H04L41/0846

System and method for programming pluggable transceivers
11537805 · 2022-12-27 · ·

Systems and methods for programming pluggable transceivers are provided. In an embodiment, a method includes receiving RFID data from an RFID device in proximity to a network transceiver via an RFID antenna in the network transceiver, said RFID data defining an operating configuration of the network transceiver; and programming the network transceiver according to the operating configuration defined by the received RFID data. In an embodiment, a network transceiver includes: a host interface for connecting to a host; a network interface for transmitting and receiving signals to and from a network; an RFID antenna for receiving RFID data; and a controller in operative communication with the network interface and the RFID antenna, said controller operating the network interface according to an operating configuration, wherein the operating configuration of the controller is programmed using the RFID data received via the RFID antenna. Various other embodiments are also provided.

Associating and controlling security devices
11538317 · 2022-12-27 · ·

This application is directed to systems and techniques for configuring audio/video devices in a geographical area. For instance, a graphical user interface (GUI) may include a representation of the area as well as representations of devices installed in the area. Using the GUI, a user may associate devices to copy device settings and/or preferences from one device to another. For example, a newly-installed device can be provisioned and/or configured using data from another, previously-installed device.

METHOD AND APPARATUS FOR UPDATING INSTANCE CONFIGURATION, DEVICE, STORAGE MEDIUM, AND PROGRAM PRODUCT
20220407771 · 2022-12-22 ·

A method and apparatus for updating an instance configuration, and a computer program product are provided. The method includes: determining, for a plurality of servers included in a node, a representative server based on consistent hash; determining, for a plurality of instances running on the servers, a representative-of-server instance based on the consistent hash, and determining the representative-of-server instance of the representative server as a representative-of-node instance; delivering a first control parameter to a common server instance, where the first control parameter is used for instructing to initiate a configuration updating request only to a representative-of-server instance of a same server; and delivering a second control parameter to the representative-of-server instance, where the second control parameter is used for instructing to initiate a configuration updating request only to the representative-of-node instance.

Electronic system for dynamic processing of temporal upstream data and downstream data in communication networks

Embodiments of the invention are directed to systems, methods, and computer program products for dynamic processing of temporal upstream data and downstream data in communication networks. The invention is configured for dynamic processing and cascading of instance data and configuration files from edge node devices of a distributed network for reduction of latency in data transmissions. The invention involves constructing a first device cluster comprising one or more first cluster edge computing nodes of a plurality of edge computing nodes. In response to receiving a first downstream request for determining a current modification to the first source instance data, embodiments of the invention involves extracting at least one cluster configuration file associated with the at least one cluster edge computing node associated with first edge computing node, and processing the first technology application therewith.

MOBILE DEVICE MANAGEMENT METHOD AND DEVICE
20220385531 · 2022-12-01 ·

A mobile device management method includes: a first electronic device sends a request message including an identifier of at least one second electronic device to a first server. The first electronic device receives a DM service APP from the first server and installs the DM service APP. After the DM service APP is installed, the first electronic device can provide the MDM service. The first electronic device provides the MDM service for the second electronic device, to implement management and device system upgrade of the second electronic device.

COMMUNICATION APPARATUS, CONTROL METHOD OF COMMUNICATION APPARATUS, AND STORAGE MEDIUM STORING PROGRAM
20220386121 · 2022-12-01 ·

If an authentication type parameter included in a communication setting stored in a storage unit indicates that the WPA and WPA2 standards and the WPA3 standard upward compatible therewith are supported, a communication apparatus replaces the authentication type parameter with an authentication type parameter indicating that the WPA3 standard is not supported and the WPA and WPA2 standards are supported, and outputs the communication apparatus including the replaced authentication type parameter.

CONSENSUS BASED DETERMINATION OF STABLE CONFIGURATION
20230058542 · 2023-02-23 ·

When a configuration is generated in a distributed computing system, a first group of nodes is selected for validating the configuration and the configuration is deployed on the first group of nodes. When the first nodes in the group of nodes validate the configuration, the nodes sign the configuration with a signature. When a subsequent node is to implement the configuration, the subsequent node validates the signature on the configuration to ensure that the nodes in the first group of nodes validated the configuration. If the signature is validated, the subsequent node deploys the configuration.

NETWORK PROTOCOL FOR COMMUINCATION AMONG LIGHTING AND OTHER DEVICES
20230057962 · 2023-02-23 ·

A protocol for controlling lighting devices within a network enables bidirectional communication between different connected devices, any of which may function as a server, a device, a broker, or multiple of these roles. Upon initialization of the network, a server device requests a basic configuration data file from each device on the network and, thereafter, requests a more extensive configuration data file identifying capabilities and functionalities of the device which the manufacturer has made discoverable. Each device sends its basic configuration file to the server device upon any of power on, reboot, reset, hardware configuration change, or software change to the respective device. A device on the network can also be a collection of sub-devices each of which may be separately identified, and their respective capabilities evaluated, so that the server can separately control either the device or any of the individual sub-devices.

Managing containers across multiple operating systems

Aspects of the disclosure provide for mechanisms for managing containers across operating systems in a computer system. A method of the disclosure includes: running a first container corresponding to a first operating system, wherein the first container is created in view of a container image; receiving a user request to switch from the first operating system to a second operating system; in response to receiving the user request, switching, by a processing device, from the first container to a second container corresponding to the second operating system, wherein the second container is created in view of the container image, wherein switching from the first container to the second container comprises: configuring the second container in view of a plurality of configurations of the first container; and running the configured second container.

Migrating networking configurations
11588693 · 2023-02-21 · ·

A method includes receiving, from an agent executing in a virtual machine, network information associated with the virtual machine, the virtual machine to be migrated to a container. The method further includes generating a container networking configuration based on the network information. The container networking configuration is to provide network access to processes migrated from the virtual machine to the container. The method further includes providing the container networking configuration to a container orchestration system. The container orchestration system is to use the container networking configuration to provide network access to the container.