G06F2009/45562

Systems and methods for real-time file storage and retrieval
11698809 · 2023-07-11 · ·

The retrieval of files can be facilitated in real-time in the general context of backup and recovery. A processor can receive a request to retrieve a particular volume of data from an object storage database. A virtual volume can be presented to an emulator for creation of a virtual machine representing the particular volume of data. A request can be received to access a particular file from the particular volume of data at a specific point in time. In response to the request to access the file, the data stream can be paused, the particular file can be fetched, and the particular file can be transmitted to the emulator.

Virtualization of complex networked embedded systems

A testing and verification system for an equivalent physical configuration of an in-flight entertainment and communications system with one or more hardware components includes a virtual machine manager. One or more virtual machines each including a hardware abstraction layer is instantiated by the virtual machine manager according to simulated hardware component definitions corresponding to the equivalent physical configuration of the hardware components. The virtual machines are in communication with each other over virtual network connections. A test interface to the one or more virtual machines generate test inputs to target software applications installed on the virtual machines. A display interface is connected to the virtual machines, with results from the execution of the target software applications responsive to the test inputs are output thereto.

Cloud resources management

Techniques discussed herein relate to managing service provider resources. The techniques may include receiving a first request to organize a first workload and a second workload into a space. The first workload may be associated with a first computing resource of a first service provider and the second workload may be associated with a second computing resource of a second service provider. The techniques may import data associated with the first workload and the second workload into the space. The techniques may cause an action to be performed for the first workload and the second workload by implementing a first workflow for the first workload and implementing a second workflow for the second workload.

Unified way to track user configuration on a live system

A method of remediating configurations of a plurality of system services running in each of a plurality of hosts, wherein each of the hosts is configured with a virtualization software for supporting execution of virtual machines therein, includes the steps of: retrieving actual configurations of the system services, wherein the actual configurations are stored in accordance with a configuration schema of the system services and include a user configuration, which is a configuration initiated by the user, and a system configuration, which is a configuration initiated by the host in response to the user configuration; retrieving desired configurations of the system services from a desired configuration file; comparing each of the actual configurations with a corresponding one of the desired configurations; and upon determining that at least one actual configuration, which is not a system configuration, is different from a corresponding one of the desired configurations, replacing the at least one actual configuration with the corresponding desired configuration.

INSTANCE CREATION METHOD, DEVICE, AND SYSTEM
20230214251 · 2023-07-06 ·

An instance creation method is provided, and includes: A cloud platform receives a first resource allocation request from a first user, where the first resource allocation request includes a quantity of resources that need to be allocated to the first user. The cloud platform allocates a first resource to the first user according to the quantity of resources that need to be allocated to the first user. The cloud platform receives a first instance creation request from the first user, where the first instance creation request includes a quantity of instances that need to be created for the first user. The cloud platform creates an instance based on the first resource according to the quantity of instances that need to be created for the first user. The foregoing solution can improve resource utilization.

Distributed authentication and authorization for rapid scaling of containerized services

The disclosed technology provides solutions for performing rapid authentication and authorization for distributed containerized microservices. In some aspects, a process of the technology can include steps for: associating a service type with a set of microservices or service pods, detecting deployment of a first microservice on a first host, and receiving an authentication and authorization state from a first virtual network edge (VNE) of the first host. In some aspects, the process can further include steps for distributing the authentication state to a second VNE on a second host, wherein the authentication state is configured to facilitate authentication of one or more subsequent microservices instantiated on the second host by the second VNE. Systems and machine readable media are also provided.

Methods, systems and apparatus for dynamically extending a cloud management system by adding endpoint adapter types

Methods, apparatus and articles of manufacture for dynamically extending a cloud management system by adding endpoint adapter types are disclosed. An example cloud management system includes: an interface to communicate with an external device; a host to manage requests and allocate resources through one or more virtual machines; and an endpoint registry to include an endpoint adapter and metadata defining the endpoint adapter, the endpoint adapter to specify communication between at least one of the host or the external device and an endpoint. In the example cloud management system, the host is to at least enable, via the interface, the external device to access the endpoint registry a) to register an endpoint adapter configuration with the endpoint registry and b) to retrieve the endpoint adapter configuration from the endpoint registry.

Remediating Vulnerabilities For Application Deployments
20230214246 · 2023-07-06 ·

Remediating vulnerabilities for application deployments, including: selecting an image conforming to a defined security policy; and migrating one or more application instances to one or more cloud computing instances generated based on the selected image.

EDGE PROVISIONED CONTAINERIZED TRANSACTION TAX ENGINE
20230214892 · 2023-07-06 ·

A computer system includes a container deployment and management server for executing a container builder. The container builder is configured to generate and deploy a transaction tax engine container. The container builder is configured to extract from client configuration settings a subset of multiple products and a subset of multiple geographic regions applicable to transactions processed by a client, identify a subset of the tax rate and rule data applicable to each of the subset of products in each of the subset of geographic regions, and create a local edge database including the subset of tax rate and rule data and excluding a reminder of the tax rate and rule data. The container builder is further configured to create a transaction tax engine container image and transmit the tax engine container image to an edge computing device.

Method and system for sizing a cloud desktop fabric

A system and method for a virtual desktop system is disclosed. The system includes a master fabric region including resources for provisioning a desktop. The system includes a plurality of expansion fabric regions. Each of the expansion fabric regions including replicated resources for provisioning the desktop from the master fabric region. The system includes a control plane having a global pool. A client device application operated by a user associated with the global pool accesses a desktop from either the master fabric region or one of the expansion fabric regions. The control plane is operable to add a new expansion fabric region to the plurality of expansion fabric regions or eliminate one of the plurality of expansion fabric regions.