application window displayed in a client desktop of the client system. In one embodiment, the client system can receive from the server system a notification that the application window has begun moving in the remote desktop, and can determine that the user is currently entering one or more input commands for moving the client-side application window in the client desktop. ... Vmware Inc

11/17/16 / #20160337476

Managing a virtualized application workspace on a managed computing device

Methods and systems for providing load balancing are provided. Example embodiments provide a application workspace system “aws” which enables users to access remote server-based applications using the same interface that they use to access local applications, without needing to know where the application is being accessed. ... Vmware Inc

11/17/16 / #20160337440

Systems and methods for transmitting data

A server is in communication with a plurality of clients being executed by a host. The server is configured to receive a message from a first client of the plurality of clients. ... Vmware Inc

11/17/16 / #20160337437

Peer-to-peer network download optimization

Distributing an update from a server to multiple endpoint devices that reside on the same local network. The server provides information to each client device identifying all other devices located on the same local network that will also need to receive the update. ... Vmware Inc

11/17/16 / #20160337420

Media acceleration for virtual computing services

Streaming media is problematic for thin clients using remoting protocols like rdp that were never designed to handle the volume of data associated with multimedia. The result is large demands on the host computer and thin client cpu and excessive bandwidth on the network, which results in a poor display quality. ... Vmware Inc

11/17/16 / #20160337226

Method and system that analyzes operational characteristics of multi-tier applications

The current document is directed to an analysis subsystem within a large distributed computing system, such as a virtual data center or cloud-computing facility, that monitors the operational states associated with a multi-tiered application and provides useful information for determining one or more causes of various types of failures and undesirable operational states that may arise during operation of the multi-tiered application. In one implementation, the analysis subsystem collects metrics provided by various different types of metrics sources within the computational system and employs principal feature analysis to select a generally small subset of the collected metrics particularly relevant to monitoring a multi-tiered application and diagnosing underlying causes of operational states of the multi-tiered application. ... Vmware Inc

11/17/16 / #20160335283

Prioritizing backup of endpoint devices in enterprise network environments

A backup system is described for prioritizing backup data in enterprise networks. Messages containing data to be backed up are received at a backup server from endpoint devices and a priority value is determined for each message based on numerous factors, such as the organizational role of the user of the endpoint, the time since last backup, average upload speed, frequency of backups, and other properties. ... Vmware Inc

11/17/16 / #20160334997

Scalable space management using bitmap summary tree

Systems and methods for allocating space in persistent storage are provided. A modified bitmap and a tree of bitmap summary pages are used to manage the free space of a large scale storage system. ... Vmware Inc

11/10/16 / #20160330498

Generating an automated multimedia feed based on customer specific application software running on customer data center/cloud

Techniques for generating multimedia feed based on customer specific application software running on customer datacenters and/or cloud are described. In one example embodiment, a request to dynamically render multimedia feed associated with the customer specific application software is received via a user's multimedia device. ... Vmware Inc

11/10/16 / #20160328683

Calendar based management of information technology (it) tasks

Techniques for providing a calendar based provisioning and management for it administrator/user activities in a virtual datacenter is described. In one example embodiment, an it task is scheduled as a calendar appointment using an at least one registered calendar application residing in a user device. ... Vmware Inc

11/10/16 / #20160328299

Virtual file system with vnode reconstruction capability

A virtual file system and method for performing virtual file system operations uses a vnode descriptor to access a vnode for a vnode operation. If the vnode is not found in a vnode cache using the vnode descriptor, the vnode is reconstructed using information regarding the vnode found outside of the vnode cache using the vnode descriptor.. ... Vmware Inc

11/10/16 / #20160328293

Catastrophic data loss avoidance

Exemplary methods, apparatuses, and systems divide data into a plurality of portions such that the data is recoverable using a subset of the plurality of portions. For each portion of the data, a storage device different than storage devices storing all other portions of the data is selected. ... Vmware Inc

11/10/16 / #20160328247

Methods and apparatus to control a monitoring agent

Methods, apparatus, systems and articles of manufacture to control a monitoring agent. An example method includes instructing, via a processor, a monitoring agent of a compute node to perform a first monitoring operation associated with a first monitoring level. ... Vmware Inc

11/10/16 / #20160328007

Centralized power management with partial suspend mode for distributed storage systems

An example method is provided to perform centralized power management for a distributed storage system accessible by a duster in a virtualized computing environment. The method may comprise a management entity identifying a first host from the duster to enter into a partial suspend mode, and selecting a second host from the cluster to take control of a storage controller of the first host. ... Vmware Inc

11/10/16 / #20160328006

Distributed power management with partial suspend mode for distributed storage systems

An example method is provided to perform distributed power management for a distributed storage system accessible by a cluster in a virtualized computing environment. The method may comprise a first host from the cluster determining to initiate entry into a partial suspend mode and sending a request message to the cluster to take control of a storage controller of the first host. ... Vmware Inc

11/03/16 / #20160323376

Sharing information between appliances over a wan via a distributed p2p protocol

In a non-transitory computer-readable storage medium having instructions embodied therein that when executed cause a computer system to perform a method of sharing information between pre-configured hyper-converged computing devices over a wide area network via a distributed peer-to-peer protocol. The method includes automatically discovering pre-configured hyper-converged computing devices in a local area network, and sharing information between pre-configured hyper-converged computing devices over a wide area network via a distributed peer-to-peer protocol such that there is no single point of failure for the sharing information between the pre-configured hyper-converged computing devices over the wide area network.. ... Vmware Inc

11/03/16 / #20160323375

Appliance for sharing information over a wan via a distributed p2p protocol

A pre-configured hyper-converged computing device for supporting a virtualization infrastructure includes one or more independent server nodes each comprising a cpu, memory, and storage. The device also includes a peer-to-peer communication agent, that when executed, provides peer-to-peer communication between pre-configured hyper-converged computing devices in a wide area network, and enables a federated single sign-on to the wide area network.. ... Vmware Inc

11/03/16 / #20160323372

Resource allocation diagnosis on distributed computer systems

A system and method for performing a resource allocation diagnosis on a distributed computer system includes computing current resource allocation of the distributed computer system using a current snapshot of the distributed computer system. The current snapshot includes configurations and resource usage information of at least some components of the distributed computer system. ... Vmware Inc

11/03/16 / #20160323157

Methods and systems to manage big data in cloud-computing infrastructures

Methods and systems that manage large volumes of metric data generation by cloud-computing infrastructures are described. The cloud-computing infrastructure generates sets of metric data, each set of metric data may represent usage or performance of an application or application module run by the cloud-computing infrastructure or may represent use or performance of cloud-computing resources used by the applications. ... Vmware Inc

11/03/16 / #20160321553

Methods and systems that estimate a degree of abnormality of a complex system

Methods and systems that estimate a degree of abnormality of a complex system based on historical time-series data representative of the complex system's past behavior and using the historical degree of abnormality to determine whether or not a degree of abnormality determined from current time-series data representative of the same complex system's current behavior is worthy of attention. The time-series data may be metric data that represents behavior of a complex system as a result of successive measurements of the complex system made over time or in a time interval. ... Vmware Inc

11/03/16 / #20160321294

Distributed, scalable key-value store

Techniques for implementing a distributed, scalable key-value store (dskvs) across a plurality of nodes are provided. In one embodiment, each node in the plurality of nodes can store: (1) a hash table in a nonvolatile storage of the node, where the hash table is configured to hold a partition of a total set of key-value data maintained by the dskvs; (2) a logical log in the nonvolatile storage, where the logical log is configured to hold transaction log records corresponding to key-value update operations performed on the node; and (3) a cache in a volatile memory of the node, where the cache is configured to hold key-value data that has been recently updated on the node via one or more of the key-value update operations.. ... Vmware Inc

11/03/16 / #20160321151

Protecting virtual machines against storage connectivity failures

A system for monitoring a virtual machine executed on a host. The system includes a processor that receives an indication that a failure caused a storage device to be inaccessible to the virtual machine, the inaccessible storage device impacting an ability of the virtual machine to provide service, and applies a remedy to restore access to the storage device based on a type of the failure.. ... Vmware Inc

11/03/16 / #20160321098

Methods and apparatus to manage monitoring agents

Methods and apparatus to manage a dynamic deployment environment including one or more virtual machines. A disclosed example involves: (a) automatically scanning the virtual machines in the deployment environment to identify a service installed on any of the virtual machines; (b) automatically determining whether the identified service corresponds to a service monitoring rule; (c) when the service corresponds to the service monitoring rule, automatically determining whether a monitoring agent identified by the service monitoring rule is installed on the virtual machines on which the service is installed; (d) when the monitoring agent identified by the service monitoring rule is not installed on the virtual machines on which the service is installed, automatically installing the monitoring agent on the virtual machines on which the service is installed; and (e) when the monitoring agent identified by the service monitoring rule is installed on the virtual machines on which the service is installed, automatically configuring the monitoring agent to monitor the service in accordance with the service monitoring rule on the virtual machines on which the service is installed, wherein (a), (b), (c), (d) and (e) are repeatedly performed without human intervention.. ... Vmware Inc

11/03/16 / #20160320996

Power management for distributed storage systems

An example method is provided to perform power management for a distributed storage system accessible by a cluster in a virtualized computing environment. The method may comprise, in response to detecting that a power-off requirement of a host from the cluster is satisfied, retrieving virtual machine data from a first storage resource of the host, storing the virtual machine data on a second storage resource of the host, and powering off one or more components of the host. ... Vmware Inc

10/27/16 / #20160315908

Method and apparatus for managing mac address generation for virtualized environments

Mac addresses are flexibly and dynamically allocated across groups of devices that need mac addresses. Mac address pools are defined for the groups by non-overlapping ranges of mac addresses. ... Vmware Inc

10/27/16 / #20160315838

Virtual intelligent platform management interface for hardware components

Methods and systems configured to interact with hardware components of a computer system are described. In some embodiments, the system includes a processor and a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions for generating, by a software module executing on the system, an intelligent platform management interface (ipmi) request configured for a controller of the computer system; transmitting, by the software module, the ipmi request to a server separate from the computer system, wherein the server is configured to emulate the controller of the computer system; and receiving, by the software module, an ipmi response from the server, wherein the ipmi response is based on a simulated operating condition of a hardware component of the computer system at the server, thereby obviating a manual adjustment of the hardware component on the computer system.. ... Vmware Inc

10/27/16 / #20160314076

Vm inter-process communication

A method is described for enabling inter-process communication between a first application and a second application, the first application running within a first virtual machine (vm) in a host and the second application running within a second vm in the host, the method includes receiving a request to attach a shared region of memory to a memory allocation, identifying a list of one or more physical memory pages defining the shared region that corresponds to the handle, and mapping guest memory pages corresponding to the allocation to the physical memory pages. The request may be received by a framework from the second application and includes a handle that uniquely identifies the shared region of memory as well as an identification of at least one guest memory page corresponding to the memory allocation.. ... Vmware Inc

10/20/16 / #20160306675

Proactive high availability in a virtualized computer system

A method of managing virtual resources executing on a hardware platform that employs sensors to monitor the health of hardware resources of the hardware platform, includes filtering sensor data from the hardware platform and combining the sensor data with a fault model for the hardware platform to generate a health score, receiving an inventory that maps the virtual resources to the hardware resources of the hardware platform, receiving resource usage data describing use of the hardware resources of the hardware platform by the virtual resources, and generating resource utilization metrics from the resource usage data. The method includes receiving policy data specifying rules applicable to the inventory, determining a set of recommendations for changes to the inventory based on the health score, the resource usage data, and the policy data, and executing at least one recommendation to implement the changes to the inventory.. ... Vmware Inc

10/20/16 / #20160306649

Operating-system exchanges using memory-pointer transfers

An “old” hypervisor is upgraded to or otherwise replaced by a “new” hypervisor without migrating virtual machines to a standby computer. The old hypervisor partitions the computer that it controls between a source partition and a target partition. ... Vmware Inc

