Patent classifications
H04L67/563
Systems and methods for geofence security
Systems and methods for geofence information delivery are disclosed. A multiplicity of devices constructed and configured in network communication in a region of interest via a peer-to-peer network. The multiplicity of devices store cached geofence information for the region of interest. The multiplicity of devices on the peer-to-peer network are operable to convert between an IP address and a geographic location. Each of the multiplicity of devices is operable to query peer devices on the peer-to-peer network for geofences associated with an IP address or a geographic location. At least one peer device is operable to deliver one or more geofences associated with the IP address to the querying device via zero-configuration networking or web service.
Systems and methods for geofence security
Systems and methods for geofence information delivery are disclosed. A multiplicity of devices constructed and configured in network communication in a region of interest via a peer-to-peer network. The multiplicity of devices store cached geofence information for the region of interest. The multiplicity of devices on the peer-to-peer network are operable to convert between an IP address and a geographic location. Each of the multiplicity of devices is operable to query peer devices on the peer-to-peer network for geofences associated with an IP address or a geographic location. At least one peer device is operable to deliver one or more geofences associated with the IP address to the querying device via zero-configuration networking or web service.
Secure application for accessing web resources
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for providing a remote cloud browsing session. A remote cloud browsing session may receive a request for Internet content from a user device, access the Internet content from an Internet content source, and transmit second Internet content to the user device based on the requested Internet content.
Secure application for accessing web resources
Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for providing a remote cloud browsing session. A remote cloud browsing session may receive a request for Internet content from a user device, access the Internet content from an Internet content source, and transmit second Internet content to the user device based on the requested Internet content.
Managing voice applications within a digital workspace
Disclosed are various embodiments for managing voice-driven application. In one embodiment, among others, a system includes a computing device and program instructions. The program instructions can cause the computing device to initiate a management session between a voice application service and a management service based on receiving a first request from the voice application service. The program instructions can cause the computing device to initiate an application session between a voice-driven application and the management service based at least in part on a second request received from the voice application service. The program instructions can cause the computing device to enforce a compliance policy on a data request for the voice-driven application. The data response can be transmitted to the voice application. The voice application service can provide the data response to the client device for playback.
Managing voice applications within a digital workspace
Disclosed are various embodiments for managing voice-driven application. In one embodiment, among others, a system includes a computing device and program instructions. The program instructions can cause the computing device to initiate a management session between a voice application service and a management service based on receiving a first request from the voice application service. The program instructions can cause the computing device to initiate an application session between a voice-driven application and the management service based at least in part on a second request received from the voice application service. The program instructions can cause the computing device to enforce a compliance policy on a data request for the voice-driven application. The data response can be transmitted to the voice application. The voice application service can provide the data response to the client device for playback.
Dynamic management of network policies between microservices within a service mesh
Systems, methods and/or computer program products optimizing network policies between microservices of a service mesh. The service mesh tracks incoming API calls of applications and based on the historical transactions, the context of API calls, and the microservices in the microservice chain being invoked, network controls and policy configurations are set to optimize the transactions performed by the service mesh. Dimensions of the communications between microservices of the service mesh are dynamically optimized via the service mesh control plane using a policy optimizer. Optimized dimensions of service mesh transactions includes automated policy adjustments to retries between microservices, circuit breaking between microservices, automated timeout adjustments between microservices and intelligent rate limiting between microservices and/or rate limiting applied to user profiles.
Dynamic management of network policies between microservices within a service mesh
Systems, methods and/or computer program products optimizing network policies between microservices of a service mesh. The service mesh tracks incoming API calls of applications and based on the historical transactions, the context of API calls, and the microservices in the microservice chain being invoked, network controls and policy configurations are set to optimize the transactions performed by the service mesh. Dimensions of the communications between microservices of the service mesh are dynamically optimized via the service mesh control plane using a policy optimizer. Optimized dimensions of service mesh transactions includes automated policy adjustments to retries between microservices, circuit breaking between microservices, automated timeout adjustments between microservices and intelligent rate limiting between microservices and/or rate limiting applied to user profiles.
Distributed data stream programming and processing
Techniques are described herein for distributed data stream programming and processing. The techniques include sending a request indicating one or more regions of a program code to access a stream in a stream pool and to execute on a processing node in a processing nodes pool. The techniques also include accessing the stream defined in the one or more regions of the program code to service the request. Thereafter, the processing node is selected to use for execution of the one or more regions of the program code and the processing node executes one or more instances of the one or more regions of the program code.
CDN Optimization Platform
Techniques are disclosed for distributing data in a content delivery network configured to provide edge services using a plurality of service providers. Data indicative of data usage and cost data for the plurality of service providers is accessed. Based on the accessed data, an effective unit cost, multiplex efficiency, and channel utilization are determined for a selected user. A Bayesian optimization algorithm is applied to at least a portion of the accessed data. The content delivery network is configured to redistribute data traffic for the selected user based on a result of the applied Bayesian optimization algorithm.