H04L47/828

ALLOCATING VIRTUAL RESOURCE BASED ON BLOCKCHAIN
20210297368 · 2021-09-23 · ·

A method for allocating a virtual resource based on a blockchain, including: receiving resource allocation transaction sent by a client, wherein the resource allocation transaction includes a user identifier of a target user; in response to the resource allocation transaction, invoking verification logic in a smart contract deployed in the blockchain to verify whether a service indicator of the target user within a preset service cycle satisfies a virtual resource allocation condition; and when the service indicator satisfies the virtual resource allocation condition, invoking virtual resource allocation logic in the smart contract to allocate a preset amount of virtual resources to the target user from a virtual resource pool and transfer the preset amount of virtual resources to a blockchain account corresponding to the user identifier, wherein virtual resources in the virtual resource pool are associated with service profits of a service operator corresponding to service of the target user.

RESOURCE PROCESSING METHOD AND SYSTEM, STORAGE MEDIUM AND ELECTRONIC DEVICE
20210176186 · 2021-06-10 ·

A priority-based resource processing method and system, belonging to the technical field of information processing, are described. The priority-based resource processing method comprises: calculating a first priority of a first resource and a second priority of a second resource; determining whether the first priority of the first resource is higher than the second priority of the second resource; and when it is determined that the first priority is higher than the second priority, responding to a first operation request corresponding to the first resource.

FALLBACK COMMAND IN A MODULAR CONTROL SYSTEM
20210203617 · 2021-07-01 ·

A device may include a memory storing instructions and a processor configured to execute the instructions to receive an instruction from an administration device; identify a link selector in the instruction that corresponds to a resource attribute of a first resource that specifies how a second resource is to be controlled by the first resource; query a database of contracts between resources to determine that the second resource is available to be controlled by the first resource, based on resource contracts associated with the second resource. The processor may be further configured to generate a resource contract between the first resource and the second resource that indicates the second resource is controlled by the first resource and enable the first resource to communicate with the second resource in accordance with the generated resource contract.

Network resource isolation method for container network and system thereof

A network resource isolation method for container networks and a system thereof, including a computation system for network resource isolation, or a system using network resource isolation, or a network resource isolation system for container networks, and methods of implementation thereof. The system provides container overlay networks with a resource isolation scheme that also reduces the use threshold for isolation of network resources and optimizes the utilization rate of network resources.

METHOD AND DEVICE FOR COMMUNICATION
20210185605 · 2021-06-17 ·

The embodiments of the present application relate to a method and device for communications. The method comprises: a terminal device determines a target group; and, the terminal device joins the target group to communicate with a network side. The method and device for communications of the embodiments of the present application implement the fine-grained management of a network.

USING CAPTURED CONFIGURATION CHANGES TO ENABLE ON-DEMAND PRODUCTION OF GRAPH-BASED RELATIONSHIPS IN A CLOUD COMPUTING ENVIRONMENT
20210176187 · 2021-06-10 · ·

Described herein is a system for automatically capturing configuration changes to the cloud computing resources. The system for automatically capturing configuration changes may detect changes to configurations of cloud computing resources across the geographic regions, in real-time. The changes may be stored in a central data storage device instantiated by a central cloud computing account. Furthermore, a relationship graph indicating the relationships between the different cloud computing resources may be generated.

Managing computer resources

A computer-automated method, computer system and computer program for managing resources in applications. The resources are managed in groups, each group having a unique group name which is dynamically resolvable to an address specific to a particular application. The resources may be application program interfaces object instances or data sources, for example. When a resource placement request is received to place a resource in a particular application with an associated address, the resource is assigned to a group and given a unique resource identifier which combines with the group name to form a unique endpoint for the resource. Subsequently, in response to detection of a resource performance bottleneck, or in response to an external request, a resource is moved to another application by reassigning its group name to the second address, thereby moving all resources in that group to the other application.

Systems and methods for providing self-referencing utilization calculation and dynamic resource allocation based thereon for digital transmissions

Systems and methods for self-referencing utilization calculation and dynamic resource allocation for digital transmissions are provided. Systems may include a target resource module configured to derive and store a target resource allocation for each sender from a plurality of senders. Systems may include a cost-calculation engine configured to generate a resource cost estimate for a transmission based on metadata associated with the transmission, and embed the resource cost estimate in the metadata. Systems may also include a resource allocation module configured to allocate digital resources for the transmission based on the metadata. Allocating digital resources for the transmission may reserve the digital resources for the transmission and prevent overloading of the digital resources.

Performing ingress side control through egress side limits on forwarding elements

Some embodiments of the invention provide a novel method of performing network slice-based operations on a data message at a hardware forwarding element (HFE) in a network. For a received data message flow, the method has the HFE identify a network slice associated with the received data message flow. This network slice in some embodiments is associated with a set of operations to be performed on the data message by several network elements, including one or more machines executing on one or more computers in the network. Once the network slice is identified, the method has the HFE process the data message flow based on a rule that applies to data messages associated with the identified slice.

Situation-related prioritization of communication in networks

A method of prioritizing communication in networks on a situation-related basis includes comparing a quantity of incoming communications to a predetermined threshold to determine whether an overload is occurring. The method further includes analyzing content of incoming communications, in response to determining that an overload is occurring, to determine whether the overload is related to a particular situation. The method further includes grouping incoming communications, in response to determining that the overload is related to the particular situation, into prioritized communications and non-prioritized communications. The method further includes transmitting the prioritized communications. The method further includes retaining, without transmitting, the non-prioritized communications in a repository so long as the overload is occurring.