09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
42 - Services scientifiques, technologiques et industriels, recherche et conception
45 - Services juridiques; services de sécurité; services personnels pour individus
Produits et services
Computers; quantum computers; downloadable electronic
publications namely informational materials; computer
hardware and software for information technology analysis
and data management; computer hardware and software for
application development; computer hardware and software for
cloud computing; computer hardware and software for
cognitive computing; computer hardware and software for
artificial intelligence; computer hardware and software for
blockchain technology; computer hardware and software for
quantum computing and quantum programming; computer
hardware, namely magnetic tape units (data processing),
magnetic tapes (ribbons), printed circuits, integrated
circuits, computer keyboards, compact discs (audio-video),
optical discs, couplers (data processing), floppy disks,
magnetic data carriers; computer hardware, namely video
screens, scanners (data processing equipment), computer
printers, interfaces (data processing), readers (data
processing), computer software (recorded programs) intended
for data processing, microprocessors, modems, monitors
(hardware), computers, computer memories, computer
peripherals; computer adapters; computer components;
equipment for data processing; computer devices for data and
information management; semiconductors; machine-readable
electronic data carriers; magnetic disks; hard disk drives;
magnetic tape recorders; calculating machines; cash
registers; fax machines; video recorders; video tapes;
electric cells and electric batteries; computer chips;
wafers for integrated circuits; computer accessories,
namely, computer communications servers; carrying cases for
computers; computer interface cards; computer cables and
computer cable parts; fax-modem cards for computers;
computer accessories, namely, screen filters, computer mouse
pads, pagers, computer controllers; electrical converters,
namely, digital-to-analog, analog-to-digital and
step-by-step voltage switches; computer mouse; integrated
circuit cards and smart chip cards, integrated circuit
adapters and smart chip card adapters; readers for
integrated circuit cards and smart chip cards;
microcomputers; electrical power appliances; projectors
(projection devices); remote controls for computers;
inverters, surge protectors and uninterruptible power
supplies; point-of-sale terminals (payment terminals);
computer servers; computer storage devices, namely,
high-speed storage subsystems for storing and backing up
electronic data locally or via a telecommunications network;
downloadable computer programs; recorded computer programs;
computer software platforms, recorded or downloadable;
computer software applications, downloadable; video game
software; operating system software and programs; software
for accessing a global computer network; document management
software; database management software; software for
locating, retrieving and receiving text, electronic
documents, graphic artwork and audio-visual information on
internal enterprise-wide computer networks and on local and
wide-area global computer networks; development software and
website design software and user manuals, in electronic
format, sold as a set; computer software for controlling the
operations and execution of computer systems, programs, and
computer networks; computer software for connecting
disparate computer networks and systems, servers and storage
devices; computer programs for connecting computers to each
other and enabling computer activities across a global
computer network; computer software for systems management,
existing software and processes in an information technology
environment; interactive computer systems combining computer
hardware and software for use in data management and
analysis and instruction manuals in electronic format sold
with these products; cloud computing systems, namely
communications networks integrating computer hardware and
software for dynamic provisioning, virtualization and
consumption measurement of computer resources; recorded and
downloadable cloud computing software for deploying and
managing virtual machines on a cloud computing platform;
computer systems, namely computer hardware and computer
software for the development and integration of artificial
intelligence, namely machine learning, deep learning and
natural language processing which are capable of collecting,
organizing and analyze data; computer systems, namely
computer hardware and computer software incorporating
functions of natural language processing, computational
linguistics, information retrieval, machine learning and
capable of understanding general queries formulated by
humans and formulating responses; software for developing,
building and operating blockchain technology applications;
computer hardware and computer software for developing and
testing quantum algorithms; downloadable documentation and
instruction manuals on machine-readable electronic data
carriers relating to computers or computer programs;
downloadable electronic publications; electronic
publications downloadable on computer media, namely user
manuals, guides, brochures, information sheets, written
presentations and teaching materials in the field of
computers, computer networks, computer storage, computer
operating systems, information technology, database
management, cloud computing, artificial intelligence,
blockchain technology and quantum computing; computer
hardware and software for the implementation of generative
artificial Intelligence solutions; computer hardware and
software to help businesses understand the potential of
generative Artificial Intelligence; computer hardware and
software for the management and expansion of Generative
Artificial Intelligence projects for other companies;
computer hardware and software for the integration of
generative Artificial Intelligence into operations. Arranging and placing of advertisements; sales promotion
services (for third parties); business management and
business management consultancy; provision of business
information; distribution of leaflets; distribution of
samples; newspaper subscription services for others;
accounting; reproduction of documents; systematization of
data in a central file; organization of exhibitions for
commercial or advertising purposes; business management
consultancy services and business affairs consultancy
services; commercial business development service; analysis
of market research data and statistics; electronic data
processing; computer data processing services for artificial
intelligence; computer data processing services for
cognitive computing; computer data processing services for
cloud computing; computer data processing services for
blockchain technology; computer data processing services for
information management; computer data processing services
for quantum computing and quantum programming; organising
and conducting trade exhibitions in the field of computers,
IT services, information technology, artificial
intelligence, cloud computing, blockchain technology,
quantum computing, database management and electronic
business transactions through a global computer network;
business advisory services to businesses relating to
artificial intelligence; business consulting services to
companies in the field of computer systems integrating
functions of natural language processing, computational
linguistics, documentary retrieval, machine learning and
capable of understanding general queries formulated by
humans and formulating some answers; business advisory
services to businesses relating to cloud computing; business
advisory services to businesses relating to blockchain
technology; business advisory services to businesses
relating to quantum computing, quantum programming and to
develop and test quantum algorithms; business advisory
services to businesses relating to information technology;
analysis and compilation of commercial data; systematization
of data in computer databases; commercial advice to
businesses on the use of computer equipment (hardware);
business management and consulting services for the
implementation of generative Artificial Intelligence
solutions; market research and analysis services to help
businesses understand the potential of Generative Artificial
Intelligence; advertising and promotion services for
companies offering generative Artificial Intelligence
solutions; business administration services for managing and
expanding Generative Artificial Intelligence projects for
other companies; consulting and advisory services and in the
field of business strategies for the integration of
Generative Artificial Intelligence in operations, and data
retrieval services. Computer programming; software as a service (SaaS) services
featuring data management software; software as a service
(SaaS) services featuring software for cloud computing;
software as a service (SaaS) services featuring software for
artificial intelligence; software as a service (SaaS)
services featuring software for cognitive computing;
software as a service (SaaS) services featuring software for
blockchain technology; software as a service (SaaS) services
featuring software for quantum computing and quantum
programming; software as a service (SaaS) services featuring
software for constructing, analyzing and executing quantum
programs and quantum algorithms; software as a service
(SaaS) services featuring software for developing and
testing quantum algorithms; computer programming and
computer consulting services for artificial intelligence;
computer programming and computer consulting services for
cognitive computing; computer programming and information
management consulting services; computer programming
services and computer consulting for data management;
computer programming and computer consulting services for
cloud computing; computer programming and computer
consulting services for blockchain technology; computer
programming and computer consulting services for quantum
computing; computer programming and IT consulting services
for software as a service (SaaS); design, installation,
updating and maintenance of software; design of computer
software and hardware for others, and professional
consultancy services in the field of computers; technical
support services, namely troubleshooting computer programs
and software; computer services, namely, design, creation
and maintenance of websites on behalf of third parties;
analysis of computer systems, integration of databases and
computer networks, programming of computers for others all
intended for commercial interactions on global computer
networks; design of computer and software interconnection
systems, namely, electronic connection of computers and
software to each other; computer program (software) and
computer hardware (quality control and technical control)
testing services; technical project studies in the field of
computer hardware and software; computer advice relating to
computer hardware, namely advice relating to computer
research and development; computer advice and assistance
relating to the use of the Internet; rental of computers and
software; scientific and industrial research, namely
research and development of new products, biological
research, research in bacteriology, research in chemistry,
research in cosmetology, research in mechanics, geological
research, technological research, pharmaceutical research,
scientific research for medical purposes; information
technology (IT) consulting; computer systems integration
services; consultancy services relating to the design,
selection, implementation and use of computer systems and
software for others; technical support services, namely,
diagnosing computer program problems; computer systems
design services for others; design of computer systems for
the interconnection of computer hardware and software,
namely, electronic interconnection of computers and
software; computer program and hardware testing services,
namely, testing of software, computers and servers to ensure
proper functioning; cloud computing services relating to
computer hardware and software services integrated into a
network for dynamic provisioning, virtualization and
metering of consumption of computer resources; providing
virtual computing systems and virtual computing environments
via cloud computing; design and development of software for
cloud data storage; cloud computing hosting provider
services; electronic data storage; data security service; IT
support services relating to software provided by IT
specialists; design of computer hardware for computer
networks; computer design and development; quantum
computing; consulting services relating to computer and
Internet security and data encryption; scientific research
and development services in the field of generative
Artificial Intelligence technology; technology consulting
services for companies wishing to exploit generative
Artificial Intelligence in their activities; software
development services for the creation and customization of
generative Artificial Intelligence solutions; technical
project planning and implementation services for companies
developing their capabilities in generative artificial
intelligence; design and development of computer hardware
and software for generative artificial intelligence
applications; IT services for monitoring and detecting
potential legal issues or security threats related to the
use of Generative Artificial Intelligence. Licensing and compliance services for companies offering
Generative Artificial Intelligence solutions, in compliance
with legal requirements.
