3113 patents
Page 7 of 156
Utility
Systems and methods for scanning images for vulnerabilities
21 Nov 23
In one embodiment, a method includes extracting, by a vulnerability scanning tool, a plurality of images from one or more pods running within a cluster.
Alexei Kravtsov, Idan Frimark, Erez Fishhimer
Filed: 1 Jun 21
Utility
Extending machine learning workloads
21 Nov 23
In one embodiment, a device presents information regarding an upstream machine learning workload and a downstream machine learning workload via a user interface.
Myungjin Lee, Harshit Daga, Ramana Rao V. R. Kompella
Filed: 30 Nov 21
Utility
Analyzing telemetry data to track progress through an experience lifecycle and provide intelligent lifecycle-based information for computing solutions
21 Nov 23
Techniques for collecting telemetry data, indicating usage of a computing-based solution hosted in a computing resource network, to ascertain a stage of progression through an experience lifecycle for the computing-based solution, and to generate data for populating lifecycle templates with content for progressing from the stage to which the user account has progressed to the next stage of the experience lifecycle, to include on a user interface for display on a computing device associated with a user account.
Vasudha Venkataraman, Joshua David Suhr, Jonathan Sturgis Leary, Ramit Kanda
Filed: 9 Feb 23
Utility
Adaptive background in video conferencing
21 Nov 23
Methods are provided in which a collaboration server connects at least two participants via respective user devices to a collaboration session.
Zhaoyi Jin, Hongling Cen, Bhargavkumar Ghanshyamlal Pandya, Yasi Xi, Sebastian Jeuk, Maria Soledad Palmero, Gonzalo Salgueiro
Filed: 21 Mar 22
Utility
Application specific network slices
21 Nov 23
Disclosed are systems, apparatuses, methods, and computer-readable media for participating in a meeting through an application provider using application-specific network slices.
Rajesh Indira Viswambharan, Ram Mohan Ravindranath, Faisal Siyavudeen, Vinay Saini
Filed: 25 Oct 21
Utility
Zero-touch deployment (ZTD) with adaptive network control policies
21 Nov 23
The present disclosure is directed to systems and techniques for providing zero-touch deployment (ZTD) and/or adaptive network traffic control policy management for deployed Internet-of-Things (IoT) devices.
Manoj Kumar Kushwaha, Scott Taft Potter, David Scott McCowan, Shailendra Bhargava
Filed: 27 Mar 23
Utility
Discovering and grouping application endpoints in a network environment
21 Nov 23
An example method for discovering and grouping application endpoints in a network environment is provided and includes discovering endpoints communicating in a network environment, calculating affinity between the discovered endpoints, and grouping the endpoints into separate endpoint groups (EPGs) according to the calculated affinity, each EPG comprising a logical grouping of similar endpoints for applying common forwarding and policy logic according to logical application boundaries.
Sachin Waman Danait, Kannan Ponnuswamy, Paul John Lesiak
Filed: 28 Sep 22
Utility
Check-pointing ACI network state and re-execution from a check-pointed state
21 Nov 23
Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment.
Divjyot Sethi, Chandra Nagarajan, Advait Dixit, John Thomas Monk, Gabriel Cheukbun Ng, Ramana Rao Kompella, Sundar Iyer
Filed: 4 Dec 20
Utility
Dynamic AI-driven split tunneling policies for remote teleworkers
21 Nov 23
In one embodiment, a device obtains path probe data between one or more end-user sites and an online application.
Michal Wladyslaw Garcarz, Jean-Philippe Vasseur, Vinay Kumar Kolar
Filed: 20 Oct 21
Utility
Complexity ranking in network device policies
21 Nov 23
In one embodiment, an illustrative method herein comprises: determining, by a process, for each group of policies configured across a plurality of network devices in a computer network, an information set having a list of all policy components used for each group and which policies within each group have which particular policy components of the list of all policy components used for that group; performing, by the process, a comparative analysis of similarity and component variance on policies within each group based on the information set; deriving, by the process, an overall complexity indicator for each group based on the comparative analysis; and providing, from the process to an assessment interface, a ranking of each group as compared to other groups of policies within the computer network based on their respective overall complexity indicator.
