Patents Assigned to VMware, Inc.
  • Patent number: 12045204
    Abstract: The present disclosure provides techniques for deduplicating files. The techniques include creating a cache or subset of a large data structure. The large data structure organizes information by random hash values. The random hash values result in a random organization of information within the data structure, with the information spanning a large number of storage blocks within a storage system. The cache, however, is within memory and is small relative to the data structure. The cache is created so as to contain information that is likely to be needed during deduplication of a file. Having needed information within memory rather than in storage results in faster read and write operations to that information, improving the performance of a computing system.
    Type: Grant
    Filed: August 27, 2019
    Date of Patent: July 23, 2024
    Assignee: VMware, Inc.
    Inventors: Wenguang Wang, Junlong Gao, Marcos K. Aguilera, Richard P. Spillane, Christos Karamanolis, Maxime Austruy
  • Publication number: 20240241740
    Abstract: The disclosure provides a method for tracking virtual machines (VMs) associated with a plurality of hosts in an inventory. The method generally includes determining to remove a first host of the plurality of hosts, the first host running a first VM, wherein: the first host and a second host are associated with a first host cluster in the inventory; the first host is the associated-host and the registered-host of the first VM in the inventory; determining the first VM is associated with first host cluster based on the associated-host of the first VM being the first host and the first host being associated with the first host cluster; identifying the second host is associated with the first host cluster in the inventory; altering the associated-host of the first VM to the second host and unsetting the registered-host for the first VM in the inventory; and removing the first host.
    Type: Application
    Filed: January 13, 2023
    Publication date: July 18, 2024
    Applicant: VMware, Inc.
    Inventors: Alkesh Shah, Deepak Babarjung, Swapnil Dattatraya Tiwari, Avinash Nagalapur Jambana Goud, Snigdha Gulhati, Gabriel Tarasuk-Levin
  • Publication number: 20240241678
    Abstract: Example methods and systems are described to add a watermark for printing in a virtual desktop environment having an agent side and a client side. A watermark can be configured at the agent side for printing at the client side. At the agent side, a fallback font can be determined for text of the watermark, and coordinate space calculation can be performed, so that the watermark prints correctly at the client side.
    Type: Application
    Filed: May 4, 2023
    Publication date: July 18, 2024
    Applicant: VMware, Inc.
    Inventors: Hui YUAN, Kun SHI
  • Publication number: 20240241760
    Abstract: Example methods and systems for elastic provisioning of container-based graphics processing unit (GPU) nodes are described. In one example, a computer system may monitor usage information associated with a pool of multiple container-based GPU nodes. Based on the usage information, the computer system may apply rule(s) to determine whether capacity adjustment is required. In response to determination that capacity expansion is required, the computer system may configure the pool to expand by adding (a) at least one container-based GPU node to the pool, or (b) at least one container pod to one of the multiple container-based GPU nodes. Otherwise, in response to determination that capacity shrinkage is required, the computer system may configure the pool to shrink by removing (a) at least one container-based GPU node, or (b) at least one container pod from the pool.
    Type: Application
    Filed: May 2, 2023
    Publication date: July 18, 2024
    Applicant: VMware, Inc.
    Inventors: Yisan ZHAO, Xiaoyu HU, Robert RIEMER, Aidan CULLY
  • Publication number: 20240241741
    Abstract: The disclosure provides an example method for connection health monitoring and troubleshooting. The method generally includes monitoring a plurality of connections established between a first application running on a first host and a second application running on a second host; based on the monitoring, detecting two or more connections of the plurality of connections have failed within a first time period; in response to detecting the two or more connections have failed within the first time period, determining to initiate a single health check between the first host and the second host and enqueuing a single health check request in a queue to invoke performance of the single health check based on the single health check request; determining the queue comprises: a queued active health check request, or no previously-queued health check requests; enqueuing the single health check request in the queue; and performing the single health check.