A quantum computing device initiates a first quantum algorithm comprising a test method implemented as a quantum oracle, the first quantum algorithm receiving an input of a first quantum register comprising one or more qubits and a second quantum register comprising one qubit, each qubit in the first quantum register corresponding to a test case for the test method. The quantum computing device receives an output of the first quantum algorithm. The quantum computing device initiates a second quantum algorithm, the second quantum algorithm receiving an input of a third quantum register and the output of the first quantum algorithm. The quantum computing device performs a measurement on the first quantum register and a measurement on the third quantum register. The quantum computing device determines, based on the measurement on the first quantum register and the measurement on the third quantum register, that the test method passed or failed.
Systems and methods for managing a set of service versions by utilizing a parent operator with a set of child operators that each provide functionality corresponding to the incremental capability of a corresponding service version are disclosed. A processing device determines a lowest service version among a plurality of different service versions and generates a parent operator based on the lowest service version. For each subsequent service version of the plurality of service versions: an incremental capability of the subsequent service version is determined and a corresponding child operator is generated based on the incremental capability. The corresponding child operator includes logic and code paths corresponding to the incremental capability. Upon receiving a request identifying a particular subsequent service version, a first child operator corresponding to the particular subsequent service version is identified. The first child operator is integrated into the parent operator to respond to the request.
Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
B60R 25/01 - Équipements ou systèmes pour empêcher ou signaler l’usage non autorisé ou le vol de véhicules agissant sur des systèmes ou des équipements de véhicules, p. ex. sur les portes, les sièges ou les pare-brises
B60R 25/33 - Détection relative au vol ou autres événements relatifs aux systèmes antivol de la géo-localisation, p. ex. en fournissant les coordonnées de géo-localisation (GPS)
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
5.
KERNEL PRESENTATION OF CAMERA IMAGERY DURING THE KERNEL BOOT PROCESS
A kernel of an operating system executing on a computing device is notified that the kernel is to provide network packets received by the kernel via a network interface to an eBPF program executing in an eBPF environment of the kernel. The eBPF program receives, from the kernel, a camera network packet originating from a camera. The eBPF program causes information derived from the camera network packet to be copied to an image buffer of a display device driver for presentation on a display device.
Execution of software applications can be controlled based on application profiles to facilitate safety compliance. For example, a system can execute a test suite to identify a function call of a software application that is associated with a functional safety standard issued by a standard-setting organization. In response to identifying the function call, the system can generate a risk score for the function call. The risk score can indicate a likelihood of the function call causing non-compliance with the functional safety standard. The system can further generate an application profile including a permission for the software application based on the risk score. The permission may disable the function call of the software application. The system may then execute the software application based on the application profile. As a result, execution of the software application can comply with the functional safety standard.
G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A computing device receives a container image from a container registry, the container image comprising a plurality of layers. The computing device extracts, from the container image, a plurality of files into a filesystem of the computing device, each file of the plurality of files corresponding to one of the layers of the plurality of layers. The computing device generates a metadata file that describes a directory structure of the plurality of files in the filesystem. The computing device mounts the metadata file to a location in the filesystem, wherein mounting the metadata file causes a digest of the metadata file to be generated and the metadata file and the plurality of files in the filesystem to be read-only.
Tracing data including a plurality of traces for a plurality of operations performed by a distributed computing system on behalf of a plurality of users of a distributed computing system during a period of time is identified. Each trace having latencies for a plurality of segments of a corresponding operation. A set of overall latencies comprising an overall latency for each segment is determined. A set of user latencies including a latency for each segment is determined for each of the plurality of users. A set of energy usage estimates including an energy usage estimate for one or more of the plurality of users is generated, by a processing device, based on the set of overall latencies and the set of user latencies using a machine learning (ML) model.
A method of improving continuous integration, continuous build (CI/CD) pipelines includes receiving an indication of a failure of a CI/CD pipeline of a plurality of CI/CD pipelines. The method further includes processing build status information by a rule engine, the build status information indicative of builds executed within the plurality of CI/CD pipelines. The method further includes applying a set of rules to the build status information to select a subset of the plurality of CI/CD pipelines, wherein the set of rules includes one or more of a resource availability rule or a failure type rule. The method further includes executing the subset of CI/CD pipelines selected by the rule engine.
A method includes storing, by a processing device of an enterprise messaging system comprising a plurality of nodes, a message payload in a data store, wherein the data store is shared by the plurality of nodes, wherein the message payload is extracted from a message; sending, to a first node of the plurality of nodes, a metadata item associated with the message; responsive to determining that a key corresponding to the message payload has been used by the first node to retrieve the message payload, decrementing a removal counter associated with the key; and responsive to determining that the removal counter satisfies a removal threshold criterion, removing the message payload from the data store.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
Systems and methods of the disclosure include: identifying, by a destination host computer system, a first memory page residing in a memory of the destination host computer system; transmitting, by the destination host computer system, at least a part of the first memory page to a source host computer system; receiving, by the destination host computer system, a confirmation from the source host computer system that the first memory page matches a second memory page associated with a virtual machine to be migrated from the source host computer system to the destination host computer system; and associating, by the destination host computer system, the first memory page with the virtual machine.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
Systems, methods, and apparatuses for automatically tuning computational probe threshold values in a containerized computing environment are provided herein. An example method comprises identifying a computational container environment that is operating outside of at least one predefined window of values of at least one performance metric, measuring the at least one performance metric, automatically adjusting at least one parameter value of a probe based upon the at least one performance metric, and iterating the measuring and adjusting until the computational container environment is operating within the at least one predefined window of values.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Quantum computing; consulting services relating to computer and Internet security and data encryption; Scientific research and development services in the field of generative Artificial Intelligence technology; Technology consulting services for companies wishing to exploit generative Artificial Intelligence in their activities; Software development services for the creation and customization of generative Artificial Intelligence solutions; Technical project planning and implementation services for companies developing their capabilities in generative artificial intelligence; Design and development of computer hardware and software for generative artificial intelligence applications; IT services for monitoring and detecting potential legal issues or security threats related to the use of Generative Artificial Intelligence; Licensing and compliance services for companies offering Generative Artificial Intelligence solutions, in compliance with legal requirements
Embodiments of the present disclosure relate to systems and methods for using unikernels to protect critical safety applications from interference events. For each of a set of applications identified as critical to the functioning of a computing environment, a corresponding unikernel may be generated, the unikernel including code of the application and kernel functionality. In response to determining that an interference event is affecting a first application of the set of applications, it is determined whether the interference event is unsustainable. In response to determining that the interference event is unsustainable, the unikernel corresponding to the first application is initiated and a failover from the first application to the unikernel corresponding to the first application is performed.
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
H04L 41/0663 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en réalisant des actions prédéfinies par la planification du basculement, p. ex. en passant à des éléments de réseau de secours
H04L 45/28 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données en utilisant la reprise sur incident de routes
15.
