Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Vmware Inc patents (2017 archive)


Recent patent applications related to Vmware Inc. Vmware Inc is listed as an Agent/Assignee. Note: Vmware Inc may have other listings under different names/spellings. We're not affiliated with Vmware Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "V" | Vmware Inc-related inventors


Rate limiting in a decentralized control plane of a computing system

A method of processing a request for a service of a control plane in a computer system includes receiving the request, from a client, at a service host process executing on a software platform of the computer system; generating an operation object in the service host process that encapsulates a request/response pattern started by the request, the operation object including a plurality of fields that store a context for the request/response pattern within the service host process; determining a key based on the context stored by the plurality of fields; obtaining a rate limit associated with the key; and permitting or denying the request for the service based on whether a rate of requests targeting the service exceeds the rate limit.. . ... Vmware Inc

Transactions in a decentralized control plane of a computing system

A method of managing a transaction in a control plane executing on a computing system that manages a plurality of services includes: receiving, at the control plane from a client, a plurality of first requests for at least one target service of the plurality of services, each of the plurality of first requests including a transaction indicator identifying the transaction; executing at least one handler of the at least one target service to process the plurality of first requests; receiving, at the control plane from the client, a commit request for the transaction coordinator service, the commit request including an instruction to commit the transaction; and executing a handler of the transaction coordinator service to process the commit request and notify the at least one target service of a status of the commit request.. . ... Vmware Inc

Replication protocol with consensus for a decentralized control plane in a computer system

A method of replicating service state among a plurality of nodes in a computer system includes sending a request for a service to an owner node, the owner node being selected based on the service targeted by the request; receiving a completion of the request after execution of a handler of a service instance on the owner node, where the service instance is an instance of the service and the completion indicates that the handler successfully updated a state of the service on the owner node; replicating the updated state of the service as a proposed state among a plurality of peer nodes and receiving replies from the plurality of peer nodes about verification of the proposed state; and providing a response to the request, from the owner node, for transmission to a client that originated the request, the response being generated based on the replies.. . ... Vmware Inc

Elastic reply-request multicast messaging protocol for peer-to-peer distributed systems

Techniques disclosed herein provide a messaging protocol for a distributed system. In one embodiment, each message constructed according to the messaging protocol includes a field for a list of globally unique identifiers (guids) of nodes that should not reply to the message. ... Vmware Inc

Server computer management system for supporting highly available virtual desktops of multiple different tenants

A server computer can be quickly allocated to and made ready for use by users of a tenant by adding and starting, on that server computer, copies of a process implementing the tenant's virtual machine, based on a gold image virtual machine for that tenant. The gold image virtual machine also has an associated gold image virtual disk. ... Vmware Inc

Virtual machine pixel remoting

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for changing virtual machine user interfaces. One of the methods includes detecting, for a remote session, a first resolution for a content presentation area in a web browser, generating, using the first resolution, a first stream of pixels representative of a user interface, providing the first stream of pixels for display in the web browser, receiving input indicating a change to a resolution of the content presentation area in the web browser, detecting a second resolution for the content presentation area in the web browser, generating, using the second resolution, a second stream of pixels representative of the user interface, and providing the second stream of pixels for display in the web browser by the client device.. ... Vmware Inc

Micro-segmentation in virtualized computing environments

Example methods are provided for an entity to perform micro-segmentation in a virtualized computing environment that includes multiple hosts. The method may comprise obtaining application implementation information associated with one or more applications implemented by multiple virtualized computing instances, each of the multiple virtualized computing instances being supported by one of the multiple hosts. ... Vmware Inc

Access control in a decentralized control plane of a computing system

A method of controlling access to a target resource of a plurality of resources managed by a control plane executing on a computing system includes: receiving, at the control plane, a request for the target resource by a client, the request including a user indicator; identifying a user group in which the user indicator is a member; identifying a role that includes an access policy, applicable to the user group, for accessing a group of the plurality of resources, the group of resources defined by a query executable against an index of states of the plurality of resources; obtaining a state of the target resource in response to the request; and applying the access policy of the role to the request for the target resource based on a determination of whether the state of the target resource satisfies a query filter corresponding to the query of the role.. . ... Vmware Inc

Method and subsystem that collects, stores, and monitors population metric data within a computer system

The current document is directed to methods and subsystems within computing systems, including distributed computing systems, that collect, store, process, and analyze population metrics for types and classes of system components, including components of distributed applications executing within containers, virtual machines, and other execution environments. In a described implementation, a graph-like representation of the configuration and state of a computer system included aggregation nodes that collect metric data for a set of multiple object nodes and that collect metric data that represents the members of the set over a monitoring time interval. ... Vmware Inc

Dynamic heartbeating mechanism

System and method for providing failover protection for a cluster of host computers operates in one of two modes. When the number of host computers in the cluster is equal to or less than a threshold number, the host computers in the cluster operate in an all-active heartbeating mode in which each of the host computers is enabled to function as a master node. ... Vmware Inc

Methods and apparatus to authenticate and differentiate virtually identical resources using session chaining

Methods and apparatus to authenticate and differentiate virtually identical resources using session chaining are disclosed. In response to a session request from at least one of a management device or a resource, example methods and apparatus locate a session chain stack associated with an identifier of the at least one of the management device or the resource, and determine whether a first nonce at a top of the session chain stack associated with the identifier of the at least one of the management device or the resource is equal to a second nonce associated with the session request from the at least one of the management device or the resource. ... Vmware Inc

Managing user profiles securely in a user environment

User profiles of applications installed in a user environment, which may be compromised by malware, are managed to protect against such malware gaining access to sensitive data that may be contained in the user profiles. The method includes the steps of detecting, by a management agent of a user environment, a launch of an application within the user environment, verifying, by a filter driver, an identity of the application against a stored profile of the application, and responsive to determining that the identity of the application matches the stored profile of the application, importing, by the management agent, an encrypted user profile from a remote storage to local storage, decrypting, by the filter driver, the encrypted user profile, and providing the decrypted user profile to the application.. ... Vmware Inc

Methods and systems to dynamically price information technology services

Methods and systems to dynamically calculate pricing of it services provided by a cloud-computing facility are described. A number of different price plans that are constrained to a given policy are generated. ... Vmware Inc

Efficient reboot of an operating system

A computer system is rebooted upon crash without running platform firmware and without retrieving all of the modules included in a boot image from an external source and reloading them into system memory. The reboot process includes the steps of stopping and resetting all of the processing units, except one of the processing units that detected the crash event, selecting the one processing unit to execute a reboot operation, and executing the reboot operation to reboot the computer system.. ... Vmware Inc

12/28/17 / #20170372074

Secure booting of computer system

A computer system is securely booted by executing a boot firmware to locate a boot loader and verify the boot loader using a first key that is associated with the boot firmware. Upon verifying the boot loader, computer system executes the boot loader to verify a system software kernel and a secure boot verifier using a second key that is associated with the boot loader. ... Vmware Inc

12/28/17 / #20170372073

Secure booting of computer system

A computer system is securely booted by executing a boot firmware to locate a boot loader and verify the boot loader using a first key that is associated with the boot firmware. Upon verifying the boot loader, computer system executes the boot loader to verify a system software kernel and a secure boot verifier using a second key that is associated with the boot loader. ... Vmware Inc

12/28/17 / #20170371946

Replication groups for content libraries

A distributed computer system and method for synchronizing content libraries in replication groups uses a synchronization control signal that is transmitted to a subscribed content library management module of each subscribed content library in a replication group from a content library management module of the master content library in the replication group to initiate a synchronization procedure. Using metadata of at least one consumable software item from the master content library, contents of a subscribed content library in the replication group are modified to synchronize its contents to the contents of the master content library.. ... Vmware Inc

12/28/17 / #20170371906

Service state management in a decentralized control plane of a computing system

A method managing a state of a service of a control plane in a computer system includes: executing a service host process of the control plane on a software platform of the computer system; creating, by the service host process, a service object representing the service and a service document object representing the state of the service; modifying the service document object to update the state of the service; parsing at least a first portion of the service document to designate data to be indexed and at least a second portion of the service document to designate data to be persistently stored; and updating index data of an index stored in storage of the computer system with the data to be indexed and updating auxiliary data in the index with the data to be persistently stored.. . ... Vmware Inc

12/28/17 / #20170371878

Methods and systems to evaluate data center performance and prioritize data center objects and anomalies for remedial actions

Methods and systems to evaluate data center performance and prioritize data center objects and anomalies for remedial actions are described. Methods rank data center objects and determine object performance trends. ... Vmware Inc

12/28/17 / #20170371872

Method and subsystem that efficiently store metric data

The current document is directed to methods and subsystems within computing systems, including distributed computing systems that efficiently store metric data by approximating a sequence of time-associated data values with one or more linear functions. In a described implementation, a running variability metric is used to control variation within the metric data with respect to the approximating linear functions, with a variation threshold employed to maximize the number of data points represented by a given linear function while ensuring that the variation of the data with respect to the given linear function does not exceed a threshold value. ... Vmware Inc

12/28/17 / #20170371835

Remote direct memory access in a virtualized computing environment

A method of managing remote direct memory access (rdma) to a virtual computing instance includes suspending locally initiated rdma operations of the virtual computing instance executing on a first host prior to a migration of the virtual computing instance to a second host. The first host includes a first hypervisor and the second host includes a second hypervisor. ... Vmware Inc

12/28/17 / #20170371777

Memory congestion aware numa management

In a computer system having multiple memory proximity domains including a first memory proximity domain with a first processor and a first memory and a second memory proximity domain with a second processor and a second memory, latencies of memory access from each memory proximity domain to its local memory as well as to memory at other memory proximity domains are probed. When there is no contention, the local latency will be lower than remote latency. ... Vmware Inc

12/28/17 / #20170371766

Determination of a culprit thread after a physical central processing unit lockup

An automated end-to-end analysis of customer service requests is disclosed. A core dump is received, wherein the core dump corresponds to a customer service request regarding a crash of a computer system. ... Vmware Inc

12/28/17 / #20170371765

Automated end-to-end analysis of customer service requests

An automated end-to-end analysis of customer service requests is disclosed. A core dump is received, wherein the core dump corresponds to a customer service request regarding a crash of a computer system. ... Vmware Inc

12/28/17 / #20170371736

Computer crash risk assessment

A computer-implemented method assessing the risk of a future crash occurring on a computer system is disclosed. Crash results are received from a crash analysis system. ... Vmware Inc

12/28/17 / #20170371735

Graphical user interface for software crash analysis data

A computer-implemented method for providing crash results for a computer system on a graphical user interface is disclosed. A component access control feature is displayed on a graphic user interface. ... Vmware Inc

12/28/17 / #20170371734

Monitoring of an automated end-to-end crash analysis system

A computer-implemented method for monitoring a crash analysis system is disclosed. Log messages are accessed pertaining to the operation of a crash analysis system for analyzing a core dump. ... Vmware Inc

12/28/17 / #20170371733

Hypervisor techniques for performing non-faulting reads in virtual machines

Guest memory data structures are read by one or more read operations which are set up to handle page faults and general protection faults generated during the read in various ways. If such a fault occurs while performing the one or more read operations, the fault is handled and the one or more read operation is terminated. ... Vmware Inc

12/28/17 / #20170371731

Culprit module detection and signature back trace generation

In a crash analysis system, a method for analyzing a core dump corresponding to a crash of a computer system is disclosed. A core dump is received wherein the core dump corresponds to a crash of a computer system. ... Vmware Inc

12/28/17 / #20170371723

Notification service in a decentralized control plane of a computing system

A method of providing notifications in a control plane of a computer system includes executing a service host process of the control plane on a software platform of the computer system, the service host process managing services of the control plane and a persistent document store that stores service states for the services. The method may include creating a query task service of the control plane, a service state of the query task service including a query filter; evaluating each of the service states against the query filter as each of the service states is added to the persistent document store; updating the service state of the query task service for each of the service states that satisfies the query filter; and sending a notification to a plurality of subscribers of the query task service in response to each update to the service state of the query task service.. ... Vmware Inc

12/28/17 / #20170371696

Cross-cloud provider virtual machine migration

A method for migrating a virtual machine (vm) includes establishing a first connection to a first cloud computing system executing a first vm, and establishing a second connection to a second cloud computing system managed by a second cloud provider, which is different form the first cloud provider. The method further includes instantiating a second vm designated as a destination vm in the second cloud computing system, and installing a migration agent on each of the first vm and the second vm. ... Vmware Inc

12/28/17 / #20170371693

Managing containers and container hosts in a virtualized computer system

One example relates to a computer system that includes a plurality of host computers each executing a hypervisor. The computer system further includes a virtualization manager having an application programming interface (api) configured to manage the hypervisor on each of the plurality of host computers, the virtualization manager configured to create a virtual container host within a resource pool that spans the plurality of host computers. ... Vmware Inc

12/28/17 / #20170371691

Hypervisor exchange with virtual machines in memory

A hypervisor-exchange process includes: suspending, by an “old” hypervisor, resident virtual machines; exchanging the old hypervisor for a new hypervisor, and resuming, by the new hypervisor, the resident virtual machines. The suspending can include “in-memory” suspension of the virtual machines until the virtual machines are resumed by the new hypervisor. ... Vmware Inc

12/28/17 / #20170371650

Upgrade analysis of a computer system

In a computer-implemented method for performing an upgrade analysis of a computer system, a version dependency compatibility acyclic graph defining component dependency and component version interoperability for a plurality of installed components of the computer system is accessed. Upgradable components of the installed components are determined based on the version dependency compatibility acyclic graph. ... Vmware Inc

12/28/17 / #20170371649

Validating interoperability of installed components of a computer system

In a computer-implemented method for validating interoperability of installed components of a computer system, site data identifying the installed components of the computer system and a version of each of the installed components is received, component dependency data identifying at least one component of the installed components requiring installation of another component of the installed components is received and component interoperability data identifying versions of a component of the installed components that are interoperable with versions of another component of the installed components is received. A version dependency compatibility acyclic graph is generated based at least on the installed components, the component dependency data and component interoperability data. ... Vmware Inc

12/28/17 / #20170371636

Methods and systems to optimize cost and automate a development and operations deployment pipeline

Methods and systems that automate a devops deployment pipeline and optimize devops cost are described. Methods generate a deployment pipeline model based on policies associated with each deployment stage and task. ... Vmware Inc

12/28/17 / #20170371582

Memory management in a decentralized control plane of a computing system

A method of managing memory of a control plane for services in a computer system that includes executing a service host process of the control plane on a software platform of the computer system, the service host process including runtime software configured to manage lifecycles of objects representing the services, the objects being associated with the service host process and being marked as available; determining an amount of memory in the computer system consumed by the objects; marking a plurality of the objects as paused in response to the amount of memory consumed by the objects exceeding a threshold; storing at least a portion of a runtime context of each of the plurality of objects in storage of the computer system; and disassociating the plurality of objects from the service host process to reclaim memory consumed by the objects.. . ... Vmware Inc

12/28/17 / #20170371567

Supporting replication and recovery of virtual volumes

Techniques for supporting replication and recovery of virtual volumes are provided. In various embodiments, these techniques can include workflows and application programming interfaces (apis) that facilitate: (1) the provisioning of virtual volumes with metadata indicating that the virtual volumes should be replicated from one virtual volume-enabled storage array/site to another; (2) the discovery of a replication topology across virtual volume-enabled storage arrays/sites; (3) the orchestration of a test failover of a set of virtual volumes; and (4) the orchestration of an actual failover of a set of virtual volumes.. ... Vmware Inc

12/28/17 / #20170371546

Policy based storage in a heterogeneous storage environment

A method and apparatus in a virtualization system may include using a storage policy that defines a storage characteristic to specify a datastore. The storage policy may be used to identify candidate datastores. ... Vmware Inc

