H04L47/762

Information transmission method, device, and computer readable storage medium
11564084 · 2023-01-24 · ·

Disclosed are an information transmission method and device, and a computer readable storage medium. The method comprises: an edge node sends a radio capability exposure request to a target transmission node at a radio access network side; the edge node receives radio capability exposure response information responded by the target transmission node. Specifically, the edge node sends the radio capability exposure request to the target transmission node at the radio access network side by means of an Xm interface, and receives the radio capability exposure response information responded by the target transmission node by means of the Xm interface or User Plane Functionality (UPF). In the solution of the present invention, the edge node can directly send the radio capability exposure request to the target transmission node at the radio access network side, and the target transmission node can also directly send the capability exposure response information to the edge node without the need of a core network, and thus better solving the problems in the related art that an information transfer delay exists in a radio capability exposure mode and the burden of core network processing is increased.

Techniques for excess resource utilization
11563693 · 2023-01-24 · ·

Techniques to utilize excess resources in a cloud system, such as by enabling an auxiliary resource utilizer to use resources while they are not needed to support primary resource utilizers, are described herein. Some embodiments are directed to identifying and allocating excess capacity of resources in a cloud system to auxiliary resource utilizers based on one or more policies. In various embodiments, excess resources in one or more of the set of resources in the cloud system, or cloud resources, may be determined based on monitoring utilization of the cloud resources by the primary resource utilizers. In many embodiments, an auxiliary resource utilizer that is in compliance with a set of utilization policies may be identified and the excess resources may be allocated to the auxiliary resource utilizer.

Techniques for excess resource utilization
11563693 · 2023-01-24 · ·

Techniques to utilize excess resources in a cloud system, such as by enabling an auxiliary resource utilizer to use resources while they are not needed to support primary resource utilizers, are described herein. Some embodiments are directed to identifying and allocating excess capacity of resources in a cloud system to auxiliary resource utilizers based on one or more policies. In various embodiments, excess resources in one or more of the set of resources in the cloud system, or cloud resources, may be determined based on monitoring utilization of the cloud resources by the primary resource utilizers. In many embodiments, an auxiliary resource utilizer that is in compliance with a set of utilization policies may be identified and the excess resources may be allocated to the auxiliary resource utilizer.

MULTI-TENANT RESOURCE MANAGEMENT IN A GATEWAY

Described herein are systems, methods, and software to manage resources in a gateway shared by multiple tenants. In one example, a system may monitor usage of resources by a tenant of the gateway and compare the usage with usage limits associated with the resources. The system may further determine when the usage of a resource exceeds a usage limit associated with the resource and, when the usage of the resource exceeds the usage limit, identify an operation associated with causing the usage limit to be exceeded and blocking the operation.

MULTI-TENANT RESOURCE MANAGEMENT IN A GATEWAY

Described herein are systems, methods, and software to manage resources in a gateway shared by multiple tenants. In one example, a system may monitor usage of resources by a tenant of the gateway and compare the usage with usage limits associated with the resources. The system may further determine when the usage of a resource exceeds a usage limit associated with the resource and, when the usage of the resource exceeds the usage limit, identify an operation associated with causing the usage limit to be exceeded and blocking the operation.

EFFICIENT ROUTING OF COMMUNICATIONS IN A MESH NETWORK
20230231907 · 2023-07-20 · ·

A method including receiving, by an infrastructure device in communication with a first device in a mesh network, a binding request from a meshnet local port associated with the first device that is dedicated for communicating meshnet data associated with the first device, the binding request requesting the infrastructure device to determine a currently allocated public port associated with the first device; and transmitting, by the infrastructure device to the first device, a response indicating the currently allocated public port associated with the first device. Various other aspects are contemplated.

Application mapping and alerting based on data dependencies

Aspects of the disclosure relate to application mapping and alerting based on data dependencies in business and technology logic. In some embodiments, a computing platform may receive a request to map enterprise technology resources. Then, the computing platform may generate a business capability model. Next, the computing platform may cause a user computing device to display a graphical user interface comprising selectable graphical representations of applications associated with the enterprise technology resources. Then, the computing platform may receive a user input identifying an occurrence of a technology incident by selecting one of the graphical representations. In response to the selection, the computing platform may trace, using the generated business capability model, upstream or downstream impacts of the technology incident. Then, the computing platform may cause a visual representation of data dependencies indicating upstream or downstream impacts of the technology incident to be displayed on the user computing device.

Application mapping and alerting based on data dependencies

Aspects of the disclosure relate to application mapping and alerting based on data dependencies in business and technology logic. In some embodiments, a computing platform may receive a request to map enterprise technology resources. Then, the computing platform may generate a business capability model. Next, the computing platform may cause a user computing device to display a graphical user interface comprising selectable graphical representations of applications associated with the enterprise technology resources. Then, the computing platform may receive a user input identifying an occurrence of a technology incident by selecting one of the graphical representations. In response to the selection, the computing platform may trace, using the generated business capability model, upstream or downstream impacts of the technology incident. Then, the computing platform may cause a visual representation of data dependencies indicating upstream or downstream impacts of the technology incident to be displayed on the user computing device.

Managing cloud acquisitions using distributed ledgers
11706155 · 2023-07-18 · ·

Systems and methods of the disclosure include: receiving, by a cloud resource provisioning component via a cloud provisioning request application programming interface (API), a cloud resource request; storing the cloud resource request on a cryptographically-protected distributed ledger; receiving, from a first cloud provider, a first cloud resource offer responsive to the cloud resource request; and responsive to receiving, from a node of the cryptographically-protected distributed ledger, a notification of validation of the first cloud resource offer with respect to the cloud resource request, causing the first cloud provider to provision a cloud resource specified by the first cloud resource offer.

Managing cloud acquisitions using distributed ledgers
11706155 · 2023-07-18 · ·

Systems and methods of the disclosure include: receiving, by a cloud resource provisioning component via a cloud provisioning request application programming interface (API), a cloud resource request; storing the cloud resource request on a cryptographically-protected distributed ledger; receiving, from a first cloud provider, a first cloud resource offer responsive to the cloud resource request; and responsive to receiving, from a node of the cryptographically-protected distributed ledger, a notification of validation of the first cloud resource offer with respect to the cloud resource request, causing the first cloud provider to provision a cloud resource specified by the first cloud resource offer.