G06F15/177

Method for a first start-up operation of a secure element which is not fully customized

A method is for a first-time startup of a not fully personalized secure element, which serves for the use of services of a mobile communication network, in a mobile terminal. In the method, the secure element is started and requested to transmit a status message. The secure element transmits a status message in which it is stated whether the secure element: S1) contains only a bootloader but as yet no firmware image for the secure element; S2) contains a firmware image for the secure element but is not yet fully personalized; or S3) is fully personalized. The secure element is accepted in the cases S1), S2) and S3) and rejected in other cases. In the case S1), a download for a firmware image of the secure element is initiated for a first-time startup.

Assigning identifiers to processing units in a column to repair a defective processing unit in the column
11698883 · 2023-07-11 · ·

A method of recording tile identifiers in each of a plurality of tiles of a multitile processor is described. Tiles are arranged in columns, each column having a plurality of processing circuits, each processing circuit comprising one or more tiles, wherein a base processing circuit in each column is connected to a set of processing circuit identifier wires. A base value is generated on each of the set of processing circuit identifier wires for the base processing circuit in each column. At the base processing circuit, the base value on the set of processing circuit identifier wires is read and incremented by one. The incremented value is propagated to a next processing circuit in the column, and at the next processing circuit a unique identifier is recorded by concatenating an identifier of the column and the incremented value.

Method for managing the operation of a system on chip, and corresponding system on chip

System on a chip, comprising several master pieces of equipment, several slave resources, an interconnection circuit capable of routing transactions between master pieces of equipment and slave resources, and a processing unit at least configured to allow a user of the system on a chip to implement within the system on a chip at least one configuration diagram of this system defined by a set of configuration pieces of information including at least one piece of identification information assigned to each master piece of equipment, The identification pieces of information are intended to be attached to all the transactions emitted by the corresponding master pieces of equipment, the set of configuration pieces of information not being used for addressing the slave resources receiving the transactions and being used to define an assignment of at least one piece of master equipment to at least some of the slave resources.

Method for managing the operation of a system on chip, and corresponding system on chip

System on a chip, comprising several master pieces of equipment, several slave resources, an interconnection circuit capable of routing transactions between master pieces of equipment and slave resources, and a processing unit at least configured to allow a user of the system on a chip to implement within the system on a chip at least one configuration diagram of this system defined by a set of configuration pieces of information including at least one piece of identification information assigned to each master piece of equipment, The identification pieces of information are intended to be attached to all the transactions emitted by the corresponding master pieces of equipment, the set of configuration pieces of information not being used for addressing the slave resources receiving the transactions and being used to define an assignment of at least one piece of master equipment to at least some of the slave resources.

System and method for managing clusters in an edge network

Various embodiments disclosed herein are related to an apparatus. In some embodiments, the apparatus includes a processor and a memory. In some embodiments, the memory includes instructions that, when executed by the processor, cause the apparatus to collect, at a cloud server, service data from a collector framework service of an edge network. In some embodiments, the memory includes instructions that, when executed by the processor, cause the apparatus to provide a configuration to the collector framework service based on the service data.

Configuration of logical networking entities

Some embodiments provide a method, for configuring logical network entities at a host computer. The method receives configuration data for a particular logical networking entity implemented at the host computer. The method identifies that the configuration data for the particular logical networking entity includes at least two conflicting configuration settings for the particular logical networking entity. At least one of the configuration settings for the particular logical networking entity is based on association of a configuration profile to a group of logical entities that includes the particular logical networking entity. The method determines a particular one of the conflicting configuration settings with a highest priority to apply to the particular logical networking entity at the host computer.

Deploying service containers in an adapter device

In one implementation, an adapter device includes a processor and a storage medium including instructions. The instructions are executable by the processor to: deploy a composer container in the adapter device, wherein the adapter device is coupled to a host device; receive, by the composer container, a plurality of adapter service requests from the host device; and in response to the plurality of service requests, deploy, by the composer container, a plurality of service containers in the adapter device, wherein each service container is to provide a particular adapter service to the host device, and wherein each service container is allocated a subset of the plurality of computing resources of the adapter device.

Method and apparatus for offloading hardware to software package
11695626 · 2023-07-04 · ·

A method, performed by a server, of executing a software package in a wireless communication system includes: obtaining package usage information for each of a plurality of software packages with respect to user equipment's (UEs) accessing a plurality of base stations (BSs) connected to the server; determining a first hardware component (HC) set, including a plurality of HCs, for processing tasks operating in a first software package from among the plurality of software packages, based on the package usage information including a use for each of the plurality of HCs included in the first HC set and a respective usage amount for the plurality of HCs; generating a second software package that is allocated to the first HC set; migrating the tasks operating in the first software package to the second software package; and deleting the first software package.

Management and control across heterogeneous edge devices of a client network using device abstractions

Automatic onboarding, management, and control across heterogeneous edge devices of a client network using device abstractions may be performed (e.g., different types of edge devices manufactured by different vendors). A device onboarding and integration service may emulate, by a first device abstraction, an edge device of a client network, where the edge device is a first type of device. The service emulates, by a second device abstraction, the edge device as a second type of edge device (e.g., from a different vendor/uses a different API). The service updates a state of the first device abstraction based on a state of the edge device. The service then updates a state of the emulating, by a second device abstraction, the edge device as a second type of edge device. The second device abstraction sends its updated state to an application at the client network.

Outcome-based workload configurations for information technology environments

A method and system for outcome-based workload configurations for IT environments. Existing solutions directed to implementing multi-tier configurations on bare-metal IT infrastructure tend to require specialized tools and skills on a tier-by-tier basis. A more unified approach, where a single or singleton configuration that defines and implements the desired state (or outcome) of one or more tiers, is sought and thus proposed. Within this disclosure, implementation of workload deployment policies, is emphasized.