H04L67/34

Provisioning a Local Analytics Device
20170353353 · 2017-12-07 ·

Disclosed herein are systems, devices, and methods for provisioning a local analytics device to interact with a remote computing system on behalf of an asset that is coupled to the local analytics device and that is associated with a particular customer account hosted by the remote computing system.

Method and system for server firmware update framework

A system and method for providing commodity firmware packages for updating firmware in a network of servers is disclosed. A deployment server executes an update framework to provide firmware to target servers. A target server includes different hardware components and a baseboard management controller. Each of the hardware components have an associated firmware image. A management network connects the deployment server and the target server. A data network connects the deployment server and the target server. The deployment server sends a bootable disk image via virtual media redirection through the management network. The deployment server sends an upgrade framework to upload at least one firmware image associated with one of the hardware components through the data network to the remote server.

METHOD AND SYSTEM FOR AN INTELLIGENT MOBILE DEVICE TRIGGERED TERMINAL
20170352086 · 2017-12-07 ·

A system is disclosed that incorporates mobile devices (such as mobile phones or smart watches), a user profile stored in the cloud, and a triggered device (e.g., point-of-sale terminals or ATM terminals) such that the mobile devices communicate user interactivity information to the triggered device, and the triggered device provides transactional predictions, recommendations, and preferences to the user to interact before making purchases on the triggered device.

System and method for computing cluster seeding and security using kubernetes immutable resource log

A method of reporting differences between a plurality of computing cluster configurations for executing containerized software applications may comprise routinely retrieving, at preset time intervals, cluster configuration files stored at computing clusters for configuring the computing clusters for execution of a containerized software application, receiving a user selection of a first cluster configuration file and a second cluster configuration file within the stored cluster configuration files, and comparing the first cluster configuration file and the second cluster configuration file. The method may also include displaying a difference between the first cluster configuration file and the second cluster configuration file resulting in the first cluster configuration file configuring one or more computing clusters for execution of the containerized software application differently than the second cluster configuration file configures one or more computing clusters for execution of the containerized software application.

Method of configuring a device for communications service activation

A method of generating device-specific configuration data during the initial set up of a device comprises, during a configuration process running on the device, sending from the device a first message and including a device identifier to a server using a first mode of communication associable with a service identifier, sending from the device a second message including the device identifier to a server using a second mode of communication not associable with said service identifier, processing the first message to associate the device identifier with the service identifier, and processing the second message to query if the device identifier has been previously associated with the service identifier, and if so, sending device-specific configuration data to the device for use during the configuration process, wherein after the configuration process is completed, the device-specific configuration data enables authentication using said service identifier when the device uses said second mode of communication.

METHODS AND SYSTEMS FOR CONFIGURING A MOBILE ROUTER
20220376978 · 2022-11-24 · ·

The present invention discloses a method, a system and an electronic device for configuring the electronic device. The method and system comprise steps of configuring the electronic device by a profile server. The profile server receives sensor information, determines a profile substantially based on the sensor information, retrieves a configuration based on the profile, and then configure the electronic device substantially based on the configuration. In one variant, the configuration of the electronic device may be performed by a profile management module of the electronic device.

COMPUTER-BASED SYSTEMS CONFIGURED TO ADJUST DATA CAPACITY IN A DATA STREAM GENERATED FROM MULTIPLE DATA PRODUCER APPLICATIONS AND METHODS OF USE THEREOF

A method includes receiving from a transmitting data interface, a data stream mapping of a data input into data shards for transmission in a data stream over a data stream communication channel. Data capacity for a data producing software application from a plurality of data producing software applications is adjusted by increasing or decreasing a number of data shards in the data stream assigned to the data producing software application. An updated data stream mapping of the data input into the plurality of data shards is generated by updating a start hash key and an end hash key in a range for each of the data shards assigned to the data producing software application. The updated data stream mapping is sent to the transmitting data interface for adjusting the data capacity in the data stream transmitted over the data stream communication channel of the data producing software application.

Identifying service providers for integrating a secure element into a short-range wireless communication apparatus

A particular authentication-based service is implemented via a physical authentication device. A service description of the particular authentication-based service is read from the physical authentication device via a user terminal; and based thereon, a service request is generated, which specifies a capability description of the user terminal. A communication node receives the service request and checks this against a database containing information about which node in a set of nodes that stores downloadable software for implementing which authentication-based services on which types of user terminals. If a match is found between at least one node and the particular authentication-based service, a download identification message is sent to the user terminal, which specifies at least one address string uniquely identifying a respective location for the downloadable software stored in the matching node(s). The downloadable software is configured to implement the particular authentication-based service on the particular mobile communication apparatus.

TOPOLOGY-BASED MIGRATION ASSESSMENT

According to examples, an apparatus may include a processor that may generate a migration assessment for resources of a computer system. In particular, the apparatus may logically divide topological information to facilitate identification of a resource, components used by the resource, and dependencies. The system further enables users to specify user-defined migration parameters that specify the migration. For instance, the parameters may specify a cost associated with the migration of the component, a license model of the component, a security requirement of the component, a performance of the component, a customization of the component, or requirement of the component. Migration assessments and decisions may be stored to train machine-learned models. For instance, the model may assess whether a parameter will be satisfied by using a certain cloud service and whether substitutes have sufficiently satisfied dependencies based on observed migration assessments and actual migrations.

Optimizing software change processes using real-time analysis and rule-based hinting
09836299 · 2017-12-05 · ·

In one aspect, the present disclosure relates to a method which comprises obtaining a set of software change process parameters characterizing the particular process, based on the obtained set of software change process parameters, selecting hot spot information corresponding to the obtained set of software change process parameters, the hot spot information being based on a statistical analysis of previous software change processes and wherein the hot spot information identifies one or more steps of the multiple steps of the process during which problems have occurred in the previous processes, providing the hot spot information to the host computer system for use in the software change process and obtaining status information relating to the software change process at multiple times during the execution of the software change process, a level of detail of the status information being increased for steps of the process identified in the hot spot information.