Patents Assigned to VMware
-
Patent number: 12292845Abstract: This disclosure describes processes for performing direct memory access (“DMA”) between memory of a host and memory of a smart network interface controller (“SNIC”) connected to a bus of the host. The host runs a host thread in a processor of the host and the SNIC runs a SNIC thread in a processor of the SNIC. The host thread and the SNIC thread facilitate direct access of the SNIC thread to memory locations in the memory of the host. The SNIC thread can fetch data directly from and/or write data directly to the memory locations of the memory of the host over the bus.Type: GrantFiled: February 10, 2022Date of Patent: May 6, 2025Assignee: VMWare LLCInventors: Chengjian Wen, Qin Li, Hao Huang, Shu Wu
-
Patent number: 12293233Abstract: The current document is directed to methods and systems that generate recommendations for resource specifications used in virtual-machine-hosting requests. When distributed applications are submitted to distributed-computer-system-based hosting platforms for hosting, the hosting requester generally specifies the computational resources that will need to be provisioned for each virtual machine included in a set of virtual machines that correspond to the distributed application, such as the processor bandwidth, memory size, local and remote networking bandwidths, and data-storage capacity needed for supporting execution of each virtual machine. In many cases, the hosting platform reserves the specified computational resources and accordingly charges for them. However, in many cases, the specified computational resources significantly exceed the computational resources actually needed for hosting the distributed application.Type: GrantFiled: October 5, 2021Date of Patent: May 6, 2025Assignee: VMWare LLCInventors: Nitu Sharaff, Yanislav Yankov
-
Patent number: 12293198Abstract: A method for executing an application over a plurality of nodes in each of which an application monitor and a runtime are executing includes executing a first portion of the application by first threads of the runtime of the first node and a second portion of the application by second threads of the runtime of the second node, and under control of the application monitors of the first and second nodes and while executing the first portions and second portions of the application, migrating workloads of one or more of the first threads from the first node to the second node for execution by the second threads.Type: GrantFiled: October 4, 2021Date of Patent: May 6, 2025Assignee: VMware LLCInventors: Aidan Cully, Vance Miller, Dušan Veljko, Mazhar Memon
-
Publication number: 20250130786Abstract: Cloning a cloud-agnostic deployment is described herein. One example method includes receiving modifications to an existing deployment created using a blueprint in a virtualized environment, and performing a deployment clone operation responsive to receiving a request to clone the deployment. The deployment clone operation can include creating an image associated with a virtual computing instance (VCI) of the deployment, creating a snapshot associated with a disk of the deployment, generating a clone blueprint based on the image and the snapshot, and deploying the clone blueprint in the virtualized environment.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Applicant: VMware LLCInventors: Kaloyan Bojilski, Stoyan Staykov Genchev, Iliya Uzunov
-
Publication number: 20250133019Abstract: Some embodiments provide a method for configuring a network to bridge data messages between a hardware-implemented L2 overlay network segment and a software-implemented L2 overlay network segment. The method identifies a host computer on which a logical network endpoint connected to the software-implemented overlay executes. The hardware-implemented L2 overlay connects at least a first set of network endpoints located in a first physical network zone and connected to a first L2 network segment and a second set of network endpoints located in a second physical network zone and connected to a second L2 network segment. The identified host computer is located in the first physical network zone. The method configures a forwarding element executing on the host computer to bridge data messages between the logical network endpoint and (i) the first set of network endpoints and (ii) the second set of network endpoints.Type: ApplicationFiled: October 19, 2023Publication date: April 24, 2025Applicant: VMware, Inc.Inventors: Mukesh Hira, Hongwei Zhu, Bo Hu
-
