G06F9/4411

METHOD OF STORING INSTRUCTIONS IN PROGRAM MEMORY AND ASSOCIATED SYSTEM
20230214336 · 2023-07-06 ·

In an embodiment, a system includes a contactless reader and an apparatus. The apparatus includes a contactless transponder including a contactless interface and a transponder wired interface and being configured to communicate with a contactless reader according to a contactless protocol through the contactless interface. The apparatus includes a bus coupled to the transponder wired interface, and at least one module coupled to the bus, the at least one module including a processing circuit, the contactless reader being configured to communicate instructions of a software program executable by the processing circuit to the at least one module through the contactless transponder.

Method for establishing social network and storage medium thereof

A method for establishing a social network provides a user to prepare a deliverable work system and delivery the deliverable work system to other users to associate the deliverable work system. The delivering step may be repeatable by the user and the other users to establish a direct-link relationship of the deliverable work system and each of the other users, such that the user and the other users are able to work together in the deliverable work system. And a home system for hosting and managing the deliverable work system owned by the user may have a social network system with a associated second home system owned by any of the other users by the deliverable work system.

Driver Configuration Management Method and Apparatus, Medium, Device, and System
20230214231 · 2023-07-06 ·

A driver configuration management method may be applied to a management device and includes determining target information, where the target information is used to represent a computing capability of an electronic device; converting, based on the target information, a configuration source file into a target configuration file that uses a target file format; and sending the target configuration file to the electronic device. The method may be applied to a scenario in which the management device generates and sends configuration files in different formats for electronic devices having different computing capabilities.

System and method of setting a configuration to achieve an outcome
11550597 · 2023-01-10 · ·

A method for improving performance of a computer procurement application includes using the procurement control system computer, determining a peer group associated with a first entity; using a procurement control system computer, obtaining, from client computers respectively associated with the entities, configurations that instruct a procurement application how to perform procurement tasks for the respective entities of the entities in the peer group; using a procurement control system computer, obtaining, from a first client computer associated with the first entity, a first configuration that instruct the procurement application how to perform procurement tasks for the first entity; obtaining a desired end result from the first entity; using the procurement control system computer, using a machine learning algorithm, determining configurations of the peer groups that have a causal relationship to the desired end result; providing a description of the configuration value to the client computer associated with the first entity.

ROBUST RESOURCE REMOVAL FOR VIRTUAL MACHINES
20230214247 · 2023-07-06 ·

Systems and methods providing robust resource removal for virtual machines. In one implementation, a hypervisor may receive configuration data associated with a virtual machine (VM). The hypervisor may determine, based on the configuration data, a type of support by the VM of recovery from unexpected hardware resource removal. The hypervisor may identify, based on the type of support of recovery form unexpected hardware resource removal, a type of access of the VM to one or more hardware resources. The hypervisor may launch the VM according to the type of access to the one or more hardware resources.

Secure virtual desktops and virtual applications with anti-keylogging capabilities
11550922 · 2023-01-10 · ·

Systems and methods are described for providing ways to protect client devices in communication with virtual desktops and virtual applications from keylogging attacks. A keyboard filter driver obfuscates scancodes from key presses produced on the keyboard of the client device so that malicious keylogging or keyboard hooking software is not able to observe user inputs. The obfuscated scancodes are conveyed and de-obfuscated before being applied in the virtual desktop or virtual application.

Systems, methods, and apparatuses for heterogeneous computing

Embodiments of systems, methods, and apparatuses for heterogeneous computing are described. In some embodiments, a hardware heterogeneous scheduler dispatches instructions for execution on one or more plurality of heterogeneous processing elements, the instructions corresponding to a code fragment to be processed by the one or more of the plurality of heterogeneous processing elements, wherein the instructions are native instructions to at least one of the one or more of the plurality of heterogeneous processing elements.

Deploying service containers in an adapter device

In one implementation, an adapter device includes a processor and a storage medium including instructions. The instructions are executable by the processor to: deploy a composer container in the adapter device, wherein the adapter device is coupled to a host device; receive, by the composer container, a plurality of adapter service requests from the host device; and in response to the plurality of service requests, deploy, by the composer container, a plurality of service containers in the adapter device, wherein each service container is to provide a particular adapter service to the host device, and wherein each service container is allocated a subset of the plurality of computing resources of the adapter device.

Techniques for preventing concurrent execution of declarative infrastructure provisioners

Techniques for preventing concurrent execution of an infrastructure orchestration service are described. Worker nodes can receive instructions, or tasks, for deploying infrastructure resources and can provide heartbeat notifications to scheduler nodes, also considered a lease. A signing proxy can track the heartbeat notifications sent from the worker nodes to the scheduler node. The signing proxy can receive requests corresponding to a performance of the tasks assigned to the worker nodes. The signing proxy can determine whether the lease between each worker node and the scheduler is valid. If the lease is valid, the signing proxy may make a call to services on behalf of the worker node, and if the lease is not valid, the signing proxy may not make a call to services on behalf of the worker node. Instead, the signing proxy may cut off all outgoing network traffic, blocking access of the worker node to services.

Dynamically routing code for executing

Code may be dynamically routed to computing resources for execution. Code may be received for execution on behalf of a client. Execution criteria for the code may be determined and computing resources that satisfy the execution criteria may be identified. The identified computing resources may then be procured for executing the code and then the code may be routed to the procured computing resources for execution. Permissions or authorization to execute the code may be shared to ensure that computing resources executing the code have the same permissions or authorization when executing the code.