摘要:
Methods and apparatus for reconfiguring hosts in provider network environments in which hosts are evaluated to determine if steps of a full rebuild can be skipped. The hosts may implement slots of different types for virtual machines (VMs). Upon detecting that slots of a particular type are needed, a host that implements slots of another type may be selected for reconfiguration. The host may be evaluated to determine if one or more steps of a full rebuild can be skipped. The host may then be reconfigured to implement slots of the target type according to results of the evaluation. In at least some reconfigurations, at least one step of a full rebuild procedure is not performed for the respective host. Results of previous reconfigurations may be fed back into the evaluation process and used as one of the criteria for determining if steps can be skipped.
摘要:
Techniques and apparatuses for providing wallet server information to an entity using a real-time mobile wallet server (MWS) are disclosed herein. The MWS may receive a request for personal information from an entity. The MWS may then display to a user a summary of the request, a list of selections available in the wallet server that may satisfy the request, and a list of selectable response options for the user to choose to respond to the entity. In some aspects, the wallet server may store username and associated passwords, payment information, and/or contact information. In further aspects, the MWS may generate limited-use payment information associated with existing payment information. The MWS may communicate ad hoc messaging to the entity using voice-based or real-time text-based communications over an established communication link between the MWS and entity.
摘要:
Various embodiments of a system and method for message-based purchasing are described. The system and method for message-based purchasing may include a message-based purchase service configured to determine that a selection has been performed through a network-based interface. Such selection may be indicative of one or more items offered for sale via the network-based interface. The message-based purchase service may be configured to, in response to the selection of one or more items, send to a communication device, a message indicating a code corresponding to the selection. The message-based purchase service may receive from the communication device through a communication channel that does not include the network-based interface, a message including the code. The message-based purchase service may be configured to, in response to determining that the message received from the communication device includes the code, generate a purchase request for the one or more previously selected items.
摘要:
A technology is described for assigning a logical private network address to a computing instance. An example method may include obtaining a preserved logical private network address associated with a customer account so that the preserved logical private network address may be assigned as a logical private network address to a computing instance located in a computing service environment. The logical private network address may be used for network communications within a physical host containing the computing instance and the logical private network address may translate to a physical private network address used for network communications outside of the physical host and within the computing service environment. A network address record for the computing instance may be identified that associates the logical private network address with the physical private network address, and the network address record may be updated by setting the preserved logical private network address associated with the customer account as the logical private network address.
摘要:
Systems and methods for the management of migrations of virtual machine instances are provided. In response to a request to migrate a virtual machine instance, a migration manager may provide estimates regarding the requested migration before initiating the migration. During the migration process, the migration manager may report status or request instructions regarding the migration based on various determined migration events, thereby facilitating external control of the migration process.
摘要:
Technology for migration of a computing instance is provided. In one example, a method may include receiving instructions to initiate migration of the computing instance from a first host to a second host. A first message for sending to the first host may be generated which includes instructions to send data representing the computing instance to the second host. The first message may further include encryption information for use in deriving at least one key for encrypting communications to the second host from the first host. A second message for sending to the second host may be generated which includes instructions to receive the data representing the computing instance from the first host. The second message may further include information for use in deriving at least one key for decrypting communications from the first host. The first and second messages may be sent to the respective first and second hosts.
摘要:
A provider network may implement compute instance migrations across availability zones. Compute instances may be located in a particular availability zone of provider network that is implemented across multiple availability zones. A request may be received, from a client of the provider network or other component of the provider network, to migrate a compute instance that is currently operating for a client and located in one availability zone to another availability zone. A destination compute instance may be provisioned in the other availability zone based on a configuration of the currently operating compute instance. In some embodiments, other computing resources utilized by the currently operating compute instance, such as data storage resources, may be moved to the other availability zone. Migration may be completed such that the destination compute instance is currently operating for the client and the compute instance is not.
摘要:
A method for migrating a virtual machine instance within a service provider environment may include determining to migrate an instance running on a source server computer, the source server computer associated with a plurality of hardware resource settings. A target server computer may be identified based at least in part on the plurality of hardware resource settings. A local data volume of the target server computer may be synchronized with a local data volume of the source server computer. A notification may be sent to the user, indicating migration of the instance can be initiated. Upon receiving a reboot request, disconnecting at least one network interface attached to the instance. The instance may be terminated from running on the source server computer, and may be launched on the target server computer using the synchronized local data volume and instance state data.
摘要:
A mobile payment network may include a server receiving a request for payment from a device, where the request may include information related to a location for the device. The information related to location information for the device that is included within the request may then be used for deriving location information for the device. Given the location information for the device, a distance between the location information and a geographic area may be determined. The distance between the location information for the device and the geographic area may then serve, at least in part, as the basis for approving the request for payment.
摘要:
Disclosed are various embodiments for configurable security policies in radio-based networks. In one embodiment, a security event detection rule or a security event mitigation rule for a radio-based network is accessed. The radio-based network includes a radio access network and an associated core network. At least a portion of the radio-based network is operated by a cloud provider on behalf of an organization. A security event is detected based at least in part on the security event detection rule. At least one action is performed in response to the security event based at least in part on the security event mitigation rule.