12/28/17 / #20170371519

Automatic document handling with on-demand application mounting

Embodiments perform automatic document handling by retrieving icons from local document handlers or from an application volumes manager, without installing the application locally. Embodiments further perform on-demand application mounting by intercepting and suspending requests to launch applications until the appropriate virtual disk, corresponding to the application, is mounted to the disk subsystem by the application volumes manager. ... Vmware Inc

12/28/17 / #20170371388

Efficient reboot of an operating system

A computer system is rebooted after updating a boot image without running platform firmware with its power-on self-test of system hardware devices and without retrieving all of the modules included in a boot image from an external source and reloading them into system memory. The reboot process includes the steps of loading one or more updated modules of the boot image into the system memory, executing the boot loader module to load for execution modules of the boot image including a system software kernel and the updated modules, and transferring execution control to the system software kernel.. ... Vmware Inc

12/21/17 / #20170366407

Method and system for creating and managing aggregation service hierarchies

Techniques disclosed herein provide an approach for creating and managing aggregation service hierarchies, such as hierarchies used in distributed scheduling services and heartbeat services. In one embodiment, management nodes accept host computer registration events and add host computers to a hierarchy used as the aggregation mechanism in an aggregation service. ... Vmware Inc

12/21/17 / #20170366405

Accessing peripheral devices from a container within virtual machines running on different host computing systems

A method to enable container access to a peripheral device, where the container is hosted by a virtual machine running in a first host and the peripheral device is directly connected to a second host, is provided. The method includes determining a bandwidth requirement of the peripheral device, and comparing the bandwidth requirement of the peripheral device to bandwidth allocated to the virtual machine that is hosting the container. ... Vmware Inc

12/21/17 / #20170364844

Automated-application-release-management subsystem that supports insertion of advice-based crosscutting functionality into pipelines

The current document is directed to automated-application-release-management facilities that support aspect-oriented-programming-like insertion of plug-in-implemented advice into release pipelines. In a described implementation, advice is represented by entries in an advice set or aggregation. ... Vmware Inc

12/21/17 / #20170364677

Usb stack isolation for enhanced security

Disclosed is a computer and method in a computer that detects attachment of an external device. A determination may be made whether the external device is trusted or untrusted. ... Vmware Inc

12/21/17 / #20170364581

Methods and systems to evaluate importance of performance metrics in data center

Methods and systems to evaluate importance of metrics generated in a data center and ranking metric in order of relevance to data center performance are described. Methods collect sets of metric data generated in a data center over a period of time and categorize each set of metric data as being of high importance, medium importance, or low importance. ... Vmware Inc

12/21/17 / #20170364436

Plugin-based software verification system

System and methods for providing plugin-based software verification are described. A method may include, upon receiving a first registration instruction containing a first harness plugin associated with a first automated software test, configuring, by a test harness lifecycle controller, a first test harness based on the first harness plugin to support the executing of the first automated software test, wherein the first automated software test is a software test executable by a computer without human intervention. ... Vmware Inc

12/21/17 / #20170364428

Fault tolerance using shared memory architecture

Examples provide a fault tolerant virtual machine (vm) using pooled memory. When fault tolerance is enabled for a vm, a primary vm is created on a first host in a server cluster. ... Vmware Inc

12/21/17 / #20170364422

Pooled memory heartbeat in shared memory architecture

Examples provide a pooled memory heartbeat for virtual machine hosts. A virtual controller creates a pooled memory heartbeat file system in a shared memory partition of a pooled memory. ... Vmware Inc

12/21/17 / #20170364392

Distributed hierarchical scheduler

Techniques disclosed herein provide an approach for assigning resource consumers to available resources. In one embodiment, components of a distributed scheduler are organized into a hierarchy, such as a tree. ... Vmware Inc

12/21/17 / #20170364391

Methods and systems to manage capacity planning in a data center

Methods determine a capacity-forecast model based on historical capacity metric data and historical business metric data. The capacity-forecast model may be to estimate capacity requirements with respect to changes in demand for the data center customer's application program. ... Vmware Inc

12/21/17 / #20170364379

Hypervisor backdoor interface

A method of providing a backdoor interface between software executing in a virtual machine and a hypervisor executing on a computing system that supports the virtual machine includes trapping, at the hypervisor, an exception generated in response to execution of a debug instruction on a central processing unit (cpu) by the software; identifying, by an exception handler of the hypervisor handling the exception, an equivalence between an immediate operand of the debug instruction and a predefined value; and invoking, in response to the equivalence, a backdoor service of the hypervisor using state of at least one register of the cpu as parametric input, the state being set by the software prior to executing the debug instruction.. . ... Vmware Inc

12/21/17 / #20170364370

Tracking window position in a vdi environment

A method includes displaying a bitmap of unique groups of colored tiles on the display screen and reading a color value of a first pixel in a first tile in the bitmap. Color values of tiles within the first tile's group are determined. ... Vmware Inc

12/21/17 / #20170364365

Multiprocessor initialization via firmware configuration

An example method of initializing a plurality of processors in a hardware platform of computing device for use by system software executing on the hardware platform includes: parsing a descriptor table that has been loaded into memory from firmware to identify an original boot protocol for initializing at least one secondary processor of the plurality of processors; creating at least one mailbox structure in the memory associated with the at least one secondary processor; causing the at least one secondary processor to execute secondary processor initialization code stored in the memory, the secondary processor initialization code implementing a mailbox-based boot protocol that uses the at least one mailbox structure to initialize the at least one secondary processor; and modifying the descriptor table to identify the mailbox-based boot protocol for initializing the at least one secondary processor in place of the original boot protocol.. . ... Vmware Inc

12/21/17 / #20170364353

Segregating a monolithic computing system into multiple attachable application containers based on application boundaries

Techniques are described for segregating a monolithic computing device that contains many installed applications into separate application storage volumes that can be attached or detached from the computing device as needed. Once the monolithic device has been segregated, the application storage volumes can be managed remotely from a management server and can be enabled or disabled on the device based on instructions from an administrator. ... Vmware Inc

12/21/17 / #20170364347

Selectively migrating applications during an operating system upgrade

Techniques are described for segregating a monolithic computing device that contains many installed applications into separate application storage volumes that can be attached or detached from the computing device as needed. Once the monolithic device has been segregated, the application storage volumes can be managed remotely from a management server and can be enabled or disabled on the device based on instructions from an administrator. ... Vmware Inc

12/21/17 / #20170364287

Virtual machine recovery in shared memory architecture

Examples provide for virtual machine recovery using pooled memory. A shared partition is created on pooled memory accessible by a plurality of virtual machine hosts. ... Vmware Inc

12/21/17 / #20170364285

Management of storage replication consistency groups using automatic replication group identifiers

System and method for managing storage replication consistency groups for storage objects of processing entities uses a replication group identifier for a storage replication consistency group received from a storage interface manager of a storage system with multiple computer data storage devices. The replication group identifier is received when a creation request for a new logical storage unit for a processing entity is transmitted from a host computer to the storage interface manager. ... Vmware Inc

12/21/17 / #20170364279

Systems and methods for non-uniform memory access aligned i/o for virtual machines

Systems and methods described herein align various types of hypervisor threads with a non-uniform memory access (numa) client of a virtual machine (vm) that is driving i/o transactions from an application so that no remote memory access is required and the i/o transactions can be completed with local accesses to cpus, caches, and the i/o devices of a same numa node of a hardware numa system. First, hypervisor of the vm detects whether the vm runs on a single or multiple numa nodes. ... Vmware Inc

12/14/17 / #20170359410

Cross-cloud object mapping for hybrid clouds

A method for managing an application executing in a computing system is disclosed as including a private cloud operated by a first organization and a multi-tenant public cloud of which the first organization is one of the tenants. The method comprises instantiating a first virtual object in the private cloud and instantiating a second virtual object in the public cloud for executing the application cooperatively with the first virtual object. ... Vmware Inc

12/14/17 / #20170359215

Persistent alert notes

The present disclosure is related to devices, systems, and methods for persistent alert notes. An example method can include receiving an alert message via a log management server, wherein the alert message indicates a current alert instance particular to a class of alerts, retrieving, in response to receiving the alert message, a note stored in association with the class of alerts via the log management server, wherein the note includes resolution information corresponding to a previous alert instance particular to the class of alerts, and providing the retrieved note via a user interface of the log management server.. ... Vmware Inc

12/14/17 / #20170357592

Enhanced-security page sharing in a virtualized computer system

An example method of page sharing in a host computer having virtualization software that supports execution of a plurality of virtualized computing instances includes identifying, by the virtualization software, duplicate memory pages in system memory of the host computer. The method further includes sharing a memory page of the duplicate memory pages among the plurality of virtualized computing instances. ... Vmware Inc

12/14/17 / #20170357544

Full state session reviving, forking, and snapshoting based on an application data dump

Systems and methods are described for capturing and reproducing the full state of an application session. An application is captured by performing a dump of various components of the session and storing the components in an application session capture. ... Vmware Inc

12/14/17 / #20170357492

Capturing and deploying applications using maximal and minimal sets

Systems and methods are described for packaging and deploying applications using minimal and maximal component sets. A minimal set of application components that includes at least the necessary components for launching the application is first downloaded to an endpoint device from a central server. ... Vmware Inc

12/07/17 / #20170353534

Virtual performance monitoring decoupled from hardware performance-monitoring units

The current document is directed to virtualized pmus provided by virtualization layers. The currently disclosed virtualized pmus are decoupled from the underlying pmu hardware features of processors on which the virtualization layer executes. ... Vmware Inc

12/07/17 / #20170353362

Methods and systems to identify problems in a data center

Methods recommend to data center customers those attributes of a data center infrastructure and application program that are associated with service-level objective (“slo”) metric degradation and may be recorded in problem definitions. In other words, a data center customer is offered to “codify” problems primarily with atomic abnormality conditions on indicated attributes that decrease the slo by some degree that the data center customer would like to be aware. ... Vmware Inc

12/07/17 / #20170353345

Methods and systems to diagnose anomalies in cloud infrastructures

A problem in a cloud infrastructure may be identified when a server computer deviates from a normal level of operation based on anomaly scores, which generates an alert and an alert time that indicates when the alert is generated. Methods then determine which virtual machine (“vm”) and other it objects/resources or their pools contribute to the problem within a time window surrounding the estimated problem start time and calculate which objects show similar, related anomalous behavior. ... Vmware Inc

12/07/17 / #20170351598

Optimizations for regression tracking and triaging in software testing

An example system configured to perform regression tracking and triaging includes a processor and memory coupled with the processor. The memory is configured to provide the processor with instructions to schedule the testing of a first list of equidistant revisions associated with a software application. ... Vmware Inc

12/07/17 / #20170351581

Distributed local backup and restore system using peer-to-peer backups

Local distributed backup techniques are described, where each client device calculates a manifest of its files and sends the manifest to a central server. The server performs deduplication based on the received manifest to determine which files are missing and need to be backed up, and notifies the client of those files. ... Vmware Inc

12/07/17 / #20170351538

Auto-adaptive virtual desktop persistence

An adaptive virtual desktop architecture is provided. Application install or assignment is evaluated, such as by using heuristics to identify applications that may present compatibility problems. ... Vmware Inc

12/07/17 / #20170351537

Virtual machine content presentation

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for changing virtual machine user interfaces. One of the methods includes receiving a first request from a first client device to initiate a first remote session, detecting, for the first remote session, a first display property of the first client device in response to receiving the first request, configuring, for the first remote session, a virtual display device for the virtual machine to be a display device having the first display property, receiving a second request from a second client device to initiate a second remote session, detecting, for the second remote session, a second display property of the second client device in response to receiving the second request, and configuring, for the second remote session, the virtual display device for the virtual machine to be a display device having the second display property.. ... Vmware Inc

12/07/17 / #20170351535

Multitier application blueprint representation in open virtualization format package

A method to deploy a multitier application in a virtualized computing environment includes receiving an open virtualization format (ovf) package. The ovf package includes an ovf descriptor, one or more virtual disk image files of virtual machines, and a multitier application blueprint specifying software components on the virtual machines and dependencies of the software components. ... Vmware Inc

12/07/17 / #20170351441

Non-blocking flow control in multi-processing-entity systems

The current document is directed to an efficient and non-blocking mechanism for flow control within a multi-processor or multi-core processor with hierarchical memory caches. Traditionally, a centralized shared-computational-resource access pool, accessed using a locking operation, is used to control access to a shared computational resource within a multi-processor system or multi-core processor. ... Vmware Inc

12/07/17 / #20170351437

Method and system that increase storage-stack throughput

The current document is directed to a storage stack subsystem of a computer system that transfers data between memory and various data-storage devices and subsystems and that processes i/o requests at a greater rate than conventional storage stacks. In one implementation, the disclosed storage stack includes a latency monitor, an i/o-scheduling bypass pathway, and short-circuit switch, controlled by the latency monitor. ... Vmware Inc

11/30/17 / #20170346894

Copy/paste files between remote agent and local machine in html5 view desktop

A method includes transmitting, from a virtual desktop client operating in a hypertext markup language (html) based browser application running on a client device to a remote virtual desktop agent on a server, a command to copy a file. In response to receiving the command to the copy the file, receiving, at the client device, a path from the remote virtual desktop agent, where the path is used to identify a location of the file to a web server. ... Vmware Inc

11/30/17 / #20170346859

Binding application communication ports to dynamic subsets of network interfaces

Exemplary methods, apparatuses, and systems receive a request to bind a socket for a computer application to a tag. The tag is mapped to a network address for each of a subset of interfaces. ... Vmware Inc

11/30/17 / #20170344597

Distributed file system consistency check

Exemplary methods, apparatuses, and systems include a controller node receiving a request to perform a consistency check of a distributed file system. The controller node transmits, to each of a plurality of nodes, a request for the node to use logical metadata of the distributed file system owned by the node to construct an expected copy of physical metadata mapped to the logical metadata, determine which of the plurality of nodes own actual portions of the physical metadata, transmit corresponding portions of the expected copy of the physical metadata to each of the nodes determined to own actual portions of the physical metadata, and compare expected copies of the physical metadata received from other nodes to the actual physical metadata owned by the node. ... Vmware Inc

11/30/17 / #20170344595

Commit coalescing for micro-journal based transaction logging

Techniques for using commit coalescing when performing micro-journal-based transaction logging are provided. In one embodiment a computer system can maintain, in a volatile memory, a globally ascending identifier, a first list of free micro-journals, and a second list of in-flight micro-journals. ... Vmware Inc

11/30/17 / #20170344496

Cryptographic multi-shadowing with integrity verification

A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. ... Vmware Inc

11/30/17 / #20170344475

Efficient pointer swizzling for persistent objects

Techniques for efficiently swizzling pointers in persistent objects are provided. In one embodiment, a computer system can allocate slabs in a persistent heap, where the persistent heap resides on a byte-addressable persistent memory of the system, and where each slab is a continuous memory segment of the persistent heap that is configured to store instances of an object type used by an application. ... Vmware Inc

11/30/17 / #20170344440

Micro-journal based transaction logging

Techniques for using micro-journals to ensure crash consistency of a transactional application are provided. In one embodiment, a computer system can receive a transaction associated with the transactional application, where the transaction includes a plurality of modifications to data or metadata of the transactional application. ... Vmware Inc

11/30/17 / #20170344392

Predictive login of virtual machines

Described herein are systems, methods, and software to configure virtual machines for end users based on a login history for the end users. In one implementation, a method of operating a virtual computing service that dynamically configures virtual machines includes capturing a login history indicative of when users login to a plurality of virtual machines using the virtual computing service. ... Vmware Inc

11/30/17 / #20170344298

Application aware memory resource management

Memory management in a computer system may include allocating memory pages from a physical memory of the computer system to applications executing on the computer system. The memory pages may be associated with memory management tags. ... Vmware Inc

