Patent classifications
H04L41/5022
Policy-driven client and destination priority
A method and system for policy-driven traffic management in cloud-based multi-tenant systems is disclosed. Each end user device within each tenant is provided policies to specify priority based upon, for example, end-to-end performance, bandwidth or service capacity, service or link availability, or security. Different routes are provided for each policy. An application can request a route to an Internet service according to the policy to be assigned a route.
System and method for utility ranking and funding for cloud storage
Disclosed herein are systems and methods for managing access to data objects in cloud storage. In one aspect, an exemplary method comprises storing, by a processor, a data object in a storage device of a cloud storage service for a duration of time, wherein the data object is accessible to a plurality of user accounts. The method comprises extending the duration of time for retaining the data object on the storage device to a first extended duration when a degree of access of the data object by the plurality of user accounts meets a target threshold value during the duration of time. The method further comprises extending the duration of time for retaining the data object on the storage device to a second extended duration when the degree of access does not meet the target threshold value during the duration of time.
System and method for utility ranking and funding for cloud storage
Disclosed herein are systems and methods for managing access to data objects in cloud storage. In one aspect, an exemplary method comprises storing, by a processor, a data object in a storage device of a cloud storage service for a duration of time, wherein the data object is accessible to a plurality of user accounts. The method comprises extending the duration of time for retaining the data object on the storage device to a first extended duration when a degree of access of the data object by the plurality of user accounts meets a target threshold value during the duration of time. The method further comprises extending the duration of time for retaining the data object on the storage device to a second extended duration when the degree of access does not meet the target threshold value during the duration of time.
Dynamically prioritizing users during network congestion
A system may receive an indication that a user device is connecting to a network and determine, based on a profile associated with the user device, that a priority associated with the user device is to be modified when congestion associated with the network reaches a level. The system may send, to a base station, a first request to monitor the congestion associated with the network. The system may receive, from the base station, an indication that the congestion associated with the network has reached the level. The system may send, to the base station, a second request to modify the priority associated with the user device when the congestion associated with the network is at the level.
Dynamically prioritizing users during network congestion
A system may receive an indication that a user device is connecting to a network and determine, based on a profile associated with the user device, that a priority associated with the user device is to be modified when congestion associated with the network reaches a level. The system may send, to a base station, a first request to monitor the congestion associated with the network. The system may receive, from the base station, an indication that the congestion associated with the network has reached the level. The system may send, to the base station, a second request to modify the priority associated with the user device when the congestion associated with the network is at the level.
System and related methods providing channel switching between appliances
A computing system may include a first appliance and a plurality of second appliances connected to different Points of Presence (PoPs). The second appliance may be connected to the first appliance by a plurality of different channels. The first appliance may be configured to establish a virtual connection across the plurality of different channels for data communication through the PoPs, and to switch the different channels between the second appliances without interrupting the virtual connection.
TRAFFIC CONTROL IN A COMMUNICATION NETWORK
An example method of traffic control in a communication network includes the operations of: receiving, by a processing device, a message associated with a communication address of a party originating the message; determining a class of service associated with the communication address; identifying a network resource locator contained in the message; responsive to detecting, in a chain of redirects associated with the network resource locator, an identifier of a related entity represented by one of: a trusted entity or a known bad actor, adjusting the class of service based on the related entity; selecting one or more links having their respective reliabilities corresponding to the adjusted class of service; and forwarding the message via the one or more links.
TRAFFIC CONTROL IN A COMMUNICATION NETWORK
An example method of traffic control in a communication network includes the operations of: receiving, by a processing device, a message associated with a communication address of a party originating the message; determining a class of service associated with the communication address; identifying a network resource locator contained in the message; responsive to detecting, in a chain of redirects associated with the network resource locator, an identifier of a related entity represented by one of: a trusted entity or a known bad actor, adjusting the class of service based on the related entity; selecting one or more links having their respective reliabilities corresponding to the adjusted class of service; and forwarding the message via the one or more links.
Policy declarations for cloud management system
Methods, apparatus, systems and articles of manufacture are disclosed related to policy declarations for cloud management system. An example computer readable storage device includes instructions that, when executed, cause processor circuitry to at least identify a proposed change to a state of a network. The example instructions, when executed, also cause the processor circuitry to, in response to identifying the proposed change, determine whether the proposed change will cause the state of the network to violate a policy, the policy including a query plan describing characteristics to evaluate the proposed change. In some examples, the instructions, when executed, cause the processor circuitry to, when the proposed change will cause the state of the network to violate the policy, execute an application programming interface call to a cloud service provider to cause the cloud service provider to prevent violation of the policy by executing an action associated with the proposed change.
Policy declarations for cloud management system
Methods, apparatus, systems and articles of manufacture are disclosed related to policy declarations for cloud management system. An example computer readable storage device includes instructions that, when executed, cause processor circuitry to at least identify a proposed change to a state of a network. The example instructions, when executed, also cause the processor circuitry to, in response to identifying the proposed change, determine whether the proposed change will cause the state of the network to violate a policy, the policy including a query plan describing characteristics to evaluate the proposed change. In some examples, the instructions, when executed, cause the processor circuitry to, when the proposed change will cause the state of the network to violate the policy, execute an application programming interface call to a cloud service provider to cause the cloud service provider to prevent violation of the policy by executing an action associated with the proposed change.