Abstract:
A computer-implemented method for managing application availability. The method may include identifying an application running on a first cluster node of a failover cluster and copying configuration data of the application to a storage location accessible by a second cluster node of the failover cluster. The method may also include detecting failure of the first cluster node, restoring the configuration data to the second cluster node, and executing the application on the second cluster node in accordance with the configuration data. Various other methods, systems, and computer-readable media are also disclosed herein.
Abstract:
A computer-implemented method for managing application availability. The method may include identifying an application running on a first cluster node of a failover cluster and copying configuration data of the application to a storage location accessible by a second cluster node of the failover cluster. The method may also include detecting failure of the first cluster node, restoring the configuration data to the second cluster node, and executing the application on the second cluster node in accordance with the configuration data. Various other methods, systems, and computer-readable media are also disclosed herein.
Abstract:
A computing device detects a command to perform a print screen operation. On detecting the command to perform the print screen operation, the computing device identifies a file associated with a displayed application window. The computing device determines whether the file contains confidential information. Upon determining that the file contains confidential information, the computing device performs an action to enforce a data loss prevention policy.
Abstract:
A computing system invokes a proxy agent in a virtual environment hosted by the computing system to obtain configuration change data for a virtualized application from an agent residing in a physical environment hosted by the computing system. The proxy agent changes a configuration of the virtualized application based on the configuration change data to cause the virtualized application to load a plug-in in the virtual environment. The computing system launches the virtualized application and the virtualized application loads the plug-in in the virtual environment to utilize a function of the plug-in in the virtual environment.
Abstract:
A method and apparatus for providing highly available storage groups are described. In one embodiment, a method for using one or more processors to provide highly available storage groups in memory, comprising updating persistent information associated with at least one mapping between a node and at least one mailbox of a plurality of mailboxes, wherein the node owns the plurality of mailboxes and the persistent information identifies another node as a failover target for the at least one mailbox of the plurality of nodes, accessing at least one storage group that comprises the at least one mailbox, modifying the at least one mapping between the at least one mailbox and the node to bind the at least one mailbox to the other node and coupling the at least one mailbox with the other node.
Abstract:
Various systems and methods can provide application-aware high availability of virtual machines. For example, one method involves receiving information indicating a state of an application executing in a virtual machine. The information is received by a computing device implementing a virtual machine monitoring agent that is monitoring the virtual machine. In response to receiving the information, the method determines whether the virtual machine should be restarted, based at least in part on the state of the application executing in the virtual machine. The method then generates information indicating whether the virtual machine should be restarted, in response to making the determination.
Abstract:
Various systems and methods can provide high availability of an application executing in a highly-available virtual machine environment. One method involves receiving information indicating a state of an application executing in a virtual machine from a monitoring agent executing in the virtual machine. In response to receiving the information, the method involves determining whether the virtual machine should be restarted. Based upon that determination, the method then determines whether the monitoring agent should send a heartbeat message to a virtualization controller prior to expiration of a timeout interval. The virtualization controller is configured to restart the virtual machine if the virtual machine does not send the heartbeat message prior to expiration of the timeout interval.