GENERATING EFFORTS TO FACILITATE PREPARATION AND EXECUTION OF SOFTWARE MIGRATIONS
A system can be provided for generating efforts to facilitate preparation and execution of software migrations. For example, the system can monitor software applications to generate metadata for the software applications. The system can also receive time-efforts for historical migrations of the software applications. The system can store the metadata and the time-efforts for the software applications in a database. Additionally, the system can receive, from a client device, an effort request associated with a migration of a software application. In response to receiving the effort request, the system can generate an effort for the migration of the software application based at least in part on the metadata and the time-efforts for the software applications. The system can then transmit the effort to the client device as a response to the effort request.
A computing device determines a state of each containerized instance of containerized instances executing on a compute node in a cluster of compute nodes. The computing device determines a state of each compute node in the cluster. The computing device calculates, for each respective compute node in the cluster, a cost associated with each containerized instance on the respective compute node based on the state of each containerized instance and the state of each compute node. The computing device creates a list of preferred compute nodes for each containerized instance to execute on based on the state of each containerized instance, the state of each compute node, and the cost associated with each containerized instance for each compute node in the cluster. The computing device causes, based on the list, a first containerized instance of the containerized instances to be moved to a first compute node identified in the list.
Unikernel catalogs can be used to store and to facilitate efficient deployment of unikernels. For example, a node of a distributed computing environment can include a controller for deploying a unikernel at a target device. The controller can deploy the unikernel at the target device by receiving a unikernel catalog and catalog metadata. The unikernel catalog can include one or more unikernels, and each of the unikernels can include unikernel metadata and executable files. The controller can further execute a catalog checkup to verify the unikernel catalog. In response to verifying the unikernel catalog, the controller can extract the unikernel from the unikernel catalog. The target device may then receive the unikernel from the controller and execute the executable files of the unikernel.
Systems, methods, and apparatuses for storing, presenting, and executing machine states during diagnostic software execution are provided herein. An example method comprises executing an application in a computing environment, periodically storing active states of the computing environment during the executing by creating a plurality of instances of the computing environment that correspond to the stored states, and presenting the stored active states in a linear interface that is configured to revert the computing environment to a respective stored active state by switching to a corresponding instance of the plurality of instances.
Systems, methods, and apparatuses for determining a cause of an error in a computing environment, such as a permission denied error in a linux computing environment, are provided herein. An example method comprises executing an application in a linux environment, monitoring a plurality of linux subsystems and functions via an instrumentation inserted on a kernel, and responsive to a failure of the application, providing a summary of a cause of the failure based upon the monitoring of the linux subsystems and functions.
Kernels can be securely booted while having customizable command line functionality. For example, a boot loader can initiate a kernel boot using a unified kernel image (UKI) that is cryptographically signed with a cryptographic signature and includes two or more command lines that are protected by the cryptographic signature. The two or more command lines can implement different functionalities with respect to the kernel boot. The boot loader can extract the two or more command lines from the signed UKI. A command line of the two or more command lines can be selected by a user to complete the kernel boot. Once the command line is selected, the boot loader can execute the command line to complete the kernel boot using the command line.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
21.
CONTEXT SWITCH REDUCTION FOR VIRTUAL MACHINE EXITS
Systems, methods, and apparatuses for reducing context switches in a virtualized computing environment are provided herein. An example method comprises executing a supervisor, executing a first virtual machine on the supervisor, detecting a first exit from the first virtual machine, responsive to detecting the first exit, loading a userspace context without loading a supervisor context, executing a second virtual machine on the supervisor, detecting a second exit from the second virtual machine, and responsive to detecting the second exit, loading the supervisor context.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
22.
THERMAL THROTTLING TO REGULATE VIRTUAL PROCESSING DEVICE USAGE
Systems, methods, and apparatuses for regulating virtual processing device usage by emulating thermal throttling are provided herein. An example method comprises limiting a processing capacity allocated for a virtual processing device to a value equal to or below a threshold by transmitting, via a hypervisor, an indication to a guest that the virtual processing device has exceeded an operating temperature, wherein the value is below a current processing capacity of a host processing device.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
23.
CLOUD NATIVE AUTO-LABELING SYSTEM TO TRAIN CODE GENERATION MODELS
Systems and methods are disclosed that deploy software code from a dataset into a computing environment. The systems and method collect energy metrics of the software code while executing in the computing environment. The systems and methods determine a sustainability label for the software code based on the energy metrics. The systems and methods assign the sustainability label to the software code to produce a sustainability-based dataset.
A method of automation includes obtaining a configuration of a task group, the task group comprising a plurality of tasks, each of the plurality of tasks to execute on a computing node of a plurality of computing nodes. For each task of the plurality of tasks of the task group, a version control system is accessed to retrieve the task. Each task is stored as a data object within the version control system. The respective tasks of the plurality of tasks are transmitted to one or more of the plurality of computing nodes for execution.
A system and method in which a deployment manager determines that a first compute node cannot utilize a full amount of the storage volume bandwidth provided by one or more storage volumes assigned to it. A first storage volume of the one or more storage volumes may be reassigned to a second compute node in the cluster. The method further includes deploying the cluster with the first storage volume mounted on the second compute node.
A method is provided that includes detecting, using metadata of a captured packet traffic, a communication pattern within each of one or more levels in a network stack by identifying a context among an identified packet involved in a network conversation, and detecting a communication pattern based on the network conversation, the context among the identified packet, and a payload of the packet. The method further includes generating, by a processing device, a topology of the network in view of the communication pattern detected within each of the one or more levels in the network stack.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 43/04 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Arranging and placing advertisements; sales promotion services (for third parties); business management and business management consultancy; provision of business information; distribution of leaflets; distribution of samples; newspaper subscription services for others; accounting; reproduction of documents; systematization of data in a central file; organization of exhibitions for commercial or advertising purposes; business management consultancy services and business affairs consultancy services; commercial business development service; analysis of market research data and statistics; electronic data processing; computer data processing services for artificial intelligence; computer data processing services for cognitive computing; computer data processing services for cloud computing; computer data processing services for blockchain technology; computer data processing services for information management; computer data processing services for quantum computing and quantum programming; organizing and conducting trade exhibitions in the field of computers, IT services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management and electronic business transactions through a global computer network; business advisory services to businesses relating to artificial intelligence; business consulting services to companies in the field of computer systems integrating functions of natural language processing, computational linguistics, documentary retrieval, machine learning and capable of understanding general queries formulated by humans and formulating some answers; business advisory services to businesses relating to cloud computing; business advisory services to businesses relating to blockchain technology; business advisory services to businesses relating to quantum computing, quantum programming and to develop and test quantum algorithms; business advisory services to businesses relating to; information technology; analysis and compilation of commercial data; systematization of data in computer databases; commercial advice to businesses on the use of computer equipment (hardware); Business management and consulting services for the implementation of generative Artificial Intelligence solutions; Market research and analysis services to help businesses understand the potential of Generative Artificial Intelligence; Advertising and promotion services for companies offering generative Artificial Intelligence solutions; Business administration services for managing and expanding Generative Artificial Intelligence projects for other companies; Consulting and advisory services and in the field of business strategies for the integration of Generative Artificial Intelligence in operations Computers; quantum computers; downloadable electronic publications namely informational materials; computer hardware and software for information technology analysis and data management; computer hardware and software for application development; computer hardware and software for cloud computing; computer hardware and software for cognitive computing; computer hardware and software for artificial intelligence; computer hardware and software for blockchain technology; computer hardware and software for quantum computing and quantum programming; computer hardware, namely magnetic tape units (data processing), magnetic tapes (ribbons), printed circuits, integrated circuits, computer keyboards, compact discs (audio-video), optical discs, couplers (data processing), floppy disks, magnetic data carriers; computer hardware, namely video screens, scanners (data processing equipment), computer printers, interfaces (data processing), readers (data processing), computer software (recorded programs) intended for data processing, microprocessors, modems, monitors (hardware), computers, computer memories, computer peripherals; computer adapters; computer components; equipment for data processing; computer devices for data and information management; semiconductors; machine-readable electronic data carriers; magnetic disks; hard disk drives; magnetic tape recorders; calculating machines; cash registers; fax machines; video recorders; video tapes; electric cells and electric batteries; computer chips; wafers for integrated circuits; computer accessories, namely, computer communications servers; carrying cases for computers; computer interface cards; computer cables and computer cable parts; fax-modem cards for computers; computer accessories, namely, screen filters, computer mouse pads, pagers, computer controllers; electrical converters, namely, digital-to-analog, analog-to-digital and step-by-step voltage switches; computer mouse; integrated circuit cards and smart chip cards,; integrated circuit adapters and smart chip card adapters; readers for integrated circuit cards and smart chip cards; microcomputers; electrical power appliances; projectors (projection devices); remote controls