Patent classifications
H04L41/0876
System and method for optimizing network topology in a virtual computing environment
A computer network optimization methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are in frequent communication and generating network latency. Provided the feature selection analysis determines that features of the components are not well defined, a similarity analysis of the features is performed. Results of the feature selection methodology are generated, and the components involved in the network traffic latency are reassigned to migrate the latency.
Method and system for automatic configuration of a communications interface for a specialized data network of an aircraft
A method of automatic configuration of a communications interface of an unknown data network, the method comprising connecting an Electronic Flight Bag (EFB) to the unknown data network, attempting to open communication ports, in response to attempting to open communication ports, receiving data from the unknown data network, determining, by a controller module, if the selected communications interface can interpret the received data, and operating the communications interface of the EFB in accordance with the selected communications interface.
INTEGRATED HUB SYSTEMS CONTROL INTERFACES AND CONNECTIONS
Systems, methods, and instrumentalities are disclosed for switching a control scheme to control a set of system modules and/or modular devices of a surgical hub. A surgical hub may determine a first control scheme that is configured to control a set of system modules and/or modular devices. The surgical hub may receive an input from one of the set of modules or a device located in an OR. The surgical hub may make a determination that at least one of a safety status level or an overload status level of the surgical hub is higher than its threshold value. Based on at least the received input and the determination, the surgical hub may determine a second control scheme to be used to control the set of system modules. The surgical hub may send a control program indicating the second control scheme to one or more system modules and/or modular devices.
SCALING FOR SPLIT-NETWORKING DATAPATH
Some embodiments of the invention provide a method for implementing an edge device that handles data traffic between a logical network and an external network. The method monitors resource usage of a node pool that includes multiple nodes that each executes a respective set of pods. Each of the pods is for performing a respective set of data message processing operations for at least one of multiple logical routers. The method determines that a particular node in the node pool has insufficient resources for the particular node's respective set of pods to adequately perform their respective sets of data message processing operations. Based on the determination, the method automatically provides additional resources to the node pool by instantiating at least one additional node in the node pool.
Computer network troubleshooting
- Arjun Mathur ,
- Andrew Ash ,
- Anuraag Bahl ,
- Andy Chen ,
- Aydin Keskin ,
- Christopher Rogers ,
- Anshuman Prasad ,
- Ankit Shankar ,
- Casey Patton ,
- Christopher Wynnyk ,
- Joanna Peller ,
- Jonathan Victor ,
- Mackenzie Bohannon ,
- Mitchell Skiles ,
- Nikhil Taneja ,
- Ryan Norris ,
- Scott Adams ,
- Samuel Sinensky ,
- Sri Krishna Vempati ,
- Thomas Mathew ,
- Vinoo Ganesh ,
- Rahij Ramsharan
A system for troubleshooting network problems is disclosed. A model can use demographic information, network usage information, and network membership information to determine an importance of a problem. The importance of the problem for the user who reported the problem, a number of other users affected by the problem, and the importance of the problem to the other users can be used to determine a priority for resolving the problem. Before and after a work order is executed to resolve the problem, network metrics can be gathered, including aggregate network metrics, and automatically presented in various user interfaces. The analysis of the metrics can be used to update a database of which work orders are assigned in response to which problems.
Apparatus, method, and computer program product for automatic network architecture configuration maintenance
Various embodiments of the present disclosure are directed to automatic network architecture configuration maintenance. A network architecture for a particular organization, user, or other entity, may include various networked devices, any of which may be vulnerable to one or more cyberattacks due to outdated software, hardware, and/or firmware configurations. Embodiments include apparatuses, computer program products, and methods for retrieving an updated device configurations data object, identifying a vulnerable networked device set based at least in part on the updated device configurations data object and a detected networked device set, and generating a device cyber risk score data object set that may be output and/or otherwise provided to one or more systems, devices, or the like. Some example embodiments further include identifying update recommendation(s), generating device cyber risk priority data object(s), and/or providing various combinations of such data for rendering to one or more displays associated with a user.
FAILURE INFLUENCE ESTIMATION APPARATUS, FAILURE INFLUENCE ESTIMATION METHOD AND PROGRAM
A failure effects estimating device includes an input unit that inputs a log and a traffic amount obtained from a communication system when an abnormality occurs, an estimating unit that estimates a failure effects amount in the communication system, on the basis of the log and the traffic amount, and an output unit that outputs the failure effects amount estimated by the estimating unit.
AUTOMATIC CONFIGURING OF VLAN AND OVERLAY LOGICAL SWITCHES FOR CONTAINER SECONDARY INTERFACES
The method of some embodiments allocates a secondary network interface for a pod, which has a primary network interface, in a container network operating on an underlying logical network. The method receives an ND that designates a network segment. The method receives the pod, wherein the pod includes an identifier of the ND. The method then creates a secondary network interface for the pod and connects the secondary network interface to the network segment. In some embodiments, the pods include multiple ND identifiers that each identify a network segment. The method of such embodiments creates multiple secondary network interfaces and attaches the multiple network segments to the multiple secondary network interfaces.
NETWORK SERVICE PLAN DESIGN
A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
Security Techniques for Device Assisted Services
Security techniques for device assisted services are provided. In some embodiments, secure service measurement and/or control execution partition is provided. In some embodiments, implementing a service profile executed at least in part in a secure execution environment of a processor of a communications device for assisting control of the communications device use of a service on a wireless network, in which the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; monitoring use of the service based on the service profile; and verifying the use of the service based on the monitored use of the service.