Patent classifications
G06F9/4868
METHOD AND DEVICE FOR DATA DUPLICATION CUTOVER
Embodiments of the present disclosure provide a method and device for data duplication cutover. The method includes initiating duplication of initial data from a source device to a destination device, wherein the initial data are data of a file system stored on the source device upon the initiating. The method further includes, in response to completing the duplication of the initial data, updating a session associated with the file system. Furthermore, the method includes, after updating the session, triggering the source device and the destination device into a data unavailable state to perform duplication of delta data from the source device to the destination device, wherein the delta data are data of the file system changed during duplication of the initial data. Utilization of the cutover mechanism proposed in the present disclosure enables effective reduction of data unavailable period of time.
Connection-based resource management for virtual desktop instances
A computing system that provides virtual computing services may generate and manage remote computing sessions between client computing devices and virtual desktop instances hosted on the service provider's network. A computing resource instance manager may monitor connections to and disconnections from a virtual desktop instance during particular time periods, and may apply a resource management policy to determine whether and when to shut down an underlying virtualized computing resource instance following a disconnection (e.g., immediately, after some period of time, or only between certain hours). A storage volume for the virtual desktop instance may be detached during a shutdown. In response to a reconnection request, the virtualized computing resource instance (or another such instance) may be restarted and the storage volume may be reattached. The computing resource instance manager may develop a model for predicting when to shut down or restart an instance based on historical data or machine learning.
VIRTUAL DEVICE MIGRATION OR CLONING BASED ON DEVICE PROFILES
Techniques for placing virtual machines based on compliance of device profiles are disclosed. In one embodiment, a list of device profiles may be maintained, with each device profile including details of at least one virtual device and associated capabilities. Further, a device profile from the list of device profiles may be assigned to a virtual machine running on a first host computing system. A virtual device and associated configurations required by the virtual machine may be identified to comply with the device profile. A management operation may be performed to migrate or clone the virtual device and associated configurations from a second host computing system to the first host computing system to support the compliance of the device profile assigned to the virtual machine.
Connection-based resource management for virtual desktop instances
A computing system that provides virtual computing services may generate and manage remote computing sessions between client computing devices and virtual desktop instances hosted on the service provider's network. A computing resource instance manager may monitor connections to and disconnections from a virtual desktop instance during particular time periods, and may apply a resource management policy to determine whether and when to shut down an underlying virtualized computing resource instance following a disconnection (e.g., immediately, after some period of time, or only between certain hours). A storage volume for the virtual desktop instance may be detached during a shutdown. In response to a reconnection request, the virtualized computing resource instance (or another such instance) may be restarted and the storage volume may be reattached. The computing resource instance manager may develop a model for predicting when to shut down or restart an instance based on historical data or machine learning.
METHOD AND DEVICE FOR DISPATCHING REPLICATION TASKS IN NETWORK STORAGE DEVICE
A method and device for dispatching replication tasks in a network storage device. For instance, a method of dispatching replication tasks in a network storage device includes: in response to receiving a request for replicating a plurality of sessions, dispatching a task for replicating a configuration session among the plurality of sessions to a first processing unit of the network storage device, the configuration session including configuration information describing a plurality of sessions; dispatching a plurality of tasks for replicating other sessions among the plurality of sessions except the configuration session to a plurality of second processing units different from the first processing unit; and in response to the first processing unit and the plurality of second processing units completing the respective tasks, aggregating results of replicating the plurality of sessions. With the technical solution of the present disclosure, processing efficiency can be improved and time can be saved.
HIGHLY AVAILABLE DISTRIBUTED QUEUE USING REPLICATED MESSAGES
Methods and systems for implementing a highly available distributed queue using replicated messages are disclosed. An enqueue request is received from a client at a particular queue host of a plurality of queue hosts. The enqueue request comprises a message and a replica count greater than one. One or more copies of a replication request are sent from the particular queue host to one or more additional queue hosts. The replication request comprises the message. The quantity of copies of the replication request is determined based at least in part on the replica count. An initial replica of the message is enqueued at the particular queue host. One or more additional replicas of the message are enqueued at the one or more additional queue hosts. A quantity of the one or more additional replicas is determined based at least in part on the replica count.
Moving Target Defense for Distributed Systems
An apparatus and method defends against computer attacks by destroying virtual machines on a schedule of destruction in which virtual machines are destroyed in either a random sequence or a round-robin sequence with wait times between the destruction of the virtual machines. Also, each virtual machine is assigned a lifetime and is destroyed at the end of its lifetime, if not earlier destroyed. Destroyed virtual machines are reincarnated by providing a substitute virtual machine and, if needed, transferring the state to the substitute virtual machine. User applications are migrated from the destroyed machine to the replacement machine. All virtual machines are monitored for an attack at a hypervisor level of cloud software using Virtual Machine Introspection, and if an attack is detected, the attacked virtual machine is destroyed and reincarnated ahead of schedule to create a new replacement machine on a different hardware platform using a different operating system.
SMART REPLAY IN MANAGEMENT SYSTEMS
Methods, mediums, and systems include use of a system manger application in a data processing system to create a replay in a graphical user interface, to receive replay criteria, identify any replay devices, replay sensors, replay actuators, and replay functions corresponding to the replay criteria from among the plurality of devices, sensors, and actuators, identify a replay time period corresponding to the replay criteria, gather replay data for the identified replay devices, replay sensors, replay actuators, or replay functions corresponding to the replay criteria that was generated during the replay time period, and display the replay in the graphical user interface according to the replay data.
Generation and distribution of device experience
User devices such as electronic book readers may be configured to provide a particular device experience. This device experience may comprise settings of a user interface, states of one or more applications or modules executing on the device, timing of events, and so forth. Settings, state information, timing, and so forth describing the device experience may be stored as an experience template. This experience template may be distributed to other user devices, allowing those other devices to experience the same or similar experiences.
STATEFUL ENDPOINT MOBILITY IN A FEDERATED CLOUD COMPUTING SYSTEM
A method by a master orchestrator in a federated cloud computing system to move an endpoint between clusters. The method includes receiving a request to move a first endpoint implemented in a first cluster to another cluster, wherein the first endpoint provides a service and uses a first database to store state associated with the service, responsive to receiving the request, causing a second endpoint and a second database to be deployed in a second cluster, wherein the second endpoint is a replica of the first endpoint, the second database is a replica of the first database, and the second endpoint is to use the second database to store state, causing synchronization between the first database and the second database to begin, causing the first endpoint to use the second database instead of the first database, and causing clients to use the second endpoint instead of the first endpoint.