Patent classifications
H04L41/18
MOBILE MANUFACTURING MANAGEMENT AND OPTIMIZATION PLATFORM
A platform for remote management of production and optimization of manufacturing efficiency by utilizing a cloud server to provide data obtained from sensors on production machines to mobile devices. The service box is coupled to sensors on a production machine. The service box receives appropriate data from the sensors and transfers the data to a cloud server in real-time. The data is analyzed and appropriate information is sent to a mobile device in order for personnel in a location remote from the facility to observe production data and perform management functions. A message broker is provided between the mobile device and the cloud server to facilitate information transfers and to balance the data transfer load according to network or device capabilities and statuses.
Virtual network custom resource definition
Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML files.
Virtual network custom resource definition
Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML files.
Community Self-Managed Radio Access Network
In some embodiments, a local community may manage its own RAN via a simple, secure, self-service user interface in conjunction with a mobile operator. An exemplary system is disclosed, including: at least two base stations providing wireless access to one or more mobile devices and located in a community; a gateway providing a connection to a core network for the at least two base stations; a management functionality in the core network, in communication with the gateway, for authorizing management activities for the at least two base stations; and a user-facing administration module in communication with the management functionality, the user-facing administration module having: a user interface for providing management control to an administrative user in the community.
Systems and methods for enabling multiple-perspective administration of computing systems
The disclosed computer-implemented method for enabling multiple-perspective administration of computing systems may include (1) receiving, from a user, a request to administer a computing system that includes a plurality of types of components, (2) identifying an administrative role of the user, (3) identifying a primary component of a primary type of component that is administered by the user in the administrative role, (4) identifying a secondary component of a secondary type of component that is not administered by the user in the administrative role, and (5) providing, via a graphical user interface, a perspective of the computing system to the user that (a) enables the user to administer the computing system by administering the primary component and view information about the secondary component in terms of the primary component and (b) prevents the user from administering the secondary component. Various other methods, systems, and computer-readable media are also disclosed.
Managed service for acquisition, storage and consumption of large-scale data streams
A control node of a multi-tenant stream management service receives a request to initialize a data stream to be comprised of a plurality of data records. The control node determines, based on a partitioning policy, parameters to be used to configure subsystems for ingestion, storage and retrieval of the records. The control node identifies resources to be used for a node of retrieval subsystem The retrieval node is configured to implement programmatic record retrieval interfaces, including respective interfaces to implement non-sequential and sequential access patterns. The control node configures the retrieval node using the selected resources.
Defining and using service rules that reference endpoint group identifiers
Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML, files.
Defining and using service rules that reference endpoint group identifiers
Some embodiments of the invention provide a method for deploying network elements for a set of machines in a set of one or more datacenters. The datacenter set is part of one availability zone in some embodiments. The method receives intent-based API (Application Programming Interface) requests, and parses these API requests to identify a set of network elements to connect and/or perform services for the set of machines. In some embodiments, the API is a hierarchical document that can specify multiple different compute and/or network elements at different levels of compute and/or network element hierarchy. The method performs automated processes to define a virtual private cloud (VPC) to connect the set of machines to a logical network that segregates the set of machines from other machines in the datacenter set. In some embodiments, the set of machines include virtual machines and containers, the VPC is defined with a supervisor cluster namespace, and the API requests are provided as YAML, files.
Methods, devices and systems for managing authority
A method for a device to connect to a wireless network is provided. The method includes: acquiring authority use data of a user; processing the authority use data to obtain an authority result; and sending the authority result to a terminal device.
Security and permission architecture
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it with a separate authentication and permission system. The verified command request is sent to the target machine. An authentication worker on the target machine accesses a set of policies, local to the target machine, to identify a least privileged execution environment in which the requested command can be performed. The authentication worker on the target machine launches the requested command within the identified least privileged execution environment on the target machine.