Patent classifications
H04L67/00
Remote access service inspector
A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer network through a plurality of inspections. A remote access configuration file is created for the remote access client. A digital hash of the configuration file is then generated. The digital hash is compared with a configuration file stored at a predefined web location. If the comparison results in a match between the digital hash and the stored configuration file, a digital hash comparison is performed between an encrypted remote access configuration file and an encrypted configuration file stored at the predefined web location. If the plurality of inspections are passed, the remote access client is released from a quarantine state and a virtual private network (VPN) connection to the remote access server is established.
System and method for making a recommendation for a user of a life management system
A life management system receives data from a client device worn by a user, the data comprising biotelemetry data and activity data collected about a user wearing the client device. The life management system generates snapshot information using information from a group consisting of: the biotelemetry data, activity data, social data associated with the user, and user profile information associated with the user. The life management system generates a recommendation using portions of the snapshot information, and updates the snapshot information with the recommendation. The life management system executes a recommendation associated with the snapshot information in accordance with the user controls associated with the user.
Web component dynamically deployed in an application and displayed in a workspace product
Provided are computer-implemented methods and systems for dynamically deploying a web component in an application. An example method for dynamically deploying a web component in an application may include deploying a client-side application to a web browser associated with a client device. The method may continue with receiving a request to deploy a web component in the client-side application. The method may further include dynamically loading the web component in the client-side application. With this method, web components can be dynamically added to a current operating version of a web application. Further, a user can use a web application as if it is operating locally on the web browser of the client device, even though it is not actually stored locally on the client device.
Causality determination of upgrade regressions via comparisons of telemetry data
Disclosed herein is a system for automating the causality detection process when upgrades are deployed to different resources that provide a service. The resources can include physical and/or virtual resources (e.g., processing, storage, and/or networking resources) that are divided into different, geographically dispersed, resource units. To determine whether a root cause of a problem is associated with an upgrade event that has recently been deployed, a system is configured to use telemetry data to compute an upgrade-to-upgrade score that represents differences between two different upgrade events that are deployed to the same resource unit. The system is further configured to use telemetry data to compute an upgrade unit-to-unit score that represents differences between the same upgrade event being deployed to two different resource units. The scores can be used to output an alert, for an analyst, that signals whether a recently deployed upgrade event is the cause of a problem.
Data driven user interface for configuring device settings
Examples described here include systems and methods for configuring device settings for a number of user devices across an enterprise. A management server can provide a user interface at an administrator console for creating a profile and identifying an associated device type. The management server can then retrieve a schema file associated with the device type. Based on information in the schema file, the management server can populate the user interface at the administrator console with available configuration options pertaining to the device type. An administrator can configure the options and send instructions to the management server to deploy the profile across the number of user devices. The management server can instruct each user device to download a device configuration application from an application repository and transmit the settings information to an agent application of the user device that has permission to configure the device configuration application.
Distributed resource management by improving cluster diversity
A method of distributed resource management in a distributed computing system includes determining usage of respective hardware resources by an application and generating usage metrics for the application, and assigning the application to a cluster of hardware resources to optimize diversity of usage of hardware resources in the cluster and to enhance utilization of the hardware resources by applications running in that cluster. The diversity of usage of the hardware resources is determined from respective usage metrics of the respective applications running in that cluster. The diversity of usage of the hardware resources in the cluster is optimized by assigning the application to a diversity pool of hardware resources adapted to minimize interference when applications assigned to the diversity pool of hardware resources access the hardware resources in the diversity pool and assigning applications from different diversity pools to the cluster of hardware resources.
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.
Method, apparatus, and computer program product for installing third party applications requiring variable host address identification in a group-based communication system
Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products that provide for an improved and more efficient system of networked computing devices. The embodiments disclose an apparatus and system that enable client devices to install integrations of a third party application that supports variable host address identification. The apparatus and methods further enable a user of the client device to modify the host address identification associated with an installed integration. In this manner, the group-based communication system establishes communication links with network locations that vary from integration to integration and that may vary over time. To implement the invention, the group-based communication system supports the creation of a blueprint application, with an associated blueprint row that serves as the basis from which a plurality of differing integrations are generated. Further, the blueprint row stores variable host address identifications. The reduced number of data structures that result from supporting variable host address identifications increases system efficiency and reduces infrastructure requirements.
Data collection configuration file generation
A network monitoring system may receive a configuration request to generate a configuration file associated with collecting feature or debug data associated with a feature, hardware, or software associated with a network device. The network monitoring system may determine a command profile associated with the feature, hardware, or software that identifies a set of commands associated with obtaining the feature or debug data from the network device. The network monitoring system may determine respective parameters of one or more commands of the set of commands. The network monitoring system may determine, based on the respective parameters, respective arguments of the one or more commands. The network monitoring system may generate the configuration file based on the respective arguments and may perform an action associated with the configuration file to permit the configuration file to be used to collect the feature or debug data from the network device.
Automated port configuration management in a service mesh
Systems, methods and/or computer program products for managing and dynamically automating service mesh communications between microservices, eliminating unnecessary exposure of microservice ports and increasing security between microservices of the service mesh. The control plane collects data describing communications between microservices and tracks the frequency at which microservices communicate. Collected data is fed to machine learning models which outputs a forecast predicting future communication interactions between microservices. Using the predicted requirements for facilitating communications between microservices of the service mesh, an allowed list of communications can be generated describing the microservices allowed to send and receive communications, duration of communications allowed, when such communications are allowed, and the ports that will be used for facilitating the communication between microservices. Administrators of the service mesh may manually override the one or more approved aspects of the dynamically generated allowed list configured automatically by the service mesh.