Joseph Fitzgerald - Franklin Lakes NJ, US Oleg Barenboim - Fort Lee NJ, US Gregory McCullough - Kinnelon NJ, US Gregg Tanzillo - Middletown NY, US Richard Oliveri - Warren NJ, US Daniel A. Clarizio - Antelope CA, US
Assignee:
ManagelQ, Inc. - Mahwah NJ
International Classification:
G06F 9/44 G06F 9/445
US Classification:
717172, 717177, 717121
Abstract:
Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets are disclosed. The system reads and stores a first version of data with a timestamp. The system then performs a local update by reading a second version of data with a timestamp, replacing the first set of data and timestamp, and storing the changes between the first and second versions of data. The system also may receive update requests from a remote location for the latest version of data. The changes between versions of data are sent to the remote location, where the changes between versions of data are stored and are usable to create the requested latest version of data and/or prior versions of data.
Locating An Unauthorized Virtual Machine And Bypassing Locator Code By Adjusting A Boot Pointer Of A Managed Virtual Machine In Authorized Environment
Joseph Fitzgerald - Franklin Lakes NJ, US Oleg Barenboim - Fort Lee NJ, US Richard Oliveri - Warren NJ, US
Assignee:
ManageIQ, Inc. - Mahwah NJ
International Classification:
G06F 9/455 G06F 7/04
US Classification:
718 1, 726 2
Abstract:
Methods and apparatus of locating an unauthorized virtual machine are disclosed. A virtual machine is registered with a management system. When the virtual machine is requested to start, the system determines whether the virtual machine is in an authorized environment. In an authorized environment, the virtual machine is enabled to operate normally. In an unauthorized environment, the virtual machine is disabled. The disabled virtual machine gathers information about the unauthorized environment and transmits the information to the virtual machine owner.
Methods And Apparatus For Storing And Transmitting Historical Configuration Data Associated With Information Technology Assets
Oleg Barenboim - Fort Lee NJ, US Gregory McCullough - Kinnelon NJ, US Gregg Tanzillo - Middletown NY, US Richard Oliveri - Warren NJ, US Daniel A. Clarizio - Antelope CA, US
Assignee:
ManagelQ, Inc. - Mahwah NJ
International Classification:
G06F 11/14
US Classification:
707679
Abstract:
Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets are disclosed. The system reads and stores a first version of data with a timestamp. The system then performs a local update by reading a second version of data with a timestamp, replacing the first set of data and timestamp, and storing the changes between the first and second versions of data. The system also may receive update requests from a remote location for the latest version of data. The changes between versions of data are sent to the remote location, where the changes between versions of data are stored and are usable to create the requested latest version of data and/or prior versions of data.
Methods And Apparatus For Locating An Unauthorized Virtual Machine
Oleg Barenboim - Fort Lee NJ, US Richard Oliveri - Warren NJ, US
Assignee:
ManageIQ - Mahwah NJ
International Classification:
G06F 21/12
US Classification:
726 30
Abstract:
Methods and apparatus of locating an unauthorized virtual machine are disclosed. A virtual machine is registered with a management system. When the virtual machine is requested to start, the system determines whether the virtual machine is in an authorized environment. In an authorized environment, the virtual machine is enabled to operate normally. In an unauthorized environment, the virtual machine is disabled. The disabled virtual machine gathers information about the unauthorized environment and transmits the information to the virtual machine owner.
Operating System Data Communication Method And System
In a computer system having different memory address spaces, for example, user space and kernel space, a method and system is provided for communicating data. A data structure is defined in the kernel space to store data. The data structure is virtually mapped to an application in user space such that the application can access the data structure through virtual memory addresses. By directly accessing the data structure, data transfers between the address spaces using system calls and/or interrupts can be reduced.
Systems And Methods For Identifying Computing Devices
The present disclosure provides new and innovative systems and methods for identifying computing devices. In an example, a computer-implemented method includes obtaining device attribute data for a computing device, generating a device fingerprint including a piecewise hash generated based on the device attribute data, determining a closest matching fingerprint, calculating attribute differences based on the device fingerprint and the closest matching fingerprint, verifying the closest matching fingerprint identifies the computing device based on the attribute differences, updating the closest matching fingerprint in a fingerprint database, and transmitting a notification generated based on the verifying.
Hash-Based Mount Point Lookup In Virtual File Systems
Systems and methods for performing hash-based mount point lookup in virtual file systems. An example method may include: receiving a first character string representing a file name; identifying, within an array of mount point strings, a second character string comprised by the first character string; identifying a file system object associated with a mount point path represented by the second character string; and utilizing the file system object to access a file referenced by the file name.
Overlay-Based File Tagging Using Virtual File Systems
Systems and methods for overlay-based file tagging using virtual file systems. An example method may include: receiving, from a file system client, a request to perform a file operation with respect to a file; identifying a part of the file name representing a mount point of a virtual file system associated with the file; identifying a memory pointer associated with the mount point; identifying, using the memory pointer, an instance of a class implementing the virtual file system; retrieving the metadata associated with a file using a memory data structure associated with the instance of the class, the memory data structure comprising a plurality of records, each record associating a file identifier with a metadata item; and performing the file operation using the metadata associated with the file.