10/20/16 / #20160306648

Hypervisor exchange with virtual-machine consolidation

A hypervisor exchange, e.g., an upgrade, can include consolidating resident virtual machines into a single host virtual machine, exchanging an old hypervisor with a new (upgraded) hypervisor, and disassociating the virtual resident virtual machines by migrating them to the new hypervisor. The consolidating can involve migrating the resident virtual machines from the old hypervisor to a guest hypervisor on the host virtual machine. ... Vmware Inc

10/20/16 / #20160306643

Enabling filter-level access to virtual disks

Techniques for enabling filter-level access to a virtual disk (vmdk) are provided. In one set of embodiments, an application can invoke a first application programming interface (api) for opening the vmdk, the invoking of the first api causing an ordered group of filters associated with the vmdk to be instantiated. ... Vmware Inc

10/20/16 / #20160306578

Secure cross-process memory sharing

Techniques for enabling secure cross-process memory sharing are provided. In one set of embodiments, a first user process executing on a computer system can create a memory handle representing a memory space of the first user process. ... Vmware Inc

10/20/16 / #20160306503

Workflow guidance widget with state-indicating buttons

A workflow guidance widget presents rows of buttons. Each button, when triggered, initiates a procedure for completing a respective task. ... Vmware Inc

10/13/16 / #20160299851

Isolating guest code and data using multiple nested page tables

A hypervisor provides a guest operating system with a plurality of protection domains, including a root protection domain and one or more secure protection domains, and mechanisms for controlling the transitions between the protection domains. The guest physical memory region of a secure protection domain, which is mapped to host physical memory by secure nested page tables, stores secure guest code and data, and guest page tables for the secure guest code. ... Vmware Inc

10/13/16 / #20160299708

Cloning virtual machines

A virtual machine system clones a parent virtual machine on a host by creating an open virtualization format (ovf) package of the parent virtual machine, creating a metainfo file of the ovf package, sending the metainfo file to a tracker, and cloning the parent virtual machine to other hosts by accessing the tracker to determine pieces of the ovf packages are located on the host and any of the other hosts, downloading the pieces of the ovf packages to the other hosts, assembling the ovf package on the other hosts, and deploying full clones of the parent virtual machine on the other hosts from the assembled ovf package.. . ... Vmware Inc

10/06/16 / #20160295349

Proximity based authentication using bluetooth

Techniques for securing communications between fixed devices and mobile devices. A mobile device management server mediates communications between the fixed device and mobile device. ... Vmware Inc

10/06/16 / #20160294934

Resource management in distributed computer systems using dispersion rules

A resource management system and method for performing resource management operations in a distributed computer system uses a dispersion rule to try to uniformly disperse clients in a cluster of host computers in the distributed computer system. The dispersion rule is used to compute a dispersion score for at least one candidate distribution of the clients in the cluster of host computers, which is used to select a particular candidate distribution of the clients in the cluster of host computers to disperse the clients.. ... Vmware Inc

10/06/16 / #20160294889

Cloud-based conferencing system

One or more examples provide a method of web conferencing that includes: receiving an initiation request at a management server from a host client device to initiate a scheduled web conference; identifying, in response to the initiation request, an enterprise device located at an enterprise location reserved for the scheduled web conference, the enterprise device communicatively coupled to the management server over a network; and relaying a content stream from the host client device through the management server to the enterprise device over the network for display of the content stream at the enterprise location.. . ... Vmware Inc

10/06/16 / #20160294888

Cloud-based conferencing system

One or more examples provide a method of web conferencing that includes: receiving an initiation request at a management server from a host client device to initiate a scheduled web conference; obtaining, in response to the initiation request, invitation information for the scheduled web conference, the invitation information identifying at least one user, obtaining device information for the at least one user, the device information identifying at least one recipient client device authorized by the management server; and relaying a content stream from the host client device through the management server to the at least one recipient client device for display of the content stream.. . ... Vmware Inc

10/06/16 / #20160294887

Cloud-based conferencing on a mobile device

One or more examples provide a method of attending a scheduled web conference that includes: receiving a notification at a recipient client device authorized by a management server to attend the scheduled web conference; joining the scheduled web conference through a conferencing client application on the recipient client device in response to the notification; receiving a content stream provisioned by the management server at the recipient client device; displaying a live portion of the content stream in a graphical user interface (gui) of the conferencing client application; and displaying a prior portion of the content stream in the gui of the conferencing client application in response to user input received through the gui. Further embodiments include a non-transitory computer-readable storage medium comprising instructions that cause a computer system to carry out the above method above, as well as a computer system configured to carry out the above method.. ... Vmware Inc

10/06/16 / #20160294822

Proximity based authentication using bluetooth

Techniques for securing communications between fixed devices and mobile devices. A mobile device management server mediates communications between the fixed device and mobile device. ... Vmware Inc

10/06/16 / #20160294559

Host-based digital signature verification for guest components

Examples perform external verification of authenticity of software components loaded onto virtual machines (vm). A processor, external to the vm, reads the loaded software component from the vm, and restores the loaded software component to its disk image state by undoing any changes made to load the software component. ... Vmware Inc

10/06/16 / #20160292579

System and method for navigating multi-dimensional decision trees using acceptable alternate nodes

A decision tree analysis system and method for navigating a multi-dimensional decision tree uses acceptable alternative child nodes of a target child node to select an end child node for a parent node, where the parent node and the final child node define a single step of a navigation path for the multi-dimensional decision tree. The acceptable alternative child nodes are based on an acceptance delta parameter for a particular attribute, which defines a value range about an attribute value of the target child node within which a child node is determined to be an acceptable alternative child node of the target child node.. ... Vmware Inc

10/06/16 / #20160292193

Federated cloud storage system

User storage is attached to a central storage management system when the central storage management system receives a request to attach a cloud-based user storage thereto. The central storage management system accesses the cloud-based user storage and determines a set of objects stored therein. ... Vmware Inc

10/06/16 / #20160292053

Fault tolerance for hybrid cloud deployments

A technique for providing fault tolerance for virtual machines in a hybrid cloud computing system is discussed. When a primary virtual machine (vm) in a private data center is configured for fault tolerance, a secondary vm is instantiated in a public cloud computing system. ... Vmware Inc

10/06/16 / #20160291999

Spanned distributed virtual switch

Techniques for centralized management of network switch operations across multiple virtualization platforms via a “spanned distributed virtual switch.” these techniques generally include creating a distributed virtual switch for each virtual platform that participates in the spanned distributed virtual switch, configuring each such distributed virtual switch with a mutually exclusive set of ports, configuring each distributed virtual switch with network configuration information for associated sets of ports, and synchronizing the network configuration information across distributed virtual switches. When configuration information changes in one distributed virtual switch, those changes are synchronized across other distributed virtual switches that participate in the spanned distributed virtual switch. ... Vmware Inc

10/06/16 / #20160291986

Exposing memory-mapped io devices to drivers through firmware

A mapping table is passed to system software upon loading of the system software in a computer system. The mapping table is generated from a user-defined configuration file and maps device identifiers of various devices implemented in the computer system, as assigned by the device manufacturers, to device identifiers that are recognizable by the system software. ... Vmware Inc

09/29/16 / #20160285956

Using off-screen user interface data during remote sessions

Systems and techniques are described for remoting application user interfaces. One of the described techniques includes receiving, by a remote application system, a first user request to access an application from a user device; initiating, by the remote application system, a remote session with the user device that allows user interfaces generated by the application to be presented on the user device and user events associated with the presented user interfaces to be provided as input to the application; during the remote session with the user device; obtaining off-screen user interface data; providing the off-screen user interface data for storage on the user device; receiving data identifying a first user event from the user device; determining that the first user event triggers presentation of the off-screen user interface data stored on the user device; and providing instructions to the user device to present the off-screen user interface data.. ... Vmware Inc

09/29/16 / #20160285783

Methods and apparatus to control computing resource utilization of monitoring agents

Methods, apparatus, systems and articles of manufacture to control computing resource utilization of monitoring agents. An example method includes instructing a monitoring agent of a compute node to perform a first monitoring operation associated with a first monitoring level. ... Vmware Inc

09/29/16 / #20160283513

Offline management of virtualization software installed on a host computer

In an example, a method of managing virtualization software installed on a host computer includes connecting to a platform management system in the host computer while a hardware platform in the host computer is in a low-power state; and accessing files of the virtualization software on a storage device in the platform management system through a distributed file system service executing on a controller of the platform management system.. . ... Vmware Inc

09/29/16 / #20160283301

Detecting x86 cpu register corruption from kernel crash dumps

Discovering a hardware failure in a processor is disclosed. When an operating system or application fails, a function containing the instruction that failed along with the register set of the cpu at the failure is recorded. ... Vmware Inc

09/29/16 / #20160283281

Replication of a virtualized computing environment to a computing system with offline hosts

In an example, a method of replication between computing systems includes replicating virtual machine files from primary storage in a primary computing system to secondary storage in a secondary computing system. The virtual machine files implement a plurality of virtual machines in the primary computing system and a plurality of replica virtual machines in the secondary computing system. ... Vmware Inc

09/29/16 / #20160283257

Parallelized virtual machine configuration

Techniques for facilitating parallelized configuration of multiple virtual machines. The techniques include duplicating commands received from an administrator and controlling the multiple virtual machines with those commands in a parallel manner. ... Vmware Inc

09/29/16 / #20160283222

Application user interface overlays for application lifecycle management

Example application user interface overlays for application lifecycle management are disclosed. Some example methods for application lifecycle management disclosed herein include activating a client to present an overlay over a user interface of an application, the overlay identifying an element of the user interface for which application lifecycle management data associated with the application is available for presentation. ... Vmware Inc

09/29/16 / #20160283070

Using reactive behaviors during remote sessions

Systems and techniques are described for remoting application user interfaces. One of the described techniques includes initiating, by a user device, a remote session with a remote application system; during the remote session with the remote application system: receiving, by the user device, reactive behavior data; determining, by the user device, that a particular trigger condition of the one or more trigger conditions has been satisfied; and in response to determining that the particular trigger condition has been satisfied, generating, by the user device, user interface updates by sampling from a user interface function associated with the particular trigger condition and updating a user interface generated by the application being displayed by the user device using the user interface updates.. ... Vmware Inc

09/22/16 / #20160277470

Video stream management for remote graphical user interfaces

Embodiments enable display updates other than a video stream in a graphical user interface (gui) to be rendered, encoded, and transmitted exclusive of the video stream. A virtual machine generates a gui that includes an encoded video stream and other display updates. ... Vmware Inc

09/22/16 / #20160277268

Probability-distribution-based log-file analysis

The current document is directed to systems, and methods incorporated within the systems, that carry out probability-distribution-based analysis of log-file entries. A monitoring subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to detect changes in the state of the distributed computer system. ... Vmware Inc

09/22/16 / #20160277152

Method and system for robust message retransmission

Techniques are disclosed for message retransmission. In one embodiment, an agent in a distributed system that receives and/or relays messages from a master node identifies messages that have not been successfully delivered, and adds a stub for each such message to a message queue. ... Vmware Inc

09/22/16 / #20160275412

System and method for reducing state space in reinforced learning by using decision tree classification

An automatic scaling system and method for reducing state space in reinforced learning for automatic scaling of a multi-tier application uses a state decision tree that is updated with new states of the multi-tier application. When a new state of the multi-tier application is received, the new state is placed in an existing node of the state decision tree only if a first attribute of the new state is same as a first attribute of any state contained in the existing node and a second attribute of the new state is sufficiently similar to a second attribute of each existing state contained in the existing node based on a similarity measurement of the second attribute of each state contained in the existing node with the second attribute of the new state.. ... Vmware Inc

