Patent classifications
H04L67/148
Power contact health assessor apparatus and method
A system includes a dry contact with a first pair of switchable electrodes, a wet contact with a second pair of switchable electrodes, an arc suppressor, and a controller circuit operatively coupled to the arc suppressor and the first and second pairs of switchable electrodes. The controller circuit is configured to detect a failure of the wet contact and determine a stick duration associated with the first pair of switchable electrodes. The stick duration is based on a duration between an instance when a coil of the dry contact is deactivated and an instance of separation of the first pair of switchable electrodes during deactivation of the coil. The controller circuit generates, in-situ and in real-time, health assessment for the first pair of switchable electrodes based on a comparison of the determined stick duration with an average stick duration associated with a window of observation.
Power contact health assessor apparatus and method
A system includes a dry contact with a first pair of switchable electrodes, a wet contact with a second pair of switchable electrodes, an arc suppressor, and a controller circuit operatively coupled to the arc suppressor and the first and second pairs of switchable electrodes. The controller circuit is configured to detect a failure of the wet contact and determine a stick duration associated with the first pair of switchable electrodes. The stick duration is based on a duration between an instance when a coil of the dry contact is deactivated and an instance of separation of the first pair of switchable electrodes during deactivation of the coil. The controller circuit generates, in-situ and in real-time, health assessment for the first pair of switchable electrodes based on a comparison of the determined stick duration with an average stick duration associated with a window of observation.
SYSTEMS AND METHODS FOR PRESERVING MEDIA STREAMS
A computer-implemented method for preserving media streams may include (i) identifying a media stream transmitted by a client device to a server that hosts the media stream for access by additional devices, (ii) detecting that the server is expected to go offline, (iii) sending, in response to detecting that the server is expected to go offline, a message to the client device indicating that the server is expected to go offline, (iv) receiving, at an additional server, a request from the client device to host the media stream, and (v) in response to receiving the request, hosting the media stream at the additional server while ceasing to host the media stream at the server that is expected to go offline. Various other methods, systems, and computer-readable media are also disclosed.
Seamless scaling via proxy replay of session state
A service provider network implements seamless scaling via proxy replay of session state. Upon a trigger, such as a determination to scale a server, a scaled server may be spun up and an identifier of the scaled server provided to a first (existing) server. The first server sends the identification of the second server, and session state information for each of the connections between the first server and the request router, to the request router. For each of the connections, the request router establishes a new connection between the request router and the second (scaled) server, and replays the session state information for the connection to the second server. The request router then routes traffic between each existing client connection (e.g., the same existing client connection which carried traffic delivered to the first server) and the corresponding new connection to the second server.
Seamless scaling via proxy replay of session state
A service provider network implements seamless scaling via proxy replay of session state. Upon a trigger, such as a determination to scale a server, a scaled server may be spun up and an identifier of the scaled server provided to a first (existing) server. The first server sends the identification of the second server, and session state information for each of the connections between the first server and the request router, to the request router. For each of the connections, the request router establishes a new connection between the request router and the second (scaled) server, and replays the session state information for the connection to the second server. The request router then routes traffic between each existing client connection (e.g., the same existing client connection which carried traffic delivered to the first server) and the corresponding new connection to the second server.
Dynamic scheduling for live migration between cloud regions and edge locations
This disclosure describes systems, devices, and techniques for migrating virtualized resources between the main region and edge locations. Live migration enables virtualized resources to remain operational during migration. Edge locations are typically separated from secure data centers via the Internet, a direct connection, or some other intermediate network. Accordingly, to place virtualized resources within an edge location, the virtualized resources must be migrated over a secure communication tunnel that can protect virtualized resource data during transmission over the intermediate network. The secure communication tunnel may have limited data throughput. To efficiently utilize resources of the secure communication tunnel, and to reduce the impact of migrations on virtualized resource operations, virtualized resource migrations may be carefully scheduled in advance. For instance, virtualized resources may be selectively migrated at times-of-day in which they are likely to be relatively idle, or at times when the communication tunnel is predicted to have sufficient bandwidth.
Dynamic scheduling for live migration between cloud regions and edge locations
This disclosure describes systems, devices, and techniques for migrating virtualized resources between the main region and edge locations. Live migration enables virtualized resources to remain operational during migration. Edge locations are typically separated from secure data centers via the Internet, a direct connection, or some other intermediate network. Accordingly, to place virtualized resources within an edge location, the virtualized resources must be migrated over a secure communication tunnel that can protect virtualized resource data during transmission over the intermediate network. The secure communication tunnel may have limited data throughput. To efficiently utilize resources of the secure communication tunnel, and to reduce the impact of migrations on virtualized resource operations, virtualized resource migrations may be carefully scheduled in advance. For instance, virtualized resources may be selectively migrated at times-of-day in which they are likely to be relatively idle, or at times when the communication tunnel is predicted to have sufficient bandwidth.
Migration of network file copy operations between host computing devices
A method of migrating a network file copy (NFC) operation from a first host computing device to a second host computing device includes the steps of: transmitting a first request to the first host computing device to execute the NFC operation, wherein the NFC operation comprises transferring data from a shared datastore to another datastore; after transmitting the first request, selecting the second host computing device to complete the NFC operation in place of the first host computing device, and transmitting a second request to the first host computing device to stop executing the NFC operation; after transmitting the second request, detecting a message indicating that the first host computing device completed the copying of a first portion of the data; and in response to the detection of the message, transmitting a third request to the second host computing device to perform the remainder of the NFC operation.
Context Switch of Database Connections
A solution is proposed for accessing a database by an application client. A corresponding method comprises receiving a connection command for opening a user connection between a user client of the application client and the database from the application client, the connection command comprising an indication of a context of the user client, assigning an application connection between the application client and the database to the user client in response to the connection command, and switching a context of the application connection to the context of the user client.
SYSTEM AND METHOD FOR TRANSMITTING INFORMATION ABOUT TASK TO EXTERNAL DEVICE
A method and a system for an external device with information about a task being performed by a user device are provided. The method includes receiving information about the task being performed by the user device, identifying a plurality of external devices located near a wearable device of a user of the user device, determining a first external device to continuously perform the task from among the plurality of external devices based on the information about the task and characteristics information about the identified external devices, and transmitting the information about the task to the first external device.