H04L41/5054

Anomaly detection for automated information technology processes
11568279 · 2023-01-31 · ·

Methods, systems, and computer-readable storage media for receiving a record including a set of attributes, each attribute having an attribute value, the record representing automatic execution of an IT process within a managed system, retrieving a model representing historical executions of the IT process and including a set of distribution parameters associated with a first type of attribute and a set of probability distributions associated with a second type of attribute, determining, for a first attribute, a first score based on distribution parameters and a value, determining, for a second attribute, a second score based on a probability distribution and a value, the second attribute being of the second type of attribute, and selectively indicating that the IT process is anomalous based on an outlier score.

Automated port configuration management in a service mesh

Systems, methods and/or computer program products for managing and dynamically automating service mesh communications between microservices, eliminating unnecessary exposure of microservice ports and increasing security between microservices of the service mesh. The control plane collects data describing communications between microservices and tracks the frequency at which microservices communicate. Collected data is fed to machine learning models which outputs a forecast predicting future communication interactions between microservices. Using the predicted requirements for facilitating communications between microservices of the service mesh, an allowed list of communications can be generated describing the microservices allowed to send and receive communications, duration of communications allowed, when such communications are allowed, and the ports that will be used for facilitating the communication between microservices. Administrators of the service mesh may manually override the one or more approved aspects of the dynamically generated allowed list configured automatically by the service mesh.

CONFIGURATION TOOL FOR DEPLOYING AN APPLICATION ON A SERVER

An application configuration tool and associated method for supporting deployment of an application on a server that has a set of configurations available for applications deployed on the server. The method attempts to match every configuration required by the application to a configuration available on the server. In case of multiple candidates that match, one is selected. When there is no match an error message is generated. The method is iterated to inspect each selected configuration to identify any references contained in the selected configuration that themselves need further configurations. The iteration of inspecting and the matching to follow the references is continued until all such references are exhausted either by matching or failure to match and consequent error message generation. Finally, a configuration report is output specifying the selected configurations and, to the extent that not all required configurations have been matched to available configurations, the error messages.

CONFIGURATION TOOL FOR DEPLOYING AN APPLICATION ON A SERVER

An application configuration tool and associated method for supporting deployment of an application on a server that has a set of configurations available for applications deployed on the server. The method attempts to match every configuration required by the application to a configuration available on the server. In case of multiple candidates that match, one is selected. When there is no match an error message is generated. The method is iterated to inspect each selected configuration to identify any references contained in the selected configuration that themselves need further configurations. The iteration of inspecting and the matching to follow the references is continued until all such references are exhausted either by matching or failure to match and consequent error message generation. Finally, a configuration report is output specifying the selected configurations and, to the extent that not all required configurations have been matched to available configurations, the error messages.

DIGITAL TWIN ARCHITECTURE FOR MULTI-ACCESS EDGE COMPUTING ENVIRONMENT
20230026782 · 2023-01-26 ·

Techniques are disclosed for generating a virtual representation (e.g., one or more digital twin models) of a multi-access edge computing system environment, and managing the multi-access edge computing system environment via the virtual representation. By way of example only, such techniques enable understanding, prediction and/or optimization of performance of applications and/or systems operating in the multi-access edge computing environment.

INTELLIGENT WIRELESS BROADBAND NETWORK AND CONTENT DELIVERY MANAGEMENT

An intelligent wireless broadband network and content delivery management within a network includes at least one datacenter, at least one network tower and a plurality of smart nodes may be provided. Each of the plurality of smart nodes may be deployed as a micro point of presence (micro POP) at the at least one datacenter the at least one tower and at each of a plurality of hub-homes within the network. An artificial intelligence (AI) capable compute unit may be configured to provide customization of the plurality of smart nodes based on usage pattern of the plurality of homes at a neighborhood level, and thereby facilitating a dynamic edge network distribution solution for better Internet experience to the end-users.

Cloud Computing Power Allocation Method, User Terminal, Cloud Computing Power Platform and System
20230229215 · 2023-07-20 ·

Provided are a cloud computing power allocation method, a user terminal, a cloud computing power platform, and a system. The method includes: generating a computing power request including a computing power demand and account information of a computing power scheduling center; sending the computing power request to a cloud computing power platform, so that the cloud computing power platform sends a configuration instruction to a computing device cluster according to the computing power request where the configuration instruction is to allocate to the user terminal a target computing device meeting the computing power demand from the computing device cluster and configure based on the account information the target computing device to execute a computing task issued by the computing power scheduling center; and acquiring from the computing power scheduling center computing power information determined according to a computing result from the target computing device, by using the account information.

Financial network
11563672 · 2023-01-24 · ·

A network system that facilitates financial transactions. A software defined network may operate to provide a variety of trading related services to a variety of customers with a low latency. Core or processor affinity for routing processes may improve speeds of routing. Data capture through a shared memory space may allow for a variety of analytics without introducing unacceptable delay.

Financial network
11563672 · 2023-01-24 · ·

A network system that facilitates financial transactions. A software defined network may operate to provide a variety of trading related services to a variety of customers with a low latency. Core or processor affinity for routing processes may improve speeds of routing. Data capture through a shared memory space may allow for a variety of analytics without introducing unacceptable delay.

Managing service user discovery and service launch object placement on a device

Methods and apparatuses to manage service user discovery and service launch object placement on a device. A method comprising: obtaining information to assist in identifying a portion of a user interface of a wireless device, the wireless device communicatively coupled to a network system over a wireless access network; determining a differentiating attribute of the identified portion of the user interface; obtaining one or more service launch objects for placement in the identified portion of the user interface; and sending configuration information to the wireless device over the wireless access network to assist the wireless device in placing the one or more service launch objects in the identified portion of the user interface.