09/22/16 / #20160275306

Securing virtual machine data

One embodiment of the present invention is a method including: (a) representing virtual primary disk data and state data of a virtual machine in a unit of storage; (b) exposing the virtual primary disk data of the virtual machine to a guest of the virtual machine to allow the guest to access the virtual primary disk data; and (c) preventing the guest from accessing the state data for the virtual machine.. . ... Vmware Inc

09/22/16 / #20160275101

Virtual-log-file method and system

The current document is directed to a virtual-log-file system that provides a browser-like display interface to users, enabling users to view the contents of log files. The virtual-log-file system assembles a virtual log file from the contents of one or more physical log files, applying filters and other processing to physical-log-file entries in order to generate the virtual-log-file entries logically contained within the virtual log file. ... Vmware Inc

09/22/16 / #20160275063

Transforming html forms into mobile native forms

Techniques disclosed herein provide access to a markup document form. A user interface virtualization (uiv) agent identifies name fields and input fields in rows of the markup document form. ... Vmware Inc

09/22/16 / #20160274959

Key input processing in virtualized computing environment

An example method is provided to process an input in a virtualized computing environment. The virtualized computing environment may include a physical machine running a host operating system and a virtualization software with one or more virtual machines. ... Vmware Inc

09/22/16 / #20160274934

Virtual machine migration

A source virtual machine (vm) hosted on a source server is migrated to a destination vm on a destination server without first powering down the source vm. After optional pre-copying of the source vm's memory to the destination vm, the source vm is suspended and its non-memory state is transferred to the destination vm; the destination vm is then resumed from the transferred state. ... Vmware Inc

09/15/16 / #20160269475

Multi-tenant-cloud-aggregation and application-support system

The present application is directed to a distributed system that provides multi-cloud aggregation and that includes a cloud-connector server, cloud-connector nodes, and one or more service-provider nodes that cooperate to provide services that are distributed across multiple clouds. A service-provider node obtains tenant-associated information from a virtual data center in which the service-provider node is installed and provides the tenant-associated information to the cloud-connector server.. ... Vmware Inc

09/15/16 / #20160269318

Network bandwidth reservations for system traffic and virtual computing instances

Virtual computing instances are provisioned with network resource allocation constraints, which may include hard constraints that must be met in order for the virtual computing instances to be created in a host server. Network resources from multiple hosts may be pooled in a virtual switch, and a cloud management system (cms) may ensure that a network bandwidth reservation for a new virtual computing instance can be accommodated by network bandwidth in the pool that is reserved for communication endpoint traffic. ... Vmware Inc

09/15/16 / #20160269252

System and method for performing a service discovery for virtual networks

A system and method for performing a service discovery on a distributed computer system includes obtaining information of a service that is provided by a host computer in the distributed computer system and embedding the information into a link layer discovery protocol (lldp) data frame to be transmitted from the host computer to another component of the distributed computer system.. . ... Vmware Inc

09/15/16 / #20160267104

Updating a file using differences and file format therefor

A method for updating and formatting a local file is described. An update file, having a newer version of the local file, is accessed from a server over a network and a list of new hash values corresponding to data blocks of the update file is retrieved. ... Vmware Inc

09/15/16 / #20160266945

Runtime emulating static thread local storage of portable executable software code

A computer readable storage medium containing a program which, when executed by a processor, performs an operation of emulating static thread local storage of an executable software code at runtime, is disclosed. The operation includes executing the executable software code within a process memory space. ... Vmware Inc

09/15/16 / #20160266921

Virtual appliance management in a virtualized computing environment

An example method to manage a virtual appliance in a virtualized computing environment may comprise obtaining, by a computing system, data relating to the virtual appliance that specifies a virtual machine implementing a software application. The method may also comprise configuring, by the computing system, an operational mode for the virtual machine to customize the virtual appliance for deployment. ... Vmware Inc

09/15/16 / #20160266920

Calculating a performance metric of a cluster in a virtualization infrastructure

In a computer-implemented method for calculating a performance metric of a cluster of hosts in a virtualization infrastructure a performance metric of each of a plurality of virtual machines in said virtualization infrastructure is accessing by a centralized management application of a virtualization infrastructure. The virtualization infrastructure comprises a plurality of hosts supporting the plurality of virtual machines. ... Vmware Inc

09/15/16 / #20160266884

Method and system for network-less guest os and software provisioning

Techniques are disclosed for network-less provisioning of guest operating system and software. In one embodiment, a monitor process mounts a floppy image or iso storing a deployment tool on a virtual cd/dvd device or virtual floppy device, respectively, of a vm and powers on the vm. ... Vmware Inc

09/15/16 / #20160266842

Multi-level snapshot caching

A method for processing a read request comprises intercepting a read request that includes a logical block address (lba) of the storage device by an io filter driver and retrieving a disk identifier (id) associated with the lba from a metadata file associated with the storage device. The method further comprises sending the lba and the disk id to a daemon configured to read and write to a cache. ... Vmware Inc

09/15/16 / #20160266800

Collaborative release of a virtual disk

A method for opening a virtual disk comprises reading information from a metadata file that identifies the current owner of the virtual disk. The method further includes sending a release request to the current owner of the virtual disk to release the virtual disk, writing information to the metadata file identifying the new owner, and then opening the virtual disk.. ... Vmware Inc

09/15/16 / #20160266630

Computing a unit rate of power consumed in a data center

A power distribution unit having a power supply inputs including mains, secondary, generator, and renewable can be configured to measure how much power is drawn from each of the power supply inputs over a time period and to provide data to a unit rate of power engine indicating the same. A cost information engine can be configured to provide cost information, applicable over the time period, for each of the power supply inputs to the unit rate of power engine. ... Vmware Inc

09/08/16 / #20160261671

Local operation of remotely executed applications

Systems and techniques are described for executing an application locally. A described technique includes providing, by a user device and to a remote application system, data identifying user events associated with the application while data communication is available between a user device and a remote application system executing an application. ... Vmware Inc

09/08/16 / #20160259713

Method and system for determining functional tests to execute based on code coverage

Techniques are disclosed for automatically determining tests to run on source code based on code coverage. In one embodiment, an extensible system takes as input a configuration file having pointers to an ip address of a server where tests are being run and a type of code coverage instrumentation. ... Vmware Inc

09/08/16 / #20160259665

Methods and apparatus to select virtualization environments for migration

Methods and apparatus to select virtualization environments are disclosed. An example method includes determining, via a processor, characteristics of a virtualized application that is deployed in an existing virtualization environment, analyzing, via the processor, the characteristics of the virtualized application to select a subset of virtualization environments that are capable of executing the virtualized application, the subset of virtualization environments selected from a set of virtualization environments of different virtualization environment types used in the datacenter, comparing, via the processor, the characteristics of the virtualized application to the virtualization environments of the subset of virtualization environments to determine scores for the virtualization environments, and migrate the virtualized application from the existing virtualization environment to a new virtualization environment based on the scores.. ... Vmware Inc

09/08/16 / #20160259660

Methods and apparatus to select virtualization environments during deployment

Methods and apparatus to select virtualization environments are disclosed. An example method includes determining, via a processor, characteristics of a virtualized application that is awaiting deployment, analyzing, via the processor, the characteristics of the virtualized application to select a subset of virtualization environments that are capable of executing the virtualized application, the subset of virtualization environments selected from a set of virtualization environments of different virtualization environment types used in the datacenter, comparing, via the processor, the characteristics of the virtualized application to the virtualization environments of the subset of virtualization environments to determine scores for the virtualization environments, and deploying the virtualized application in the virtualization environment based on the scores.. ... Vmware Inc

09/01/16 / #20160255400

Remote display performance measurement triggered by application display upgrade

Methods, systems, and computer programs are provided for measuring the performance of display images received on a remote computer display. One method includes an operation for detecting calls from an application to an application programming interface (api), which is provided for rendering images on a display image, each call causing an update of the display image. ... Vmware Inc

09/01/16 / #20160253370

Hyperlink-induced topic search algorithm lock analysis

A system is described for identifying key lock contention issues in computing devices. A computing device is executed and lock contention information relating to operations during execution of the computing device is recorded. ... Vmware Inc

09/01/16 / #20160253369

Graphical lock analysis

A system is described for identifying key lock contention issues in computing devices. A computing device is executed and lock contention information relating to operations during execution of the computing device is recorded. ... Vmware Inc

09/01/16 / #20160253221

Pagerank algorithm lock analysis

A system is described for identifying key lock contention issues in computing devices. A computing device is executed and lock contention information relating to operations during execution of the computing device is recorded. ... Vmware Inc

09/01/16 / #20160253201

Saving and restoring state information for virtualized computer systems

Methods and apparatus for saving and/or restoring state information for virtualized computing systems are described. An example apparatus includes a physical memory and a virtual machine monitor to: in response to a request to suspend operation of a virtual machine, place a trace on a memory page in the physical memory to detect at least one of a read access or a write access that occurs when state information of the virtual machine is saved in response to the request, the memory page associated with virtual memory hosted by the virtual machine, while the virtual machine continues to operate after the request, initiate storing of the virtual memory of the virtual machine, and in response to a trigger of the trace, store an indication that the memory page is an active memory page.. ... Vmware Inc

09/01/16 / #20160253192

Dynamic host performance tuning of a network stack

A tuning engine for a virtualized computing system is described that periodically collect performance metrics from the virtualized computing system, and detects whether a change in system state has occurred based on the collected metrics. The tuning engine may determine whether the virtualized computing system is densely virtualized, and accordingly modify operations and configuration settings of various components in charge of handling networking for the virtualized computing system.. ... Vmware Inc

09/01/16 / #20160253167

Desktop image management for virtual desktops

A desktop image management system is described that can efficiently distribute updates to virtual desktops running on host servers in a data center. The system is comprised of a central server and multiple agents, each agent installed on a virtual machine. ... Vmware Inc

08/25/16 / #20160248838

Remoting an application user interface from a user device to another display

Systems and techniques are described for remoting a user interface. A described technique includes receiving, at a user device, a user request to use a display of a display device to access an application. ... Vmware Inc

08/25/16 / #20160246787

Image cache collaboration between clients in remote desktop environments

Image cache collaboration is described to enable multiple clients to share image data in a remote desktop environment. A centralized cache manager maintains information about all image caches on all client devices which have established connections to the server. ... Vmware Inc

08/25/16 / #20160246706

Generating test cases

Systems and techniques are described for generating test cases. A described technique includes monitoring a manual test of a code portion. ... Vmware Inc

08/25/16 / #20160246701

Discovery of code paths

Systems and techniques are described for tracking software code paths. A described technique includes receiving a first log of stack traces that includes a respective stack trace for each of a plurality of calls to access any of a plurality of data objects created during a first execution of an application, generating, for each of the stack traces in the first log, a script for a respective probe that identifies the data object accessed by the call corresponding to the stack trace, a respective instruction called to access the data object, and whether the access is a read or a write access for the data object, generating, for at least one of the probes, a second log that identifies the data object for the respective probe and the data stored in the data object, and generating a representation of the execution of the application using the second log.. ... Vmware Inc

08/25/16 / #20160246586

Methods and apparatus to manage application updates in a cloud environment

Methods, apparatus, and systems to manage application updates in a cloud environment are disclosed. Disclosed example methods include determining that a collector in a collector bank is available to process a task, the task to at least one of request an application version or request an application update and sending, the task from a task queue to the collector to determine which compute node is to execute the task. ... Vmware Inc

08/25/16 / #20160246533

Resource allocation in computers

A method and tangible medium embodying code for allocating resource units of an allocatable resource among a plurality of clients in a computer is described. In the method, resource units are initially distributed among the clients by assigning to each of the clients a nominal share of the allocatable resource. ... Vmware Inc