11/30/17 / #20170344292

Provisioning data volumes for containers running in virtual machines

A computer system has a virtualization software that supports execution of a virtual machine in which a container is run. A method of provisioning a data volume for the container in this computer system includes the steps of monitoring a designated virtual socket, detecting, based on the monitoring, a request from a plug-in of the container to create a data volume, and upon detecting the request, communicating the request to the virtualization software to cause the virtualization software to create the data volume.. ... Vmware Inc

11/30/17 / #20170344291

Provisioning data volumes for containers running in virtual machines in which storage for the virtual machines are backed by heterogeneous storage devices

A computer system has a virtualization software that supports execution of a virtual machine in which a container is run. A method of provisioning first and second data volumes for the container, wherein the first data volume is backed by storage device of a first type and the second data volume is backed by storage device of a second type, includes monitoring a designated virtual socket, detecting, based on monitoring, a first request from a plug-in of the container to create a first data volume having first storage requirements, upon detecting the first request, communicating the request to the virtualization software to create the first data volume, detecting, based on monitoring, a second request from a plug-in of the container to create a second data volume having second storage requirements, and upon detecting the second request, communicating the request to the virtualization software to create the second data volume.. ... Vmware Inc

11/30/17 / #20170344270

Enforcing limits on a self-serve model for provisioning data volumes for containers running in virtual machines

A computer system has a virtualization software that supports execution of a virtual machine in which a container is run. A method of managing allocation of storage resources to the container includes the steps of monitoring a virtual socket, detecting, based on the monitoring, a request from a plug-in of the container to create a data volume, upon detecting the request, retrieving a storage resource limit that has been set for the first virtual machine and determining if creation of the data volume causes the storage resource limit to be exceeded, and communicating the request to the virtualization software to cause the virtualization software to create the data volume if the limit is determined to be not exceeded and returning an error if the limit is determined to be exceeded.. ... Vmware Inc

11/30/17 / #20170344227

Visual designer for editing large schemaless xml file

A method for a xml editor includes loading one or more files, extracting elements that extend a browser user interface from the one or more files, and presenting a graphical user interface (gui) for editing the plug-in xml manifest file. The method further includes receiving one or more user edits to the plug-in xml manifest file through the gui, validating the one or more user edits against properties of the elements, and generating a warning in the gui for a user edit that conflicts with a property of an element. ... Vmware Inc

11/23/17 / #20170337011

Selective monitoring of writes to protected memory pages through page table switching

Mechanisms to protect the integrity of memory of a virtual machine are provided. The mechanisms involve utilizing certain capabilities of the hypervisor underlying the virtual machine to monitor writes to memory pages of the virtual machine. ... Vmware Inc

11/23/17 / #20170337004

Disk assignment for multiple distributed computing clusters in a virtualized computing environment

Example methods are provided to perform disk assignment for multiple distributed computing clusters in a virtualized computing environment. The method may include determining whether disk assignment is required for a host to support a first virtualized computing instance from a first distributed computing cluster and a second virtualized computing instance from a second distributed computing cluster. ... Vmware Inc

11/23/17 / #20170337000

Tree structure for storing monitored memory page data

Mechanisms to protect the integrity of a data structure that is traversed to locate protected memory pages are provided. Leaf nodes of the data structure store mappings that indicate which memory pages are protected. ... Vmware Inc

11/23/17 / #20170336952

Method for linking selectable parameters within a graphical user interface

In a computer-implemented method for linking selectable parameters within a graphical user interface a first selectable parameter and a second selectable parameter are displayed within the graphical user interface, wherein the first selectable parameter is selectable within a first range and the second selectable parameter is selectable within a second range. A selection of the first selectable parameter within the first range is received. ... Vmware Inc

11/16/17 / #20170331723

Fast lookup and update of current hop limit

In order to facilitate efficient and scalable lookup of current hop limits of transmitted packets, a communications device embeds hop limit values along with other connection parameters in a connection data structure. To transmit a packet for a particular connection, the communications device retrieves the data structure for the particular connection and applies the hop limit value embedded in the data structure to the packet for transmission. ... Vmware Inc

11/16/17 / #20170331684

System and method for network address administration and management in federataed cloud computing networks

Techniques for performing network address allocation, administration and management in federated cloud computing networks are described. In one example embodiment, network interface cards (nics) in a local network services appliance and a remote network services appliance register with an associated local network cloud and remote network cloud in the federated cloud computing networks. ... Vmware Inc

11/16/17 / #20170329980

Secure and scalable data transfer using a hybrid blockchain-based approach

Techniques for facilitating secure and scalable data transfers using a hybrid blockchain-based approach are provided. In one embodiment, a first computer system at a first site can transmit a token to a second computer system at a second site, where the token includes metadata regarding a data set to be transferred from the first computer system to the second computer system and one or more cloud storage service addresses where the data set will be temporarily stored. ... Vmware Inc

11/16/17 / #20170329546

Power management for distributed storage systems

Example methods are provided to perform power management for a distributed storage system accessible by a cluster in a virtualized computing environment. The method may comprise determining that a power-off requirement is satisfied for a first host from the cluster. ... Vmware Inc

11/09/17 / #20170323470

Virtual hybrid texture mapping

A gaming device is configured to provide virtual hybrid texture mapping, which provides a type of virtual placeholder that can be filled in using cloud computing resources. The virtual placeholders are filled in to create more detailed textures whose calculated are offloaded to a cloud computing service provider data center's cluster.. ... Vmware Inc

11/09/17 / #20170322874

Generating test cases

Systems and techniques are described for generating test cases. In one example, a manual test of code is performed. ... Vmware Inc

10/26/17 / #20170310571

Specializing virtual network device processing to avoid interrupt processing for high packet rate applications

A method of optimizing network processing in a system comprising a physical host and a set of physical network interface controllers (pnics) is provided. The physical host includes a forwarding element. ... Vmware Inc

10/26/17 / #20170310556

Frequency-domain analysis of data-center operational and performance metrics

The current document is directed to methods and systems for frequency-domain analysis of operational and performance metric values and other data generated and collected within computer systems, including large distributed computer systems and virtualized data centers. In one implementation, each set of time-ordered values for each metric in a set of metrics is partitioned into time intervals, transformed from the time domain to the frequency domain, and aligned to generate a metric surface in a frequency-time-amplitude space. ... Vmware Inc

10/26/17 / #20170308394

Networking stack of virtualization software configured to support latency sensitive virtual machines

A host computer has a plurality of containers including a first container executing therein, where the host also includes a physical network interface controller (nic). A packet handling interrupt is detected upon receipt of a first data packet associated with the first container. ... Vmware Inc

10/12/17 / #20170295235

Method to syncrhonize vsan node status in vsan cluster

A virtual machine (vm) system includes a network, hosts that are able to communicate over the network, a storage cluster of nodes made up by the hosts, and vms running on the hosts. As part of the storage cluster, the nodes pool their storage devices into a clustered datastore shared across all the nodes. ... Vmware Inc

10/12/17 / #20170295186

Access control for user accounts using a bidirectional search approach

An example method is provided for a computing device to perform access control for a user account. The method may include receiving a request for the user account to access a resource, wherein the resource is accessible via the computing device, and determining a permission set required to access the resource. ... Vmware Inc

10/12/17 / #20170295183

Access control for user accounts using a parallel search approach

An example method is provided for a computing device to perform access control for a user account. The method may comprise receiving a request for the user account to access a resource; determining a first permission set and a second permission set required to access the resource; and performing a first search and a second search in parallel. ... Vmware Inc

10/12/17 / #20170295056

System and method for managing configuration of virtual switches in a virtual machine network

Techniques for managing configuration of virtual switches in a virtual machine network are disclosed. In an embodiment, a virtual machine network that includes virtual switches is configured to revert back to a saved network configuration if a configuration change causes the connection between the vm management system and a managed node to be lost. ... Vmware Inc

10/12/17 / #20170293628

Space optimized snapshot for network backup

A system is described for backing-up a client device to a server using space-optimized snapshots. A snapshot is captured on the client device. ... Vmware Inc

10/12/17 / #20170293570

System and methods of an efficient cache algorithm in a hierarchical storage system

An in-memory cache for a computer system having a first storage and a second storage where the first storage is a cache for the second storage, tracks priority levels of block attributes stored therein. If a data item is cached in the first storage, the block attribute corresponding to the data item is stored in the in-memory cache as a high priority block attribute. ... Vmware Inc

10/12/17 / #20170293505

Processing workloads in single-threaded environments

A method renders frames while processing workload slices at a rate defined by a first slice-to-frame ratio. The first slice to frame ratio defines a first rate at which the workload slices are assigned to the frames. ... Vmware Inc

10/12/17 / #20170293501

Method and system that extends a private data center to encompass infrastructure allocated from a remote cloud-computing facility

The current document is directed to methods and systems that extend cloud-management-facility management from a private data center to infrastructure provided by a remote cloud-computing facility. A remote cloud-management-facility agent is installed within the remote cloud-computing facility to mediate exchange of control and information messages between the cloud-management facility within the private data center and virtual machines executing within the remote cloud-computing facility. ... Vmware Inc

10/12/17 / #20170293498

Dynamically managing a serial port interface of virtualization software

One or more examples provide techniques to dynamically manage serial port interface(s) of virtualization software executing in a host device. In an example, a method of managing a serial port interface of virtualization software executing on a host device includes initializing a serial port interface of the host device and examining a headless flag to determine if the host device is headless. ... Vmware Inc

10/05/17 / #20170289005

System and method for managing multiple remote-office and branch-office (robo) sites

System and method for managing multiple remote-office and branch-office (robo) sites use a central management computer to monitor operation statuses of host computers within the multiple robo sites and in response to a communication disruption in a particular robo site of the multiple robo sites, determining a cause of the communication disruption based on the operation statuses of the host computers within the particular robo site.. . ... Vmware Inc

10/05/17 / #20170286230

Method and system for virtualizing guest-generated file system snapshots

Techniques disclosed herein provide an approach for creating snapshots and reverting to the same for virtual machine (vm) guest operating systems (oses). In one embodiment, a snapshot module in a guest os receives blocks for a snapshot of a guest os volume. ... Vmware Inc

10/05/17 / #20170286141

Capturing components of an application using a sandboxed environment

A management agent operates transparently in the background on each endpoint computing device that needs to be managed. The agent sets up a sandboxed environment on the endpoint computing device on which it is operating in order to capture applications that have been installed on the endpoint device. ... Vmware Inc

09/28/17 / #20170277621

Apparatus for minimally intrusive debugging of production user interface software

An article of manufacture, which comprises a computer readable medium having stored therein a computer program for a method for debugging of a production application, the computer program comprising a first code segment which, when executed on a computer, accesses a context object associated with an application method of the production application, such that the application method is mapped to an application name and execution of the application method can be replaced by a first pre-defined replacement method; a second code segment which, when executed on the computer, accesses a test module containing one or more overrides and a reference to the application method, where the override is associated with the first pre-defined replacement method and is associated with the application name associated with the context object; a third code segment which, when executed on the computer, accesses a debugging user interface for implementing one or user interactions, each interaction associated with a method mapping on the context object; a fourth code segment which, when executed on the computer, accesses a dashboard module, coupled to the computer, comprising references to test modules and a debugging user interface specification; wherein a main user interface specification includes a reference to the dashboard module; and wherein on request in the debugging user interface specification, the one or more overrides are substituted for the application method.. . ... Vmware Inc

09/28/17 / #20170277558

Software application placement using computing resource containers

Embodiments associate software applications with computing resource containers based on a placement rule and a selected failure correlation. A placement rule indicates that a first software application is to be co-located with a second software application during execution of the first and second software applications. ... Vmware Inc

09/28/17 / #20170277555

Efficient vm migration across cloud using catalog aware compression

Techniques for migrating a vm in a hybrid cloud computing system are provided. The techniques include identifying a similar vm at the destination, comparing dictionaries for the vm to be transmitted and the similar vm, and compressing the vm based on the comparison. ... Vmware Inc

09/28/17 / #20170277553

Anomalous usage of resources by a process in a software defined data center

The present disclosure is related to systems and methods for analysis of anomalous usage of a resource. An example system can include a plurality of virtual computing instances (vcis) deployed in a software defined data center and a respective monitoring agent associated with each of the plurality of vcis. ... Vmware Inc

09/28/17 / #20170277408

Optimizing window resize actions for remoted applications

Techniques for optimizing window resize actions for a remoted application are provided, where the remoted application has a server-side window running within a remote desktop of a server system, and where the server-side window is made accessible to a user of a client system as a client-side window displayed in a client desktop of the client system. In one embodiment, the client system can receive from the server system a notification that the server-side window is being resized in the remote desktop, and can determine that the user is currently entering one or more input commands for resizing the server-side window. ... Vmware Inc

09/21/17 / #20170272420

Web client plugin manager in vcenter managed object browser

. . A method is provided for a plug-in manager in a virtual machine (vm) system to install or update a plug-in at a web client server in the vm system. The plug-in extends the web client server with a user interface element to interact with a management entity implemented as a vm in the vm system. ... Vmware Inc

09/21/17 / #20170270449

Methods and systems to determine container costs and attribute container costs to applications

Methods and system to calculate a total container cost of each container of a data center are described. Methods compute a direct container cost of each container running in the data center based on container resource utilization and a resource utilization rate of each resource of a host. ... Vmware Inc

09/21/17 / #20170270284

Converting licenses from one product to another product

A method for converting licenses from one product to another product is described. The method includes: accessing client product license information for a client, wherein the client product license information comprises product licenses acquired by the client; determining if the client product license information comprises an available license that covers the first product and that could cover the second product associated with the client; and if a status determination is made that the available license exists, then presenting a discovered available license for conversion from covering the first product to cover the second product.. ... Vmware Inc

09/21/17 / #20170270108

System for supporting remote accesses to a host computer from a mobile computing device

Users of a client computer having non-conventional input devices interact with a host computing platform with the same user experience as if he or she was operating the client computer natively. This is achieved by having the non-conventional input devices of the client device appear local to the applications that are running on the host platform, even though the host computing platform may not be equipped with drivers for the non-conventional input devices.. ... Vmware Inc

09/21/17 / #20170270012

Maintaining consistency using reverse replication during live migration

Examples maintain consistency of writes for a plurality of vms during live migration of the plurality from a source host to a destination host. The disclosure intercepts i/o writes to a migrated vm at a destination host and mirrors the i/o writes back to the source host. ... Vmware Inc

09/14/17 / #20170264684

Container runtime image management across the cloud

Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file. ... Vmware Inc

09/14/17 / #20170262465

File granular data de-duplication effectiveness metric for data de-duplication

In accordance with the present disclosure, files may be deduplicated in a distributed storage system having a plurality of storage volumes. A uniqueness metric for each file may indicate a degree of deduplication of the respective data files in the given storage volume. ... Vmware Inc

09/14/17 / #20170262374

System and methods of a cpu-efficient cache replacement algorithm

A method of updating a cache data structure that includes first, second, and third queues includes the step of storing contents of a data item in a cache location in response to a read or write input/output operation (io) that accesses the data item. If the data item is not tracked in any of the first, second, and third queues, the data item is added to the first queue with the cache location of the data item. ... Vmware Inc

09/14/17 / #20170262308

Systems and methods for modifying an operating system for a virtual machine

Systems, methods, and software are described herein for operating a data management system, including executing an attached application and application data on a first virtual machine running a first operating system, separating the attached application and application data from the first virtual machine, and dynamically attaching the application and application data to a second virtual machine running an updated version of the first operating system.. . ... Vmware Inc

