H04L67/1001

Methods and systems for making effective use of system resources

Methods and systems for making effective use of system resources. A plurality of requests for access to a resource are received. Each request has an associated group of features. The group of features for each request is analyzed to collect observations about the plurality of requests. A function to predict an outcome of a subsequent request is generated based on the observations. Resources are allocated to service the subsequent request based on the function.

Methods and systems for making effective use of system resources

Methods and systems for making effective use of system resources. A plurality of requests for access to a resource are received. Each request has an associated group of features. The group of features for each request is analyzed to collect observations about the plurality of requests. A function to predict an outcome of a subsequent request is generated based on the observations. Resources are allocated to service the subsequent request based on the function.

Electronic device allocation and routing

An advisor distribution system may include an advisor management system, which may include various software modules. The advisor management system may allow for a balanced distribution of a plurality of advisors operating a plurality of advisor computing devices into multiple groups based on value of a Mahalanobis Distance between each covariate of the plurality of advisors operating the plurality of advisor computing devices.

Electronic device allocation and routing

An advisor distribution system may include an advisor management system, which may include various software modules. The advisor management system may allow for a balanced distribution of a plurality of advisors operating a plurality of advisor computing devices into multiple groups based on value of a Mahalanobis Distance between each covariate of the plurality of advisors operating the plurality of advisor computing devices.

OPTIMIZED NETWORK DEVICE QUEUE MANAGEMENT FOR HYBRID CLOUD NETWORKING WORKLOADS
20230093884 · 2023-03-30 ·

A network device queue manager receives a request to execute a workload on a node of a cloud computing environment, where the cloud computing environment comprises a plurality of nodes; determines that the workload is to be executed by a dedicated processor resource; identifies a set of one or more shared processor resources associated with the node, wherein each shared processor resource of the set of shared processor resources processes device interrupts; selects a processor resource from the set of one or more shared processor resources to execute the first workload on the first node; bans the selected processor resource from processing device interrupts while executing the workload; and executes the workload with the selected processor resource.

OPTIMIZED NETWORK DEVICE QUEUE MANAGEMENT FOR HYBRID CLOUD NETWORKING WORKLOADS
20230093884 · 2023-03-30 ·

A network device queue manager receives a request to execute a workload on a node of a cloud computing environment, where the cloud computing environment comprises a plurality of nodes; determines that the workload is to be executed by a dedicated processor resource; identifies a set of one or more shared processor resources associated with the node, wherein each shared processor resource of the set of shared processor resources processes device interrupts; selects a processor resource from the set of one or more shared processor resources to execute the first workload on the first node; bans the selected processor resource from processing device interrupts while executing the workload; and executes the workload with the selected processor resource.

Dynamically scalable application firewall deployment for cloud native applications

A configuration of a cloud application exposed via a public IP address is duplicated with modifications to include a private IP address to expose the application internally. The original configuration is updated so that external network traffic sent to the application is redirected to and distributed across agents running on nodes of a cloud cluster by which web application firewalls (WAFs) are implemented. A set of agents for which the respective WAFs should inspect the redirected network traffic are selected based on cluster metrics, such as network and resource utilization metrics. The redirected network traffic targets a port allocated to the agents that is unique to the application, where ports are allocated on a per-application basis so each of the agents can support WAF protection for multiple applications. Network traffic which a WAF allows to pass is directed from the agent to the application via its private IP address.

Service chain based network slicing

A processor may identify one or more sources. The processor may identify a respective requirement of each of the one or more sources. The processor may determine if a respective requirement is different than another respective requirement. The processor may locate each of the one or more sources in a respective slice on a different container available in a server of a network.

Service chain based network slicing

A processor may identify one or more sources. The processor may identify a respective requirement of each of the one or more sources. The processor may determine if a respective requirement is different than another respective requirement. The processor may locate each of the one or more sources in a respective slice on a different container available in a server of a network.

SYSTEMS AND METHODS FOR STREAMING MEDIA CONTENT DURING UNAVAILABILITY OF CONTENT SERVER

Systems and methods are described herein for streaming during unavailability of a content server. Upon determining that there are conditions indicating buffering issues during delivery of a media asset, a server determines a first group of devices suitable for receiving the media asset from the server and sharing the media asset on a peer-to-peer network. Then, the server determines a second group of devices suitable for receiving the media asset on a peer-to-peer network from a first group device. The server then determines groupings within which to share and receive the media asset. Next, the server transmits instructions to the devices in the first group to maintain in buffer and share certain portions of the media asset with the second group devices within their grouping. Finally, the server updates information detailing the media asset portions the devices are maintaining in buffer and sharing.