08/25/16 / #20160246503

Transparent host-side caching of virtual disks located on shared storage

Techniques for using a cache to accelerate virtual machine (vm) i/o are provided. In one embodiment, a host system can intercept an i/o request from a vm running on the host system, where the i/o request is directed to a virtual disk residing on a shared storage device. ... Vmware Inc

08/18/16 / #20160241592

Identification of trusted websites

This document describes techniques for identifying trusted websites. In one embodiment, a computer system can receive a request from user to access a website and a private image and a public image wherein the public image and the private image are associated with a user account that enables the user to access the website. ... Vmware Inc

08/18/16 / #20160241448

Common run-time design-time environment

The present disclosure is related to methods, systems, and machine-readable media for a common run-time design-time environment. That a user has design credentials associated with a website can be confirmed. ... Vmware Inc

08/18/16 / #20160239339

Secure identification of execution contexts

A virtual-machine-based system that identifies an application or process in a virtual machine in order to locate resources associated with the identified application. Access to the located resources is then controlled based on a context of the identified application. ... Vmware Inc

08/11/16 / #20160234296

Synchronization optimization based upon allocation data

Exemplary methods, apparatuses, and systems transmit a request to a destination site for information indicating whether or not each of a plurality of regions of a destination logical storage device is allocated. Each of the corresponding regions of a source logical storage device is determined to be either allocated or unallocated. ... Vmware Inc

08/11/16 / #20160234161

Multi-subnet participation for network gateway in a cloud environment

A network management server allocates network addresses to a network gateway connected to a public network after receiving an allocation request that specifies a number of network addresses to allocate to the network gateway. The network management server determines a first and second subnets of the public network ha mg respectively, first and second pools of available network addresses capable of being allocated to devices on the public network, and allocates one or more available network addresses from the first and second pools to the network gateway.. ... Vmware Inc

08/04/16 / #20160226946

Streaming progress updates and results of rest api operations

One or more examples provide a method of performing a rest api operation at a server computing system includes receiving a request of a hypertext transfer protocol (http) session from a client computing system. The request includes data for requesting performance of the rest api operation and issuance of progress updates. ... Vmware Inc

08/04/16 / #20160226776

Data transmission using modified weighted fair queue algorithm

To transmit data packets over a shared data path, data packets of a first message and a second message are received and stored, respectively, in first and second queues. First and second data packets are then extracted from, respectively, the first and second messages. ... Vmware Inc

08/04/16 / #20160226678

Method and system for virtual and physical network integration

The disclosure herein describes a virtual extensible local area network (vxlan) gateway. During operation, the vxlan gateway receives, from a physical host, an ethernet packet destined for a virtual machine residing in a remote layer-2 network broadcast domain that is different from a local layer-2 network broadcast domain where the physical host resides. ... Vmware Inc

08/04/16 / #20160224789

System and method for hypervisor-based security

Aspects of the present invention include hypervisor based security using a hypervisor to monitor a vm. In embodiments of the present invention, the information gathered by the hypervisor in the monitoring is compared against a reference image to determine if there are possible rootkits present on the vm. ... Vmware Inc

08/04/16 / #20160224572

System and method for converting a physical disk to a virtual disk

A method for converting a disk of a physical computer into a virtual disk for use by a virtual machine is described. Contents of the disk of the physical computer are copied into an image file, wherein the image file has a different sector-by-sector organization of the contents than the disk but a logically equivalent file system organization. ... Vmware Inc

08/04/16 / #20160224395

Systems and methods for finding solutions in distributed load balancing

Systems and methods for finding solutions exhaustively in distributed load balancing are provided. A plurality of virtual machines (vms) is in communication with a virtual machine management server (vmms). ... Vmware Inc

08/04/16 / #20160224371

Virtual machine group migration

A plurality of virtual machines (vms) is migrated from a source group to a destination group in such as way as to achieve consistency and either availability or group preservation. Execution of vms in the source group is selectively delayed during state migration so that memory transfer of all the vms in the group will converge roughly at the same time. ... Vmware Inc

08/04/16 / #20160224370

Virtual machine monitor configured to support latency sensitive virtual machines

A host computer has a virtualization software that supports execution of a plurality of virtual machines, where the virtualization software includes a virtual machine monitor for each of the virtual machines, and where each virtual machine monitor emulates a virtual central processing unit (cpu) for a corresponding virtual machine. A virtual machine monitor halts execution of a virtual cpu of a virtual machine by receiving a first halt instruction from a corresponding virtual machine and determining whether the virtual machine is latency sensitive. ... Vmware Inc

08/04/16 / #20160224368

Methods and systems for converting a related group of physical machines to virtual machines

A method for processing virtualization of computers that are part of a group into virtual computers is provided. The method includes obtaining relationship data from the computers, where the relationship data identifies parameters used to communicate within the group. ... Vmware Inc

08/04/16 / #20160224367

Method and system for migration of virtual machines and virtual applications between cloud-computing facilities

The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing ip and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate.. ... Vmware Inc

08/04/16 / #20160224249

Host-based replication with end-to-end compression

Techniques for enabling end-to-end compression when performing host-based replication (hbr) are provided. In one set of embodiments, a hypervisor running on a host system at a primary site can intercept i/o write requests that originate from a virtual machine (vm) configured to be replicated via hbr, the i/o write requests being destined for a virtual disk (vmdk) of the vm. ... Vmware Inc

07/28/16 / #20160219084

Establishing streaming sessions during remote sessions

Systems and techniques are described for remoting application user interfaces. One of the described techniques includes initiating a remote session with a first user device that allows user interfaces generated by an application to be presented on the first user device and user events associated with the presented user interfaces to be provided as input to the application; and during the remote session with the first user device: receiving a request to initiate a multimedia streaming session between the first user device and a different system through the application; establishing the multimedia streaming session with the different system; and providing the streaming session parameters to the first user device for use by the first user device in establishing a connection between the first user device and the different system and streaming multimedia content over the connection.. ... Vmware Inc

07/28/16 / #20160218994

Distributed demand-based storage quality of service management using resource pooling

A system and method for providing quality of service (qos) for clients running on host computers to access a common resource uses a resource pool module and a local scheduler in at least one of the host computers. The resource pool module operates to compute an entitlement of each client for the common resource based on a current capacity for the common resource and demands of the clients for the common resource. ... Vmware Inc

07/28/16 / #20160218972

Media access control (mac) address table protection in a virtualized computing environment

An example method is provided for a network device to protect a media access control (mac) address table of a network switch in a virtualized computing environment. The method may comprise, in response to receiving a request message from a virtual machine, determining a shared mac address that is usable for the virtual machine and at least one other virtual machine, modifying a source mac address of the request message from a mac address associated with the virtual machine to the shared mac address; and sending, to the network switch, the request message having the shared mac address as the modified source mac address. ... Vmware Inc

07/28/16 / #20160217001

Provisioning customized virtual machines without rebooting

Embodiments provision and customize virtual machines (vms), such as desktop vms, without rebooting the desktop vms. In response to a request to provision the vms, a computing device creates a clone vm from a parent vm template identified in the request. ... Vmware Inc

07/28/16 / #20160216992

Hypervisor remedial action for a virtual machine in response to an error message from the virtual machine

Exemplary methods, apparatuses, and systems include a hypervisor receiving an error message from an agent within a first virtual machine run by the hypervisor. In response to the error message, the hypervisor determines and initiates a corrective action for the hypervisor to take in response to the error message. ... Vmware Inc

07/28/16 / #20160216860

User interface virtualization techniques

User interface virtualization describes a technique for providing a user with access to one computing device from another computing device, while translating the ergonomics of one computer's user interface style into the ergonomics of the other's. An agent running on a remote desktop exchanges metadata and input events with a corresponding client running on a client device that accepts a “touch and swipe” style input. ... Vmware Inc

07/21/16 / #20160212064

Transformation of discrete service events into continuous, periodic data for metering and billing of cloud services

A cloud computing system includes services that provide virtual cloud computing resources. The service publishes service events that are transformed into periodic rating data as per centralized, pluggable, service-specific business rules. ... Vmware Inc

07/21/16 / #20160210141

Hot-swapping operating systems using inter-partition application migration

In a process for hot-swapping operating systems, an original operating system (os) instance is executing on and controlling hardware of a computer. The original os instance generates updated launch code that defines a division of the hardware into a source logical partition and a target logical partition. ... Vmware Inc

07/14/16 / #20160205088

Transferring web-application prerequisite files while authentication interface occludes web-application interface

A web browser sends to a web-application server a request to access a web application. The web server transmits to the web browser a parent document with an inline frame (iframe) containing a uniform resource locator (url) to an authentication location. ... Vmware Inc

07/14/16 / #20160203528

Method and system that allocates virtual network cost in a software-defined data center

The present disclosure describes methods and systems that allocate costs of deploying and operating a virtual network to tenants that use the virtual network. In one implementation, costs are allocated to tenant virtual machines (“vms”) by determining a network bandwidth of a virtual network, determining a common cost of operating the virtual network, determining a service capacity for each network service provided by the virtual network, and determining a service cost for each network service. ... Vmware Inc

07/14/16 / #20160203424

Information technology cost calculation in a software defined data center

The present disclosure is related to methods, systems, and machine-readable media for information technology (it) cost calculation in a software defined data center. A cost of infrastructure it objects in a software defined data center can be calculated. ... Vmware Inc

07/14/16 / #20160203064

Proactive resource reservation for protecting virtual machines

A system for proactive resource reservation for protecting virtual machines. The system includes a cluster of hosts, wherein the cluster of hosts includes a master host, a first slave host, and one or more other slave hosts, and wherein the first slave host executes one or more virtual machines thereon. ... Vmware Inc

07/14/16 / #20160203060

Client deployment with disaster recovery considerations

A system and method for deploying clients at a target site with disaster recovery considerations uses recovery profiles with multiple recovery parameter settings, which can be associated with a client to be deployed. The recovery profile associated with the client is used to automatically initiate a recovery-related operation for the client using a recovery parameter setting defined in the recovery profile associated with the client.. ... Vmware Inc

07/07/16 / #20160197823

Reverse path maximum transmission unit (pmtu) discovery

An example method is provided for a first device to perform reverse path maximum transmission unit (pmtu) discovery in a communications network. The method may comprise receiving multiple fragments of a packet sent by a second device via a path from the second device to the first device in the communications network. ... Vmware Inc

07/07/16 / #20160196159

Adaptive dynamic selection and application of multiple virtualization techniques

Autonomous selection between multiple virtualization techniques implemented in a virtualization layer of a virtualized computer system. The virtual machine monitor implements multiple virtualization support processors that each provide for the comprehensive handling of potential virtualization exceptions. ... Vmware Inc

07/07/16 / #20160196158

Live migration of virtual machines across virtual switches in virtual infrastructure

Techniques are described for migrating virtual machines (vms) across virtual switches. To migrate a vm, a destination distributed virtual switch module may, prior to migration, instantiate a distributed virtual port on a destination vm host and reserve the distributed virtual port for each virtual network adapter of the vm. ... Vmware Inc

06/16/16 / #20160173379

Fast software l2 switching using a caching technique

In a system that includes a physical forwarding element (pfe), the mapping of each possible destination mac address to a destination port number of the pfe is stored in a mapping table. A destination port number on the pfe is identified for a first packet in a sequence of packets arrived at a source port of the pfe by searching the mapping table and stores the destination port number in a caching table. ... Vmware Inc

06/16/16 / #20160170912

Safely discovering secure monitors and hypervisor implementations in systems operable at multiple hierarchical privilege levels

In a computer system operable at multiple hierarchical privilege levels, a “wait-for-event” (wfe) communication channel between components operating at different privilege levels is established. Initially, a central processing unit (cpu) is configured to to “trap” wfe instructions issued by a client, such as an operating system, operating at one privilege level to an agent, such as a hypervisor, operating at a more privileged level. ... Vmware Inc

