Patent classifications
G06F2009/45579
Content or file based application virtualization using a cache
Embodiments provide for application-specific provisioning of files or registry keys. As applications are installed or launched, data is recorded by an application virtualization engine, and an index is created linking the recorded data to both the application and the underlying files or registry keys. As applications are requested (e.g., launched, updated, or the like), the application virtualization engine reveals various copies of file or registry keys to the application on demand or in accordance with a policy.
METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR USING VIRTUAL DESKTOP
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for using a virtual desktop. A method in one embodiment includes receiving, at a first edge node in a plurality of edge nodes, an instruction from a first set of input devices in a plurality of peripheral devices. The instruction is for use of a first virtual desktop deployed on the first edge node. The method further includes: using the first virtual desktop based on the instruction by using resources at the first edge node. The method further includes: sending data to an output device in the plurality of peripheral devices, wherein the data is associated with the use of the first virtual desktop. The solution for using a virtual desktop of the present application enables the use of a virtual desktop using resources at an edge node without requiring a client.
COMMAND INFORMATION TRANSMISSION METHOD, SYSTEM, AND APPARATUS, AND READABLE STORAGE MEDIUM
Disclosed in the present disclosure is a command information transmission method, applied to a Physical Function (PF) port. The method includes: parsing a received interrupt request to obtain a target Virtual Function (VF) port; determining a target physical-side interrupt handler corresponding to the target VF port; obtaining target command information corresponding to the target physical-side interrupt handler in a device memory overlap region, where the device memory overlap region is an overlap region obtained by performing memory mapping on the PF port and each VF port in a host address space by a device memory overlap mapping technology; and executing switching to the target physical-side interrupt handler, and performing a response operation on the target command information.
HIERARCHICAL HARDWARE-SOFTWARE PARTITIONING AND CONFIGURATION
Embodiments herein describe partitioning hardware and software in a system on a chip (SoC) into a hierarchy. In one embodiment, the hierarchy includes three levels of hardware-software configurations, enabling security and/or safety isolation across those three levels. The levels can cover the processor subsystem with compute, memory, acceleration, and peripheral resources shared or divided across those three levels.
Low latency access to physical storage locations by implementing multiple levels of metadata
Systems for low-latency data access in distributed computing systems. A method embodiment commences upon generating a first storage area in local storage of a first computing node. Access to the first storage area is provided through the first computing node. A second storage area is generated wherein the second storage area comprises a first set of metadata that comprises local storage device locations of at least some of the local storage areas of the first storage area. A set of physical access locations of the second storage area is stored to a database that manages updates to the second set of metadata pertaining to the second storage area. Accesses to the first storage area are accomplished by querying the database to retrieve a location of the second set of metadata, and then accessing the first storage area through one or more additional levels of metadata that are node-wise collocated.
PRE-POPULATED SECURITY POLICIES FOR VIRTUAL DESKTOP SESSIONS
In an example, a management node includes a processor and a memory communicatively coupled to the processor. The memory may include an advisory module to receive data related to a login pattern of a user over a period of time and predict a time to launch a virtual desktop session for the user based on the received data. Further, the advisory module may fetch, via a network, a security policy from a cloud-based endpoint protection platform prior to the predicted time. Furthermore, the advisory module may populate a virtual machine with the security policy before the user logs into the virtual desktop session. Then, the advisory module may create the virtual desktop session using the virtual machine populated with the security policy in response to a determination that the user logged into the virtual desktop session prior to an expiration of a timer.
APPLICATION TOPOLOGY DERIVATION IN A VIRTUALIZED COMPUTING SYSTEM
An example method of determining application topology in a virtualized computing system having a cluster of hosts with hypervisors supporting virtual machines (VMs), the method including: executing agents on the VMs to obtain process metadata describing processes executing in the VMs; receiving, at an application analysis system, the process metadata; receiving network flow metadata from the agents on the VMs and/or from a network analyzer in the virtualized computing system; parsing the network flow metadata to identify a source VM and a destination VM of the VMs; relating the network flow metadata to portions of the process metadata associated with the source and the destination VMs to identify a source process and a destination process; and generating a topology of a source component connected to a destination component, the source component identifying the source VM and the source process, the destination component identifying the destination VM and the destination process.
ON-BOARDING VIRTUAL INFRASTRUCTURE MANAGEMENT SERVER APPLIANCES TO BE MANAGED FROM THE CLOUD
A method of on-boarding a virtual infrastructure management (VIM) server appliance in which VIM software for locally managing a software-defined data center (SDDC) is installed, to enable the VIM server appliance to be centrally managed through a cloud service includes upgrading the VIM server appliance from a current version to a higher version that supports communication with agents of the cloud service, modifying configurations of the upgraded VIM server appliance according to a prescriptive configuration required by the cloud service, and deploying a gateway appliance for running the agents of the cloud service that communicate with the cloud service and the upgraded VIM server appliance.
DYNAMIC ALLOCATION OF COMPUTE RESOURCES AT A RECOVERY SITE
Examples of systems are described herein which may dynamically allocate compute resources to recovery clusters. Accordingly, a recovery site may utilize fewer compute resources in maintaining recovery clusters for multiple associate clusters, while ensuring that, during use, compute resources are allocated to a particular cluster. This may reduce and/or avoid vulnerabilities arising from a use of shared resources in a virtualized and/or cloud environment.
Elastic container platform architecture
A method, a device, and a non-transitory storage medium are described in which an elastic platform virtualization service is provided in relation to a virtual device. The elastic platform virtualization service includes logic that provides for the management of a virtualized device during its life cycle. The creation or reconfiguration of the virtualized device is based on a tertiary choice between using dedicated hardware and dedicated kernel; common hardware and common kernel; or a combination of the dedicated hardware, dedicated kernel, common hardware, and common kernel.