Patent classifications
H04L41/082
METHOD FOR UPDATING APPLICATIONS IN CLOUD ENVIRONMENTS
A method performed by a computer to update a runtime environment of an application of the computer via a communications network, wherein a filesystem of the runtime environment comprises one or more layers, wherein at least one layer of the one or more layers comprises a link layer formed by a plurality of packages and wherein the link layer comprises symbolic links indicative of the packages forming an updated layer. The method comprising receiving, from a user device or from a scheduling unit, a first signal indicative of a command to use the updated layer of the one or more layers, obtaining the updated layer, obtaining packages forming the updated layer, from a local cache or from a shared storage or from an image repository node, and updating the runtime environment by replacing a layer of the one or more layers with the updated layer using the obtained packages.
EFFICIENT UPDATES OF INFORMATION HANDLING SYSTEMS WITH LOCALIZED AGGREGATED TRANSFER AND STORAGE OF UPDATE PACKAGES
A method for managing information handling system updates includes identifying topological groups within a managed domain of information handling system devices and identifying one or more homogeneous subgroups, each of which corresponds to a single device type, within each of the identified topological groups. Device updates may then be performed for the managed domain based on the homogeneous subgroups. All instances of a particular device type within the managed domain are updated by performing subgroup-aware update operations that include transmitting a single update image for the particular device type to each topological group that includes a homogeneous subgroup corresponding to the particular device type. The single update image is then distributed to each instance of the particular device type within the topologic group.
UPGRADE OF NETWORK OBJECTS USING SECURITY ISLANDS
Systems and techniques to upgrade network objects using security islands are described herein. Security islands of node groupings are created based on trust relationships between nodes in an edge network. An upgrade request may be received to upgrade a target edge node in the edge network. Building blocks may be identified for a package installed on the target edge node to be upgraded. A state backup may be stored for the building blocks. An upgrade command and an upgrade payload may be transmitted to the target edge node. The target edge node may be queried to obtain a status of the target edge node. An upgrade action may be determined based on the status and the upgrade action may be executed.
UPGRADE OF NETWORK OBJECTS USING SECURITY ISLANDS
Systems and techniques to upgrade network objects using security islands are described herein. Security islands of node groupings are created based on trust relationships between nodes in an edge network. An upgrade request may be received to upgrade a target edge node in the edge network. Building blocks may be identified for a package installed on the target edge node to be upgraded. A state backup may be stored for the building blocks. An upgrade command and an upgrade payload may be transmitted to the target edge node. The target edge node may be queried to obtain a status of the target edge node. An upgrade action may be determined based on the status and the upgrade action may be executed.
DECENTRALIZED MANAGEMENT OF SOFTWARE CONFIGURATIONS
A peer-to-peer decentralized software configuration manager is described. The peer-to-peer system provides a crowdsourced mechanism to determine and recommend the efficient software configurations. A computer system may subscribe to a ring or group of network connected computers. Once subscribed, the computer system receives a ring data structure that may include one or more software configuration entries. The ring data structure is accessible to each subscribed computer system to the currently installed software configurations and document the relative success or failure of those configurations. The ring data structure may be utilized to identify a more efficient or user friendly software configuration that is currently installed and utilized by a subscribed computer system.
METHOD FOR RECEIVING FIRMWARE AND METHOD FOR TRANSMITTING FIRMWARE
A method includes (a) receiving i-th data among first to n-th data transmitted in a multicast manner from a firmware providing apparatus, (b) acquiring partitioning information thereof, a MAC chaining value, length information, i-th firmware data, and MAC from the i-th data, (c) authenticating the MAC chaining value of the i-th firmware data, the length information, and the i-th firmware data by comparing a MAC of the i-th firmware data with a value computed by a first MAC generation algorithm, which uses the MAC chaining value of the i-th firmware data, the length information, and the i-th firmware data as a relevant input; (d) authenticating the order of the i-th firmware data by using the MAC chaining value of the i-th firmware data and a second MAC generation algorithm; and (e) obtaining the firmware by combining a first to an n-th firmware data obtained by executing (a) to (d).
APPLICATION SERVICE LEVEL EXPECTATION HEALTH AND PERFORMANCE
Techniques are described for monitoring application performance in a computer network. For example, a network management system (NMS) includes a memory storing path data received from a plurality of network devices, the path data reported by each network device of the plurality of network devices for one or more logical paths of a physical interface from the given network device over a wide area network (WAN). Additionally, the NMS may include processing circuitry in communication with the memory and configured to: determine, based on the path data, one or more application health assessments for one or more applications, wherein the one or more application health assessments are associated with one or more application time periods for a site, and in response to determining at least one failure state, output a notification including identification of a root cause of the at least one failure state.
SYSTEMS AND METHODS FOR UPDATING A CONFIGURATION OF AN SD-WAN APPLICATION USING CONNECTIVITY OR USAGE DATA
Systems and methods for updating a configuration of an SD-WAN application using connectivity or usage data include a software-defined wide area network (SD-WAN) application executing on a client device receiving one or more of historic or predictive data relating to connectivity or usage of the client device. The SD-WAN application detects an update condition for the SD-WAN application using the one or more historic or predictive data relating to the connectivity or usage of the client device. The SD-WAN application updates a configuration of the SD-WAN application responsive to detecting the update condition. The SD-WAN application transmits application traffic using the updated configuration.
SYSTEMS AND METHODS FOR UPDATING A CONFIGURATION OF AN SD-WAN APPLICATION USING CONNECTIVITY OR USAGE DATA
Systems and methods for updating a configuration of an SD-WAN application using connectivity or usage data include a software-defined wide area network (SD-WAN) application executing on a client device receiving one or more of historic or predictive data relating to connectivity or usage of the client device. The SD-WAN application detects an update condition for the SD-WAN application using the one or more historic or predictive data relating to the connectivity or usage of the client device. The SD-WAN application updates a configuration of the SD-WAN application responsive to detecting the update condition. The SD-WAN application transmits application traffic using the updated configuration.
Providing and Using Different Update Times for a Resource
Methods, systems, computer-readable media, and apparatuses are described for sending different update times corresponding to a same version of a resource. A computing device may provide a version of a resource in response to requests from a plurality of different devices, and may indicate different update times for the version of the resource. The different update times may be based on times associated with the requests from the plurality of different devices.