会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 26. 发明申请
    • DEPLOYMENT AND MANAGEMENT OF VIRTUAL CONTAINERS
    • 虚拟集装箱的部署和管理
    • US20130198764A1
    • 2013-08-01
    • US13743191
    • 2013-01-16
    • Martin KacinMark WrightMichael Gray
    • Martin KacinMark WrightMichael Gray
    • G06F9/54
    • G06F9/54G06F9/45537G06F21/53
    • A system virtualizes applications on a managed endpoint using containers. A managed endpoint receives a virtualized container from an IT automation appliance. The virtualized container includes an application and a virtualization module. The virtualization module includes computer program instructions for virtualizing the application. An operating system API call made by the application during execution is intercepted, and a portion of the computer program instructions are executed based on the operating system API call. The computer program instructions modify the behavior of the application to effect the file and data virtualization of the application. A virtualized container can be deployed and updated from an IT automation appliance along with an agent to support the deployment and updating of the virtualized container.
    • 系统使用容器虚拟化管理端点上的应用程序。 受管端点从IT自动化设备接收虚拟容器。 虚拟化容器包括应用程序和虚拟化模块。 虚拟化模块包括虚拟化应用程序的计算机程序指令。 在执行期间由应用程序进行的操作系统API调用被截取,并且基于操作系统API调用来执行计算机程序指令的一部分。 计算机程序指令修改应用程序的行为以影响应用程序的文件和数据虚拟化。 可以从IT自动化设备以及代理部署和更新虚拟化容器,以支持虚拟化容器的部署和更新。
    • 28. 发明授权
    • IT automation appliance imaging system and method
    • IT自动化设备成像系统和方法
    • US08140748B2
    • 2012-03-20
    • US13074194
    • 2011-03-29
    • Martin KacinMichael GrayMatthew Lewinski
    • Martin KacinMichael GrayMatthew Lewinski
    • G06F12/00
    • G06F9/4416
    • A system, method, and computer program product for harvesting an image from a local disk of a managed endpoint to an image library is provided. In an embodiment of the method for harvesting an image, a managed endpoint is provided with a boot image that causes the endpoint to instantiate a RAM disk and execute the boot image from the RAM disk. The boot image is used to harvest an image by determining data on a local disk of the managed endpoint to be included in the image that are not already stored in the image library. In one embodiment, this is done by comparing hashes calculated on the data on the local disk to hashes of data in the image library. The data not already stored in the image library are then copied to the image library.
    • 提供了一种用于将图像从被管理端点的本地磁盘收集到图像库的系统,方法和计算机程序产品。 在用于采集图像的方法的实施例中,向受管端点提供引导映像,引导端点实例化RAM盘并且从RAM盘执行引导映像。 启动映像用于通过确定要包括在映像库中未存储的映像中的受管端点的本地磁盘上的数据来收集映像。 在一个实施例中,这是通过将对本地盘上的数据计算的散列与图像库中的数据的散列进行比较来完成的。 然后将未存储在图像库中的数据复制到图像库。
    • 30. 发明申请
    • Architecture And Protocol For Extensible And Scalable Communication
    • 可扩展和可扩展通信的架构和协议
    • US20110125884A1
    • 2011-05-26
    • US13014922
    • 2011-01-27
    • Martin KacinMichael GrayAndrew Velline
    • Martin KacinMichael GrayAndrew Velline
    • G06F15/177G06F15/16
    • H04L41/0803H04L63/029
    • A system performs information technology (IT) tasks using a computer. Examples of IT tasks include installing or configuring software, displaying alerts, executing programs or scripts on the endpoint, or logging activities. In an embodiment of the system, a connection initialization module receives a request for a persistent connection over a network from a managed endpoint. The request is accepted and a persistent connection is opened with the managed endpoint. A tier-1 module then receives configuration information from the managed endpoint over the persistent connection. The configuration information includes a list of functional plugins on the managed endpoint, where a functional plugin comprises a software module for performing an IT task. The tier-1 module stores this configuration information along with information describing the persistent connection and maintains the persistent connection in an open state.
    • 系统使用计算机执行信息技术(IT)任务。 IT任务的示例包括安装或配置软件,在端点上显示警报,执行程序或脚本,或记录活动。 在系统的一个实施例中,连接初始化模块通过网络从受管端点接收对持续连接的请求。 该请求被接受,并且与受管端点一起打开持久连接。 一级模块然后通过持久连接从受管端点接收配置信息。 配置信息包括管理端点上的功能插件的列表,其中功能插件包括用于执行IT任务的软件模块。 一级模块存储此配置信息以及描述持久连接的信息,并将持久连接维持在打开状态。