Patent classifications
H04L41/024
MANAGING NETWORK EVENT DATA IN A TELECOMMUNICATIONS NETWORK
Managing network event data in a telecommunications network A method (200) is disclosed for managing network event data in a telecommunications network, wherein a network event is associated with a plurality of network event data fields, and wherein the telecommunications network comprises a data storage facility for network event data, the data storage facility comprising a plurality of storage functions. The method comprises obtaining queries submitted to the data storage facility (210) and, for a network event data field, determining a frequency with which data in the network event data field is required in order to respond to the obtained queries (220) and using a trained machine learning model to map the determined frequency to a value of a selection parameter for the network event data field (230). The method further comprises performing at least one of (240) storing data in the network event data field in a storage function in the data storage facility, migrating data in the network event data field between storage functions in the data storage facility or deleting data in the network event data field from a storage function in the data storage facility in accordance with the value of the selection parameter. Also disclosed are a method (400) of training a machine learning model and apparatus and a computer program product for carrying out methods for managing network event data and training a machine learning model.
Threat mitigation system and method
A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a plurality of subsystem-specific queries on a unified platform concerning the plurality of security-relevant subsystems, wherein one or more of the plurality of subsystem-specific queries has a defined execution schedule; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.
Quarantine for cloud-based services
A quarantine system could be disposed between an outer firewall and an inner firewall. The quarantine system may include persistent storage containing mappings between computing devices disposed within the inner firewall and data sources disposed outside the outer firewall. The quarantine system may include one or more processors configured to perform operations that include requesting and receiving, based on the mappings, a software-related update from a data source, the software-related update being targeted for deployment on the computing devices. The operations may also include assigning the software-related update for review by a group of one or more agents authorized to approve or reject the software-related update. The operations may also receiving an indication that the software-related update has been approved by the one or more agents and, responsive to receiving the indication, transmitting, based on the mappings, the software-related update to a recipient device within the inner firewall.
Techniques to configure physical compute resources for workloads via circuit switching
Embodiments are generally directed apparatuses, methods, techniques and so forth to select two or more processing units of the plurality of processing units to process a workload, and configure a circuit switch to link the two or more processing units to process the workload, the two or more processing units each linked to each other via paths of communication and the circuit switch.
Systems and methods for visualization based on historical network traffic and future projection of infrastructure assets
Disclosed herein are systems, methods, and storage media for network traffic projection and visualization. A computing system includes at least one circuit structured to receive network traffic data. A neural network is generated based on the network traffic data and includes a network traffic projection. The network traffic projection is displayed, via a graphical user interface, to a system administrator. In some embodiments, the computing system includes at least one circuit structured to receive change management data, such as application- and outage-related information. The change management data is combined with the network traffic projection data in a change window simulator, which recommends one or more change windows.
Management apparatus, control method therefor, and computer-readable recording medium
A management server issues a token associated with friend network identification information identifying a user of a game provided by an application server, to the application server; receives the token passed from the game to another game on the basis of an operation of the user in a terminal apparatus where the game and the other game are available, from an application server that provides the other game; and manages, in association with each other, the friend network identification information related to the game and friend network identification information related to the other game for which the issued token matches the received token.
SERVICE AND TOPOLOGY EXCHANGE PROTOCOL HAVING CLIENT-DRIVEN ACTIVE-ACTIVE REPOSITORIES WITH HIGH AVAILABILITY
Techniques are disclosed for promulgating service information and topology information in a network in a high availability manner. An example device is configured to create a first service and topology exchange protocol (STEP) document. The first STEP document includes service information and topology information. The example device is configured to send the first STEP document to a first STEP repository for forwarding to at least one subscribing network device. The example device is also configured to send the first STEP document to a second STEP repository for forwarding to the at least one subscribing network device.
Discovery of Network Load Balancers
A discovery application on a computing system is provided. The discovery application executes a discovery pattern comprising a sequence of operations for discovery of resources within a load balancing system, wherein execution of the discovery pattern corresponds to making one or more application programming interface (API) calls to an API associated with a network address of the load balancing system; receives a response to the one or more API calls from the load balancing system, wherein the response comprises a payload of information associated with the resources; and updates, based on the response and in a configuration management database (CMDB), one or more configuration items (CIs) associated with the resources.
SYSTEM AND METHOD FOR PERFORMING ASSESSMENT OF ELECTRONIC RESOURCES STORED IN A DISTRIBUTED NETWORK
Embodiments of the invention are directed to a system, method, or computer program product for an approach for performing assessment of electronic resources stored in a distributed network. The system allows for receiving, from a user, an obligation request, identifying and assessing electronic resources associated with the user in a distributed network, and determining a score for the electronic resources using a prediction model. The system also allows for querying and identifying in a database relevant recorded resource transfers, assigning a relevance level for the identified relevant recorded resource transfers, and assigning a score to the electronic resources along with a confidence level.
METHOD AND SYSTEM FOR ROUTABLE PREFIX QUERIES IN A CONTENT CENTRIC NETWORK
One embodiment provides a system that facilitates routable prefix queries in a CCN. During operation, the system generates, by a client computing device, a query for one or more indices based on a name for an interest, wherein a name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. An index indicates a number of the contiguous name components beginning from the most general level that represent a routable prefix needed to route the interest to a content producing device that can satisfy the interest. In response to the query, the system receives the one or more indices, which allows the client computing device to determine a remaining number of name components of the interest name which can be encrypted, thereby facilitating protection of private communication in a content centric network.