Patent classifications
H04L41/5096
Cloud operation reservation system
In one or more embodiments, a cloud operation reservation system is provided through which cloud operations may be scheduled and managed. The cloud operation reservation system includes logic for defining a set of time windows that are available to perform one or more cloud operations on cloud targets and presenting the set of time windows to one or more tenants of a cloud service. Tenants may browse the presented set of time windows and submit reservation requests to update and/or perform other operations on cloud targets. In response to receiving, a request to reserve one or more slots in a particular time window, the cloud operation reservation system schedules one or more cloud operations to be performed on a cloud target that is available to at least one tenant.
Device lifecycle management via a central identity service
Managing devices in an IoT environment. A method includes, as a result of a device being provisioned by a special-purpose solution, storing at a central unified registry a correlation of the device and the given special purpose solution. The method further includes correlating the device to a different special-purpose solution at the unified registry. As a result, the method further includes causing subsequent configuration of the device to be performed by the different special-purpose solution.
System and method for delivering modular tools
A system and method are presented for delivering modular tools through a cloud-based remote computing environment. Users may create and customize extensions to the modular tools for integration with the product system without requiring change to product. Using a script tag added to a website, a user is able to install the modular tool to a website. The modular tool extensions are able to directly communicate with handlers and websites and are able to become directly integrated with a premises-based product. This may be done through a multiplexed API exposed to the modular tool extensions that directly couples them to the premises-based product. The modular tools are able to be configured in the premises-based product, however they are hosted in the cloud and as such, the premises-based product is able to receive continuous integration and deployment from the cloud.
Rights management of cloud resources
A system and method include association of a first plurality of software licenses of a first type with a first subscription associated with a first plurality of cloud-based resources, determination of a first number of the first plurality of software licenses to activate based on the types of the first plurality of resources, activation of the first number of the first plurality of software licenses, monitoring of usage of the first plurality of resources, determination, based on the monitored usage, of a second one or more resources to associate with the first subscription, determination, in response to determining the second resources, of a second number of the first plurality of software licenses to activate based on the types of the second one or more resources, activation of the second number of the first plurality of software licenses, and association of the second resources with the first subscription.
Smart dynamic restore for Kubernetes based applications
One example method includes discovering an application topology, discovering relationships between microservices that are elements of the application topology, ranking the microservices, identifying one or more of the microservices as a persistency microservice, selecting one or more persistency microservices for backup, and defining a backup policy based on the microservice relationships, the microservice rankings, and the selected persistent microservices. A backup operation is then performed that includes backing up persistent data and/or persistent metadata generated and/or modified by one or more of the persistency microservices.
Cloud security management
Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.
ROBOTIC PROCESS AUTOMATION BOT OPERATIONAL MANAGEMENT SYSTEM
A device includes a processor and a memory. The processor effectuates operations including monitoring enterprise network traffic associated with one or more user device (UE). The processor further effectuates operations including comparing the enterprise network traffic to a UE profile associated with each of the one or more UE. The processor further effectuates operations including determining whether the comparison indicates that a predetermined threshold has been exceeded. The processor further effectuates operations including in response to the indication that the predetermined threshold has been exceeded, generating an alert, wherein exceeding the predetermined threshold is indicative of a denial of service attack on an enterprise network or an attempt to remove enterprise data via the one or more UE.
End-to-end service level metric approximation
Described are examples for providing service level monitoring for a network hosting applications as a cloud service. A service level monitoring device may receive end-to-end measurements of service usage collected at user devices for a plurality of applications hosted as a cloud services. The service level monitoring device may determine degraded applications of the plurality of applications based on anomalies in the measurements. The service level monitoring device may determine a service level metric based on an aggregation of the degraded applications. In some examples, the service level monitoring device may detect a network outage affecting the service.
CONFIGURATION MONITORING IN A CLOUD PLATFORM
Methods, systems, and articles of manufacture, including computer program products, are provided for configuration monitoring. In some embodiments, there is provided a method that includes: sending a container image to a second cloud platform hosting a production system, wherein the container image includes configuration instructions to configure monitoring of an application at the production system hosted at the second cloud platform and at least one value to be monitored at the application at the production system hosted at the second cloud platform; receiving at least one message including the at least one value indicative of a current state of the application and/or the cloud platform; comparing the at least one value to at least one threshold; and in response to the at least one value exceeding the at least one threshold, sending an alert message.
CLOUD INFRASTRUCTURE PLANNING ASSISTANT VIA MULTI-AGENT AI
Cloud infrastructure planning systems and methods can utilize artificial intelligence/machine learning agents for developing a plan of demand, plan of record, plan of execution, and plan of availability for developing cloud infrastructure plans that are more precise and accurate, and that learn from previous planning and deployments. Some agents include one or more of supervised, unsupervised, and reinforcement machine learning to develop accurate predictions and perform self-tuning alone or in conjunction with other agents.