-
公开(公告)号:US10826811B1
公开(公告)日:2020-11-03
申请号:US14178158
申请日:2014-02-11
Applicant: Dell Software Inc.
Inventor: David McAleer , Kelly Noel Dyer
IPC: H04L12/26
Abstract: In one embodiment, a method includes, on a monitoring system, maintaining hot-cluster data. The hot-cluster data includes identification of at least one hot cluster. The at least one hot cluster includes at least one hot-cluster remote node and is served by two or more hot-cluster networking devices. The method further includes selecting a monitoring request and transmitting the monitoring request to the two or more hot-cluster networking devices as a passive request. Via the passive request, the two or more hot-cluster networking devices are instructed to: not forward the monitoring request to the at least one hot-cluster remote node until a control request is received from a communicably separate control system; and upon receipt of the control request, transmit the monitoring request and the control request to the at least one hot-cluster remote node together as a piggy-back request.
-
公开(公告)号:US10536352B1
公开(公告)日:2020-01-14
申请号:US14819233
申请日:2015-08-05
Applicant: Dell Software Inc.
Inventor: Michel Albert Brisebois , Curtis T. Johnstone , Stephen Pope , GuangNing Hu , Benjamin Gribbin , Jason Aylesworth , Trapti Purohit , Marina Goldchtein , Elena V. Vinogradov , Christopher Macdonald
Abstract: In one embodiment, a method includes extracting a cross-platform data-collection schema based, at least in part, on information available via heterogeneous interfaces of a plurality of source platforms. The cross-platform data-collection schema identifies a plurality of collectable data points in relation to particular source platforms. The method further includes configuring a cross-platform data-collection schedule for the plurality of source platforms. The cross-platform data-collection schedule indicates a collected subset of the plurality of collectable data points in relation to collection frequencies. The method also includes causing data values for the collected subset to be collected on an ongoing basis as dictated by the cross-platform data-collection schedule. Furthermore, the method includes processing a proposed change to at least one of the collected subset and the collection frequencies. In addition, the method includes modifying the cross-platform data-collection schedule to reflect the proposed change.
-
公开(公告)号:US10516743B1
公开(公告)日:2019-12-24
申请号:US14666410
申请日:2015-03-24
Applicant: Dell Software Inc.
Inventor: Yinghua Qin , Shengzhi Liu
Abstract: In an embodiment, a method is performed by a computer system. The method includes automatically receiving, from an agent on a client device that is physically distinct from the computer system, a cookie corresponding to an active user session on a website. The active user session is previously established on the website in response to the website receiving valid user credentials from the client device. The method also includes storing the cookie in memory. In addition, the method includes, via the cookie, collecting information from the website over the active user session, thereby reusing the active user session. Further, the method includes periodically sending a dummy request comprising the cookie to the website, thereby preserving the active user session.
-
4.
公开(公告)号:US10417613B1
公开(公告)日:2019-09-17
申请号:US14660697
申请日:2015-03-17
Applicant: Dell Software Inc.
Abstract: In one embodiment, a method includes selecting a set of logged user-initiated events of a user. The method further includes determining timing information, device-identification information, and user-location information for the set of logged user-initiated events. In addition, the method includes correlating the set of logged user-initiated events to recurring time intervals of a time map. Also, the method includes determining an overall density, a location-specific density, and a device-specific density of the set of logged user-initiated events for at least some recurring time intervals of the time map. Furthermore, the method includes generating a time-based activity pattern of the user, the time-based activity pattern comprising, for the at least some recurring time intervals of the time map, information related to the overall density, the location-specific density, and the device-specific density. In addition, the method includes publishing the time-based activity pattern to a scheduling interface.
-
公开(公告)号:US10333820B1
公开(公告)日:2019-06-25
申请号:US13658724
申请日:2012-10-23
Applicant: Dell Software Inc.
Inventor: Xiangrui Wang , Joseph Vaughn Rustad , Gia Duong Diep
IPC: G06F3/048 , H04L12/751 , H04L12/24 , H04L12/26
Abstract: Systems and methods are described for identifying, tracking, and customizing dependencies between components of a computing environment. By providing greater insight and transparency into dependencies, the systems and methods can facilitate modeling the underlying architecture of applications and computer hardware. As a result, IT personnel can better track relationships between components. Custom filtering tools can also provide IT personnel with tools to switch from different types of dependency views that focus on application-oriented views, hardware-oriented views, or other custom views. Model annotation tools can also enable IT personnel to customize a dependency model to reflect real-world application and hardware monitoring conditions.
