Patent classifications
G06F9/45512
Web application login macro generation and verification
A login macro to automatically log into a web application running on a server computing device is generated from a provided username, a provided password, and a provided network address of the web application. The login macro can be generated regardless of whether the web application is logged into at a starting web page at the provided network address or at a sign-in web page navigable from the starting web page. After the login macro has been generated, that usage the login macro successfully results in logging into the web application running on the server computing device can be verified.
INTERACTIVE MECHANISM TO COMMUNICATE WITH TOOLS INSIDE COMPUTATIONAL DEVICES
A system is disclosed. A computational storage unit may include a memory and a tool. A command parser may receive a command and start the tool on the computational storage unit. A pipe may be established between a file in the memory and an input of the tool.
Automated command assistance for a cloud service
An automated command assistance tool is provided for a browser-enabled command line interface of a cloud service. The automated command assistance tool provides examples illustrating the correct syntax for commands used to manage the resources of a cloud service. The command assistance tool learns the syntax of a command from usage patterns found in telemetric data, scripts and user documentation and forms templates containing a command's usage pattern and related information. The templates are used to generate examples that respond to a user query for assistance with usage of a particular command.
Browser-driven capture of application installations for application virtualization
Techniques are described for performing browser-driven application capture of application installations. When the browser on the client machine detects a request to begin an application capture session, it downloads an orchestrator binary from an origin server. The orchestrator is a self-extracting executable that decompresses components responsible for preparing the client machine for the application capture session. Preparing the client machine includes starting a local web server, executing a registry script to create the necessary registry state, mounting a virtual disk, and deploying an agent that will record state changes on the client machine. Once the client machine has been prepared, the application installation can begin. During the installation process, the agent intercepts state changes occurring on the client machine and redirects them to the virtual disk. Once finished, the application capture session is completed by adding identity and metadata information to the virtual disk to generate the application package.
Preparing containerized applications for backup using a backup services container and a backup services container-orchestration pod
A “backup services container” comprises “backup toolkits,” which include scripts for accessing containerized applications plus enabling utilities/environments for executing the scripts. The backup services container is added to Kubernetes pods comprising containerized applications without changing other pod containers. For maximum value and advantage, the backup services container is “over-equipped” with toolkits. The backup services container selects and applies a suitable backup toolkit to a containerized application to ready it for a pending backup. Interoperability with a proprietary data storage management system provides features that are not possible with third-party backup systems. Some embodiments include one or more components of the proprietary data storage management within the illustrative backup services container. Some embodiments include one or more components of the proprietary data storage management system in a backup services pod configured in a Kubernetes node. All configurations and embodiments are suitable for cloud and/or non-cloud computing environments.
Long running workflows for robotic process automation
Systems and methods for executing a robotic process automation (RPA) workflow are provided. The RPA workflow is executed by a first robot. The execution of the RPA workflow is suspended by the first robot. A current context of the RPA workflow is serialized at a time of the suspension and the current context of the RPA workflow is stored. The execution of the RPA workflow is resumed by a second robot based on a triggering condition by retrieving the current context of the RPA workflow. The first robot and the second robot may be the same robot or different robots.
Detecting and preventing unauthorized command injection
Input data for an operating system command of an automation process is received. The operating system command is generated based on the received input data. The generated operating system command is parsed to identify one or more metrics. The identified one or more metrics are automatically evaluated to determine a security risk associated with the generated operating system command.
DISABLING A SCRIPT BASED ON INDICATIONS OF UNSUCCESSFUL EXECUTION OF THE SCRIPT
In some implementations, a server device may receive, from a client device, a script identifier, that identifies a script, and an indication of whether the script was successfully executed by the client device. The server device may determine whether a condition associated with disabling the script is satisfied based on the script identifier, the indication of whether the script was successfully executed by the client device, and stored information determined based on a plurality of indications of whether the script was successfully executed by a plurality of other client devices. The server device may selectively cause a data structure to be updated to indicate that the script is disabled based on determining whether the condition is satisfied. The data structure may be used to indicate whether the script is enabled prior to execution of the script.
Automated Deployment of Control Nodes at Remote Locations
A control node can be automatically deployed at a remote location according to some examples described herein. In one example, a system can automatically set up a control node at a remote location by performing various operations. The operations can include interacting with the remote location to deploy an instance of the control node at the remote location. The operations can include providing a configuration script to the remote location for use by the instance in configuring one or more managed nodes. The operations can include providing connection information to the remote location for use by the instance in establishing a network connection to the one or more managed nodes. The system can then initiate a configuration process in which the control node establishes the network connection to the one or more managed nodes and then configures the one or more managed nodes in accordance with the configuration script.
System and method to securely execute datacenter management operations remotely
Disclosed in various examples are methods, systems, and machine-readable media for exposing a Representational State Transfer (RESTful) interface to users whereby management commands on a datacenter may be issued remotely from the users' workstations for secure, remote management of the datacenter. An application task automation command (e.g., a POWERSHELL® command) is executed remotely by creating a proxy command (e.g., based on a POWERSHELL® cmdlet code) to cause the application task automation command to be executed when the proxy command is remotely invoked and deploying the proxy command to a remote computer, such as the user's workstation. The remote computer issues a request including a user identifier and any parameters for the application task automation command when the corresponding proxy command has been invoked by the remote computer. The datacenter determines whether the user is authorized to execute the application task automation command invoked by the proxy command, and upon authorization of the user, the datacenter computer runs the application task automation command with any parameters provided in the request to control configuration of, or data stored on, at least one computer in the datacenter.