VMware, Inc. patent applications on July 25th, 2024
Patent Applications by VMware, Inc. on July 25th, 2024
VMware, Inc.: 21 patent applications
VMware, Inc. has applied for patents in the areas of G06F9/455 (7), G06F3/06 (3), H04L9/32 (2), G06F9/451 (2), G06F3/0481 (1) G06F9/45558 (3), G06F3/0481 (1), G06F16/254 (1), H04L67/101 (1), H04L49/90 (1)
With keywords such as: data, service, object, virtual, node, client, storage, snapshot, application, and transport in patent application abstracts.
Patent Applications by VMware, Inc.
Inventor(s): Sandro Rodrigo Ferreira Moiron of Mountain View CA (US) for vmware, inc., Alan Hourihane of Deganwy (GB) for vmware, inc.
IPC Code(s): G06F3/0481, G06F9/451
CPC Code(s): G06F3/0481
Abstract: systems and methods are described for adjusting streaming of screen data from a server to a client based on visibility of the window in which the screen data is presented on the client. visibility of a window in the graphical user interface (gui) can be monitored, for example by detecting when the window is minimized or obscured by other objects in the gui, and the streaming of screen data to the window can be dynamically adjusted based on the window visibility. when the window is minimized or fully obscured, the streaming of screen data can be stopped. when the window is partially obscured, the streaming can be modified such as by decreasing the frame rate.
Inventor(s): Wenguang WANG of Santa Clara CA (US) for vmware, inc., Eric KNAUFT of San Francisco CA (US) for vmware, inc., Sudheer THOKALA of Dublin CA (US) for vmware, inc.
IPC Code(s): G06F3/06
CPC Code(s): G06F3/061
Abstract: components of a distributed data object are synchronized using streamlined tracking metadata. a target component of the distributed data object is detected as it becomes available and stale. a source component that is up-to-date and that mirrors the address space of the detected target component is identified. a set of mapped address ranges and a set of unmapped address ranges of the identified source component are obtained. a mapped address range of the target component that corresponds with an unmapped address range of the source component is identified. the identified mapped address range of the target component is then synchronized with the corresponding unmapped address range of the source component. thus, unmapped address ranges are synchronized without using tracking metadata of the source component.
Inventor(s): Indranil Bhattacharya of Bangalore (IN) for vmware, inc., Ashutosh Saraswat of Bangalore (IN) for vmware, inc., Thorbjoern Donbaek Jensen of Hoejbjerg (DK) for vmware, inc.
IPC Code(s): G06F3/06, G06F9/455
CPC Code(s): G06F3/0619
Abstract: the disclosure provides a method for virtual volume snapshot creation by a storage array. the method generally includes receiving a request to generate a snapshot of a virtual volume associated with a virtual machine, in response to receiving the request, preparing a file system of the storage array to generate the snapshot, wherein preparing the file system comprises creating a delta storage structure to receive write input/output (i/o) requests directed for the virtual volume when generating the snapshot of the virtual volume, deactivating the virtual volume, activating the delta storage structure, generating the snapshot of the virtual volume, and during the generation of the snapshot of the virtual volume: receiving a write i/o directed for the virtual volume and committing the write i/o in the delta storage structure.
Inventor(s): Zhen Liu of Shanghai (CN) for vmware, inc., Tao Xie of Shanghai (CN) for vmware, inc., Banghui Luo of Shanghai (CN) for vmware, inc., Enning Xiang of San Jose CA (US) for vmware, inc., Carrie Yang of Beijing (CN) for vmware, inc., Kiran Patil of Fremont CA (US) for vmware, inc.
IPC Code(s): G06F3/06
CPC Code(s): G06F3/065
Abstract: system and method for converting a storage object in a redo-log snapshot format to a single-container snapshot format in a distributed storage system uses a temporary snapshot object, which is created by taking a snapshot of the storage object, and an anchor object, which points to a root object of the storage object. for each object chain of the storage object, each selected object is processed for format conversion. for each selected object, difference data between the selected object and a parent object of the selected object is written to the anchor object, a child snapshot of the anchor object is created in the single-container snapshot format, and the anchor object is updated to point to the selected object. the data of the running point object of the storage object is then copied to the anchor object, and each processed object and the temporary snapshot object are removed.