09/14/17 / #20170262299

Method and system for taking checkpoints at varying intervals

The method of taking checkpoints of a virtual computing instance running in a first host computer at varying time intervals includes queuing outgoing network data packets of the virtual computing instance during execution of the virtual computing instance, triggering a process to take the checkpoint, the process including generating a checkpoint information packet and transmitting the checkpoint information packet to a second host computer, and upon receiving acknowledgement from the second host computer of receipt of the checkpoint information packet, releasing the outgoing network data packets of the virtual computing instance that have been queued and not released. The triggering time for the process to take the checkpoint is dependent on characteristics of workload executed by the virtual computing instance.. ... Vmware Inc

09/14/17 / #20170262215

Swap file defragmentation in a hypervisor

Memory data for a virtual machine can be stored in a swap file, which is comprised of storage blocks. A defragmentation procedure can be performed on a thin swap file while the virtual machine is still running. ... Vmware Inc

09/07/17 / #20170255890

Methods and systems to optimize operating system license costs in a virtual data center

Methods and systems assist data center customer to plan virtual data center (“vdc”) configurations, create purchase recommendations to achieve either an expansion or contraction of a vdc, and optimize the data center cost. Methods generate recommendations on lower cost combinations of virtual machine (“vm”) guest os licenses, server computer hardware and vm software to optimize the costs are generated, generate data center customer plans for additional vms with quest os for a projected period of time, provide recommendations on lower cost combination of guest os licenses, server hardware, and vm software to optimize the cost. ... Vmware Inc

09/07/17 / #20170255537

Data-agnostic adjustment of hard thresholds based on user feedback

This disclosure is directed to data-agnostic computational methods and systems for adjusting hard thresholds based on user feedback. Hard thresholds are used to monitor time-series data generated by a data-generating entity. ... Vmware Inc

09/07/17 / #20170255454

Methods and apparatus to generate a customized application blueprint

Methods and apparatus to generate a customized application blueprint are disclosed. An example method includes generating an application definition for an unmanaged application associated with a first computing unit, selecting a first logical template associated with an unmodified version of a service provided by the first computing unit, generating an application blueprint including the first logical template, modifying the first logical template included in the application blueprint based on a first property of the first computing unit, inserting a dependency between a first logical template representative of the first computing unit and a second logical template representative of a second computing unit, and deploying a managed application according to the application blueprint to implement the unmanaged application.. ... Vmware Inc

09/07/17 / #20170255363

Method for dynamically presenting status information of a monitored system within a graphical user interface

In a computer-implemented method for dynamically presenting status information of a monitored system within a graphical user interface, a first view is displayed within the graphical user interface, the first view including a textual representation indicative of a status of a monitored system, the textual representation including at least one interactive portion that is user-selectable for presenting underlying information associated with the interactive portion. Responsive to a user selection, a second view is displayed within the graphical user interface, the second view including a plurality of status boxes representative of monitored attributes of the monitored system. ... Vmware Inc

08/31/17 / #20170250807

Application specific certificate management

Application specific certificate deployment may be provided. An application may generate a security certificate comprising a public key and a first private key. ... Vmware Inc

08/31/17 / #20170249357

Capturing components of an application using a static post-installation analysis of the system

A management agent operates transparently in the background on each endpoint computing device that needs to be managed. The agent performs a static analysis of the system on the endpoint computing device on which it is operating in order to capture the applications that have been installed on the endpoint device. ... Vmware Inc

08/31/17 / #20170249188

Load balancing of cloned virtual machines

A method, a non-transitory computer-readable storage medium, and a computer system for managing the placement of virtual machines in a virtual machine network are disclosed. In an embodiment, a method involves determining if at least one virtual machine in a set of virtual machines supporting a process and running on a first host computer needs to be separated from other virtual machines in the set. ... Vmware Inc

08/31/17 / #20170249186

Cpu scheduler configured to support latency sensitive virtual machines

A host computer has one or more physical central processing units (cpus) that support the execution of a plurality of containers, where the containers each include one or more processes. Each process of a container is assigned to execute exclusively on a corresponding physical cpu when the corresponding container is determined to be latency sensitive. ... Vmware Inc

08/31/17 / #20170249182

Virtual machine deployment and management engine

A virtual machine deployment and management engine deploys virtual machines to physical host computers based on a deployment time matrix. The deployment time matrix specifies approximate amounts of time used to clone or deploy a virtual machine from every host computer to every other host computer. ... Vmware Inc

08/31/17 / #20170249069

Preserving desktop state across login sessions

Techniques are described for preserving desktop state between login sessions in desktop computing environments. During an active login session of a desktop by a user, the system intercepts all requests to open a file and records the requested file paths. ... Vmware Inc

08/31/17 / #20170249065

Gesture-based workflow progression

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for displaying, by the one or more processors, at least one graphical representation associated with an electronic document on a touchscreen display; and receiving, by the one or more processors, user input to the at least one graphical representation, the user input indicating a touchscreen gesture to the touchscreen display, and in response: determining a type of the touchscreen gesture; determining a degree of the touchscreen gesture; identifying one or more actions based on the type and the degree, each action of the one or more actions being executable to progress through a workflow; and displaying one or more action elements on the touchscreen display, each action element representing an action of the one or more actions.. . ... Vmware Inc

08/24/17 / #20170244724

Provisioning work environments on personal mobile devices

A virtual business mobile device can be provisioned on a personal mobile device, by binding a mobile application for provisioning the business mobile device to a privileged component of a host operating system of the personal mobile device, wherein the binding enables a software virtualization layer and a management service component of the mobile application to execute in a privileged mode. The mobile application is then able to download a virtual phone image for the business mobile device and security-related policy settings relating to use of the business mobile device from a mobile management server, wherein the software virtualization layer is able to launch a virtual machine for the business mobile device based on the virtual phone image. ... Vmware Inc

08/24/17 / #20170243001

Method and system for facilitating replacement of system calls

One embodiment of the present invention provides system for facilitating replacement of a system function in an application with a customized function. During operation, the system shifts an existing load command in a file of an application to accommodate an additional load command. ... Vmware Inc

08/24/17 / #20170242764

High availability handling network segmentation in a cluster

A system and method for responding to a virtual machine (vm) network failure for a host in a network partition in a high availability (ha) cluster. The method includes providing a plurality of network partition response options; and receiving a selection of a first network partition response option from the plurality of network partition response options, the selected first network partition response option causing a processor to transfer execution of a vm on the host to a second host that has vm network connectivity upon detecting a vm network failure for the host.. ... Vmware Inc

08/24/17 / #20170242717

Methods and systems to determine and improve cost efficiency of virtual machines

Methods and systems to compute cost efficiency of virtual machines (“vms”) running in a private cloud are described. Methods and systems compute a cost efficiency value for each vm in the private cloud based on cost of the vm in the private cloud, cost of similar vms in the private cloud, price of similar vm running in the public cloud, and the cost of similar vms running in one or more private clouds in the same geographical area. ... Vmware Inc

08/17/17 / #20170237688

Central switch for coupling virtual desktops to peripheral devices

A method and system include compatibly interfacing a suitably adapted central switch in a computer network virtualization environment to one or more user-end peripheral device(s) to dispense with a need for a user-end thin client. The method and system also include appropriately routing a data associated with a direct and exclusive communication between a virtual machine on a host server including a number of virtual machines and the one or more user-end peripheral device(s) using the central switch.. ... Vmware Inc

08/17/17 / #20170235651

Reducing input/output (i/o) operations for centralized backup and storage

Techniques are described for reducing i/o operations and storage capacity requirements for centralized backup storage systems. A central server optimizes the collection and centralization of backup data from a number of endpoint devices for backup purposes. ... Vmware Inc

08/17/17 / #20170235493

Low-cost backup and edge caching using unused disk blocks

A designated storage system receives a request to store data in the local storage as a backup copy. The designated storage system requests a file system in the computer system to store the backup copy as a file in the local storage and maintains a record describing storage locations for each of the one or more sets of contiguous available file system data blocks. ... Vmware Inc

08/10/17 / #20170230449

Method for monitoring elements of a distributed computing system

In an embodiment, a method for monitoring elements of a distributed computing system is disclosed. In the embodiment, the method involves evaluating a metric event from a monitored element based on at least one of tags and conditions of the monitored element by applying declared group functions corresponding to declared groups over the metric event and at least one of admitting the monitored element into membership of a declared group, evicting the monitored element from membership of a declared group, and maintaining membership of the monitored element in a declared group based on the evaluation of the metric event.. ... Vmware Inc

08/10/17 / #20170228320

Synchronizing a translation lookaside buffer with page tables

The translation lookaside buffer (tlb) of a processor is kept in synchronization with a guest page table by use of an indicator referred to as a “t” bit. The t bit of the npt/ept entries mapping the guest page table are set when a page walk is performed on the npt/ept. ... Vmware Inc

08/10/17 / #20170228246

Effective and efficient virtual machine template management for cloud environments

Techniques are provided for reducing the amount of data that to be transferred in a hybridcloud system in order to spawn a vm at a private cloud computing system from a template library stored in a public cloud computing system. Instead of storing full virtual machine templates, template libraries at the public cloud computing system are “differential” libraries. ... Vmware Inc

08/10/17 / #20170228244

Menu bar integration in desktop virtualization environments

A system is described for integrating menu bars of applications executed on a virtual machine in a computing device with menu bars in the host operating system. A hosted hypervisor is executed on the computing device. ... Vmware Inc

08/10/17 / #20170228227

Single, logical, multi-tier application blueprint used for deployment and management of multiple physical applications in a cloud infrastructure

A deployment system enables a developer to define a logical, multi-tier application blueprint that can be used to create and manage (e.g., redeploy, upgrade, backup, patch) multiple applications in a cloud infrastructure. In the application blueprint, the developer models an overall application architecture, or topology, that includes individual and clustered nodes (e.g., vms), logical templates, cloud providers, deployment environments, software services, application-specific code, properties, and dependencies between top-tier and second-tier components. ... Vmware Inc

08/03/17 / #20170223012

System and method for transferring device identifying information

Disclosed are various examples for determining whether a client device complies with compliance rules while authenticating a user account. A client certificate can include an identifier corresponding to a client device. ... Vmware Inc

08/03/17 / #20170223010

Single sign on for a remote user session

A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (sso) process. The sso process includes the user entering his or her credentials and being authenticated to the connection broker. ... Vmware Inc

08/03/17 / #20170220777

Consistent snapshots and clones in an asymmetric virtual distributed file system

Processing in an asymmetrically distributed file system may include storing first data representative of the content of the files in a file system volume among a plurality of storage nodes. Second data representative of attributes of the files in the file system volume may be stored in only one of the storage nodes. ... Vmware Inc

08/03/17 / #20170220661

On-demand subscribed content library

A cluster management system and method for synchronizing content libraries within a distributed computer system allows an on-demand synchronization option of a content library subscribed to a publishing content library, which includes at least a consumable software item and metadata of the consumable software item, to be enabled. As a result of the on-demand synchronization option of the subscribed content library being enabled, the metadata of the consumable software item is downloaded from the publishing content library to the subscribed content library without downloading the consumable software item. ... Vmware Inc

08/03/17 / #20170220660

Intelligent content synchronization between content libraries

A cluster management system and method for synchronizing content libraries within a distributed computer system uses multiple replication processes to synchronize a subscribed content library with a publishing content library, which includes at least a consumable software item and metadata of the consumable software item. If the consumable software item of the publishing content library can be replicated at the subscribed content library using a first data replication process, then the consumable software item of the publishing content library is replicated at the subscribed content library using the first data replication process. ... Vmware Inc

08/03/17 / #20170220598

Fine-grained metadata management in a distributed file system

Techniques for performing fine-grained metadata management in a distributed file system (dfs) are provided. In one embodiment, each node in a plurality of nodes implementing the dfs can execute a namespace metadata service that is dedicated to managing file system metadata pertaining to one or more namespaces of the dfs. ... Vmware Inc

08/03/17 / #20170220381

Implicit co-scheduling of cpus

Techniques for implicit coscheduling of cpus to improve corun performance of scheduled contexts are described. One technique minimizes skew by implementing corun migrations, and another technique minimizes skew by implementing a corun bonus mechanism. ... Vmware Inc

08/03/17 / #20170220374

Live migration of virtual machines with memory state sharing

Embodiments described herein rapidly pre-migrate child virtual machines (vms) by leveraging shared memory resources between parent and child vms. In a first, proactive phase, at least a portion of the memory of a parent vm is migrated to a plurality of potential target hosts. ... Vmware Inc

08/03/17 / #20170220367

Offline hadoop deployment anomaly identification

A method includes receiving a trace of a job in a distributed computing system and a topology of the system and determining performance indicators of each virtual node's (1) busyness from executing its share of local resource and network dependent tasks in the job, (2) efficiency for executing its share of the local resource tasks, and (3) efficiency for executing its share of the network dependent tasks. The method includes aggregating performance indicators of each host's virtual nodes and determining if one of the hosts is least efficient in executing its share of the local resource and the network dependent tasks. ... Vmware Inc

07/27/17 / #20170214738

Node selection for message redistribution in an integrated application-aware load balancer incorporated within a distributed-service-application-controlled distributed computer system

The current document is directed to an integrated application-aware load-balancing component of a distributed computer system. The integrated application-aware load-balancing component is, in a described embodiment, incorporated within a distributed application that serves as a control component of multiple physical computers within a distributed computer system. ... Vmware Inc

07/27/17 / #20170214737

Integrated application-aware load balancer incorporated within a distributed-service-application-controlled distributed computer system

The current document is directed to an integrated application-aware load-balancing component of a distributed computer system. The integrated application-aware load-balancing component is, in a described embodiment, incorporated within a distributed application that serves as a control component of multiple physical computers within a distributed computer system. ... Vmware Inc

07/27/17 / #20170214578

Method for managing a software-defined data center

A method for managing a software-defined data center is disclosed. The method involves implementing redundant cloud management stacks, processing duplicate application program interface (api) calls in parallel with the redundant cloud management stacks, and performing a data center operation corresponding to the processed duplicate api calls.. ... Vmware Inc

07/27/17 / #20170212843

Large-page optimization in virtual memory paging systems

A computer system that is programmed with virtual memory accesses to physical memory employs multi-bit counters associated with its page table entries. When a page walker visits a page table entry, the multi-bit counter associated with that page table entry is incremented by one. ... Vmware Inc

07/20/17 / #20170208010

Data transmission using modified weighted fair queue algorithm

To transmit data packets over a shared data path, data packets of a first message and a second message are received and stored, respectively, in first and second queues. First and second data packets are then extracted from, respectively, the first and second messages. ... Vmware Inc

07/13/17 / #20170199674

Data deduplication with support for both thick and thin provisioning of storage objects

Techniques for implementing data deduplication in conjunction with thick and thin provisioning of storage objects are provided. In one embodiment, a system can receive a write request directed to a storage object stored by the system and can determine whether the storage object is a thin or thick object. ... Vmware Inc

07/06/17 / #20170192989

File system based key value service

Embodiments perform distributed management of an inventory of a shared, distributed storage device. Host computing devices accessing the storage device maintain, on the storage device, journaling files of the storage events performed by each of the host computing devices. ... Vmware Inc

07/06/17 / #20170192850

Time-differential user interface for datacenter management

A user interface (ui) uses overlays to tag representations of datacenter components with indications of changes that have occurred over a selected time interval. Log files, problem and service reports, and knowledge base items are gathered at various times to generate datacenter snapshots. ... Vmware Inc

07/06/17 / #20170192814

Rapid suspend/resume for virtual machines via resource sharing

Examples quickly suspend and resume virtual desktops on demand or on schedule. Virtual desktops, or desktops as a service, are provided to users, where the virtual desktop is a forked vm, cloned vm, or otherwise at least a partial duplicate of an existing vm. ... Vmware Inc

07/06/17 / #20170192802

Cloud computing simulator

A method for simulating a virtual computing environment includes specifying one or more flavors of resource consumers and one or more flavors of datastores to be provisioned on a tree of hosts for a simulation of a distributed virtualization scheduler. The method also includes generating a tree of hosts for the resource consumers and datastores based on the specified flavors and using a tree generator component of the distributed virtualization scheduler. ... Vmware Inc

