CONTINUOUS TESTING, INTEGRATION, AND DEPLOYMENT MANAGEMENT FOR EDGE COMPUTING

    公开(公告)号:US20210011823A1

    公开(公告)日:2021-01-14

    申请号:US17028844

    申请日:2020-09-22

    IPC分类号: G06F11/263 G06F9/445

    摘要: Various aspects of methods, systems, and use cases for testing, integration, and deployment of failure conditions in an edge computing environment is provided through use of perturbations. In an example, operations to implement controlled perturbations in an edge computing platform include: identifying at least one perturbation parameter available to be implemented with a hardware components of an edge computing system that provides a service using the hardware components; determining values, which disrupt operation of the service, to implement the perturbation parameter among the hardware components; deploying the perturbation parameters to the hardware components, during operation of the service to process a computing workload, to cause perturbation effects on the service; collecting telemetry values associated with the hardware components, produced during operation of the service that indicate the perturbation effects upon the operation of the service; and cause a computing operation to occur based on the collected telemetry values.

    STABLE TRANSFORMATIONS OF NETWORKED SYSTEMS WITH AUTOMATION

    公开(公告)号:US20220012149A1

    公开(公告)日:2022-01-13

    申请号:US17484253

    申请日:2021-09-24

    摘要: Various methods, systems, and use cases for a stable and automated transformation of a networked computing system are provided, to enable a transformation to the configuration of the computing system (e.g., software or firmware upgrade, hardware change, etc.). In an example, automated operations include: identifying a transformation to apply to a configuration of the computing system, for a transformation that affects a network service provided by the computing system; identifying operational conditions used to evaluate results of the transformation; attempting to apply the transformation, using a series of stages that have rollback positions when the identified operational conditions are not satisfied; and determining a successful or unsuccessful result of the attempt to apply the transformation. For an unsuccessful result, remediation may be performed to the configuration, with use of one or more rollback positions; for a successful result, a new restore state is established from the completion state.

    BIOMETRIC SECURITY FOR EDGE PLATFORM MANAGEMENT

    公开(公告)号:US20210021594A1

    公开(公告)日:2021-01-21

    申请号:US17032696

    申请日:2020-09-25

    IPC分类号: H04L29/06

    摘要: Various aspects of methods, systems, and use cases for biometric security for edge platform management. An edge cloud system to implement biometric security for edge platform management comprises a biometric sensor; and an edge node in an edge network, the edge node to: receive a request to access a feature of the edge node, the request originating from an entity, wherein the request comprises an entity identifier and a feature identifier; receive from the biometric sensor, biometric data of the entity; authenticate the entity using the biometric data; and in response to authenticating the entity using the biometric data, grant access to the feature based on a crosscheck to an access control list that includes entity identifiers correlated to feature identifiers, using the received entity identifier and the received feature identifier.

    MEMORY INTERLEAVING COORDINATED BY NETWORKED PROCESSING UNITS

    公开(公告)号:US20230134683A1

    公开(公告)日:2023-05-04

    申请号:US18090720

    申请日:2022-12-29

    IPC分类号: G06F12/0846 G06F12/0873

    摘要: Various approaches for configuring interleaving in a memory pool used in an edge computing arrangement, including with the use of infrastructure processing units (IPUs) and similar networked processing units, are disclosed. An example system may discover and map disaggregated memory resources at respective compute locations connected to each another via at least one interconnect. The system may identify workload requirements for use of the compute locations by respective workloads, for workloads provided by client devices to the compute locations. The system may determine an interleaving arrangement for a memory pool that fulfills the workload requirements, to use the interleaving arrangement to distribute data for the respective workloads among the disaggregated memory resources. The system may configure the memory pool for use by the client devices of the network, as the memory pool causes the disaggregated memory resources to host data based on the interleaving arrangement.