H04L47/783

Transaction-enabled systems and methods for resource acquisition for a fleet of machines

The present disclosure describes transaction-enabling systems and methods. A system can include a controller and a fleet of machines, each having at least one of a compute task requirement, a networking task requirement, and an energy consumption task requirement. The controller may include a resource requirement circuit to determine an amount of a resource for each of the machines to service the task requirement for each machine, a forward resource market circuit to access a forward resource market, and a resource distribution circuit to execute an aggregated transaction of the resource on the forward resource market.

Automatic clustering for self-organizing grids

A cluster of nodes, comprising: a plurality of nodes, each having a security policy, and being associated task processing resources; a registration agent configured to register a node and issue a node certificate to the respective node; a communication network configured to communicate certificates to authorize access to computing resources, in accordance with the respective security policy; and a processor configured to automatically dynamically partition the plurality of nodes into subnets, based on at least a distance function of at least one node characteristic, each subnet designating a communication node for communicating control information and task data with other communication nodes, and to communicate control information between each node within the subnet and the communication node of the other subnets.

Systems and methods for cloud-based application access to resources of local hosts by arbitrating access using local host agent applications

Systems and methods which facilitate access to computing resources by cloud-based applications are described. Embodiments enable cloud-based applications to provide output to and/or obtain input from computing resources, such as printers, scales, scanners, and storage devices, for performing various functions. In operation according to embodiments, a user agent client application is executed by computing equipment in communication with a computing resource to which access is to be provided to one or more cloud-based applications. Although embodiments implement a user interface client application which is separate from a user agent client application, tight integration between a user interface client application and user agent client application may be provided. Embodiments not only facilitate operation whereby a cloud-based application is enabled to provide output to and/or obtain input from computing resources, but also facilitate remote and/or shared client interaction with such computing resources.

Systems and methods for cloud-based application access to resources of local hosts by arbitrating access using local host agent applications

Systems and methods which facilitate access to computing resources by cloud-based applications are described. Embodiments enable cloud-based applications to provide output to and/or obtain input from computing resources, such as printers, scales, scanners, and storage devices, for performing various functions. In operation according to embodiments, a user agent client application is executed by computing equipment in communication with a computing resource to which access is to be provided to one or more cloud-based applications. Although embodiments implement a user interface client application which is separate from a user agent client application, tight integration between a user interface client application and user agent client application may be provided. Embodiments not only facilitate operation whereby a cloud-based application is enabled to provide output to and/or obtain input from computing resources, but also facilitate remote and/or shared client interaction with such computing resources.

SYSTEM AND METHOD FOR MANAGING REMOTE ACCESS TO A CLOUD-BASED VIRTUAL COMPUTER NETWORK USING A VIRTUAL JUMPBOX INFRASTRUCTURE
20230231833 · 2023-07-20 ·

System and computer-implemented method for managing remote access to managed components in a cloud-based virtual computer network uses a virtual jumpbox infrastructure to establish a cryptographic network protocol connection between the virtual jumpbox infrastructure and the cloud-based virtual computer network on behalf of an user interface making a request for remote access to the cloud-based virtual computer network. After the cryptographic network protocol connection has been established, communication data between the user interface and a target managed component in the cloud-based virtual computer network is automatically moderated at the virtual jumpbox infrastructure at a data path that is not within the cryptographic network protocol connection. The automatic moderation includes at least one of inserting new information into the communication data and removing existing information from the communication data.

SYSTEM AND METHOD FOR MANAGING REMOTE ACCESS TO A CLOUD-BASED VIRTUAL COMPUTER NETWORK USING A VIRTUAL JUMPBOX INFRASTRUCTURE
20230231833 · 2023-07-20 ·

System and computer-implemented method for managing remote access to managed components in a cloud-based virtual computer network uses a virtual jumpbox infrastructure to establish a cryptographic network protocol connection between the virtual jumpbox infrastructure and the cloud-based virtual computer network on behalf of an user interface making a request for remote access to the cloud-based virtual computer network. After the cryptographic network protocol connection has been established, communication data between the user interface and a target managed component in the cloud-based virtual computer network is automatically moderated at the virtual jumpbox infrastructure at a data path that is not within the cryptographic network protocol connection. The automatic moderation includes at least one of inserting new information into the communication data and removing existing information from the communication data.

Techniques for excess resource utilization
11563693 · 2023-01-24 · ·

Techniques to utilize excess resources in a cloud system, such as by enabling an auxiliary resource utilizer to use resources while they are not needed to support primary resource utilizers, are described herein. Some embodiments are directed to identifying and allocating excess capacity of resources in a cloud system to auxiliary resource utilizers based on one or more policies. In various embodiments, excess resources in one or more of the set of resources in the cloud system, or cloud resources, may be determined based on monitoring utilization of the cloud resources by the primary resource utilizers. In many embodiments, an auxiliary resource utilizer that is in compliance with a set of utilization policies may be identified and the excess resources may be allocated to the auxiliary resource utilizer.

Techniques for excess resource utilization
11563693 · 2023-01-24 · ·

Techniques to utilize excess resources in a cloud system, such as by enabling an auxiliary resource utilizer to use resources while they are not needed to support primary resource utilizers, are described herein. Some embodiments are directed to identifying and allocating excess capacity of resources in a cloud system to auxiliary resource utilizers based on one or more policies. In various embodiments, excess resources in one or more of the set of resources in the cloud system, or cloud resources, may be determined based on monitoring utilization of the cloud resources by the primary resource utilizers. In many embodiments, an auxiliary resource utilizer that is in compliance with a set of utilization policies may be identified and the excess resources may be allocated to the auxiliary resource utilizer.

Methods and apparatus for supporting dynamic network scaling based on learned patterns and sensed data

Methods and apparatus for predicting communications resources which will be needed at a venue and then controlling the amount of available resources dynamically are described. In various embodiments real time or near real time video of areas of the venue are used to predict the number of people in a portion of a venue and/or the direction of movement. Along with other information such as the type of event and/or event schedule collected information is supplied to a set of trained resource requirement models which are used to predict future resource needs at a venue, e.g., while an event is ongoing. Commands are sent to dynamically vary the amount of communications resources provided to one or more portions of the venue. Resources which can be varied included but are not limited to fixed wired WAN bandwidth, WiFi bandwidth, cellular bandwidth, network based on-demand services, transcoding services, firewall services, etc.

Methods and apparatus for supporting dynamic network scaling based on learned patterns and sensed data

Methods and apparatus for predicting communications resources which will be needed at a venue and then controlling the amount of available resources dynamically are described. In various embodiments real time or near real time video of areas of the venue are used to predict the number of people in a portion of a venue and/or the direction of movement. Along with other information such as the type of event and/or event schedule collected information is supplied to a set of trained resource requirement models which are used to predict future resource needs at a venue, e.g., while an event is ongoing. Commands are sent to dynamically vary the amount of communications resources provided to one or more portions of the venue. Resources which can be varied included but are not limited to fixed wired WAN bandwidth, WiFi bandwidth, cellular bandwidth, network based on-demand services, transcoding services, firewall services, etc.