    Type: Application
    Filed: January 17, 2023
    Publication date: July 18, 2024
    Applicant: VMware, Inc.
    Inventors: Petko PADEVSKI, Georgi LEKOV, Stanimir LUKANOV
  • Publication number: 20240231877
    Abstract: An example method for sampling an input/output (I/O) to an object owned by an object owner is disclosed. The method includes receiving an I/O and determining whether a predetermined time interval exceeds. In response that the predetermined time interval does not exceed, the example method includes calculating a first sample score associated with the object owner, obtaining a second sample score associated with a component owner of the object and calculating a weighted sample score based on the first sample score and the sample score. In response that the weighted sample score is not less than a predetermined sample score, the example method includes sampling the I/O.
    Type: Application
    Filed: March 30, 2023
    Publication date: July 11, 2024
    Applicant: VMware, Inc.
    Inventors: Yang YANG, Yang YANG, Jianqiao SUN, Chengmao LU, Jianan FENG
  • Publication number: 20240232818
    Abstract: Intelligent maintenance may be planned and performed for hosts in a pool of hosts that run virtual desktop sessions. A number of hosts to be shut down for maintenance, as well as a start time for a maintenance window, may be determined based on a first risk model and on a capacity risk level. A second risk model may be used to determine whether a capacity risk is still less than the capacity risk level, if some hosts have sessions that take longer than expected to log off and so delay the start time of the maintenance window.
    Type: Application
    Filed: March 15, 2023
    Publication date: July 11, 2024
    Applicant: VMware, Inc.
    Inventors: Wenping FAN, Yao ZHANG, Puhui MENG, Cris LAU, Zhikai CHEN
  • Publication number: 20240236037
    Abstract: Example methods and systems for validation-based service request handling are described. In one example, a computer system may obtain, from a management entity, configuration information specifying a unicast service address associated with a service node capable of providing a network service. In response to detecting a service request from the virtualized computing instance, the computer system may generate a modified service request that (a) is destined for the unicast service address and (b) includes a validation identifier (ID) associated with the virtualized computing instance. The modified service request may be forwarded towards the service node to cause the service node to perform validation based on the validation ID to determine whether to provide the network service. In response to detecting a service response from the service node, the service response, or a modified service response, may be forwarded towards the virtualized computing instance.
    Type: Application
    Filed: April 10, 2023
    Publication date: July 11, 2024
    Applicant: VMware, Inc.
    Inventors: Jingchun JIANG, Bo LIN, Dongping CHEN, Qi WU, Yi ZENG
  • Publication number: 20240233710
    Abstract: A transcription, such as text of audio occurring at to a remote desktop and which may include a translation, may be presented concurrently with an image of the remote desktop on an unused area of a display screen. The transcription may be presented with a selectable and adjustable transparency, and can continue to be presented after the image of the remote desktop is minimized.
    Type: Application
    Filed: March 9, 2023
    Publication date: July 11, 2024
    Applicant: VMware, Inc.
    Inventors: Lin LV, Yunxia CHENG
  • Publication number: 20240231859
    Abstract: Information, such as information pertaining to a remote desktop, may be presented concurrently with an image of the remote desktop on an unused area of a display screen. The information may be presented with a selectable and adjustable transparency.
    Type: Application
    Filed: March 30, 2023
    Publication date: July 11, 2024
    Applicant: VMware, Inc.
    Inventors: Lin LV, Yunxia CHENG
  • Publication number: 20240236016
    Abstract: Example methods and systems for priority-based network bandwidth allocation are described. In one example, a first computer system may detect an event indicating that network bandwidth allocation is required for a virtualized computing instance. The first computer system may identify, from multiple priority levels, a first priority level that is associated with (a) the virtualized computing instance, (b) a logical network element to which the virtualized computing instance is attached, or (c) a group that includes the virtualized computing instance or the logical network element. The first computer system may obtain network bandwidth capacity information associated with physical network adapter(s) capable of forwarding traffic associated with the virtualized computing instance.
