G06F9/45537

Virtual processor interrupt tracking

An apparatus comprises an interrupt distributor to distribute virtual interrupts to one or more physical processors, each virtual interrupt to be handled by one of a plurality of virtual processors mappable to said one or more physical processors; and control circuitry to maintain virtual processor interrupt tracking information corresponding to a given virtual processor. The virtual processor interrupt tracking information includes a pending interrupt record tracking which types of virtual interrupts are pending for the given virtual processor, and separate from the pending interrupt record, a pending interrupt status indication indicating a pending interrupt status for the given virtual processor. The pending interrupt status indicates whether the number of pending virtual interrupts for the given virtual processor is zero.

Dynamic functional partitioning for security pass-through virtual network function (VNF)
11711754 · 2023-07-25 · ·

A network device or system can operate to enable a security pass-through with a user equipment (UE) and further define various virtual functions between a physical access point (pAP) and a virtual AP (vAP) based on one or more communication link parameters (e.g., latency). The security pass-through can be an interface connection that passes through a computer premise equipment (CPE) or wireless residential gateway (GW) without the CPE or GW modifying or affecting the data traffic such as by authentication or security protocol. The SP network device can receive traffic data from a UE through or via the security pass-through from a UE of a community Wi-Fi network at a home, residence, or entity network.

Computer based system for configuring, manufacturing, testing, diagnosing, and resetting target unit equipment and methods of use thereof
11711567 · 2023-07-25 ·

In some embodiments, the present disclosure provides an exemplary method that may include the steps of providing a computing device associated with a plurality of user; receiving output data transmitted from a target unit; analyzing the output data; transmitting a plurality of interaction commands; transmitting the plurality of interaction commands to an application or operating system; determining a plurality of identifying key words; dynamically determining a configuration screen image based on an identification of the plurality of identifying key words associated with the plurality of graphical user interface displays; automatically selecting a configuration setting associated with the plurality of interactive image elements based on the configurations screen image; and executing a plurality of ameliorative actions associated with the configuration setting.

Video Game Overlay

A video server is configured to provide streaming video to players of computer games over a computing network. The video server can provided video of different games to different players simultaneously. This is accomplished by rendering several video streams in parallel using a single GPU (Graphics Processing Unit). The output of the GPU is provided to graphics processing pipelines that are each associated with a specific client/player and are dynamically allocated as needed. A client qualifier may be used to assure that only clients capable of presenting the streaming video to a player at a minimum level of quality receive the video stream. Video frames provided by the video server optionally include overlays added to the output of the GPU. These overlays can include voice data received from another game player.

Content or file based application virtualization using a cache
11709799 · 2023-07-25 · ·

Embodiments provide for application-specific provisioning of files or registry keys. As applications are installed or launched, data is recorded by an application virtualization engine, and an index is created linking the recorded data to both the application and the underlying files or registry keys. As applications are requested (e.g., launched, updated, or the like), the application virtualization engine reveals various copies of file or registry keys to the application on demand or in accordance with a policy.

COMPUTER BASED SYSTEM FOR CONFIGURING, MANUFACTURING, TESTING, DIAGNOSING, AND RESETTING TARGET UNIT EQUIPMENT AND METHODS OF USE THEREOF
20230028513 · 2023-01-26 ·

In some embodiments, the present disclosure provides an exemplary method that may include the steps of providing a computing device associated with a plurality of user; receiving output data transmitted from a target unit; analyzing the output data; transmitting a plurality of interaction commands; transmitting the plurality of interaction commands to an application or operating system; determining a plurality of identifying key words; dynamically determining a configuration screen image based on an identification of the plurality of identifying key words associated with the plurality of graphical user interface displays; automatically selecting a configuration setting associated with the plurality of interactive image elements based on the configurations screen image; and executing a plurality of ameliorative actions associated with the configuration setting.

APPARATUS, METHOD, AND SYSTEM TO DYNAMICALLY DEPLOY WIRELESS INFRASTRUCTURE

CRYSTAL “Cognitive radio you share, trust and access locally” (CRYSTAL) is a virtualized cognitive access point that may provide for combining multiple wireless access applications on a single hardware platform. Radio technologies such as LTE (Long-Term Evolution), WiMax (Worldwide Interoperability for Microwave Access), GSM (Global System for Mobile Communications), and the like can be supported. CRYSTAL platforms can be aggregated and managed as a cloud, which provides a model for access point sharing, control, and management. CRYSTAL may be used for scenarios such as neighborhood spectrum management. CRYSTAL security features allow for home/residential as well as private infrastructure implementations.

Adaptive virtual function drivers for electronic devices

Techniques for providing adaptive virtual function (VF) drivers capable of operating with physical devices having a plurality of different hardware configurations are described. In one embodiment, for example, an apparatus may include logic to implement a virtual machine (VM), the logic to initialize an adaptive virtual function (VF) driver to facilitate communication between the VM and a physical device to be virtualized, establish communication between the adaptive VF driver and a physical function (PF) driver of the hypervisor for the physical device, activate a standard feature set for the adaptive VF driver to execute on a PF of the physical device, and negotiate activation of an advanced feature set for the adaptive VF driver to execute on the PF, the adaptive VF driver to provide the advanced feature set to the PF, the PF activate each feature of the advanced feature set supported by the PF.

Electronic device for executing multiple operating systems and method of controlling same

An electronic device for executing various operating systems is provided. The electronic device includes first and second hardware devices, a first operating system (OS), a second OS different from the first OS, and a processor configured to control the first hardware device to process first data from a first program executed on the first OS, obtain a command for executing the second OS, generate a container for executing the second OS based on a kernel of the first OS in response to the command for executing the second OS, execute the second OS on the generated container, execute a second program on the second OS, obtain second data regarding the second program from the second OS via socket communication by a control application installed on the first OS, and control the second hardware device to process the second data regarding the second program based on the first OS using the installed control application.

Controlling access to external networks by an air-gapped endpoint

A method and system for controlling access to external networks by an air-gapped endpoint is provided. The method includes providing, on the air-gapped endpoint, a plurality of isolated security zones by instantiating a plurality of corresponding virtual machines using a hypervisor; selecting one security zone of the plurality of isolated security zones; and tunneling a traffic from the selected security zone to a designated network location, wherein the tunneling is through a virtual private network (VPN).