Patent classifications
G06F8/63
AUTOMATED MIGRATION OF MONOLITHIC APPLICATIONS TO CONTAINER PLATFORMS
A method of migrating an application to a container platform includes the steps of: installing a first agent that collects information about the application; detecting information about a first process of the application, wherein the detected information about the first process is received from the first agent; and based on the detected information about the first process, generating a container file including instructions for building a first container that executes the first process and a deployment file for deploying the first container for execution on the container platform.
NETWORK INTERFACE DEVICE REDUCING STARTUP TIME OF APPLICATIONS
Examples described herein relate to a network interface device that includes circuitry and a memory. In some examples, the circuitry is to perform image construction operations, wherein the image construction operations comprise access to a base image of an application from the memory in the network interface device. In some examples, the circuitry is to provide a host server access to a constructed image bundle of the application.
Resilient software updates in secure storage devices
Disclosed herein are methods, computer readable media, and devices for performing software updates. In one embodiment, a method is disclosed comprising initializing a storage space of a secure storage device into a plurality of portions; copying an update program to a first portion in the portions and copying update data to a second portion of the portions; generating a first golden measurement for the first portion and a second golden measurement for the second portion; measuring the first portion; updating or rolling back an update to the secure device in response to determining that the measuring of the first portion does not match the first golden measurement of the first portion; and verifying an update operation upon determining that the measuring of the first portion matches the first golden measurement of the first portion.
DIGITAL ENGINEERING SECURE REMOTE ACCESS
An industrial information hub (IIH) and an industrial development hub (IDH) serve as an industrial ecosystem platform where multiple participants can deliver repeatable and standardized services relevant to their core competencies. The IIH system is centered around the development of an ecosystem that creates and delivers value to users—including industrial enterprises, OEMs, system integrators, vendors, etc.—through the aggregation of digital content and domain expertise. The IIH system serves as a trusted information broker between the ecosystem and the OT environments of plant facilities, and provides a platform for connecting assets, contextualizing asset data and providing secure access to the ecosystem. As part of this ecosystem, the IIH system uses a secure remote access architecture to allow users to remotely access data on their plant floor assets via a virtual private network connection.
INFORMATION PROCESSING SYSTEM AND APPARATUS TO GENERATE DESCRIPTION FILE CORRESPONDING TO REPRODUCTION APPLICATION BASED ON EDIT INSTRUCTION
An information processing system provides combined information in which a description file defining an operation procedure and a reproduction application configured to reproduce the description file are combined, as a combined application to be executed by an image processing apparatus. The information processing system includes one or more control circuits each having a processor and a memory containing instructions that, when executed by the processor, cause the processor to function as an acquisition unit, an output unit, a reception unit, and a generation unit. The acquisition unit is configured to acquire definition information from the reproduction application. The output unit is configured to output screen information to a display based on the definition information. The reception unit is configured to receive an edit instruction corresponding to the screen information. The generation unit is configured to generate the description file corresponding to the reproduction application, based on the edit instruction.
Facilitation of application containerization
A processor may run a target application. A processor may monitor one or more file open operations performed by the target application. A processor may record one or more file information items associated with one or more files, wherein the one or more files are opened by the one or more file open operations. A processor may select one or more target file information items, wherein the one or more target file items include a target file property from the one or more file information items. A processor may retrieve a first set of file names of one or more target files used by the target application from the one or more target file information items. A processor may utilize the one or more target files to facilitate containerization of the target application.
Method for a first start-up operation of a secure element which is not fully customized
A method is for a first-time startup of a not fully personalized secure element, which serves for the use of services of a mobile communication network, in a mobile terminal. In the method, the secure element is started and requested to transmit a status message. The secure element transmits a status message in which it is stated whether the secure element: S1) contains only a bootloader but as yet no firmware image for the secure element; S2) contains a firmware image for the secure element but is not yet fully personalized; or S3) is fully personalized. The secure element is accepted in the cases S1), S2) and S3) and rejected in other cases. In the case S1), a download for a firmware image of the secure element is initiated for a first-time startup.
Adaptive virtual function drivers for electronic devices
Techniques for providing adaptive virtual function (VF) drivers capable of operating with physical devices having a plurality of different hardware configurations are described. In one embodiment, for example, an apparatus may include logic to implement a virtual machine (VM), the logic to initialize an adaptive virtual function (VF) driver to facilitate communication between the VM and a physical device to be virtualized, establish communication between the adaptive VF driver and a physical function (PF) driver of the hypervisor for the physical device, activate a standard feature set for the adaptive VF driver to execute on a PF of the physical device, and negotiate activation of an advanced feature set for the adaptive VF driver to execute on the PF, the adaptive VF driver to provide the advanced feature set to the PF, the PF activate each feature of the advanced feature set supported by the PF.
Updating operating system images of inactive compute instances
Updating inactive compute instances is disclosed. It is determined that a first compute instance that boots from an operating system image on a first storage device is in an inactive state. It is determined that updates to the operating system image on the first storage device exist. The operating system image is copied from the first storage device to a second storage device. The operating system image on the second storage device is updated with the updates to generate an updated operating system image on the second storage device. The updated operating system image is copied form the second storage device to the first storage device in place of the operating system image.
Deployment and configuration of an edge site based on declarative intents indicative of a use case
Embodiments described herein are generally directed to an edge-CaaS (eCaaS) framework for providing life-cycle management of containerized applications on the edge. According to an example, declarative intents are received indicative of a use case for which a cluster of a container orchestration platform is to be deployed within an edge site that is to be created based on infrastructure associated with a private network. A deployment template is created by performing intent translation on the declarative intents and based on a set of constraints. The deployment template identifies the container orchestration platform selected by the intent translation. The deployment template is then executed to deploy and configure the edge site, including provisioning and configuring the infrastructure, installing the container orchestration platform on the infrastructure, configuring the cluster within the container orchestration platform, and deploying a containerized application or portion thereof on the cluster.