Patent classifications
H04L41/0866
Cloud computing infrastructure pipelines with run triggers
Systems and methods of managing information technology infrastructure are described. A method includes identifying a run trigger between a first node and a second node, each node maintaining a configuration for a portion of a cloud computing infrastructure associated with executing a portion of a cloud-based application. The run trigger initiates in response to an action at the first node and comprises a source identifier identifying the first node and a destination identifier identifying the second node. Then a run is queued on the second node based on the run trigger, the run including a process executed on the second portion of the cloud computing infrastructure with data received by the second node and associated with a run source identifier. The run on the second node is then planned and executed, causing the cloud computing infrastructure to modify infrastructure resources associated with the second portion of the cloud computing infrastructure.
Cloud computing infrastructure pipelines with run triggers
Systems and methods of managing information technology infrastructure are described. A method includes identifying a run trigger between a first node and a second node, each node maintaining a configuration for a portion of a cloud computing infrastructure associated with executing a portion of a cloud-based application. The run trigger initiates in response to an action at the first node and comprises a source identifier identifying the first node and a destination identifier identifying the second node. Then a run is queued on the second node based on the run trigger, the run including a process executed on the second portion of the cloud computing infrastructure with data received by the second node and associated with a run source identifier. The run on the second node is then planned and executed, causing the cloud computing infrastructure to modify infrastructure resources associated with the second portion of the cloud computing infrastructure.
System and method for managing clusters in an edge network
- Venkata Vamsi Krishna Kothuri ,
- Akshay Narayan Muramatti ,
- Anurag Choudhary ,
- Ashish Ramdas Mankar ,
- Nikita Vishwanath Shetty ,
- Sameer Narkhede ,
- Isha Singhal ,
- Matthew James Armstrong ,
- Prashant Batra ,
- Shi Shu ,
- Yiran Deng ,
- Zhuoran Li ,
- Mukesh Sohanlal Bafna ,
- Praveen Uday Bhaskara Pisipati ,
- Amarsinh Vijaysinh Patil ,
- Arvind Mohan
Various embodiments disclosed herein are related to an apparatus. In some embodiments, the apparatus includes a processor and a memory. In some embodiments, the memory includes instructions that, when executed by the processor, cause the apparatus to collect, at a cloud server, service data from a collector framework service of an edge network. In some embodiments, the memory includes instructions that, when executed by the processor, cause the apparatus to provide a configuration to the collector framework service based on the service data.
System and method for managing clusters in an edge network
- Venkata Vamsi Krishna Kothuri ,
- Akshay Narayan Muramatti ,
- Anurag Choudhary ,
- Ashish Ramdas Mankar ,
- Nikita Vishwanath Shetty ,
- Sameer Narkhede ,
- Isha Singhal ,
- Matthew James Armstrong ,
- Prashant Batra ,
- Shi Shu ,
- Yiran Deng ,
- Zhuoran Li ,
- Mukesh Sohanlal Bafna ,
- Praveen Uday Bhaskara Pisipati ,
- Amarsinh Vijaysinh Patil ,
- Arvind Mohan
Various embodiments disclosed herein are related to an apparatus. In some embodiments, the apparatus includes a processor and a memory. In some embodiments, the memory includes instructions that, when executed by the processor, cause the apparatus to collect, at a cloud server, service data from a collector framework service of an edge network. In some embodiments, the memory includes instructions that, when executed by the processor, cause the apparatus to provide a configuration to the collector framework service based on the service data.
Systems and Methods for Configuration Verification Across Secured Network Boundaries
A method includes receiving, from a first device, a first request indicating a client characteristic, generating a second request for content that simulates a data request originating at a client device with the client characteristic, identifying data of a response to the generated second request, and providing, to the first device, a report based on the identified data.
Systems and Methods for Configuration Verification Across Secured Network Boundaries
A method includes receiving, from a first device, a first request indicating a client characteristic, generating a second request for content that simulates a data request originating at a client device with the client characteristic, identifying data of a response to the generated second request, and providing, to the first device, a report based on the identified data.
Scheduling solution configuration method and apparatus, computer readable storage medium thereof, and computer device
A scheduling scheme configuration method includes performing state verification on a plurality of operation dimensions involved in generating a scheduling scheme, and, in response to one or more of the operation dimensions being abnormal, removing the one or more abnormal operation dimensions to generate a new scheduling scheme.
System, method, and computer program for determining a network situation in a communication network
A system, method, and computer program product are provided for a determining a network situation in a communication network. In use, at least one threshold value of at least one operational parameter of a communication network is obtained, the at least one operational parameter representing at least one operational status of at least one of a computational device or a communication device. Additionally, log data of the communication network is obtained, the log data containing at least one value of the at least one operational parameter reported by at least one network entity of the communication network. The at least one value of the at least one operational parameter of the log data is compared with a corresponding threshold value of the at least one threshold value to form a detection of a network situation. Further, the detection of the network situation is reported if the at least one value of the at least one operational parameter of the log data traverses the corresponding threshold value of the at least one threshold value.
Control device, control system, network system, control method, and computer-readable medium
High-speed control of disaggregated network systems is implemented. A control device includes a main memory and an interface. The main memory shares management information contained in memory spaces possessed by a plurality of respective component devices connected and stores the management information as integrated management information. When the management information is to be updated, the interface transmits an update signal for updating the management information to the component devices and receives a response signal to the update signal from the component devices.
Control device, control system, network system, control method, and computer-readable medium
High-speed control of disaggregated network systems is implemented. A control device includes a main memory and an interface. The main memory shares management information contained in memory spaces possessed by a plurality of respective component devices connected and stores the management information as integrated management information. When the management information is to be updated, the interface transmits an update signal for updating the management information to the component devices and receives a response signal to the update signal from the component devices.