G06F9/45537

Universal Serial Bus (USB) Redirection for USB Human Interface Device (HID) Class Devices

Techniques for implementing improved USB redirection of USB HID class devices are provided. In one set of embodiments a client system can receive, from a virtual desktop running on a server system, a poll message directed to an HID interface of a USB HID class device plugged into the client system and identify a polling thread associated with the HID interface. The client system can further save a copy of the poll message in the polling thread and initiate local polling of the HID interface, where the local polling comprises providing, via the polling thread, the copy of the poll message to the HID interface.

Cross-function virtualization of a telecom core network

In the present disclosure, functions associated with the central office of an evolved packet core network are co-located onto a computer platform or sub-components through virtualized function instances. This reduces and/or eliminates the physical interfaces between equipment and permits functional operation of the evolved packet core to occur at a network edge.

Application invocation on specified operating system version

A computer-implemented method that includes determining that a first version of an operating system (OS) is updated to a second version of the OS. The method further includes determining that an application does not support the second version of the OS. The method further includes associating the first version of the OS with the application as a base OS. The method further includes invoking the application on the base OS by generating an isolated instance running the base OS on a user device, where the user device simultaneously runs the second version of the OS.

PERFORMING AN APPLICATION SNAPSHOT USING PROCESS VIRTUAL MACHINE RESOURCES

A snapshot handler is registered with an event monitoring subsystem of a process virtual machine, the registering specifying a trigger event of the snapshot handler, wherein the trigger event comprises execution of a specified portion of an application executing in the process virtual machine, the trigger event specified externally from a source code of the application. Responsive to the event monitoring subsystem detecting an occurrence of the trigger event, the snapshot handler is executed, storing data of an execution state of the process virtual machine at a time of occurrence of the trigger event.

Management of GNB in Network Functions Virtualization Framework
20220330035 · 2022-10-13 ·

Network Functions Virtualization (NFV) abstracts network functions, allowing them to be installed, controlled, and manipulated by software running on standardized compute nodes such as cloud computing platform rather than on dedicated hardware. In a 5G mobile communications network, the base station or gNB may be split into virtualized and non-virtualized network functions (NFs). Described herein are systems and methods for managing such gNBs within the NFV framework.

Automated system and method for extracting and adapting system configurations
11442759 · 2022-09-13 · ·

Some embodiments provide a method for extracting and adapting system configuration. The method extracts a first configuration from a first node of a first hosting system. The first node includes several resources for hosting the first configuration. The method analyzes the first configuration in order to determine attributes of the first configuration. The determined attributes are relevant to hosting the first configuration on a second node of a second hosting system having several nodes. The method generates a second configuration based on the determined attributes. The method hosts the second configuration at the second node of the second hosting system.

Scalable tenant networks

Template-driven locally calculated policy updates for virtualized machines in a datacenter environment are described. A central control and monitoring node calculates and pushes down policy templates to local control and monitoring nodes. The templates provide boundaries and/or a pool of networking resources, from which the local control and monitoring node is enabled to calculate policy updates for locally instantiated virtual machines and containers.

ELECTRONIC DEVICE FOR EXECUTING MULTIPLE OPERATING SYSTEMS AND METHOD OF CONTROLLING SAME

An electronic device for executing various operating systems is provided. The electronic device includes first and second hardware devices, a first operating system (OS), a second OS different from the first OS, and a processor configured to control the first hardware device to process first data from a first program executed on the first OS, obtain a command for executing the second OS, generate a container for executing the second OS based on a kernel of the first OS in response to the command for executing the second OS, execute the second OS on the generated container, execute a second program on the second OS, obtain second data regarding the second program from the second OS via socket communication by a control application installed on the first OS, and control the second hardware device to process the second data regarding the second program based on the first OS using the installed control application.

Provisioning composite applications using secure parameter access
11416220 · 2022-08-16 · ·

A mechanism for provisioning a composite web application using secure parameter transfer is disclosed. The composite web application includes a component that resides on a virtual machine (VM). A request is received from the component for a configuration parameter that is to enable periodic reconfiguration of the VM. An access condition is identified for accessing the configuration parameter and responsive to determining the access condition is satisfied, the requested configuration parameter is provided to the component. The VM is reconfigured using the requested configuration parameter.

Management of gNB in network functions virtualization framework
11405798 · 2022-08-02 · ·

Network Functions Virtualization (NFV) abstracts network functions, allowing them to be installed, controlled, and manipulated by software running on standardized compute nodes such as cloud computing platform rather than on dedicated hardware. In a 5G mobile communications network, the base station or gNB may be split into virtualized and non-virtualized network functions (NFs). Described herein are systems and methods for managing such gNBs within the NFV framework.