H04L67/34

Configuration Method And Internet Of Things Device

To configure an Internet of Things, IoT, device for collecting data from industrial devices, the IoT device is coupled to a IoT platform. The IoT platform stores device twin data of the industrial devices. The device twin data includes configuration information. The IoT device retrieves the configuration information from the device twin data stored in the IoT platform and uses the configuration information for collecting data from the industrial devices.

Method and system for exploring similarities

A method and computer readable medium for exploring similar users and items of a media service includes generating a user interface. The user interface displays a user selectable indicia representing a similar member function for allowing a user to search a media service for at least one other user. The one other user has a degree of similarity with respect to the searching user. Another method includes facilitating the search of such a similar user within a media service.

Context-rich key framework implementations for global concept management
11468101 · 2022-10-11 · ·

Various implementations provide a Context-Rich Key (“CRK”) Framework for managing computing, networking, concepts, and context from human and system-of-systems perspectives. The CRK Framework provides an environment for defining and implementing interoperability models for collections of distributed applications and/or systems within a digital culture, and for managing concepts between digital cultures. In some implementations, a digital processing system receives a global request, e.g. for information related to a target concept. In some implementations, if the digital processing system has access to data relevant to the target concept, the digital processing system identifies an appropriate local object. In some implementations, the digital processing system then processes the global request to generate and initiate or run a local action. Upon initiation of the local action, local action results are generated. In some implementations, the digital processing system processes the local action results, returns the local action results to the requesting system, or both.

ZERO DAY ZERO TOUCH PROVIDING OF SERVICES WITH POLICY CONTROL

Services with policy control may be provided. A computing device may receive registration information associated with a border device. The registration information may comprise information identifying a service provided by a server associated with the border device, information identifying the border device, and policies associated with the service. Then an address for the server may be determined. Next a request may be received comprising the information identifying the service provided by the server. In response to receiving the request comprising the information identifying the service provided by the server, the address for the server, the information identifying the border device, and the policies associated with the service may be provided.

URSP ENHANCEMENT FOR EPS
20230112434 · 2023-04-13 ·

A method for route selection policy (URSP) rule matching enhancement in EPS is proposed. When an application is executed, the upper layer of a UE sends the application information to URSP entity for matching a URSP rule. The UE selects and evaluates a route selection descriptor (RSD) from a list of RSDs of a selected URSP rule to be matched with a PDN connection. If there is a “PDU session pair ID type” and/or “RSN type” route selection descriptor components in an RSD, such RSD components are intended for a redundant PDU session, which is not supported in EPS. Therefore, the UE ignores the specific RSD components and continues to evaluate the RSD with the remaining RSD components.

Cloud Data Ingestion System
20230114321 · 2023-04-13 · ·

A computing system identifies a plurality of virtualization elements executing on a cloud computing environment. The computing system retrieves a first set of data related to software resources executing across the plurality of virtualization elements. The computing system retrieves a second set of data related to hardware resources associated with the plurality of virtualization elements. The computing system retrieves delta updates to the first set of data, wherein the delta updates are retrieved in real-time. The computing system generates a first database. The first database includes the first set of data related to the software resources, the second set of data related to the hardware resources associated with the plurality of virtualization elements, and the delta updates. The computing system generates a configuration management database hosted by a configuration management database system.

Methods, Systems and Computer Program Products for Selective Routing of Software Instructions Between a Client Device and a Cloud Services Server
20230116110 · 2023-04-13 ·

Methods, systems and computer program products for cloud based software program execution include the steps of: receiving a data message identifying a software code instruction for execution, wherein said software code instruction is associated with functionality of an instance of a cloud based software application. One of a client terminal and a server is selected for execution of the software code instruction, and the software code instruction is routed to the selected client terminal or server. Selection of the client terminal or the server is based on routing rules and any one or more of information representing capabilities of the client terminal or of the server, information identifying a storage location of the software code instruction, and information representing hardware configurations or hardware systems required or preferred for execution of the software code instruction.

MIGRATION OF SOFTWARE EXTENSIONS
20230116489 · 2023-04-13 · ·

Extensions to a source software application are migrated to a target. Template records are constructed containing corresponding sets of attributes for source and target applications. Analysis of a source extension yields source extension attributes. A matching template record is used to map the source extension attributes to corresponding target extension attributes. A proposal for a migrated target extension is formulated, simulated in a sandbox, and committed to the target application. Client interaction supports selection or approval of application versions, proposals, or simulation output. Template records, constructed without knowledge of specific extensions implemented on a particular application instance, are provided to the source application environment, enabling remaining migration operations to be performed locally in source and target environments, maintaining data privacy. Examples are provided for a front-end software application in a database environment. Methods and apparatus are disclosed, with variations, extensions, and applicability to diverse software applications.

CROSS-APPLICATION DATA MIGRATION
20230113443 · 2023-04-13 ·

Various examples are directed to systems and methods for migrating persistences of a plurality of source applications to a target environment. A migration tool may access a first source table and a second source table. The migration tool may generate mapping data relating the first source table and the second source table to a unified table, the mapping data relating a first field of the first source table to a first column of the unified table, the mapping data also relating a first field of the second source table to the first column of the unified table. The migration tool may migrate migration data from the first source table and the second source table to the unified table at a database management system executing at the target environment using the mapping data.

MULTI-CLUSTER DISTRIBUTION

Disclosed herein are system, method, and computer program product embodiments for multi-cluster distribution. In some embodiments, a server on a primary computing cluster receives an update to an object stored on the primary computing cluster and to be implemented by a secondary computing cluster. Furthermore, the server receives a request to distribute the object to the secondary computing cluster. The server further retrieves the object based on an object identifier or an identifier of the secondary computing cluster. Moreover, the server identifies the secondary computing cluster based on the object identifier or the identifier of the secondary computing cluster. The server then distributes the object to the secondary computing cluster via a persistent connection.