Abstract:
A computing system may be configured to receive a plurality of computing tasks for execution. The computing system may determine a first configuration setting for a first computing task and a second configuration setting, which is different from the first configuration setting, for a second computing task. A first computing node and a second computing node of the computing system may be booted according to the first and second configuration settings, and loaded with the first and second computing tasks for execution, respectively. After the first computing task finishes on the first computing node, the computing system may determine whether another computing task associated with the first configuration setting has not be executed, and when there is no such computing task remaining unexecuted, the computing system may reboot the first computing node according to a third configuration setting and load a third computing task into the first computing node for execution.
Abstract:
A computing system may be configured to receive a plurality of computing tasks for execution. The computing system may determine a first configuration setting for a first computing task and a second configuration setting, which is different from the first configuration setting, for a second computing task. A first computing node and a second computing node of the computing system may be booted according to the first and second configuration settings, and loaded with the first and second computing tasks for execution, respectively. After the first computing task finishes on the first computing node, the computing system may determine whether another computing task associated with the first configuration setting has not be executed, and when there is no such computing task remaining unexecuted, the computing system may reboot the first computing node according to a third configuration setting and load a third computing task into the first computing node for execution.
Abstract:
A method in one embodiment includes authenticating a first agent to an on board unit (OBU) of a vehicle if the first agent validates a first set of one or more authentication requirements and identifying a first identity profile corresponding to the first agent. The method also includes determining a role of the first agent in the vehicle and configuring the vehicle with the first identity profile, where the vehicle is configured based, at least in part, on the role of the first agent. In this embodiment, the first identity profile is one of a plurality of identity profiles provisioned on the OBU. In specific embodiments, each one of a plurality of agents corresponds to a respective one of the plurality of identity profiles, and includes one or more of a human agent, a machine device, a software agent, an authorized entity, and a mobile device.