Patent classifications
G06F9/4862
System and method for virtual machine resource tagging
A remote agent for managing virtual machines includes a persistent storage and a backup manager. The persistent storage stores backup/restoration policies. The backup manager generates backups of the virtual machines based on the backup/restoration policies. The remote agent also includes a resource tagger that obtains a management request for a virtual machine of the virtual machines; in response to obtaining the management request: performs a remote resource analysis of the virtual machine to obtain an application profile of the virtual machine; performs a multidimensional application analysis of the application profile to identify at least one tag; and applies the at least one tag to the virtual machine.
ELECTRONIC DEVICE AND OPERATING METHOD THEREOF
An electronic device including an application processor and a communication processor. The communication processor including a resource memory, the communication processor configured to monitor an occupancy rate of the resource memory, determine whether the electronic device is in an idle state, forcibly release a network connection, clear the resource memory, and reconnect the network connection.
System and methods for security inspection and protection of software containers at runtime
The present disclosure provides effective solutions to security inspection and monitoring of operations within security containers. The solutions overcome the challenges and difficulties caused by the isolation of the containers. One embodiment relates a computer-implemented method in which a security agent is migrated between one or more containers and the host machine by changing its namespace. Another embodiment relates to a computer-implemented method for user-mode object monitoring of one or more containers in which a security agent migrates serially to multiple containers while keeping user-mode object-monitoring handles for the containers. Thereafter, the security agent may migrate into the host machine and continue monitoring events within the containers using the user-mode object-monitoring handles. Another embodiment relates to a host machine which includes a master agent that communicates with multiple security agents holding user-mode object-monitoring handles for corresponding containers. Other embodiments and features are also disclosed.
Context Carryover Across Tasks for Assistant Systems
In one embodiment, a method includes maintaining contextual information from a first dialog session, wherein the contextual information comprises identifiers of entities and slots, receiving a user request during the first dialog session, determining a context carryover is required for an agent to execute a task associated with the user request, determining a first subset of the identifiers of the entities and a second subset of the slots of the contextual information from the first dialog session are shareable with the agent based on the agent and first resources of the identifiers of the entities and second resources of the slots, and executing the task by the agent based on the first subset of the identifiers of the entities and the second subset of the slots of the shareable contextual information.
ROBOT APPLICATION MANAGEMENT DEVICE, SYSTEM, METHOD AND PROGRAM
A robot application is executed by executing a plurality of kinds of virtual containers in cooperation with each other. To this end, a robot application management device (100), at least one robot device (300) and at least one computer device (400) are connected to each other via a local area network (600). A group of devices including these devices are managed as a cluster for executing the robot application, and each virtual container is placed and activated in any of the group of devices composing the cluster.
ENABLING A FOG SERVICE LAYER WITH APPLICATION TO SMART TRANSPORT SYSTEMS
A fog service layer architecture is disclosed using hierarchical fog node deployment including the co-existence and interactions of the fog node with a cloud node. The architecture also includes a list of functions, capabilities or services that are hosted in each fog node. One or more fog management procedures may be run between fog nodes (or between fogs and the cloud) and may comprise a fog capability discovery procedure, a fog connection verification procedure, and a fog capability status report procedure. In addition, fog nodes may be configured to interact with each other to get particular services using one or more fog service procedures described herein.
Peer-To-Peer Transfer of Edge Computing Based on Availability Scores
Peer-to-peer transfer of compute function state in an edge computing ecosystem is provided. An availability score corresponding to a mobile computing device is received. It is determined whether the availability score is less than an availability score threshold. In response to determining that the availability score is less than the availability score threshold, departure coordinates of the mobile computing device from the edge computing ecosystem and departure time are determined. At least one peer mobile computing device is identified having a corresponding availability score greater than the availability score threshold, a corresponding security profile that at least matches a security profile of the mobile computing device, and a corresponding compute power capability that at least matches a compute power capability of the mobile computing device. A compute function state of the mobile computing device is transferred to the at least one peer mobile computing device.
TASK DELEGATION AND COOPERATION FOR AUTOMATED ASSISTANTS
Task delegation and cooperation for automated assistants is presented. A method comprises receiving, at a centralized support center that is in contact with a plurality of automated assistants including a first automated assistant and a second automated assistant, a request to perform a task on behalf of an individual, formulating, at the centralized support center, the task as a plurality of sub-tasks including a first sub-task and a second sub-task, delegating, at the centralized support center, the first sub-task to the first automated assistant, based on a determination at the centralized support center that the first automated assistant is capable of performing the first sub-task, and delegating, at the centralized support center, the second sub-task to the second automated assistant, based on a determination at the centralized support center that the second automated assistant is capable of performing the second sub-task.
Computer system and method for distributing execution of a predictive model
Disclosed herein are systems, devices, and methods related to assets and predictive models and corresponding workflows that are related to the operation of assets. In particular, examples involve assets configured to receive and locally execute predictive models, locally individualize predictive models, and/or locally execute workflows or portions thereof.
FRAMEWORK FOR COMPUTING IN RADIO ACCESS NETWORK (RAN)
The present disclosure provides embodiments in which computing (e.g., edge computing) is part of base station (BS) capability. These embodiments may enable conducting computing offloading between a user equipment (UE) and BS in the radio access network (RAN), for example, compute in the RAN, and deliver true edge computing user experience. Other embodiments may be described and claimed.