US 12,348,374 B2
Container based limit enforcement
Tomer Shachar, Beer-Sheva (IL); Yevgeni Gehtman, Modi'in (IL); and Ophir Jehoshua Buchman, Raanana (IL)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 17, 2023, as Appl. No. 18/488,539.
Prior Publication US 2025/0126018 A1, Apr. 17, 2025
Int. Cl. H04L 41/0895 (2022.01); H04L 41/0826 (2022.01)
CPC H04L 41/0895 (2022.05) [H04L 41/0826 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing operation of endpoint devices of edge infrastructure, the method comprising:
obtaining a container definition for a containerized service requested by a requestor;
instantiating a first container based on a first portion of the container definition, the first portion of the container definition being based on a requestor activity profile for the requestor, the requestor activity profile being based on at least two measured activity profiles of users classified as having a same persona, the requestor being one of the users, and the at least two measured activity profiles specify characteristics of the users of corresponding endpoint devices of the endpoint devices used to provide other instances of the containerized service to the users;
instantiating a second container hosted by the first container to obtain an instance of the containerized service, the second container being based on a second portion of the container definition; and
providing computer implemented services using the containerized service hosted by an endpoint device of the endpoint devices.