H04L41/142

Application service configuration system
11533226 · 2022-12-20 · ·

A computing system implementing an application service can receive network data from computing devices of clients of the application service. The system can determine, from the network data, that a network latency for a subset of the computing devices crosses above a latency threshold. Based on determining that the subset of computing devices utilize a common network service provider, the system can transmit a set of configuration signals to the subset of computing devices, which modify a set of default application configurations of the designated application to compensate for the network latency.

Application service configuration system
11533226 · 2022-12-20 · ·

A computing system implementing an application service can receive network data from computing devices of clients of the application service. The system can determine, from the network data, that a network latency for a subset of the computing devices crosses above a latency threshold. Based on determining that the subset of computing devices utilize a common network service provider, the system can transmit a set of configuration signals to the subset of computing devices, which modify a set of default application configurations of the designated application to compensate for the network latency.

Network probe placement optimization

Intelligent network probe placement optimization (e.g., using a computerized tool) is enabled. A method can comprise determining, from an inventory database, physical interfaces and service paths for data traffic to be monitored, according to a two-way active management protocol, with respect to network interfaces between cloud compute elements in a leaf-spine cloud fabric and radio access network equipment, based on the cloud compute elements, determining directed acyclic graph information representative of a directed acyclic graph of connections between the cloud compute elements and other cloud compute elements in the leaf-spine cloud fabric other than the cloud compute elements, and based on the directed acyclic graph information, determining a number and a distribution of probes to be employed at at least some of the physical interfaces and the service paths to monitor a parameter of the data traffic according to the two-way active management protocol.

Network probe placement optimization

Intelligent network probe placement optimization (e.g., using a computerized tool) is enabled. A method can comprise determining, from an inventory database, physical interfaces and service paths for data traffic to be monitored, according to a two-way active management protocol, with respect to network interfaces between cloud compute elements in a leaf-spine cloud fabric and radio access network equipment, based on the cloud compute elements, determining directed acyclic graph information representative of a directed acyclic graph of connections between the cloud compute elements and other cloud compute elements in the leaf-spine cloud fabric other than the cloud compute elements, and based on the directed acyclic graph information, determining a number and a distribution of probes to be employed at at least some of the physical interfaces and the service paths to monitor a parameter of the data traffic according to the two-way active management protocol.

Monitoring the Performance of a Plurality of Network Nodes

A computer-implemented method and apparatus for monitoring the performance of a plurality of network nodes interconnected in a multi-hop arrangement using at least one node performance assessment threshold is described. A plurality of data sets is obtained. A data set comprises a respective value of a performance metric for each of the plurality of network nodes. Each of the plurality of data sets is classified as normal or abnormal by comparing the respective values of the performance metric of each of the plurality of network nodes to a corresponding normality threshold, thus providing a plurality of classified data sets. The plurality of classified data sets is processed using a machine-learning algorithm in order to derive, for at least one network node of the plurality of network nodes, a node performance assessment threshold indicative of a value of the performance metric of the at least one node at which the plurality of network nodes has a predetermined likelihood of being classified as normal.

Monitoring the Performance of a Plurality of Network Nodes

A computer-implemented method and apparatus for monitoring the performance of a plurality of network nodes interconnected in a multi-hop arrangement using at least one node performance assessment threshold is described. A plurality of data sets is obtained. A data set comprises a respective value of a performance metric for each of the plurality of network nodes. Each of the plurality of data sets is classified as normal or abnormal by comparing the respective values of the performance metric of each of the plurality of network nodes to a corresponding normality threshold, thus providing a plurality of classified data sets. The plurality of classified data sets is processed using a machine-learning algorithm in order to derive, for at least one network node of the plurality of network nodes, a node performance assessment threshold indicative of a value of the performance metric of the at least one node at which the plurality of network nodes has a predetermined likelihood of being classified as normal.

VEHICLE CUSTOMIZED CONNECTIVITY AUGMENTED MAPPING FOR NAVIGATION AND DIAGNOSIS
20220400068 · 2022-12-15 ·

Using key performance indicator (KPI) data sensed by vehicles is provided. A data server is programmed to receive, over a wide-area network from a plurality of vehicles, connectivity data of modems of the plurality of vehicles to the wide-area network, the connectivity data indicating KPI data, which road segment was being traversed when the KPI data was captured, and a time period during which the KPI data was captured. The data server is further programmed to identify outlier data elements in the KPI data using outlier detection criteria; and compile the KPI data per road segment and time period excluding the outlier data elements.

PROACTIVE ASSET FAILURE REMEDIATION UTILIZING CONFORMAL ASSET STATE PREDICTION

An apparatus comprises a processing device configured to identify a given one of one or more assets in an information technology infrastructure associated with a support indicator associated with a priority level, and to obtain information characterizing state transitions of the one or more assets. The processing device is also configured to determine, based at least in part on a current state of the given asset identified utilizing the obtained information, a probability of the given asset transitioning to each of a plurality of states and to select, based at least in part on the determined probabilities, one of the plurality of states as a predicted future state of the given asset utilizing conformal prediction. The processing device is further configured to modify the priority level of the support indicator associated with the given asset based at least in part on the predicted future state of the given asset.

METHOD AND SYSTEM FOR PERFORMING DATA PROTECTION SERVICES USING A SUBSYSTEM LEVEL FEEDBACK MECHANISM
20220400064 · 2022-12-15 ·

Techniques described herein relate to a method for managing performances of data protection services. The method may include obtaining subsystem statistics from subsystems; in response to obtaining the subsystem statistics, making a determination that the subsystem statistics indicate a concurrency adjustment; and in response to the determination, assigning an adjusted concurrency to the subsystems based on the subsystem statistics and priorities; and initiating performance of data protection services using the adjusted concurrency.

Model for identifying the most relevant person(s) for an event associated with a resource

Disclosed herein is a system that implements a model for automatic discovery and identification of a person who is most relevant to handle a notification generated for a resource based on a triggered event. The model accesses an activity log for the resource to identify operations that are relevant to a type of the event. The operations are performed by different users (e.g., owners of the shared resource). The model then calculates an operation relevance score for each of the operations and a user relevance score for each of the different users. The user relevance scores are used to identify a most relevant person from the different users. Contact information for the most relevant person (e.g., name, email address, phone number) is added to the notification so that a person that first views the notification can efficiently forward the notification to the person best positioned to deal with the event.