H04L47/808

Methods and apparatus to identify sponsored media in a document object model

Methods, apparatus, systems and articles of manufacture are disclosed to identify sponsored media in a Document Object Model. An example method includes in response to initiation of a search for sponsored media in a first branch of a document object model for a webpage, initiating a first timer having a first search time period and a second timer having a second search time period, the first search time period and the second search time period overlap, the search to be terminated upon completion of traversing the first branch when the search reaches a document node that is at a root of the first branch, the first branch including a candidate node. The example method also includes in response to identifying the candidate node as sponsored media, parsing the sponsored media to generate monitoring information, and modifying a user agent setting to include a unique identifier.

IMPLEMENTING NETWORK CONSTRAINT EXCEPTIONS ON A PER DEVICE BASIS
20220141150 · 2022-05-05 ·

Implementing network constraint exceptions on a per device basis is disclosed. A network manager determines that a subscriber device associated with a subscriber network is to be granted an exception to a network constraint of the subscriber network. An aggregation device that is coupled to a set of subscriber networks including the subscriber network is sent aggregation device instructions to grant the exception to packets associated with the subscriber device that flow through the aggregation device. A network gateway device that serves as a network gateway for the subscriber network is sent gateway device instructions to associate packets associated with the subscriber device with information for identifying the packets as being associated with the subscriber device.

METHODS AND SYSTEMS FOR ESTABLISHING IN-FLIGHT NETWORK TRAFFIC POLICIES FOR PERSONAL ELECTRONIC DEVICES

Methods and systems establish a traffic policy for a personal electronic device based on one or more physical characteristics of the device. In some aspects, a database of traffic policies is maintained. The traffic policies are for accessing a network via a wireless communications link. A network access unit receives a request from a personal electronic device to access the network. The request is analyzed to determine a physical characteristic of the device. A traffic policy is established from the database for the device based, at least in part, on the determined physical characteristic of the device. Transmission of network traffic for the device is then scheduled based at least in part, on the established traffic policy.

Network component placement architecture

A network component placement architecture addresses the difficult technical challenge of determining where specific technical components of an overall service may be provisioned. The architecture is particularly effective at determining where, among a myriad of possible service provides, platforms, and regions, the technical components can be placed and meet all of the applicable technical constraints on the placement of the technical components. In one implementation, the placement architecture includes a sequence of pipeline stages that define an analysis sequence leading to a set of possible placement options.

NETWORK MANAGEMENT
20220116336 · 2022-04-14 ·

A method of managing a telecommunications network (100), the telecommunications network having a first user (110-1) and a second user (110-2), and the telecommunications network comprising a first network slice onto which the first user is allocated, the method comprising the step of: measuring network performance in respect of the first user and in respect of the second user; comparing network performance associated with the first user and the second user; identifying whether there is a disparity between the network performance associated with the first user and the second user that exceeds a threshold; and if it is identified that the disparity exceeds the threshold, adapting the network configuration of the first network slice so as reduce the disparity in the network performance associated with the first user and the second user.

NETWORK RESOURCE PUSHING METHOD, DEVICE, AND STORAGE MEDIUM

A network resource pushing method, a device, and a storage medium. The method comprises: a server receiving information of a network resource accessed by a user, and information of the environment of the user when the user accessed the network resource (101); the server applying, according to the information of the environment of the user, a pre-established scenario determination model to determine a user scenario (102); the server establishing an association model between the user scenario and the type of network resource accessed by the user (103); and the server receiving information of a current environment of the user, applying the scenario determination model to determine a current scenario corresponding to the information of the current environment of the user, and pushing to the user, according to the association model, a network resource having a type corresponding to the determined current scenario (104).

Supporting near real time service level agreements
11296954 · 2022-04-05 · ·

A controller device manages a plurality of network devices. The controller device includes one or more processing units implemented in circuitry and configured to determine that one or more stateful intents used to manage the plurality of network devices and represented by a graph model are degraded due to assigned resources for the stateful intents having become degraded; in response to determining that the one or more stateful intents are degraded, determine resources for the stateful intents, the resources corresponding to vertices of the graph model; provision the stateful intents using the determined resources; determine whether the provisioning of the stateful intents was successful; compile at least one of the stateful intents that was successful into low-level configuration data for at least one network device of the plurality of network devices; and configure the at least one network device using the low-level configuration data.

Allocation resource for chat bot based on conversations related or unrelated to service menu
11310166 · 2022-04-19 · ·

Techniques are provided that can perform appropriate resource allocation to systems such as chat bots and back-end-systems even when a user is engaged in conversations (such as text messages and speech messages) unrelated to service menus, without increasing the resources of the chat bots and back-end-systems. Means are provided for determining the allocation of chat bot and back-end-system resources based on the number of conversations associated with the service menu and the number of conversations unrelated to the service menu.

Resource appropriation in a multi-tenant environment using risk and value modeling systems and methods

Described embodiments provide systems and methods for resource appropriation in a multi-tenant environment using risk and value modeling. A resource server can provide a plurality of applications access to a plurality of resources in response to requests from clients based in part on risk scores and value scores. The resource server can generate and execute a risk model and a value model to determine a risk score and a value score for each of the applications. The resource server can use the risk and value scores to determine access to a particular resource for a requested application. The resource server can assign a first allocation of resource tokens to an application. The resource tokens can correspond to access privileges to plurality of resources. The resource server can dynamically modify the resource allocation for applications responsive to changes to a risk score or value score of a respective application.

Authorizations associated with externally shared communication resources

Various embodiments of the present disclosure are directed to a group-based communication apparatus that is configured to enable end-users (e.g., non-admin users) to initiate, by way of client devices, generation of a shareable resource associated with a group-based communication resource identifier to efficiently authorize communication between client devices associated with different organization identifiers in group-based communication interfaces associated with a shared group-based communication resource identifier.