G06F8/63

SOFTWARE APPLICATION CONTAINER HOSTING

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining target application container configuration data to identify one or more target container base image referenced in the target application container configuration: subjecting script data associated to the one or more target container base image to text based processing for evaluation of security risk associated to the one or more container base image, the script data obtained from at least one candidate hosting computing environment; and selecting a hosting computing environment from the at least one computing environment for hosting the target application container, the selecting in dependence on the text based processing.

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM
20220374256 · 2022-11-24 ·

The present invention provides an information processing apparatus having a plurality of storages and method of controlling the information processing apparatus. The information processing apparatus obtains a container image, determine which of the plurality of storages is to store the container image, based on characteristic information of a program operating in a container included in the container image and characteristics of each of the plurality of storages, and starts the container based on the container image stored in a storage of the plurality of storages determined to store the container image.

Streamlined fast and efficient application building and customization systems and methods
11593075 · 2023-02-28 · ·

A system may receive a request from a user to build a custom application specific to an operating system (OS) platform. The system may include an application gateway and the custom application may be a user-customized variation of an application gateway client. The system may prepare a build request and send it to a bonding client running on a work station specific to the OS platform. The bonding client may execute build scripts with user-provided configuration information to create the custom application. Instead of submitting the custom application to a third-party digital distribution platform, the bonding client may store the custom application in a storage location accessible by the system. The system, responsive to the request from the user, may send a response to the computing device, the response containing a link to the storage location of the custom application.

Bootstrapping a microservices registry
11593118 · 2023-02-28 · ·

Bootstrapping a microservices container registry. A computing system node receives an installation package. The receiving computing system node bootstraps an initial invocation of the microservice by first installing a local container registry from the installation package and then by installing the microservice from the installation package. The installation package contains additional components that can be extracted, installed and invoked by executing the microservice at the computing system node after extracting from the local container registry. The installation package is generated by any node of the computing system and contains code corresponding to infrastructure microservices that are installed before invoking microservices that depend on the infrastructure. Temporary domain name services are installed from the installation package at a node-local IP address. The temporary domain name services are switched over to a different domain name service at a different IP address. A second computing system node is designated as a failover node.

Firmware update method and firmware update system thereof

A firmware update method and a firmware update system thereof includes the steps of: executing a setting process, which includes writing a first identification code into a memory module, and setting a firmware update file on a firmware providing end to make the firmware update file include a second firmware image file and a second identification code and executing a determining process, which includes receiving the firmware update file and determining whether the firmware update file conforms to a custom structure according to the first identification code. If it does not, then prohibiting the firmware update image file from updating a computer system, and if it does, replacing a first firmware image file with the second firmware image file and writing the second firmware image file into the memory module of the computer system along with the second identification code.

Network Function Virtualization Compute Element Image Upgrade
20230055620 · 2023-02-23 ·

A network function virtualization (NFV) compute element installs an image supporting a virtualized network function (VNF) on the element. The image includes instructions/data to initiate a TCP connection between the element and a Software Defined Network (SDN) controller upon reboot of the element. Upon rebooting, the element establishes, as client in accordance with the instructions/data, a TCP connection with the controller. The element then accepts, as a cryptographic network protocol server, a connection via the TCP connection from the controller as a client in accordance with the instructions. Next, the element accepts, as a network management protocol server, a connection via the cryptographic network protocol connection from the controller as network management protocol client. The element receives, from the controller over the network management protocol connection, commands regarding the status of the rebooted element, and then transmits, to the controller over the network management protocol connection, responses to the commands.

METHOD AND APPARATUS OF DEPLOYING A CLUSTER, AND STORAGE MEDIUM

Provided are a method and an apparatus of deploying a cluster, and a storage medium, which relate to the field of computer technologies and may be applied to the cloud computing technology. The method includes steps described below. Master node configuration information of a cluster master node and slave node configuration information of each cluster slave node are determined. Independent configuration is performed on the cluster master node according to the master node configuration information. The slave node configuration information is sent to each cluster slave node, so that each cluster slave node performs independent configuration on the cluster slave node according to the slave node configuration information.

Operating system repairs via electronic devices

An example computing device includes a connector to establish a connection with an electronic device. The computing device also includes a storage device storing a firmware. The firmware is to, in response to detecting a recovery trigger to repair an operating system of the electronic device, establish a communication channel between the computing device and the electronic device. The firmware is to map a virtual network interface of the computing device to a transceiver of the electronic device and retrieve recovery data from a repository via the virtual network interface.

SYSTEMS AND METHODS FOR VERIFYING THE INTEGRITY OF A SOFTWARE INSTALLATION IMAGE
20220366087 · 2022-11-17 ·

Systems and methods for verifying the integrity of a software installation image before installing the software. Security of the software installation process is ensured by providing access to the software image from a security monitor using security policies. An installation system for protecting the installation of a software image includes instructions that, when executing on computing hardware, cause the computing hardware to implement: a verifier engine to verify the integrity of the software image, a security monitor engine to set an initial access state for the software image granting access to the verifier engine and to update the access state for the software image in accordance with at least one security policy, and an installer engine to install software contained in the software image according to the access state.

COMMUNICATION SYSTEM PERSONALITY PROVISIONING SYSTEM

A communication system personality provisioning system includes a communication system included in a computing system and coupled to a management system. The communication system stores authentication information in a UEFI database of a UEFI system in the communication system. The communication system receives a first operating software image and application/service from the management system, authenticates the first operating software image and application/service via first secure initialization operations performed by the UEFI system using the authentication information and, in response, installs the first operating software image and application/service on the communication system. The communication system subsequently receives a second operating software image and application/service from the management system, authenticates the second operating software image and application/service via second secure initialization operations performed by the UEFI system using the authentication information and, in response, installs the second operating software image and application/service on the communication system.