    Type: Application
    Filed: April 10, 2023
    Publication date: July 11, 2024
    Applicant: VMware, Inc.
    Inventors: Rushikesh GHATPANDE, Nilesh Ramchandra NIPANE, Lele ZHANG, Shyam Sambasivan RAMACHANDRAN
  • Publication number: 20240236142
    Abstract: Example methods and systems for security threat analysis are described. One example may involve a first computer system configuring a test packet that includes malicious content for forwarding along a network path between (a) a first network element that is connected with a first virtualized computing instance and (b) a second network element that is connected with a second virtualized computing instance. The test packet may be injected at the first network element and forwarded towards the second network element. In response to a security checkpoint detecting the test packet, the security checkpoint may apply one or more security policies on the test packet; and generate and send report information towards a management entity. The report information may indicate whether the malicious content in the test packet is detectable based on the one or more security policies.
    Type: Application
    Filed: January 11, 2023
    Publication date: July 11, 2024
    Applicant: VMware, Inc.
    Inventors: Stijn VANVEERDEGHEM, Abha MUTALIK, Robin MANHAS, Geoff SHUKIN, Nikhil SANGVIKAR, Priya JOSHI
  • Publication number: 20240231609
    Abstract: A remote desktop can be displayed with controllable transparency over a local desktop. The transparency may be varied using hotkeys. Hotkeys may also be used to control/switch the direction of user input, such as mouse and keyboard events, so as to direct the user input to the remote desktop or to the local desktop.
    Type: Application
    Filed: March 30, 2023
    Publication date: July 11, 2024
    Applicant: VMware, Inc.
    Inventors: Lin LV, Yunxia CHENG
  • Patent number: 12034700
    Abstract: A method comprises: in response to detecting a new expression in a policy rule, updating a global version number to a new value; identifying a particular IP address that corresponds to an FQDN matching on the new expression; storing an entry comprising the particular IP address, the new expression, and an entry version number in a first data structure, the entry version number being assigned the new value; in response to detecting a new connection to a destination IP address: finding a matching entry in the first data structure corresponding to the destination IP address; determining whether the global version number matches the entry version number for the matching entry; and in response to determining that the global version number does not match the entry version number for the matching entry, sending update information to a slowpath process that associates an updated configuration information for the matching entry.
    Type: Grant
    Filed: April 7, 2020
    Date of Patent: July 9, 2024
    Assignee: VMware, Inc.
    Inventors: Sushruth Gopal, Jayant Jain, Davide Celotto, Josh Swerdlow
  • Publication number: 20240214290
    Abstract: The disclosure provides a method for measuring network latency between hosts in a cluster. The method generally includes receiving, by a first host, a first ping list indicating the first host is to engage in a first ping round with a second host; executing the first ping round with the second host, wherein executing the first ping round comprises: transmitting first ping requests to the second host; calculating a network latency for each of the first ping requests; and determining a first average network latency between the first host and the second host based on each of the network latencies calculated; determining the first average network latency is above a threshold; determining a cause of the first average network latency being above the threshold; and selectively triggering or not triggering an alarm based on whether the cause is determined to be a hardware or software layer impact, or neither.
    Type: Application
    Filed: February 7, 2023
    Publication date: June 27, 2024
    Applicant: VMware, Inc.
    Inventors: Sifan LIU, Yu WU, Jin FENG, Jianan FENG, Kai-Chia CHEN
  • Patent number: 12021735
    Abstract: Examples of the present disclosure can include a method. The method may include (1) obtaining, by an network function virtualization orchestrator (“NFVO”), path computation information from the integrated network, the integrated network including a virtual source and a virtual destination, (2) generating, using the path computation information, segments identifying portions of a virtual network path originating at the virtual source and terminating at the virtual destination, (3) generating, by a virtual infrastructure manager (“VIM”), a plurality of labels associated with physical links on the physical network corresponding to the identified portions of the virtual network path, and (4) determining, by the NFVO and using the plurality of labels, a network path for data transfer over the integrated network, the network path identifying virtual and physical network elements.