06/16/16 / #20160170906

Identification of page sharing opportunities within large pages

Memory performance in a computer system that implements large page mapping is improved even when memory is scarce by identifying page sharing opportunities within the large pages at the granularity of small pages and breaking up the large pages so that small pages within the large page can be freed up through page sharing. In addition, the number of small page sharing opportunities within the large pages can be used to estimate the total amount of memory that could be reclaimed through page sharing.. ... Vmware Inc

06/16/16 / #20160170816

Creating a communication channel between different privilege levels using wait-for-event instruction in systems operable at multiple hierarchical privilege levels

In a computer system operable at multiple hierarchical privilege levels, a “wait-for-event” (wfe) communication channel between components operating at different privilege levels is established. Initially, a central processing unit (cpu) is configured to to “trap” wfe instructions issued by a client, such as an operating system, operating at one privilege level to an agent, such as a hypervisor, operating at a more privileged level. ... Vmware Inc

06/16/16 / #20160170809

Executing a multicomponent software application on a virtualized computer platform

A virtualized computer platform is established and maintained by virtualization software on one or more physical computers. A multicomponent software application may execute on the virtualized computer platform, with different components of the application executing in different virtual machines, which are supported by the virtualization software. ... Vmware Inc

06/16/16 / #20160170788

Handling disk state inheritance for forked virtual machines

Techniques for handling inheritance of disk state when forking virtual machines (vms) are provided. In one embodiment, a computer system can receive a request to fork a child vm from a parent vm. ... Vmware Inc

06/16/16 / #20160170786

Dynamically managing a serial port interface of virtualization software

One or more examples provide techniques to dynamically manage serial port interface(s) of virtualization software executing in a host device. In an example, a method of managing a serial port interface of a virtualization software executing on a host device includes: receiving input characters through the serial port interface to a serial port of the host device; parsing the input characters to detect a character sequence; and connecting the serial port interface to a first service executing in the virtualization software in response to the character sequence and during execution of the virtualization software on the host device.. ... Vmware Inc

06/16/16 / #20160170679

Secondary cpu mmu initialization using page fault exception

In a computer system with multiple central processing units (cpus), initialization of a memory management unit (mmu) for a secondary cpu is performed using an exception generated by the mmu. In general, this technique leverages the exception handling features of the secondary cpu to switch the cpu from executing secondary cpu initialization code with the mmu “off” to executing secondary cpu initialization code with the mmu “on.” advantageously, in contrast to conventional techniques for mmu initialization, this exception-based technique does not require identity mapping of the secondary cpu initialization code to ensure proper execution of the secondary cpu initialization code.. ... Vmware Inc

06/16/16 / #20160170476

Energy management of a computing deployment with guaranteed end-to-end performance

Techniques for managing energy use of a computing deployment are provided. In one embodiment, a computer system can establish a performance model for one or more components of the computing deployment, where the performance model models a relationship between one or more tunable parameters of the one or more components and an end-to-end performance metric, and where the end-to-end performance metric reflects user-observable performance of a service provided by the computing deployment. ... Vmware Inc

06/16/16 / #20160170462

Resource capacity management in a cluster of host computers using power management analysis

A resource management system and method for performing resource capacity management in a cluster of host computers uses a snapshot of the cluster with one or more ghost host computers added to the cluster to execute a power management analysis. A ghost host computer is a fictitious construct based on a physical host computer. ... Vmware Inc

06/09/16 / #20160164953

Runtime generation of application programming interfaces for remote procedure call services

An application specific interface (api) for a service that is accessible by remote procedure calls is generated at run-time from an interface language definitions file. In operation, a client application requests a connection to a server and then a runtime api generator connects to the server and downloads an interface definition language (idl) file that defines services provided by the server. ... Vmware Inc

06/09/16 / #20160162699

Optimized encryption filtering of files

Read data blocks are selectively decrypted and write data bocks are selectively encrypted in an input-output path between an application and a file system driver. If a read data block contains all zeroes, the read data block is not decrypted even though the read data block is a block of an encrypted file. ... Vmware Inc

06/09/16 / #20160162685

Monitoring application execution in a clone of a virtual computing instance for application whitelisting

In a virtualized computer system, gray applications that are selected to be executed in a first virtual computing instance are executed and monitored in a second virtual computing instance that is a clone of the first virtual computing instance, and classified according to their monitored behavior. This process is conducted in real-time, in response to a notification that a gray application has been selected for execution in the first virtual computing instance. ... Vmware Inc

06/09/16 / #20160162338

Methods and systems that allocate cost of cluster resources in virtual data centers

This disclosure presents computational systems and methods that allocate cost of resources of a cluster of server computers used by virtual machines in a virtual data center. In one aspect, a fair unit rate is computed based on the larger of a measured average utilization or an expected utilization of a cluster resource of server computers within a physical data center by virtual machines. ... Vmware Inc

06/09/16 / #20160162336

Cpu scheduler configured to support latency sensitive virtual machines

A host computer has one or more physical central processing units (cpus) that support the execution of a plurality of containers, where the containers each include one or more processes. Each process of a container is assigned to execute exclusively on a corresponding physical cpu when the corresponding container is determined to be latency sensitive. ... Vmware Inc

06/09/16 / #20160162319

Interposition method suitable for hardware-assisted virtual machine

One embodiment of the present invention is a method of interposing operations in a computational system that includes a virtualization system executable on an underlying hardware processor that natively supports one or more instructions that transition between host and guest execution modes. The method includes introducing a hooked vector into a supervisor register block of the hardware processor, wherein the hooked vector displaces a system call handler vector otherwise set by a guest computation; read and write protecting at least the hooked vector containing portion of the supervisor register block; initiating execution of a code sequence of the guest computation on the hardware processor using one of the instructions that transition between the host and guest execution modes thereof, wherein the code sequence includes a system call and wherein upon initiation of the system call, the hardware processor transfers execution to a substitute handler in accordance with the hooked vector; and responsive to execution of the substitute handler, initiating a hooked operation and transferring control to the guest system call handler.. ... Vmware Inc

06/09/16 / #20160162315

Allocating cost of disk usage to a linked clone virtual machine based on a parameter of usage

The present disclosure is related to methods, systems, and machine-readable media for allocating cost of disk usage to a linked clone virtual machine (vm) based on a parameter of usage. A determination can be made as to a number of disks used by a linked clone vm among a plurality of disks in a software defined data center over a time period and as to a respective portion of a parameter of usage for each of the number of disks used by the linked clone vm over the time period that is attributable to the linked clone vm. ... Vmware Inc

06/09/16 / #20160162314

Allocating cost of disk usage to a linked clone virtual machine

The present disclosure is related to methods, systems, and machine-readable media for allocating cost of disk usage to a linked clone virtual machine (vm). A determination can be made as to a number of disks used by a linked clone vm, among the disks in a software defined data center, over a time period. ... Vmware Inc

06/09/16 / #20160162292

Binary translator with precise exception synchronization mechanism

A source computer system with one instruction set architecture (isa) is configured to run on a target hardware system that has its own isa, which may be the same as the source isa. In cases where the source instructions cannot be executed directly on the target system, the invention provides binary translation system. ... Vmware Inc

06/09/16 / #20160162279

Capturing updates to applications and operating systems

An enterprise network management system is described for automatically updating program layers. A program is installed on a reference machine designated for the program and the reference machine is subsequently suspended. ... Vmware Inc

06/02/16 / #20160154949

Enforcing restrictions related to a virtualized computer environment

An administrator may set restrictions related to the operation of a virtual machine (vm), and virtualization software enforces such restrictions. There may be restrictions related to the general use of the vm, such as who may use the vm, when the vm may be used, and on what physical computers the vm may be used. ... Vmware Inc

05/26/16 / #20160150003

Workload selection and cache capacity planning for a virtual storage area network

Exemplary methods, apparatuses, and systems receive characteristics of a plurality of input/output (i/o) requests from a workload, including logical address distance values between i/o requests and data lengths of the plurality of i/o requests. Based upon the characteristics, a data length value representative of the data lengths of the plurality of i/o requests is determined and an access pattern of the plurality of i/o requests is determined. ... Vmware Inc

05/26/16 / #20160149975

Wide area aggregated communications

Methods, systems, and techniques for federating operations, in an optimized way using wide area networks are provided. Example systems provide an api for generating and handling federated requests as an aggregation. ... Vmware Inc

05/26/16 / #20160149831

Resolving a convex optimization problem to optimize network traffic in a distributed system

Techniques are disclosed herein for managing network bandwidth in a distributed system having multiple endpoints that upload data to a central server or server cluster. One embodiment provides a computer-implemented method that includes receiving a logical topology of the network that is determined based on network measurements. ... Vmware Inc

05/26/16 / #20160149829

Reverse breadth-first search method for optimizing network traffic in a distributed system with a point of convergence

Techniques are disclosed herein for managing network bandwidth in a distributed system having multiple endpoints that upload data to a central server or server cluster. One embodiment provides a computer-implemented method that includes receiving a logical topology of the network that is determined based on network measurements. ... Vmware Inc

05/26/16 / #20160149814

Method and system for optimizing network traffic in a distributed system with a point of convergence

Techniques are disclosed herein for managing network bandwidth in a distributed system having multiple endpoints that upload data to a central server or server cluster. One embodiment provides a computer-implemented method that includes collecting network measurements from traffic flows in a network over which the endpoints upload the data to the central server or server cluster. ... Vmware Inc

05/26/16 / #20160148142

Minimizing guest operating system licensing costs in a volume based licensing model in a virtual datacenter

Techniques for minimizing guest os licensing costs in a volume based licensing model in a virtual datacenter are described. In one example embodiment, a virtual machine (vm) that requires a license key for a type of guest os installed in the vm is identified. ... Vmware Inc

05/26/16 / #20160147993

Securing secret data embedded in code against compromised interrupt and exception handlers

In a computer system operable at more than one privilege level, an interrupt security module handles interrupts without exposing a secret value of a register to virtual interrupt handling code that executes at a lower privilege level than the interrupt security module. The interrupt security module is configured to intercept interrupts generated while executing code at lower privilege levels. ... Vmware Inc

05/26/16 / #20160147785

Host-based deduplication using array generated data tags

Exemplary methods, apparatuses, and systems include a host computer detecting a request to utilize data stored at a storage address in an external storage device. The host computer, in response to the detected request, transmits a request to the storage device for a tag that uniquely identifies the data. ... Vmware Inc

05/26/16 / #20160147665

Workload selection and cache capacity planning for a virtual storage area network

Exemplary methods, apparatuses, and systems receive a first input/output (i/o) trace from a first workload and run the first i/o trace through a cache simulation to determine a first miss ratio curve (mrc) for the first workload. A second i/o trace from the first workload is received and run through the cache simulation to determine a second mrc for the first workload. ... Vmware Inc

05/26/16 / #20160147649

Input/output trace sampling

Exemplary methods, apparatuses, and systems include a host computer selecting a first workload of a plurality of workloads running on the host computer to be subjected to an input/output (i/o) trace. The host computer determines whether to generate the i/o trace for the first workload for a first length of time or for a second length of time. ... Vmware Inc

05/26/16 / #20160147636

Enhanced resiliency testing by enabling state level control for request

A computer implemented method for testing the resiliency of a software application. The computer implemented method can test the resiliency of a software application by monitoring the program state of the software application and trigger a shutdown request when the specified program state has been reached. ... Vmware Inc

05/26/16 / #20160147631

Workload selection and cache capacity planning for a virtual storage area network

Exemplary methods, apparatuses, and systems receive a first input/output (i/o) trace including storage addresses that were subject to a plurality of i/o requests from a first workload during a first period of time. The first i/o trace is run through a cache simulation using a plurality of simulated cache sizes. ... Vmware Inc

