Patent classifications
G06F8/63
Information processing apparatus and information processing system
Methods and apparatus provide for downloading application software from a server, including: downloading the application software from the server, where a first application software file contains only a portion of the application software, and a second application software file contains more than the portion of the application software; executing the application software and generating application images based thereon, where execution of the first application software file contains enough of the application software to execute a limited amount of the application software; and displaying the application images on a display screen based on the execution of the application software, where the acquisition unit begins downloading the second application software file in a background process after downloading the first application software file and at least partially during the execution of the first application software file.
Edge cloud building system and method for high-speed installation of components of edge cloud
The present invention relates to an installation technology of components of an edge cloud, and particularly, to a system and a method of edge cloud building for high-speed installation of components of an edge cloud, which can reduce generation and setting operation hours of individual components by automating installation of individual components of the edge cloud.
To this end, in the edge cloud building system according to the present invention as a edge cloud building system for high-speed installation of components of an edge cloud, hierarchical components (IaaS, KaaS, PaaS) of an edge cloud are installed by using a server node image and a PaaS component image, and then detailed setting of the hierarchical components is performed by using a declarative script.
Remediating Vulnerabilities For Application Deployments
Remediating vulnerabilities for application deployments, including: selecting an image conforming to a defined security policy; and migrating one or more application instances to one or more cloud computing instances generated based on the selected image.
Package-based remote firmware update
A method for updating firmware includes receiving, at a device, an updated installation package. The updated installation package includes an updated version of an installation package, which belongs to a set of installation packages stored on the device for installation of firmware on the device. The method further includes updating the set of installation packages by replacing the installation package with the updated installation package. The method further includes installing updated firmware in volatile memory of the device based on the updated set of installation packages. The method further includes storing an image of the updated firmware in nonvolatile storage of the device. Additionally, the method includes, during a boot process, loading the image from the nonvolatile memory of the device onto the volatile memory of the device, to enable running the updated firmware from the volatile memory, and verifying the authenticity of the updated firmware.
Internet of things solution deployment in hybrid environment
Example methods are provided to deploy an Internet of Things (IoT) solution in a hybrid environment. The methods include deploying a first agent application on a first edge gateway of a first vendor by the first edge gateway. The first agent application is configured to collect a first set of information associated with the first edge gateway. The methods include deploying a second agent application on a second edge gateway of a second vendor by the second edge gateway. The second agent application is configured to collect a second set of information associated with the second edge gateway. In response to a determination of a first virtualized computing environment on the first edge gateway or a second virtualized computing environment on the second edge gateway fulfils a first requirement of a template to deploy the IoT solution, the methods include deploying the IoT solution in the first virtualized computing environment, the second virtualized computing environment, or both.
Global cache for container images in a clustered container host system
Container images are managed in a clustered container host system with a shared storage device. Hosts of the system each include a virtualization software layer that supports execution of virtual machines (VMs), one or more of which are pod VMs that have implemented therein a container engine that supports execution of containers within the respective pod VM. A method of deploying containers includes determining, from pod objects published by a master device of the system and accessible by all hosts of the system, that a new pod VM is to be created, creating the new pod VM, and spinning up one or more containers in the new pod VM using images of containers previously spun up in another pod VM, wherein the images of the containers previously spun up in the other pod VM are stored in the storage device.
High performance computing node configuration mechanism
A high performance (HPC) system is described. The system includes a head node comprising one or more processors to execute a configuration manager to receive a database trigger and transmit configuration updates including configuration input data and a plurality of compute nodes, communicatively coupled to the head node, each compute node comprising one or more processors to execute a client to receive a configuration update, generate a configuration file based on configuration input data included in the configuration update and configure the compute node based on the configuration file.
Container certificate injection
Methods, systems, and apparatus, including computer programs encoded on computer storage media for using certificate injection tasks to generate containers having corresponding digital certificates. One of the methods includes receiving, by the distributed computing system, a source container image. A certificate injection task is executed, including: launching a container instance from the source container image and executing injection code within an execution environment of the launched container instance that writes one or more digital certificates to one or more corresponding locations within a file system of the execution environment. An output container image having the one or more digital certificates is then generated.
Virtualized network functions verification using decentralized identifiers
This disclosure describes techniques for verifying virtualized network functions (VNFs) using Decentralized Identifiers (DIDs). For example, a system includes an orchestrator configured to obtain, using a Decentralized Identifier (DID) that is associated with a virtualized network function (VNF) image for a VNF, a DID document associated with the DID, verify, based on the DID document associated with the DID, the VNF image, and deploy the VNF image as a VNF instance on a Network Functions Virtualization infrastructure (NFVi). The system also includes one or more consensus networks that store the DID document associated with the VNF image in a distributed ledger.
INFORMATION PROCESSING SYSTEM AND APPARATUS TO MANAGE COMBINED APPLICATION
An information processing system that manages an application executed by an image processing apparatus with an application identifier includes one or more controllers configured to provide combined information of a reproduction application that reproduces a description file for defining operation procedures and a first description file as a first combined application, provide combined information of the reproduction application and a second description file as a second combined application, manage a first description identifier corresponding to the first description file and a second description identifier corresponding to the second description file, and manage the first combined application and the second combined application in a distinguishable manner based on the first description identifier and the second description identifier.