Patent classifications
G06F9/541
Event proxies for functions-as-a-service (FaaS) infrastructures
Techniques for implementing event proxies in a Functions-as-a-Service (FaaS) infrastructure are provided. In one set of embodiments, a computer system implementing an event proxy can receive an event emitted by an event source, where the computer system is part of a first computing cloud including the FaaS infrastructure, and where the event source is a software service running in a second computing cloud that is distinct from the first computing cloud. The computer system can translate the event from a first format understood by the event source to a second format understood by a function scheduler of the FaaS infrastructure, where the function scheduler is configured to schedule execution of functions on hosts of the FaaS infrastructure. The computer system can then make the translated event available to the function scheduler.
Transaction-enabled systems and methods for resource acquisition for a fleet of machines
The present disclosure describes transaction-enabling systems and methods. A system can include a controller and a fleet of machines, each having at least one of a compute task requirement, a networking task requirement, and an energy consumption task requirement. The controller may include a resource requirement circuit to determine an amount of a resource for each of the machines to service the task requirement for each machine, a forward resource market circuit to access a forward resource market, and a resource distribution circuit to execute an aggregated transaction of the resource on the forward resource market.
Method and apparatus for real-time personalization
A computer-implemented method for generating content recommendations for content items, each content item associated with one of a plurality of customers, the method comprising: receiving, by a network-connected server, a content request from a requesting user, the content request comprising a user identifier and a customer identifier; retrieving request parameters from a computer-implemented parameter service, the request parameters comprising indicia of a plurality of models and parameters for the models; retrieving user data comprising a set of indicia of recommendable resources associated with the customer identifier; routing the content request, request parameters and user data to a plurality of ranking and optimization component, each component generating a recommendation score for each recommendable resource; generating content recommendations based on the recommendation score which content recommendations are returned to the requesting user and stored by the server as a recommendation event within a repository of recommendation events; evaluating the relative efficacy of the one or more components, which models are returned to the requesting user and stored by the server as a recommendation event within a repository of recommendation events; evaluating the relative efficacy of the one or more components through continued usage; optimizing model efficacy by updating parameters within the parameter service based on the relative efficacy.
Securing computing resources through multi-dimensional enchainment of mediated entity relationships
Synthesizing a control object for a computing event, the control object for securing a computing resource based on a set of access and privilege information provided through a set of mediated associations that are represented by an enchained set of certificates, portions of which are encrypted including entity-specific paths to entity-specific predecessor certificates and partial decryption keys therefor, wherein the control object is applied to secure the computing resource for performing a computing action indicated by a process-type entity identified in the certificate for the control object.
Workflows for automated operations management
Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.
Method, apparatus, and computer program product for machine learning model lifecycle management
Computing systems, computing apparatuses, computing methods, and computer program products are disclosed for machine learning model lifecycle management. An example computing method includes receiving a machine learning model selection, a machine learning model experiment creation input, a machine learning model experiment run type, and a machine learning model input data path. The example method further includes determining a machine learning model execution engine based on the machine learning model experiment creation input and the machine learning model experiment run type. The example method further includes retrieving input data based on the machine learning model input data path. The example method further includes executing a machine learning model experiment based on the machine learning model execution engine, machine learning model experiment creation input, and the input data. The example method further includes generating one or more machine learning model scores based on the machine learning model experiment.
DIFFUSE IDENTITY MANAGEMENT IN TRANSPOSABLE IDENTITY ENCHAINMENT SECURITY
A transposable identity enchainment system for diffuse identity management processing entities for each of users, data, and processes equivalently and having a recombinant access mediation system that mediates association among entities, an associational process management system that creates entity-defining indices, and a multi-dimensional enchainment system that enchains aspects of entity identities via mediated association certificates including at least one root certificate for at least one of the entities.
CONTEXT-BASED MEDIA INDEXING
Indexing of media sources available to media composition applications, such as video editing applications and digital audio workstations, is extended to sources of an arbitrary type, including non-file type sources. Examples of such sources include devices using baseband video and audio protocols, network ports and physical devices connected via USB, Thunderbolt, etc. The sources are discovered and indexed even when not previously known to the application with the result that any available bitstream becomes available to the application. Applications access the sources via feeders, which are addressable portals through which media essence is received. The indexing methods involve the instantiation of a hierarchy of plug-in software modules by a format-handling subsystem of the application or by a media indexing service servicing one or more applications.
MECHANISM FOR INTEGRATING I/O HYPERVISOR WITH A COMBINED DPU AND SERVER SOLUTION
A combined data processing unit (DPU) and server solution with DPU operating system (OS) integration is described. A DPU OS is executed on a DPU or other computing device, where the DPU OS exercises secure calls provided by a DPU's trusted firmware component, that may be invoked by DPU OS components to abstract DPU vendor-specific and server vendor-specific integration details. An invocation of one of the secure calls made on the DPU to communicate with its associated server computing device is identified. In an instance in which the one of the secure calls is invoked, the secure call invoked is translated into a call or request specific to an architecture of the server computing device and the call is performed, which may include sending a signal to the server computing device in a format interpretable by the server computing device.
APPLICATION PROGRAMMING INTERFACE TO CAUSE OPERATOR TO BE USED BY COMPILER
Apparatuses, systems, and techniques to add operators to a compiler. In at least one embodiment, one or more operators are added to a compiler using one or more application programming interfaces (APIs).