H04L41/0843

Personalized digital therapeutics to reduce medication side effects

Systems, methods, and devices, including computer-readable media, for reducing medication side effects using digital therapeutics. In some implementations, a system analyzes tracking data, user data, and medication data for various users to determine a degree to which different digital therapeutics program parameters reduce a likelihood or severity of undesired effects of medications. The system generates data that associates the parameters of the digital therapeutics programs with effects of the medications. The system receives data indicating a medication prescribed for a user of a mobile device and, based on the generated data, selects one or more digital therapeutics program parameters to activate or adjust a particular digital therapeutic program to provide interactions to the user.

Customized cloud service
11700188 · 2023-07-11 · ·

Some examples described herein relate to providing a customized cloud service. In an example, Key Service Indicators (KSI) may be received for a cloud service. The Key Service Indicators may be associated with a cloud service template for providing the cloud service. The resources required for providing the cloud service may be identified based on the Key Service Indicators.

Method and system for sizing a cloud desktop fabric

A system and method for a virtual desktop system is disclosed. The system includes a master fabric region including resources for provisioning a desktop. The system includes a plurality of expansion fabric regions. Each of the expansion fabric regions including replicated resources for provisioning the desktop from the master fabric region. The system includes a control plane having a global pool. A client device application operated by a user associated with the global pool accesses a desktop from either the master fabric region or one of the expansion fabric regions. The control plane is operable to add a new expansion fabric region to the plurality of expansion fabric regions or eliminate one of the plurality of expansion fabric regions.

System and method for managing a network device

In general, embodiments described herein relate to methods and systems for automating the configuration of network devices. More specifically, embodiments of the invention relate to using configuration commands that specify protocol-specified relationships in order to generate granular (or specific) filtering rules (also referred to as rules). The rules are subsequently programmed into the network device.

Alarm monitoring system, alarm monitoring method, and program

A warning monitoring system includes: a warning information generation unit configured to receive a warning and a ripple warning generated due to the warning, each including a device name and sent by a device configuring a network, determine respective types of the warning and the ripple warning based on messages included in the warning and the ripple warning, and generate warning information in which the warning and the ripple warning are associated with the types; a network configuration database in which configuration information about the network is accumulated; and an interrelation analysis unit including a prior rule that indicates a generation manner of the ripple warning different depending on the type, and configured to acquire specific connection destination information by searching the network configuration database by using target information defined by the prior rule and the device name as keys, and relate the warning and the ripple warning.

Routing visualization user interface
11695634 · 2023-07-04 · ·

A configuration of a service of a cloud computing system is rendered in a user interface of an electronic display, according to a discovery chain generated by a networking tool using a service discovery function to establish the configuration. The configuration includes one or more of a router, a splitter, and/or a resolver, each having one or more configuration files that are represented as a graphical element within a graphical representation of the one or more of the router, the splitter, and/or the resolver. The configuration further includes data traffic routes between pairs of the configuration files, each being represented in the UI as a line between each pair of configuration files, where each line is rendered in the UI so as to avoid crossing over any graphical element that represents a configuration file.

Management and control across heterogeneous edge devices of a client network using device abstractions

Automatic onboarding, management, and control across heterogeneous edge devices of a client network using device abstractions may be performed (e.g., different types of edge devices manufactured by different vendors). A device onboarding and integration service may emulate, by a first device abstraction, an edge device of a client network, where the edge device is a first type of device. The service emulates, by a second device abstraction, the edge device as a second type of edge device (e.g., from a different vendor/uses a different API). The service updates a state of the first device abstraction based on a state of the edge device. The service then updates a state of the emulating, by a second device abstraction, the edge device as a second type of edge device. The second device abstraction sends its updated state to an application at the client network.

Filtering strategies for subgraph matching on noisy multiplex networks
11695788 · 2023-07-04 · ·

Described is a system for detecting adversarial activities based on detection of activity patterns in a multiplex network. The system detects one or more subnetworks that are matches to a template network of template nodes. The subnetworks are detected by filtering multiplex network nodes according to a filtering criteria that utilizes monotone function properties in the multiplex network. Nodes that do not meet the filtering criteria are eliminated, resulting in a list of candidate nodes in the multiplex network. The one or more subnetworks are formed from the list of candidate nodes. An activity pattern corresponding to a pattern of adversarial activity is identified in the one or more subnetworks. Based on the identified activity pattern, an alert of adversarial activity is generated and transmitted.

MODEL DRIVEN PROCESS FOR AUTOMATED DEPLOYMENT OF DOMAIN 2.0 VIRTUALIZED SERVICES AND APPLICATIONS ON CLOUD INFRASTRUCTURE

A model-driven system automatically deploys a virtualized service, including multiple service components, on a distributed cloud infrastructure. A master service orchestrator causes a cloud platform orchestrator to retrieve a cloud services archive file, extract a cloud resource configuration template and create cloud resources at appropriate data centers as specified. The master service orchestrator also causes a software defined network controller to retrieve the cloud services archive file, to extract a cloud network configuration template and to configure layer 1 through layer 3 virtual network functions and to set up routes between them. Additionally, the master service orchestrator causes an application controller to retrieve the cloud services archive file, to extract a deployment orchestration plan and to configure and start layer 4 through layer 7 application components and bring them to a state of operational readiness.

Detecting configuration anomaly in user configuration

One aspect of the instant application facilitates detection of configuration anomaly. During operation, a system can convert a set of rules associated with configuration syntax information for a feature in a respective feature document to at least a structured regular expression. Then the system generates a set of configuration templates with a respective configuration template including the structured regular expression corresponding to the feature document. The system can select, based on a target configuration associated with the network device, a subset of the configuration templates and can extract, based on a match between the selected configuration templates and the target configuration, a set of features. The system can determine one or more rules associated with the extracted features. Based on the one or more rules the system can determine an anomaly in the target configuration and generate at least one recommended configuration to alleviate the anomaly.