Patent classifications
H04L67/34
Systems and methods for dynamically commissioning and decommissioning computer components
A method for dynamically provisioning computer components using a message platform communicatively coupled to a message generator is provided. The method includes receiving a first computer message, wherein the first computer message indicates that a computer component should be provisioned for a network cluster, routing the first computer message such that a first platform that is a customer of the first queue i) receives the first computer message and ii) automatically performs a first configuration operation on the computer component based on the first computer message, receiving, at the advanced message queue exchange, a second computer message from the first platform, and routing the second computer message such that a second platform that is a customer of the second queue i) receives the second computer message and ii) automatically performs a second configuration operation on the computer component based on the second computer message.
Mobile-generated desktop reminders
The present disclosure is related to receiving a communication (e.g., direct message, group message, calendar event, task, etc.) on a first device and providing an option to request that a reminder, which is associated with the communication, be presented a second device. For example, the communication may be presented via a mobile client, and the user may request that a reminder be presented via a desktop client (e.g., when the user is at the desktop client).
Drop-in probe that facilitates management and configuration of internet of things network connected devices
Management and configuration of internet of things network connected devices is facilitated herein. A proxy device comprises a memory that stores executable instructions that, when executed by a processor, facilitate performance of operations that comprise determining a first identity and a first operational parameter of a first device and a second identity and a second operational parameter of a second device. The first device and the second device can be associated with a defined communication network. The proxy device can be provisioned within the defined communication network and can operate as a security update proxy node for the first device and the second device. The operations can also comprise facilitating a first security update at the first device and a second security update at the second device based on a determination that the first device and the second device have delegated responsibility for security synchronization to the proxy device.
System and method for migrating a live stateful container
Systems, methods, and computer-readable media for migrating an application container between nodes in a network are disclosed. An interest for an application container may be received by an origin node and, in response, the origin node may transfer a copy of the application container over the network and to a destination node. The origin node can then shut down the application container and transmit any remaining container state and received requests to the destination node. The destination node may then update a routing plane for the network to provide delivery of service requests to the migrated application.
Zero touch deployment and dynamic configuration
Disclosed herein are system, method, and device embodiments for zero touch deployment and dynamic configuration. A management server receives a dynamic configuration value for a configuration setting via a configuration service, and generates configuration information including a mapping of a configuration setting to the dynamic configuration value. Further, the management server receives a configuration information request including an identifier associated with a remote client device, and sends the configuration information to the remote client device.
Privacy protection for proxy auto-configuration files
A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.
MAINTAINING CLINICAL MESSAGING DURING NETWORK INSTABILITY
Various techniques for facilitating communication with and across a clinical environment and a cloud environment are described. For example, a method for providing messaging in a clinical environment during a temporary network interruption is described. A connectivity adapter may keep the messages in the queue despite the temporary network interruption. As long as the network connection is restored before the messages become stale, the connectivity adapter may be able to transmit the messages in the queue despite the network interruption.
Machine learning model representation and execution
Aspects of the subject disclosure may include, for example, a device, including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including receiving user specified metadata for execution tasks associated with a machine learning (ML) model; receiving artifacts specifying program code for implementing the ML model; creating a file system structure for a container to hold the ML model; receiving environment variables for operation of the ML model; and building the container including a model image for the ML model. Other embodiments are disclosed.
INTERNET OF THINGS SOLUTION DEPLOYMENT IN HYBRID ENVIRONMENT
Example methods are provided to deploy an Internet of Things (IoT) solution in a hybrid environment. The methods include deploying a first agent application on a first edge gateway of a first vendor by the first edge gateway. The first agent application is configured to collect a first set of information associated with the first edge gateway. The methods include deploying a second agent application on a second edge gateway of a second vendor by the second edge gateway. The second agent application is configured to collect a second set of information associated with the second edge gateway. In response to a determination of a first virtualized computing environment on the first edge gateway or a second virtualized computing environment on the second edge gateway fulfils a first requirement of a template to deploy the IoT solution, the methods include deploying the IoT solution in the first virtualized computing environment, the second virtualized computing environment, or both.
Data model API for live applications in a cloud collaboration platform
Disclosed herein are system, method, and computer program product embodiments for providing a data model application programming interface (“API”) to customizable live applications in a cloud collaboration platform. The cloud collaboration platform provides data storage, a data model, and an API to embedded third-party live applications to allow the live applications to securely create, store, and access data within the cloud collaboration platform. The data model allows records stored in the cloud collaboration platform to sync independently, merge intelligently, and function offline.