Patent classifications
G06F9/44568
SYSTEMS AND METHODS FOR UPDATE PROPAGATION BETWEEN NODES IN A DISTRIBUTED SYSTEM
Methods and apparatus to propagate an update between nodes in a distributed environment are disclosed. An example apparatus includes a database storing information about a deployment of infrastructure as a service (IaaS) components; and an update manager to: configure a first script to be executed upon boot of the apparatus, the first script to schedule execution of a second script for updating the IaaS components; in response to execution of the first script, schedule a second script for execution; in response to execution of the second script retrieve information about the IaaS components, determine an order for upgrades of the IaaS components, and trigger installation of an update for the IaaS components.
Embedded applications
Embedding applications, or parts thereof, into other applications, or parts thereof, is described. In an example, an engagement with a first application, or a part thereof, can be detected, which can trigger a second application, or a part thereof, to be initialized in response to the engagement. In at least one example, the first application, or a part thereof, can provisionally transfer to the second application, or a part thereof. Based at least in part on detecting a user interaction with the second application, or a part thereof, a portion of the user interaction can be embedded in the first application, or a part thereof, and the embedded portion of the user interaction can be presented via a user interface associated with the first application, or part thereof, via a user computing device.
Error testing for computers using temporary, self-terminating fault injectors
Methodologies for testing resiliency of server computer environments with greater security are disclosed. Access is provided to a subset of server computer resources to a client user within a distributed server computer platform to form the server computer environment. An ephemeral fault injector program is instantiated to implement a resiliency experiment within server computer environment. The ephemeral fault injector program is configured to self-terminate within the server computer environment upon completion of the resiliency experiment.
DATA PROCESSING SYSTEM, METHOD, AND APPARATUS
This application relates to the field of program code in computer technologies, and discloses a data processing system, method, and apparatus. The method includes: A first network device sends first request message to a second network device, where the first request message carries a first process context corresponding to a target task, the first process context includes a program code set, first indication information, and a target parameter. The second network device determines, based on the first indication information, a location of a first start line in the program code set from program code included in the program code set, runs the program code in the program code set based on the target parameter and by using the first start line as a start point, to complete at least one to-be-executed sub-task in the target task, where the target parameter is a parameter required when the to-be-executed sub-task is executed.
Methods, Devices, and Systems for Interactive Cloud Gaming
The various implementations described herein include methods, devices, and systems for interactive cloud gaming. In one aspect, an interface device with processors and memory storing an application program is used for cloud gaming. The interface device includes a communication module for receiving and/or transmitting messages and media streams between the interface device, a game controller, and a remote gaming server. The interface device further includes an output module configured to provide output of the application to an input of a display device coupled to or integrated with the interface device. The application is configured to implement a first mode in which the interface device processes and displays outputs associated with substantially all messages transmitted by the game controller, and a second mode in which the interface device processes and displays a predefined subset of messages from the game controller and displays gaming media streams from the gaming server.
CONFIGURATION OF COMPUTING DEVICES VIA CONTAINERS
Configuration of computing devices via containers is disclosed. A container image is accessed from a container image storage. A first container is initiated, into a container environment, from the container image with a first runtime variable. The first runtime variable identifies a first operational script of a first plurality of operational scripts, the first operational script identifying configuration actions to be performed on a plurality of managed computing devices. The container image comprises an execution layer that causes execution of a configurator. The configurator is configured to receive the first runtime variable, access the first operational script of the first plurality of operational scripts identified by the first runtime variable, perform the configuration actions identified in the first operational script on at least some of the plurality of managed computing devices, and communicate, outside of the first container, output results that identify an outcome of the configuration actions.
Application randomization mechanism
An example method includes generating, by a computing system, first unique configuration information, generating, by the computing system and based on the first unique configuration information, a first unique instance of a software component, generating second unique configuration information, wherein the second unique configuration information is different from the first unique configuration information, and generating, based on the second unique configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system.
System and method for protecting plain text scripting language programs in a mainframe rehosting platform
In accordance with an embodiment, described herein is a system and method for protecting a scripting language application in a computing environment. An encryption-decryption module in the computing environment can use a native encryption-decryption library to encrypt the application. The encrypted application can be installed in an environment specific to a user of the computing environment. At runtime, the encryption-decryption module can use the native encryption-decryption library to decrypt the encrypted application into plain text statements, and store them into a memory buffer. The encryption-decryption module can further create a pipe, and fork a child process. The child process can call a scripting language engine, which can read the plain text statements from the memory buffer through the pipe, and execute the plain text statements. Once the execution is completed, the encryption-decryption module can be terminated, thereby clearing the data in the memory buffer.
Do-not-disturb method and terminal
A do-not-disturb method and a terminal. The method includes: displaying, by the terminal, an interface of a first application, then, if the interface of the first application includes a media playing window, and the first application is in a media do-not-disturb mode, determining whether any first media playing in the window was triggered by a playing operation of a user. If the playing of the first media in the window was triggered by the playing operation of the user, the method includes playing the corresponding media, and if the playing of the first media in the window was not triggered by the playing operation of the user, the method includes pausing or stopping play of the corresponding media. This method can avoid automatic playing of media, to reduce resource waste, data traffic consumption, a processing load of a mobile phone, and power consumption.
System booting method and apparatus, node device, and computer-readable storage medium
A system booting method, a node device, and a computer-readable storage medium relate to the technical field of operating systems and include determining a location of a first operating system to be booted by the node device in a target persistent memory; and booting, based on the location of the first operating system and by the node device, the first operating system.