H04L47/828

AVAILABILITY GROUPS OF CLOUD PROVIDER EDGE LOCATIONS

Techniques are described for enabling users of a cloud provider network to discover “availability groups” provided by a cloud provider network and to request the launch of computing resources into selected availability groups. Some cloud provider networks are expanding the definition of traditional “availability zones” to include new types of availability zones representing various types of provider substrate extension edge locations—including, for example, cloud-provider managed substrate extensions associated with separate control planes, 5G-enabled provider substrate extensions connected to communications service provider networks, and the like. Availability groups can be used to represent various defined collections these new types of provider substrate extensions, where each availability group may be defined such that includes a set of provider substrate extensions with a similar set of characteristics and capabilities.

Enhanced selection of cloud architecture profiles

This document describes modeling and simulation techniques to select a cloud architecture profile based on correlations between application workloads and resource utilization. In some aspects, a method includes obtaining infrastructure data specifying utilization of computing resources of an existing computing system. Application workload data specifying tasks performed by one or more applications running on the existing computing system is obtained. One or more models are generated based on the infrastructure data and the application workload data. The model(s) define an impact on utilization of each computing resource in response to changes in workloads of the application(s). A workload is simulated, using the model(s), on a candidate cloud architecture profile that specifies a set of computing resources. A simulated utilization of each computing resource of the candidate cloud architecture profile is determined based on the simulation. An updated cloud architecture profile is generated based on the simulated utilization.

PROVIDING CUSTOMIZED INTEGRATION FLOW TEMPLATES

A method and system are provided for customizing integration flow templates. The method can include can include monitoring user interaction with a plurality of systems external to an integration system to read data changes at the external systems and identifying at least one event pair, wherein each event pair is between two external systems having a same data change event in the two external systems. The identified event pairs are filtered for inclusion in an events chain and the external systems of the filtered event pairs are ordered in the events chain based on timestamps of the data change events. The method outputs integration flow templates based on the ordered external systems of the event pairs that define a flow trigger and at least one flow node.

RESOURCE VIEW FOR LOGGING INFORMATION IN A MODULAR CONTROL SYSTEM

A method may include receiving a request to define a primary resource. The primary resource may enable access to a primary handler that corresponds to a logical entity that controls a device or a port or another resource. The method may include identifying a primary domain object for the primary resource. The primary domain object maps the primary resource to the primary handler. The primary domain object represents a state of the primary resource. The method may include identifying an interface for the primary resource. The interface may be configured to receive a command through a link from a client. The method may include receiving a state request associated with the interface for the primary resource, wherein the primary domain object handler is configured to send a state message indicating the state of the primary resource in response to the request.

Monitoring resource consumption for distributed services

A method for monitoring several data compute nodes (DCNs) on a group of managed host machines is provided. The method receives service usage data from a group of managed hosts. The service usage data identifies service usage for each of a plurality of entities associated with each managed host. The method aggregates the received service usage data. The method displays the aggregated service usage data.

Allocating virtual resource based on block chain
11032215 · 2021-06-08 · ·

A method for allocating a virtual resource based on a blockchain, including: receiving a resource allocation transaction sent by a client, wherein the resource allocation transaction includes a user identifier of a target user; in response to the resource allocation transaction, invoking verification logic in a smart contract deployed in the blockchain to verify whether a service indicator of the target user within a preset service cycle satisfies a virtual resource allocation condition; and when the service indicator satisfies the virtual resource allocation condition, invoking virtual resource allocation logic in the smart contract to allocate a preset amount of virtual resources to the target user from a virtual resource pool and transfer the preset amount of virtual resources to a blockchain account corresponding to the user identifier, wherein virtual resources in the virtual resource pool are associated with service profits of a service operator corresponding to a service of the target user.

Resource reservation system, setting method, and non-transitory computer readable storage medium
11018987 · 2021-05-25 · ·

A resource reservation system includes an information processing apparatus configured to manage reservation information regarding reservation of a resource, and a first information processing terminal configured to display the reservation information obtained from the information processing apparatus. The first information processing terminal includes first circuitry configured to: obtain resource setting information regarding setting of a second information processing terminal from the information processing apparatus; and implement a function of an in-terminal server that communicates as a server with the second information processing terminal. The second information processing terminal includes browser software that when executed by second circuitry of the second information processing terminal causes the second circuitry to: obtain a setting file generated from the resource setting information from the first information processing terminal, when the second information processing terminal communicates with the in-terminal server; and set the setting file in the second information processing terminal.

METHOD TO SUPPORT REDUNDANCY SWITCHING OF VIRTUAL MAC CORES

Systems and methods to support switching of virtual cores.

USING EDGE-OPTIMIZED COMPUTE INSTANCES TO EXECUTE USER WORKLOADS AT PROVIDER SUBSTRATE EXTENSIONS

Techniques are described for enabling users of a service provider network to create and configure “application profiles” that include parameters related to execution of user workloads at provider substrate extensions. Once an application profile is created, users can request the deployment of user workloads to provider substrate extensions by requesting instance launches based on a defined application profile. The service provider network can then automate the launch and placement of the user's workload at one or more provider substrate extensions using edge-optimized compute instances (e.g., compute instances tailored for execution within provider substrate extension environments). In some embodiments, once such edge-optimized instances are deployed, the service provider network can manage the auto-resizing of the instances in terms of various types of computing resources devoted to the instances, manage the lifecycle of instances to ensure maximum capacity availability at provider substrate extension locations, and perform other instance management processes.

SYSTEMS AND METHODS FOR DYNAMIC ADJUSTMENT OF WORKSPACES BASED ON AVAILABLE LOCAL HARDWARE

Systems and methods adjust workspaces based on available hardware resource of an IHS (Information Handling System) by which a user operates a workspace supported by a remote orchestration service. A security context and a productivity context of the IHS are determined based on reported context information. A workspace definition for providing access to a managed resource is selected based on the security context and the productivity context. A notification specifies a hardware resource of the IHS that is not used by the workspace definition, such as a microphone or camera that has not been enabled for use by workspaces. A productivity improvement that results from the updated productivity context that includes use of the first hardware resource is determined. Based on the productivity improvement, an updated workspace definition is selected that includes use of the first hardware resource in providing access to the managed resource via the IHS.