H04L67/1023

Computing infrastructure for configurable-quality random data

Methods and apparatus for a computing infrastructure for configurable-quality random data are disclosed. A storage medium stores program instructions that when executed on a processor designate some servers of a provider network as members of a pool of producers of random data usable by random data consumers. The instructions, when executed, determine a subset of the pool to be used to supply a collection of random data intended for a random data consumer, and one or more sources of random phenomena to be used to generate the collection of random data. The instructions, when executed, initiate a transmission of the collection of random data directed to the random data consumer.

Computing infrastructure for configurable-quality random data

Methods and apparatus for a computing infrastructure for configurable-quality random data are disclosed. A storage medium stores program instructions that when executed on a processor designate some servers of a provider network as members of a pool of producers of random data usable by random data consumers. The instructions, when executed, determine a subset of the pool to be used to supply a collection of random data intended for a random data consumer, and one or more sources of random phenomena to be used to generate the collection of random data. The instructions, when executed, initiate a transmission of the collection of random data directed to the random data consumer.

LOAD BALANCING METHOD AND RELATED DEVICE
20220318071 · 2022-10-06 ·

A load balancing method and a related device is provided. The method includes: determining topology information of each of a plurality of smallest management units pods in a load balancing cluster to which a first node belongs, where the plurality of pods are distributed on at least two nodes; determining a weight of each of the plurality of pods based on the topology information of each pod; and selecting a target pod from the plurality of pods based on the weight of each pod, where the target pod is configured to process a currently to-be-processed task in the first node. In embodiments of this application, network overheads can be reduced when a task request is allocated.

METHOD AND APPARATUS FOR UPDATING DATA TRANSFER DISTURBANCE IN MULTI-AGENT MULTI-DEVICE ML OPERATIONS
20230156568 · 2023-05-18 ·

A method and apparatus for updating data transfer disturbance in multi-agent multi-device ML operations is described. A wireless device receives, from the first server, restriction information generated based on (i) the location information based on the wireless device, (ii) the residing area information of the wireless device, and/or (iii) the serving network related information. A wireless device checks whether a second server, other than the first server, is available. A wireless device transmits, to the second server, the restriction information generated by the first server.

Deterministic mapping and uniform routing of items to physical resources using hash values

A string, identifying an item to be assigned to a physical resource, is hashed to obtain a numeric hash value. The numeric hash value is downscaled to obtain a bucket identifier that identifies a bucket that will hold the numeric hash value. The bucket is then deterministically mapped to a physical resource so that it can be retrieved without accessing a stored data structure representative of the mapping.

Deterministic mapping and uniform routing of items to physical resources using hash values

A string, identifying an item to be assigned to a physical resource, is hashed to obtain a numeric hash value. The numeric hash value is downscaled to obtain a bucket identifier that identifies a bucket that will hold the numeric hash value. The bucket is then deterministically mapped to a physical resource so that it can be retrieved without accessing a stored data structure representative of the mapping.

Privacy protection for proxy auto-configuration files
11652873 · 2023-05-16 ·

A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.

Privacy protection for proxy auto-configuration files
11652873 · 2023-05-16 ·

A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.

Scalable server-based web scripting with user input

Disclosed are techniques and apparatuses that are configured to receive an indication that a web browsing session executing on an enterprise server needs additional information based on a request for additional information being sent to a client device. The request may include an identifier of the web browsing session and an identifier of an enterprise server that initiated the web browsing session. A globally unique identifier related to the web browsing session and an identifier of the enterprise server is stored in a common data store. The web browsing session may be paused when the web browsing session requests additional information from a client device. The client device may respond with the additional information. The system may provide the identifier of the enterprise server to a load balancing component so the identified web browsing session executing on the enterprise server may continue to be used.

Application discovery in computer networks

A method comprises receiving a list of names of compute resources of an enterprise network, the names of compute resources including at least one name of a virtual machine and at least one name of a host, for each of the list of names: assessing a particular name of the list of names for removable data and removing the removable data to generate a feature for that particular name, for each feature, determining distances based on at least one metric for every other feature, grouping features based on distances, each feature being in only one group, recommending groups of compute resources based on groups of features, each feature of a group of features being associated with a different compute resource, the group of compute resources corresponding to a particular group of features, and providing a report of recommended groups.