for computers; inverters, surge protectors and uninterruptible power supplies; point-of-sale terminals (payment terminals); computer servers; computer storage devices, namely, high-speed storage subsystems for storing and backing up electronic data locally or via a telecommunications network; downloadable computer programs; recorded computer programs; computer software platforms, recorded or downloadable; computer software applications, downloadable; video game software; operating system software and programs; software for accessing a global computer network; document management software; database management software; software for locating, retrieving and receiving text, electronic documents, graphic artwork and audio-visual information on internal enterprise-wide computer networks and on local and wide-area global computer networks; development software and website design software and user manuals, in electronic format, sold as a set; computer software for controlling the operations and execution of computer systems, programs, and computer networks; computer software for connecting disparate computer networks and systems, servers and storage devices; computer programs for connecting computers to each other and enabling computer activities across a global computer network; computer software for systems management, existing software and processes in an information technology environment; interactive computer systems combining computer hardware and software for use in data management and analysis and instruction manuals in electronic format sold with these products; cloud computing systems, namely communications networks integrating computer hardware and software for dynamic provisioning, virtualization and consumption measurement of computer resources; recorded and downloadable cloud computing software for deploying and managing virtual machines on a cloud computing platform; computer systems, namely computer hardware and computer software for the development and integration of artificial intelligence, namely machine learning, deep learning and natural language processing which are capable of collecting, organizing and analyze data; computer systems, namely computer hardware and computer software incorporating functions of natural language processing, computational linguistics, information retrieval, machine learning and capable of understanding general queries formulated by humans and formulating responses; software for developing, building and operating blockchain technology applications; computer hardware and computer software for developing and testing quantum algorithms; downloadable documentation and instruction manuals on machine-readable electronic data carriers relating to computers or computer programs; downloadable electronic publications; electronic publications downloadable on computer media, namely user manuals, guides, brochures, information sheets, written presentations and teaching materials in the field of computers, computer networks, computer storage, computer operating systems, information technology, database management, cloud computing, artificial intelligence, blockchain technology and quantum computing; Computer hardware and software for the implementation of generative Artificial Intelligence solutions; Computer hardware and software to help businesses understand the potential of generative Artificial Intelligence; Computer hardware and software for the management and expansion of Generative Artificial Intelligence projects for other companies; Computer hardware and software for the integration of generative Artificial Intelligence into operations Computer programming; Software as a Service (SaaS) services featuring data management software; software as a service (SaaS) services featuring software for cloud computing; software as a service (SaaS) services featuring software for artificial intelligence; software as a service (SaaS) services featuring software for cognitive computing; software as a service (SaaS) services featuring software for blockchain technology; software as a service (SaaS) services featuring software for quantum computing and quantum programming; software as a service (SaaS) services featuring software for constructing, analyzing and executing quantum programs and quantum algorithms; software as a service (SaaS) services featuring software for developing and testing quantum algorithms; computer programming and computer consulting services for artificial intelligence; computer programming and computer consulting services for cognitive computing; computer programming and information management consulting services; computer programming services and computer consulting for data management; computer programming and computer consulting services for cloud computing; computer programming and computer consulting services for blockchain technology; computer programming and computer consulting services for quantum computing; computer programming and IT consulting services for software as a service (SaaS); design, installation, updating and maintenance of software; design of computer software and hardware for others, and professional consultancy services in the field of computers; technical support services, namely troubleshooting computer programs and software; computer services, namely, design, creation and maintenance of websites on behalf of third parties; analysis of computer systems, integration of databases and computer networks, programming of computers for others all intended for commercial interactions on global computer networks; design of computer and software interconnection systems,; namely, electronic connection of computers and software to each other; computer program (software) and computer hardware (quality control and technical control) testing services; technical project studies in the field of computer hardware and software; computer advice relating to computer hardware, namely advice relating to computer research and development; computer advice and assistance relating to the use of the Internet; rental of computers and software; scientific and industrial research, namely research and development of new products, biological research, research in bacteriology, research in chemistry, research in cosmetology, research in mechanics, geological research, technological research, pharmaceutical research, scientific research for medical purposes; information technology (IT) consulting; computer systems integration services; consultancy services relating to the design, selection, implementation and use of computer systems and software for others; technical support services, namely, diagnosing computer program problems; computer systems design services for others; design of computer systems for the interconnection of computer hardware and software, namely, electronic interconnection of computers and software; computer program and hardware testing services, namely, testing of software, computers and servers to ensure proper functioning; cloud computing services relating to computer hardware and software services integrated into a network for dynamic provisioning, virtualization and metering of consumption of computer resources; providing virtual computing systems and virtual computing environments via cloud computing; design and development of software for cloud data storage; cloud computing hosting provider services; electronic data storage and data retrieval services; data security service; IT support services relating to software provided by IT specialists; design of computer hardware for computer networks; computer design and development
A quantum computing device determines that a first error occurred during an execution of quantum software. The quantum computing device obtains, based on the first error, a first error code from a first data structure comprising error codes associated with the quantum software and errors that occur with the quantum software. The quantum computing device maps the first error code to a first qubit state. The quantum computing device sends a response comprising the first qubit state.
A computing system receives a first geographic area indication that corresponds to a first geographic area of a plurality of different geographic areas, and provisioning information indicative of a first set of tasks to be performed on each computing host in the first geographic area. The computing system dynamically generates, based on the first geographic area indication, a first computing host list that identifies a first set of computing hosts in the first geographic area. The computing system sends, to a first provisioning node of a plurality of provisioning nodes, instructions to implement the first set of tasks on the first set of computing hosts identified in the first computing host list, the first provisioning node being associated with the first geographic area.
Techniques for distributing automation packages are disclosed. An example method includes receiving a playbook that includes a task to be performed by a set of target devices. The method also includes generating an automation package that includes the task included in the playbook. The method also includes encapsulating the automation package in one or more messages, where the one or more messages include a topic identifier that identifies a topic corresponding to the set of target devices. The method also includes sending, by a processing device, the one or more messages to a message service to be published to the topic, where the set of target devices are configured to subscribe to the topic.
A computing device executes a job from among a plurality of jobs executed by a continuous integration system, the job initiating a task from among a plurality of tasks for the job and the task invoking a first remote system. The computing device determines, based on a notification associated with the first remote system, that the task failed in response to invoking the first remote system. The computing device identifies a first job from among the plurality of jobs, the first job having at least one task that invokes the first remote system. The computing device performs an action based on a priority of the first job.
Systems and methods include storing, in a first base boot partition, an image of a first base operating system; storing, in a first overlay boot partition, a first overlay file system comprising a first encrypted file; configuring the first overlay boot partition to boot the image of the first base operating system from the first base boot partition and install the first overlay filesystem; and responsive to detecting an attempt to access the first encrypted file, designating the first base boot partition as an active boot partition.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Systems and methods are presented to provide a first machine learning model to a collaboration platform. The systems and methods receive a second machine learning model from the collaboration platform that indicates the second machine learning model is based on the first machine learning model. The systems and methods test the second machine learning model using criteria corresponding to the first machine learning model to determine whether the second machine learning model is valid. In turn, the systems and methods publish the second machine learning model to a repository in response to determining that the second machine learning model is valid.
A hypervisor executing on a host computing system causes an existing connection between a virtual machine implemented by the hypervisor and an entity separate from the virtual machine to close. The hypervisor creates a snapshot of the virtual machine.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
35.
EFFICIENT INPUT/OUTPUT (I/O) FOR NESTED VIRTUAL MACHINES WITH MEMORY OVERCOMMIT
A method includes: running, by a host computer system, a hypervisor managing a first virtual machine, wherein the first virtual machine manages a second virtual machine; receiving, by the hypervisor, from a virtual device, a first request to perform a memory access operation with respect to a memory page of the second virtual machine; responsive to determining, by the hypervisor, that the memory page of the second virtual machine is unavailable in a memory of the first virtual machine, forwarding the first request to the first virtual machine; and responsive to detecting, by the hypervisor, a page fault with respect to the memory page, performing, by the hypervisor, the memory access operation with respect to the memory page of the second virtual machine.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A method may include identifying, by a processing device, a sequence of commands received within a specified time window; responsive to matching at least part of the sequence of commands to a predefined attack pattern of a plurality of predefined attack patterns, identifying a first action regarding a process associated with the at least part of the sequence of commands; and performing the first action.
