H04L41/0893

Dynamic management of network policies between microservices within a service mesh

Systems, methods and/or computer program products optimizing network policies between microservices of a service mesh. The service mesh tracks incoming API calls of applications and based on the historical transactions, the context of API calls, and the microservices in the microservice chain being invoked, network controls and policy configurations are set to optimize the transactions performed by the service mesh. Dimensions of the communications between microservices of the service mesh are dynamically optimized via the service mesh control plane using a policy optimizer. Optimized dimensions of service mesh transactions includes automated policy adjustments to retries between microservices, circuit breaking between microservices, automated timeout adjustments between microservices and intelligent rate limiting between microservices and/or rate limiting applied to user profiles.

Resource lifecycle automation

Policies can be applied to, and enforced for, specific resources by applying a corresponding tag to those resources. An entity, such as a customer of a resource provider, can generate one or more policies to be applied to a set of resources, where those policies can relate to data retention, backup, lifecycle events, and other such aspects. Each policy can be associated with a particular tag, which may comprise a key-value pair to be applied to various resources. A policy enforcement manager can determine the tagged resources and ensure that the relevant policies are applied. The policies can include logic or intelligence for performing a variety of tasks with respect to resources, groups of resources, or types of resources, as identified using the tags.

Resource lifecycle automation

Policies can be applied to, and enforced for, specific resources by applying a corresponding tag to those resources. An entity, such as a customer of a resource provider, can generate one or more policies to be applied to a set of resources, where those policies can relate to data retention, backup, lifecycle events, and other such aspects. Each policy can be associated with a particular tag, which may comprise a key-value pair to be applied to various resources. A policy enforcement manager can determine the tagged resources and ensure that the relevant policies are applied. The policies can include logic or intelligence for performing a variety of tasks with respect to resources, groups of resources, or types of resources, as identified using the tags.

Contextual generation of ephemeral networks

A method, system, and computer program product for contextual generation of an ephemeral network are provided. The method detects an initiating event for network generation associated with a user of a first computing device. The method determines a duration of the initiating event. A set of network members is determined based on the initiating event and the duration. The method establishes an ephemeral network, connecting at least a portion of computing devices associated with the set of network members. The ephemeral network is terminated in response to detecting a completion event. In response to terminating the ephemeral network, member information for the set of network members is removed from the portion of the computing devices.

Contextual generation of ephemeral networks

A method, system, and computer program product for contextual generation of an ephemeral network are provided. The method detects an initiating event for network generation associated with a user of a first computing device. The method determines a duration of the initiating event. A set of network members is determined based on the initiating event and the duration. The method establishes an ephemeral network, connecting at least a portion of computing devices associated with the set of network members. The ephemeral network is terminated in response to detecting a completion event. In response to terminating the ephemeral network, member information for the set of network members is removed from the portion of the computing devices.

Cloud-based computing network structuring systems and methods

Embodiments are described herein for systems and methods for continuously monitoring a network structure of one or more networks using a cloud-based network monitoring system, and rearranging, using the cloud-based network monitoring system, the network structure of the one or more networks to protect confidential and/or prioritized assets of the one or more networks based at least in part on the monitoring of the network structure of the one or more networks. In certain embodiments, the cloud-based network monitoring system is configured to continuously monitor a network structure of one or more networks, and to automatically rearrange the network structure of the one or more networks to protect confidential and/or prioritized assets of the one or more networks based at least in part on the continuous monitoring of the network structure of the one or more networks.

Cloud-based computing network structuring systems and methods

Embodiments are described herein for systems and methods for continuously monitoring a network structure of one or more networks using a cloud-based network monitoring system, and rearranging, using the cloud-based network monitoring system, the network structure of the one or more networks to protect confidential and/or prioritized assets of the one or more networks based at least in part on the monitoring of the network structure of the one or more networks. In certain embodiments, the cloud-based network monitoring system is configured to continuously monitor a network structure of one or more networks, and to automatically rearrange the network structure of the one or more networks to protect confidential and/or prioritized assets of the one or more networks based at least in part on the continuous monitoring of the network structure of the one or more networks.

METHODS AND SYSTEMS FOR DHCP POLICY MANAGEMENT
20230224215 · 2023-07-13 ·

Methods and systems are disclosed for configuring a network consisting of an IP Policy Management (IPPM) service and a plurality of distributed network devices supporting DHCP and other service roles wherein network devices are discovered by the IPPM service and the configuration for each of the network devices is determined by the selection of a policy, wherein the policy is made up of a plurality of rules specific to the service roles and capabilities of the network devices, and the configuration of each of the network devices is deployed via the network to the network devices.

NETWORK ACCESS TOKENS FOR ACCESSORIES

A wireless access device can be configured to determine a list of accessory groups corresponding to accessories connected to a network managed by the wireless access device. The wireless access device may also be configured to identify at least one firmware update that corresponds to at least one accessory group of the list of accessory groups and request all firmware updates that correspond to the at least one accessory group. The wireless access device can also be configured to receive one or more firmware updates that corresponds to at least one of the accessories of the at least one accessory group for which a respective firmware update is available and transmit at least one firmware update of the received one or more firmware updates to at least one corresponding accessory of the at least one accessory group.

Systems and methods for streaming media content during unavailability of content server

Systems and methods are described herein for streaming during unavailability of a content server. Upon determining that there are conditions indicating buffering issues during delivery of a media asset, a server determines a first group of devices suitable for receiving the media asset from the server and sharing the media asset on a peer-to-peer network. Then, the server determines a second group of devices suitable for receiving the media asset on a peer-to-peer network from a first group device. The server then determines groupings within which to share and receive the media asset. Next, the server transmits instructions to the devices in the first group to maintain in buffer and share certain portions of the media asset with the second group devices within their grouping. Finally, the server updates information detailing the media asset portions the devices are maintaining in buffer and sharing.