G06F9/4862

Task delegation and cooperation for automated assistants

Task delegation and cooperation for automated assistants is presented. A method comprises receiving, at a centralized support center that is in contact with a plurality of automated assistants including a first automated assistant and a second automated assistant, a request to perform a task on behalf of an individual, formulating, at the centralized support center, the task as a plurality of sub-tasks including a first sub-task and a second sub-task, delegating, at the centralized support center, the first sub-task to the first automated assistant, based on a determination at the centralized support center that the first automated assistant is capable of performing the first sub-task, and delegating, at the centralized support center, the second sub-task to the second automated assistant, based on a determination at the centralized support center that the second automated assistant is capable of performing the second sub-task.

Electronic device for securing usable dynamic memory and operating method thereof
11579927 · 2023-02-14 · ·

An electronic device including an application processor and a communication processor. The communication processor including a resource memory, the communication processor configured to monitor an occupancy rate of the resource memory, determine whether the electronic device is in an idle state, forcibly release a network connection, clear the resource memory, and reconnect the network connection.

INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD
20230009759 · 2023-01-12 · ·

One or more information processing apparatuses to process information are provided. The information processing apparatus includes: a division function that divides processing information into a plurality of pieces, under a division condition that designates parallel processing among the information processing apparatuses, the processing information indicating a data processing procedure from a plurality of start points to one or more end points; a determination function that uniquely determines an assignee of each piece of the processing information divided by the division function, as any of the information processing apparatuses; and an execution function that executes a process in the information processing apparatus determined by the determination function.

FRAMEWORK FOR MIGRATING APPLICATIONS ACROSS PUBLIC AND PRIVATE CLOUDS

Discussed herein are techniques for migrating an application from a source cloud environment (SCE) to a target cloud environment (TCE). Responsive to a request received by an application migration service (AMS) to migrate an application executed in a first compute instance in the SCE to a second compute instance in the TCE, the AMS authenticates credentials of a user with respect to the SCE. Upon the credentials being successfully authenticated, the AMS generates a public key and a private key. The public key is transmitted to a service manager that injects the public key in the application executed in the first compute instance and the private key is assigned to a source agent. The source agent obtains one or more artifacts and configuration information that enable execution of the application based on the private key, which are installed by a target agent in the second compute instance in the TCE.

DATA PROCESSING SYSTEM, DATA PROCESSING METHOD, AND DATA PROCESSING PROGRAM
20220405103 · 2022-12-22 · ·

A data processing system comprising: a first information processing device and a second information processing device, the second information processing device including: a second memory; and a second processor coupled to the second memory and the second processor configured to: convert a first identifier included in a first processing request from the first information processing device into a reversibly convertible first conversion identifier in response to receiving the first processing request; transmit the first processing request including the converted first conversion identifier to another information processing system; reconvert, in response to receiving a first execution result of a process corresponding to the first processing request, the first conversion identifier included in the first execution result into the first identifier; and transmit the first execution result including the reconverted first identifier and the first conversion identifier to the first information processing device.

MIGRATION AND CUTOVER BASED ON EVENTS IN A REPLICATION STREAM

A framework for migrating a customer tenancy from a first identity and access management (TAM) system to a second IAM system. A first snapshot of the customer tenancy is obtained from a first data storage. The first snapshot is processed and migrated to the second IAM system. A second snapshot of the customer tenancy is obtained from a second data storage and migrated to the second IAM system. A state of a lock associated with the second data storage is modified, where after a third snapshot of the customer tenancy is obtained from the second data storage and migrated to the second IAM system. Responsive to the third snapshot being migrated, directing a request regarding the customer tenancy to the second IAM system.

Enabling a fog service layer with application to smart transport systems

A fog service layer architecture is disclosed using hierarchical fog node deployment including the co-existence and interactions of the fog node with a cloud node. The architecture also includes a list of functions, capabilities or services that are hosted in each fog node. One or more fog management procedures may be run between fog nodes (or between fogs and the cloud) and may comprise a fog capability discovery procedure, a fog connection verification procedure, and a fog capability status report procedure. In addition, fog nodes may be configured to interact with each other to get particular services using one or more fog service procedures described herein.

Enabling workers to swap between mobile devices
11604675 · 2023-03-14 · ·

A method for identifying a second device by a first device for establishing a communication between the first device and the second device is described here. The method includes receiving, by a processor of a first device, a voice command from a worker in a workplace. In an example, the method comprises pausing, by the processor, a workflow operation executing on the first device. The method further comprises performing, by the processor, a voice recognition to analyze the voice command of the worker. The method includes activating, by the processor, a communication module of the first device based on the voice recognition, to identify a second device in proximity to the first device. The method includes terminating, by the processor, a connection between the first device and the wearable electronic device. Thus, terminating, by the processor, a second connection of the first device with the second device.

NETWORK ARCHITECTURE FOR VIRTUAL MOBILE PHONES
20220338292 · 2022-10-20 ·

Disclosed herein are examples of systems and methods that may provide multiple virtual mobile phones for a user. For example, a back-end enterprise computer network architecture may interact with an application installed on a client device. Using the application, the user may generate multiple virtual mobile phones for different purposes, e.g., a “work” phone and a “personal” phone. The computer network architecture may further allow the user to label data to correspond to the different virtual mobile phones for an efficient storage and retrieval of the data. A back-end session manager may allow the user to seamlessly switch between the different virtual mobiles within a single client device or across multiple client devices.

Electronic Devices, Methods, and Systems for Restricting Non-Essential Services from Foreground Applications
20230208964 · 2023-06-29 ·

An electronic device includes one or more sensors detecting an energy storage level of an energy storage device falling below a predefined threshold. A location detector and a motion detector determine whether the electronic device is positioned at a location trusted by an authorized user or whether the electronic device is being transported by a mode of transport trusted by the authorized user. The one or more processors identify foreground applications operating on the electronic device and non-essential services associated with the foreground applications. The one or more processors restrict the non-essential services from occurring when the energy storage level of the energy storage device is below the predefined threshold unless the electronic device is positioned at the trusted location or is being transported by the trusted mode of transport.