Patent classifications
H04L69/30
RPS SUPPORT FOR NFV BY SYSTEM CALL BYPASS
A system for Receive Packet Steering (RPS) support for Network Function Virtualization (NFV) by system call bypass includes a memory, a plurality of central processing units (CPUs) in communication with the memory, an operating system, and a Network Interface Controller (NIC) including a receive queue. The system also includes a driver thread and a plurality of forwarding threads. The driver thread handles the receive queue of the NIC. In an example, a first forwarding thread of the plurality of forwarding threads executes a system call. The first forwarding thread executes on the first CPU. The system call, when executed, executes a monitor instruction on a first CPU to monitor for updates to a designated memory location and checks a condition. Checking the condition includes reading the designated memory location and determining whether information in the designated memory location indicates that a new packet for the first forwarding thread has arrived.
RESOURCE ALLOCATION METHOD AND SYSTEM ON SOFTWARE DEFINED PROTOCOL NETWORK
The present invention provides a resource allocation method and system on a Software Defined Protocol SDP network. The method includes: receiving, by a resource allocator, a resource request message sent by a protocol stack deployment node, where the resource request message carries information about a protocol stack deployed on the protocol stack deployment node; determining, by the resource allocator, information about an available resource on an SDP network, where the available resource is used for resource allocation of the protocol stack; determining, by the resource allocator according to the information about the protocol stack and the information about the available resource, a resource allocated to each protocol layer in the protocol stack; and sending, by the resource allocator, a resource feedback message to the protocol stack deployment node, where the resource feedback message carries the information about the resource allocated to each protocol layer.
Service specific traffic handling
A device, such as a terminal device, for example, has an operating system (OS) and an application program that executes on the OS. When executing on the device, the application program configures the device to communicate packet data with a server device, and to handle service-specific traffic, and application-specific traffic, in accordance with a distributed port mapping policy.
Multi-Tunneling Virtual Network Adapter
Multiple virtual private network connections to be created without the need for administrative privileges, and network traffic to be routed using a single virtual adapter instead of a dedicated virtual adapter for each virtual network connection.
KERNEL EVENT TRIGGERS
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
KERNEL EVENT TRIGGERS
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
KERNEL EVENT TRIGGERS
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
COLLABORATION ENHANCED WITH KERNEL EVENT TRIGGERS
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
KERNEL EVENT TRIGGERS FOR CONTENT ITEM SECURITY
The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
Device, Method, and Computer Program Product For Security Data Communication
The invention relates to devices, methods, and computer program products for secure data communication according to a network protocol having a plurality of communication layers layered into a protocol stack. Said device comprises a processor system, in which a processor, controlled by a task scheduler, executes a plurality of autonomous software modules, which each run a communication layer of the protocol stack. The software modules are linked via communication channels to the protocol stack and the protocol stack is connected to an interface framework for data communication with an external network. At least one software module uses an assigned cryptographic key for secure data communication in its communication layer. The task scheduler is configured to obtain said key from the external network via the interface framework and to distribute said key to the assigned software module.