H04L47/82

Automated host management service

A recovery workflow is part of an automated management service for bare metal hosts allocated for single-tenant operation in a multi-tenant environment. The health of the hosts is monitored using a set of health criteria. If it is detected that one of the host machines fails a health check then a host recovery workflow can be initiated. As part of the workflow, the failed host can be repurposed or retired. A spare host class can be used to obtain a new host to take over for the failed host. Once deployed, the operation of the new host can be tested. Upon passing the test, the new host can take over for the failed host. A new host resource can be automatically requested to be added to the spare host class in order to ensure that there are sufficient resources available in case of an additional failure.

METHOD AND SYSTEM FOR PRIORITIZING WEB-RESOURCES FOR MALICIOUS DATA ASSESSMENT
20230026599 · 2023-01-26 ·

The disclosed systems and methods are for scheduling web-resources for a malicious data comprising receiving requests to publish web-resources, and generating a graph structure comprising: a parent nodes associated with parent web-resources, a zero-vertex node being connected with the of parent nodes via zero-vertex edges, child nodes associated with child web-resources, and web-resource edges connecting the parent nodes, child nodes and sub-child nodes. Using the graph structure, assigning, to a given child node a first assigned trust score based on a lowest trust score of a subset of parent nodes connected to the given child node in the graph structure such that a web-resource edge length connecting the given, child node and the subset of parent nodes is a representative of the first assigned trust score, applying a shortest-path algorithm for calculating a shortest-path and based on the shortest-path determining at least one web-resource prioritized for the malicious data assessment.

COLLECTIVE SCALING OF APPLICATIONS

Some embodiments provide a method for scaling a service chain that includes multiple services, each of which is provided by one or more instances of the service. The method identifies that a first service in the service chain has received a number of requests. For each service in the service chain, the method (i) identifies a scaling factor that estimates a portion of requests received at the first service that will be subsequently received at the service and (ii) deploys a number of additional instances of the service based on the identified scaling factor for the service and the number of requests received at the first service.

Distributed semantic network for concurrent access to interconnected objects

An example method of reserving a resource of virtualized infrastructure in a data center on behalf of a client includes: obtaining, by a distributed semantic network, a set of facts corresponding to resources in the virtualized infrastructure and a set of rules corresponding to relationships between the resources; receiving, at the first semantic network instance, a first reservation request for a first resource of the virtualized infrastructure from a first client, wherein the first reservation request comprises a first rule specifying a requested exclusive lock on the first resource; passing the first rule from the first semantic network instance to the second semantic network instance; receiving an acknowledgement from the second semantic network instance in response to passing the first rule; and sending an acknowledgement to the first client that the first rule specifying the requested exclusive lock on the first resource has been created.

Method and system for changing resource state, terminal, and storage medium

The present disclosure discloses a method and apparatus for changing a resource state, a terminal, and a storage medium, which belong to the field of smart home. A system for changing a resource state that includes a first collection resource, a first intermediate-level resource, and leaf node resources can be established. By making the first collection resource obtain link information of each leaf node resource whose resource state needs to be changed, a request that includes a default interface of the leaf node resource may be generated for the leaf node resource, such that a state of the leaf node resource can be changed accurately by the system. Therefore, the present disclosure enables the control request issued by a client to be recognized and executed by each leaf node resource, thereby increasing reliability and stability of system control.

REMOTE ACCESS FOR RESOURCE LINKS SHARED DURING WEB CONFERENCE SESSION
20230017091 · 2023-01-19 ·

A method may include receiving, from a first client device, a first position of a selection event at the first client device. The first client device being engaged in a web conference session with a second client device. The second client device sharing a content displayed at the second client device such that the content is also displayed at the first client device. If the first position of the selection event is determined to correspond to a second position of a resource link included in the content being shared by the second client device, information associated with the resource link may be sent to the first client device. The information may enable the first client device to access a resource associated with the resource link by launching a corresponding application such as a browser, a media player, and/or a text editor. Related systems and articles of manufacture are also provided.

Inter-Device Requests and Communication
20230224259 · 2023-07-13 ·

In one embodiment, a method includes receiving, at a proxy application on a first computing device, a request from a first application on the first computing device to access a resource. The method further includes transmitting, from the proxy application on the first computing device, a modified version of the request to a proxy application on a second computing device and receiving, from the proxy application on the second computing device, a response comprising data from the requested resource, where the resource is on the second computing device. The method further includes transmitting, to the first application on the first computing device, a response satisfying the first application’s request to access the resource.

Method for validating ownership of a resource within a network, coordinating agent and validation agent

A method to validate ownership of a resource within a network, comprising selecting a group of at least two validation agents such that network routes between a validation agent of the group and entities of a group of one or more entities associated to the resource do not intersect. The method further comprises transmitting a property of the resource to be validated and an address indicator for the resource from a coordinating agent to the group of validation agents. Also, the method comprises querying the property of the resource from the entities using the validation agents of the group to determine queried properties; and evaluating the queried properties to validate ownership of the resource.

Aggregated service status reporter
11700314 · 2023-07-11 · ·

Systems as described herein may include generating an aggregated service status report for a real-time service delivery platform. A plurality of services running in a service domain may be determined. A request for a status of system behavior corresponding to a particular service may be received. Service connection details of the particular service may be discovered and metric data of real-time data movement may be tracked. Real-time snapshot aggregation of the particular service may be provided. In a variety of embodiments, a real-time system behavior report for the service across availability zones may be presented.

INFORMATION PROCESSING METHOD AND APPARATUS, AND STORAGE MEDIUM
20230216810 · 2023-07-06 ·

The present disclosure provides an information processing method and apparatus, and a storage medium, capable of testing resource discovery performance of a server device. The method includes: transmitting, by a client device, a first resource discovery request to a server device, in which the first resource discovery request is used to request resource information and security domain information of the server device; and determining, by the client device, a capability of the server device for responding to resource discovery based on whether a first resource response message is correctly received from the server device, to complete a test of resource discovery performance of the server device. The method ensures that server devices that pass the test can all correctly respond to resource discovery requests, which prevents subsequent services from being affected by performance issues of the server devices.