20240248710. MANAGING APPLICATIONS ACROSS MULTIPLE DEVICE_simplified_abstract_(vmware, inc.)
Inventor(s): ANIKETHANA NARASIMHA MURTHY of Palo Alto CA (US) for vmware, inc., David Shaw of Atlanta GA (US) for vmware, inc., Partheeban Kandasamy of Bellevue WA (US) for vmware, inc., Basalingayya Karamadi of Bangalore (IN) for vmware, inc., Makrand Sethi of Bangalore (IN) for vmware, inc.
IPC Code(s): G06F8/71, G06F8/61
CPC Code(s): G06F8/71
Abstract: a management service can receive an installation request for a client application from a first client device, where the installation request specifies a second client device on which the client application is to be installed. the management service can identify an operating system associated with the second client device. the management service can request installation of the client application on the second client device from an application catalog service associated with the operating system of the second client device.
Inventor(s): AMAN KUMAR SINGH of Bangalore (IN) for vmware, inc.
IPC Code(s): G06F9/455
CPC Code(s): G06F9/45558
Abstract: systems and methods for containerization of an application, by an application transformer running a first operating system, to run on a second operating system, include gathering, by the application transformer running the first operating system, process artifacts of the application running on a first machine running the second operating system, sending, to a builder machine running the second operating system, the process artifacts of the application, and building, by the builder machine, a container image corresponding to the application based on the process artifacts, the container image being configured to run on the second operating system.
Inventor(s): Ankur Kumar Sharma of Mountain View CA (US) for vmware, inc., Akshay Jayant Kawale of San Jose CA (US) for vmware, inc., Harshaka Narayana of Varna CA (US) for vmware, inc.
IPC Code(s): G06F9/455
CPC Code(s): G06F9/45558
Abstract: systems and methods for dynamic migration between receive side scaling (rss) engine states include monitoring a traffic load of a first shared rss engine of a physical network interface card (pnic) of a host machine, the first shared rss engine being shared among a first plurality of virtual machines (vms) running on the host machine, determining the traffic load of the first shared rss engine exceeds a threshold, and, in response to determining that the traffic load of the first shared rss engine exceeds the threshold, migrating a first vm of the first plurality of vms to either a dedicated rss engine of the pnic or to a second shared rss engine of the pnic.
Inventor(s): Mahadevan Vishwanth IYER of Saratoga CA (US) for vmware, inc., Julio Cesar FERNANDES CORREA of Gilroy CA (US) for vmware, inc., Kushal BHANDARI of Newark CA (US) for vmware, inc., Nan WANG of San Jose CA (US) for vmware, inc., Dinesh M SHANMUGAM of San Jose CA (US) for vmware, inc.
IPC Code(s): G06F9/455, G06F9/451
CPC Code(s): G06F9/45558
Abstract: an example method of provisioning a virtual desktop deployment includes: receiving, at an admin service executing on first virtualized infrastructure, deployment information for the virtual desktop deployment, the deployment information including a capacity and an image; providing the deployment information from the admin service to a lifecycle manager (lcm) executing on second virtualized infrastructure; provisioning, by the lcm in cooperation with a provider of a third virtualized infrastructure, virtual machines (vms) based on the capacity and the image; providing, by the lcm to a first vm of the vms, connection information for a message cluster in a fourth virtualized infrastructure; and connecting, by a virtual desktop (vd) agent executing in the first vm, to the message cluster based on the connection information.
Inventor(s): CHANDRASHEKHAR JHA of Bangalore (IN) for vmware, inc., Kameswaran Subramanian of Palo Alto CA (US) for vmware, inc., Iwan Rahabok of Suntec City (SG) for vmware, inc., Varghese Philipose of Dubai (AE) for vmware, inc., Tigran Matevosyan of Yerevan (AM) for vmware, inc.
IPC Code(s): G06F9/48, G06F18/2413, G06F18/2431
CPC Code(s): G06F9/4818
Abstract: this disclosure is directed to automated computer-implemented methods and systems for prioritizing recommended suboptimal resources of a data center. methods and system described herein save time and increase the accuracy of identifying actual suboptimal resources and executing remedial measures to correct the suboptimal resources.
Inventor(s): Fernando Escobar of Miami FL (US) for vmware, inc.
