Uninterrupted multiple basic service set identifiers

    公开(公告)号:US12232018B2

    公开(公告)日:2025-02-18

    申请号:US17513832

    申请日:2021-10-28

    Abstract: Systems and methods are provided for generating an MBSSID virtual access point (VAP) to facilitate an uninterrupted MBSSID. An access point (AP) can determine characteristics, or network properties, of VAPs associated with the AP. The AP can generate an MBSSID VAP based on the characteristics of the VAPs. An MBSSID beacon can be generated using the MBSSID VAP as a transmitted VAP (TX VAP) of the MBSSID beacon. The MBSSID VAP serves as a TX-VAP that is not subject to changes and does not need to be interrupted to have changes made to it. As the MBSSID VAP serves as a TX VAP that is not subject to changes or interruptions, the MBSSID based on the MBSSID VAP does not need to be interrupted for changes to be made to other VAPs associated with the MBSSID.

    Electrical frequency response fluid analysis

    公开(公告)号:US12227433B2

    公开(公告)日:2025-02-18

    申请号:US15569650

    申请日:2016-02-19

    Abstract: In the examples provided herein, a system includes an electrochemical sensor having two electrodes inserted in a fluid to be tested, where an alternative current (AC) voltage is applied across the two electrodes; an electrochemical sensor having two electrodes inserted in a fluid to be tested, wherein an alternative current (AC) voltage across the two electrodes; and a frequency response analyzer to analyze the measured the electrical response across multiple frequencies. The system also includes a memory to store a baseline of the electrical response across multiple frequencies, and a processor to determine from the stored baseline and the measured electrical response whether the electrical response is outside a predetermined range.

    LOAD BALANCING CLIENT CONNECTIONS ACROSS SERVERS OF A TRUST NETWORK

    公开(公告)号:US20250047605A1

    公开(公告)日:2025-02-06

    申请号:US18773755

    申请日:2024-07-16

    Abstract: In some examples, a proxy system establishes a client-side secure network tunnel between the proxy system and a client device, and establishes a plurality of server-side secure connections between the proxy system and respective servers of a trust network. The proxy system load balances a plurality of connections of the client device in the client-side secure network tunnel across the servers of the trust network through respective server-side secure connections of the plurality of server-side secure connections.

    GUIDANCE TOOL FOR CONFIGURING CLOUD SOLUTIONS

    公开(公告)号:US20250047567A1

    公开(公告)日:2025-02-06

    申请号:US18362626

    申请日:2023-07-31

    Abstract: In certain embodiments, a method includes receiving, in association with a configuration of a proposed cloud solution, a selection of a first cloud solution aspect made by a user of a guidance tool, and generating, using a hybrid recommender system, a recommendation for a subsequent selection of a second cloud solution aspect of the configuration of the proposed cloud solution. The hybrid recommender system may include a collaborative filtering system and a content-based filtering system, and may generate the recommendation according to information that includes user information, prior configuration information, and the selection. The method further includes providing the recommendation to the user via a user interface of the guidance tool; receiving the subsequent selection; and generating, by the guidance tool, a proposed cloud solution output based at least in part on the selection and the subsequent selection.

    DATA CENTER CARBON EFFICIENCY OPTIMIZATION

    公开(公告)号:US20250045772A1

    公开(公告)日:2025-02-06

    申请号:US18469681

    申请日:2023-09-19

    Abstract: Examples described herein relate to monitoring a carbon efficiency metric associated with a data center and determining a recommendation to improve the carbon efficiency metric. A data processing device may determine a carbon efficiency metric associated with a data center based on determining a power consumption of an infrastructure device of the data center. The data processing device may determine the carbon efficiency metric further based on estimating a performance of the infrastructure device based on the power consumption. The data processing device may also determine a recommendation to change the data center to improve the carbon efficiency metric based on predicting, using a machine learning model and based on a time-series dataset, whether the carbon efficiency metric is associated with a temporary event. The data processing device may provide the recommendation to an output device.

    Prioritized Message Access Lists for Inter-Process Communication

    公开(公告)号:US20250045132A1

    公开(公告)日:2025-02-06

    申请号:US18362696

    申请日:2023-07-31

    Abstract: In certain embodiments, a method includes providing, by an inter-process communication (IPC) manager, an initial prioritized message access list information set; receiving a second request for at least one prioritized message access list; and providing a prioritized message access list within a shared memory pool. The prioritized message access list may include a prioritized message access list identifier, an intra-list priority range, and a prioritized message access list size. The method may also include parsing, by the IPC manager, a message posted to the prioritized message access list to determine a time at which to alert a receiving process about the message; notifying the receiving process at the determined time; and decrementing, in response to the receiving process consuming the message, a message reference count.

    SYSTEM AND METHOD FOR FILE SCANNING BETWEEN A SOURCE AND CLIENT IN A ZERO TRUST ENVIRONMENT

    公开(公告)号:US20250039195A1

    公开(公告)日:2025-01-30

    申请号:US18359527

    申请日:2023-07-26

    Abstract: A system and method for providing file scanning between a client device and a resource through a zero trust network environment (ZTNE) are disclosed. The method includes detecting in network traffic between the client device and the ZTNE a request to receive a first content from a resource deployed in a private network, wherein the resource is accessible to the user device making first request through the ZTNE; detecting in network traffic between the client device and the ZTNE a second request to send a second content from the client device to a public network, wherein the public network is accessible to the user device making the second request through the ZTNE; sending the request to the public network, in response to determining that the second content is allowable; and blocking the request to the public network, in response to determining that the second content is not allowable network traffic.

    MEASURING FILES BASED ON FILE PROPERTY-BASED SELECTION CRITERIA

    公开(公告)号:US20250039142A1

    公开(公告)日:2025-01-30

    申请号:US18359057

    申请日:2023-07-26

    Abstract: A technique includes registering, with a core of an operating system kernel, a hook that corresponds to a file event and associates the file event with an event-driven module of the operating system kernel. The core is associated with an integrity measurement architecture policy. The technique includes, responsive to an occurrence of the file event, triggering execution of the event-driven module to extend a scope of the integrity measurement architecture policy. Executing the module includes the operating system kernel determining a property of a file that is associated with the file event; and filtering a set of rules of an extended integrity measurement policy based on the property. The filtering includes identifying a given rule of the set of rules having a condition that is contingent on the file event being associated with the property. Executing the module includes the operating system kernel identifying an integrity measurement-affiliated action of the given rule and performing the integrity measurement-affiliated action on the file.

    PROGRAM RECOVERY
    20.
    发明申请

    公开(公告)号:US20250036533A1

    公开(公告)日:2025-01-30

    申请号:US18358558

    申请日:2023-07-25

    Abstract: In some examples, a system receives a request to recover a program. The system accesses metadata associated with a recovery copy of information for the program, and determines, based on the metadata, a compatibility of a storage arrangement of data in the recovery copy with the program. The system determines whether to fully recover the program using the recovery copy or to partially recover the program based on the determined compatibility.

Patent Agency Ranking