05/26/16 / #20160147557

File transfer using standard blocks and standard-block identifiers

Instead of transferring a large original file, such as a virtual-machine image file, from a source system to a target system, the original file is encoded to define a recipe file that is transferred. The recipe is then decoded to yield a duplicate of the original file on the target system. ... Vmware Inc

05/26/16 / #20160147553

Minimizing guest operating system licensing costs in a processor based licensing model in a virtual datacenter

Techniques for optimizing guest operating system (os) utilization cost in a processor based licensing model in a virtual datacenter are described. In one example embodiment, a virtual machine (vm) that has or is scheduled to have an instance of an operating system (os) that requires a license is identified. ... Vmware Inc

05/26/16 / #20160147456

Memory-access-resource management

The present application is directed to a memory-access-multiplexing memory controller that can multiplex memory accesses from multiple hardware threads, cores, and processors according to externally specified policies or parameters, including policies or parameters set by management layers within a virtualized computer system. A memory-access-multiplexing memory controller provides, at the physical-hardware level, a basis for ensuring rational and policy-driven sharing of the memory-access resource among multiple hardware threads, cores, and/or processors.. ... Vmware Inc

05/19/16 / #20160142769

Method and system for enhancing user experience for remoting technologies

The disclosure herein describes a client-side system that enhances user experience on a remoting client without consuming additional network bandwidth. During operation, the system receives a sequence of frame updates for a display screen, and determines a sequence of frames corresponding to the frame updates. ... Vmware Inc

05/19/16 / #20160139948

Dynamic resource configuration based on context

Aspects of the disclosure allocate shares of processing resources or other physical resources among virtual machines (vms) operating as, for example, virtual desktops on a plurality of host computing devices. Allocations of resources are adjusted based on the user activity, vm activity, and/or application activity detected by an agent executing on each vm. ... Vmware Inc

05/19/16 / #20160139906

Deploying an application across multiple deployment environments

Disclosed examples to configure an application for deployment involve displaying a user-selectable control in a user interface. A selected state and an unselected state of the user-selectable control distinguish between whether different components of the application are to be deployed in a same cloud and whether the different components of the application are to be deployed in separate clouds. ... Vmware Inc

05/12/16 / #20160132443

Tracking virtual machine memory modified by a single root i/o virtualization (sr-iov) device

Techniques for tracking, by a host system, virtual machine (vm) memory modified by a physical input/output (i/o) device that supports i/o virtualization are provided. In one embodiment, a hypervisor of the host system can receive a hardware interrupt from the physical i/o device, where the hardware interrupt indicates that a virtual function (vf) of the physical i/o device has completed a direct memory access (dma) write to a guest memory space of a vm running on the host system. ... Vmware Inc

05/12/16 / #20160132358

Peripheral device sharing across virtual machines running on different host computing systems

Techniques for sharing a peripheral device connected to a first host computing system in a cluster are disclosed. In one embodiment, a request to access the peripheral device connected to the first host computing system is received from a virtual machine running on a second host computing system. ... Vmware Inc

05/05/16 / #20160127509

Methods, systems and apparatus to remotely start a virtual machine

Methods and apparatus to remotely start a virtual machine are disclosed herein. An example method to remotely start a virtual machine includes requesting, at a network device, allocation of a network address to the network device, the network address formerly being allocated to the virtual machine and generating, with the network device, a user interface. ... Vmware Inc

05/05/16 / #20160127447

File sharing using remote applications

Techniques are disclosed herein for file sharing using remote applications. One embodiment provides a computer-implemented method that includes receiving, at a computing device, a selection of a reference for accessing the file, where the reference includes a first identifier specifying the file stored on a host server remotely located with respect to the computing device and a second identifier specifying an application that is running on the host server and that is configured to open files of a same type as the file. ... Vmware Inc

05/05/16 / #20160127352

Step-up authentication for single sign-on

A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a primary token that is associated with a first authentication event of the user and authenticates the user to access the first resource, and receiving a first request to access the second resource. ... Vmware Inc

05/05/16 / #20160127321

Method and system for vpn isolation using network namespaces

One embodiment of the present invention provides a system for providing exclusive access to a virtual private network (vpn) connection to an authorized application. During operation, the system creates a unique network namespace that is different from a default network namespace of a host system. ... Vmware Inc

05/05/16 / #20160127206

Rack awareness data storage in a cluster of host computing devices

A method receives physical location information for racks in which application running environments are located. Each rack includes multiple host computing devices in a cluster of host computing devices. ... Vmware Inc

05/05/16 / #20160127202

Placing a virtual edge gateway appliance on a host computing system

Techniques for placing a virtual edge gateway appliance on at least one host computing system are described. In one embodiment, a virtual switch assigned to tenant for creating virtual networks is identified. ... Vmware Inc

05/05/16 / #20160125488

Methods and systems to allocate physical network cost to tenants of a data center

Systems and methods of allocating network cost of a physical data center to data center tenants are disclosed. In one aspect, the systems and methods compute a total cost of the physical data center devices and networks and other operational expenditures over a period of time. ... Vmware Inc

05/05/16 / #20160125016

Maintaining storage profile consistency in a cluster having local and shared storage

A per device state is introduced that indicates whether a storage device is shared clusterwide or not. The state may be populated by default based on detected device locality. ... Vmware Inc

05/05/16 / #20160124774

Cluster resource management in a virtualized computing environment

Techniques for managing computing resources in a cluster are disclosed. In one embodiment, a method includes identifying a virtual machine requiring additional memory. ... Vmware Inc

05/05/16 / #20160124773

Method and system that measures and reports computational-resource usage in a data center

The present disclosure describes methods and systems that monitor the utilization of computational resources. In one implementation, a system periodically measures the utilization of computational resources, determines an amount of computational-resource wastage, identifies the source of the wastage, and generates recommendations that reduce or eliminate the wastage. ... Vmware Inc

04/28/16 / #20160117186

Dynamic scaling of management infrastructure in virtual environments

Methods, systems, and computer programs for performing management tasks in a virtual infrastructure are presented. The method includes detecting a change, beyond a predetermined threshold, in a number of tasks waiting to be processed by a plurality of management modules executing as execution environments in the virtual infrastructure, each of the plurality of management modules being a management execution environments for the managed objects. ... Vmware Inc

04/07/16 / #20160099968

Infrastructure level lan security

Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an encryption module of a virtual machine (vm) host intercepts layer 2 (l2) frames sent via a virtual nic (vnic). ... Vmware Inc

04/07/16 / #20160098810

Watermarking and scalability techniques for a virtual desktop planning tool

A method for measuring performance of virtual desktop services offered by a server including a processor is described. A first encoded watermark is embedded into user interface display generated by a virtual desktop when initiating an operation. ... Vmware Inc

04/07/16 / #20160098324

Dynamic protection of storage resources for disaster recovery

A recovery manager discovers replication properties of datastores stored in a storage array, and assigns custom tags to the datastores indicating the discovered replication properties. A user may create storage profiles with rules using any combination of these custom tags describe replication properties. ... Vmware Inc

04/07/16 / #20160098288

Building virtual appliances

An example method to build a virtual appliance for deployment in a virtualized computing environment may include obtaining a base virtual appliance that is application-independent. The base virtual appliance includes a virtual machine, a virtual disk associated with the virtual machine and a guest operating system (os) installed on the virtual disk. ... Vmware Inc

04/07/16 / #20160098285

Using virtual machine containers in a virtualized computing platform

A virtualized computing system supports the execution of a plurality of virtual machines, where each virtual machine supports the execution of applications therein. Each application executes within a container that isolates the application executing therein from other processes executing on the computing system. ... Vmware Inc

04/07/16 / #20160098207

Adjusting page sharing scan rates based on estimation of page sharing opportunities within large pages

Memory performance in a computer system that implements large page mappings is improved by dynamically tuning the page scan rate at which a memory sharing module (e.g., in a hypervisor) performs small page scanning operations that identify and exploit potential small page sharing opportunities within large pages. In operation, when free memory is relatively low, the hypervisor adjusts the page scan rate based on a statistical estimate of the percentage of virtual small pages that are mapped to physical large pages that are shareable. ... Vmware Inc

03/31/16 / #20160094460

Packet key parser for flow-based forwarding elements

Some embodiments provide a forwarding element that parses a packet to selectively extract a set of header field values for a flow key. The forwarding element then uses the flow key to find a matching flow to process the packet. ... Vmware Inc

03/31/16 / #20160094356

Optimized message retransmission mechanism for distributed storage virtualization directory system

A method of retransmitting a multicast message through a unicast channel in a virtual distributed storage system comprising a cluster of nodes that includes a master node and a set of agent nodes is provided. Each node maintains a copy of a directory of the virtual distributed storage system. ... Vmware Inc

03/31/16 / #20160094353

Technique to submit multicast membership state in absence of querier

A method of submitting multicast membership packets by a host in a multicast domain in absence of a querier to trigger those packets is provided. The host includes a silent state and an active state. ... Vmware Inc

03/31/16 / #20160092259

Numa i/o aware network queue assignments

Systems and methods for preferentially assigning virtual machines (vms) on a particular numa node with network queues on the same numa node are described. A load balancer process on a host assigns multiple vms to network queues. ... Vmware Inc

03/31/16 / #20160092258

Numa i/o aware network queue assignments

Systems and methods for preferentially assigning virtual machines (vms) on a particular numa node with network queues on the same numa node are described. A load balancer process on a host assigns multiple vms to network queues. ... Vmware Inc

03/24/16 / #20160087992

Providing virtual desktops using resources accessed on public computer networks

A computer system supports hosting of virtual desktops using resources available in the cloud. Connections to various resources used by a desktop configuration are made dynamically using authentication information associated with the user assigned to the desktop configuration. ... Vmware Inc

03/24/16 / #20160087888

Method and system for service switching using service tags

The disclosure herein describes a system, which provides service switching in a datacenter environment. The system can include a service switching gateway, which can identify a service tag associated with a received packet. ... Vmware Inc

03/24/16 / #20160087843

Host profiles in a storage area network (san) architecture

Reference profiles for managing configurations of host machines in a cluster may include a subprofile that specifies a boot lun in a san storage architecture. Processing of a reference profile includes properly resolving the boot lun specified in the reference profile and the actual boot lun used in a target host machine.. ... Vmware Inc

03/24/16 / #20160085686

Synchronizing a translation lookaside buffer with page tables

The translation lookaside buffer (tlb) of a processor is kept in synchronization with a guest page table by use of an indicator referred to as a “t” bit. The t bit of the npt/ept entries mapping the guest page table are set when a page walk is performed on the npt/ept. ... Vmware Inc

03/24/16 / #20160085582

Interdependent virtual machine management

Exemplary methods, apparatuses, and systems determine a list of virtual machines to be subject to a corrective action. When one or more of the listed virtual machines have dependencies upon other virtual machines, network connections, or storage devices, the determination of the list includes determining that the dependencies of the one or more virtual machines have been met. ... Vmware Inc

03/24/16 / #20160085571

Adaptive cpu numa scheduling

Examples perform selection of non-uniform memory access (numa) nodes for mapping of virtual central processing unit (vcpu) operations to physical processors. A cpu scheduler evaluates the latency between various candidate processors and the memory associated with the vcpu, and the size of the working set of the associated memory, and the vcpu scheduler selects an optimal processor for execution of a vcpu based on the expected memory access latency and the characteristics of the vcpu and the processors. ... Vmware Inc

03/24/16 / #20160085481

Storage tiering based on virtual machine operations and virtual volume type

To optimize front-end operations performed on virtual machines, a storage tiering module preemptively guides the placement of virtual volumes in storage tiers within a storage system. Upon detecting a front-end operation request, the storage tiering module identifies a storage requirement, such as an expected provisioning activity level during the front-end operation. ... Vmware Inc

03/24/16 / #20160085392

System and method for seamlessly integrating separate information systems within an application