IPC Code(s): G06F9/50, G06Q30/0645
CPC Code(s): G06F9/5077
Abstract: the present disclosure relates to moving workloads between cloud providers. a traceability application can receive a request to register a workload from a first virtualization service associated with a first cloud computing environment. to register the workload, the traceability application can generate an identification token in a distributed data store and an asset record corresponding to the identification token. the identification token can uniquely identify the workload among a plurality of workloads associated with a plurality of cloud computing environments. the traceability application can detect a migration of the vm from the first virtualization service associated with the first cloud computing environment to a second virtualization service associated with the second cloud computing environment. the traceability application can cause a transfer of an ownership of the identification token from the first virtualization service to the second virtualization service. the traceability application can update the asset record to reflect the transfer of the ownership of the identification token from the first virtualization service to the second virtualization service.
Inventor(s): Ashutosh Saraswat of Bangalore (IN) for vmware, inc., Indranil Bhattacharya of Bangalore (IN) for vmware, inc., Thorbjoern Donbaek Jensen of Hoejbjerg (DK) for vmware, inc.
IPC Code(s): G06F11/14, G06F9/455, G06F21/78
CPC Code(s): G06F11/1469
Abstract: the disclosure provides a method for virtual volume (vvol) recovery. the method generally includes determining to initiate recovery of a compromised vvol associated with a virtual machine (vm), transmitting a query requesting a list of snapshots previously captured for the compromised vvol, receiving the list of the snapshots previously captured for the compromised vvol and information about one or more snapshots in the list of snapshots, wherein for each of the snapshots, the information comprises an indication of at least one change between the snapshot and a previous snapshot, determining a recovery point snapshot among snapshots in the list of the snapshots based, at least in part, on the information about the one or more snapshots, creating a clone of the recovery point snapshot to generate a recovered virtual volume, creating a virtual disk from the recovered virtual volume, and attaching the virtual disk to the vm.
Inventor(s): Prateek GUPTA of San Francisco CA (US) for vmware, inc., Fnu YASHU of Sunnyvale CA (US) for vmware, inc., Anru XU of San Jose CA (US) for vmware, inc., Tracy LIANG of San Jose CA (US) for vmware, inc.
IPC Code(s): G06F11/36
CPC Code(s): G06F11/3664
Abstract: an example method of alerting and remediation in a multi-cloud computing system having a public cloud in communication with a data center includes: receiving, at remediation and troubleshooting software executing in the public cloud, event and log information generated by endpoint software executing in the data center during operation thereof; generating, at the remediation and troubleshooting software, an incident in response to the event and log information; sending, by a remediation and troubleshooting service (rts) of the remediation and troubleshooting software in response to the incident, a remediation task to a coordinator agent over a message fabric, the coordinator agent executing in an agent platform appliance of the data center; and executing, by the coordinator agent, remediation of the endpoint software according to the remediation task.
Inventor(s): Dimiter DIMITRIEV of Sofia (BG) for vmware, inc., Kostadin GEORGIEV of Sofia (BG) for vmware, inc., Abhishek GUPTA of San Jose CA (US) for vmware, inc., Christos KARAMANOLIS of Los Gatos CA (US) for vmware, inc., Richard P. SPILLANE of Palo Alto CA (US) for vmware, inc.
IPC Code(s): G06F16/172, G06F16/11, G06F16/17
CPC Code(s): G06F16/172
Abstract: storage file size in distributed data lakes is optimized. at a first ingestion node of a plurality of ingestion nodes, a merge advisory is received from a coordinator. the merge advisory indicates a transaction identifier (id). received data associated with the transaction id is persisted, which includes: determining whether the received data, persisted together in a single file will exceed a maximum desired file size; based on determining that the maximum desired file size will not be exceeded, persisting the received data in a single file; and based on determining that the maximum desired file size will be exceeded, persisting the received data in a plurality of files that each does not exceed the maximum desired file size. a location of the persisted received data in the permanent storage is identified, by the first ingestion node, to the coordinator.
Inventor(s): Dimiter DIMITRIEV of Sofia (BG) for vmware, inc., Kostadin GEORGIEV of Sofia (BG) for vmware, inc., Abhishek GUPTA of San Jose CA (US) for vmware, inc., Christos KARAMANOLIS of Los Gatos CA (US) for vmware, inc., Richard P. SPILLANE of Palo Alto CA (US) for vmware, inc.
IPC Code(s): G06F16/25
CPC Code(s): G06F16/254
Abstract: references to changing data sets in distributed data lakes are optimized. as part of a transaction, a first message is received. the first message identifies a table and first data to be written to the table. based on at least the table, the first message is routed to a first ingestion node of a plurality of ingestion nodes. the first data is persisted in temporary storage. location information of the persisted first data is determined. a data available message comprising a self-describing reference to the first data is published, by the first ingestion node, to a first reader node of a plurality of reader nodes. the self-describing reference identifies the first ingestion node, the location information of the first data, and a range of the first data.
