Patent classifications
G06F11/3051
INDUSTRIAL AUTOMATION SMART OBJECT PARENT/CHILD DATA COLLECTION PROPAGATION
An industrial integrated development environment (IDE) provides a development framework for designing, programming, and configuring multiple aspects of an industrial automation system using a common design environment and data model. Projects creating using embodiments of the IDE system can be built on an object-based model rather than, or in addition to, a tag-based architecture. To this end, the IDE system can support the use of automation objects that serve as building blocks for this object-based development structure. These automation objects represent corresponding physical industrial assets and have associated programmatic attributes relating to those assets, including data logging and device configuration parameters. Functional relationships between automation objects can be defined to yield object hierarchies, and object attributes can be propagated across objects up and down the hierarchy.
MULTI-DEVICE PROCESSING ACTIVITY ALLOCATION
Allocating processing activities among multiple computing devices can include identifying multiple computing activities of a computer-executable process and, for each computing activity identified, estimating in real time the computing resources needed. The identifying can be in response to detecting a computer-executable instruction executed by one multiple communicatively coupled computing devices, and the computer-executable instruction can be associate with the computer-executable process. A current condition and configuration of each of the computing devices can be determined in real time. For each computing device an effect induced by executing one or more of the plurality of activities can be predicted, the predicting based each computing device's current condition and configuration and performed by a machine learning model trained using data collected from prior real-time processing of example process activities. Based on the predicting, computing activities can be allocated in real time among the computing devices.
Systems, methods, and apparatus for software defined silicon security
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) for software defined silicon security are disclosed. Example apparatus include a trusted agent determiner to (i) determine respective reputation scores associated with a plurality of agents in a mesh network, the plurality of agents associated with a plurality of semiconductor devices, respective ones of the semiconductor devices including circuitry configurable to provide one or more features, and (ii) select, based on the respective reputation scores, a first agent from the plurality of the agents to transmit a request to activate or deactivate at least one of the one or more features. Example apparatus also include an agent interface to, in response to the request, broadcast an activation or deactivation of the least one of the one or more features to the mesh network to cause the trusted agent determiner to update the reputation score of the first agent.
Resource determination based on resource definition data
In one example, a computer implemented method may include retrieving resource definition data corresponding to an endpoint. The resource definition data includes resource type information. Further, an API response may be obtained from the endpoint by querying the endpoint using an API call. Furthermore, the API response may be parsed and a resource model corresponding to the resource definition data may be populated using the parsed API response. The resource model may include resource information and associated metric information correspond to a resource type in the resource type information. Further, a resource and/or metric data associated with the resource may be determined using the populated resource model. The resource may be associated with an application being executed in the endpoint.
Selectively enabling features based on rules
Aspects of the present disclosure involve a system and method for performing operations comprising providing to a client device, a messaging application comprising multiple features; accessing a configuration rule that associates a device property rule with a feature; determining at a first point in time, that a property of the client device matches the device property rule associated with the configuration rule; in response to determining that the property of the client device matches the device property rule associated with the configuration rule, enabling the feature on the client device at the first point in time; receiving an updated property of the client device at a second point in time; and in response to determining that the updated property of the client device fails to match the device property rule associated with the configuration rule at the second point in time, disabling the feature on the client device.
Device telemetry control
Various example embodiments for supporting device telemetry control are presented. Various example embodiments may provide a customer of a device, which is monitoring the device based on device telemetry whereby the device exposes device data of the device based on device telemetry control information of the device such that the data of the device may be accessed by the customer, with control over device telemetry of the device. Various example embodiments may provide a customer, which may access device data of a device based on device telemetry supported by the device, with additional control over access to the device data of the device via device telemetry by providing the customer with control over the device telemetry including enabling the customer to insert customer device telemetry control information into the device telemetry control information of the device that controls device telemetry on the device.
Scalable runtime validation for on-device design rule checks
An apparatus to facilitate scalable runtime validation for on-device design rule checks is disclosed. The apparatus includes a memory to store a contention set, one or more multiplexors, and a validator communicably coupled to the memory. In one implementation, the validator is to: receive design rule information for the one or more multiplexers, the design rule information referencing the contention set; analyze, using the design rule information, a user bitstream against the contention set at a programming time of the apparatus, the user bitstream for programming the one or more multiplexors; and provide an error indication responsive to identifying a match between the user bitstream and the contention set.
Digital twin workflow simulation
Systems, methods and computer program products for simulating workflows and activities of physical assets using digital twin models. User-defined simulations are performed by selectin digital twin components being analyzed during the simulation, concentrating the analysis on the selectively defined components and bypassing components that will not be simulated. Users can design the digital twin simulation using one or more available digital twin models. The model can be the most current digital twin model, a previous version of a model or a hybridized model comprising components or portions from multiple versions of the available digital twins. Users can further customize simulations by selecting components or sections of the digital twin model to selectively bypass during the simulation or provide overriding values for non-simulated portions of the digital twin which can be used as entry criteria inputted into the next simulated section or component of the digital twin, to complete the simulation.
Computerized system for complying with certain critical infrastructure protection requirements
A computerized system for complying with critical infrastructure protection (“CIP”) standards concerning system configuration changes. The system can be used to automatically identify and track changes to computers on the network, improving system security and CIP compliance reporting. In certain embodiments, the system collects system information on servers and workstations using built-in commands. The configuration profiles of these computers/devices can be archived for audit purposes.
GRAPH-BASED IMPACT ANALYSIS OF MISCONFIGURED OR COMPROMISED CLOUD RESOURCES
A graph representation of cloud resources and their relationships is generated and maintained to provide insights into impact of incidents affecting cloud resources on others in the cloud environment. Cloud resource data for the cloud resources are obtained and relationships among the cloud resources are determined. Relationships among the cloud resources are determined based on analysis of configuration data associated with the cloud resources from which relationships among cloud resources of different types can be inferred, and external sources may also be utilized to facilitate identification of relationships. A graph representation of the cloud resources and their determined relationships is built where the cloud resource data are stored in vertices with directed edges between the vertices representing the identified relationships. The graph can be analyzed based on various graph algorithms to analyze impact of misconfigured or compromised resources to identify related cloud resources that are or would be affected.