G06F9/45533

AUTOMATIC GENERATION AND ASSIGNING OF A PERSISTENT UNIQUE IDENTIFIER TO AN APPLICATION/COMPONENT GROUPING
20230004853 · 2023-01-05 · ·

A methodology for assigning an identity to a plurality of unsupervised machine learning based applications is disclosed. In a computer-implemented method, a machine learning based discovery of a plurality of unsupervised machine learning based applications spanning across a plurality of diverse components in a computing environment is received. A persistent unique identifier is assigned to each of the plurality of unsupervised machine learning based applications. It is then determined which of the plurality of diverse components in the computing environment is operating with each of the plurality of unsupervised machine learning based applications.

DISTRIBUTED AUTONOMOUS LIFECYCLE MANAGEMENT OF HYPERVISORS IN A VIRTUALIZED COMPUTING SYSTEM
20230004413 · 2023-01-05 ·

An example method of hypervisor lifecycle management in a virtualized computing system having a cluster of hosts is described. The method includes: obtaining, by remediation software executing in a host of the hosts, a host state document from a distributed key-value store, the host state document defining a desired state of software in the host, the software including a hypervisor; and performing, by the remediation software in coordination with other hosts of the hosts through the distributed key-value store, a lifecycle operation on the software of the host in response to determining that a current state of the software does not match the desired state.

SYSTEMS, METHODS, AND DEVICES FOR ENCRYPTED DATA TRANSFER

A network interface controller includes processing circuitry configured to pair with a local root of trust of a host device connected to the network interface controller and provide a key to an encryption device of the host device that enables the encryption device to encrypt data of one or more host device applications using the key. The encrypted data are stored in host device memory. The processing circuitry is configured to share the key with a remote endpoint and forward the encrypted data from the host device memory to the remote endpoint.

Methods and arrangements for automated improving of quality of service of a data center

An automated improving of quality of service of a data center. Transients of a power grid fed to a power supply unit are monitored by a probe. Information on transients is provided across an interface to a server of the data center. Based on characteristics of the transients, a reliability of the data center is subjected to automated updating. A request for migration of workload requiring a higher reliability than the updated reliability can be sent to a central management. When the central management has identified another data center that can meet the required reliability, the central management migrates or relocates the workload to the another data center.

Managed switching between one or more hosts and solid state drives (SSDs) based on the NVMe protocol to provide host storage services

A non-volatile memory express (NVMe) switch is located in between a host and storage. A first storage access command is received from a host via a peripheral computer interface express (PCIe) interface to access the storage. The first storage access command conforms to NVMe and the storage comprises two or more solid-state drives (SSDs). A respective second storage access command is sent to the two or more SSDs based on the first storage access command. A respective completion is received from each of the two or more SSDs based on the respective second storage access command. A completion is sent to the host via the PCIe interface based on the received completions from each of the two or more SSDs.

Network-based machine learning microservice platform

A method may include a processing system having at least one processor for receiving a first machine learning model, the first machine learning model in a first format associated with a first development environment, adapting the first machine learning model to a containerized environment, validating the first machine learning model according to at least one validation criterion associated with a repository, and publishing the first machine learning model to the repository.

METHOD FOR DIMENSIONING AN ELECTRIC POWER RESERVED BY BASE STATIONS

A method for dimensioning an electric power reserved by at least one current base station among a plurality of base stations that are connected to a virtualization manager of a network infrastructure is disclosed. The method is implemented by the virtualization manager, the method includes receiving a request for dimensioning the reserved electric power; configuring, according to the dimensioning request, at least one server of the at least one current base station; and controlling, according to the configuration of the at least one server, at least one virtual computing resource of the network infrastructure, so as to dimension the reserved electric power.

OPERATING ENVIRONMENT PERSONALIZATIONS
20220413882 · 2022-12-29 ·

In some examples, a method includes receiving a personalization setting from a first agent on a first device. In some examples, the first device provides a local operating environment. In some examples, the method includes sending the personalization setting to a second agent on a second device that provides a virtualized operating environment, to coordinate a behavior or appearance of the virtualized operating environment with a personalized behavior or appearance of the local operating environment.

Cloud-based spam detection

A cloud based mobile internet protocol messaging spam defense. Short message service (SMS) messages are analyzed by a cloud based virtual machine to determine if should be considered potentially unwanted messages (e.g., spam). The cloud based virtual machine uses a user specific algorithm for determining if a message should be considered to be a potentially unwanted message. Messages that are determined to be potentially unwanted messages trigger a notification to be sent to a user device associated with the virtual machine. The notification requests confirmation from the user that the potentially unwanted message is an unwanted message. The user's response to a request for confirmation is then used to update an unwanted message database associated with the user and the user device.

MEC-based distributed computing environment with multiple edge hosts and user devices

Various systems and methods for enhancing a distributed computing environment with multiple edge hosts and user devices, including in multi-access edge computing (MEC) network platforms and settings, are described herein. A device of a lifecycle management (LCM) proxy apparatus obtains a request, from a device application, for an application multiple context of an application. The application multiple context for the application is determined. The request from the device application for the application multiple context for the application is authorized. A device application identifier based on the request is added to the application multiple context. A created response for the device application based on the authorization of the request is transmitted to the device application. The response includes an identifier of the application multiple context.