Inventor(s): Hemant Sahani of Fremont CA (US) for vmware, inc., Dinesh Upreti of Delhi (IN) for vmware, inc., Kannan Parthasarathy of Palo Alto CA (US) for vmware, inc., Subrahmanya Kumar Giliyaru of Bangalore (IN) for vmware, inc.
IPC Code(s): G06F21/62
CPC Code(s): G06F21/6218
Abstract: disclosed are various embodiments for determining whether to initiate a remote device wipe in a mobile device management context. in one example, a system comprises a computing device configured to identify a device wipe condition for a client device and determine a wipe policy associated with the device wipe condition. a time for a time delay is initiated for a device wipe action of the client device. a wipe instruction is transmitted to execute the device wipe action based on an expiration of the time delay for the device wipe action.
20240250821. SECURE METERING FOR HYPERCONVERGED INFRASTRUCTURES_simplified_abstract_(vmware, inc.)
Inventor(s): Yang YANG of Shanghai (CN) for vmware, inc., Wenguang WANG of Santa Clara CA (US) for vmware, inc., Jin FENG of Shanghai (CN) for vmware, inc., Wei ZHENG of Shanghai (CN) for vmware, inc.
IPC Code(s): H04L9/32, G06F9/455
CPC Code(s): H04L9/3213
Abstract: solutions for secure metering of hyperconverged infrastructures are disclosed. examples include: receiving a security token; accessing a secondary storage (e.g., cold storage, backups) using the security token; determining usage data for the secondary storage; generating a first message digest for a combination of the usage data and the security token; and transmitting, to a metering server, the usage data and the first message digest. in some examples, the combination of the usage data and the security token comprises a concatenation of the usage data and the security token. in some examples, the metering server requests verification usage data from the secondary storage, generates a second message digest for a combination of the verification usage data and the security token, and compares the first message digest with the second message digest. examples do not persist the security token on customer premises. examples leverage the usage data to optimize the secondary storage.
20240250837. BYZANTINE FAULT TOLERANT AGREEMENT ON CURRENT TIME_simplified_abstract_(vmware, inc.)
Inventor(s): Teodor Parvanov of Sofia (BG) for vmware, inc., Hristo Staykov of Sofia (BG) for vmware, inc., Ittai Abraham of Herzliya (IL) for vmware, inc.
IPC Code(s): H04L9/00, H04L9/32
CPC Code(s): H04L9/50
Abstract: disclosed are examples of systems and methods for determining a blockchain time. one such method comprises receiving, by a non-primary replica node, a pre-prepare message having a timestamp representing a local time of a primary replica node in a blockchain network, verifying, by the non-primary replica node, that a difference between the local time of the primary replica node and a local time of the non-primary replica node does not exceed a hard time limit established for the blockchain network; responding, to the primary replica node, that a time value of the timestamp is within acceptable bounds of the local time of the non-primary replica node; and after consensus is reached amongst the non-replica nodes regarding acceptance of the time value, saving a current blockchain time for the blockchain network based on the timestamp.
Inventor(s): Pierluigi ROLANDO of San Marcos CA (US) for vmware, inc., Subramanyam MANUGURI of Saratoga CA (US) for vmware, inc., Raju KOGANTY of San Jose CA (US) for vmware, inc., Yuxiao ZHANG of San Jose CA (US) for vmware, inc., Akhila NAVEEN of Campbell CA (US) for vmware, inc., Mani Prasad KANCHERLA of Cupertino CA (US) for vmware, inc., Srinivas RAMASWAMY of Dublin CA (US) for vmware, inc., Jayakrishnan CHATHU of San Jose CA (US) for vmware, inc., Krishna Chaitanya BANDI of Pflugerville TX (US) for vmware, inc., Hui ZHENG of Great Neck NY (US) for vmware, inc.
IPC Code(s): H04L45/586, H04L45/00, H04L45/42
CPC Code(s): H04L45/586
Abstract: an example method of packet processing in a host cluster of a virtualized computing system includes: receiving traffic at packet processing software of a hypervisor executing on a host of the host cluster; processing the traffic using a network service of the packet processing software in the hypervisor; redirecting the traffic to a service virtual machine (vm) in the host cluster through a virtual network interface card (vnic) of the service vm; sending metadata from the network service of the packet processing software to the service vm; processing the traffic and the metadata through at least one network service executing in the service vm; returning the traffic from the service vm to the packet processing software of the hypervisor; and forwarding, by the packet processing software, the traffic to a destination.
