Abstract:
Dynamic multi-network security controls are provided herein. A method can include receiving a report of malicious network traffic observed by first network equipment operating in a first communication network, where the report indicates a second communication network distinct from the first communication network as an originating network of the malicious network traffic, identifying second network equipment operating in the second communication network as a source of the malicious network traffic, and based on the identifying, blocking communications from the second network equipment for a defined time interval.
Abstract:
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of devices of a network, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with data generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device.
Abstract:
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of devices of a network, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with data generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device.
Abstract:
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with fourth information generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device.
Abstract:
Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with fourth information generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device.
Abstract:
Methods, systems, and products bookmark gaming applications. When a player wishes to pause a gaming application, a bookmark may be created. The bookmark identifies a location in the gaming application at which play is paused. Play may then be resumed from the bookmark, whether at a same device or at a different device.
Abstract:
Dynamic multi-network security controls are provided herein. A method can include receiving, via an internet protocol network, a report of malicious network traffic observed by first network equipment operating in a first communication network communicatively coupled to the internet protocol network, wherein the report indicates a second communication network, communicatively coupled to the internet protocol network and distinct from the first communication network, as an originating network of the malicious network traffic; in response to receiving the report, identifying second network equipment operating in the second communication network as a source of the malicious network traffic; and causing a control device associated with the second communication network to prevent the second network equipment from transmitting network traffic, comprising the malicious network traffic, outside of the second communication network via the internet protocol network for a defined time interval.
Abstract:
Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.
Abstract:
Methods, systems, and products bookmark gaming applications. When a player wishes to pause a gaming application, a bookmark may be created. The bookmark identifies a location in the gaming application at which play is paused. Play may then be resumed from the bookmark, whether at a same device or at a different device.
Abstract:
Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.