H04L41/0886

Autotuning a virtual firewall

A device may receive an input associated with deploying a virtual firewall on a computing device. The device may determine a first set of characteristics associated with the virtual firewall and a second set of characteristics associated with a hypervisor associated with the computing device. The device may automatically tune the virtual firewall based on the first set of characteristics and the second set of characteristics. The device may deploy the virtual firewall after tuning the virtual firewall.

System and method for agnostic zero touch provisioning of customer premises equipment
11522756 · 2022-12-06 · ·

A method for zero-touch provisioning is disclosed. The method includes receiving a customer specification of network requirements exclusively specified for a CPE assigned to a specific customer at a specific customer premises. The CSNR includes information describing the premises and information describing an intended operation of the CPE. The method also includes storing a job assignment including a unique CPE identity and service information for the provisioning of the CPE. The identity is linked to the customer through the job assignment. The method also includes provisioning a class of service template exclusively for providing the intended operation of the CPE at the customer premises and paired with the CPE identity through the job assignment. The method also includes receiving a provisioning request sent by the CPE to a FQDN pointed at the ZTP server and including the CPE identity. Finally, the method includes pushing the COS template to the CPE.

CLOUD SERVICE COMPONENT DEPENDENCIES
20220385535 · 2022-12-01 ·

Technologies are disclosed for improving the deployment of a cloud-hosted service. Before being deployed to a particular environment, a cloud-hosted service must be configured for that environment. Configuring a deployment includes determining which components to deploy, determining how to connect with external components, identifying onboarding procedures, etc. A dependency data model defines a hierarchy of components utilized by the cloud-hosted service. For each component in the hierarchy, configuration parameters define how to deploy that component. A list of configuration parameters that do not yet have values for a target environment may be generated and provided to a user. Values for these parameters may then be received. A configuration for the target environment is then generated based on the dependency data model and the received values. The dependency data model may inherit dependencies and configuration properties from ancestors in a hierarchy of dependency data models.

ADDING HOST SYSTEMS TO EXISTING CONTAINERIZED CLUSTERS

The technology disclosed herein enables adding new host systems to existing clusters. An example method comprises receiving, by a processor, identification data associated with an existing cluster; generating a cluster entity data structure of the existing cluster using the identification data; generating a discovery image using the cluster configuration data structure, wherein the discover image comprises an executable code structured according to a file system; and causing a new host system to boot using the discovery image.

Communication device and communication method
11516081 · 2022-11-29 · ·

A communication device is disclosed including a communication unit configured to receive a message including an SCG configuration, wherein the communication unit transmits a message, which does not include the SCG configuration, to another communication device and causes the another communication device to perform full configuration. In other aspects, another communication device and a communication method are also disclosed.

Systems, computer-readable media and computer-implemented methods for automated, dynamic capacity planning using HTTP response header fields

A system, computer-readable media and computer-implemented method for automated, dynamic capacity planning using HTTP response header fields. The computer-implemented method includes: automatically determining a server workload statistic relating to operation of a server, the server being configured to serve a content item in response to HTTP-formatted requests; automatically determining an expiration value based at least in part on the workload server statistic; automatically updating a configuration file corresponding to the content item with the expiration value; receiving a request for the content item from a requesting device; automatically accessing the configuration file and generating a HTTP-formatted response header incorporating the expiration value; and, automatically transmitting the HTTP-formatted response header and the content item in response to the request.

Artificial intelligence-based redundancy management framework

Methods, apparatus, and processor-readable storage media for artificial intelligence-based redundancy management are provided herein. An example computer-implemented method includes obtaining telemetry data from one or more client devices within at least one system; predicting one or more hardware component failures in at least a portion of the one or more client devices within the at least one system by processing at least a portion of the telemetry data using a first set of one or more artificial intelligence techniques; determining, using a second set of one or more artificial intelligence techniques, one or more redundant hardware components for implementation in connection with the one or more predicted hardware component failures; and performing at least one automated action based at least in part on the one or more redundant hardware components.

Network initialization communication storage system

A network initialization communication storage system includes a host device coupled to a storage system and an initialization issue analysis system via a network. The host device includes an initialization subsystem coupled to each of a plurality of ports. During network initialization of the host device via the storage system, the initialization subsystem identifies network initialization communications transmitted via the port(s) and the network, filters the network initialization communications to remove a subset of network initialization information and provide filtered network initialization communications, and transmits the filtered network initialization communications for storage in a remote access controller subsystem in the host device. In the event the network initialization of the host device fails, the initialization issue analysis system retrieves the filtered network initialization communications from the remote access controller subsystem, and uses them to identify at least one issue with the network initialization of the host device via the storage system.

Automatically prioritizing computing resource configurations for remediation

Systems and methods for automatically prioritizing computing resource configurations for remediation include receiving information describing configuration issues that may result in impaired system performance or unauthorized access, parsing that information and automatically analyzing configuration details of a user's private computing environment to determine that assets provide an environment in which configuration issues may be exploited to produce undesired results. Such systems and methods can generate assessments indicating the likelihood an issue can be exploited and potential impacts of the issue being exploited. Such systems and methods can use these assessments to generate a report prioritizing remediation of specific configuration issues for specific vulnerable assets based on the actual configuration of the user's computing resources and the data managed using those resources. Issues deemed have a higher likelihood of resulting in problems can be prioritized over configuration issues which may appear to have severe consequences, but which are unlikely to affect the user's resources.

Multi-mode fixed access point for utilization in a communication network of moving things, for example including autonomous vehicles

Communication network architectures, systems and methods for supporting a network of mobile nodes. As a non-limiting example, various aspects of this disclosure provide communication network architectures, systems, and methods for supporting a dynamically configurable communication network comprising a complex array of both static and moving communication nodes (e.g., the Internet of moving things).