H04L41/12

Method and system for automatic creation of trust communities

A method of automatically creating trust communities in a fleet of devices. The method includes finding candidate devices in a fleet of devices via one or more candidate discovery techniques and generating device-related data based on the candidate devices that are found, analyzing the device-related data via an analytics engine and creating one or more fleet orchestrator device lists based on the analysis of the device-related data, and automatically creating one or more new trust communities or suggesting joining one or more previously existing trust communities based at least on the one or more fleet orchestrator device lists for the candidate devices, wherein the one or more new trust communities or previously existing trust communities include at least a sub-set of the devices in the fleet, and wherein at least one of the managed devices in the sub-set of devices is configured as a root device to publish files via a file sharing function.

Technologies for providing shared memory for accelerator sleds

Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.

Technologies for providing shared memory for accelerator sleds

Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.

Methods and apparatus for wireless device attachment in a managed network architecture

Methods and apparatus for enhancing connectivity for a device backhauled by a wireline communication network. In one embodiment, the device comprises a small-cell or other wireless base station that is backhauled by a DOCSIS system within a managed HFC network, and the method and apparatus enable enhanced connection of user devices serviced by the base station (such as 3GPP UE or CBRS FWA) to a core entity for e.g., authentication and packet session establishment. In one implementation, enhanced Cable Termination System (CMTS) and cable modem (CM) devices coordinate to allocate prioritized service flows to traffic sourced from the base station. These service flows can selectively bypass extant DOCSIS protocols which might otherwise increase connection latency (including connection failure) such as AQM (active queue management) and packet dropping algorithms. In some variants, upstream service flow data rates can also be enhanced through temporary utilization of higher-order modulation and/or coding schemes.

Predictive pipeline analytics for a network management system

A controller device includes a memory and one or more processors coupled to the memory. The memory stores instructions that, when executed, cause the one or more processors to receive a query indicating a first time and a network service, determine a first set of configuration elements using telemetry data associated with the first time and the network service, and determine a second set of configuration elements using an intent model. The instructions further cause the one or more processors to determine one or more first metrics that occur at the first time using the first set of configuration elements and the second set of configuration elements, determine one or more second metrics at a second time using telemetry data received from the plurality of network devices, and generate data representing a user interface presenting the one or more first metrics and the one or more second metrics.

Predictive pipeline analytics for a network management system

A controller device includes a memory and one or more processors coupled to the memory. The memory stores instructions that, when executed, cause the one or more processors to receive a query indicating a first time and a network service, determine a first set of configuration elements using telemetry data associated with the first time and the network service, and determine a second set of configuration elements using an intent model. The instructions further cause the one or more processors to determine one or more first metrics that occur at the first time using the first set of configuration elements and the second set of configuration elements, determine one or more second metrics at a second time using telemetry data received from the plurality of network devices, and generate data representing a user interface presenting the one or more first metrics and the one or more second metrics.

CLOUD SYSTEM MIGRATION METHOD AND DEVICE, AND HYBRID CLOUD SYSTEM
20230043613 · 2023-02-09 ·

The present disclosure relates to the technical field of cloud computing, and to a cloud system migration method and device, and a hybrid cloud system. The method includes: dividing each service system in a first cloud system into a plurality of modules; determining the relation between a module to be migrated among the plurality of modules and other modules; copying said module among the plurality of modules to a second cloud system, the type of the first cloud system being different from that of the second cloud system; and establishing a relation in the second cloud system to complete the migration of the first cloud system.

UTILIZING MODELS TO INTEGRATE DATA FROM MULTIPLE SECURITY SYSTEMS AND IDENTIFY A SECURITY RISK SCORE FOR AN ASSET

A device may receive security data identifying assets of an entity, security issues associated with the assets, and objectives associated with the assets and may utilize a data model to generate, based on the security data, asset related data identifying mapped sets of security data. The device may process a first portion of the asset related data, with a first model, to calculate an asset risk likelihood score for an asset of the assets and may process a second portion of the asset related data, with a second model, to calculate an asset criticality score for the asset. The device may process a third portion of the asset related data, with a third model, to calculate an asset control effectiveness score for the asset and may combine the scores to generate a security risk score for the asset. The device may provide the security risk score for display.

Interference Reduction in Telecommunication Networks

Various embodiments of the teachings herein include a computer-implemented method for scheduling transmissions of a plurality of data streams in a telecommunication network. The transmissions are partitioned into transmission cycles with a predetermined length in time. Repetitive transmissions of each of the data streams are transmitted based on the predetermined length multiplied by a respective repetition rate. The method includes: determining a path through the network for the transmissions of each stream; determining a shared transmission links based on a comparison of the paths, wherein each shared transmission link is part of at least two of the paths; based on a numerical optimization, determining a phase of the repetitive transmissions for each data stream, the optimization using an objective function with a value for interference between two repetitive transmissions; and scheduling the transmissions of each data stream, wherein the transmissions start at a transmission cycle associated with the respective phase.

Interference Reduction in Telecommunication Networks

Various embodiments of the teachings herein include a computer-implemented method for scheduling transmissions of a plurality of data streams in a telecommunication network. The transmissions are partitioned into transmission cycles with a predetermined length in time. Repetitive transmissions of each of the data streams are transmitted based on the predetermined length multiplied by a respective repetition rate. The method includes: determining a path through the network for the transmissions of each stream; determining a shared transmission links based on a comparison of the paths, wherein each shared transmission link is part of at least two of the paths; based on a numerical optimization, determining a phase of the repetitive transmissions for each data stream, the optimization using an objective function with a value for interference between two repetitive transmissions; and scheduling the transmissions of each data stream, wherein the transmissions start at a transmission cycle associated with the respective phase.