06/29/17 / #20170187679

Firewall configured with dynamic membership sets representing machine attributes

A method is provided to control the flow of packets within a system that includes one or more computer networks comprising: policy rules are provided that set forth attribute dependent conditions for communications among machines on the one or more networks; machine attributes and corresponding machine identifiers are obtained for respective machines on the networks; and policy rules are transformed to firewall rules that include machine identifiers of machines having attributes from among the obtained machine attributes that satisfy the attribute dependent policy rules.. . ... Vmware Inc

06/29/17 / #20170187590

Monitoring element hierarchies in a cloud computing system

An example method of monitoring elements in a cloud computing system includes partitioning, an address space of a hierarchy of service elements into a plurality of address subspaces managed by a respective plurality of processing nodes. The method further includes receiving time series data from a service element, routing the time series data to a first processing node based on an address of the service element within the hierarchy, and processing the time series data at the first processing node to update metric data maintained for the service element. ... Vmware Inc

06/29/17 / #20170186147

Quantitative visual perception quality measurement for virtual desktops

Techniques are described for improving the measurement of visual perception of graphical user interface (gui) information remoted to client devices in virtual desktop environments, such as vdi and daas. An objective image quality measurement of remoted virtual desktop interfaces is computed, that is more accurate and more closely aligned with subjective user perception. ... Vmware Inc

06/29/17 / #20170185444

System for batch processing of workflows for virtualized infrastructure

A system for workflow processing for a virtualized infrastructure is disclosed. The system utilizes a virtualized object repository that maintains a repository of available virtualized objects. ... Vmware Inc

06/22/17 / #20170180251

Fast software l2 switching using a caching technique

In a system that includes a physical forwarding element (pfe), the mapping of each possible destination mac address to a destination port number of the pfe is stored in a mapping table. A destination port number on the pfe is identified for a first packet in a sequence of packets arrived at a source port of the pfe by searching the mapping table and stores the destination port number in a caching table. ... Vmware Inc

06/22/17 / #20170180184

Remote access over internet using reverse session-origination (rso) tunnel

A remote user sends a user request to a relay server that, in turn, forwards the user request (modified or unmodified) through a reverse session-origination (rso) tunnel to an on-premises network client. In other words, while the user requests flow from outside the client network to the client network, the requests of the delivery protocol for the tunnel flow in the reverse direction, i.e., from the client network toward the relay server and/or the remote user. ... Vmware Inc

06/22/17 / #20170178600

Application/window aware image caching system

A method for caching images in a virtual environment uses hash tables to store information about an application or window and to store updated images. Suitable areas of applications or windows are fixed relative to the window for many cases, and also include a relatively small number of possible display statuses. ... Vmware Inc

06/22/17 / #20170177840

System and method for enabling end-user license enforcement of isv applications in a hybrid cloud system

System and computer-implemented method for enabling end-user license enforcement of an application in a hybrid cloud system use data associated with at least one component of a public cloud computing environment of the hybrid cloud system to detect an environment-changing event involving at least one processing entity in the hybrid cloud system. Once the environment-changing event is detected, one or more operating environment identifiers are injected into the processing entity. ... Vmware Inc

06/22/17 / #20170177574

System and method of supporting user level file system transactions using batch rename and file clones

System and method for supporting a user-level file system transaction use cloned files of original existing files specified in the user-level file system transaction to perform file system operations on at least one of the original existing files using the cloned files, which include metadata of the original existing files. After at least one of the cloned files have been modified, a batch rename operation is executed to atomically commit every modified cloned file of the user-level file system transaction.. ... Vmware Inc

06/22/17 / #20170177441

Lazy transmission of memory pages during checkpointing

During checkpointing of a virtual computing instance running in a first host computer, memory pages that have been modified during a checkpoint time interval are lazily transmitted from the first host computer to a second, backup, host computer. The lazy transmission technique includes the steps of stunning the virtual computing instance at the end of the time interval, and after said stunning, (i) detecting at the first host computer the memory pages that have been modified during the time interval, and (ii) copying one or more of the modified memory pages to a memory region in the first host computer. ... Vmware Inc

06/22/17 / #20170177238

Rapid virtual machine power-on with iterative swap space reservation

A computer system provides for rapid power-on operations on virtual machines (vms) with a virtual memory space including a reservation from machine memory and a small or no swap size. When the computer system powers on a vm, the computer system creates a physical memory space for the vm with a size larger than the minimum memory reservation for the vm and a swap space with a size less than the difference between the size of the virtual memory space and the minimum memory reservation. ... Vmware Inc

06/15/17 / #20170171213

Application publishing using memory state sharing

Examples described herein enable memory state sharing among a plurality of virtual machines (vm) including a parent vm and a child vm. A request for memory state sharing between the parent vm and the child vm is received, and the parent vm is suspended. ... Vmware Inc

06/15/17 / #20170171157

Techniques for communication in hybrid cloud system

Techniques for communication in a hybrid cloud computing system. The techniques include utilizing cross-origin resource sharing to allow a web-based application to communicate with both a public host computer and a private host computer of the hybrid cloud computing system. ... Vmware Inc

06/15/17 / #20170171091

Selective network traffic throttling

Exemplary methods, apparatuses, and systems a management server receiving, from a switch, an indication of network congestion at the switch. The indication includes one or more contributors to the network congestion. ... Vmware Inc

06/15/17 / #20170171019

Storage provisioning and configuration of network protocol parameters

Exemplary methods, apparatuses, and systems include a management server receiving, from each of a plurality of switches, physical topology data of network nodes. The physical topology data includes identifiers of hosts connected to each of the switches and identifiers of storage connected to each of the switches. ... Vmware Inc

06/15/17 / #20170170963

Step-up authentication for single sign-on

A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a primary token that is associated with a first authentication event of the user and authenticates the user to access the first resource, and receiving a first request to access the second resource. ... Vmware Inc

06/15/17 / #20170168948

Sizing cache data structures using fractal organization of an ordered sequence

A cache is sized using an ordered data structure having data elements that represent different target locations of input-output operations (ios), and are sorted according to an access recency parameter. The cache sizing method includes continually updating the ordered data structure to arrange the data elements in the order of the access recency parameter as new ios are issued, and setting a size of the cache based on the access recency parameters of the data elements in the ordered data structure. ... Vmware Inc

06/15/17 / #20170168906

Providing fault tolerance in a virtualized computing environment through a migration approach based on resource availability

An example method is described to provide fault tolerance in a virtualized computing environment with a first fault domain and a second fault domain. The method may comprise determining whether a primary virtualized computing instance and a secondary virtualized computing instance are both in the first fault domain. ... Vmware Inc

06/15/17 / #20170168905

Providing fault tolerance in a virtualized computing environment through a swapping approach

An example method is described to provide fault tolerance in a virtualized computing environment with a first fault domain and a second fault domain. The method may comprise determining whether a first primary virtualized computing instance and a first secondary virtualized computing instance are both in the first fault domain. ... Vmware Inc

06/15/17 / #20170168715

Workload aware numa scheduling

Disclosed herein are techniques for performing workflow-aware numa (non-uniform memory access) optimizations. “execution contexts” such as virtual machines or docker containers are managed within a computer system that includes multiple numa nodes, each including a processor socket and memory local to that socket. ... Vmware Inc

06/15/17 / #20170168714

Methods and systems to allocate physical data-storage costs to logical disks

Methods and systems are directed to allocating costs of storage arrays to logical disks. A fully loaded cost of storage of a storage area network (“san”) is calculated based on capital and operational expenditures of the san. ... Vmware Inc

06/08/17 / #20170163732

Inter-task communication within application-release-management pipelines

The current document is directed to an automated-application-release-management controller within an automated-application-release-management subsystem of a workflow-based cloud-management system that provides mechanisms for parameter-value exchanges between tasks of an application-release-management pipeline. Pipeline parameters and task-output parameters are stored in the execution context of the automated-application-release-management controller. ... Vmware Inc

06/08/17 / #20170163669

Methods and systems to detect anomalies in computer system behavior based on log-file sampling

Methods and systems that detect computer system anomalies based on log file sampling are described. Computers systems generate log files that record various types of operating system and software run events in event messages. ... Vmware Inc

06/08/17 / #20170163518

Model-based artifact management

The current document is directed to cloud-based cloud-management systems and subsystem components of the management systems that store, retrieve, use, and manipulate artifacts. In the described implementations, artifacts are represented by artifact descriptors, referred to as “artifact specs,” which are instantiated, at run time, as corresponding artifact models. ... Vmware Inc

06/08/17 / #20170163492

Branching application-release-management pipelines with inter-pipeline dependencies

The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. ... Vmware Inc

06/08/17 / #20170163429

Cryptographic proxy service

A cryptographic proxy service may be provided. Upon determining that data associated with a network destination comprises at least some sensitive data, a cryptographic service may provide a security certificate associated with the network destination. ... Vmware Inc

06/08/17 / #20170163419

Encrypted file storage

Various systems facilitate encrypted file storage. A client device may generate an encrypted version of a file. ... Vmware Inc

06/08/17 / #20170161865

Method and system to virtualize graphic processing services

Methods and systems configured to virtualize graphic processing services in a virtual machine environment are disclosed. A virtual machine monitor (vmm) may be configured to maintain a virtual machine (vm) based on a host operating system (os) executing in the system. ... Vmware Inc

06/08/17 / #20170161101

Modularized automated-application-release-management subsystem

The current document is directed to an automated-application-release-management subsystem, or facility, that organizes and manages the application-development and application-release processes to allow for continuous application development and release. The current document is particularly directed to implementations in which the automated application-release-management subsystem is highly modularized to provide plug-in compatibility with a large variety of external, third-party subsystems, libraries, and functionalities. ... Vmware Inc

06/08/17 / #20170161084

Using contextual and spatial awareness to improve remote desktop imaging fidelity

Image data representing a desktop image for a client device that is accessing the desktop remotely is compressed according to a method that preserves image fidelity in selected non-text regions. The method, which is carried out in a remote server, includes the steps of generating image data for the remote desktop image and analyzing different regions of the remote desktop image, identifying those regions of the remote desktop image that are text regions, selecting non-text regions of the remote desktop image for lossless compression based on a spatial relationship between the non-text regions and the text regions, compressing the image data using a lossless compression protocol for a portion of the image data corresponding to the selected non-text regions, and transmitting the compressed image data to the client device.. ... Vmware Inc

06/08/17 / #20170161082

Linking virtualized application namespaces at runtime

A method for linking a plurality of virtualized application packages for execution on a computer system is described. A runtime executable of a primary virtualized application package is launched. ... Vmware Inc

06/08/17 / #20170161073

Method to efficiently trigger concurrency bugs based on expected frequencies of execution interleavings

A method includes determining a set of shared memory access instructions and execution frequencies and selecting one or more groups of instructions that access a same memory location. The method also includes finding pairs of instructions from each group, for which another access to the same memory location may occur between execution of the instructions in the pair, and estimating a probability that a data race may occur using a time gap between the instructions and the execution frequencies, and generating a list of instruction tuples that include the pair of instructions. ... Vmware Inc

06/08/17 / #20170161057

Plug-in-based artifact-management subsystem

The current document is directed to an artifact-management subsystem and interface to the artifact-management subsystem that is, at least in part, implemented by plug-ins to a particular artifact repository. The currently disclosed artifact-management-subsystem interface includes a comprehensive set of search types, using which particular artifacts can be identified and retrieved from various artifact repositories. ... Vmware Inc

06/08/17 / #20170161046

System for managing software package configuration

A method for managing a software package, including: accessing a request to process one or more package definitions in relation to a data repository which retains package definitions, wherein the one or more package definitions is associated with the software package; determining a status of an assertion that indicates either a completed assertion or an incomplete assertion; if the status is determined to be the incomplete assertion, then determining requirements for the software package to be configured for the hyper-converged appliance; attempting to find a match for the assertion in a pool of known resolvable assertions, wherein the match will allow the assertion to be resolved through accessible provisions and thereby fulfil the requirements; if the match is found, then using the accessible provisions to resolve and thereby complete the assertion; and if the assertion is completed, continuing an installation process of the software package.. . ... Vmware Inc

06/08/17 / #20170161044

Automated-application-release-management subsystem that incorporates script tasks within application-release-management pipelines

The current document is directed to an automated-application-release-management subsystem that executes application-release-management pipelines that includes one or more tasks and/or stages, execution of which launch execution of scripts on specified host computers. The capability for launching scripts from application-release-management-pipeline tasks and stages provides flexibility in design and development of application-release-management pipelines and provides an incremental path for migration of legacy-script-based application-release management to automated pipeline-based application-release management.. ... Vmware Inc

06/08/17 / #20170161043

Integrated automated application deployment

The current document is directed to an integrated cloud-management facility, or subsystem, that incorporates an automated-application-deployment-facility integrator that incorporates one or more automated-application-deployment facilities into the cloud-management facility. The automated-application-deployment-facility integrator allows users of the cloud-management facility to access one or more automated-application-deployment facilities within the context of the cloud-management facility. ... Vmware Inc

06/08/17 / #20170161042

Deployment of processing components of computing infrastructure using annotated command objects

System and method for deploying a processing component of a computing infrastructure in a computing environment with host computers use an annotated command object that includes an identifier, at least one requirement and a command to deploy the processing component. When the annotated command object is processed, the at least one requirement of the annotated command object is satisfied, which includes processing another annotated command object to deploy at least one of a required processing component and a required feature of a particular processing component. ... Vmware Inc

06/08/17 / #20170161023

Automated application-release-management subsystem

The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks.. ... Vmware Inc

06/01/17 / #20170155691

Exclusive session mode resilient to failure

Examples perform input/output (i/o) requests, issued by a plurality of clients to an owner-node, in a virtual storage area network (vsan) environment. I/o requests are guaranteed, as all i/o requests are performed during non-overlapping, exclusive sessions between one client at a time and the owner node. ... Vmware Inc

05/18/17 / #20170142432

Split framebuffer encoding

A virtual desktop can be remoted to a client device by transmitting a video stream using a video coding format, such as h.264, where higher resolution video can be streamed than natively supported by the encoder or decoder. The encoder framebuffer is divided into a plurality of equal size child buffers, each child buffer is assigned an identifier for identifying the child buffer. ... Vmware Inc

05/18/17 / #20170142020

Framework for early congestion notification and recovery in a virtualized environment

The congestion notification system of some embodiments sends congestion notification messages from lower layer (e.g., closer to a network) components to higher layer (e.g., closer to a packet sender) components. When the higher layer components receive the congestion notification messages, the higher layer components reduce the sending rate of packets (in some cases the rate is reduced to zero) to allow the lower layer components to lower congestion (i.e., create more space in their queues by sending more data packets along the series of components). ... Vmware Inc

05/18/17 / #20170141975

Monitoring network traffic by using event log information

A solution is provided for associating network traffic traversing a networked environment according to a selected category item, such as a user name or other network entity identity-related information. The solution includes a collector and a monitor. ... Vmware Inc

05/18/17 / #20170139731

Offline tools upgrade for virtual machines

A method for managing tools on a virtual machine includes provisioning a virtual machine. The method also includes, before powering on the virtual machine, collecting a list of one or more tools on the virtual machine, and a version associated with each of the one or more tools. ... Vmware Inc

05/18/17 / #20170139724

Method of workspace modeling

In a method of workspace modeling, a user selection of a step is received at a workflow region of a workspace modeler, the workflow region including a plurality of steps, wherein at least one step of the plurality of steps is unavailable for user selection prior to satisfaction of a prerequisite condition associated with another step of the plurality of steps, and wherein available steps of the plurality of steps are selectable in any order by a user. Access to a plurality of objects associated with the step is provided in response to the user selection of the step, wherein the plurality of objects are selectable by the user for inclusion in a content region of the workspace modeler. ... Vmware Inc