The present invention is, in one embodiment, a system and method based on a client-server architecture for seamlessly integrating various information systems. In one embodiment, a bundle of files is deployed to a collaboration client, in order to enable the integration of the collaboration client with disparate information systems and content. ... Vmware Inc

03/17/16 / #20160080546

Controlling use of a business environment on a mobile device

A business environment on a mobile device can be controlled by an enterprise server by receiving identifying information transmitted from a mobile device, wherein the identifying information identifies a user of the mobile device to the enterprise server. A virtual phone template is transmitted to the mobile device, wherein the virtual phone template (i) corresponds to the identifying information, and (ii) is configured to provide the business environment on the mobile device as a virtual machine running on a hypervisor installed on top of a host operating system of the mobile device. ... Vmware Inc

03/17/16 / #20160080334

Secure distributed publish/subscribe system

A distributed event system includes a plurality of publishers, a communication infrastructure, and a key manager that manages access to publishing of events by one or more applications. An event is published, by a publisher, when the publisher determines an occurrence of an event and, in response, obtains a key from the key manager. ... Vmware Inc

03/17/16 / #20160078585

Dynamically using system memory as video memory for virtual graphics processing units

Techniques for dynamically using system (i.e., vm guest) memory as video memory for virtual graphics processing units (vgpus) are provided. In one embodiment, a guest graphics driver running within a virtual machine (vm) of a host system can receive, from a guest application of the vm, a request to create a graphics resource. ... Vmware Inc

03/17/16 / #20160077935

Virtual machine network loss detection and recovery for high availability

Exemplary methods, apparatuses, and systems determine that a first physical network interface controller of a first host computer has lost a client traffic network connection. At least one data compute node running on the first host computer has client traffic transmitted via the client traffic network connection. ... Vmware Inc

03/17/16 / #20160077919

Methods and apparatus to perform site recovery of a virtual data center

Methods, apparatus, systems and articles of manufacture to perform site recovery of a virtual data center are disclosed. An example method includes discovering a work item to be included in a protection group associated with a recovery plan. ... Vmware Inc

03/10/16 / #20160072873

Virtual desktop encoding based on user input behavior

The disclosure herein describes a server-side system that dynamically enhances user experience on a remoting client device. During operation, the system monitors user inputs on the client device. ... Vmware Inc

03/10/16 / #20160072723

Method and system for determining bandwidth demand

A method, a non-transitory computer-readable storage medium, and a computer system for managing bandwidth allocated to a virtual machine running on a host computer is disclosed. In an embodiment, a method involves obtaining the current bandwidth for a virtual machine running on a host computer, determining bandwidth demand for the virtual machine as a function of the current bandwidth and a growth margin, and adjusting a bandwidth cap for the virtual machine based on the determined bandwidth demand. ... Vmware Inc

03/10/16 / #20160072684

Distributed deep packet inspection

Exemplary methods, apparatuses, and systems receive a copy of or make a copy of one or more packets of a flow of packets between a source and a destination. While or after the one or more packets are forwarded to the destination, the content of the one or more packets is compared to a policy to determine if the flow of packets triggers a policy response. ... Vmware Inc

03/10/16 / #20160070587

Load balancing of cloned virtual machines

A method, a non-transitory computer-readable storage medium, and a computer system for managing the placement of virtual machines in a virtual machine network are disclosed. In an embodiment, a method involves determining if at least one virtual machine in a set of virtual machines supporting a process and running on a first host computer needs to be separated from other virtual machines in the set. ... Vmware Inc

03/10/16 / #20160070568

Automatic code review and code reviewer recommendation

Systems and methods for managing review of source code are described. The method may comprise receiving a version of source code that includes a specific change at a specific location in the version of source code that has been affected by one or more programming actions compared to a prior version of source code; and identifying a plurality of prior review requests associated with the specific change. ... Vmware Inc

03/03/16 / #20160062940

Safely sharing usb devices during pci passthrough operation

Examples of the disclosure safely share universal service bus (usb) devices with peripheral component interconnect (pci) passthrough, and share devices in the usb hierarchy. An in-use counter is maintained for the usb bus and/or for usb hubs. ... Vmware Inc

03/03/16 / #20160062858

Storage policy-based automation of protection for disaster recovery

Exemplary methods, apparatuses, and systems include a recovery manager receiving selection of a storage profile to be protected. The storage profile is an abstraction of a set of one or more logical storage devices that are treated as a single entity based upon common storage capabilities. ... Vmware Inc

03/03/16 / #20160062853

Preventing migration of a virtual machine from affecting disaster recovery of replica

A storage migration engine and a recovery manager are provided that enable failover operations to be performed in situations where storage migration and array-based replication are involved. The storage migration engine stores information related to storage migrations directly into a source datastore and a destination datastore, which are then replicated over to a recovery site. ... Vmware Inc

03/03/16 / #20160062851

Preventing migration of a virtual machine from affecting disaster recovery of replica

To prevent a user from initiating potentially dangerous virtual machine migrations, a storage migration engine is configured to be aware of replication properties for a source datastore and a destination datastore. The replication properties are obtained from a storage array configured to provide array-based replication. ... Vmware Inc

03/03/16 / #20160062789

Storage architecture for virtual machines

Some embodiments of the present invention include a method comprising: accessing units of network storage that encode state data of respective virtual machines, wherein the state data for respective ones of the virtual machines are stored in distinct ones of the network storage units such that the state data for more than one virtual machine are not commingled in any one of the network storage units.. . ... Vmware Inc

02/25/16 / #20160057559

Provisioning work environments on personal mobile devices

A virtual business mobile device can be provisioned on a personal mobile device, by binding a mobile application for provisioning the business mobile device to a privileged component of a host operating system of the personal mobile device, wherein the binding enables a software virtualization layer and a management service component of the mobile application to execute in a privileged mode. The mobile application is then able to download a virtual phone image for the business mobile device and security-related policy settings relating to use of the business mobile device from a mobile management server, wherein the software virtualization layer is able to launch a virtual machine for the business mobile device based on the virtual phone image. ... Vmware Inc

02/25/16 / #20160057135

Accessing virtual desktops via image scanning

Image scanning and encoding technologies can be utilized to authenticate devices to virtual desktops and to transfer virtual desktop sessions between devices. One device (e.g., pc or laptop) may encode certain information into an image that is displayed on a display screen, while another mobile device equipped with a digital camera (e.g., mobile phone or tablet) can be used to scan the image on the display screen. ... Vmware Inc

02/25/16 / #20160057123

Pushing a virtual desktop session from an authenticated device using image scanning

Image scanning and encoding technologies can be utilized to authenticate devices to virtual desktops and to transfer virtual desktop sessions between devices. One device (e.g., pc or laptop) may encode certain information into an image that is displayed on a display screen, while another mobile device equipped with a digital camera (e.g., mobile phone or tablet) can be used to scan the image on the display screen. ... Vmware Inc

02/25/16 / #20160057041

Automatic remediation of poor-performing virtual machines for scalable applications

A management system and method for remediating poor-performing clients running in a distributed computer system uses a machine learning technique to automatically detect one or more poor-performing clients among a plurality of clients running in the distributed computer based on at least performance data and resource usage data of the clients. An action is then initiated to mitigate the effects of the poor-performing clients.. ... Vmware Inc

02/25/16 / #20160057027

Policy management system for heterogeneous cloud services

Some embodiments provide a method for a system that enforces policy for a network. The method receives (i) a first set of network state data from a first cloud management application that manages a first aspect of the network and stores its network state data in a first format and (ii) a second set of network state data from a second cloud management application that manages a second aspect of the network and stores its network state data in a second format. ... Vmware Inc

02/25/16 / #20160057026

Policy management system with proactive and reactive monitoring and enforcement

Some embodiments provide a method for a system that monitors a network to prevent violations of network policies. The method stores network state data that describes the network. ... Vmware Inc

02/25/16 / #20160057025

Policy declarations for cloud management system

Some embodiments provide a method for a system that monitors a network to prevent violations of declared policies. The method stores network state data received from a plurality of data sources as a set of tables. ... Vmware Inc

02/25/16 / #20160057014

Enabling virtual machines access to switches configured by different management entities

A method of configuring a plurality of logical forwarding elements (lfes) on a physical computing device comprising virtualization software and a plurality of data compute nodes (dcns) is provided. The method provisions a first lfe configured and managed by a network manager of a datacenter on the physical computing device, the first lfe for performing osi l3)packet forwarding between dcns on one or more hosts, the first lfe comprising a plurality of logical ports configured and managed by the network manager, each logical port of the first lfe for connecting a dcn to a logical network configured and managed by the network manager. ... Vmware Inc

02/25/16 / #20160057006

Method and system of provisioning logical networks on a host machine

A physical computing device is provided that includes a set of processing units and a set of machine readable media (crm) for execution by the set of processing units. The crm stores a plurality of data compute nodes (dcns) deployed by a compute manager of a datacenter, virtualization software, and a network manager agent. ... Vmware Inc

02/25/16 / #20160057005

Enabling uniform switch management in virtual infrastructure

A method of configuring a logical network in a datacenter is provided. The datacenter includes a plurality of host physical computing devices, a compute manager to configure one or more data compute nodes (dcns) on virtualization software of each host, and a network manager. ... Vmware Inc

02/25/16 / #20160055579

Decreasing time to market of a pre-configured hyper-converged computing device

In a method for decreasing time to market of a pre-configured hyper-converged computing device for supporting a virtualization infrastructure, software is developed, by a first party, to be uploaded on the pre-configured hyper-converged computing device. A second party is determined for building the pre-configured hyper-converged computing device. ... Vmware Inc

02/25/16 / #20160055078

Decreasing user management of an appliance

In a method for decreasing user management of a pre-configured hyper-converged computing device, software updates of installed software on an underlying hardware platform of said pre-configured hyper-converged computing device are tested by a first party, wherein the installed software is provided by the first party. The software updates are provided by the first party for updating the installed software on the pre-configured hyper-converged computing device. ... Vmware Inc

02/25/16 / #20160055022

Decreasing time to deploy a virtual machine

In a computer-implemented method for decreasing time to deploy a virtual machine hosted by pre-configured hyper-converged computing device for supporting a virtualization infrastructure, instructions are provided to display a single end-user license agreement (eula) to enable execution of software on the pre-configured hyper-converged computing device upon acceptance of the single eula. Acceptance of the single eula by a user is received. ... Vmware Inc

02/25/16 / #20160055021

Rapid suspend/resume for virtual machines via resource sharing

Examples quickly suspend and resume virtual desktops on demand or on schedule. Virtual desktops, or desktops as a service, are provided to users, where the virtual desktop is a forked vm, cloned vm, or otherwise at least a partial duplicate of an existing vm. ... Vmware Inc

02/25/16 / #20160055019

Method and system for migrating virtual machines in virtual infrastructure

A method of migrating a data compute node (dcn) in a datacenter comprising a plurality of host physical computing devices, a compute manager, and a network manager is provided. The method by the network manager configures a plurality of logical networks and provides a read-only configuration construct of at least one of the plurality of logical networks to the virtualization software of each host. ... Vmware Inc

02/25/16 / #20160055017

Application publishing using memory state sharing

Examples described herein enable memory state sharing among a plurality of virtual machines (vm) including a parent vm and a child vm. A request for memory state sharing between the parent vm and the child vm is received, and the parent vm is suspended. ... Vmware Inc

02/25/16 / #20160055016

Machine identity persistence for users of non-persistent virtual desktops

Examples perform creation of a non-persistent virtual machine with a persistent machine identity associated with the user of the virtual machine, to provide consistent virtual desktop sessions to the user. Some examples contemplate that the machine identity is inserted into a virtual machine created through cloning, forking, or from a virtual machine pool.. ... Vmware Inc

02/18/16 / #20160050115

Networking component management in host computing systems in a virtual computing environment

