Patent
Software container registry service
Anthony Joseph Suarez,Scott Kerns Windsor,Nare Hayrapetyan,Daniel Robert Gerdesmeier,Pooja Kalpana Prakash +4 more
Reads0
Chats0
TLDR
In this paper, a set of layers of a software image is requested to be stored in the first data store associated with a customer of a computing resource service provider, and the request is validated based on a security token included with the request.Abstract:
A request to store, in first data store associated with a customer of a computing resource service provider, a software image is received, the request including a set of layers of the software image to be stored. As a result of successful authentication of the request, based at least in part on a security token included with the request, a subset of layers of the software image that have not previously been stored in the first data store are determined, based at least in part on first metadata obtained from a second data store, the subset of layers in the first data store are stored, second metadata about the subset of layers are stored in the second data store, and the software image is caused to be launched in a software container of an instance based at least in part on the subset of layers.read more
Citations
More filters
Patent
System for securing software containers with embedded agent
Amir Gerebe,Rani Osnat +1 more
TL;DR: In this article, the authors present a computer-implemented method of providing security for a software container, according to which an example of the present disclosure includes, receiving a software containers image with a software application and security agent that is separate from the software application.
Patent
Immutable cryptographically secured ledger-backed databases
Christopher Richard Jacques de Kadt,Timothy William Bray,Trevor Simon Roger Dyck,Matthew J. Campagna,Allan Henry Vermeulen +4 more
TL;DR: In this paper, the semantics of the database table elements, as well as the relationships between various objects therein, may be defined and enforced by a schema, a database engine, and/or an application layer.
Patent
Stateless instance backed mobile devices
TL;DR: In this paper, a service provider may provide a companion container instance associated with a mobile device in order to facilitate operation of the mobile device, which is associated in a database operated by the service provider.
Patent
Sharing container images between mulitple hosts through container orchestration
Tatsuhiro Chiba,Hitomi Takahashi +1 more
TL;DR: In this paper, a computer-implemented method is provided for container sharing and scheduling in an environment having a plurality of nodes, which includes deploying a container management service system that manages a list of layered images.
Patent
Methods, systems, and portal using software containers for accelerating aspects of data analytics application development and deployment
TL;DR: In this paper, the authors present methods and systems for accelerating the development and distribution of data science workloads, including a consistent, portable and pre-configured data science workspace for development of Data Science containers allowing for the creation of a standardized, modular and reusable library of containers that can be maintained, extended and reused in a clear and repeatable manner.
References
More filters
Journal ArticleDOI
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
TL;DR: This paper defines Cloud computing and provides the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs), and provides insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA) oriented resource allocation.
Patent
Intelligent electronic appliance system and method
TL;DR: In this paper, a set top box for interacting with broadband media streams, with an adaptive user interface, content-based media processing and/or media metadata processing, and telecommunications integration, is presented.
Proceedings ArticleDOI
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
TL;DR: This paper describes the design and implementation of Linux-VServer, an alternative to hypervisors that is better suited to scenarios that require system virtualization with high degrees of both isolation and efficiency, and shows how Linux- VServer provides comparable support for isolation and superior system efficiency.
Patent
Systems and methods of secure data exchange
Christopher Todd Ford,Visal Chandrakant Acharya,Richard David Anstey,Wasif Qayyum Awan,Amir M. Azmi,Selom Harry Azuma,Wade Michael Callison,Clement Cazalot,Mayank Choudhary,Peter W. Cleary,Benedict Robert Dsilva,Fuat Ertunc,Simon Genzer,John William Giudice,Douglas McLean Gordon,Jonathan Gorin,Mushegh Hakhinian,John Held,Ronald W. Hovsepian,Ganesh Kannan,John Landy,David Scott Lindsay,Dario R. Lirio,Himali Mahajan,Olivier Mangez,Kevin L. McCarthy,Kevin McNulty,Jerry Lee Meyer,Anupam Miharia,Constantin Miroslav,Andrew James Mitchell,Uli P. Mittermaier,Harshal Morparia,Alex Negrea,Yana Nikolayeva,Madhavi Parimi,Matthew A. Porzio,Vedang Shailesh Purohit,Liviu Rozin,Godsway Sappor,Glenn Schwartz,Fahim Siddiqui,Nanu Swamy,Paul Tearnen,Karla Toyloy-Mattera,Sudhakar Velamoor,Margin Vora,Michael Joseph Waluk,Charlie Weiblen,Peter Wenzel,Jeffrey Chi Wong,Tony Yip,Khurram Ghafoor +52 more
TL;DR: In this article, improved capabilities are described for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment through a secure exchange facility managed by an intermediate organizational entity amongst users of a plurality of other organizational entities.
Patent
Digital information infrastructure and method for security designated data and with granular data stores
Ron M. Redlich,Martin A. Nemzow +1 more
TL;DR: In this paper, a distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and granular data, each with respective access controls thereat.
Related Papers (5)
Gateway for controlling mobile device access to enterprise resources
Waheed Qureshi,John M. McGinty +1 more