-
61.
公开(公告)号:US10735291B2
公开(公告)日:2020-08-04
申请号:US16119382
申请日:2018-08-31
Applicant: CenturyLink Intellectual Property LLC
Inventor: Ronald A. Lewis
Abstract: Novel tools and techniques are provided for implementing firewall functionalities, and, more particularly, to methods, systems, and apparatuses for implementing high availability (“HA”) web application firewall (“WAF”) functionalities. In various embodiments, a first computing system might monitor network communications between a client and a server providing access to software applications, and might determine whether latency has been introduced as a result of at least one first WAF container having been launched and whether any introduced latency exceeds a predetermined threshold, each first WAF container being tuned to a corresponding software application and protecting the software application from network attacks. Based on a determination that latency has been introduced and based on a determination that the introduced latency exceeds the predetermined threshold, one or more second WAF containers may be launched, each being tuned to the corresponding software application. Subsequently, any unused or underutilized WAF containers may be decommissioned or deleted.
-
62.
公开(公告)号:US20200036615A1
公开(公告)日:2020-01-30
申请号:US16119382
申请日:2018-08-31
Applicant: CenturyLink Intellectual Property LLC
Inventor: Ronald A. Lewis
Abstract: Novel tools and techniques are provided for implementing firewall functionalities, and, more particularly, to methods, systems, and apparatuses for implementing high availability (“HA”) web application firewall (“WAF”) functionalities. In various embodiments, a first computing system might monitor network communications between a client and a server providing access to software applications, and might determine whether latency has been introduced as a result of at least one first WAF container having been launched and whether any introduced latency exceeds a predetermined threshold, each first WAF container being tuned to a corresponding software application and protecting the software application from network attacks. Based on a determination that latency has been introduced and based on a determination that the introduced latency exceeds the predetermined threshold, one or more second WAF containers may be launched, each being tuned to the corresponding software application. Subsequently, any unused or underutilized WAF containers may be decommissioned or deleted.
-
63.
公开(公告)号:US20200026539A1
公开(公告)日:2020-01-23
申请号:US16119323
申请日:2018-08-31
Applicant: CenturyLink Intellectual Property LLC
Inventor: Ronald A. Lewis
Abstract: Novel tools and techniques are provided for implementing virtual machine (“VM”) management, and, more particularly, to methods, systems, and apparatuses for implementing VM management using hardware compression. In various embodiments, a computing system might identify one or more first virtual machines (“VM's”) among a plurality of VM's that are determined to be currently inactive and might identify one or more second VM's among the plurality of VM's that are determined to be currently active. The computing system might compress a virtual hard drive associated with each of the identified one or more first VM's that are determined to be currently inactive. The computing system might also perform or continue to perform one or more operations using each of the identified one or more second VM's that are determined to be currently active.
-
公开(公告)号:US20190012212A1
公开(公告)日:2019-01-10
申请号:US15849924
申请日:2017-12-21
Applicant: CenturyLink Intellectual Property LLC
Inventor: Ronald A. Lewis
Abstract: Novel tools and techniques are provided for implementing a distributed computing mesh, and, more particularly, for implementing a distributed computing mesh using a hierarchical framework to distribute workload across multiple computing nodes. In various embodiments, a hierarchical distributed computing mesh might be implemented using a plurality of network nodes. A first control node may assign at least one first network node as at least one second control node. The second control node might receive a computing task from the first control node. The second control node might designate additional network nodes to process one or more portions of the computing task. The second control node may then divide the computing task and send the one or more portions of the computing task to the additional network nodes for processing. The second control node may receive one or more processed portions of the computing task from the additional network nodes.
-
-
-