Patent classifications
G06F2009/45562
ENVOY FOR MULTI-TENANT COMPUTE INFRASTRUCTURE
A data management and storage (DMS) cluster of peer DMS nodes manages data of a tenant of a multi-tenant compute infrastructure. The compute infrastructure includes an envoy connecting the DMS cluster to virtual machines of the tenant executing on the compute infrastructure. The envoy provides the DMS cluster with access to the virtual tenant network and the virtual machines of the tenant connected via the virtual tenant network for DMS services such as data fetch jobs to generate snapshots of the virtual machines. The envoy sends the snapshot from the virtual machine to a peer DMS node via the connection for storage within the DMS cluster. The envoy provides the DMS cluster with secure access to authorized tenants of the compute infrastructure while maintaining data isolation of tenants within the compute infrastructure.
ISOLATING OPERATING SYSTEM ENVIRONMENTS IN EMBEDDED DEVICES
A unique embedded system is disclosed that locally operates an application virtual machine (VM) and a system VM in isolation from each other. The application VM executes application-specific code for a given purpose of the embedded system. The system VM executes a host operating system (OS) and various security, compatibility, and updating functions independent of the application VM. Each VM is connected to its own unique hardware on the embedded system to ensure that changes to the application code or the system code do not impact the other.
Emulated edge locations in cloud-based networks for testing and migrating virtualized resources
Various techniques for emulating edge locations in cloud-based networks are described. An example method includes generating an emulated edge location in a region. The emulated edge location can include one or more first computing resources in the region. A host in the region may launch a virtualized resource a portion of the one or more first computing resources. Output data that was output by the virtualized resource in response to input data can be received and reported to a user device, which may provide a request to migrate the virtualized resource to a non-emulated edge location. The non-emulated edge location may include one or more second computing resources that are connected to the region by an intermediary network. The virtualized resource can be migrated from the first computing resources to at least one second computing resource in the non-emulated edge location.
Tiered backup archival in multi-tenant cloud computing system
A system and method for backing up workloads for multiple tenants of a cloud computing system are disclosed. A method of backing up workloads for multiple tenants of a computing system includes triggering an archival process according to an archival policy set by a tenant, and executing the archival process by reading backup data of the tenant stored in a backup storage device of the computer system and transmitting the backup data to an archival store designated in the archival policy, and then deleting or invalidating the backup data stored in the backup storage device.
Ephemeral storage management for container-based virtual machines
A virtualized computing system includes: a host cluster including hosts executing a virtualization layer on hardware platforms thereof, the virtualization layer configured to support execution of virtual machines (VMs), the VMs including a pod VM, the pod VM including a container engine configured to support execution of containers in the pod VM, the pod VM including a first virtual disk attached thereto; and an orchestration control plane integrated with the virtualization layer, the orchestration control plane including a master server in communication with a pod VM controller, the pod VM controller configured to execute in the virtualization layer external to the VMs and cooperate with a pod VM agent in the pod VM, the pod VM agent generating root directories for the containers in the pod VM, each of the root directories comprising a union a read/write ephemeral layer stored on the first virtual disk and a read-only layer.
Big data application lifecycle management
Aspects of the present disclosure involve systems, methods, devices, and the like for creating an application lifecycle management platform for big data applications. In one embodiment the lifecycle management platform can include a multiple-layer container file that integrates multiple big-data tools/platforms. The system may create a generic template application, create a build environment for the generic template application, create a test environment for the generic template application, and run the built generic template application in the test environment prior to the user writing any new code in the generic template application. In one embodiment, the test environment includes a container management system or virtual machine that launches the big data application (which may be the generic template application before a developer edits the file) on a separate big-data server cluster.
COMPUTER-READABLE RECORDING MEDIUM STORING APPLICATION CONTROL PROGRAM AND APPLICATION CONTROL METHOD
A recording medium stores an application control program for causing a computer to execute processing including: when a specific application included in a applications is executed in response to a processing request from a specific processing request source, referring to a storage unit that stores flow information that indicates a past execution order of the applications for each of the processing request sources of the applications, and calculating an execution probability that each of one or more applications that are likely to be executed after the specific application executed in response to the processing request from the specific processing request source among the applications is executed after the specific application executed in response to the processing request from the specific processing request source; specifying an application to be activated from the one or more applications based on the calculated execution probability; and activating the specified application to be activated.
Secure communications between virtual computing instances
Method and apparatus for virtualized environment where virtual computing instances interface a service platform operated on a physical computing apparatus are disclosed. A new virtual computing instance interfacing the service platform can be created, the created new virtual computing instance belonging to a class of virtual computing instances. At least one security credential is obtained from a storage of security credentials associated with the class of the new virtual computing instance. Data communicated with at least one further computing instance is secured based on the obtained at least one security credential.
Image forming apparatus that generates a function execution module for an operating-system-independent environment
The present invention provides an image forming apparatus comprising: at least one first module and at least one second module configured to execute functions corresponding respectively to the at least one first module; a first control unit configured to notify, to a corresponding second module, a request accepted by the at least one first module; and a second control unit configured to control in accordance with the notification from the first control unit, the corresponding second module, wherein the at least one first module is activated at all times from when the image forming apparatus is activated, and the at least one second module is generated as a container of an execution environment that is independent of an operating system and whose activation state is controlled by an instruction from the second control unit.
Virtual machine deployment method and OMM virtual machine
This application describes a virtual machine deployment method and an operation and maintenance management (OMM) virtual machine. The method includes: obtaining, by an OMM virtual machine, a quantity and a specification of service virtual machines created in virtual network function application software to which the OMM virtual machine belongs; and determining, by the OMM virtual machine based on load that needs to be carried by the application software and the quantity and the specification of the service virtual machines, a module to be configured for each service virtual machine. The described implementations avoid or reduce waste of virtual machine resources.