Publication number: 20250130863Abstract: provisioning cloud-agnostic resource instances by sharing cloud resources is described herein. One example method includes creating a blueprint using a development platform, wherein the blueprint includes a definition of a resource, and wherein provisioning the resource includes provisioning a first cloud resource and a second cloud resource provided by a cloud provider, provisioning a first instance of the resource of the blueprint by provisioning a first instance of the first cloud resource and a first instance of the second cloud resource, and provisioning a second instance of the resource of the blueprint, wherein provisioning the second instance of the resource includes provisioning a second instance of the first cloud resource and sharing the first instance of the second cloud resource.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Applicant: VMware LLCInventors: Plamen Veselinov Peev, Marin Dzhigarov, Ventsyslav Raikov
-
Publication number: 20250130830Abstract: Managing cloud snapshots in a development platform is described herein. One example method includes creating a snapshot of a virtual computing instance (VCI), provided by a cloud provider, using a development platform, receiving a request to revert to the snapshot, and performing a revert operation responsive to receiving the request. The revert operation can include creating a new boot disk on the cloud provider to replace a current boot disk in the development platform, creating a new data disk to replace a current data disk associated with the VCI, powering off the VCI and detaching the boot disk and the data disk, attaching the new boot disk and the new data disk to the VCI, powering on the VCI, and deleting the detached boot disk and the detached data disk.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Applicant: VMware, Inc.Inventors: Nikola Bratanov, Ventsyslav Raikov, Plamen Veselinov Peev, Kristina Zhelyazkova, Ina Uzunova
-
Publication number: 20250130831Abstract: An asynchronous mechanism for processing synchronous operation flows is described herein. One example method includes receiving a request from an orchestrator engine to determine a state of a cloud resource of a cloud automation platform, propagating the request to the cloud automation platform, caching a task identifier received from the cloud automation platform responsive to the request, receiving data indicative of the state of the cloud resource from the cloud automation platform wherein the data is associated with the task identifier, and providing the data to the orchestrator engine.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Applicant: VMware LLCInventors: Kostadin Dinkov, Atanas Todorov, Marin Dzhigarov, Boris Angelov, Ventsyslav Raikov
-
Publication number: 20250130851Abstract: The present disclosure is related to devices, systems, and methods for a cloud scheduler. An example method can include receiving a schedule associated with an automation task to be performed in a virtualized environment via a REST API, wherein the task is associated with a target, associating the schedule with a partition, storing the schedule in a cache store responsive to determining that the schedule is to be invoked within a threshold time period, and receiving the schedule from the cache store and invoking the target responsive to the schedule becoming overdue.Type: ApplicationFiled: October 20, 2023Publication date: April 24, 2025Applicant: VMware LLCInventors: Sudershan Bhandari, Rushikesh Vyas, Alexey Grunkov, Senthil Prabhu Thirumurthy
-
Publication number: 20250130871Abstract: This disclosure is directed to automated computer-implemented methods for application discovery from log messages generated by event sources of applications executing in a cloud infrastructure. The methods are executed by an operations manager that constructs a data frame of probability distributions of event types of the log messages generated by the event sources in a time period. The operations manager executes clustering techniques that are used to form clusters of the probability distributions in the data frame, where each of the clusters corresponds to one of the applications. The operations manager displays the clusters of the probability distributions in a two-dimensional map of applications in a graphical user interface that enables a user to select one of the clusters in the map of applications that corresponds to one of the applications and launch clustering of probability distributions of the user-selected cluster to discover two or more instances of the application.Type: ApplicationFiled: October 18, 2023Publication date: April 24, 2025Applicant: VMware, Inc.Inventors: Ashot Nshan Harutyunyan, Arnak Poghosyan, Tigran Bunarjyan, Andranik Haroyan, Marine Harutyunyan, Litit Harutyunyan, Ashot Baghdasaryan
-
