Autonomous organization and role selection of homogenous workers

    公开(公告)号:US12130713B2

    公开(公告)日:2024-10-29

    申请号:US17583737

    申请日:2022-01-25

    发明人: Ian Ferreira Max Alt

    摘要: A method for configuring replicas in a distributed computing system is disclosed. In one example embodiment, a plurality of replicas with associated bootstrap modules may be created. The same bootstrap module code may be used for each replica, thereby simplifying configuration. Using the bootstrap module, the replicas may automatically configure themselves and self-assign a role for a set of predetermined roles such as master and worker. The bootstrap module may check a predetermined location such as a shared network folder for earlier registration entries and then self-select based on the remaining available roles. The bootstrap module may also store its own registration entry to inform subsequent replicas of the role and network address for the current replica so that they may self-configure correctly.

    Systems, apparatuses, methods, and computer program products for parallel processing of real-time data and accumulated data

    公开(公告)号:US12130696B1

    公开(公告)日:2024-10-29

    申请号:US18300303

    申请日:2023-04-13

    IPC分类号: G06F11/00 G06F11/07

    摘要: Systems, apparatuses, methods, and computer program products for parallel processing of real-time data and accumulated data are provided. For example, a method provided herein may include determining that a computing device is affected by a fault during a first time period. The method may include receiving real-time data from the computing device via a network during a second time period. The method may include receiving accumulated data from the computing device via a network during the second time period. The method may include directing the real-time data to a real-time data processing unit and the accumulated data to an accumulated data processing unit. The method may include processing the real-time data with the real-time data processing unit and the accumulated data with the accumulated data processing unit. The method may include routing the real-time data and the accumulated data following the processing to one or more databases.

    Collecting crash-related information for a secure workspace

    公开(公告)号:US12130695B2

    公开(公告)日:2024-10-29

    申请号:US18164720

    申请日:2023-02-06

    IPC分类号: G06F11/00 G06F11/07

    摘要: Crash-related information for a secure workspace can be collected. An extended paging table (EPT) handler can be registered in a hypervisor used to deploy a secure workspace on a user computing device. When a secure workspace is about to crash, the EPT handler can be invoked to collect crash-related information about the secure workspace and the hypervisor on which the secure workspace is hosted. After the crash and when the secure workspace is again deployed, a workspace agent running inside the secure workspace can collect additional crash-related information. All of this crash-related information can be communicated to a host agent and relayed to a management service on a management server to allow the crash-related information to be reviewed and analyzed.

    Dynamically enabling a security feature of a wireless communication device based on environmental context

    公开(公告)号:US12120516B2

    公开(公告)日:2024-10-15

    申请号:US17553373

    申请日:2021-12-16

    CPC分类号: H04W12/12

    摘要: Wireless communication device and methods for operating the same. One wireless communication device includes an electronic processor configured to operate the wireless communication device in a first security mode of a plurality of available security modes. The electronic processor is also configured to evaluate one or more environmental context parameters associated with the wireless communication device, determine, based on the environmental context parameters, whether communications of the wireless communication device are susceptible to a potential cyber-security threat, and, in response to determining the communications of the wireless communication device are susceptible to the potential cyber-security threat, transition the wireless communication device to a second security mode of the plurality of available security modes to determine whether the potential cyber-security threat is present, wherein at least one selected from a group consisting of the frequency scanning feature and the frequency hopping feature is enabled in the second security mode.