H04L41/0803

Coalescing publication events based on subscriber tolerances
20230022048 · 2023-01-26 ·

Systems and methods for coalescing and/or aligning publications in a publication/subscription architecture to reduce the number of publication events and to improve the performance of microservices in a communications network are provided. A method, according to one implementation, includes the step of obtaining client-based tolerance input with respect to a plurality of subscriptions requested by a plurality of clients in a publication/subscription system. Based on the client-based tolerance input, the method also includes the step of adjusting the timing of publications to reduce the phase variability of the plurality of subscriptions.

Systems and methods for discovering and monitoring devices using search patterns for object identifiers and values
11562041 · 2023-01-24 · ·

The present disclosure is directed to systems and methods of managing remote devices. The system can include a server with memory, a detection module, and a collection module. The memory can store a management information base (MIB) having a hierarchical tree of object identifiers and corresponding object values. The detection module can query devices and receive a first object identifier and its first object value, which can vary from those in the MIB; and use patterns to match the first object identifier and object value; and generate an identification of the device from the matches. The collection module can use the identification to select a collection template, which can indicate a subtree of the MIB and a collection pattern; traverse the subtree and identify a second object identifier that matches the collection pattern, and its second object value; and associate the second object value with the first object value.

Systems and methods for discovering and monitoring devices using search patterns for object identifiers and values
11562041 · 2023-01-24 · ·

The present disclosure is directed to systems and methods of managing remote devices. The system can include a server with memory, a detection module, and a collection module. The memory can store a management information base (MIB) having a hierarchical tree of object identifiers and corresponding object values. The detection module can query devices and receive a first object identifier and its first object value, which can vary from those in the MIB; and use patterns to match the first object identifier and object value; and generate an identification of the device from the matches. The collection module can use the identification to select a collection template, which can indicate a subtree of the MIB and a collection pattern; traverse the subtree and identify a second object identifier that matches the collection pattern, and its second object value; and associate the second object value with the first object value.

BARE-METAL CONNECTION STORAGE METHOD AND SYSTEM, AND APPARATUS
20230231915 · 2023-07-20 ·

A bare-metal connection storage method includes establishing a storage network, where the storage network includes a plurality of bare-metals, an access switch, a core switch, and a storage device. The plurality of bare-metals are coupled to the access switch, the access switch is coupled to the core switch, and the core switch is coupled to the storage device. The method configures the storage network, so that each of the plurality of bare-metals is coupled to the storage device.

BARE-METAL CONNECTION STORAGE METHOD AND SYSTEM, AND APPARATUS
20230231915 · 2023-07-20 ·

A bare-metal connection storage method includes establishing a storage network, where the storage network includes a plurality of bare-metals, an access switch, a core switch, and a storage device. The plurality of bare-metals are coupled to the access switch, the access switch is coupled to the core switch, and the core switch is coupled to the storage device. The method configures the storage network, so that each of the plurality of bare-metals is coupled to the storage device.

Automated command assistance for a cloud service

An automated command assistance tool is provided for a browser-enabled command line interface of a cloud service. The automated command assistance tool provides examples illustrating the correct syntax for commands used to manage the resources of a cloud service. The command assistance tool learns the syntax of a command from usage patterns found in telemetric data, scripts and user documentation and forms templates containing a command's usage pattern and related information. The templates are used to generate examples that respond to a user query for assistance with usage of a particular command.

Automated command assistance for a cloud service

An automated command assistance tool is provided for a browser-enabled command line interface of a cloud service. The automated command assistance tool provides examples illustrating the correct syntax for commands used to manage the resources of a cloud service. The command assistance tool learns the syntax of a command from usage patterns found in telemetric data, scripts and user documentation and forms templates containing a command's usage pattern and related information. The templates are used to generate examples that respond to a user query for assistance with usage of a particular command.

Network data extraction parser-model in SDN

A parser model may be used with software-defined applications or controllers. A network topology may be detected and based on the change in the network topology, a network device may filter certain network data traffic for processing by a software-defined network controller.

Container-based network functions virtualization platform

The present invention relates to a container-based network function virtualization (NFV) platform, comprising at least one master node and at least one slave node, the master node is configured to, based on interference awareness, assign container-based network functions (NFs) in a master-slave-model-based, distributed computing system that has at least two slave nodes to each said slave node in a manner that relations among characteristics of the to-be-assigned NFs, info of load flows of the to-be-assigned NFs, communication overheads between the individual slave nodes, processing performance inside individual slave nodes, and load statuses inside individual said slave nodes are measured.

Systems and methods for automatic device detection, device management, and remote assistance

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator take over some network services from a router, and automatically install the network regulator as gateway to the local network. The network regulator then carries out an automatic device discovery procedure and distribute device-specific utility agents to the protected client systems. An exemplary utility agent detects when its host device has left the local network, and in response, sets up a virtual private network (VPN) tunnel with a security server to maintain protection of the respective device.