05/18/17 / #20170139697

Offline tools installation for virtual machines

A method for managing tools on a virtual machine includes provisioning a virtual machine. The method also includes, before powering part the virtual machine, collecting a list of one or more tools on the virtual machine, and a version associated with each of the one or more tools. ... Vmware Inc

05/18/17 / #20170139695

Application blueprints based on service templates to deploy applications in different cloud environments

Disclosed examples to configure an application blueprint involve selecting, during a runtime phase, a first service and a second service from a plurality of services mapped to a service template, the service template bound to a node by an application blueprint, the application blueprint generated during a design phase; generating, during the runtime phase, a first deployment profile to deploy a first application on the node in a cloud environment, the first deployment profile based on the application blueprint, the first deployment profile identifying the first service; and generating, during the runtime phase, a second deployment profile to deploy a second application on the node in the cloud environment based on the application blueprint, the second deployment profile identifying the second service.. . ... Vmware Inc

05/11/17 / #20170134519

Deploying an application in a multiple cloud computing environments

An example method is provided to deploy an application in multiple cloud computing environments. The method may comprise a computing system generating a first request to deploy an application in a first cloud computing environment according to a first deployment plan and a second request to deploy the application in a second cloud computing environment according to a second deployment plan. ... Vmware Inc

05/11/17 / #20170134507

Application-specific data in-flight (dif) services along a communication path selected based on a dif services policy associated with a vm

Embodiments provide data in-flight (dif) services to software applications such as virtual machines (vms) at an application level without requiring modification to established storage protocols. In exemplary embodiments, a software application is associated with a dif services policy indicating one or more dif services to apply to the software application. ... Vmware Inc

05/11/17 / #20170134420

Virtual machine compliance checking in cloud environments

A method of transferring a virtual machine between a virtualized computing system and a cloud computing system includes determining that a virtual machine is to be transferred from a virtualized computing system to a cloud computing system and determining a connection between a first resource in the virtualized computing system and a second resource in the cloud computing system. Files that enable implementation of the virtual machine at the virtualized computing system and identified, as are file portions of the files for transfer from the virtualized computing system to the cloud computing system. ... Vmware Inc

05/11/17 / #20170134301

Deploying an application in a hybrid cloud computing environment

An example method is provided for a computing system in a private cloud computing environment to deploy an application in a hybrid cloud computing environment. The method may comprise generating a request to deploy an application in a public cloud environment, the request including a deployment plan that specifies one or more tasks to be executed by a virtual computing resource from a cloud provider to deploy the application. ... Vmware Inc

05/04/17 / #20170126754

Wide area aggregated communications

Methods, systems, and techniques for federating operations, in an optimized way using wide area networks are provided. Example systems provide an api for generating and handling federated requests as an aggregation. ... Vmware Inc

05/04/17 / #20170126700

Content access for duration of calendar events

Content access for the duration of a calendar event may be provided. Upon receiving a calendar invitation comprising a start time, an end time, and an encrypted attachment, a user may accept or reject the calendar invitation. ... Vmware Inc

05/04/17 / #20170124112

Data mover permitting data transfer without transferring data between application and operating system

In a computer system with a disk array that has physical storage devices arranged as logical storage units and is capable of carrying out hardware storage operations on a per logical storage unit basis, data movement operations can be carried out on a per-file basis. A data mover software component for use in a computer or storage system enables cloning and initialization of data to provide high data throughput without moving the data between the kernel and application levels.. ... Vmware Inc

05/04/17 / #20170123852

Methods and systems to allocate logical disk costs to virtual machines in a virtual data center

Methods and systems allocate storage costs to virtual machines (“vms”) in a virtual data center. Methods calculate a datastore-base rate based on datastore utilized-storage capacity in each ld and each ld-base rate when the datastore utilized-storage capacity and each ld-base rate are available. ... Vmware Inc

05/04/17 / #20170123831

Compositing data model information across a network

A method for managing a virtual infrastructure is described. The method includes: generating a configuration information model representing a virtual infrastructure based on known virtual machines and network settings thereon; querying one or more sources of truth other than the known virtual machines, wherein the one or more sources of truth includes a data storage that stores at least one data object that answers a particular question; and comparing the data from the one or more sources of truth with a store of configuration model information, wherein the configuration model information comprises a time stamp and a source identifier; based on the comparing, generates a set of rules; and based on the set of rules, updates the configuration information model.. ... Vmware Inc

05/04/17 / #20170123746

Systems and methods for using screen sampling to detect display changes

A graphical user interface (gui) is polled to identify updates for transmission to a client device. A generalized poll of the gui is conducted at a first frequency, wherein the poll compares color values of each pixel in a general region of the gui with a previously known color value for that pixel to detect changed pixel color values. ... Vmware Inc

04/27/17 / #20170118647

Transmitting management commands to a client device

Disclosed are various examples of transmitting management commands to a device using a short message service (sms) message or voice call. A device may lack network connectivity with a management service. ... Vmware Inc

04/27/17 / #20170118310

Single data transmission using a data management server

Techniques for processing application data are described. The techniques include transmitting packets of application data to a data management server. ... Vmware Inc

04/27/17 / #20170118273

Hybrid cloud storage extension using machine learning graph based cache

Prefetching techniques for a hybrid cloud system are described. The techniques include maintaining a graph in a graph database, the graph including nodes associated with data items to be accessed and links between the nodes, each link including an associated link weight. ... Vmware Inc

04/27/17 / #20170118084

Configurable client filtering rules

Techniques for processing application data are described. The techniques include transmitting packets of application data to a data management server. ... Vmware Inc

04/27/17 / #20170116573

Item delivery optimization

Item delivery optimization may be provided. Items may be identified as available for delivery at a first location to at least one second location. ... Vmware Inc

04/27/17 / #20170116014

Policy based application monitoring in virtualized environment

A method is provided for an agent in a virtual machine (vm) and an application policy manager to implement application monitoring and remediation. The application policy manager provides a user interface for defining policies for applications running on vms where each policy includes monitoring conditions and remediation for the monitoring conditions. ... Vmware Inc

04/27/17 / #20170116009

Provisioning virtual desktops with stub virtual disks

A system is described allowing a virtual desktop to be booted directly from a desktop image stored in a backup database without requiring content from the desktop image to be copied into the virtual disk of the virtual machine hosting the virtual desktop. The hosting virtual machine contains a synthetic virtual disk acting as a stub disk by redirecting read requests targeted for the synthetic disk from the guest operating system to corresponding locations of the storage where the desktop image is kept.. ... Vmware Inc

04/20/17 / #20170111291

Virtual computing services deployment network

A virtual computing services deployment network provides a consistent user experience from a variety of locations via a connection fabric for accessing a virtual desktop. The connection fabric identifies a user profile defining the virtualized desktop resources required for a particular user. ... Vmware Inc

04/20/17 / #20170109212

Methods and systems to determine and improve cost efficiency of virtual machines

Methods and systems to compute cost efficiency of virtual machines (“vms”) running in a private cloud are described. Methods and systems compute a cost efficiency value for each vm in the private cloud based on cost of the vm in the private cloud, cost of similar vms in the private cloud, price of similar vm running in the public cloud, and the cost of similar vms running in one or more private clouds in the same geographical area. ... Vmware Inc

04/20/17 / #20170109193

Systems and methods for customizing and programming a cloud-based management server

Systems and methods for managing software-as-a-service (saas) provided by a virtual machine are described. The system may include a management application, and may receive a feature package from the virtual machine. ... Vmware Inc

04/20/17 / #20170109188

Configuration settings for configurable virtual components

The present disclosure is related to systems, methods, and non-transitory machine readable media for virtual component revision. An example non-transitory machine readable medium can store instructions executable by a processing resource to cause a computing system store a change to a configuration setting among a plurality of configuration settings each associated with a configurable virtual component and store the plurality of configuration settings associated with the configurable virtual component.. ... Vmware Inc

04/13/17 / #20170104639

Management-as-a-service for on-premises information-technology systems

A management-as-a-service (maas) agent running on a sops creates collecting management statistics relating to the health, utilization, and performance of a subscriber on-premises system (sops). The maas agent forwards the collected data to a maas server, which stores the data in association with a tenant identifier (tid) in a multi-tenant database. ... Vmware Inc

04/13/17 / #20170104621

Network management as a service (maas) using reverse session-origination (rso) tunnel

A management-as-a-service (maas) agent running on a client network creates a reverse session-origination (rso) tunnel between the client network and a maas server. The maas agent collects client statistics at and regarding the client network and transmits the client statistics to the maas server. ... Vmware Inc

04/13/17 / #20170103117

Preserving user profiles across remote desktop sessions

User profiles of remote desktops are managed in a crash-consistent manner. When a user logs into a remote desktop, metadata of the user profile is loaded from persistent storage while registry settings and files of the user profile are loaded asynchronously with respect to the login. ... Vmware Inc

04/13/17 / #20170102876

Method for improving memory system performance in virtual machine systems

One or more embodiments provide techniques for accessing a memory page of a virtual machine for which loading might have been deferred, according to an embodiment of the invention, includes the steps of examining metadata of the memory page and determining that a flag in the metadata for indicating that the contents of the memory page needs to be updated is set, and updating the contents of the memory page.. . ... Vmware Inc

04/06/17 / #20170099362

Efficient communication within hybrid cloud system

Techniques for communicating between service nodes within a hybrid cloud computing system. These techniques include utilizing a messaging provider within an off-premise computing system to pass messages between off-premise servers holding a connection to an on-premise computer system and off-premise servers holding a connection to an end user computer system.. ... Vmware Inc

04/06/17 / #20170097837

Binary editing of applications executed by virtual machines

Systems and techniques are described for modifying an executable file of an application and executing the application using the modified executable file. A described technique includes receiving, by a virtual machine, a request to perform an initial function of an application and an executable file for the application. ... Vmware Inc

03/30/17 / #20170093790

Faster ip address allocation in a hybrid cloud environment using subnet selective randomization

Multiple tenants within a hybrid cloud computing system may need ip addresses to communicate over a computer network external to the hybrid cloud system (such as the internet). Ip addresses are a scarce resource, and each address can only be assigned to a single tenant. ... Vmware Inc

03/30/17 / #20170093669

Load response performance counters

The current document is directed to a new class of performance-monitoring tools referred as load response performance counters (“lrpcs”). Load response performance counters are implemented to periodically run a task within a computer system in order to apply a specific load to a particular subsystem or component of the computer system and to measure, at intervals, a response time for completing the task. ... Vmware Inc

03/30/17 / #20170091242

Tuning key space at the time of instantiation of a tree data structure

Techniques for tuning the key space of an instance of a tree data structure are provided. In one embodiment, a computer system can receive a request to create the instance, where the request includes an expected key space value indicating an expected range of key values to be addressed by the instance. ... Vmware Inc

03/30/17 / #20170091241

Leveraging hierarchy in a tree data structure to dynamically allocate keys

Techniques for dynamically allocating keys in an instance of a tree data structure are provided. In one embodiment, a computer system can, at a time of instantiating each non-root node in the instance, determine a key space to be addressed by the non-root node, where the key space is based on a key subinterval in a parent node of the non-root node that is associated with a pointer to the non-root node. ... Vmware Inc

03/23/17 / #20170084062

Performance diagnostic for virtual machines

A method for a processor to provide a chart of a performance metric in a collection interval includes creating regions by dividing the collection interval into regions of increasingly smaller time intervals and determining a mean and a variance for each region based on data points in that region, sorting the regions by their variances and means, and processing the sorted regions. Processing the sorted regions includes removing any child region when its parent region has a variance that substantially represents the child region, and replacing any two neighboring or intersecting regions with a merged region comprising the two neighboring or intersecting regions when the merged region has a variance that substantially represents the two neighboring or intersecting regions. ... Vmware Inc

03/23/17 / #20170083411

Space efficient persistence of an in-memory table

Techniques for efficiently storing the state of an in-memory table to persistent storage are described. In one embodiment, one or more requests to update an entry in an in-memory table with one or more values are received, wherein the in-memory table is stored in non-persistent memory. ... Vmware Inc

03/23/17 / #20170083371

Dynamic resource configuration based on context

Aspects of the disclosure allocate shares of processing resources or other physical resources among virtual machines (vms) operating as, for example, virtual desktops on a plurality of host computing devices. Allocations of resources are adjusted based on the user activity, vm activity, and/or application activity detected by an agent executing on each vm. ... Vmware Inc

03/23/17 / #20170083360

Adaptive dynamic selection and application of multiple virtualization techniques

Autonomous selection between multiple virtualization techniques implemented in a virtualization layer of a virtualized computer system. The virtual machine monitor implements multiple virtualization support processors that each provide for the comprehensive handling of potential virtualization exceptions. ... Vmware Inc

03/23/17 / #20170083358

Methods and apparatus to automatically configure monitoring of a virtual machine

Methods and apparatus to automatically configure monitoring of a virtual machine are disclosed. An example method includes identifying a first virtual machine in a first application definition. ... Vmware Inc

03/16/17 / #20170078387

Framework for distributed key-value store in a wide area network

A distributed key-value storage system may include a master node. The key-value store may be distributed among first and second nodes. ... Vmware Inc

03/16/17 / #20170075795

Identifying test gaps using code execution paths

Systems and techniques are described for identifying test gaps. A described technique includes identifying production code paths for an application. ... Vmware Inc

03/16/17 / #20170075729

System and method for controlling resource revocation in a multi-guest computer system

At least one guest system, for example, a virtual machine, is connected to a host system, which includes a system resource such as system machine memory. Each guest system includes a guest operating system (os). ... Vmware Inc

03/16/17 / #20170075715

Automated scaling of application in virtual data centers

A system and method for autoscaling a multi-tier application, that has components executing on a plurality of tiers of a virtual data center, allocates resources to each of the plurality of tiers based on cost and performance. An application performance is determined, and a new application performance is estimated based at least partially on an application reservation and an application limit. ... Vmware Inc

03/16/17 / #20170075698

Booting a computing device by streaming a desktop image over a network

A system is described for replacing the desktop image on a computing device with a network-based desktop image (e.g., a backup copy of a desktop image) while allowing the user to resume working on the computing device with the new desktop with minimal downtime. The computing device is booted directly from the backed-up desktop image on the network. ... Vmware Inc

03/09/17 / #20170070504

Access control policy management in a cloud services environment

In an example, a method of managing access to resources managed by heterogeneous resource servers having different policy document formats in a cloud services environment includes obtaining, at an identity and access management (iam) service, a policy document describing privileges of an end user with respect to accessing at least one resource of the resources managed by a resource server of the heterogeneous resource servers; sending the policy document from the iam service to an resource server endpoint designated by the resource server for validation; storing, by the iam service, the policy document in a datastore in response to a determination by the resource server endpoint that the policy document is valid; and generating, by the iam service, an indication that the policy document is invalid in response to a determination by the resource server endpoint that the policy document is invalid.. . ... Vmware Inc

03/09/17 / #20170068565

Machine identity persistence for users of non-persistent virtual desktops

Examples perform creation of a non-persistent virtual machine with a persistent machine identity associated with the user of the virtual machine, to provide consistent virtual desktop sessions to the user. Some examples contemplate that the machine identity is inserted into a virtual machine created through cloning, forking, or from a virtual machine pool.. ... Vmware Inc

03/02/17 / #20170064030

Pre-fetch cache population for wan optimization

Connectivity between data centers in a hybrid cloud system is optimized by pre-loading a wide area network (wan) optimization appliance in a first data center with data to initialize at least one wan optimization of application. The first data center is managed by a first organization and a second data center managed by a second organization, the first organization being a tenant in the second data center. ... Vmware Inc

