H04L67/566

Seamless connectivity between network functions deployed on edge and in the cloud

Methods are provided for a first proxy service obtaining a request originating from a source network function for a destination network function. These functions are each one of a cloud network function deployed in a cloud network and an edge network function deployed in an on-premises network. The methods further involve providing the request to the destination network function when the request is received from a second proxy service or to the second proxy service when the request is received from the source network function such that the second proxy service provides the request to the destination network function. The first proxy service and the second proxy service are each one of a cloud proxy service deployed in the cloud and configured to communicate with the cloud network function and an edge proxy service deployed at the edge and configured to communicate with the edge network function.

ASYNCHRONOUS WORKFLOW AND TASK API FOR CLOUD BASED PROCESSING
20230164210 · 2023-05-25 · ·

A method, computer program, and computer system are provided for asynchronous media request processing. Based on receiving a first function call requesting performance of a first function corresponding to a resource, a status code is returned, and the first function is performed. Then, after performance of the first function, based on receiving a second function call requesting updating of the resource corresponding to the first function, results of performing the first function are returned. In this manner, a response to the first function call is provided asynchronously based on receiving the second function call.

ASYNCHRONOUS WORKFLOW AND TASK API FOR CLOUD BASED PROCESSING
20230164210 · 2023-05-25 · ·

A method, computer program, and computer system are provided for asynchronous media request processing. Based on receiving a first function call requesting performance of a first function corresponding to a resource, a status code is returned, and the first function is performed. Then, after performance of the first function, based on receiving a second function call requesting updating of the resource corresponding to the first function, results of performing the first function are returned. In this manner, a response to the first function call is provided asynchronously based on receiving the second function call.

Updating Available Features Based on Server Compatibility

A computing device displays a user interface for a data preparation application, including a flow pane that visually represents a data preparation flow and a plurality of icons in a flow element palette. Using a feature/version matrix, the device determines that (i) a first subset of parameterized operations represented by a first subset of icons is not supported by the data preparation server application according to a version number of the data preparation server application and (ii) a second subset of parameterized operations represented by a second subset of icons is supported by the data preparation server application. The device provides a first indication that the parameterized operations represented by the icons in the first subset are unavailable to be inserted into the data preparation flow and displays a visual indication that each of the icons in the second subset is available to be inserted.

Systems and methods for database geocoding

In an embodiment, a system can determine geocoded data from a database of geographic coordinates and metadata. The system correlates metadata, such as invoice data, to geolocation data, such as GPS or cellular data to determine geocoded data. The system further identifies one or more geographic coordinates for one or more location names, which may not have a corresponding metadata entry, by generating clusters of geographic coordinates. The clusters are then matched to one or location names using a matching algorithm. Accordingly, improved geocoded data may be determined.

Systems and methods for database geocoding

In an embodiment, a system can determine geocoded data from a database of geographic coordinates and metadata. The system correlates metadata, such as invoice data, to geolocation data, such as GPS or cellular data to determine geocoded data. The system further identifies one or more geographic coordinates for one or more location names, which may not have a corresponding metadata entry, by generating clusters of geographic coordinates. The clusters are then matched to one or location names using a matching algorithm. Accordingly, improved geocoded data may be determined.

NANON Support for Antivirus Jobs in Clustered Storage
20220329607 · 2022-10-13 ·

Techniques can be implemented to provide for antivirus scanning in clustered storage where not all nodes of the cluster are connected to an antivirus server. A first computing node of computing nodes of a computing cluster can determine a status of an antivirus server. The first computing node can send a first indication of the status of the antivirus server to a group management protocol service of the computing cluster. The group management protocol service can send a second indication of whether the first computing node is available for antivirus scanning to a job engine of the computing cluster. The job engine can distribute an antivirus job among the computing nodes based on whether the first computing node is available for the antivirus scanning

SECURING APPLICATIONS THROUGH SIMILARITY-BASED RISK ASSESSMENT

Systems, methods, and computer media are described for user risk assessment using similarity analysis. Records of transactions performed by a user while in previous enhanced application access sessions can be evaluated against records of transactions performed by other users in previous sessions. The more similar a user is to other users, the more likely it is the user was acting in a typical manner, and the less likely the user poses a security risk. A similarity analysis can be performed using a bipartite graph linking a group of users and a group of application transactions. By examining an edge between a user and a performed transaction, other edges (and corresponding other users) can be identified that also performed the transaction. A similarity score can be calculated based on the bipartite graph and can be used to determine a risk classification and allow or deny an enhanced application access session request.

SYSTEM AND METHOD FOR CONTENT RECOGNITION AND DATA CATEGORIZATION
20230111437 · 2023-04-13 ·

A system and method for decentralizing data and determining performance of different entities in multiple geographical and categorical markets whereby the system may determine complimentary entities to a user's entities or other existing entities for presentation to the user of overlapping procurements and demographics to gather a deeper understanding into the same results yielded by their competition whereby users will be able to provide more personal experiences for each consumer, as well as achieve pricing discovery, greater brand awareness, and marketing strategy.

ADAPTIVE INTELLIGENT SYSTEMS LAYER THAT PROVISIONS AVAILABLE COMPUTING RESOURCES IN INDUSTRIAL INTERNET OF THINGS SYSTEM

A platform for facilitating development of intelligence in an Industrial Internet of Things (IIoT) system generally includes a plurality of distinct data-handling layers comprising an industrial monitoring systems layer that collects data from or about a plurality of industrial entities in the IIoT system; an industrial entity-oriented data storage systems layer that stores the data collected by the industrial monitoring systems layer; an adaptive intelligent systems layer that provisions available computing resources within the platform; and an industrial management application platform layer that manages the platform in a common application environment.