Patent classifications
H04L67/00
Method and an apparatus for onboarding in an IoT network
An apparatus and method for joining an Internet of Things (IoT) network are provided, the apparatus including a communicator configured to receive, from an electronic device, an encrypted auto-onboard configuration data associated with the IoT network, a sensor configured to detect a user command, and at least one processor configured to generate a decryption key based on features extracted from the user command, decrypt the encrypted auto-onboard configuration data using the decryption key, and join the IoT network.
Transportation of configuration data with error mitigation
A method for mitigating errors in the transportation of configuration data may include identifying, at a development system, dependent configuration data associated with a first transport request. The dependent configuration data may implement a customization to a software application hosted at a production system. A reference table identifying the dependent configuration data may be sent to the production system. A missing object list identifying dependent configuration data absent from the production system may be generated at the production system based on the reference table. The missing object list may be sent to the development system where a corrective action may be performed such that the dependent configuration data identified by the missing object list as being absent from the production system is sent to the production system in the first transport request and/or a second transport request. Related systems and articles of manufacture, including computer program products, are also provided.
Dynamic updating of query result displays
Described are methods, systems and computer readable media for dynamic updating of query result displays.
METHOD AND ELECTRONIC DEVICE FOR SCHEDULING SOFTWARE UPGRADE OF NETWORK DEVICES
A method and an electronic device for scheduling software upgrade of network devices in an internet protocol (IP) based network are provided. The method includes predicting traffic directed towards at least one of the network devices, predicting at least one event to be occurred at the at least one of the network devices, determining a time period to schedule the software upgrade based on the predicted traffic and the determined at least one event, and scheduling the software upgrade in the time period.
Dynamic widget for displaying status information
Methods, apparatus, and processor-readable storage media for implementing dynamic widgets for displaying status information are provided herein. An example computer-implemented method includes executing a software widget configured to display, on a user device, status information associated with a plurality of items of an online data source; obtaining the status information from an application server via a first application programming interface, wherein the application server maintains at least a portion of the status information in a local database using a second application programming interface associated with the online data source; and updating a graphical user interface of the software widget to display the status information on the user device.
Access control for named domain networking
The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.
Near-hitless upgrade or fast bootup with virtualized hardware
An embodiment is directed to switchover operations with a virtualized network device in a cloud or remote infrastructure. The virtualized hardware switchover operations may be used to selectively and temporarily provide virtualized control-plane operations to the data-plane of a non-redundant network device undergoing an upgrade or a reboot of its control plane. A non-redundant network device may operate hitless, or near hitless, operation even when its control plane is unavailable.
Migration of network file copy operations between host computing devices
A method of migrating a network file copy (NFC) operation from a first host computing device to a second host computing device includes the steps of: transmitting a first request to the first host computing device to execute the NFC operation, wherein the NFC operation comprises transferring data from a shared datastore to another datastore; after transmitting the first request, selecting the second host computing device to complete the NFC operation in place of the first host computing device, and transmitting a second request to the first host computing device to stop executing the NFC operation; after transmitting the second request, detecting a message indicating that the first host computing device completed the copying of a first portion of the data; and in response to the detection of the message, transmitting a third request to the second host computing device to perform the remainder of the NFC operation.
Automatic creation of device campaigns
Disclosed are various embodiments for automatically creating device campaigns. A computing device first determines that a second version of a software package assigned to an existing device campaign has been uploaded to a data store. The existing device campaign can include an existing compliance policy applicable to individual IoT endpoints assigned to the existing device campaign. The compliance policy may specify that a first version of the software package be installed on the individual IoT endpoints. In response, to the change, the computing device can create a new device campaign that includes a new compliance policy applicable to the individual IoT endpoints assigned to the new device campaign. The new compliance policy may specify that the second version of the software package be assigned to the individual IoT endpoints.
Systems and methods of auditing server parameters in a telephony network
The current disclosure relates to a system and method for auditing application parameters in a communication network. In particular, the method includes retrieving a set of golden parameter master lists from an auditing database, where each golden parameter master list corresponds to an application of the telecommunications network, and where each golden parameter master list comprises a set of parameter values for the respective application. The method also includes selecting a list of one or more applications for auditing, and for each application in the list: selecting a corresponding golden parameter master list from the set of golden parameter master lists and comparing each of the parameter values of the golden parameter master list to a corresponding set of parameter values of the application to generate a set of discrepancies.