G06F2009/45562

Internet of things solution deployment in hybrid environment
11550636 · 2023-01-10 · ·

Example methods are provided to deploy an Internet of Things (IoT) solution in a hybrid environment. The methods include deploying a first agent application on a first edge gateway of a first vendor by the first edge gateway. The first agent application is configured to collect a first set of information associated with the first edge gateway. The methods include deploying a second agent application on a second edge gateway of a second vendor by the second edge gateway. The second agent application is configured to collect a second set of information associated with the second edge gateway. In response to a determination of a first virtualized computing environment on the first edge gateway or a second virtualized computing environment on the second edge gateway fulfils a first requirement of a template to deploy the IoT solution, the methods include deploying the IoT solution in the first virtualized computing environment, the second virtualized computing environment, or both.

Global cache for container images in a clustered container host system
11550513 · 2023-01-10 · ·

Container images are managed in a clustered container host system with a shared storage device. Hosts of the system each include a virtualization software layer that supports execution of virtual machines (VMs), one or more of which are pod VMs that have implemented therein a container engine that supports execution of containers within the respective pod VM. A method of deploying containers includes determining, from pod objects published by a master device of the system and accessible by all hosts of the system, that a new pod VM is to be created, creating the new pod VM, and spinning up one or more containers in the new pod VM using images of containers previously spun up in another pod VM, wherein the images of the containers previously spun up in the other pod VM are stored in the storage device.

Securely processing shareable data in a data communication network
11550945 · 2023-01-10 · ·

A method includes a data processing system creating a virtual machine for use with a data owner system in accordance with a temporary credential protocol between the data processing system and the data owner system. The method continues with by the virtual machine accessing memory of the data owner system regarding a set of data records having common data criteria. The method continues by the virtual machine modifying the set of data records to produce a set of shareable data records. The method continues with the data processing system executing a data analysis function on the set of shareable data records to produce an analytical result. The method continues with the data processing system sending the analytical result to a data consumer computing entity.

Virtual computing systems and methods

A computer system (10) for providing virtual computers includes a pool facility (38) for storing a pool (40) of suspended virtual computers (42) based on at least one virtual computer template (44). A provision manager (32) provides a series (46) of virtual computers (18) as a result of a series (50) of system logon requests by a user (54). The provision manager (32) includes an update facility (100), a resume facility (102) and a customization facility (104). The update facility (104) is provided for updating one or each at least one virtual computer template (44). The resume facility (102) is provided for resuming virtual computers from the pool (40) of suspended virtual computers (42) provided by the pool facility (38). The customization facility (104) is provided for customizing virtual computers after being resumed from the pool (40) to provide active virtual computers.

Providing user interface (UI) elements in virtual machine sessions at reduced latency
11693672 · 2023-07-04 · ·

A computing system includes a virtualization server that runs virtual machine sessions and provides a hosted application having user interface (UI) elements. A client computing device receives the UI elements and displays the UI elements as local virtual UI elements, applies user input to one of the local virtual UI elements in focus, generates a local virtual UI element graphics overlay corresponding to a predicted response to the user input and sends the user input to the virtualization server, which generates an updated UI element graphics corresponding to an actual response to the user input. The client computing device replaces at least a portion of the local virtual UI element graphics overlay corresponding to the predicted response with the received updated UI element graphics.

Virtual machine vulnerabilities and sensitive data analysis and detection
11693685 · 2023-07-04 · ·

A system and method for securing virtual cloud assets in a cloud computing environment against cyber threats. The method includes: determining a location of a snapshot of at least one virtual disk of a protected virtual cloud asset, wherein the virtual cloud asset is instantiated in the cloud computing environment; accessing the snapshot of the virtual disk based on the determined location; analyzing the snapshot of the protected virtual cloud asset to detect potential cyber threats risking the protected virtual cloud asset; and alerting detected potential cyber threats based on a determined priority.

Method and system for disaster recovery of a regional cloud based desktop fabric

A system and method for ensuring the availability of virtual desktops in a cloud based system. The system includes a primary regional datacenter having a primary desktop pool accessible by a desktop client providing access to a desktop to a desktop user. A secondary regional datacenter includes a secondary desktop pool. A control plane orchestrates communication between the desktop client and the regional datacenters. The control plane creates a copy of the desktop from the primary regional datacenter. The control plane performs an activation procedure when a disaster event occurs. The activation procedure includes creating the desktop in the secondary desktop pool from the copy. The activation procedure also directs the desktop client to the secondary desktop pool to access the desktop from the secondary regional datacenter. A deactivation procedure directs the desktop client in the secondary desktop pool to reestablish availability to desktops in the primary desktop pool.

Online disk encryption using mirror driver
11693689 · 2023-07-04 · ·

Provided are techniques for encrypting a virtual disk of a virtual computing instance (VCI) while the VCI is online and still running using a mirror driver. In certain aspects a mirror driver is a filter running in an I/O stack used for accessing a virtual disk, such that the mirror driver receives I/Os destined to the virtual disk and mirrors those I/Os to the virtual disk and one or more additional virtual disks. The mirror driver begins copying data from an unencrypted source virtual disk to a destination virtual disk, and the data is encrypted as it is stored in the destination virtual disk, while the VCI is still online. During the copying, as new writes are issued to the unencrypted source virtual disk from the VCI, the mirror driver mirrors the writes to both the unencrypted source virtual disk and the destination virtual disk.

Lifecycle management of VNFC software modules

An example operation may include a method comprising one or more of receiving a VNFC module LCM request where the LCM request specifies a VNFC instance (VNFCI), a target VNFC module, and an LCM operation to be performed, comprising retrieving a VNFCI data entry, determining a target OS installation of the VNFCI, establishing a secure connection to a target OS on a VNFCI hosting VM/container, determining a default command for the LCM operation, adapting the default command to the target OS, executing the adapted command, normalizing a response code, and sending a response to the VNFC module LCM request.

Techniques for automatically configuring minimal cloud service access rights for container applications

A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.