Publication number: 20250123942Abstract: Methods and systems are directed to performing application diagnostics via distributed tracing with enhanced observability. Methods are executed by an operations manager that collects spans of microservices of a distributed application executing in a cloud infrastructure. The operations manager forms traces from the spans for each request for services from the application. The operations manager reduces the dimensionality of the traces by generating a behavioral map of points in a two-dimensional space, each point represents one of the traces. The behavior map is displayed in a graphical user interface having functionalities that enables a user to investigate properties of the traces by trace type and duration and investigate of erroneous traces or clusters of traces and determine which optimization tasks to execute.Type: ApplicationFiled: October 16, 2023Publication date: April 17, 2025Applicant: VMware LLCInventors: Arnak Poghosyan, Ashot Nshan Harutyunyan, George Oganesyan, David Akhaskhalyan, Ani Poghosyan
-
Publication number: 20250125892Abstract: Some embodiments of the invention provide a method for an interference detection RAN application deployed across one or more RICs for detecting and identifying external interference in a RAN that includes multiple RAN base stations servicing users located across multiple regions, each region including at least one RAN base station. The method is performed for a particular region serviced by a particular RAN base station. The method detects an interference incident associated with the particular region. The method analyzes a pattern of spectrum interference associated with the particular region. Based on said analysis, the method determines whether the pattern of spectrum interference matches a first signature pattern associated with internal interference or a second signature pattern associated with external interference.Type: ApplicationFiled: October 11, 2023Publication date: April 17, 2025Applicant: VMware, Inc.Inventors: Yang Yang, Fernanda Campello, Islam Elabbasy
-
Publication number: 20250126026Abstract: The current document is directed to distributed-computer-systems and, in particular, to management of distributed applications and cloud infrastructure using artificial-life agents. The artificial-life agents are organized into a population, the size of which is stabilized as individual artificial-life agents predict system-control parameters, receive rewards based on the predictions, thrive and propagate as they learn to provide better predictions while adapting to a constantly changing environment, and expire when they fail to provide useful predictions over periods of time. The predictions output by individual artificial-life agents are used to provide consensus predictions by the artificial-life-agent population to a cloud-infrastructure-management or distributed-application-management controller.Type: ApplicationFiled: October 13, 2023Publication date: April 17, 2025Applicant: VMware LLCInventor: Amy de Buitléir
-
Patent number: 12278757Abstract: A method receives a request packet from a workload at a first logical interface of a logical router and determines that a source address is a first link local address for the workload and a destination address is a second link local address for the first logical interface. A second logical interface includes the second link local address. The method stores an identifier for the first logical interface as an egress interface. The identifier distinguishes the first logical interface from the second logical interface. A service is performed for the request packet and a response packet is generated. The response packet includes the source address of the second link local address for the first logical interface and the destination address of the first link local address for the workload. The method uses the identifier to select the first logical interface as the egress interface to send the response packet.Type: GrantFiled: September 12, 2023Date of Patent: April 15, 2025Assignee: VMware LLCInventor: Aviraj Saha
-
Patent number: 12277434Abstract: The disclosure provides a method for securing, by a hypervisor of a host, a first persistent volume used to maintain data for one or more first containers on the host. The method generally includes receiving a request to retain the first persistent volume when the one or more first containers are removed from the host, receiving a first container image associated with one of the one or more first containers, generating a first key for reserving the first persistent volume, the key based, at least in part, on the first container image, and reserving the first persistent volume for exclusive access by the hypervisor using the first key.Type: GrantFiled: February 9, 2022Date of Patent: April 15, 2025Assignee: VMware LLCInventors: Zubraj Singha, Tanay Ganguly, Goresh Musalay, Sanoj Ku
-
