G06F9/4416

REMOTE TECHNICAL SUPPORT SERVICE
20220386129 · 2022-12-01 ·

Examples of computing devices for establishing a communication link with a remote device to contact a remote technical support service are described herein. In an example, a computing device may include a cellular communication interface and a processor. The processor may receive a first user input indicative of contacting a remote technical support service for the computing device. Based on the first user input, the processor may further establish a communication link between the computing device and a remote device over the cellular communication interface to contact the remote technical support service when the computing device is unbootable.

Kernel-integrated instance-specific operational resources with virtualization

A network boot of a platform-specific operating system kernel is performed from a compressed platform-specific operating system kernel. The platform-specific operating system kernel, when booted, dynamically builds from the compressed platform-specific operating system kernel a bootable file system and boots application code. An application is loaded from the bootable file system.

Targeted data extraction system and method

Many mobile devices are used for documenting different scenarios that are encountered by the users as they go about their daily lives. In many situations, a mobile device may be used to document the scenario. This data may be of significant forensic interest to an investigator. In many situations, the owner of the phone may be willing to provide the investigator access to this data (through a documented consent agreement). Such consent is usually contingent upon the fact that not all the data available on the phone may be extracted for analysis, either due to privacy concerns or due to personal reasons. Courts have also opined in several cases that investigators must limit data extracted, so as to focus on only “relevant information” for the investigation at hand. Thus, only selective (or filtered) data should be extracted as per the consent available from the witness/victim (user). Described herein is the design and implementation of such a targeted data extraction system (TDES) for mobile devices. The TDES assumes consent of the user and implements state of the art filtering using machine learning techniques. This system can be used to identify and extract selected data from smart phones, in real time at the scene of the crime.

Network initialization monitoring system

A network initialization monitoring system includes a host device coupled to a storage system and a monitoring system via a network, and including an initialization subsystem coupled to ports. During network initialization of the host device via the storage system, the initialization subsystem provides a first instance of a communication protocol for monitored port(s), and provides a second instance of the communication protocol for a monitoring port. During the network initialization of the host device via the storage system, the first instance of the communication protocol provided for each monitored port provides copies of network initialization communications transmitted via that monitored port and the network to the second instance of the communication protocol provided for the monitoring port, and the second instance of the communication protocol provided for the monitoring port provides the copies of the network initialization communications to the monitoring system.

Configuration after cluster migration

A method, computer system and computer program product for processing configuration after a cluster migration are provided. In this method, a network booting program is received at a computing node from a management node for a cluster. The cluster includes at least one computing node. An operating system is booted in a memory of the computing node with the received network booting program. Configuration changes are received from the management node, and the configurations in a local storage of the computing node are updated according to the received configuration changes.

SYSTEMS AND METHODS FOR RAPID BOOTING AND DEPLOYING OF AN ENTERPRISE SYSTEM IN A CLOUD ENVIRONMENT
20230049936 · 2023-02-16 ·

The present disclosure relates to systems and methods for deploying enterprise systems in cloud environments. In one implementation, a system for deploying an enterprise system in a cloud environment may include at least one processor configured to provide: one or more first containers hosting at least one application with at least one enterprise function; one or more second containers hosting at least one microservice configured to activate the at least one enterprise function; at least one application programming interface (API) between the at least one microservice and at least one client; and at least one gateway configured to manage access to the at least one API.

CLOUD MANAGEMENT OF CONNECTIVITY FOR EDGE NETWORKING DEVICES

Certain edge networking devices such as application gateways may report status to a cloud-based threat management platform using a persistent network connection between the gateway and the cloud platform. Where a cloud computing platform for an edge networking device or the treat management platform imposes periodic timeouts, the threat management platform may monitor connects and disconnects for edge devices and asynchronously evaluate connection status of edge devices independently of a heartbeat or other signal through the persistent connection in order to distinguish periodic timeouts imposed by the cloud computing platform from networking devices that are compromised or malfunctioning.

AGENTLESS INSTALLATION FOR BUILDING DEPLOYMENTS

A method, a computer program product, and a system for server provisioning and deployment. The method includes receiving a deployment configuration for a server. The deployment configuration includes a requested software build and a requested installation of an application and configuration for the server. The method also includes reconfiguring hardware on the server based on the deployment configuration and via an out-of-band management card on the server and pushing a boot loader on to the server for installation of an operating system. The method further includes performing an installation of the operating system on the server, transmitting an auto configuration file to the server. The auto configuration file provides installation properties relating to the application. The method also includes monitoring a status of the server during the installation of the application using a serial terminal output on the server.

Systems and methods for establishing secure remote connections to media devices

Systems and methods for establishing secure remote connections to media devices establish a secure shell (SSH) connection between two machines which are located in two different private networks, such as between a remote debugging computer and a receiving device. The receiving device has a persistent outbound connection with a message server. The remote debugging computer connects to a relay manager and obtains a relay instance IP address and port. The relay manager then forwards the relay instance IP address and port to the receiving device via the message server. After receiving the connection request from the message server, the receiving device connects to the relay instance IP and port and waits for the input data. The remote debugging computer performs an SSH handshake and the receiving device directly authenticates the SSH connection.

RESTART CONTROLLER

A native restart controller restarts services in a controlled manner. The services run in a cloud computing environment comprising a plurality of computing devices executing a plurality of Kubernetes pods comprising one or more containers. An indication is received of a deployment defining a service to be implemented in the cloud computing environment, the deployment including a desired number of instances of the service. An API is instantiated that is operable to provide a first state indicative of whether restarts are to be controlled by the restart controller and a second state indicating that a restart is required. In response to receiving an indication that restarts for the cluster are to be controlled by the restart controller and that a restart is required, the instances are restarted in a sequence in accordance with restart criteria associated with the service.