A method includes receiving, at a container registry, a container image including a set of files, determining that at least one file of the set of files is a duplicate of a previously stored container image file at the container registry. The method further includes storing the container image at the container registry with the at least one file of the plurality of files that is a duplicate of the previously stored container image file removed from the container image.
Application programming interfaces (APIs) of a software package can be separated into containers to facilitate safety assurance through isolation. For example, a computing system can receive an application request associated with the software package. The software package can include a first set of APIs that is compliant with a safety threshold and a second set of APIs that is noncompliant with the safety threshold. The computing system can determine that the application request corresponds to the first set of APIs. In response, the computing system can identify a first container that includes a first instance of the software package in which the first set of APIs is enabled and the second set of APIs is disabled. Subsequent to identifying the first container, the computing system can forward the application request to the first container that can handle the application request using the first instance of the software package.
A method includes intercepting, by a proxy service running on a first node of a distributed computing system, a first request for a first service running on the first node; determining, by the proxy service, that the first service is dependent on a second service running on a second node of the distributed computing system; responsive to determining that the first service is dependent on the second service, invoking, by the proxy service, the second service running on the second node; receiving, by the proxy service, a first response from the second service; and transmitting, by the proxy service, to the first service, the first response received from the second service.
A technique for differentiation controllers and reconcilers for software operators in a distributed computing environment is described herein. In one example of the present disclosure, a system can include a node of a distributed computing environment that includes a container configured to execute a controller associated with a software operator to. The controller can determine a reconciler that is associated with the container, detect an event that is associated with the reconciler, and invoke the reconciler via a selected communication protocol. The system can include the reconciler configured to process the event in response to being invoked by the controller and to provide a response associated with the event to the controller via the selected communication protocol.
H04L 69/00 - Dispositions, protocoles ou services de réseau indépendants de la charge utile de l'application et non couverts dans un des autres groupes de la présente sous-classe
Energy consumption associated with users of a distributed computing system can be monitored using tracing according to some examples described herein. In one such example, a system can execute tracing software configured to track usage of a software service and generate tracing information. The tracing information cant attribute the usage of the software service to a group of users. The system can analyze the tracing information to determine a portion of the usage to attribute to a given user. The system can then determine an energy consumption estimate for the user, for example based on the portion of the usage associated with the user and an energy consumption amount associated with the software service. A graphical user interface can be generated indicating the energy consumption estimate for the user.
A system can be provided that can detect a transmission failure of a packet. The transmission failure can occur in a software-defined network. The system can further identify, via debuggers, functions associated with the transmission failure of the packet. The transmission failure of the packet can occur between components in the software-defined network. Additionally, the system can generate, via the debuggers, log data for the functions. The system can also identify, based on the log data, a function associated with the transmission failure and a cause of the transmission failure related to the function.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04L 41/069 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant des journaux de notificationsPost-traitement des notifications
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
43.
IDLING AND WAKING A SENDER NODE FOR EVENT MESSAGE DELIVERY IN A COMPUTING ENVIRONMENT
Event delivery can be managed by an event broker in a distributed computing environment. The event broker can receive an event message from a producer device, the event message having a payload and a key. The event broker can store the event message in an event queue based on the key. A sender node can transmit the event message to an event consumer. Subsequent to transmitting the event message, the event broker can cause the sender node to enter an idle state. The event broker can receive an error message from the event consumer while the sender node is in the idle state. After receiving the error message, the event broker can wake the sender node from the idle state. The sender node can initiate a retry process involving iteratively re-transmitting the event message to the event consumer.
An error can be detected in an updated software package by automatically rebuilding related downstream products. For example, a system can determine that a downstream product depends on an updated software package. Based on making this determination, the system can initiate a first rebuild process on the downstream product using the updated software package. If the first rebuild process fails, the system can initiate a second rebuild process on the downstream product using a prior version of the updated software package. The prior version can exclude at least one update made in the updated software package. If the second rebuild process succeeds, based on detecting that the first rebuild process failed and the second rebuild process succeeded, the system can generate an output for a user. The output can indicate that the updated software package is flawed.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
An example method may include receiving, in a virtualized execution environment, a data access request from a storage system, identifying, in view of a virtualized execution image associated with the virtualized execution environment, an application running in the virtualized execution environment, generating a cache classification that specifies whether data accessed by the application is suitable for cache compression, including, in the data access request, a tag indicating whether cached data is to be accessed in a compressed-memory cache, wherein the tag is determined in view of the cache classification, and sending, to a server of the storage system, the data access request. The application can be identified in view of metadata included in the virtualized execution image, where the metadata comprises one or more of an application name or an application version.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
G06F 12/0802 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache
A system and method of providing one or more predictive models to enhance decision-making capabilities regarding software updates in computing network systems. The method includes receiving a request for information indicating whether to upgrade an application executing on a node. The method includes providing a historical impact profile of the node to a predictive model trained to predict possible impacts on computing resources caused by version upgrades to applications using the computing resources. The method includes predicting, based on the predictive model, a possible impact to a computing resource of the node caused by a theoretical upgrade of the application. The method includes generating a risk score indicating whether to upgrade the application executing on the node of the computing network system based on status data of the computing resource of the node and the possible impact to the computing resource of the node.
A carbon footprint associated with executing a job on one or more computer nodes can be automatically managed using some techniques described herein. As one particular example, a system can determine a first carbon footprint associated with applying a continuous integration (CI) pipeline to source code using a first set of nodes of a continuous integration system. The system can also select a second set of nodes of the continuous integration system, the second set of nodes being associated with a second carbon footprint that is lower than the first carbon footprint. The system can then control the continuous integration system to apply the CI pipeline to the source code using the second set of nodes.
The technology disclosed herein enables customized hardware initialization code to be provided over a computer network and used to enable a virtual machine to boot in a more secure manner. An example method may include: receiving a request to start a virtual machine; transmitting, by a processing device, configuration data of a host device over a computer network to a service, wherein the configuration data comprises a resource identifier of the host device; receiving hardware initialization code over the computer network from the service, wherein the hardware initialization code comprises the resource identifier; updating, by the processing device, the virtual machine to comprise the hardware initialization code; and causing the virtual machine to execute in a trusted execution environment of the host device, wherein the virtual machine executes the hardware initialization code and uses the resource identifier.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A gateway service can be generated by a daemon to facilitate communication for application programming interfaces (APIs) in edge devices. For example, the daemon can monitor a database including one or more configuration files for an API. The daemon can detect an update to a configuration file of the one or more configuration files in the database. In response to detecting the update to the configuration file, the daemon can generate an instance of the gateway service configured to interface between a software application and the API.
Dynamic, client-specific retrieval of data can be performed for edge devices using data services. For example, a system can receive a data request from a client device. The data request can include a type of data and one or more parameters for the type of data. In response to receiving the data request, the system can further detect data services that include the type of data. Additionally, the system can generate application programming interface (API) contracts. Each of the API contracts can define a communication protocol between the client device and each of the data services. The system can also deploy a deployable object, which may include the API contracts, on the client device to cause the client device to receive data satisfying the data request from each of the data services.
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p. ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
A method includes building, by a processing device implementing a automation system, by executing a project file executable by the automation system, a pre-configured operating system image, wherein the automation system supports a plurality of nodes in a distributed system, and wherein the pre-configured operating system image conforms to a predefined configuration; deploying, by executing the project file, the pre-configured operating system image; and deploying, using the pre-configured operating system image, a system at a node of the plurality of nodes.
Services can be executed on nodes using initial random access memory disk (initrd) schemes. For example, a system can receive, from an orchestrator node, a request to execute a service at a host node. The request can include data indicative of the service, and the host node can include an initrd scheme. The system can determine that the service is available for execution at the host node based on the service being included in the initrd scheme. In response to determining that the service is available, the system can further transmit a notification to the orchestrator node indicating that the service is available for execution at the host node. Additionally, the system can execute the service on the host node as part of executing the initrd scheme.