Patent number: 12277433Abstract: Systems and methods for setting virtual machines (“VMs”) to desired configurations while the virtual machines are running. In some systems, a user can select a VM and a desired configuration. An agent can then set an attribute of the virtual machine to indicate that on guest operation system (“OS”) reboot of the VM, the VM will enter BIOS mode. The agent can also store the desired configuration in the database based on authenticating the user. When the VM reboots at a future time, the attribute can cause the VM to enter BIOS setup. The agent can be notified and can retrieve the desired configuration from a database using an identifier for the VM. Then the agent can apply the desired configuration to the VM during BIOS setup with a system process that does not require further user authentication.Type: GrantFiled: November 23, 2021Date of Patent: April 15, 2025Assignee: VMware LLCInventors: Daniel Beveridge, Ed Shmookler, Heath Reynolds, Mike O'Reilly, Pascal Laroche, Sean Lambert, Pranay Pareek, Amarnath Raghunathan, Steve Tilkens, Mark Peek, Yuriy Georgiev
-
Patent number: 12277422Abstract: Systems and methods are included for causing a computing device to boot by retrieving hardware information from a device tree and further properties by utilizing a native access method call identified in the device tree. The access method can allow for getting a property, getting a property length, or setting a property. A table within firmware can identify the method, which then can retrieve the property information from memory. This Device tree Runtime (“DTRT”) mechanism can allow the computing device to retrieve the hardware configuration and act as a power management interface for turning on the correct hardware and hardware properties on the computing device.Type: GrantFiled: January 27, 2023Date of Patent: April 15, 2025Assignee: VMware LLCInventors: Andrei Warkentin, Regis Duchesne, Renukanthan Raman
-
Patent number: 12277436Abstract: The disclosure provides for integrating virtual machine (VM) and host networking, forwarding port data and occupation status to host and VM endpoints. Examples synchronize, by a host agent, port reservations with a guest agent on a first VM on the host; receive an indication that a VM port on the first VM is occupied; based at least on receiving the indication that the VM port is occupied, update the port reservations to include that a host port corresponding to the VM port is occupied; receive incoming external traffic on the host port; and based at least on the port reservations and receiving the incoming external traffic on the host port, route the incoming external traffic to the VM port on the first VM. VM-based application behavior thus appears more similar to that of native applications.Type: GrantFiled: May 11, 2023Date of Patent: April 15, 2025Assignee: VMware LLCInventors: Junfei Wu, Yan Wang, Haitao Zuo
-
Patent number: 12278766Abstract: Some embodiments of the invention provide a WAN optimization method for optimizing traffic flows through a WAN. The method is performed in a kernel space of a first router at a first site. From a second router at a second site, the method receives, in an optimized data stream from a second site source device to a first site destination device, a file including compressed segments not yet stored by the first router, and copies the compressed segments to a memory shared with a decompression program in the first router's user space. For each compressed segment, the method receives a notification that a decompressed segment obtained by decompressing the compressed segment has been written to a disk storage of the first router, the notification including a block address for the decompressed segment, and updates a cache of the first router with an entry mapping the decompressed segment to the block address.Type: GrantFiled: September 22, 2023Date of Patent: April 15, 2025Assignee: VMWare LLCInventors: Igor Golikov, Aran Bergman, Lior Gal, Avishay Yanai, Israel Cidon, Alex Markuze, Eyal Zohar
-
CONNECTION ESTABLISHMENT USING SHARED CERTIFICATE IN GLOBAL SERVER LOAD BALANCING (GSLB) ENVIRONMENT
Publication number: 20250119418Abstract: Example methods and systems for connection establishment in a global server load balancer (GSLB) environment are described. In one example, a computer system may establish a first connection with a first entity and a second connection with the second entity. The first connection may be established based on first parameter information that includes a shared certificate and a first identifier (ID). The second connection may be established based on second parameter information that includes the shared certificate and a second ID. The shared certificate may be shared by multiple entities that include the first entity and a second entity. In response to receiving a first request, a first response may be generated and sent towards the first entity via the first connection. In response to receiving a second request, a second response may be generated and sent towards the second entity via the second connection.Type: ApplicationFiled: October 8, 2023Publication date: April 10, 2025Applicant: VMware, Inc.Inventors: Ravi Kumar Reddy KOTTAPALLI, Sudarshana KANDACHAR SRIDHARA RAO, Venkata Swamy Babu BUDUMURU, Dinesh Kumar KAMALAKANNAN, Prasanna Kumar SUBRAMANYAM, Vidya KOTEESWARAN, Prashant MISHRA, Santosh SINGH