H04L41/0686

SYSTEMS AND METHODS FOR PRIORITIZING ALERTS

Disclosed embodiments may include another system for prioritizing alerts. The alert prioritization system may include one or more processors and that may store instructions that are configured to cause the system to perform a method for prioritizing alerts. For example, the system may receive a first alert from a first application and determine, using a machine learning model, whether the first alert is similar to a previous alert. The determination may be based on the second alert satisfying a predetermined similarity threshold. When the first alert is similar to the previous alert, the system may associate a previous rating label with the first alert, the previous rating label being associated with the previous alert and transmit the first alert with the previous rating label to one or more user devices for display.

Method and system for detecting errors in local area network

Novel tools and techniques are provided for implementing error detection in a network, and, more particularly, to methods, systems, and apparatuses for implementing error and/or fault detection in a network and/or media stream and providing options to address the error and/or fault in the network and/or media stream. In various embodiments, a computer might detect an error in a first network and send a notification indicating that the error has occurred. The notification might contain one or more options to address the error in the first network. The computer, a user device, a service provider device, or a content provider device might receive and display the notification containing the one or more options. The computer, the user device, the service provider device, or the content provider device might then select at least one of the one or more options to address the error in the first network.

Method and system for detecting errors in local area network

Novel tools and techniques are provided for implementing error detection in a network, and, more particularly, to methods, systems, and apparatuses for implementing error and/or fault detection in a network and/or media stream and providing options to address the error and/or fault in the network and/or media stream. In various embodiments, a computer might detect an error in a first network and send a notification indicating that the error has occurred. The notification might contain one or more options to address the error in the first network. The computer, a user device, a service provider device, or a content provider device might receive and display the notification containing the one or more options. The computer, the user device, the service provider device, or the content provider device might then select at least one of the one or more options to address the error in the first network.

Cloud infrastructure for isolation and run-time behavioral tuning through configuration externalization

Embodiments generally relate to a cloud computing infrastructure and method of operating the same including at least: receiving a configuration file from a configuration repository; receiving a request from a first device to configure an application rule set of one or more nodes based on the configuration file; transmitting the request to a receiver node selected from the one or more nodes; generating a notification alerting the one or more nodes that the request is stored on a database; distributing the configuration file to a subset of the one or more nodes based on receipt of an access request from the one or more nodes; and updating the application rule set of the subset of the one or more nodes based on the configuration file.

Computing infrastructure standards assay

Systems and techniques for computing infrastructure standards assay are described herein. A set of existing configurations may be obtained of an existing software application executing on a set of computing systems operating in the computing infrastructure. The set of existing configurations may be evaluated using artificial intelligence to identify the standard configuration. The standard configuration may include a set of configuration options that appear most often in the set of existing configurations. A score may be generated for each existing configuration of the set of existing configurations based on deviation between the existing configuration and the standard configuration. A notification may be transmitted to an administrator based on the score. The notification may include an indication of options of the standard configuration that differ from options of the existing configuration.

Computing infrastructure standards assay

Systems and techniques for computing infrastructure standards assay are described herein. A set of existing configurations may be obtained of an existing software application executing on a set of computing systems operating in the computing infrastructure. The set of existing configurations may be evaluated using artificial intelligence to identify the standard configuration. The standard configuration may include a set of configuration options that appear most often in the set of existing configurations. A score may be generated for each existing configuration of the set of existing configurations based on deviation between the existing configuration and the standard configuration. A notification may be transmitted to an administrator based on the score. The notification may include an indication of options of the standard configuration that differ from options of the existing configuration.

ASYNCHRONOUS METHOD FOR PROVISIONING A SERVICE USING FILE DISTRIBUTION TECHNOLOGY

According to certain embodiments, a provisioning manager comprises an interface and processing circuitry. The interface is configured to obtain provisioning data from a provisioning database. The processing circuitry is configured to prepare one or more configuration files based on the provisioning data. The configuration file(s) indicate how to provision one or more service instances. The processing circuitry is further configured to commit the configuration file(s) to one or more repositories in order to make the configuration file(s) available to at least one of the service instances. The processing circuitry is further configured to send one or more notifications indicating to one or more of the service instances that the configuration file(s) have been committed to the one or more repositories.

Method for conveying AP error codes over BLE advertisements
11575562 · 2023-02-07 · ·

Methods and apparatus for obtaining status from an isolated AP that cannot connect to a remote management server are described. The status information is obtained from a second device and then provided, via the second device, to the remote management server. At least some of the disclosed embodiments are utilized in a system including a plurality of access points, which can provide alternate pathways to the remote management server. The remote management server determines a remedial action based on the status information.

ROBOTIC PROCESS AUTOMATION BOT OPERATIONAL MANAGEMENT SYSTEM

A device includes a processor and a memory. The processor effectuates operations including monitoring enterprise network traffic associated with one or more user device (UE). The processor further effectuates operations including comparing the enterprise network traffic to a UE profile associated with each of the one or more UE. The processor further effectuates operations including determining whether the comparison indicates that a predetermined threshold has been exceeded. The processor further effectuates operations including in response to the indication that the predetermined threshold has been exceeded, generating an alert, wherein exceeding the predetermined threshold is indicative of a denial of service attack on an enterprise network or an attempt to remove enterprise data via the one or more UE.

ROBOTIC PROCESS AUTOMATION BOT OPERATIONAL MANAGEMENT SYSTEM

A device includes a processor and a memory. The processor effectuates operations including monitoring enterprise network traffic associated with one or more user device (UE). The processor further effectuates operations including comparing the enterprise network traffic to a UE profile associated with each of the one or more UE. The processor further effectuates operations including determining whether the comparison indicates that a predetermined threshold has been exceeded. The processor further effectuates operations including in response to the indication that the predetermined threshold has been exceeded, generating an alert, wherein exceeding the predetermined threshold is indicative of a denial of service attack on an enterprise network or an attempt to remove enterprise data via the one or more UE.