Techniques for managing networking components in a host computing system in a virtual computing environment are described. The networking components include virtual switches and physical network interface cards (nics). ... Vmware Inc

02/18/16 / #20160048533

Remotely stored application files

Systems and techniques are described for distributing and resolving application files. A described technique includes receiving, for an application, selection data specifying one or more referenced application files. ... Vmware Inc

02/18/16 / #20160048437

Multiple test type analysis for a test case using test case metadata

In one embodiment, a method determines a test case containing test code for testing a functionality of a computer system. The test case is associated with metadata. ... Vmware Inc

02/18/16 / #20160048400

Deployment of web client plugins in a virtualized computing environment

An example method to deploy a web client plugin in a virtualized computing environment may include obtaining information identifying a virtual machine at a management entity and generating configuration information that includes the information identifying the virtual machine. The method may further include registering, with the management entity, the configuration information to deploy the web client plugin as a web client extension. ... Vmware Inc

02/11/16 / #20160044041

Verifying caller authorization using secret data embedded in code

In a computer system operable at more than one privilege level, confidential code is securely customized to use secret data to establish a code protection domain without disclosing the secret data to a managing operating system. In operation, a security module executes at a higher privilege level than both the managing operating system and the confidential code. ... Vmware Inc

02/11/16 / #20160042195

Embedding secret data in code

In a computer system operable at more than one privilege level, an application is securely customized to use secret data without disclosing the secret data to a managing operating system. In operation, an integrity module executes at a higher privilege level than both the managing operating system and the application. ... Vmware Inc

02/11/16 / #20160042162

Lock screens to access work environments on a personal mobile device

One or more embodiments of the invention provide access to a work environment in a mobile device from a lock screen presented by a personal environment of the mobile device, wherein the work environment is running in a virtual machine supported by a hypervisor running within the personal environment and wherein the personal environment is a host operating system (os) of the mobile device. The host os receives an authentication credential from a user in response to a presentation of the lock screen on a user interface (ui) of the mobile device and then determines whether the authentication credential is valid for the personal environment or the work environment. ... Vmware Inc

02/11/16 / #20160042005

Techniques for implementing hybrid flash/hdd-based virtual disk files

Techniques for utilizing flash storage as an extension of hard disk (hdd) storage are provided. In one embodiment, a computer system stores a subset of blocks of a logical file in a first physical file, associated with a first data structure that represents a filesystem object, on flash storage and a subset of blocks, associated with a second data structure that represents a filesystem object comprising tiering configuration information that includes an identifier of the first physical file, in a second physical file on hdd storage. ... Vmware Inc

02/11/16 / #20160041837

Individualizing virtual hardware configurations of deployed desktop virtual machines using custom resource templates

Techniques for achieving virtual hardware resources that are individualized across desktop virtual machines (vms) are identified. Custom resource templates include virtual resource settings that are targeted for specified desktop vms and that differ from the parent image (i.e., a template or snapshot). ... Vmware Inc

02/11/16 / #20160041771

Techniques for surfacing host-side flash storage capacity to virtual machines

Techniques for surfacing host-side flash storage capacity to a plurality of vms running on a host system are provided. In one embodiment, the host system creates, for each vm in the plurality of vms, a flash storage space allocation in a flash storage device that is locally attached to the host system. ... Vmware Inc

02/04/16 / #20160034698

Static redirection for objective c

Particular embodiments establish static redirection of a function that is a member of a class to an alternate implementation of the function. A software tool executing on a computer server receives an executable file for an application and a location for an alternate implementation of the function. ... Vmware Inc

02/04/16 / #20160034375

Determining test case priorities based on tagged execution paths

Test case priorities are automatically determined based on the execution path of a software application that includes priority tags. By embedding the priority tags in the source code of the software application, the consistency and reliability of the test case priorities is improved compared to conventional, primarily manual approaches to determining test case priorities. ... Vmware Inc

01/28/16 / #20160028720

Configuration profile validation on ios using ssl and redirect

An application management agent running on a wireless communications device restricts access to device functionality (e.g., applications and device features) unless the application management agent has determined that a particular configuration profile has been installed on the device (after which the application management agent permits access to device functionality, and an operating system of the device enforces policy settings specified in the configuration profile). The application management agent confirms the presence of the configuration profile by initiating an ssl handshake with a client certificate request for a client ssl certificate embedded in the configuration profile. ... Vmware Inc

01/28/16 / #20160028658

Distributed virtual switch for virtualized computer systems

A runtime state of a virtual port associated with a virtual machine (“vm”) is persisted as the vm is migrated from a source host to a destination host. In certain embodiments, a virtual switch forwards network frames between the vm and the physical network interface via the virtual port. ... Vmware Inc

01/28/16 / #20160026474

Caching based operating system installation

An image of system software is installed by loading an executable image of the system software using a boot loader, where the executable image includes a kernel and a plurality of files used by the kernel. The kernel of the system software is executed to generate the image of the system software that includes a copy of the kernel. ... Vmware Inc

01/21/16 / #20160021218

Controlling a paravirtualized wireless interface from a guest virtual machine

A method, system and an apparatus to paravirtualize a wireless interface is disclosed. In one embodiment, a method receives a frame of data for a wireless service through a wireless interface of a host device using a processor. ... Vmware Inc

01/21/16 / #20160021024

Adaptive resource management of a cluster of host computers using predicted data

A resource management system and method for performing resource management operations in a distributed computer system uses predicted resource demands for a specified time in the future to change a resource management option of a resource management analysis algorithm prior to the specified time so that the resource management analysis algorithm can be executed in anticipation of the predicted resource demands at the specified time.. . ... Vmware Inc

01/21/16 / #20160021019

Universal virtualized resource management

A universal resource management system and method for performing resource management operations for different computing environments uses a universal snapshot of the different computing environments to perform a resource management analysis to produce at least one recommended action for the different computing environments. The universal snapshot is created using state information collected from the different computing environments. ... Vmware Inc

01/21/16 / #20160019096

Single, logical, multi-tier application blueprint used for deployment and management of multiple physical applications in a cloud infrastructure

A deployment system enables a developer to define a logical, multi-tier application blueprint that can be used to create and manage (e.g., redeploy, upgrade, backup, patch) multiple applications in a cloud infrastructure. In the application blueprint, the developer models an overall application architecture, or topology, that includes individual and clustered nodes (e.g., vms), logical templates, cloud providers, deployment environments, software services, application-specific code, properties, and dependencies between top-tier and second-tier components. ... Vmware Inc

01/21/16 / #20160019085

Provisioning of computer systems using virtual machines

A provisioning server automatically configures a virtual machine (vm) according to user specifications and then deploys the vm on a physical host. The user may either choose from a list of pre-configured, ready-to-deploy vms, or he may select which hardware, operating system and application(s) he would like the vm to have. ... Vmware Inc

01/21/16 / #20160019083

Modifying a state of a virtual machine

In a computer-implemented method for modifying a state of a virtual machine, information between two states of a virtual machine is compared, wherein the two states include a current state of the virtual machine and previous state of the virtual machine. The previous state of the virtual machine is included within a snapshot of the virtual machine at the previous state. ... Vmware Inc

01/21/16 / #20160019082

Comparing states of a virtual machine

In a computer-implemented method for comparing states of a virtual machine, a plurality of selectable states including a current state of a virtual machine and at least one snapshot of the virtual machine are presented for selection, wherein the at least one snapshot includes a state of the virtual machine at a previous state. Responsive to a selection of at least two states of the plurality of selectable states, a comparison tool for comparing information between the at least two states of the virtual machine is presented.. ... Vmware Inc

01/21/16 / #20160019081

Viewing a snapshot of a virtual machine

In a computer-implemented method for viewing a snapshot of a virtual machine, during operation of a virtual machine in a first console, at least one snapshot of the virtual machine is presented for selection, wherein the snapshot includes a previous state of the virtual machine. Responsive to a selection of the snapshot, a second virtual machine of the selected snapshot is deployed in a second console, wherein the second virtual machine is deployed without closing the virtual machine in the first console.. ... Vmware Inc

01/21/16 / #20160019056

Techniques for automatically identifying input files used to generate output files in a software build process

Techniques for automatically identifying input files used to generate output files in a software build process are provided. In one embodiment, a computer system can execute one or more build commands for generating output files for a software product, where the software product is associated with a build tree comprising various input files. ... Vmware Inc

01/21/16 / #20160018877

Reducing power consumption in a server cluster

A method of reducing power consumption of a server cluster of host systems with virtual machines executing on the host systems is provided. The method includes recommending host system power-on when there is a host system whose utilization is above a target utilization, and recommending host system power-off when there is a host system whose utilization is below the target utilization. ... Vmware Inc

01/14/16 / #20160014216

Native viewer use for service results from a remote desktop

In one embodiment, a method includes establishing a session to a remote desktop determined for a user of a client device. The session allows the client device to remotely access the remote desktop to have one or more services performed for the user of the client device using resources of the remote desktop. ... Vmware Inc

01/14/16 / #20160014039

Methods and apparatus to provision a workload in a virtual server rack deployment

Methods and apparatus to provision a workload in a virtual server rack deployment are disclosed. An example method includes determining, via a first resource manager executing on a processor, parameters of a request for allocating resources of a virtual server rack for performing a workload, determining logical computing resources to be utilized for performing the workload based on the parameters, determining first physical computing resources installed in a first physical rack and second physical computing resources installed in a second physical rack included in the virtual server rack to perform the determined logical computing resources, and instructing a first centralized manager of virtual hosts to provision the first physical computing resources into the logical computing resources to allocate the logical computing resources for performing the workload.. ... Vmware Inc

01/14/16 / #20160013992

Methods and apparatus to retire hosts in virtual server rack deployments for virtual computing environments

Methods, apparatus and articles of manufacture are disclosed to retire hosts in virtual server rack deployments for virtual computing environments. An example method includes determining, via a processor, a workload associated with a physical host in a virtualized rack in response to a request to retire the physical host, the workload implemented by a virtual computing environment including the virtualized rack. ... Vmware Inc

01/14/16 / #20160013974

Methods and apparatus for rack deployments for virtual computing environments

Methods and apparatus for rack deployments for virtual computing environments are disclosed. An example method includes retrieving, from a repository remote from a system integrator, a software image to be deployed on a processing unit installed in a server rack, in response to receiving a dynamic host configuration protocol request from a processing unit at a virtual imaging appliance, detecting the processing unit and transmitting a network address to the processing unit to be utilized by the processing unit, transmitting the software image from the virtual imaging appliance to the network address assigned to the processing unit, and transmitting a hardware management system software image from the virtual imaging appliance to a network switch installed in the server rack to cause a hardware management system to be installed in the server rack.. ... Vmware Inc

01/14/16 / #20160011900

Methods and apparatus to transfer physical hardware resources between virtual rack domains in a virtualized server rack

Methods and apparatus to transfer physical hardware resources between virtual rack domains in a virtualized server rack are disclosed. An example method includes determining, using a processor, a subset of candidate hosts that includes a host capacity that meets a first threshold, the candidate hosts belonging to a first virtual rack domain; determining, using the processor, whether the first virtual rack domain will meet an operating requirement of the first virtual rack domain if the subset of the candidate hosts is removed from the first virtual rack domain; and when the first virtual rack domain will meet the operating requirement if the subset of the candidate hosts is removed from the first virtual rack domain, transferring the subset of the candidate hosts from the first virtual rack domain to a second virtual rack domain.. ... Vmware Inc

01/14/16 / #20160011894

Methods and apparatus to configure virtual resource managers for use in virtual server rack deployments for virtual computing environments

An example method includes configuring a network to facilitate communications between a first virtual resource manager (vrm) in a first physical rack and a second vrm in a second physical rack. The first vrm manages first physical resources in the first physical rack. ... Vmware Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Vmware Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Vmware Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###