Electromagnetic interference shield
    192.
    发明授权

    公开(公告)号:US11917801B1

    公开(公告)日:2024-02-27

    申请号:US18309061

    申请日:2023-04-28

    CPC classification number: H05K9/0026 H05K9/0032

    Abstract: An electromagnetic interference (EMI) shield may include a frame configured to be coupled to a printed circuit board (PCB). The frame may include a horizontal body and a plurality of vertical walls extending perpendicularly from the horizontal body. The plurality of vertical walls defines a portion of a perimeter of the EMI shield, the perimeter including a concave corner defined virtually by a first and second vertical wall of the plurality of vertical walls. The first vertical wall does not extend all the way to the second wall and an opening if formed between. The first vertical wall includes an attached portion connected to the horizontal frame and an extension portion connected to the attached portion by way of a first fold. The extension portion at least partially overlays, abuts, and extends beyond the attached portion toward the second wall thereby at least partially covering the opening.

    Deployment and configuration of an edge site based on declarative intents indicative of a use case

    公开(公告)号:US11914982B2

    公开(公告)日:2024-02-27

    申请号:US18328287

    申请日:2023-06-02

    CPC classification number: G06F8/61 G06F40/30 H04L67/12

    Abstract: Embodiments described herein are generally directed to an edge-CaaS (eCaaS) framework for providing life-cycle management of containerized applications on the edge. According to an example, declarative intents are received indicative of a use case for which a cluster of a container orchestration platform is to be deployed within an edge site that is to be created based on infrastructure associated with a private network. A deployment template is created by performing intent translation on the declarative intents and based on a set of constraints. The deployment template identifies the container orchestration platform selected by the intent translation. The deployment template is then executed to deploy and configure the edge site, including provisioning and configuring the infrastructure, installing the container orchestration platform on the infrastructure, configuring the cluster within the container orchestration platform, and deploying a containerized application or portion thereof on the cluster.

    EFFICIENT PORT RECONFIGURATION
    197.
    发明公开

    公开(公告)号:US20240064116A1

    公开(公告)日:2024-02-22

    申请号:US17890770

    申请日:2022-08-18

    CPC classification number: H04L49/65 H04L45/60 H04L49/111

    Abstract: A system for facilitating efficient port reconfiguration at a switch is provided. During operation, the system can identify a target port of the switch for reconfiguration based on one or more reconfiguration parameters indicating how a set of logical ports are generated from the target port. The system can disable the target port at the control plane of the switch, which disables features provided to the target port from the control plane. The control plane can provide a set of features supported by the switch at a port-level granularity for facilitating operations of the switch. The system can then configure the forwarding hardware based on the reconfiguration parameters to accommodate the set of logical ports. When the reconfiguration of the target port is complete, the system can enable a respective logical port at the control plane, which enables one or more features for the logical port from the control plane.

    Detecting chains of functions that violate a constraint

    公开(公告)号:US11907222B1

    公开(公告)日:2024-02-20

    申请号:US17815369

    申请日:2022-07-27

    CPC classification number: G06F16/24547

    Abstract: In some examples, a system determines whether a chain of functions violates a constraint, based on accessing a tracking structure populated with entries as the functions are invoked by respective server processes launched during execution of a database operation, where each entry of the entries of the tracking structure identifies a respective invoked function that is associated with a corresponding program instance, and detecting, using the tracking structure, related functions that form the chain, the related functions being identified as related if associated with a same program instance. In response to determining that the chain of the functions violates the constraint, the system blocks an invocation of a further function to be added to the chain.

    DEVICE AUTHORIZATION IN AN ENTERPRISE NETWORK BASED ON WHETHER A MOBILE NUMBER IS IN A USER INFORMATION REPOSITORY

    公开(公告)号:US20240056806A1

    公开(公告)日:2024-02-15

    申请号:US17819434

    申请日:2022-08-12

    Inventor: Antoni Milton

    CPC classification number: H04W12/06 H04W12/72 H04L63/0892

    Abstract: In some examples, a system of an enterprise network sends, in response to a request for authentication transmitted in response to a request by an electronic device to access the enterprise network, an authentication request from the system to a server that is part of a carrier network. The system receives, in response to the authentication request, an authentication response that contains a value representing a mobile number for the electronic device, and checks whether the mobile number represented by the value in the authentication response is present in a user information repository. The system performs authorization of the electronic device based on the check of whether the mobile number represented by the value in the authentication response is present in the user information repository, the authorization for the electronic device to determine an access permission of the electronic device in the enterprise network.

Patent Agency Ranking