Inventor(s): Dongrui MO of Beijing (CN) for vmware, inc., Xi CHENG of Beijing (CN) for vmware, inc., Qiong WANG of Beijing (CN) for vmware, inc., Jingchun JIANG of Beijing (CN) for vmware, inc., Yonggang WANG of Beijing (CN) for vmware, inc.
IPC Code(s): H04L49/90
CPC Code(s): H04L49/90
Abstract: an example method of beacon probing in a computing system includes: sending, by cross-host beacon probing (chbp) software executing in a first host of the computing system, a first beacon probe from a first network interface controller (nic) of the first host to nics on a same layer 2 domain as the first nic, the nics including a second nic of the first host and cross-host nics of at least one host other than the first host; receiving, at the chbp software through the first nic, acknowledgements (acks) to the first beacon probe from the cross-host nics; and determining, in response to the first beacon probe, connectivity statuses of the first nic and the second nic by the chbp software based on the acks and on whether the second nic receives the first beacon probe.
Inventor(s): DongPing CHEN of Beijing (CN) for vmware, inc., Jingchun JIANG of Beijing (CN) for vmware, inc., Bo LIN of Beijing (CN) for vmware, inc., Xinyang LIU of Beijing (CN) for vmware, inc., Donghai HAN of Beijing (CN) for vmware, inc., Xiao LIANG of Beijing (CN) for vmware, inc., Yi ZENG of Beijing (CN) for vmware, inc.
IPC Code(s): H04L67/101, G06F9/455, H04L67/1008
CPC Code(s): H04L67/101
Abstract: an example method of distributed load balancing in a virtualized computing system includes: configuring, at a logical load balancer, a traffic detector to detect traffic to a virtual internet protocol address (vip) of an application having a plurality of instances; detecting, at the traffic detector, a first request to the vip from a client executing in a virtual machine (vm) supported by a hypervisor executing on a first host; sending, by a configuration distributor of the logical load balancer in response to the detecting, a load balancer configuration to a configuration receiver of a local load balancer executing in the hypervisor for configuring the local load balancer to perform load balancing for the vip at the hypervisor using the load balancer configuration.
Inventor(s): David Mark William Byard of San Jose CA (US) for vmware, inc., Benjamin Duong of Medford MA (US) for vmware, inc., Praagyan Pokharel of Medford MA (US) for vmware, inc.
IPC Code(s): H04L67/2871, H04L41/40, H04L67/10
CPC Code(s): H04L67/2871
Abstract: system and computer-implemented method for connecting a proxy client to a transport client through a transport service with a plurality of stateless transport server nodes in a distributed computing system uses a command channel established from the transport client to a first transport server node in the transport service. a second transport server node in the transport service is selected for a connection request from the proxy client. the first transport server node is connected from the second transport server node when the second transport server node is not the first transport server node with the command channel so that connectivity between the proxy client and the transport client is established through the first transport server node and the second transport server node.
- VMware, Inc.
- G06F3/0481
- G06F9/451
- CPC G06F3/0481
- Vmware, inc.
- G06F3/06
- CPC G06F3/061
- G06F9/455
- CPC G06F3/0619
- CPC G06F3/065
- G06F8/71
- G06F8/61
- CPC G06F8/71
- CPC G06F9/45558
- G06F9/48
- G06F18/2413
- G06F18/2431
- CPC G06F9/4818
- G06F9/50
- G06Q30/0645
- CPC G06F9/5077
- G06F11/14
- G06F21/78
- CPC G06F11/1469
- G06F11/36
- CPC G06F11/3664
- G06F16/172
- G06F16/11
- G06F16/17
- CPC G06F16/172
- G06F16/25
- CPC G06F16/254
- G06F21/62
- CPC G06F21/6218
- H04L9/32
- CPC H04L9/3213
- H04L9/00
- CPC H04L9/50
- H04L45/586
- H04L45/00
- H04L45/42
- CPC H04L45/586
- H04L49/90
- CPC H04L49/90
- H04L67/101
- H04L67/1008
- CPC H04L67/101
- H04L67/2871
- H04L41/40
- H04L67/10
- CPC H04L67/2871