H04L67/1089

Data sharing across decentralized clinical trials using customized data access policies

Methods, systems, and apparatus, including computer-readable media, for a hierarchical multi-tenant data access platforms. In some implementations, the a server system stores data collected through a multi-tenant data access platform configured to collect data for each of multiple tenant organizations and to selectively make the collected data available according to policies associated with the respective tenant organizations. The server system receives a request associated with a user, and the server system generates and provides a response according to the organization hierarchy data and policy data for the unit of the organization that has data that would be used in generating the response to the request.

SYSTEMS AND METHODS FOR PROVIDING DISCOVERY AND HIERARCHICAL MANAGEMENT OF DISTRIBUTED MULTI-ACCESS EDGE COMPUTING
20210297485 · 2021-09-23 ·

A device may store first data structures that include first data identifying computing resources provided at an edge of a network for a computing environment. The device may store second data structures that include second data identifying aggregations of portions of the first data, and may store a third data structure that includes third data identifying an aggregation of the second data. The device may receive, from a first client device, client data identifying an address and resources associated with the first client device, and may update a first data structure based on the client data. The device may update a second data structure based on updating the first data structure, and may update the third data structure based on updating the second data structure. The device may provide a notification indicating that the first client device has been added as a computing resource for the computing environment.

POLICY CONSTRAINT FRAMEWORK FOR AN SDDC

Some embodiments of the invention provide a method for processing requests for performing operations on resources in a software defined datacenter (SDDC). The resources are software-defined (SD) resources in some embodiments. The method initially receives a request to perform an operation with respect to a first resource in the SDDC. The method identifies a policy that matches (i.e., is applicable to) the received request for the first resource by comparing a set of attributes of the request with sets of attributes of a set of policies that place constraints on operations specified for resources. In some embodiments, several sets of attributes for several policies can be expressed for resources at different hierarchal resource levels of the SDDC. The method rejects the received request when the identified policy specifies that the requested operation violates a constraint on operations specified for the first resource.

PROVIDING SELECTIVE PEER-TO-PEER MONITORING USING MBEANS
20210168015 · 2021-06-03 · ·

Providing selective peer-to-peer monitoring using MBeans by providing a federation of peer-to-peer network servers based on the MBeans, and enabling each of the peer-to-peer networks servers to selectively monitor data associated with at least a subset of the peer-to-peer network servers using at least one of the MBeans.

Method, System, and Computer Program Product for Maintaining Data Centers
20210157689 · 2021-05-27 ·

A method, system, and computer program product for maintaining data centers obtain input data; communicate an update request associated with the input data to a node of a plurality of nodes; receive an indication that the update request failed; communicate a result request for result data associated with processing of the input data to the node of the plurality of nodes until the result data associated with processing of the input data is received; and in response to receiving the result data associated with processing of the input data from the node, process the result data.

FOG COMPUTING SYSTEMS AND METHODS

Fog computing systems are provided comprising edge-nodes and middle-nodes between edge-nodes and cloud-node. These nodes form a hierarchical structure with each cloud, middle node having children nodes, and each middle, edge node having a parent-node. Each edge-node receives data from sensors, assigns reception-timestamp to each data indicating when data has been received to produce series of timestamp-ordered data, trains local model through machine-learning based on said series of timestamp-ordered data, and sends said series to parent-node of the edge-node. Each middle-node collects series of timestamp-ordered data from children nodes of the middle-node, trains supra-local model through machine-learning based on said collected series of timestamp-ordered data, and sends said collected series to parent-node of the middle-node. Parent-children structures, edge-nodes and middle-nodes for such fog computing systems are also provided. Methods and computer programs of operation of an edge-node, and methods and computer programs of operation of a middle-node are also provided.

HIERARCHY AWARE GRAPH REPRESENTATION LEARNING
20230410131 · 2023-12-21 ·

A method includes executing operations to generate a first enhancement function based on a parent-child link in a content hierarchy including a link between a parent node in a first level of the content hierarchy to a child node in a second level of the content hierarchy below the first level. A second enhancement function is generated based on a sibling link in the content hierarchy including a link between a sibling node in a third level of the content hierarchy and a sibling node in the third level of the content hierarchy sharing a common parent node with the first sibling node in a fourth level of the content hierarchy above the third level. A user content consumption metric is generated based on the first and second enhancement functions. A content list including a set of candidate content items ranked based on the user content consumption metric is generated.

Method and terminal for sharing content

A content sharing method includes: selecting, by a content sharing terminal, content; transmitting, by the content sharing terminal, identification information of the selected content to an external device; and reproducing, by the content sharing terminal, the selected content while the external device is reproducing the selected content based on the identification information.

Lightweight Secure Autonomic Control Plane
20210075773 · 2021-03-11 ·

A network device includes a transmitter and a receiver to establish a secure connection with one or more network nodes as part of a Autonomic Control Plane (ACP) network. The network device also includes a processor coupled to the transmitter and receiver. The processor receives a request from an application to initiate a connection with a destination network node. The processor also receives packets from the application for transmission toward the destination network node. When the packets from the application are unencrypted, the processor end-to-end encrypts the unencrypted packets without notifying the application. The transmitter then transmits the encrypted packets towards the destination network node across the ACP network.

Peer based distribution of edge applications

According to some embodiments, system and methods are provided, comprising providing an application module; receiving a request from at least one master agent for application content at the application module, wherein the application content is for execution at one or more assets; executing the application module to determine the distribution of the application content to at least one node located in each of the one or more assets, wherein execution of the application module further comprises: determining an origin of the request and a requesting hierarchy associated with the request; exchanging metadata associated with the requesting hierarchy and metadata associated with the requested application content; determining whether to distribute the application content based on an analysis of the exchanged metadata; distributing the application content to the at least one node located in the asset based on the analysis; and generating an operating response of the asset based on the distributed application content. Numerous other aspects are provided.