H04L67/34

Data model generation using generative adversarial networks

Methods for generating data models using a generative adversarial network can begin by receiving a data model generation request by a model optimizer from an interface. The model optimizer can provision computing resources with a data model. As a further step, a synthetic dataset for training the data model can be generated using a generative network of a generative adversarial network, the generative network trained to generate output data differing at least a predetermined amount from a reference dataset according to a similarity metric. The computing resources can train the data model using the synthetic dataset. The model optimizer can evaluate performance criteria of the data model and, based on the evaluation of the performance criteria of the data model, store the data model and metadata of the data model in a model storage. The data model can then be used to process production data.

DIGITAL ENGINEERING SECURE REMOTE ACCESS

An industrial information hub (IIH) and an industrial development hub (IDH) serve as an industrial ecosystem platform where multiple participants can deliver repeatable and standardized services relevant to their core competencies. The IIH system is centered around the development of an ecosystem that creates and delivers value to users—including industrial enterprises, OEMs, system integrators, vendors, etc.—through the aggregation of digital content and domain expertise. The IIH system serves as a trusted information broker between the ecosystem and the OT environments of plant facilities, and provides a platform for connecting assets, contextualizing asset data and providing secure access to the ecosystem. As part of this ecosystem, the IIH system uses a secure remote access architecture to allow users to remotely access data on their plant floor assets via a virtual private network connection.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR GENERATING NETWORK FUNCTION (NF) SET LOAD INFORMATION AWARE NF DISCOVERY RESPONSE
20230019209 · 2023-01-19 ·

A method for generating network function (NF) set load information aware NF discovery responses includes, at an NF repository function (NRF), receiving NFUpdate messages from producer NF instances. The method further includes collecting or generating, from the NFUpdate messages, NF set load information for NF sets of which the producer NF instances are members. The method further includes receiving, from a consumer NF, an NF discovery request. The method further includes generating, using query parameters in the NF discovery request, an NF discovery response including NF profiles of producer NF instances corresponding to the query and, including, in the NF discovery response, NF set load information for NF sets of producer NF instances whose NF profiles are included in the NF discovery response. The method further includes forwarding the NF discovery response including the NF set load information to the consumer NF.

NETWORK ACCESS TOKENS FOR ACCESSORIES

A wireless access device can be configured to determine a list of accessory groups corresponding to accessories connected to a network managed by the wireless access device. The wireless access device may also be configured to identify at least one firmware update that corresponds to at least one accessory group of the list of accessory groups and request all firmware updates that correspond to the at least one accessory group. The wireless access device can also be configured to receive one or more firmware updates that corresponds to at least one of the accessories of the at least one accessory group for which a respective firmware update is available and transmit at least one firmware update of the received one or more firmware updates to at least one corresponding accessory of the at least one accessory group.

DATA COLLECTION CLOUD SYSTEM FOR ELECTRONIC GAMING MACHINES

A listening device is operatively connected to multiple network devices, and is configured to subscribe to one or more EGM data types, and receive first data from a first network device in accordance with the subscription. The listening device is also configured to generate a first data package in a form of a first data structure comprising the first data and configuration information related to the first network device, and transmit the data package across a second network to a collection server. The listening device is also configured to receive second data from a second network device in accordance with the subscription, wherein the second data comports with a second protocol that differs from the SAS protocol, and generate a second data package in the form of the first data structure comprising the second data and configuration information related to the second network device.

CAPTURING VARIABLE DEPENDENCIES USING A VARIABLE AGNOSTIC OBJECT

Capturing dependencies between variables using a variable agnostic object is disclosed. A system is configured to obtain an indication of a first dependency of a first variable to a second variable via a programming interface and depict the first dependency, the first variable, and the second variable in a first instance of a variable agnostic object in a source code. The system is also configured to obtain an indication of a second dependency of a third variable to a fourth variable via the programming interface and depict the second dependency, the third variable, and the fourth variable in a second instance of the variable agnostic object in the source code. The system is also configured to compile the source code to generate a computer-executable program capturing the first dependency and the second dependency based on the first instance and the second instance of the variable agnostic object.

SYSTEM AND METHOD FOR RULES ENGINE THAT DYNAMICALLY ADAPTS APPLICATION BEHAVIOR
20230017196 · 2023-01-19 ·

In some implementations, a system enables an administrator to customize a set of rules to dynamically adjust the configuration and output of an application provided to users. A configuration interface for setting rules that dynamically adjust output of an application is provided. Data indicating one or more rules are received through the configuration interface. Activity data indicating user interaction with the application or sensor data for at least some of a plurality of users of the application are then received from multiple client devices. A determination relating to the activity data satisfying at least one condition or trigger is then made. Instructions to adjust output of the application according to one or more system actions of the one or more rules are then communicated to client devices associated with the users in the first subset of the plurality of users.

Method, Apparatus and Systems for Enabling Delivery and Access of Applications and Services
20230221947 · 2023-07-13 ·

The invention provides a system, a method and a computer program product that facilitate access to one or more applications by a computing device. The invention includes determining one or more contexts associated with at least one of the computing device and a user of the computing device, such that the one or more contexts describe at least one of an environment and an activity of the at least one of the user and the computing device. Thereafter at least one contextual tag corresponding to the one or more contexts is generated. Subsequently, the one or more applications associated with the at least one contextual tag are identified and the computing device is enabled to access the one or more applications.

APPLYING NETWORK POLICIES TO DEVICES BASED ON THEIR CURRENT ACCESS NETWORK
20230224220 · 2023-07-13 ·

A server of a distributed computing system that is at least partially hosted on a particular access network receives a plurality of messages from a plurality of devices over a network, each of the messages associated with a corresponding source address. For each of the plurality of devices, a current access network is determined for the device. For each of the devices with a current access network being the particular access network, a first network policy is applied to the device. For each of the devices with a current access network being other than the particular access network, a second network policy is applied to the device, the second network policy defining a second encryption requirement.

DISABLING A SCRIPT BASED ON INDICATIONS OF UNSUCCESSFUL EXECUTION OF THE SCRIPT

In some implementations, a server device may receive, from a client device, a script identifier, that identifies a script, and an indication of whether the script was successfully executed by the client device. The server device may determine whether a condition associated with disabling the script is satisfied based on the script identifier, the indication of whether the script was successfully executed by the client device, and stored information determined based on a plurality of indications of whether the script was successfully executed by a plurality of other client devices. The server device may selectively cause a data structure to be updated to indicate that the script is disabled based on determining whether the condition is satisfied. The data structure may be used to indicate whether the script is enabled prior to execution of the script.