-
公开(公告)号:US10291493B1
公开(公告)日:2019-05-14
申请号:US14562474
申请日:2014-12-05
Applicant: Dell Software Inc.
Inventor: Joseph Rustad , Xiangrui Wang , Philip Jackson
Abstract: In one embodiment, a method includes identifying at least one transaction-path node as a problem node based, at least in part, on an analysis of end-to-end response times for a group of transactions. The method further includes determining one or more event types for the at least one transaction-path node. Also, the method includes, for each of the one or more event types, inferring a first event-relevance weight from an abstract model. The method also includes, for each of the one or more event types, inferring a second event-relevance weight from a concrete model. Furthermore, the method includes, for each of the one or more event types, determining an event relevance based, at least in part, on the first event-relevance weight and the second event-relevance weight. Additionally, the method includes identifying most-relevant events among a set of active events based, at least in part, on the determined event relevance.
-
公开(公告)号:US10289457B1
公开(公告)日:2019-05-14
申请号:US15084677
申请日:2016-03-30
Applicant: Dell Software Inc.
Inventor: Dorzak Slawomir
IPC: G06F9/54
Abstract: In one embodiment, a method includes determining a particular microservice to connect to an instance of a first container to provide a service. The method further includes identifying, from container metadata, one or more inputs of the first container. The method also includes searching the container metadata for containers that provide the particular microservice and whose outputs satisfy the one or more inputs of the first container. In addition, the method includes selecting a second container based on the searching, the second container comprising one or more outputs. Also, the method includes creating an instance of the second container. Furthermore, the method includes connecting the instance of the second container to the instance of the first container using the one or more outputs of the second container and the one or more inputs of the first container.
-
公开(公告)号:US10263986B1
公开(公告)日:2019-04-16
申请号:US14325074
申请日:2014-07-07
Applicant: Dell Software Inc.
Inventor: Charles Brian Bucklew , Alberto Rodriguez Aragones
IPC: H04L29/06
Abstract: In one embodiment, a method is executed by an information handling system comprising computer hardware. The method includes monitoring a desktop environment of a user for a desktop-administration event. The method further includes, responsive to a detected occurrence of the desktop-administration event, identifying at least one script-execution process to invoke. The at least one script-execution process executes at least one privilege-agnostic desktop-administration script. The method also includes determining whether the at least one script-execution process is designated for privilege elevation. Moreover, the method includes, responsive to a determination that the at least one script-execution process is designated for privilege elevation, injecting a security token of the at least one script-execution process with elevated privileges to yield a privilege-injected script-execution process. Also, the method includes invoking the privilege-injected script-execution process in the desktop environment so that the desktop-administration script executes as the user with the elevated privileges.
-
公开(公告)号:US10250722B2
公开(公告)日:2019-04-02
申请号:US14975625
申请日:2015-12-18
Applicant: Dell Software Inc.
Inventor: Miao Mao , Zhong Chen
IPC: G06F15/173 , H04L29/06 , H04L12/851 , H04L12/807
Abstract: The present disclosure relates to an apparatus, a method, and a non-transitory computer readable storage medium for managing bandwidth in a computer network. The method may identify that a first received packet belongs to a first traffic class and a second received packet belongs to a second traffic class where the first traffic class is associated with a higher priority than the second traffic class. The method may also identify that the first and the second traffic classes compete for shared bandwidth at the computer network. The method may monitor a number of bytes received that are associated with the first traffic class and second traffic class and perform a series of calculations used to adjust a window size according to the relative priorities of the first and the second traffic class.
-
10.
公开(公告)号:US10187446B2
公开(公告)日:2019-01-22
申请号:US14665315
申请日:2015-03-23
Applicant: DELL SOFTWARE INC.
Inventor: Hugo Vazquez Carames
Abstract: A firewall may identify a uniform resource locator (URL) being transmitted to a user device, the URL link pointing to a host system. The firewall can then modify the URL link to point instead to a sandbox system. Once a user at the user device selects the URL link (e.g., by clicking or touching it in a browser), the firewall receives the user device's HTTP request and directs it to the sandbox system, which generates a new HTTP request that is then sent through the firewall to the host system. The host system then sends host content to the sandbox system instead of to the user device. The user device may then be presented with a representation of the host content as rendered at the sandbox system (e.g., through a remote desktop interface).
-
-
-
-
-
-
-
-
-