A delta between a first version of a software application and a second version of the software application is determined, the delta including a plurality of delta binary values that identify a difference between the first version of the software application and the second version of the software application. A first plurality of qubits are encoded with a primary software application version that is one of the first version of the software application or the second version of the software application. Qubit metadata that refers to a second plurality of qubits is generated based on the delta, the second plurality of qubits including at least some of the first plurality of qubits The second version of the software application is generated from the first plurality of qubits, the second plurality of qubits and the qubit metadata.
A computing device obtains a plurality of input objects. The computing device determines settable attributes of each input object of the plurality of input objects and creates a subset of the settable attributes based on an input filter. The computing device inserts the subset of the settable attributes into a rules engine, the rules engine comprising a set of rules evaluated with an input and producing an output during an execution of the rules engine. The computing device determines, during an execution of the rules engine, a plurality of output objects created during the execution of the rules engine and gettable attributes of each output object of the plurality of output objects and creates a subset of the gettable attributes based on an output filter. The computing device stores rules and corresponding gettable attributes and values of the gettable attributes based on the subset of the gettable attributes in memory.
Systems and methods for generating container images are described. An image definition file specifying a set of packages is received at a virtual image server. The image definition file may specify a set of packages and the virtual image server comprises a mapping of the image definition file to an image file corresponding to each of the set of packages. For each of the set of packages, the corresponding image file may be retrieved from an image registry and used to generate, by the virtual image server, an image manifest that references the corresponding image file for each of the set of packages as a separate image layer. The image manifest is provided to a container host, which may build a container image based on the image manifest.
Techniques for sending commands to a container agent of a confidential virtual machine (VM) are disclosed. An example method includes establishing a first network connection with a control plane of a host computing system and establishing a second network connection with a container agent of a confidential virtual machine (VM) running on the host computing system, wherein the second network connection bypasses the control plane of the host computing system. The method also includes receiving a command from a tenant user interface (UI) and processing the command to determine a command type. The method also includes based on the command type, sending by a processing device, the command to the control plane via the first network connection or to the container agent via the second network connection.
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
Techniques for sending commands to a container agent of a confidential virtual machine (VM) are disclosed. An example method includes sending a first command from a computing device to a container agent of a confidential VM running on a host computing system. The first command is sent to the container agent through a control plane of the host computing system and causes the container agent to communicate with a relying party to verify confidentiality of the confidential VM. The method also includes receiving network information for the container agent from the relying party and establishing a network connection with the container agent based on the network information received from the relying party. The method also includes sending a second command from the computing device to the container agent of the confidential VM via the network connection.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
58.
PATCHING SOFTWARE DEPENDENCIES USING EXTERNAL METADATA
The present disclosure provides new and innovative systems and methods for patching software dependencies using external metadata. In an example, a computer-implemented method, includes obtaining source code and build metadata including a plurality of dependencies, obtaining patch data, updating the build metadata to replace at least one dependency in the plurality of dependencies based on the patch data, generating output data based on the source code and the updated build metadata, generating summary data for the updated build metadata, and providing the generated summary data.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
The technology disclosed herein receives an untyped data structure. The untyped data structure includes a plurality of data items and each data item includes a field identifier and corresponding data. A policy to evaluate the untyped data structure is identified based on one or more field identifiers of the untyped data structure. The policy specifies a field identifier and a corresponding type definition. The type definition of the field identifier specified in the identified policy is compared with data associated with a field identifier of the untyped data structure matching the field identifier of the identified policy. Based on the comparisons, determining whether the untyped data structure satisfies the identified policy.
A method of managing applications of a first vehicle includes establishing, by the first vehicle, a network with a second vehicle in proximity to the first vehicle, receiving, by the first vehicle from the second vehicle over the network, application metadata associated with a plurality of applications executing on the second vehicle, based on the application metadata, transmitting a list to the second vehicle over the network, wherein the list identifies one or more application updates associated with the plurality of applications, and receiving the one or more application updates from the second vehicle over the network.
A method of managing applications of a first vehicle includes receiving, from a second vehicle over a network between the first vehicle and the second vehicle, application metadata associated with a plurality of applications installed on the second vehicle, processing, by a processing device of the first vehicle, an install timestamp of the application metadata to generate a list that identifies one or more application updates associated with the plurality of applications installed on the second vehicle, transmitting the list over the network to the second vehicle, and receiving the one or more application updates from the second vehicle over the network.
H04W 4/46 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p. ex. communication véhicule-piétons pour la communication de véhicule à véhicule
62.
EAVESDROPPER IDENTIFICATION AND CONTAINER IMAGE LAYER INVALIDATION
It is determined that a container image comprising a plurality of container image layers generated by a container build engine is to be transmitted from a container image repository to a target computing device. It is determined that a first container image layer of the plurality of container image layers is a sensitive container image layer to be encrypted prior to transmission to the target computing device. A first key generated by a quantum computing system that uses a quantum key distribution protocol, a plurality of qubits and a quantum communication channel to generate the first key is obtained. The first container image layer is encrypted using the first key to generate a first encrypted container image layer. The first encrypted container image layer is transmitted to the target computing device.
The present disclosure provides new and innovative systems and methods for deploying and running webassembly workloads on compute nodes using a webassembly unikernel. In an example method, a computing device having a processor generates, using a container engine, a container runtime. The computing device generates, using the container runtime, a unikernel configured to run a plurality of webassembly applications, thereby resulting in a webassembly unikernel. The computing device may receive a request to run an application. A container image corresponding to the application may be retrieved, via the container engine, from a container registry. A webassembly payload may be stored for the application from the container image. Furthermore, the computing device may cause the webassembly unikernel to run the webassembly payload for the application.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
H04L 67/025 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP] pour la commande à distance ou la surveillance à distance des applications
64.
RANDOMIZATION-BASED PROTECTION FOR MEMORY DEDUPLICATION
Systems, methods, and apparatuses for managing memory usage in virtualized computing environments are provided herein. An example method includes generating a random key, associating the key with a page or range of pages in a memory, and selectively deduplicating pages based upon the key associated with each respective page.
Configuration management files can be generated to refine software package installation processes. For example, a system can identify sections of a file that can define a first installation process for installing a software package in a computing environment. Each of the sections can include commands. The system can also generate a set of tasks for each of the sections by relating each command of each section to a task provided by a package manager. The system can also generate configuration management files for each section that can define a second installation process for the software package. The configuration management files can be generated based on the sets of tasks and based on conditions of the computing environment. The system can then transmit the configuration management files to the package manager to cause the package manager to implement the second installation process for the software package.
Systems and methods for securing pixel data in a virtual framebuffer and efficiently providing the secure pixel data are presented. The systems and methods partition a virtual framebuffer into a plurality of sectors, wherein each one of the plurality of sectors corresponds to one of a plurality of regions of a screen. The systems and methods encrypt first pixel data corresponding to the plurality of regions to produce encrypted first pixel data and storing the encrypted first pixel data in the plurality of sectors of the virtual framebuffer. The systems and methods modify a portion of the first pixel data to produce second pixel data, wherein the portion of the first pixel data corresponds to a first sector in the plurality of sectors. The systems and methods encrypt the second pixel data to produce encrypted second pixel data. The systems and methods update the first sector of the virtual framebuffer with the encrypted second pixel data.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
67.
GENERATING FILESYSTEM IMAGES WITH INTEGRATED CONTAINER REGISTRIES
A computing device receives a filesystem image comprising a filesystem tree, a container runtime, and an on-board container registry including a plurality of container images, the on-board container registry operable to provide a container image to a requesting container runtime. The computing device is booted using the filesystem image. The computing device instructs the container runtime to initiate a first container from a first container image. The computing device requests, by the container runtime from the on-board container registry, the first container image. The computing device receives, by the container runtime, the first container image from the on-board container registry. The computing device initiates, by the container runtime, the first container from the first container image.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A method of managing applications of a first vehicle includes establishing, by a processing device of the first vehicle, a first network with a second vehicle in proximity to the first vehicle, receiving, by the first vehicle, a second vehicle identifier (ID) from the second vehicle over the first network, transmitting the second vehicle ID and a first vehicle ID of the first vehicle to an administrative device over a second network, and determining an update compatibility between the first vehicle and the second vehicle based on compatibility information received from the administrative device in view of the second vehicle ID and the first vehicle ID.
