Patent classifications
H04L47/765
System and method of managing data connections to a communication network using tiered devices and telemetry data
An information handling system may include a processor; a memory; the processor to execute computer code of an evolved packet core to initiate a tiered communication network access policy by: detecting the connection of each of a plurality of endpoint devices to a communication network via one of a plurality of access points; and determining if a communication channel among a plurality of communication channels is available on the communication network for each of the endpoint devices based on a tier assigned to each of the endpoint devices; the processor to execute computer code of a telemetry data module to: receive telemetry data descriptive of the use characteristics of the endpoint devices; and execute a communication network machine learning algorithm using the telemetry data to generate a network prediction model; the processor to execute computer code of a reallocation module to: predict network resource use across the communication channels of the communication network based on the network prediction model and, with the reallocation module, reallocate endpoint devices based on the predicted network resource use and tier assigned to the endpoint devices.
System and method of managing data connections to a communication network using tiered devices and telemetry data
An information handling system may include a processor; a memory; the processor to execute computer code of an evolved packet core to initiate a tiered communication network access policy by: detecting the connection of each of a plurality of endpoint devices to a communication network via one of a plurality of access points; and determining if a communication channel among a plurality of communication channels is available on the communication network for each of the endpoint devices based on a tier assigned to each of the endpoint devices; the processor to execute computer code of a telemetry data module to: receive telemetry data descriptive of the use characteristics of the endpoint devices; and execute a communication network machine learning algorithm using the telemetry data to generate a network prediction model; the processor to execute computer code of a reallocation module to: predict network resource use across the communication channels of the communication network based on the network prediction model and, with the reallocation module, reallocate endpoint devices based on the predicted network resource use and tier assigned to the endpoint devices.
Systems and methods for end point data communications anonymization for a communications hub
A method for end point data communications anonymization for a local communications hub is provided. The method commences with receiving a first request addressed to a server from a computing device. The method further includes selecting a first remote communications hub from a plurality of remote communications hubs. The method continues with modifying the first request to generate a first modified request and sending the first modified request to the first remote communications hub. The first remote communications hub modifies the first modified request to produce a second modified request and forwards the second modified request to the server. The method further includes receiving a first response to the second modified request from the server, modifying the received first response to produce a first modified response, modifying the first modified response to produce a second modified response, and providing the second modified response to the computing device.
Systems and methods for end point data communications anonymization for a communications hub
A method for end point data communications anonymization for a local communications hub is provided. The method commences with receiving a first request addressed to a server from a computing device. The method further includes selecting a first remote communications hub from a plurality of remote communications hubs. The method continues with modifying the first request to generate a first modified request and sending the first modified request to the first remote communications hub. The first remote communications hub modifies the first modified request to produce a second modified request and forwards the second modified request to the server. The method further includes receiving a first response to the second modified request from the server, modifying the received first response to produce a first modified response, modifying the first modified response to produce a second modified response, and providing the second modified response to the computing device.
Techniques to configure physical compute resources for workloads via circuit switching
Embodiments are generally directed apparatuses, methods, techniques and so forth to select two or more processing units of the plurality of processing units to process a workload, and configure a circuit switch to link the two or more processing units to process the workload, the two or more processing units each linked to each other via paths of communication and the circuit switch.
PROTECTING INTEGRATION BETWEEN RESOURCES OF DIFFERENT SERVICES USING SERVICE-GENERATED DEPENDENCY TAGS
A resource tag service of a provider network may be used to protect integration between resources of different services by generating dependency tags. When a service receives, from a client, a request for a resource of the service to use another resource of another service, a dependency tag is generated by the resource tag service. The dependency tag indicates that the resource depends on the other resource (e.g., the resources are integrated). When the other service receives, from the client, a request to delete or modify the other resource, the deletion or modification of the other resource is prevented based on the existence of the dependency tag for the other resource (e.g., the dependency tag is attached to the other resource, indicating that the other resource of the other service is integrated with the resource of the service).
PROTECTING INTEGRATION BETWEEN RESOURCES OF DIFFERENT SERVICES USING SERVICE-GENERATED DEPENDENCY TAGS
A resource tag service of a provider network may be used to protect integration between resources of different services by generating dependency tags. When a service receives, from a client, a request for a resource of the service to use another resource of another service, a dependency tag is generated by the resource tag service. The dependency tag indicates that the resource depends on the other resource (e.g., the resources are integrated). When the other service receives, from the client, a request to delete or modify the other resource, the deletion or modification of the other resource is prevented based on the existence of the dependency tag for the other resource (e.g., the dependency tag is attached to the other resource, indicating that the other resource of the other service is integrated with the resource of the service).
Method and system for transferring user equipment in mobile communication system
A method and system for transferring user equipment (UE) in a mobile communication system are provided. According to the method, a source core (CN) network determines to transfer a UE that it serves and sends a transfer instruction carrying UE transfer restriction information to the UE; an access network receives a transfer request that is sent by the UE according to the restriction information carried in the transfer instruction; the access network selects a target CN entity that is different from the source CN entity for the UE; and the UE is transferred to the target CN entity. The method and system provided by the disclosure are applicable to user transferring between CN entities in any communication network. The transferring is initiated by a network side entity, and a more preferable CN entity is selected for the UE to provide a better service.
SYSTEMS AND METHODS FOR CLIENT-SIDE DYNAMIC INFORMATION RESOURCE ACTIVATION AND DEACTIVATION
Systems and methods for dynamically modifying properties of content elements within information resources by client-side computing devices are provided herein. A computing device may receive an information resource. The information resource may include a content element and a content modification script. The content modification script may include a predefined trigger event and a change list for modifying the information resource. The computing device may detect an occurrence of a predefined trigger event on the information resource. The computing device may determine that the information resource satisfies a condition of the change list, responsive to detecting the occurrence of the predefined trigger event. The computing device may set a property of the content element, responsive to determining that the information resource satisfies the condition. The computing device may add a modification indicator to the content element to prevent modification while the information resource satisfies the condition of the change list.
System and Methods for Sharing Resources Among Application Modules
A system and method for sharing resources among application modules includes receiving, on an application including a plurality of modules, a resource from a server; determining a storage position identifier corresponding to an identifier of the resource and indicative of a storage position in a database for storing resources dedicated for the application; and storing the resource in the database based on the determined identifier for sharing among the plurality of modules.