    Type: Grant
    Filed: April 4, 2022
    Date of Patent: June 25, 2024
    Assignee: VMware, Inc.
    Inventor: Vinod Anthony Joseph Cherunni
  • Patent number: 12021981
    Abstract: An example method for a first host, being an owner of an object stored in a virtual storage area network (vSAN) cluster, to perform encryption and decryption operations during a rekey in the vSAN cluster is disclosed. The method includes obtaining a first encryption key and a first key identifier (ID) of the first encryption key; transmitting the first key ID and an active key index to a second host; using the first encryption key to perform encryption and decryption operations; and in response to a determination of receiving a key change notification from a master node of the vSAN cluster, terminating a connection with the second host.
    Type: Grant
    Filed: March 2, 2022
    Date of Patent: June 25, 2024
    Assignee: VMware, Inc.
    Inventors: Wenguang Wang, Abhay Kuamr Jain, Ruiling Dou, Tao Xie, Xin Li, Chandrakanth Gadhiraju, Kevin Rayfeng Li, Satish Pudi
  • Publication number: 20240205184
    Abstract: Example methods and systems for media access control (MAC) address assignment for virtual network interface cards (VNICs) are described. One example may involve a first computer system may determining a first MAC address portion that is uniquely associated with the first computer system. A first VNIC may be assigned with a first MAC address that includes (a) the first MAC address portion and (b) a third MAC address portion that is uniquely associated with the first VNIC on the first computer system. A second VNIC may be assigned with a second MAC address that includes (a) the first MAC address portion and (b) a fourth MAC address portion that is uniquely associated with the second VNIC on the first computer system. The first computer system may perform traffic handling by processing packets specifying the first MAC address or the second MAC address.
    Type: Application
    Filed: February 6, 2023
    Publication date: June 20, 2024
    Applicant: VMware, Inc.
    Inventors: Kejia CUI, Lele ZHANG, Qi WU, Donghai HAN, Honggang LIU
  • Publication number: 20240187378
    Abstract: The disclosure provides an example method for implementing a network policy in a software defined networking environment. The method generally includes receiving a manifest defining a plurality of pods, wherein: for a first pod, the manifest defines a first environment value, a first port number for a first container of the first pod, and a name for the first port number; for a second pod, the manifest defines the first environment value, a second port number for a second container of the second pod, and the name for the second port number; and the manifest defines a security policy applied to a third pod which defines a first egress policy indicating the first environment value and the name; and creating, based on the manifest indicating different port numbers, but the same name, for the different containers of the different pods, separate egress firewall rules for the first and second pods.
    Type: Application
    Filed: January 20, 2023
    Publication date: June 6, 2024
    Applicant: VMware, Inc.
    Inventor: Xie Zheng
  • Publication number: 20240184610
    Abstract: For a distributed storage system that has an active-active configuration for hosts and which uses an Internet small computer system interface (iSCSI) protocol, techniques are provided to identify/select a plurality of paths to a target. An active optimized path is selected for a host that is an object owner, and an active non-optimized path is selected for a host that is a component owner. The selection of the optimized path for a host is further based on whether that host has sufficient processor and memory resources to service input/output for the target. A standby path is selected for any other host that is neither an object owner or a component owner. The selected paths are provided to an initiator so as to enable the initiator to choose at least one of the paths to access the target for the input/output.
    Type: Application
    Filed: December 1, 2022
    Publication date: June 6, 2024
    Applicant: VMware, Inc.
    Inventors: Yang YANG, Sixuan YANG, Zhaohui GUO, Jian ZHAO, Jin FENG, Zhou HUANG, Jianxiang ZHOU