Patent classifications
H04L67/59
Proxy deployment based upon the actual number of protected virtual machines
In a backup system for a virtual infrastructure, the actual number of virtual machines protected by a backup server is determined for a given instant of time, and is used to calculate the number of virtual proxies required to protect the that actual number of virtual machines, and to deploy automatically the required virtual proxies in the virtual infrastructure.
Proxy deployment based upon the actual number of protected virtual machines
In a backup system for a virtual infrastructure, the actual number of virtual machines protected by a backup server is determined for a given instant of time, and is used to calculate the number of virtual proxies required to protect the that actual number of virtual machines, and to deploy automatically the required virtual proxies in the virtual infrastructure.
Quality of service control in content delivery system
Systems, apparatuses, and methods are described for controlling quality of service (QoS) provided to user devices by, for example, requesting a portion of the user devices to temporarily and selectively downgrade a quality of service. A downgrade message may be sent to the user devices to request a downgrade, and may provide information to allow the user devices to determine whether they will abide by the requested downgrade.
Communication device using virtual access device and transaction applet
An application data exchange technique may include a communication device establishing a communication channel with an access device, receiving an access device profile of the access device, and emulating a virtual access device on the communication device based on the access device profile. The virtual access device executing on the communication device may issue a set of application commands to a transaction applet executing on the communication device, and receive a set of application data responses from the transaction applet in response to the set of application commands. The communication device, may then generate a data packet by concatenating application data contained in the set of application data responses, and transmitting the data packet to the access device via the communication channel.
Notification triggered device management session
Systems and methods for a notification triggered device management session are described. A request for a device management session for a mobile station is received at a device management server. In response to determining that the mobile station is not connected to a cellular network, a home subscriber server is signaled to update a user equipment profile for the mobile station to indicate that the mobile station has a pending device management session. Upon connection of the mobile station to a first network, the mobile station is signaled to connect to the device management server for the device management session using a call session control function. The mobile station is connected with the device management server using the first network. The device management session is run using the first network connection between the mobile station and the device management server.
Framework for computing in radio access network (RAN)
The present disclosure provides embodiments in which computing (e.g., edge computing) is part of base station (BS) capability. These embodiments may enable conducting computing offloading between a user equipment (UE) and BS in the radio access network (RAN), for example, compute in the RAN, and deliver “true” edge computing user experience. Other embodiments may be described and claimed.
Framework for computing in radio access network (RAN)
The present disclosure provides embodiments in which computing (e.g., edge computing) is part of base station (BS) capability. These embodiments may enable conducting computing offloading between a user equipment (UE) and BS in the radio access network (RAN), for example, compute in the RAN, and deliver “true” edge computing user experience. Other embodiments may be described and claimed.
DATA CENTER PROFILING AND CLOUD EMULATION
Disclosed herein are mechanisms and devices for profiling and emulating a data center in a cloud computing environment. A user requests the data center be emulated through a user interface. The user may supply various data center profile parameters detailing specific hardware, software, and operational information about the data center. A date center profiler profiles the data center requesting be emulated in order to uncover real-time processing and storage metrics of the data center. These metrics are used, along with any additional DC profile parameters specified by the user, by a cloud emulator to emulate the data center in the cloud computing environment. An emulated workload is created from the emulation of the data center, and cloud services for operating the data center in the cloud computing environment are detailed in an emulation report that is communicated back to the user.
Remote access to content from a thin client
Remote access is provided to content from a thin client, such as an internet browser, of a communication terminal. A method is provided for accessing at least one piece of content from a thin client of a remote communication terminal, the content being executed by a device for providing access to content on a communication network. The access method includes replication of at least one content replication signal by the thin client. The replication signal that is received by the thin client during a communication session with the content access provider device is produced by an execution module of the content access provider device and relayed unprocessed by a decoy module of the content access provider device. The decoy module is registered with the content access provider device as a virtual replication peripheral.
System and method for improving internet communication by using intermediate nodes
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both. The partition into slices may be overlapping or non-overlapping, and the same slice (or the whole content) may be fetched via multiple tunnel devices.