Dabak
Prasad Dabak, Pune IN
Patent application number | Description | Published |
---|---|---|
20150199343 | OPTIMIZED FILE PROCESSING FOR LINKED CLONE VIRTUAL MACHINES - Techniques for optimizing file processing for linked clone virtual machines (VMs) are provided. In one embodiment, an agent executing within a linked clone VM can determine an identifier for a file to be processed by a file processor, where the identifier is based on a virtual disk location of the file. The agent can then transmit the identifier to the file processor. Upon receiving the identifier, the file processor can detect, using the identifier, whether the file has already been processed. If the file has already been processed, the file processor can short-circuit processing of the file. | 07-16-2015 |
Prasad Sharad Dabak, Pune IN
Patent application number | Description | Published |
---|---|---|
20150163117 | Inspecting Operations of a Machine to Detect Elephant Flows - Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file. | 06-11-2015 |
Prasad Sharad Dabak, Maharashtra IN
Patent application number | Description | Published |
---|---|---|
20150339475 | APPLICATION WHITELISTING USING USER IDENTIFICATION - Methods and systems for protecting a virtual machine network are disclosed. In an embodiment, a method involves storing an application whitelist including application-to-user associations in memory such that the application whitelist is immutable by a guest virtual machine, receiving a request to execute an application including an application identifier and a user identifier, comparing the application identifier and the user identifier of the request with the application whitelist, and generating an execution decision indicating whether the requested application can execute on the guest virtual machine. | 11-26-2015 |