Abstract:
Concepts and technologies are disclosed herein for a virtualization platform for creating, deploying, modifying, and relocating applications. A computing platform can receive a software package including software code from a requestor. The software code can be analyzed to identify functions performed by an application that corresponds to the software code. First and second functions can be virtualized and containerized, and a computing environment that is to host an application including the containers can be identified. Deployment of the application can be triggered.
Abstract:
The concepts and technologies disclosed herein are directed to quantum tampering threat management. According to one aspect of the concepts and technologies disclosed herein, a quantum security manager (“Q-SM”) can monitor a plurality of quantum channels for tampering. The Q-SM can detect tampering on a quantum channel of the plurality of quantum channels. The Q-SM can provide tampering monitoring statistics to a software-defined network (“SDN”) that, in turn, notifies a quantum security operations center (“Q-SOC”) about the tampering on the quantum channel. The Q-SM can receive threat mitigation instructions from the Q-SOC. The threat mitigation instructions can instruct the Q-SM how to counter the tampering on the quantum channel. The Q-SM can perform one or more actions in accordance with the threat mitigation instructions to counter the tampering on the quantum channel.
Abstract:
Aspects of the subject disclosure may include, for example, a method in which a processing system actuates a control processor connected to a network, and configures the control processor to receive signals from equipment of a service provider, so that the control processor is enabled to control remote devices. The processing system selects a device, configures the selected device for control by the control processor, and selects a streaming service to be associated with the selected device. The streaming service delivers audiovisual content in a first stream and provides, via an application programming interface of the streaming service, a control command to the control processor in a second stream. The control processor translates the control command to a device command and transmits the device command to control the selected device. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, a method in which a processing system actuates a control processor connected to a network, and configures the control processor to receive signals from equipment of a service provider, so that the control processor is enabled to control remote devices. The processing system selects a device, configures the selected device for control by the control processor, and selects a streaming service to be associated with the selected device. The streaming service delivers audiovisual content in a first stream and provides, via an application programming interface of the streaming service, a control command to the control processor in a second stream. The control processor translates the control command to a device command and transmits the device command to control the selected device. Other embodiments are disclosed.
Abstract:
The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.
Abstract:
Concepts and technologies are disclosed herein for providing a transaction validation service. A device can receive a request to validate a transaction requested by a user device, where the transaction can be performed by an application and where the request to validate the transaction can be obtained with a first hash that is created by the user device. The first hash can include a hash of transaction data that is hashed using data stored on the user device. The device can receive an indication that the transaction has been approved, obtain a second hash of the transaction data that is hashed using the data stored on the user device, and determine, based on the first hash and the second hash, whether the transaction should be allowed or blocked.
Abstract:
Concepts and technologies are disclosed herein for a virtualization platform for creating, deploying, modifying, and relocating applications. A computing platform can receive a software package including software code from a requestor. The software code can be analyzed to identify functions performed by an application that corresponds to the software code. First and second functions can be virtualized and containerized, and a computing environment that is to host an application including the containers can be identified. Deployment of the application can be triggered.
Abstract:
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
Abstract:
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
Abstract:
The concepts and technologies disclosed herein are directed to a website verification service. A system can receive, from a web server that hosts a website, a query for a set of authentication credentials (“credentials”) to be used to verify that the website is trustworthy. The system can generate and provide the credentials to the web server. The web server can, in turn, provide the credentials to a web browser device for presentation to a user via a web browser application executing on the web browser device. The system also can provide the credentials to a verifier device. The verifier device can present the credentials to the user via a verifier application executing on the verifier device. The user can compare the credentials presented via the web browser application to the credentials presented via the verifier application executing on the verifier device to determine whether the website can be trusted.