H04L29/14

Distributed workload reassignment following communication failure

A generation identifier is employed with various systems and methods in order to identify situations where a workload has been reassigned to a new node and where a workload is still being processed by an old node during a failure between nodes. A master node may assign a workload to a worker node. The worker node sends a request to access target data. The request may be associated with a generation identifier and workload identifier that identifies the node and workload. At some point, a failure occurs between the master node and worker node. The master node reassigns the workload to another worker node. The new worker node accesses the target data with a different generation identifier, indicating to the storage system that the workload has been reassigned. The old worker node receives an indication from the storage system that the workload has been reassigned and stops processing the workload.

Scalable, live transcoding with support for adaptive streaming and failover

A system and method for a live streaming platform that can redundantly process input streams in parallel ingestion pipelines is disclosed herein. Ingested input streams in the parallel pipelines can be segmented using a segmentation function that creates identical segments in each of the streams in the pipelines. If errors occur, or there are disruptions in one or more of the input streams or pipelines, the live streaming platform can ensure that segments are identifiable and different parts of the pipelines can join a main stream at different points in time without disruption.

SUPPORTING HITLESS UPGRADE OF CALL PROCESSING NODES IN CLOUD-HOSTED TELEPHONY SYSTEM

A method is provided in which a call agent process that supports one or more Internet Protocol (IP) calls, stores to persistent memory a set of data associated with the one or more IP calls. An outage is detected affecting the one or more IP calls. Using the data retrieved from the persistent memory, the one or more IP calls are resynthesized using a device simulator process to simulate connectivity with endpoints that were participating in the one or more IP calls prior to the outage. After resynthesizing, depending on activity detected from devices associated with the one or more IP calls, the one or more IP calls are internally re-stitched/re-establishing (without signaling to endpoints) with the endpoints involved in the one or more IP calls, or the one or more calls are fully re-stitched/re-established by signaling an endpoint that was participating in the one or more IP calls.

Connectivity analysis and a mass storage system capable of connectivity analysis
09838475 · 2017-12-05 · ·

A mass storage system obtains an hierarchical cluster mapping information; Host port state information, which is indicative of a state of at least one host port, is received from an intermediate device of a network that couples hosts to the mass storage system; The mass storage system estimates a state of an entity, which may be one or more host computers or a cluster of host computers. The estimating is based on the hierarchical cluster mapping information and the host port state information. The mass storage system determines whether to generate an alert, in response to the estimated state of the at least one entity. If it is determined to generate an alert then an alert is generated.

Semi-automatic failover

Semi-automatic failover includes automatic failover by a service provider as well as self-serviced failover by a service consumer. A signal can be afforded by a service provider based on analysis of an incident that affects the service provider. Initiation of self-serviced failover by a service consumer can be predicated on the signal. In one instance, the signal provides information that aids a decision of whether or not to failover. In another instance, the signal can grant or deny permission to perform a self-serviced failover.

Cookies and anti-ad blocker using deep links in mobile apps
09838458 · 2017-12-05 ·

A deep link has an app identifier that specifies the app in an app store. It also has an address of an instance of the app on a device. Deep links can bypass an ad blocker. A first instance on a first device cannot get ads from an ad server, because the ads have links with domains in a blacklist. A second device gets a deep link with the address of the first device. The second device runs an instance that gets an ad and rewrites links to point to the second device. The ad goes to the first app instance. The ad blocker finds no bad links and lets the ad appear on the first device. If the user picks a link, a message goes to the second device, to relay to the ad server.

System and method for cluster management based on HPC architecture

Cluster management software comprises a plurality of cluster agents, with each cluster agent associated with an HPC node including an integrated fabric and the cluster agent operable to determine a status of the associated HPC node. The software further includes a cluster management engine communicably coupled with the plurality of the HPC nodes and operable to execute an HPC job using a dynamically allocated subset of the plurality of HPC nodes based on the determined status of the plurality of HPC nodes.

Alerting service desk users of business services outages

An approach is provided in a service desk detects a current computer resource outage and identifies applications corresponding to the computer resource outage. The service desk uses historical service request entries to match the identified applications to users previously inquiring about the applications and, in turn, sends notifications to the users regarding the computer resource outage.

Wireless client traffic continuity across controller failover and load-balancing

A non-transitory computer readable medium comprising instructions which causes performance of operations comprising: receiving, by a second network coordination device, current state information of a client device, including a transmit counter and a receive counter, from a first network coordination device, wherein the first network coordination device is a primary network coordination device for the client device and the second network coordination device is a standby coordination device for the client device; and responsive to detecting a particular event, the second network coordination device (i) transitioning to be the primary network coordination device for the client device, (ii) incrementing the transmit counter by an offset, and (iii) transmitting a message to the client device including the incremented transmit counter is shown.

Method and system for optimizing CPNS enabler
09807158 · 2017-10-31 · ·

A method and apparatus for optimizing the use of CPNS entities are discussed. According to an embodiment, a method includes receiving, by a CPNS server, a low battery level indication for an operation from a certain one of CPNS entities; requesting, by the CPNS server, battery level information from at least some of the CPNS entities in response to the low battery level indication; determining, by the CPNS server, life expectancy information for each of the at least some of the CPNS entities based on the battery level information; and transmitting, by the CPNS server, a message to at least one CPNS gateway to use one of the at least some of the CPNS entities instead of the certain one of the CPNS entities to perform the operation, based on the life expectancy information.