Abstract:
Methods and systems that allow a user to see the people or groups who have access to files that are maintained by a plurality of cloud content sharing services. In particular, the user may see what specific party has access to each particular file or directory, regardless of multiple cloud content sharing services involved. Moreover, a user interface and exposed application program interface allows the user to manipulate the permissions, e.g., granting access, to another person or group, to a file or directory. The user interface may also allow the user to terminate access to the file or directory for a person or group. The user's action to change a permission may be effected independently of the particular cloud content sharing service.
Abstract:
Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
Abstract:
Systems and methods may be used to provide neutral host edge services in an edge network. An example method may include generating a virtual machine for a communication service provider at a compute device. The method may include receiving a user packet originated at a user device associated with the communication service provider and identifying dynamic route information related to the user packet using the virtual machine corresponding to the communication service provider. Data may be output corresponding to the user packet based on the dynamic route information.
Abstract:
Various approaches for implementing multi-tenant data protection are described. In an edge computing system deployment, a system includes memory and processing circuitry coupled to the memory. The processing circuitry is configured to obtain a workflow execution plan that includes workload metadata defining a plurality of workloads associated with a plurality of edge service instances executing respectively on one or more edge computing devices. The workload metadata is translated to obtain workload configuration information for the plurality of workloads. The workload configuration information identifies a plurality of memory access configurations and service authorizations identifying at least one edge service instance authorized to access one or more of the memory access configurations. The memory is partitioned into a plurality of shared memory regions using the memory access configurations. A memory access request for accessing one of the shared memory regions is processed based on the service authorizations.
Abstract:
Systems and methods may provide for extracting location data from a plurality of news items, wherein at least a portion of the location data has a first level of detail that is greater than or equal to a neighborhood, and using the location data to populate a news data store. Additionally, a response to a news query may be generated based on a requested location associated with the news query and the location data in the news data store, wherein the requested location has a second level of detail that is greater than or equal to the first level of detail and the response indicates one or more news items that correspond to the requested location. In one example, a graphical representation of the response is overlaid on one or more of a map corresponding to the requested location or an image of the requested location.
Abstract:
This disclosure relates generally to a system and method for translating between virtual machines. A network adaptor can be configured to be communicatively coupled to a server, the server comprising a first virtual machine having a first format, the network adaptor to receive input from the server. A translator can be configured to identify, from the input from the server, the first format of the first virtual machine and generate an output, compatible with a second format of a second virtual machine, based on the input from the server, the second format being incompatible with the first format.
Abstract:
Examples described herein relate to a configurable switch with dynamically configurable device connections to a processor socket, where the device connections are configured to meet service level agreement (SLA) parameters of a first service executing on the processor socket. For a second service that is to execute on the processor socket and the second service is higher priority than the first service, device connections of the switch to the processor socket are dynamically reconfigured to meet SLA parameters of the second service.
Abstract:
Methods and apparatus to verify trained models in edge environments are disclosed. An example apparatus to validate a trained model in an edge environment includes an attestation verifier to determine an attestation score of the model received at a first appliance, the attestation score calculated at a second appliance different from the first appliance, a comparator to compare the attestation score to a threshold, a validator to validate the model based on the comparison, and an executor to at least one of execute or deploy the model based on the validation.