Patent classifications
H04L47/828
Synchronization cache seeding
Synchronization metadata is read from non-volatile storage. The synchronization metadata comprises indications of one or more synchronization targets. A synchronization target is a node of a clustered storage system. A synchronization cache is populated with the synchronization metadata. After populating the synchronization cache with at least a portion of the synchronization metadata, a connection to a network is established. After the connection to the network is established, a connection to a first of the one or more synchronization targets is established.
Method and communication node for allocating and scheduling criteria for wireless resources using DCI signaling
A method and a device in a communication node for wireless communications are disclosed in the present disclosure. The communication node first receives a first signaling; and then receives a first radio signal in K1 slots and receives a second radio signal in K2 slots; the first signaling is used to determine the K1 and the K2; a first TB is used to generate the first radio signal, while a second TB is used to generate the second radio signal, the first TB comprising a positive integer number of bit(s), and the second TB comprising a positive integer number of bit(s); the K1 slots are divided into X1 slot groups, while the K2 slots are divided into X2 slot groups, and positions of the X1 slot groups and the X2 slot groups are interleaved in time domain. The present disclosure can reduce power consumption and improve coverage performance.
SYSTEM FOR EXECUTING DIGITAL RESOURCE TRANSFER USING TRUSTED COMPUTING
Systems, computer program products, and methods are described herein for executing digital resource transfer using trusted computing. The present invention is configured to receive, from a second computing device, an indication that a first computing device has initiated a transfer of a digital resource; determine, using the authentication protocol, that the first computing device is in secure possession of the digital resource; initiate, via the second computing device, a request to receive the digital resource from the first computing device; receive, via the second computing device, an indication that the second computing device has received the digital resource from the first computing device; initiate, via the second computing device, a resource verification protocol on the digital resource; verify, using the resource verification protocol, one or more digital signatures associated with the digital resource; and transmit, via the second computing device, an acknowledgement to the first computing device.
Fallback command in a modular control system
A device may include a memory storing instructions and a processor configured to execute the instructions to receive an instruction from an administration device; identify a link selector in the instruction that corresponds to a resource attribute of a first resource that specifies how a second resource is to be controlled by the first resource; query a database of contracts between resources to determine that the second resource is available to be controlled by the first resource, based on resource contracts associated with the second resource. The processor may be further configured to generate a resource contract between the first resource and the second resource that indicates the second resource is controlled by the first resource and enable the first resource to communicate with the second resource in accordance with the generated resource contract.
SECURE ONBOARDING OF COMPUTING DEVICES USING BLOCKCHAIN
Systems and methods are described for onboarding a new device to a blockchain secured network. A trusted device that is already enrolled on the blockchain can receive information from a new device. The new device can send an onboarding request to a server through a non-blockchain secured Application Programming Interface (“API”). The trusted device can send an onboarding request for the new device through a blockchain secured API. The server can receive the requests and match them. The server can authenticate the two devices and send a request to a blockchain consensus to add the new device to the blockchain with the trusted device as a referral. The blockchain consensus can add the new device to the blockchain and notify the server. The server can notify the new device, and the new device can begin communicating through the blockchain secured API or directly with other devices on the blockchain.
ORCHESTRATING EDGE SERVICE WORKLOADS ACROSS EDGE HIERARCHIES
Computing resources are managed in a computing environment comprising a computing service provider and an edge computing network. The edge computing network comprises computing and storage devices configured to extend computing resources of the computing service provider to remote users of the computing service provider. The edge computing network collects capacity and usage data for computing and network resources at the edge computing network. The capacity and usage data is sent to the computing service provider. Based on the capacity and usage data, the computing service provider, using a cost function, determines a distribution of workloads pertaining to a processing pipeline that has been partitioned into the workloads. The workloads can be executed at the computing service provider or the edge computing network.
AUTOMATED DECISION TECHNIQUES FOR CONTROLLING RESOURCE ACCESS
A durability assessment system may receive a request, from a computing system, for a durability index describing an entity. The durability assessment system may determine the durability index based on information about the resource usage by the entity, such as a resource availability score or a resource allocation score. The durability assessment system may compare the obtained resource availability score and resource allocation score to ranges associated with a set of durability indices. Based on the comparison, the durability assessment system may determine a durability index for the entity. The durability index may indicate an ability of the entity to return accessed resources. In some cases, the durability assessment system may provide the durability index to an allocation computing system that is configured to determine whether to grant access to resources based on the durability index.
Workflows for configuring the ingestion of user data from a service provider network into a data intake and query system
Techniques are described for providing a cloud data collector (CDC) application for managing the generation of infrastructure templates. The CDC application provides graphical user interfaces that enable a user to provide inputs indicating configurations of data to be ingested by the data intake and query system, each configuration including one or more user accounts, in addition to data sources and regions associated with data sources. Using the configurations provided as input to the CDC application, the CDC application generates an infrastructure template that can be used to configure the service provider network to provide the requested security data to the data intake and query system.
Secure onboarding of computing devices using blockchain
Systems and methods are described for onboarding a new device to a blockchain secured network. A trusted device that is already enrolled on the blockchain can receive information from a new device. The new device can send an onboarding request to a server through a non-blockchain secured Application Programming Interface (“API”). The trusted device can send an onboarding request for the new device through a blockchain secured API. The server can receive the requests and match them. The server can authenticate the two devices and send a request to a blockchain consensus to add the new device to the blockchain with the trusted device as a referral. The blockchain consensus can add the new device to the blockchain and notify the server. The server can notify the new device, and the new device can begin communicating through the blockchain secured API or directly with other devices on the blockchain.
SWITCH-BASED WORKLOAD DISTRIBUTION FOR VIRTUALIZED RANS
Aspects of the present disclosure relate to allocating workloads to vRANs via programmable switches at far-edge cloud datacenters. Traditionally, traffic allocation is handled by dedicated servers running load-balancing software. However, rerouting RAN traffic to such servers increases both energy and capital costs, degrades end-to-end performance, and requires additional physical space, all of which are undesirable or even infeasible for a RAN far-edge datacenter. Since switches are located in the path of data traffic, workflow policies can be designed to inspect packet headers of incoming traffic, evaluate real-time network information, determine available vRAN instances, and update the packet headers to steer the incoming traffic for processing. As network conditions change, the workflow policies enable the switch to dynamically redirect workloads to alternative vRANs for processing. As a result, RAN processing efficiency and fault tolerance are improved—even with changing network conditions and spikes in data traffic.