Derek William Engi, Gonzalo Salgueiro, Ravi Prakash Garg
Filed: 24 Aug 22
Utility
Network node-to-node connectivity verification including data path processing of packets within a packet switching device
21 Nov 23
In one embodiment, network node-to-node connectivity verification is performed in a network including data path processing of packets within a packet switching device.
Rajagopal Venkatraman, Rajeev Kumar, Roberto Mitsuo Kobo, Vikash Agarwal
Filed: 5 Sep 21
Utility
Fast redirect of traffic when pods fail
21 Nov 23
Systems, methods, and devices are disclosed for re-routing network traffic directed to a pod device.
Giles Douglas Yorke Heron, Edward A. Warnicke
Filed: 19 Dec 18
Utility
Adaptive selection of network paths based on long-term predictions of user experience
21 Nov 23
In one embodiment, a device predicts, for each of a set of paths via which traffic for an online application can be routed, a distribution of an application experience metric for the online application.
Grégory Mermoud, Jürg Nicolaus Diemand, Gad Miller, Jean-Philippe Vasseur
Filed: 13 Apr 22
Utility
Systems and methods for asymmetrical peer forwarding in an SD-WAN environment
21 Nov 23
In one embodiment, a method includes receiving, by a first node of a node cluster in a software-defined wide area network (SD-WAN), traffic from a wide area network (WAN), assigning, by the first node of the node cluster, flow ownership of the traffic to the first node, and communicating, by the first node of the node cluster, the traffic to a local area network (LAN).
Laxmikantha Reddy Ponnuru, Arul Murugan Manickam, Michael David Tracy, Kannan Kumar, Hamzah Kardame
Filed: 8 Mar 22
Utility
Unlocking computing resources for decomposable data centers
21 Nov 23
Techniques for sending Compute Express Link (CXL) packets over Ethernet (CXL-E) in a composable data center that may include disaggregated, composable servers.
Chakradhar Kar, Sagar Borikar, Ramesh Sivakolundu, Ayan Banerjee, Anant Thakar
Filed: 8 Feb 23
Utility
Method for reduced programming of selective multicast routes in EVPN fabric
21 Nov 23
At a provider edge (PE) router of PE routers of an Ethernet virtual private network (EVPN) configured to implement a border gateway protocol (BGP): receiving, from a multicast receiver, a multicast join for multicast traffic originated from a multicast source; identifying a next hop PE router for the multicast source; generating an EVPN route to the PE router, the EVPN route including an EVPN instance-route target that identifies the EVPN, and a specifically targeted route target that identifies the next hop PE router and that is configured to override the EVPN instance-route target to cause only the next hop PE router, and not any other of the PE routers, to import the EVPN route, when the EVPN route is advertised across the EVPN to the PE routers; and advertising the EVPN route across the EVPN to the PE routers.
Mankamana P. Mishra, Ali Sajassi, Arvind Venkateswaran, Jayashree Subramanian, Patrice Brissette, Satya Ranjan Mohanty
Filed: 26 Oct 21
Utility
Automatic encryption for cloud-native workloads
21 Nov 23
Techniques for routing service mesh traffic based on whether the traffic is encrypted or unencrypted are described herein.
Kyle Andrew Donald Mestery, Vincent E. Parla
Filed: 28 Oct 21
Utility
Peripheral landscape and context monitoring for user-identify verification
21 Nov 23
Disclosed are methods, systems, and non-transitory computer-readable media for determining a trust score associated with a user, comprising detecting entities near a user device operated by the user; calculating the trust score for the user based on a policy that incorporates data about the entities near the user device, the trust score being a score that is indicative of a trust worthiness of data received from the user device, wherein trusted entities near the user device result in an increased trust score, and untrusted entities near the user device result in a decreased trust score; and permitting access to a resource when the trust score is above a threshold.
Thomas Szigeti, David John Zacks, Frank Michaud, Carlos M. Pignataro
Filed: 5 Feb 21
Utility
Secure creation of application containers for fifth generation cellular network slices
21 Nov 23
Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices.
Robert Edgar Barton, Russell Paul Gyurek, Jerome Henry
Filed: 12 Jan 23
Utility
Inter-AMF connected mode handover optimization
21 Nov 23
A target Access and Mobility Management Function (AMF) switches the path for network traffic to a User Equipment (UE) in an inter-AMF mobility event.
Anal Srivastava, Sangram Kishore Lakkaraju
Filed: 8 Nov 21