Patent classifications
H04L67/34
Systems and methods for flexible software update in a network of moving things
Communication network architectures, systems and methods for supporting a network of mobile nodes. As a non-limiting example, various aspects of this disclosure provide communication network architectures, systems, and methods for supporting a dynamically configurable communication network comprising a complex array of both static and moving communication nodes (e.g., the Internet of moving things).
Distribution and execution of instructions in a distributed computing environment
Methods and apparatus for distribution and execution of instructions in a distributed computing environment are disclosed. An example apparatus includes memory; first instructions; and processor circuitry to execute the first instructions to manage an instruction queue. The instruction queue includes indications of second instructions to be executed at a component server. The processor circuitry is to add a first indication of a corresponding one of the second instructions to the instruction queue. The first indication is to identify: (1) a location of the second instruction and (2) a format of the second instruction. In response to a second indication that the second instruction has been executed, the processor circuitry is to remove the first indication from the instruction queue.
Multiradio interface for software reconfiguration
An apparatus of a user equipment (UE) comprises a memory to store a Unified Radio Application and to store one or more configuration parameters for the Unified Radio Application, and one or more baseband processors to receive a radio application update from a remote server, and to update the Unified Radio Application via a Multiradio Interface (MURI) “updateRadioApps” operation with the received radio application update. One or more of the configuration parameters are maintained in the memory after the update.
Migration of managed devices to utilize management platform features
Disclosed are various examples for client device migration to utilize management platform features. In some examples, the client device is identified as compatible with a management platform. A migration of the client device to utilize a management platform feature is accepted through a user interface. A management platform account is created with a management platform service. A management profile is installed on the client device. The profile is compatible with the management platform. The management platform feature is enabled on the client device.
Network beacon for hypervisor installations
A system and method for configuring components added to a network is disclosed. The method includes detecting, by a first hypervisor of a first host machine, that a second host machine having a second hypervisor is being added to a cluster of host machines comprising the first host machine, and identifying a plurality of network connections of the first hypervisor, each network connection being associated with one of a plurality of networks connecting hypervisors on host machines in the cluster, each network connection of the first hypervisor having a set of configuration settings. The method also includes generating, for each network connection, a message including a set of configuration settings of a corresponding network connection of the first hypervisor, and transmitting the message on a respective network to a second hypervisor to facilitate configuration of a corresponding network connection of the second hypervisor.
Controlling communication session handling at a user equipment using a script generated by an application server
An application server generates a script and transmits the script to a first user equipment. The script is transmitted to the first user equipment in a request for establishment of a communication session between the first user equipment and a second user equipment. Execution of the script by the first user equipment controls handling of the communication session between the first user equipment and the second user equipment. Thus, by sending the script to the first user equipment, the application server controls the manner in which the first user equipment handles the communication session.
Techniques for managing access of user devices to third-party resources
Prior to connecting to a gateway associated with an electronic health record system, a user device can check in with a server. The server can send configuration information useable by the user device for connecting to the gateway for downloading medical record data. The configuration information may include an update value that is useable by the user device to determine a time frame for contacting the gateway. In some examples, the user device determines when to contact the gateway without using the update value.
Constraint-based upgrade and deployment
One or more software products/services may be installed on a cloud deployment. Product versions of such services can be upgraded (or rolled back) based on a deployment plan comprising tasks adapted to reach a target deployment state. A central upgrade server can forward tasks to an upgrade agent for execution, the tasks being based on a current operational state of the cloud deployment (obtained by the upgrade agent) and one or more constraints. In multiple node deployments, some nodes may be upgraded to a new product version, while other nodes are kept at a current product version until stability of the new product version is determined. Traffic across nodes can be shaped to ensure a deployment is healthy before upgrading other nodes/deployments. If the health of a node/deployment does not meet specified criteria, an upgrade can be stopped, an alert can be triggered, and the node/deployment can be rolled back.
Passing authentication token to authorize access to rest calls via web sockets
Various techniques for facilitating communication with and across a clinical environment and a cloud environment are described. For example, a method for authenticating a network device residing in the clinical environment using a token is described. An authentication proxy in the cloud environment can receive a request from a connectivity adapter in the clinical environment and retrieve a security token from an authentication system in the cloud. The connectivity adapter can use the security token to send signed requests to the authentication system.
NETWORK-AWARE DEPLOYMENT OPTIMIZATION FOR LARGE SCALE VIRTUAL NETWORK FUNCTION DEPLOYMENTS AT A NETWORK EDGE
Systems and methods described herein provide deployment optimization service. A network device in a network receives an order for virtual network function (VNF) deployments at network edge locations. The network device maps a radio access network (RAN) topology for the network edge locations. The network device identifies time windows to perform the VNF deployments, based on the order, historical transport and RAN utilization data, and the RAN topology. The network device selects an optimal time window to perform the VNF deployments based on stored policy rules and pushes software images for the VNF deployments to an image repository in a geographical region near the network edge locations. The network device analyzes, for the optimal time window, real-time network data for a pre-emptive condition. The network device pre-empts the VNF deployments when a pre-emptive condition is identified and initiates the VNF deployments when no pre-emptive condition is identified.