Patent classifications
H04L41/5061
REMOTE HARDWARE EXECUTION SERVICE WITH CUSTOMER CONSENTED DEBUGGING
A system coordinates with remote hardware to execute customer workloads. The system uses an architecture for ensuring trust to ensure that debugging is not performed at the remote hardware while the customer workload is being executed on the remote hardware without customer consent. For example, debugging at the remote hardware may enable an entity performing the debugging to view certain aspects of the customer's workload. The architecture for ensuring trusts uses a shared secret to ensure customer consent is given before debugging can be performed while the customer's workload is being executed on the remote hardware.
METHODS AND APPARATUS TO PROVIDE NETWORK PROVIDER RECOMMENDATIONS BASED ON DEMOGRAPHICS
Methods, apparatus, systems, and articles of manufacture are disclosed to provide network provider recommendations based on demographics. An example apparatus includes a network performance analyzer to determine a service performance of a first network provider based demographic information and network measurement data, the demographic information corresponding to subscribers of the first network provider, the network measurement data corresponding to services of the first network provider, and a report generator to generate a report of the service performance of the first network provider, the report including a recommendation for a demographic group to use a second network provider based on the service performance not satisfying a threshold, the second network provider different from the first network provider.
Service action guidance engine (SAGE)
Novel tools and techniques are provided for implementing service diagnostics and provisioning via a service action guidance engine (“SAGE”). In various embodiments, SAGE may autonomously analyze data to identify any issues with provisioning one or more first services, among a plurality of services, to a first customer of a service provider. SAGE may autonomously identify one or more first automation actions from a plurality of automation actions to address at least one first issue identified based on the analysis, and may autonomously send one or more first instructions to one or more first automation bots, among a plurality of automation bots, to perform the identified one or more first automation actions. SAGE may also generate and present one or more guidance messages to call center users to guide interaction between customers and the call center users, based on analysis data associated with provisioning of services to the customers.
Service action guidance engine (SAGE)
Novel tools and techniques are provided for implementing service diagnostics and provisioning via a service action guidance engine (“SAGE”). In various embodiments, SAGE may autonomously analyze data to identify any issues with provisioning one or more first services, among a plurality of services, to a first customer of a service provider. SAGE may autonomously identify one or more first automation actions from a plurality of automation actions to address at least one first issue identified based on the analysis, and may autonomously send one or more first instructions to one or more first automation bots, among a plurality of automation bots, to perform the identified one or more first automation actions. SAGE may also generate and present one or more guidance messages to call center users to guide interaction between customers and the call center users, based on analysis data associated with provisioning of services to the customers.
Remote hardware execution service with customer consented debugging
A system coordinates with remote hardware to execute customer workloads. The system uses an architecture for ensuring trust to ensure that debugging is not performed at the remote hardware while the customer workload is being executed on the remote hardware without customer consent. For example, debugging at the remote hardware may enable an entity performing the debugging to view certain aspects of the customer's workload. The architecture for ensuring trusts uses a shared secret to ensure customer consent is given before debugging can be performed while the customer's workload is being executed on the remote hardware.
Remote hardware execution service with customer consented debugging
A system coordinates with remote hardware to execute customer workloads. The system uses an architecture for ensuring trust to ensure that debugging is not performed at the remote hardware while the customer workload is being executed on the remote hardware without customer consent. For example, debugging at the remote hardware may enable an entity performing the debugging to view certain aspects of the customer's workload. The architecture for ensuring trusts uses a shared secret to ensure customer consent is given before debugging can be performed while the customer's workload is being executed on the remote hardware.
Data processing systems for fulfilling data subject access requests and related methods
Responding to a data subject access request includes receiving the request and identifying the requestor and source. In response to identifying the requestor and source, a computer processor determines whether the data subject access request is subject to fulfillment constraints, including whether the requestor or source is malicious. If so, then the computer processor denies the request or requests a processing fee prior to fulfillment. If not, then the computer processor fulfills the request.
Cloud application design for efficient troubleshooting
Systems and methods include providing functionality for the user device while operating in background on the user device including providing secure connectivity with a cloud-based system over a network; continuously collecting packets intercepted by the enterprise application over a time interval, wherein the collected packets are collected over the time interval; and responsive to an issue with functionality of the enterprise application, transmitting the collected packets to a back end server for troubleshooting of the issue. The time interval is a set amount of time, and each collected packet is deleted at the expiration of the time interval.
Feedback prioritization system
The present disclosure generally relates to a feedback processing service that can receive customer input, as customer feedback corresponds to a service context. The feedback processing service aggregates semantically similar feedback as a cluster. Then, the feedback processing service can prioritize each of the clusters by ranking each of the clusters.
END-TO-END SECURE COMMUNICATIONS FOR PRIVILEGED 5G NETWORK TRAFFIC
Software-defined networking and network function virtualization constructs are leveraged across diverse portions of 5G network infrastructure including radio access network, mobile core, and wide area network to enable a security property to be implemented for a network slice from end-to-end to provide for strong logical and/or physical isolation of slice traffic from other network traffic. One or more network slice controllers are implemented in the 5G network that are interoperable as separate elements, or under centralized control, to enable the underlying diverse network infrastructure to be abstracted and virtualized so that infrastructure properties can be mapped across infrastructure types for the end-to-end slice. Network resources may be dynamically allocated based on real-time traffic demands to instantiate the end-to-end network slices on a customized basis to meet particular quality of service parameters for various traffic types, including privileged traffic that may be prioritized when resources become scarce and network congestion occurs.