Patent classifications
H04L41/04
VIRTUAL NETWORK FUNCTION DESCRIPTOR GENERATOR
Techniques are described for generating a virtualized network function (VNF) descriptor (VNFD) indicative of resources for managing VNF components (VNFCs) across a plurality of virtualized infrastructure managers (VIMs) implemented in a virtualized computing environment configured in a user-specific configuration. A VNFD generator receives a solution description file (SDF) encoding user input pertaining to the user-specific configuration, and a VNFC descriptor encoding VNFC specific information. The SDF and VNFC descriptor are validated and translated to generate an abstracted VNFD that is independent of renderers implemented at the virtualized computing environment. The abstracted VNFD is translated to a VNFD that is specific to the renderers and VIM and VNFD-specific information at the virtualized computing environment.
Demand/response mechanism in a wireless sensor network
A wireless sensor network at a monitored location can be configured to generate sensor channel(s) of data to assess operational conditions at the monitored location. Inputs based on the sensor channel(s) of data are provided to a host system for analysis of a demand to one or more resources at the monitored location. Response messages can be generated based on the demand analysis and transmitted to actuator(s) at the monitored location to effect an adjustment to the operational conditions.
Demand/response mechanism in a wireless sensor network
A wireless sensor network at a monitored location can be configured to generate sensor channel(s) of data to assess operational conditions at the monitored location. Inputs based on the sensor channel(s) of data are provided to a host system for analysis of a demand to one or more resources at the monitored location. Response messages can be generated based on the demand analysis and transmitted to actuator(s) at the monitored location to effect an adjustment to the operational conditions.
Automatically suggesting completions of text
A user may respond to a request of another user by entering text, such as a customer service representative responding to a customer. As the user enters text, a suggested completion of the text may be suggested to the user so that the user may select the suggested completion instead of continuing to enter text. Previous messages between the two users and other information may be used to determine an appropriate suggested completion to the entered text. A neural network language model and a search graph may be used to select a suggested completion from a search graph of possible suggested completions.
COMPUTER SYSTEM
The embodiments of the disclosure provide a computer system, comprising a plurality of computing devices, each computing device comprising a storage unit and at least one computing unit which are connected in parallel, the plurality of computing devices being divided into a plurality of nodes, and the plurality of nodes forming a network topology; a communication device comprising an autonomous domain building module and a first communication module, the first communication module being configured for connecting the plurality of computing devices in a communication manner; and a task processing device comprising an addressing module and a task processing module. Therefore, the solution of the present disclosure meets the explosive demand of massive data and large amount computing power caused by artificial intelligence and blockchain to a certain extent.
COMPUTER SYSTEM
The embodiments of the disclosure provide a computer system, comprising a plurality of computing devices, each computing device comprising a storage unit and at least one computing unit which are connected in parallel, the plurality of computing devices being divided into a plurality of nodes, and the plurality of nodes forming a network topology; a communication device comprising an autonomous domain building module and a first communication module, the first communication module being configured for connecting the plurality of computing devices in a communication manner; and a task processing device comprising an addressing module and a task processing module. Therefore, the solution of the present disclosure meets the explosive demand of massive data and large amount computing power caused by artificial intelligence and blockchain to a certain extent.
TECHNIQUES FOR ACCESSING LOGICAL NETWORKS VIA A VIRTUALIZED GATEWAY
Disclosed are various embodiments for receiving, via a network, a request from a client to establish a network tunnel over the network. A credential is received from the client in order to establish the network tunnel. The client is authenticated based upon the credential. The client negotiates, via the network, to establish the network tunnel.
TECHNIQUES FOR ACCESSING LOGICAL NETWORKS VIA A VIRTUALIZED GATEWAY
Disclosed are various embodiments for receiving, via a network, a request from a client to establish a network tunnel over the network. A credential is received from the client in order to establish the network tunnel. The client is authenticated based upon the credential. The client negotiates, via the network, to establish the network tunnel.
Systems and methods for securely monitoring a shipping container for an environmental anomaly
Systems and methods are described for securely monitoring a shipping container for an environmental anomaly using elements of a wireless node network of sensor-based ID nodes disposed within the container and a command node associated with the container. The method has the command node identifying which of the ID nodes are confirmed as trusted sensors based upon a security credential specific to each of the ID nodes; monitoring only the confirmed ID nodes for sensor data broadcast those ID nodes; detecting the anomaly based upon the sensor data from at least one of the confirmed ID nodes; automatically generating an alert notification related to the detected environmental anomaly for the shipping container; and transmitting the alert notification to the external transceiver to initiate a mediation response related to the detected environmental anomaly.
Systems and methods for securely monitoring a shipping container for an environmental anomaly
Systems and methods are described for securely monitoring a shipping container for an environmental anomaly using elements of a wireless node network of sensor-based ID nodes disposed within the container and a command node associated with the container. The method has the command node identifying which of the ID nodes are confirmed as trusted sensors based upon a security credential specific to each of the ID nodes; monitoring only the confirmed ID nodes for sensor data broadcast those ID nodes; detecting the anomaly based upon the sensor data from at least one of the confirmed ID nodes; automatically generating an alert notification related to the detected environmental anomaly for the shipping container; and transmitting the alert notification to the external transceiver to initiate a mediation response related to the detected environmental anomaly.