Embodiments of the present disclosure provide techniques for peer to peer sharing of files in a mobile environment. In response to meeting a communication parameter of a second device, a processing device may determine whether the second device will maintain the communication parameter with a first device for at least a threshold amount of time. An amount of data that can be transferred between the first and second devices during a transfer window with the second device may be determined. Software manifests of the first and second devices may be compared to determine a set of software of the first device that need to be updated. A number of chunks for a first software of the set of software may be received from the second device, the number of chunks based on the amount of data that can be transferred between the first and second devices during the transfer window.
A method includes receiving, from a first container of a plurality of virtualized computing entities, a request to diagnose a first network connectivity malfunction associated with the first container. The method further includes identifying a first package of the plurality of packages based on data associated with the first container satisfying at least one criterion of the plurality of criteria.
G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel
Deriving a container from a package set is disclosed. Package set metadata that identifies a plurality of packages to be included in a container image based on a package set is accessed. A container configuration file referencing the plurality of packages is generated based at least in part on the package set metadata. The container configuration file includes one or more commands complying with a container builder syntax that are implementable by a container builder to generate a container image including the plurality of packages. The container configuration file is stored in a memory of a computer system.
Systems and methods for implementing a targeted port allowance for unprivileged processes are presented. The systems and methods determine, from a plurality of ports, a first set of ports from which a process is configured to receive information. The systems and methods configure the first set of ports to be unprivileged, and then configure a second set of the plurality of ports to be privileged. The second set of ports includes each one of the plurality of ports that is absent from the first set of ports. In turn, the systems and methods bind the process to the first set of ports.
A containerized service can be managed using a system manager and a deployment engine. The system manager can receive a service identifier that can identify a configuration file of the containerized service. The configuration file can be used to initiate one or more containers to run the containerized service. The system manager can transmit the configuration file to the deployment engine integrated with the system manager. The deployment engine can create a service container prior to initiating the one or more containers that can run the containerized service based on a container status of the service container. The service container can be used to manage the one or more containers. The system manager can initiate the containerized service in response to receiving a ready notification from the deployment engine indicating an operational status of the one or more containers.
Systems, methods, and apparatuses for migrating secrets from cloud-based secret manager instances to local secret manager instances while preserving an original topology of the cloud-based secret manager instances are provided herein. An example system includes a computer-readable memory containing a local secret manager. The example system also includes a processing device configured to obtain an initial secret management topology from one or more cloud-based secret manager instances, associate each cloud-based secret manager instance with respective geographical locations, and migrate secrets from each respective cloud-based secret manager instance into the local secret manager, organized by the geographical locations, in a final secret management topology that mimics the initial secret management topology.
An instance of the quantum token generating service is instantiated responsive to a request for instantiation of a quantum token generating service from an authenticating computing system. Instantiation of the instance of the quantum token generating service includes reserving a set of qubits for the instance of the quantum token generating service that are accessible to the authenticating computing system. It is determined that the authenticating computing system has accessed the set of qubits via the instance of the quantum token generating service to generate a first token. Electromagnetic bias is applied to a qubit of the set of qubits to weight the qubit such that each subsequent token generated with the instance of the quantum token generating service is different than the first token.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Systems and methods are disclosed for partitioning a rules engine. An example method includes receiving a specification for a rules engine comprising a plurality of nodes. The method also includes identifying two or more partitions of the rules engine, wherein the two or more partitions comprise a first partition with a first node and at least a second partition with a second node. Each partition is connected to a root node of the rules engine and wherein the first node of the first partition is connected by an edge to the second node of the second partition. The method also includes instantiating the first partition in a first computational device, instantiating the second partition in a second computational device, and configuring a network communication channel between the first node of the first partition and the second node of the second partition.
The technology disclosed herein enables receiving a first remote access command identifying a second computing system, a service on the second computing system, and an action to be performed with respect to the service by a service manager of a first computing system, and transmitting a first action command derived from the first remote access command to a service manager of the second computing system by the service manager of the first computing system. The service manager of the second computing system is enabled for remote access.
A virtual machine (VM)-based container runtime executing on a computing device receives a request to run a container from a container image that is at least partially encrypted. The VM-based container runtime causes a VM to be initiated from a VM image, the VM image including an agent operable to, during execution, obtain a plurality of decryption keys operable to decrypt blocks of the container image. The agent is operable to set up a block remapper in the VM to be invoked by a file system mounted to the VM to request a particular container image block, send a request for the particular container image block to a block obtainer component executing outside of the VM, utilize a decryption key to decrypt a container image block received from the block obtainer component to generate a decrypted container image block, and pass the decrypted container image block to the file system.
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
Receive a first electronics control unit (ECU) profile, the first ECU profile comprising a first set of services. Switch execution, on an ECU, by a processing device, to the first ECU profile from a second ECU profile, the second ECU profile comprising a second set of services, wherein an intersection of the first set of services and the second set of services comprises a third set of services. Start, on the ECU, a set of services included in the first ECU profile and not included in the third set of services.
B60R 16/023 - Circuits électriques ou circuits de fluides spécialement adaptés aux véhicules et non prévus ailleursAgencement des éléments des circuits électriques ou des circuits de fluides spécialement adapté aux véhicules et non prévu ailleurs électriques pour la transmission de signaux entre des parties ou des sous-systèmes du véhicule
80.
AUTOMATICALLY RETRIEVING DEBUGGING INFORMATION BASED ON A DECLARATIVE SPECIFICATION FOR DEBUGGING A SOFTWARE APPLICATION
A computer can receive, by a software program executing on the processing device, a specification file drafted by a developer of a software application, the specification file having a declarative format and indicating a series of data retrieval tasks to be performed as part of a debugging process for debugging a problem with the software application. The computer can determine operations based on the series of data retrieval tasks indicated by the specification file, the operations being executable to perform the tasks. The computer can execute the one or more operations to perform the data retrieval tasks. By performing the data retrieval tasks, the computer can retrieve debugging information associated with one or more containers associated with the software application. The computer can transmit the retrieved debugging information to a debugging entity for use in debugging the problem with the software application.
An example method may include identifying one or more source code lines from which an intermediate code line of an intermediate code module is generated, wherein each respective source code line is associated with a respective source code module name and further associated with a respective line number in the respective source code module, generating one or more source mappings, where each source mapping corresponds to a respective source code line and associates a line number of the intermediate code line with a respective source code module name of the respective source code line and further with a respective line number of the respective source code line, and storing, in a data store, the one or more source mappings in association with a name of the intermediate code module. The intermediate code module can be a file generated by a compiler or translator.
Disclosed are techniques for aggregating explanations of a predictive AI models' predictions to diagnose and improve the performance of a support stack. An indication of desired statistical parameters to be optimized may be received, the desired statistical parameters relating to performance of a support stack. A prediction model may be trained to predict resolution statistics corresponding to the desired statistical parameters. Each of a plurality of support tickets input to the support stack may be analyzed using a predictive AI model to generate a set of predicted resolution statistics including predicted values for each of the desired statistical parameters and the set of predicted resolution statistics may be analyzed using an explainable artificial intelligence (XAI) algorithm to generate a set of explanations for the predicted resolution statistics. The set of explanations for each of the plurality of support tickets may be aggregated to generate insights regarding the desired statistical parameters.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/5074 - Traitement des plaintes des utilisateurs ou des tickets d’incident
83.
DERIVING A CUSTOM VERSION OF A SOFTWARE PACKAGE FROM SUPER POSITIONED QUBITS
A quantum computing system (QCS) receives from a computing device a request for a custom software version of a software package that includes a subset of features from a set of features implemented by a version of the software package, the request identifying the software package and the subset of features. The QCS places each qubit of a plurality of qubits in which the version of the software package is stored in a state of superposition. The QCS accesses a data structure to determine a subset of the plurality of qubits. The QCS biases the qubits in the subset. The QCS measures values of each qubit in superposition to extract the subset of features from the plurality of qubits. The QCS generates a custom software package based on the values measured in the plurality of qubits.
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p. ex. couplage ou commande de qubit
84.