03/02/17 / #20170064021

Methods and apparatus to monitor usage of virtual computing environments

Methods, apparatus, systems and articles of manufacture are disclosed to monitor usage of virtual computing environments. An example method involves obtaining usage records from a probe manager. ... Vmware Inc

03/02/17 / #20170063989

Fair decentralized throttling in distributed cloud-based systems

A cloud availability manager configured to execute a recovery workflow that fails over one or more virtual machines (vms) to and from a cloud computing system. In doing so, the cloud availability manager typically performs multiple operations for each vms. ... Vmware Inc

03/02/17 / #20170063974

Scalable monitoring of long running multi-step data intensive workloads

Examples perform monitoring of multiple-step, concurrently executed workflows across distributed nodes. Requests from an intermediate node are classified by a load balancer as monitoring or non-monitoring. ... Vmware Inc

03/02/17 / #20170063710

Methods and apparatus to manage and execute actions in computing environments

Methods and apparatus to manage and execute action in computing environments are disclosed. An example method includes determining an identifier of a type of a computing resource identified in a received request, processing a set of stored adapters to determine an adapter associated with the identifier, determining an action associated with adapter, and presenting a user interface including a user selectable identification of the action.. ... Vmware Inc

03/02/17 / #20170063709

Methods and apparatus to manage and execute actions in computing environments

Methods and apparatus to manage and execute action in computing environments are disclosed. An example system includes a virtual machine resource platform to host a virtual compute node; and a resource manager to: install an interface to receive an adapter configured to initiate an action that operates on the virtual compute node, install the adapter by processing an adapter definition to identify an action specified by the adapter, trigger an alert based on collected data associated with the virtual compute node, in response to the alert, trigger the action to be executed using a parameter extracted from the collected data, and execute the action to operate on the compute node.. ... Vmware Inc

03/02/17 / #20170063687

Enterprise connectivity to the hybrid cloud

A cloud computing system retrieves routing entries associated with a particular tenant of the cloud computing system and are a subset of a routing table of the entire cloud computing system. The routing entries are loaded into a networking switch, which is configured to route network packets using the loaded subset of routing entries, using a general-purpose processor rather than a costly dedicated asic.. ... Vmware Inc

03/02/17 / #20170063674

Routing optimization for inter-cloud connectivity

A cloud computing system may include multiple cloud data centers. A gateway may establish connections between a cloud providers' multiple data centers using knowledge about the types of applications workloads executing within the cloud computing system, and may be further based on determines policies indicating priorities for routing traffic for the application workloads.. ... Vmware Inc

03/02/17 / #20170063673

Data center wan aggregation to optimize hybrid cloud connectivity

An example method of optimizing connectivity between data centers in a hybrid cloud system having a first data center managed by a first organization and a second data center managed by a second organization, the first organization being a tenant in the second data center. The method includes probing a wide area network (wan) with test packets by varying an internet protocol (ip) flow tuple of the test packets across a set of ip flows. ... Vmware Inc

03/02/17 / #20170063667

Multi-spoke connectivity of private data centers to the cloud

A hybrid computing system includes an on-premise data center and a cloud computing system. To connect between an organization's multiple data centers, a gateway may instead utilize the connections between the private data center and the cloud computing system rather than a direct connection to the other of the organizations' data centers.. ... Vmware Inc

03/02/17 / #20170063644

Placement of devices based on policies and benchmark data

The present disclosure is related to methods, systems, and machine-readable media for assigning devices to clusters. The system includes a benchmark engine to collect and store the benchmark data for a device that is assigned to a first cluster of devices. ... Vmware Inc

03/02/17 / #20170063573

Optimizing connectivity between data centers in a hybrid cloud computing system

Connectivity between data centers in a hybrid cloud system having a first data center managed by a first organization and a second data center managed by a second organization, the first organization being a tenant in the second data center, is optimized. According to the described technique, a path-optimized connection is established through a wide area network (wan) between a first gateway of a first data center and a second gateway of a second data center for an application executing in the first data center based on performance of paths across a set of internet protocol (ip) flows. ... Vmware Inc

03/02/17 / #20170061321

Capacity analysis using closed-system modules

A capacity-analysis tool (cat) provides a model framework for creating a model of a capacity-planning-target (cpt) system, e.g., a data center. The tool includes a model framework that, in turn, includes a closed-system template for creating csms, i.e., models of capacity-limited systems. ... Vmware Inc

03/02/17 / #20170061146

Multi-level access control for distributed storage systems

System and method for accessing a distributed storage system uses a storage-level access control process at a distributed file system that interfaces with the distributed storage system to determine whether a particular client has access to a particular first file system object using an identifier of the particular client and storage-level access control rules in response to a file system request from the particular client to access a second file system object in the particular first file system. The storage-level access control rules are defined for a plurality of clients and a plurality of first file system objects of the distributed storage system to allow the particular client access to the second file system object in the particular first file system only if the particular client has been determined to have access to the particular first file system object according to the storage-level access control rules.. ... Vmware Inc

03/02/17 / #20170060900

Policy-based selection and configuration of target site resources for data replication

Exemplary methods, apparatuses, and systems include a source site management server receiving, from first and second potential target site management servers, characteristics of the first and second potential target sites that affect replication of data from the source site to each potential target site. The source site management server receives selection of one or more criteria to be met in the selection of a target site for replication of data. ... Vmware Inc

03/02/17 / #20170060899

Policy-based selection and configuration of target site resources for data replication

Exemplary methods, apparatuses, and systems include a target site management server transmitting, to a source site management server, a plurality of protection service plans available for replication of data from the source site to the target site. The transmission of the protection service plans includes a description of one or more service level characteristics provided by each protection service plan and excludes a listing of physical and virtual resources within the target site that are to provide the service level characteristics. ... Vmware Inc

03/02/17 / #20170060898

Fast file clone using copy-on-write b-tree

A file system uses a b-tree data structure to organize file data. The file system may maintain an index node (mode) representing a file and having entries that map to extents of the file. ... Vmware Inc

03/02/17 / #20170060765

Implementing per-processor memory areas with non-preemptible operations using virtual aliases

A computer system provides a mechanism for assuring a safe, non-preemptible access to a private data area (prda) belonging to a cpu. Prda accesses generally include obtaining an address of a prda and performing operations on the prda using the obtained address. ... Vmware Inc

03/02/17 / #20170060732

Automated bug detection with virtual machine forking

Techniques for automated bug detection. A set of inputs are collected and a snapshotting feature is used to apply each input to a test application. ... Vmware Inc

03/02/17 / #20170060715

Dynamic mechanism for fault injection for testing distributed systems

A distributed system and method for error handling testing of a target component in the distributed system uses a proxy gateway in the target component that can intercept communications to and from remote components of the distributed system. When a proxy mode of the proxy gateway in the target component is enabled, at least one of the communications at the proxy gateway is modified to introduce an error. ... Vmware Inc

03/02/17 / #20170060660

Grouping failure events with adaptive polling and sliding window buffering

Embodiments detect and group multiple failure events to enable batch processing of those failure events, such as in a virtual datacenter executing a plurality of virtual machines (vms). A long timer, adaptive short timer, and adaptive polling frequency enable a computing device to efficiently detect and group the failure events that may be related (e.g., resulting from one failure). ... Vmware Inc

03/02/17 / #20170060642

Constrained placement in hierarchical randomized schedulers

A distributed scheduler for a virtualized computer system has a hierarchical structure and includes a root scheduler as the root node, one or more branch schedulers as intermediate nodes, and a plurality of hosts as leaf nodes. A request to place a virtual computing instance is propagated down the hierarchical structure to the hosts that satisfy placement constraints of the request. ... Vmware Inc

03/02/17 / #20170060641

Pluggable engine for application specific schedule control

A method of scheduling tasks for a group of applications. Each application is associated with a separate task queue for identifying application tasks that are ready for execution. ... Vmware Inc

03/02/17 / #20170060639

Scalable concurrent execution of distributed workflows sharing common operations

Examples perform concurrent execution of distributed workflows sharing common operations by a plurality of nodes, such as execution of recovery plans for disaster recovery of virtual machines operating on and off premises. Concurrent execution of identical operations that were part of a previously executed workflow are prevented, by evaluating the source of the workflow and whether the workflow has previously been initiated by that source. ... Vmware Inc

03/02/17 / #20170060636

Methods and apparatus to manage and execute actions in computing environments

Methods and apparatus to manage and execute action in computing environments are disclosed. An example system includes a virtual machine resource platform to host a virtual compute node and a resource manager to: in response to a user request associated with the virtual compute node: determine a type of the virtual compute node; determine if an installed adapter identifies a type associated with the type of the virtual compute node; and when the adapter identifies the type associated with the type of the virtual compute node, present a user selectable identification of the adapter.. ... Vmware Inc

03/02/17 / #20170060628

Virtual machine migration within a hybrid cloud system

An example method of migrating a virtualized computing instance between source and destination virtualized computing systems includes executing a first migration workflow in the source virtualized computing system, where a host computer executing the virtualized computing instance is a source host in the first migration workflow and a first mobility agent simulates a destination host in the first migration workflow. The method further includes executing a second migration workflow in the destination virtualized computing system, where a second mobility agent in the destination virtualized computing system simulates a source host in the second migration workflow and a host computer in the destination virtualized computing system is a destination host in the second migration workflow. ... Vmware Inc

03/02/17 / #20170060621

Hybrid task framework

Techniques for executing jobs in a hybrid cloud computing system. A job defines multiple states and tasks for transitioning between states. ... Vmware Inc

03/02/17 / #20170060620

Maintaining high availability during network partitions for virtual machines stored on distributed object-based storage

Techniques are disclosed for maintaining high availability (ha) for virtual machines (vms) running on host systems of a host cluster, where each host system executes a ha module in a plurality of ha modules and a storage module in a plurality of storage modules, where the host cluster aggregates, via the plurality of storage modules, locally-attached storage resources of the host systems to provide an object store, where persistent data for the vms is stored as per-vm storage objects across the locally-attached storage resources comprising the object store, and where a failure causes the plurality of storage modules to observe a network partition in the host cluster that the plurality of ha modules do not. In one embodiment, a host system in the host cluster executing a first ha module invokes an api exposed by the plurality of storage modules for persisting metadata for a vm to the object store. ... Vmware Inc

03/02/17 / #20170060615

Hybrid infrastructure provisioning framework tethering remote datacenters

Techniques are disclosed for deploying and maintaining appliances in a hybrid cloud computing system which includes an on-premise data center and a public cloud computing system configured to provide a common platform for managing and executing virtual workloads. Appliances to be deployed may include those required (or useful) for hybrid operations, including a cloud gateway appliance, a wide area network (wan) optimizer, a layer 2 (l2) concentrator, and a mobility agent that handles virtual machine (vm) migration traffic. ... Vmware Inc

03/02/17 / #20170060613

Partitioning a hypervisor into virtual hypervisors

In an example, a computer system includes a hardware platform and a hypervisor executing on the hardware platform. The hypervisor includes a kernel and a plurality of user-space instances within a user-space above the kernel. ... Vmware Inc

03/02/17 / #20170060610

Dynamic content disk

A dynamic content disk for a virtual computing instance is created as a thinly-provisioned virtual disk having a file system that is synthesized in accordance with a set of applications that are provisioned for a virtual machine (vm). To limit the allocated size of the dynamic content disk, a filter is attached to the dynamic content disk to intercept input-output operations (ios) directed to the dynamic content disk and convert them to ios directed to an application virtual disk that stores the actual files of the applications that are provisioned for the vm. ... Vmware Inc

03/02/17 / #20170060608

Disaster recovery protection based on resource consumption patterns

Assessing the need for disaster recovery (dr) protection for a virtual application may include accessing resource consumption history for constituent vms that support the virtual application. The resource consumption history may include usage metrics corresponding to resources used by each vm. ... Vmware Inc

03/02/17 / #20170060605

Content or file based application virtualization

Embodiments provide for application-specific provisioning of files or registry keys. As applications are installed or launched, data is recorded by an application virtualization engine, and an index is created linking the recorded data to both the application and the underlying files or registry keys. ... Vmware Inc

03/02/17 / #20170060483

Input/output filter configuration of linked storage

Exemplary methods, apparatuses, and systems include a first input/output (i/o) filter receiving, from a first filter module within a virtualization stack of a host computer, an input/output (i/o) request originated by a virtual machine and directed to a first virtual disk. The first i/o filter determines to redirect the i/o request to a second virtual disk and, in response, forwards the i/o request to a second i/o filter associated with the second virtual disk. ... Vmware Inc

03/02/17 / #20170060449

Multiple hierarchies of snapshots

A method for restoring a data volume using incremental snapshots of the data volume includes creating a first series of incremental snapshots according to a first predefined interval. The method further includes creating a second series of incremental snapshots according to a second predefined interval that is an integer multiple of the first predefined interval. ... Vmware Inc

03/02/17 / #20170060432

Scalable storage space allocation in distributed storage systems

System and method for managing storage metadata utilize a metadata data structure containing allocation information of storage blocks of a storage system in which a portion of the metadata data structure that corresponds to a group of the storage blocks can be reserved to a requesting client, which then manages the portion of the metadata data structure using a copy of the portion of the metadata data structure.. . ... Vmware Inc

02/23/17 / #20170054603

Hardware management systems for disaggregated rack architectures in virtual server rack deployments

Hardware management systems for disaggregated rack architectures in virtual server rack deployments are disclosed herein. An example apparatus to manage disaggregated physical hardware resources in a physical rack includes a hardware management system to discover disaggregated physical hardware resources in the physical rack and generate a listing of the disaggregated physical hardware resources, and a physical resource manager to generate a composed resource based on resources from the listing of the disaggregated physical hardware resources, the hardware management system to manage the composed resource.. ... Vmware Inc

02/23/17 / #20170054602

Deep network validation of configuration inputs for a network-dependent system

A method for validating configuration inputs for a computing device dependent on a network, including: accessing a validated portion of input, wherein the validated portion of input is consistent with information internal to the computing device; determining if a content of the validated portion of input is sufficient to enable a network validation determination to be performed, thereby achieving a positive network probe determination or a negative network probe determination; based on the positive network probe determination, querying an external network to determine if the external network includes a configuration enabling a functioning of the computing device therein, wherein the external network is external to the computing device; and based on the querying, generating a network validation determination, wherein the network validation determination includes a determination as to whether or not the external network includes a configuration enabling a functioning of the computing device therein.. . ... Vmware Inc

02/23/17 / #20170054601

Resolving configuration errors through recommendations

A method for suggesting network values for configuration parameters, associated with a computing device, that fail validation processes, including: accessing a negative validation, wherein the negative validation signifies that the network configuration parameters, of input, are found to be inconsistent with known network configuration parameters; comparing at least the negative validation with the input and a set of rules to achieve comparison results, wherein the set of rules comprises network configuration information associated with a network, network configuration information associated with the computing device and a predetermined listing of expected formats and expected content of the input; comparing the comparison results with a recommendation table, and based on the comparing the comparison results with the recommendation table, generating a recommendation.. . ... Vmware Inc

02/23/17 / #20170052812

Handling disk state inheritance for forked virtual machines

Techniques for handling inheritance of disk state when forking virtual machines (vms) are provided. In one embodiment, a computer system can receive a request to fork a child vm from a parent vm. ... Vmware Inc

02/23/17 / #20170052717

Tracking data of virtual disk snapshots using tree data structures

User data of different snapshots for the same virtual disk are stored in the same storage object. Similarly, metadata of different snapshots for the same virtual disk are stored in the same storage object, and log data of different snapshots for the same virtual disk are stored in the same storage object. ... Vmware Inc

