Abstract:
In one embodiment, a method includes receiving an identity of a metric of interest and a future time point. The method further includes retrieving a prediction configuration previously associated with the metric of interest. The prediction configuration comprising a period combination. The period combination comprises a plurality of time periods, each time period comprises one or more segments, and each segment of the one or more segments comprises adapted historical values of the metric of interest incrementally inserted therein. The method also includes, for each time period of the plurality of time periods, identifying, for the future time point, a corresponding segment of the one or more segments, accessing a set of adapted historical values from the corresponding segment, and computing an intermediate predicted value from the set of adapted historical values. Moreover, the method includes calculating a predicted value for the metric of interest based on the computing.
Abstract:
A system for provisioning, allocating, and managing virtual and physical desktop computers in an enterprise network computing environment allows for these physical and desktop computers to be grouped logically based on personnel, organizational, or networking efficiencies without regard to the hardware or server that will ultimately run the virtual machine terminal once it is accessed. A connection broker connects incoming connections to one desktop in a desktop group, based on information relating to that incoming connection.
Abstract:
In one embodiment, a method includes selecting a group of transactions having a common end-to-end transaction path comprising a plurality of transaction-path nodes. Each transaction of the group is associated with either an acceptable category or an unacceptable category based, at least in part, on an end-to-end response time for the transaction. The method further includes separately determining, for each transaction-path node, an execution-time pair. The execution-time pair includes first aggregate information indicative of execution time by the transaction-path node for transactions associated with the acceptable category. The execution-time pair also includes second aggregate information indicative of execution time by the transaction-path node for transactions associated with the unacceptable category. Additionally, the method includes generating a visualization of the end-to-end transaction path. The visualization depicts each determined execution-time pair in relation to a corresponding transaction-path node.
Abstract:
In an embodiment, a method includes receiving, from a data source, time-series data of a time-series data stream produced by the data source. The method further includes identifying a target compression algorithm for the time-series data, wherein the target compression algorithm is linked to the data source in memory pursuant to a dynamically-variable assignment. The method also includes compressing the time-series data using the target compression algorithm and transmitting the compressed time-series data to a destination. Furthermore the method includes periodically optimizing the dynamically-variable assignment in real-time as the time-series data is received.
Abstract:
In one embodiment, a method is performed by a computer system. The method includes receiving a request to authenticate a user of an enterprise computing system. The method further includes, responsive to the request, selecting a set of previous user-initiated events of the user on the enterprise computing platform. Further, the method includes accessing user-specific event information related to the selected set of previous user-initiated events. In addition, the method includes generating, from at least a portion of the user-specific event information, a user-specific authentication sequence comprising a plurality of event-information requests. Additionally, the method includes administering the user-specific authentication sequence to the user, the administering comprising requiring the user to provide a valid response to each of the event-information requests as a precondition to successful authentication.
Abstract:
In one embodiment, a method includes receiving a trigger to deploy a particular container on cloud resources accessible thereto such that the cloud resources are provided by a plurality of cloud providers and such that the computer system and the plurality of cloud providers are configured to negotiate container deployment using an information exchange protocol. The information exchange protocol includes a preconfigured inquiry format and a preconfigured inquiry-response format. The method further includes generating a performance inquiry in relation to the particular container. In addition, the method includes transmitting the performance inquiry to the plurality of cloud providers. Moreover, the method includes receiving inquiry responses from at least some of the plurality of cloud providers. Additionally, the method includes causing the particular container to be deployed on resources of the particular cloud provider.
Abstract:
In one embodiment, a method is performed by a computer system. The method includes receiving a request to execute a particular container. The method further includes retrieving a manifest of the particular container from a data store, the manifest indicating a plurality of items included in the particular container. In addition, the method includes validating one or more signatures of the container that are associated with the items indicated in the manifest. Also, the method includes determining an execution context of the request. Further, the method includes accessing an applicable execution policy for the determined execution context. Additionally, the method includes, responsive to a determination that the applicable execution policy is satisfied, causing the particular container to be installed on a target resource.
Abstract:
In one embodiment, a method is performed by a computer system. The method includes accessing information related to enterprise usage of a plurality of network-accessible peripheral devices and identifying, from the information, discrete content-imaging events that occurred on the plurality of network-accessible peripheral devices. In addition, the method includes determining particular users associated with the discrete content-imaging events on a per-event basis and determining particular content to which the discrete content-imaging events relate on a per-event basis. Further, the method includes abstracting correlated data related to the discrete content-imaging events into a standardized format, the correlated data comprising data related to the particular users and the particular content, the standardized format enabling expression of the discrete content-imaging events by user and by type of content-imaging activity.
Abstract:
In one embodiment, a method includes receiving a request to execute a database statement in satisfaction of a time constraint. The method further includes determining a pattern of the database statement. Additionally, the method includes comparing the pattern to pattern metadata associated with cached samples of the distributed database. Also, the method includes, responsive to a determination that the comparing has resulted in one or more matches, selecting a target sample and causing the database statement to be executed on the target sample. The method further includes, responsive to a determination that the target sample resolves the database statement in satisfaction of the time constraint, returning a resulting dataset to a requestor. Moreover, the method includes, responsive to a determination that the target sample does not resolve the database statement in satisfaction of the time constraint, causing a new real-time sampling of the distributed database to be executed.
Abstract:
A solution for reducing transmission pathway lengths within a distributed network, as embodied in various systems, methods, and non-transitory computer-readable storage media, may include migrating a TCP socket from a request server to a data server. The solution may further include reprogramming one or more routers to recognize a new packet route based on the migrated socket. The solution may include the one or more routers subsequently communicating directly with the data server while bypassing the request server.