Patent classifications
H04L67/62
REQUEST HANDLING WITH AUTOMATIC SCHEDULING
Example methods and systems for request handling with automatic scheduling are described. In one example, a computer system may receive, from multiple client devices, respective multiple requests that are generated and sent according to a first set of control parameters. Based on the multiple requests, request characteristic(s) may be monitored to determine whether an automatic scheduling condition is satisfied. In response to determination that the automatic scheduling condition is satisfied, the computer system may assign a second set of control parameters to the respective client devices and instruct the client devices to generate and send respective multiple subsequent requests according to the second set of control parameters to cause a modification of the request characteristic(s).
Piecewise linear, probabilistic, backoff method for retrying message delivery in a cloud-based computing environment
The present disclosure describes methods, systems, and computer program products for retrying message delivery in a network. One computer-implemented method includes determining a retry window (RW) for one or more retry attempts to send a message to a target system, determining a minimum silent interval (MSI) representing the minimum permitted time interval between two successive retry attempts, dividing the RW into one or more time slots of N duration, randomly determining, by a hardware processor, a point-in-time within a time slot starting from the beginning time of the time slot, and sending a message as a retry attempt to the target system at the point-in-time.
Remote management of a user device
There is provided a user device including a transceiver, a processor, and a memory. The memory stores a device management application (DMA) arranged to disable at least one function of the user device in accordance with an operative device policy state of the user device, and a device policy schedule comprising a queue of device policy states each having an associated respective set of policy data. Responsive to receiving, from a remote system via the transceiver, first synchronisation data indicating a first device policy state in the queue of device policy states, the DMA is arranged to update the operative device policy state of the user device to the indicated first device policy state.
Remote management of a user device
There is provided a user device including a transceiver, a processor, and a memory. The memory stores a device management application (DMA) arranged to disable at least one function of the user device in accordance with an operative device policy state of the user device, and a device policy schedule comprising a queue of device policy states each having an associated respective set of policy data. Responsive to receiving, from a remote system via the transceiver, first synchronisation data indicating a first device policy state in the queue of device policy states, the DMA is arranged to update the operative device policy state of the user device to the indicated first device policy state.
Coalescing Notifications Associated with Interactive Digital Content
The technology described herein is capable of generating and presenting graphical user interfaces for displaying shared content, configuring space objects (also simply called spaces), posting digital content items to various spaces, inviting other users to contribute digital content items to various spaces, forking digital content items posted in one space or post object to another space or post object, contextual searching, posting rich comments in association with a post including graphical and textual data, and so forth. Further, the technology may provide suggestive search based on the spaces associated with a user, generate and exchange data with other nodes on a computer network, generate notification data including notifications reflecting updates posted to spaces by various users, and coalesce related comments to reduce number of notifications that each user receives and/or through which a user may have to navigate or scroll through.
Slow Network Detection and Response
A control system determines whether a browser is retrieving supplemental content over a slow or faulty network using a tracking indicator. Based on determining that browser is retrieving supplemental content over a slow or faulty network, the control system modifies responses to opportunities to provide supplemental content to the browser. The control system may modify responses by declining to bid, responding with a lower bid amount, or responding with alternate supplemental content. Based on determining that browser is no longer retrieving supplemental content over a slow or faulty network, the control system modifies responses to opportunities to provide supplemental content to the browser by responding with a higher bid amount or responding with the original supplemental content. Thus, the control system maximizes the use of control system and campaign manager resources by responding to opportunities according to the likelihood that they will result in an impression or a conversion.
Slow Network Detection and Response
A control system determines whether a browser is retrieving supplemental content over a slow or faulty network using a tracking indicator. Based on determining that browser is retrieving supplemental content over a slow or faulty network, the control system modifies responses to opportunities to provide supplemental content to the browser. The control system may modify responses by declining to bid, responding with a lower bid amount, or responding with alternate supplemental content. Based on determining that browser is no longer retrieving supplemental content over a slow or faulty network, the control system modifies responses to opportunities to provide supplemental content to the browser by responding with a higher bid amount or responding with the original supplemental content. Thus, the control system maximizes the use of control system and campaign manager resources by responding to opportunities according to the likelihood that they will result in an impression or a conversion.
Method and system for end-to-end network slicing management service
A method, a device, and a non-transitory storage medium are described in which an end-to-end network slice management service is provided. The service may map application services to network slices based on network profiles, and may generate mapping information. The mapping information may indicate network slice portion-to-application service mappings, and end-to-end mappings between a network slice and the application service. The service may calculate metric values pertaining to networks and associated network slices, and calculate prospective metric values for the networks and network slices based on the metric values. The service may estimate resources allocation values associated with resources to support the prospective metric values based on the prospective metric values and the mapping information. The service may calculate a schedule and assignment of the resources, and provide them to the networks.
SYSTEMS AND METHODS FOR CONTINUOUS CONFIGURATION DEPLOYMENT
Systems and methods are provided for providing continuous configuration deployment. A configuration definition object may be obtained from a remote datastore. The obtained configuration definition object may be stored in a local datastore. The configuration definition object may be obtained and stored in advance of a scheduled maintenance. The configuration definition object may be obtained in response to the configuration definition object being committed to the remote datastore. The configuration definition object may be used to generate different configuration objects. A configuration object may be generated from the configuration definition object and one or more system characteristics. A service request may be received, and the configuration object may be executed to perform a configuration of a computing system.
SYSTEMS AND METHODS FOR CONTINUOUS CONFIGURATION DEPLOYMENT
Systems and methods are provided for providing continuous configuration deployment. A configuration definition object may be obtained from a remote datastore. The obtained configuration definition object may be stored in a local datastore. The configuration definition object may be obtained and stored in advance of a scheduled maintenance. The configuration definition object may be obtained in response to the configuration definition object being committed to the remote datastore. The configuration definition object may be used to generate different configuration objects. A configuration object may be generated from the configuration definition object and one or more system characteristics. A service request may be received, and the configuration object may be executed to perform a configuration of a computing system.