-
公开(公告)号:US20200073739A1
公开(公告)日:2020-03-05
申请号:US16115408
申请日:2018-08-28
Applicant: Amazon Technologies, Inc.
Inventor: Neha RUNGTA , Temesghen KAHSAI AZENE , Pauline Virginie BOLIGNANO , Kasper Soe LUCKOW , Sean McLAUGHLIN , Catherine DODGE , Andrew Jude GACEK , Carsten VARMING , John Byron COOK , Daniel SCHWARTZ-NARBONNE , Juan Rodriguez HORTALA
Abstract: A constraint solver service of a computing resource service provider performs evaluations of logic problems provided by the service provider's users and/or services by deploying a plurality of constraint solvers to concurrently evaluate the logic problem. Each deployed solver has, or is configured with, different characteristics and/or capabilities than the other solvers; thus, the solvers can have varying execution times and ways of finding a solution. The service may control execution of the solvers using virtual computing resources, such as by installing and configuring a solver to execute in a software container instance. The service receives solver results and delivers them according to a solution strategy such as “first received” to reduce latency or “check for agreement” to validate the solution. An interface allows the provider of the logic problem to select and configure solvers, issue commands and modifications during solver execution, select the solution strategy, and receive the solution.
-
公开(公告)号:US20190278928A1
公开(公告)日:2019-09-12
申请号:US15913741
申请日:2018-03-06
Applicant: Amazon Technologies, Inc.
Inventor: Neha RUNGTA , Pauline Virginie BOLIGNANO , Catherine DODGE , Carsten VARMING , John COOK , Rajesh VISWANATHAN , Daryl Stephen COOKE , Santosh KALYANKRISHNAN
Abstract: A security assessment system of a computing resource service provider performs security analyses of virtual resource instances, such as virtual machine instances and virtual data store instances, to verify that certain invariable security requirements are satisfied by the instances' corresponding configurations; these analyses are performed before the instances are provisioned and deployed. If the security checks, which can be selected by the administrator of the resources, fail, the requested resources are denied deployment. Notifications identifying the faulty configuration(s) may be send to the administrative user. A template for launching virtual resource instances may be transformed into an optimized template for performing the pre-deployment security checks, such as by storing information needed to perform the checks within the optimized template itself.
-