UPDATING EDGE NODES IN DISTRIBUTED COMPUTING ENVIRONMENTS USING PARTITIONS
Edge nodes in distributed computing environments can be updated according to some aspects described herein. For example, a first node in the distributed computing environment can receive an update request from a management node. The update request can include an update file for updating a second node. In response to receiving the update request, the first node can generate a first partition and a second partition, containing the update file, within the first node. Additionally, the first node can generate a network tunnel between the first node and the second node. The first node can mount a file system for the second node onto the first partition and a copy of the file system onto the second partition of the first node via the network tunnel. The first node also can update the file system in the second partition using the update file to generate an updated file system.
Write access to kernel memory in a virtual machine (VM) can be controlled using virtual machine privilege levels (VMPLs). In one example, a guest kernel can detect an attempt by a device driver to perform a write operation using a first virtual central processing unit (vCPU) with a first VMPL. The write operation can correspond to a particular kernel memory address for the guest kernel, and the first VMPL may have fewer permissions than a second VMPL. In response to detecting the write operation, the guest kernel can exit to a hypervisor associated with the guest kernel based on the first VMPL. In response, the hypervisor can launch a second vCPU with the second VMPL. The second vCPU can determine that a range of kernel memory for the guest kernel does not comprise the particular kernel memory address. In response, the device driver, using the first vCPU, can execute the write operation.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
86.
SECURE TRANSMISSION OF CONTENT UPDATES VIA QKD NETWORKS
A quantum computing device determines that an error occurred during a transmission of an update for content from a server computing device to a client computing device over a quantum communication channel (QCC) that is using a quantum key distribution (QKD) protocol and a key generated by the QKD protocol. The quantum computing device determines a risk of discovery of a vulnerability in the update for the content based on a severity level of the vulnerability in the update for the content transmitted from the server computing device to the client computing device over the QCC, an amount of the key discovered, and an amount of the update for the content transmitted from the server computing device to the client computing device over the QCC discovered. The quantum computing device performs an action based on the risk of discovery of the vulnerability in the update for the content.
H04L 9/36 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité avec des moyens pour détecter des caractères non destinés à la transmission
87.
KEY/VALUE PAIR METADATA AUTHENTICATION FOR DECLARATIVE PROCESS ORCHESTRATION ENVIRONMENTS
An access control process executing in a declarative container orchestration system receives a notification that the declarative container orchestration system has received a configuration file that identifies a desired future state that includes a creation of an object. Prior to allowing the declarative container orchestration system to create the object, the configuration file is analyzed. Based on the analysis, it is determined that the configuration file includes a key/value pair that is to be associated with the object. The access control process determines that a user associated with the configuration file lacks authorization to request the 10 key/value pair. In response to determining that the user associated with the configuration file lacks authorization to request the key/value pair, the declarative container orchestration system is prevented from creating the desired future state identified in the configuration file.
A computing device determines that an executing first operator process is to be upgraded to a second operator process in an upgrade process, wherein the first operator process maintains on a cluster of compute nodes a desired identified state of an application. The computing device prior to initiating the second operator process, determines that the upgrade process will cause an initiation of a new container of the application to replace an existing container of the application. The computing device determines that an upgrade mode associated with the first operator process is a rolling upgrade mode, wherein the existing container and the new container will execute concurrently for a period of time. The computing device makes a determination whether computing resources needed to execute the existing container and the new container concurrently are available. The computing device takes an upgrade request action based on the determination.
A method includes determining, by a processing device, an intended level of power consumption associated with a network function; allocating, in view of the intended level of power consumption, a network device to the network function; allocating, in view of the intended level of power consumption, a processor to the network function; and designating the processor to handle interrupts from the network function via the network device.
The technology disclosed herein generates, by a virtual machine running on a host computer system, a plurality of direct guest physical addresses, maps each guest virtual address of a plurality of guest virtual addresses to a direct guest physical address of the plurality of direct guest physical addresses, and updates, for each guest virtual address to direct guest physical address mapping, an entry of a shadow page table with the direct guest physical address to a guest physical address mapping.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
91.
DYNAMIC DIRECT MEMORY ACCESS MAPPING FOR PERIPHERAL DEVICES
The technology disclosed herein enables receiving, by an operating system running on a host computer system, a request to map a physical address associated with a peripheral device, identifying, based on the request, a mapping type, wherein the mapping type is one of: a first mapping type or a second mapping type, mapping, based on the mapping type of the request, the physical address to a virtual address referencing a memory page having one of: a first page size or a second page size, wherein the second page size exceeds the first page size, and storing a mapping of physical address to the virtual address in an input/output memory management unit (IOMMU) page table associated with the peripheral device.
Processing logic may send an HTTP request for a file to an HTTP server over a computer network. Processing logic may receive, from the HTTP server, a signature that is associated with the file, and the file. The file may include the source code that is associated with the file, executable code that corresponds to the source code, and debug data associated with the source code and the executable code. Processing logic compares the signature with the file using a digital verification certificate to validate the file. In response to the file being validated, processing logic accepts the file from the HTTP server.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Automatic caching for stateful applications can be implemented using aspect-oriented programming. In one example, a caching tool can detect, based on a selection from a client device, an update to a property of an instance of a software application. The caching tool can further identify a match between the update to the property and a predefined aspect. In response to the identifying the match, the caching tool may determine stateful information for the instance based on the selection from the client device. In response to determining the stateful information, the caching tool may automatically execute an asynchronous caching function to store, in a cache, the stateful information.
G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p. ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
G06F 12/0815 - Protocoles de cohérence de mémoire cache
The present disclosure provides new and innovative systems and methods for automatically modifying configuration management projects. In an example, a computer-implemented method includes analyzing code from a configuration management project, identifying parallel and duplicate structures in the code, and modifying the code to condense the parallel and duplicate structures into a plurality of roles that can be referenced by a playbook.
Embodiments of the present disclosure include a processing device that determines that a first node device of a plurality of node devices in a network is non-compliant with a network policy, identifies a first subset of the plurality of node devices that are not associated with the first node device, and transmits a communication to the first subset of the plurality of node devices that instructs respective ones of the first subset of the plurality of node devices to perform an alteration of a state of a communication path of the first subset of the plurality of node devices to be incompatible with the first node device.
A network address is allocated for a guest virtual machine (VM) of a computing device by the host operating system. The network address is externally accessible from an external network coupled to the computing device. An indication is received, from the guest VM, that the guest VM is using the network address. The network address as used by the guest VM matches the network address as exposed by the host operating system on the external network. A network transmission, from the external network, is received that is directed to the network address. Responsive to the indication that the guest VM is using the network address, the network transmission is transferred to the guest VM.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
97.
Stateful Hash-Based Signatures Using a Secure Device
Stateful hash-based signatures can be implemented using a secure device. For example, a computing device can transmit a request to a secure device to obtain a partial digital signature usable to cryptographically sign data, where the secure device is separate from the computing device. The secure device can generate the partial digital signature using a private key, which is generated by the secure device based on a counter value. The counter value is maintained internally to the secure device. The computing device can then receive, from the secure device, the partial digital signature and the counter value corresponding to the private key. The computing device can construct a full digital signature, to cryptographically sign the data, based on the partial digital signature and the counter value.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Functions associated with functional safety certification of a software package can be identified using a rule engine. For example, a computing system can identify the functions in a codebase of the software package by executing the rule engine that is configured to identify the functions using a rule set. In response to identifying the functions, the computing system can tag the functions with a function identifier usable to filter the codebase to define a subset of the codebase consisting of the functions. The computing system can execute a targeted test suite to generate a code coverage report of the codebase such that the targeted test suite is limited to the subset of the codebase based on the function identifier.
Systems and methods for simulating containerized clusters. An example method may include determining a first value of an entity property that characterizes a simulated cluster entity in a containerized cluster entity, where the first value of the entity property is determined in view of an entity simulation specification associated with the simulated cluster entity, identifying one or more simulation policies that correspond to the simulated cluster entity, the simulation policies comprising a value generation policy that specifies a modification factor, the entity property, and one or more entity modification criteria. The example method may further include responsive to determining that the one or more entity modification criteria are satisfied, determining a second value of the entity property in view of the first value of the entity property and the modification factor, and generating simulation output comprising the second value of the entity property.
Systems and methods are described for configuring a data plane of an event streaming platform. An example method includes receiving a topology definition describing a topology of an event streaming platform, and generating a representation of a data plane of the event streaming platform.
H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
H04L 41/12 - Découverte ou gestion des topologies de réseau
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services