02/23/17 / #20170052671

Contextual gui-style interaction for textual commands

A method for a processor to provide a user interface to manage entities in a software system domain includes, in response to receiving a command line, executing the command, receiving the output of the command where the output include metadata of an entity in the software system domain, preserving the metadata, converting the output to a text item, displaying the converted text item in the user interface, and associating the text item in the user interface with its metadata. The method further includes, in response to receiving a user interaction with the displayed text item from a pointing device or a keyboard, retrieving the metadata associated with the text item in the user interface and performing, based on the metadata associated with the text item, an entity-specific action for the selected item, such as generating an entity-specific contextual menu or invoking a command on the entity.. ... Vmware Inc

02/16/17 / #20170046181

Methods and apparatus to manage asset capabilities in a computing environment using a common agent framework

Methods, apparatus, systems and articles of manufacture are disclosed to manage asset in a computing environment using a common agent framework. An example method includes maintaining a catalog of capabilities available to an asset based on plugins installed at the asset. ... Vmware Inc

02/16/17 / #20170046091

Storage tiering based on virtual machine operations and virtual volume type

To optimize front-end operations performed on virtual machines, a storage tiering module preemptively guides the placement of virtual volumes in storage tiers within a storage system. Upon detecting a front-end operation request, the storage tiering module identifies a storage requirement, such as an expected provisioning activity level during the front-end operation. ... Vmware Inc

02/09/17 / #20170041435

Methods and apparatus to generate virtual war rooms via social media in enterprise network environments

An example method to generate communication clients in an enterprise network environment involves receiving a status from a resource management system, the status associated with a computing resource of the enterprise network environment. The example method involves determining whether the status satisfies a threshold. ... Vmware Inc

02/09/17 / #20170041390

N-way synchronization of desktop images

Methods and systems for n-way cloning and synchronization of a user desktop image are provided. Example embodiments provide a cloning and synchronization system (“css”) which binds a server stored cvd object representing the user's desktop image to one or more endpoint devices. ... Vmware Inc

02/09/17 / #20170041265

Methods and apparatus to manage message delivery in enterprise network environments

An example method to manage delivery of messages in an enterprise network environment involves receiving a message from a user of the enterprise network environment via a social media network. The example method involves identifying an occupational position of the user and scanning the message for at least one of identifiers. ... Vmware Inc

02/09/17 / #20170039120

Externally triggered maintenance of state information of virtual machines for high availablity operations

An example method is provided to maintain state information of a virtual machine in a virtualized computing environment through an externally-triggered approach. The method may comprise detecting, by an external entity, that a first host in a cluster is disconnected from a first network connecting the first host to a distributed storage system accessible by the cluster. ... Vmware Inc

02/09/17 / #20170039082

Self triggered maintenance of state information of virtual machines for high availablity operations

An example method is provided to maintain state information of a virtual machine in a virtualized computing environment through a self-triggered approach. The method may comprise detecting, by a first host from a cluster in the virtualized computing environment, that the first host is disconnected from a network connecting the first host to a distributed storage system accessible by the cluster. ... Vmware Inc

02/02/17 / #20170034075

Policy framework user interface

Some embodiments provide, for a policy framework that manages application of a plurality of policies to a plurality of resources in a computing environment, a method for providing a user interface. The method displays a first display area for viewing and editing policies imported by the policy framework from a first several heterogeneous sources. ... Vmware Inc

02/02/17 / #20170033997

Binding policies to computing resources

Some embodiments provide a method for managing a set of computing resources. The method receives several computing resource management policies from a first several heterogeneous sources. ... Vmware Inc

02/02/17 / #20170033996

Policy store

Some embodiments provide a method for managing policies for a set of computing resources. The method imports several sets of resource management policy rules from several heterogeneous sources. ... Vmware Inc

02/02/17 / #20170033988

Dynamic configurations based on the dynamic host configuration protocol

Some embodiments provide a method for dynamically configuring multiple instances of applications that operate on clients in a network system. The method of some embodiments uses the dynamic host configuration protocol (dhcp) to configure the multiple instances of each application to share a pool of resources specific to the application that are used for configuring the application on each of the clients. ... Vmware Inc

02/02/17 / #20170032020

Resource categorization for policy framework

Some embodiments provide a method for managing a set of computing resources. The method imports descriptions of computing resources from several heterogeneous sources. ... Vmware Inc

02/02/17 / #20170031970

Policy validation

Some embodiments provide method for managing a set of computing resources. The method receives information for a set of resources. ... Vmware Inc

02/02/17 / #20170031956

Policy composition language

Some embodiments provide, for a policy framework, a method for managing policies for a set of resources in a computing environment. The method stores several imported policy rules as primitive policies, each of which includes a policy data structure that includes a set of fields. ... Vmware Inc

02/02/17 / #20170031819

Numa scheduling using inter-vcpu memory access estimation

In a system having non-uniform memory access architecture, with a plurality of nodes, memory access by entities such as virtual cpus is estimated by invalidating a selected sub-set of memory units, and then detecting and compiling access statistics, for example by counting the page faults that arise when any virtual cpu accesses an invalidated memory unit. The entities, or pairs of entities, may then be migrated or otherwise co-located on the node for which they have greatest memory locality.. ... Vmware Inc

02/02/17 / #20170031776

Scheduling and managing series of snapshots

The present disclosure is related to systems and methods for scheduling and managing series of snapshots. An example method can include estimating a transfer time to transfer a first snapshot of a virtual computing instance (vci) to a first snapshot series, and estimating a transfer time to transfer a second snapshot of the vci to a second snapshot series. ... Vmware Inc

01/26/17 / #20170026453

Remote contextual access to operating system desktops

Methods, systems, and techniques for remote contextual access to an operating system desktop are provided. Example embodiments provide a desktop state agent the harvests information from a user's desktop regarding state of various objects such as open documents, recent documents, links, shared links, bookmarks, upcoming events, and/or recent emails. ... Vmware Inc

01/26/17 / #20170024341

Latency reduction for direct memory access operations involving address translation

Latency reduction for direct memory access operations involving address translation is disclosed. Example methods disclosed herein to perform direct memory access (dma) operations include initializing a ring of descriptors, the descriptors to index respective buffers for storing received data in a first memory. ... Vmware Inc

01/26/17 / #20170024291

Virtual machine fault tolerance

In a computer system running at least a first virtual machine (vm) and a second vm on virtualization software, a computer implemented method for the second vm to provide quasi-lockstep fault tolerance for the first vm includes executing a workload on the first vm and the second vm that involves producing at least one externally visible output and comparing an externally visible output of the second vm with an externally visible output of the first vm to determine if there is an output match. In response to a determination that the externally visible output of the second vm does not match the externally visible output of the first vm, a resynchronization of the second vm is executed. ... Vmware Inc

01/26/17 / #20170024264

Attaching applications based on file type

Disclosed herein are systems, methods, and software for attaching applications to a computing device based on a file type selection. In one example, a method for operating an application attaching system to dynamically make applications available to a computing device includes identifying an application attach triggering event based on a file selection of a certain file type on the computing device. ... Vmware Inc

01/26/17 / #20170024262

System and method for managing a virtualized computing environment

A technique for managing distributed computing resources in a virtual computing environment is disclosed. In an embodiment, a method includes receiving a recommended change to a virtual architecture of a virtual computing environment; determining an impact on current workload in the virtual computing environment if the recommended change is performed; determining an impact on future workload in the virtual computing environment if the recommended change is performed; calculating a combined impact on current and future workload; determining if the combined impact is above or below a threshold; if the combined impact on current and future workload is below the threshold, do not perform the recommended change; and if the combined impact on current and future workload is above the threshold, perform the recommended change.. ... Vmware Inc

01/26/17 / #20170024200

Disk block streaming using a broker computer system

A method for sending executable content to a first computer is provided. The executable content includes computer instructions. ... Vmware Inc

01/19/17 / #20170019465

Saturation detection and admission control for storage devices

Maximum throughput of a storage unit, and workload and latency values of the storage unit corresponding to a predefined fraction of the maximum throughput are estimated based on workloads and latencies that are monitored on the storage unit. The computed metrics are usable in a variety of different applications including admission control, storage load balancing, and enforcing quality of service in a shared storage environment.. ... Vmware Inc

01/12/17 / #20170011486

Watermarking and scalability techniques for a virtual desktop planning tool

A method for measuring performance of virtual desktop services offered by a server including a processor is described. A first encoded watermark is embedded into user interface display generated by a virtual desktop when initiating an operation. ... Vmware Inc

01/12/17 / #20170011061

System and method for using local storage to emulate centralized storage

A replicated decentralized storage system comprises a plurality of servers that locally store disk images for locally running virtual machines as well as disk images, for failover purposes, for remotely running virtual machines. To ensure that disk images stored for failover purposes are properly replicated upon an update of the disk image on the server running the virtual machine, a hash of a unique value known only to the server running the virtual machine is used to verify the origin of update operations that have been transmitted by the server to the other servers storing replications of the disk image for failover purposes. ... Vmware Inc

01/12/17 / #20170010921

Multitenant access to multiple desktops on host machine partitions in a service provider network

Routers and host machines can host desktops for two or more enterprises. A virtual local area network is established for each enterprise. ... Vmware Inc

01/12/17 / #20170010913

Methods and apparatus to manage virtual machines

Methods and apparatus to manage virtual machines are disclosed. An example method includes determining that a deployment of a first virtual machine has halted because the first virtual machine is dependent on a second virtual machine that has not been fully deployed and in response to detecting that the second virtual machine has been deployed, notifying, via a processor, the first virtual machine that deployment of the first virtual machine may continue.. ... Vmware Inc

01/05/17 / #20170006032

Methods and apparatus to grant access to cloud computing resources

An example method to grant authorization to a user for accessing a cloud computing resource involves receiving a first message from a user via a social media interface. The first message includes a request to access a cloud computing resource. ... Vmware Inc

01/05/17 / #20170006022

Automated monitoring and managing of certificates

In a computer-implemented method for automated monitoring certificate expiration, automatically periodically accessing a plurality of computing nodes in a computing system for certificate expiration of a certificate of the plurality of computing nodes. The automatically periodically accessing is provided by a central management tool of the computing system. ... Vmware Inc

01/05/17 / #20170006021

Providing a single session experience across multiple applications

A system is described allowing a user to log into an api proxy by supplying login credentials and to have the api proxy log into the apis of various web-based applications on behalf of the user by using the user's login credentials, without the user needing to separately log into each application. Calls made by the user to an application and application replies are routed through the api proxy. ... Vmware Inc

01/05/17 / #20170005967

Methods and apparatus to generate knowledge base articles

An example method to generate knowledge base articles involves analyzing user-satisfaction indicators of a plurality of user response messages in a forum message board of a cloud computing system. The user response messages are posted in response to a first message requesting assistance related to a computing resource. ... Vmware Inc

01/05/17 / #20170005931

Virtual network interface controller performance using physical network interface controller receive side scaling offloads

Techniques disclosed herein provide an approach for using receive side scaling (rss) offloads from a physical network interface controller (pnic) to improve the performance of a virtual network interface controller (vnic). In one embodiment, the pnic is configured to write hash values it computes for rss purposes to packets themselves. ... Vmware Inc

01/05/17 / #20170005923

Dynamic virtual machine network policy for ingress optimization

A method of performing ingress traffic optimization for active/active data centers. The method creates site-specific grouping constructs for virtual machines that run applications that are advertised to the external networks. ... Vmware Inc

01/05/17 / #20170005878

Method and system for testing and analyzing management servers

The current document is directed to methods and systems for testing and analyzing the operational characteristics of management servers that manage multiple host systems in distributed computing systems on which virtual data centers and other types of virtual infrastructure are implemented. Management servers are generally designed to manage host systems that include particular types of virtualization layers, referred to as “native host systems.” in a described implementation, a management server is connected to a host-gateway appliance that includes host-gateway control logic implemented within a server computer. ... Vmware Inc

01/05/17 / #20170005873

Management of cloud-computing facility through a virtual infrastructure management server

The current document is directed to methods for aggregating host computers into distributed computing systems and to distributed computing systems created by the methods. In a described implementation, host computers are aggregated into two or more clusters, at a first distributed-computing-system level, each managed by a second-level management server. ... Vmware Inc

01/05/17 / #20170005861

Method and system for communication between a management-server and remote host systems

The current document is directed to methods and systems for exchange of information between management servers and remote host systems managed by the management server. In disclosed implementations, a local proxy server associated with the management server and a remote proxy server associated with the remote host systems both locally store configuration data for the host systems and exchange configuration differences through a wide area network in order to synchronize the stored configuration data between the proxy servers. ... Vmware Inc

01/05/17 / #20170005808

Automated provisioning of certificates

In a computer-implemented method for automated provisioning a certificate in a computing system a certificate signing request is accessed from a computing node by a centralized management tool of the computing system. The certificate signing request is provided to a certificate authority by the centralized management tool. ... Vmware Inc

01/05/17 / #20170004182

Allocating, configuring and maintaining cloud computing resources using social media

An example method involves receiving an electronic message from a user via a social media interface. The electronic message includes a query associated with a resource of a cloud computing system. ... Vmware Inc

01/05/17 / #20170004051

Workflows for series of snapshots

The present disclosure is related to methods, systems, and machine-readable media for workflows for series of snapshots. A server can manage replication of a number of series of snapshots of a virtual computing instance (vci). ... Vmware Inc

01/05/17 / #20170004018

System to generate a deployment plan for a cloud infrastructure according to logical, multi-tier application blueprint

A deployment system enables a developer to generate a deployment plan according to a logical, multi-tier application blueprint defined by application architects. The deployment plan includes tasks to be executed for deploying application components on virtual computing resource provided in a cloud infrastructure. ... Vmware Inc

01/05/17 / #20170004012

Methods and apparatus to manage operations situations in computing environments using presence protocols

Methods, apparatus, systems and articles of manufacture are disclosed to manage operations situations in computing environments using presence protocols. An example method includes determining monitoring information of a resource managed by a management application in the computing environment. ... Vmware Inc

01/05/17 / #20170003995

Method and system for providing virtual desktop and virtual application interactivity

Techniques are disclosed for allowing a virtual application and a virtual desktop to interact. In one embodiment, the virtual application is moved inside the virtual desktop to eliminate the need to switch between user interfaces for the virtual desktop and for the virtual application. ... Vmware Inc

01/05/17 / #20170003992

Protecting virtual computing instances

The present disclosure is related to systems and methods for protecting virtual computing instances. An example system can include a first virtual computing instance (vci) deployed on a hypervisor and provisioned with a pool of physical computing resources. ... Vmware Inc

01/05/17 / #20170003991

Host-gateway-facilitated aggregation of host-computer clusters

The current document is directed to methods for aggregating host computers into distributed computing systems and to distributed computing systems created by the methods. In a described implementation, host computers are aggregated into two or more clusters, at a first distributed-computing-system level, each managed by a second-level management server. ... Vmware Inc

01/05/17 / #20170003951

Methods and apparatus for software lifecycle management of a virtual computing environment

Methods and apparatus for software lifecycle management of a virtual computing environment. An example method includes determining if sufficient computing resources for installing the software are available in a virtual environment in the virtual rack system, when sufficient computing resources are not available in the virtual environment, identifying a spare computing resource that is available for use during installation of the software, adding the spare computing resource to the virtual environment, migrating a workload that is executing on a current computing resource to the spare computing resource, and installing the software on the current computing resource.. ... Vmware Inc

01/05/17 / #20170003950

Methods and apparatus for software lifecycle management of a virtual computing environment

Methods and apparatus for software lifecycle management of a virtual computing environment are disclosed. An example method includes determining, by executing an instruction with a processor, a plurality of software updates to be installed on physical computing resources in the virtual server rack system, the determining based on a manifest file received from a software manager associated with the virtual server rack system, determining, by executing an instruction with the processor, dependency requirements for installing the software updates identified in the manifest file, determining, by executing an instruction with the processor, an order for installation of the software updates to meet dependency requirements, and scheduling, by executing an instruction with the processor, installation of the software updates identified in the manifest file.. ... Vmware Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Vmware Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Vmware Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###