G06F8/63

Firmware upgrade method and apparatus, and terminal
11531535 · 2022-12-20 · ·

Embodiments disclose a firmware upgrade method and apparatus, and a terminal. The method includes: sequentially obtaining first upgrade data and operation instructions in all data blocks in a block differential upgrade package; converting first data into a second upgrade data in an image of an old firmware version according to the operation instruction; and controlling the first upgrade data and the second upgrade data to overwrite a to-be-upgraded data area in the image of the old firmware version. An operation of upgrading to an image of a new firmware version is completed in the image of the old firmware version based on the first upgrade data and the second upgrade data. In addition, in comparison with a conventional differential upgrade package, in the block differential upgrade package, a part or all of data in the conventional differential upgrade package is replaced with an operation instruction.

Identity-based security platform and methods

A method and system for securing instantiates. The method includes determining at least one signable file among a plurality of files of an instantiate, wherein determining the at least one signable file further comprises classifying each of the plurality of files with respect to whether the file is changed at runtime; signing each of the at least one signable file to create at least one first signature, wherein signing the plurality of files further comprises computing a cryptographic hash for each file, wherein each encrypted hash is signed using a private key; and verifying an identity of the instantiate using the at least one first signature, wherein verifying the identity of the instantiate further comprises comparing the at least one first signature to the at least one second signature, wherein each of the at least one second signature is a signature of one of the at least one signable file at runtime.

Enhancing DevOps workflows in enterprise information technology organizations

Discussed are DevOps systems, methods, and apparatuses that provide a solution for organizing, reporting, and facilitating the automation of deploying infrastructure, platform, and application code for an IT enterprise. A logical data model for organizing components of the DevOps approach may include inventories for systems, environments, applications, resources, and deployments. A set of components may be built to provide an organizational structure to collect, report, and facilitate the automation of applications and the deployments of those applications across the enterprise. An artifact inventory may be used to request a deployment of specific versions of artifacts to an environment, providing a complete picture of what the environment should contain after a deployment. This inventory may be linked to business-level system inventory tracking as well as low-level computing resource tracking to provide a complete picture of total cost of ownership.

Dynamic automation of prerequisite component deployment in disconnected environments
11531530 · 2022-12-20 · ·

Systems and methods analyze for installing dependencies required for the installation of prerequisite components of cloud infrastructure to be installed in a disconnected environment are presented herein. An automation playbook generated after an assessment of a disconnected environment may be analyzed to determine a set of dependencies required by the automation playbook (e.g., packages and files required by each installation playbook called by the automation playbook). Each of the dependencies may be brought into the disconnected environment and installed as operating system packaging units, or deployed as containerized services. After all of the dependencies have been installed, a processing device may generate an installation report indicating whether the installation of each prerequisite component was successful or not. Upon determining that each of the prerequisite components was successfully installed, the processing device may install the cloud infrastructure on the disconnected environment.

METHOD AND SYSTEM FOR AUTOMATICALLY CREATING INSTANCES OF CONTAINERIZED SERVERS

Method and system of automatically creating an instance of a containerized server within an Integrated Development Environment (IDE) is provided. The method includes registering a containerized server in a framework, upon a request from a server developer and creating a docker image from within IDE upon a first request from an end user. The docker image includes metadata corresponding to a project and includes project runtime ID and list of exposed ports. The method includes creating a docker container from within IDE upon a second request from end user, using docker image and based on metadata. The method further includes automatically creating and upon creating the docker container, an instance of the containerized server within the IDE by executing a wrapper class corresponding to the project runtime ID and to the containerized server. The containerized server corresponds to the docker container and wrapper class may be executed by the framework.

DISTROLESS MICROSERVICE FOR SMALL FOOTPRINT TARGETS

Disclosed herein are network elements for use in a transport network. The network elements may comprise an embedded device and a computing device comprising a processor and a memory storing a container runtime that when executed causes the processor to initialize a runtime base layer, initialize a plurality of containers, and provide, to each of the containers, access to at least one common resource. The runtime base layer may comprise an operating system and one or more common resource. The embedded device may have one or more property affecting a function of the embedded device and one or more status. The operating system may lack a software distribution. The common resources may be based on a common requirement of at least two of the applications. Each of the containers may comprise a particular one of the applications and one or more unique resource based on a unique requirement of the particular one of the applications.

Management system and control method
11526468 · 2022-12-13 · ·

A management system gives an instruction to assign a value of an attribute corresponding to an environment where a processing system including a virtual machine started using a system image file is constructed, to the system image file, determines, based on a condition according to the value of the attribute assigned to the system image file in response to the instruction, whether the system image file is to be deleted, and gives an instruction to delete, from a storage device, the system image file that has been determined to be deleted.

WIDGET DELIVERY WORKFLOW SYSTEM AND METHOD
20220391201 · 2022-12-08 ·

A method may include receiving a version of software widget source code, storing the version of software widget source code, and determining that a version of application source code and a view of software widget source code are used in a deployment environment. The version of application source code may call the version of software widget source code. The method may further include determining that the version of software widget source code corresponds to the view of software widget source code, constructing a build including the version of application source code and the version of software widget source code, and deploying the build in the deployment environment.

CI/CD PIPELINE TO CONTAINER CONVERSION
20220391215 · 2022-12-08 ·

A method includes receiving, by a processing device, a definition of a CI/CD pipeline for executing a set of stages of the CI/CD pipeline. The CI/CD pipeline is associated with a first computer system. The method further includes converting, by the processing device, the definition into a container image file, and causing, by the processing device using the container image file, a second computer system to implement a container executing the CI/CD pipeline.

METHOD FOR ESTABLISHING REMOTE WORK ENVIRONMENT TO ENSURE SECURITY OF REMOTE WORK USER TERMINAL AND APPARATUS USING THE SAME

Disclosed herein are a method for establishing a remote work environment for ensuring the security of a user terminal for remote work and an apparatus using the method. The method, performed by the apparatus, includes acquiring media image creation information from a user; creating a certificate for VPN access based on the media image creation information and creating a media image using the media image creation information and the certificate for VPN access; and providing the media image to the user such that the user is able to create a medium for remote work. The user terminal for remote work is booted through the medium for remote work, thereby configuring a runtime environment for remote work in which security is ensured.