G06F8/62

Algorithm downloading method, device, and related product

An algorithm download method, a device, and a related product. The method includes: obtaining an algorithm identifier of an algorithm and a capability description of a client; sending the algorithm identifier and the capability description to a cloud; and receiving a version code that is of the algorithm and that is returned by the cloud, where the version code is obtained by the cloud by searching based on the algorithm identifier and the capability description. According to the foregoing solution, an algorithm can be easily downloaded.

Transfer via transaction app

Systems and methods may generally include sending an executable application, which when executed, automatically causes a monetary transfer. An example method may include performing, at a first user device, a handshake with a second user device, receiving, during the handshake, an operating capability of the second user device, and configuring, based on the operating capability of the second user device, an executable application, which when executed, automatically causes a monetary transfer to occur. The configured executable application may be sent to the second user device for execution.

INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM

The present disclosure relates to an information processing device, an information processing method, a program, and an information processing system each capable of achieving flexible use of a storage region of a secure element. When a trigger is acquired by an external trigger device from the outside, an applet is installed or deleted into and from the secure element according to the type of the acquired trigger. The information processing device and the like of the present disclosure are applicable to an electronic apparatus including a secure element.

METHOD AND APPARATUS FOR MANAGING APPLICATION

A method for managing an application executed in a user terminal according to an embodiment of this disclosure includes executing a launcher application on the user terminal, displaying a first application list within a first GUI of the launcher application, installing, in the user terminal, a first application selected by a user from applications included on the first application list, displaying a second application list within a second GUI of the launcher application and executing a second application selected by the user from applications included on the second application list.

Method and system of running an application

A method for transmitting an application is disclosed. The method includes, for example, receiving, from a client, an input for initiating the application; generating an application bundle associated with the application, the application bundle including an address of a server, the address capable of enabling a program on the client to request, from the server, information needed for running the application; and transmitting the application bundle to the client.

DYNAMIC MANAGEMENT OF APPLICATION UNINSTALLATION
20230111056 · 2023-04-13 ·

Systems, methods, and computer programming products for dynamically managing the uninstallation and/or re-installation of software applications stored or accessed by a computing system, including mobile devices. Management of the applications by the system can be periodically managed automatically or based on recommendations. Management of applications being uninstalled or reinstalled may be determined based on a rate a user accesses the application and/or data published or accessible by an application storefront, such as user reviews, storefront rankings, user feedback and uninstallation rates of the applications by other users. Applications experiencing a decreased level of average user satisfaction below a predetermined threshold can be proposed for deletion or automatically deleted. Replacement of underperforming or unsatisfactory applications with alternative applications having similar functionality but a higher rate of user satisfaction can be recommended or installed. Previously uninstalled applications can be recommended or automatically reinstalled upon average user satisfaction rising above configured threshold levels.

Predicting the impact of network software upgrades on machine learning model performance

In one embodiment, a service receives software version data regarding versions of software executed by devices in a network. The service detects a version change in the version of software executed by one or more of the devices, based on the received software version data. The service makes a determination that a drop in data quality of input data for a machine learning model used to monitor the network is associated with the detected version change. The service reverts the one or more devices to a prior version of software, based on the determination that the drop in quality of the input data for the machine learning model used to monitor the network is associated with the detected version change.

Automated Deployment of Enterprise Archive with Dependency on Application Server Via Script
20230142148 · 2023-05-11 ·

A computer implemented method, computer system, and computer program product for automated deployment of an updated configuration to a computer system. A set of management objects are provided that enable commands and command parameters to configure an environment. Using the set of management objects, a set of applications re that are installed in a current configuration. A deployment script to automatically deploy an updated configuration. In executing the deployment script, for each application to be installed, if a version of the application is running, the application is stopped. For each application to be installed, if a version of the application is installed in the current configuration, the application is uninstalled. Using the set of management objects, the application is installed according to the updated configuration, and executed.

Adaptive virtual services

Examples of the present disclosure describe systems and methods relating to adaptive virtual services. In an example, a user specifies a device configuration for a platform device. As a result, a service provider installs selected virtual-network functions and defines network connections as specified by the device configuration. Management software may also be installed, thereby enabling the service provider to communicate with and remotely manage the platform device. The installed virtual-network functions are activated on the platform device once it is delivered to the user. In some instances, the user changes the device configuration. For example, the user may install new virtual-network functions, reconfigure or remove existing virtual-network functions, or change defined network connections. As a result, the service provider reconfigures the platform device accordingly. Thus, the user need not purchase new specialized hardware in order to change the available functions of the computer network.

Installable Mutable Intelligent Security Package and Security System in Internet of Things Networks

Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication process, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate a report that includes information associated with the anomaly.