Patent classifications
G06F9/452
Method and system for disaster recovery of a regional cloud based desktop fabric
A system and method for ensuring the availability of virtual desktops in a cloud based system. The system includes a primary regional datacenter having a primary desktop pool accessible by a desktop client providing access to a desktop to a desktop user. A secondary regional datacenter includes a secondary desktop pool. A control plane orchestrates communication between the desktop client and the regional datacenters. The control plane creates a copy of the desktop from the primary regional datacenter. The control plane performs an activation procedure when a disaster event occurs. The activation procedure includes creating the desktop in the secondary desktop pool from the copy. The activation procedure also directs the desktop client to the secondary desktop pool to access the desktop from the secondary regional datacenter. A deactivation procedure directs the desktop client in the secondary desktop pool to reestablish availability to desktops in the primary desktop pool.
Operations and maintenance techniques subsystem for secure classified remote access as a service
A computing system includes a processor, a network interface controller; a a secure classified remote access as a service application including instructions; and an information technology service management application including instructions wherein the information technology service management application is accessible to the secure classified remote access as a service application via the network interface controller; and wherein the instructions of the secure classified remote access application cause the system to: perform systematic monitoring operations and maintain a virtual hosting environment; perform a network vulnerability analysis; remediate a finding; and notify a user. A method includes performing systematic monitoring; performing a network vulnerability analysis; remediating a finding; and notifying a user. One or more non-transitory computer readable media include program instructions that when executed, cause a computer to: perform systematic monitoring; perform a network vulnerability analysis; remediate a finding; and notify a user.
Computer based unitary workspace leveraging multiple file-type toggling for dynamic content creation
A computer implemented method of creating essays on a computer device is provided, comprising: storing, in a memory storage device in the computer device, one or more files; creating, in an essay drafting software application, a first split screen workspace graphical user interface (GUI), wherein the first split screen workspace GUI includes an essay viewing area and a file viewing area; adding the one or more files to the file viewing area of the first split screen workspace GUI; adding one or more text pages to the essay viewing area of the first split screen workspace GUI; entering text to a first of the one or more text pages using a text editor software application; accessing a first file of the one or more files in the file viewing area of the first split screen workspace GUI through a keystroke performed on one or more keys on a keyboard, wherein the keyboard is adapted to operate as a data and command interface with the computer device and the essay drafting software application; and copying information stored in the first file of the one or more files and pasting the copied information into any one of the one or more text pages.
User Interface with Configurable Specification of Related Data Sources
Persistent storage contains a definition of a playbook and a plurality of subtasks for the playbook, wherein some of the subtasks are respectively associated with corresponding data sources that provide units of related information. One or more processors can: generate a representation of a graphical user interface including a menu pane, a subtask pane, and a related information pane, wherein the menu pane is populated with selectable objects representing the subtasks; receive an indication that a particular selectable object representing a particular subtask has been selected; determine that a particular data source corresponding to the particular subtask can provide a particular unit of the related information; obtain, from the particular data source, the particular unit of the related information; and update the representation to include details of the particular subtask in the subtask pane, and to include the particular unit of the related information in the related information pane.
Client device configuration for remote digital workspace access
Client devices in public workspaces are typically reconfigured to default settings for each new user. Thus, a user may manually pre-configure a publicly accessible client device each time the user accesses a virtual workspace via the device. Systems and methods according to this disclosure provide client device configuration based on user identification. Upon launching a remote access application on a “fresh” client device that has not been configured for remote access, the user may be prompted to provide user identifying information, such as, biometric information. A user identification may be determined based on the user identifying information. Various configuration settings may be determined based on the user identification. The client device may be configured based on the determined configuration settings. After the client device is configured, the user may be prompted for authentication credentials. If the user is successfully authenticated, the user is authorized to access the user's virtual workspace.
System and method for providing a customized graphical user interface based on user inputs
A system and method that provides customized graphical user interfaces on mobile devices based on user inputs. An exemplary method includes detecting a computing device remotely connected to a remote server over a network and having an active session of a software application running on the remote server. Moreover, the method further includes identifying and selecting one or more hotkey buttons based on the detected software application, transmitting the one or more hotkey buttons to the computing device to be displayed in a customized interface while the software application is active, detecting an activation of the one or more hotkey buttons displayed on the computing device, and executing, by the remote server, an operation for the active software application in response to the activation of the one or more hotkey button by the user.
Accurate local depiction of preview of a program window included in a remote graphical desktop
A technology is described for generating window images of a program window in a service provider environment and providing the window images to a client device for display on the client device when a preview event is detected on the client device. An example method may include detecting a modification to a program window associated with a program hosted on a computing resource located in a service provider environment, obtaining a window image of the program window capturing a graphical state of the program window, and sending the window image to the client device to allow the client device to display the window image on the client device in response to a preview event on the client device that is associated with the program window.
Virtual Machine Provisioning and Directory Service Management
A computer implemented method includes granting a subscriber client access to a cloud service-based resource group within a subscriber controlled computing environment. The subscriber controlled computing environment has a virtual network. A direct network connection is established via the virtual network to a domain controller in the subscriber controlled computing environment. The virtual network is extended to a subscriber client virtual machine in a producer cloud service. The subscriber client virtual machine is then joined with the virtual network. Access to the subscriber client virtual machine is provided via the subscriber controlled computing environment and virtual network.
VIRTUAL MEETING CONTROL
A method for controlling a virtual meeting includes receiving a meeting template including at least one rule. The rule or rules associated with the meeting template define a first time period relating a first virtual meeting session of a first endpoint computing device and a second time period relating to a second virtual meeting session of a second endpoint computing device. The method further includes causing, responsive to the rule(s), a first audio mute/unmute action to occur in the first virtual meeting session at or prior to an expiration of the first time period. The method further includes causing a second audio mute/unmute action to occur in the second virtual meeting session at or prior to a start of the second time period, where the second time period is different from with the first time period.
SYSTEM AND METHOD FOR EDGE ANALYTICS IN A VIRTUAL DESKTOP ENVIRONMENT
An edge device for distributed processing of unprocessed edge data from any number of edge data collection devices using an analytics framework includes a storage device for storing the unprocessed edge data; and a processor. The processor obtains the unprocessed edge data from an edge data collection device of the edge data collection devices; identifying a processing modality for the unprocessed edge data; processing the unprocessed edge data based on the processing modality using, at least in part, a virtualized desktop infrastructure connection between the edge device and a backend device operably connected to the analytics framework to obtain a processed edge data result; and providing a computer implemented service using the processed edge data result.