H04L41/5064

Data set valuation for service providers

Data set valuation techniques are provided. For example, a request is obtained from a client to utilize one or more cloud computing services managed by at least one service provider. A valuation is determined for delivering the one or more requested cloud computing services to the client. The valuation determination includes determining a valuation of one or more data sets associated with the one or more cloud computing services.

CONTROL IN A CONTENT DELIVERY NETWORK

A content delivery network (CDN) includes a plurality of CDN components including at least one CDN rendezvous mechanism and at least one control core. The CDN components are controlled by control core data from the at least one control core. Some CDN components obtain CDN resources including control core data from at least some other CDN components. The CDN components use the CDN rendezvous mechanism to select one or more CDN components from which to obtain CDN resources.

Control in a content delivery network

A content delivery network (CDN) includes a plurality of CDN components including at least one CDN rendezvous mechanism and at least one control core. The CDN components are controlled by control core data from the at least one control core. Some CDN components obtain CDN resources including control core data from at least some other CDN components. The CDN components use the CDN rendezvous mechanism to select one or more CDN components from which to obtain CDN resources.

DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS

Responding to a data subject access request includes receiving the request and identifying the requestor and source. In response to identifying the requestor and source, a computer processor determines whether the data subject access request is subject to fulfillment constraints, including whether the requestor or source is malicious. If so, then the computer processor denies the request or requests a processing fee prior to fulfillment. If not, then the computer processor fulfills the request.

System and method for predicting and reducing subscriber churn

A system and method for creating a model for predicting and reducing subscriber churn in a computer network. The method including: for a predetermined time period: retrieving traffic flow data per subscriber for a plurality of subscribers in the computer network; determining at least one metric per subscriber from the traffic flow data; determining at least one systemic feature associated with the plurality of subscribers; and storing the at least one amalgamated metric and feature; on reaching the predetermined time period create the model by: analyzing at least one metric and at least one feature for the predetermined time period; predicting, per subscriber, whether the subscriber is going to churn within a churn period in the future based on the analysis; validating the prediction by determining whether the subscriber actually churned during the churn period; and creating the model based on the validated predictions.

Providing secure data replication among nodes of a hierarchical multitenant security orchestration and automated response (SOAR) architecture

Systems and methods for facilitating secure and reliable communications among nodes of different tiers of a multi-tenant SOAR deployment are provided. According to one embodiment, data flow propagation within a hierarchy of nodes of the SOAR deployment is controlled. Responsive to creation of a record by a node: (i) when there exists a parent node in the hierarchy, setting a PID of the record to a TID of the parent node; otherwise, to a TID of the node; (ii) when there exists a child node in the hierarchy, setting a CID of the record to the TID of the child node; otherwise, to the TID of the node; and (iii) maintaining a set of propagation rules for the node relating to permissibility of propagation of the record within the hierarchy. During propagation of the record by the node, the PID and the CID of the record are updated.

SYSTEM AND METHOD FOR HARDWARE AND SOFTWARE MONITORING WITH INTEGRATED RESOURCE ACQUISITION
20210336858 · 2021-10-28 ·

A method, system, and network providing hardware and software inventorying and monitoring provide the status of a local network of interconnected information technology devices. A user downloads and installs a local network monitoring software program from an online source onto a host computer system. The local network monitoring software system initiates an inventory of all information technology devices associated with said local network of information technology devices. Also, the local network monitoring software determines the operational status of the information technology devices and the status of software programs installed on the information technology devices. The results of the inventory and status determinations are presented to the host computer system. The presented information permits the user of said host computer system to initiate maintenance and support actions for the information technology devices in response to the operational status and status of software programs using the local network monitoring software.

CHURN PREDICTION IN A BROADBAND NETWORK

A chum predictor predicts whether a customer is likely to chum. The chum predictor is built and trained from data collected from mul-tiple customers. The data can include static configuration data and dynamic measured data. A chum predictor builder generates multiple customer in-stances and processes the instances based on the collected data, and based on separating the instances into one or more training subsets. Based on the pro-cessing, the builder generates and saves a chum predictor. The chum predictor can access data for a customer and generate a customer instancance and generates a chum likelihood score. Based on a chum type, the chum predictor system can generate preventive action for the customer.

METHOD FOR MANAGING SYSTEM AND APPARATUS THEREFOR
20210320849 · 2021-10-14 ·

The present disclosure provides a method of managing a system and an apparatus therefor. The method of the present disclosure may include providing a menu management tool for managing a menu of a system, setting an item of the menu and an authority to access the item by receiving an input through the menu management tool, and providing, when a terminal having the authority accesses the system, information regarding the item to the terminal.

EVENT NOTIFICATION IN INTERCONNECTED CONTENT-ADDRESSABLE STORAGE SYSTEMS
20210279272 · 2021-09-09 ·

Some of the embodiments herein provide a seamless cloud of storage. This storage may be content-addressable storage. An end application may or may not be exposed to the fact that content-addressable storage is used. Various embodiments herein provide event notification, which may allow applications or users to subscribe to particular events (such as storage of an X-ray by a particular entity). Some embodiments provide for a shared archive. A shared archive may provide homogeneous access to medical data, etc. that was previously stored into the CAS cloud by heterogeneous applications, varied data types, etc. Additionally, embodiments herein allow for the creation and distribution of virtual packages. For example, a user may create a virtual package for all images related to a patient so that she may have a virtual package of all of her medical data to present to a referring physician.