Patent classifications
H04L41/5025
Impact predictions based on incident-related data
The disclosure herein describes predicting potential impact of issues reported in incident ticket data on infrastructure element. A ticket manager component includes an impact model utilizing machine learning to analyze real-time event and metric data with incident-related data to generate predicted impact data. The predicted impact data identifies potentially impacted infrastructure elements, such as, potentially impacted users, predicted infrastructure components impacted by the issue and/or an updated time-period associated with the issue. The ticket manager component creates labeled incident tickets by updating user-generated incident tickets with additional data generated by the impact model, including predicted impact data and/or additional details associated with the issue. The labeled incident tickets are provided back to the model as training data to further refine predictions generated by the model.
Impact predictions based on incident-related data
The disclosure herein describes predicting potential impact of issues reported in incident ticket data on infrastructure element. A ticket manager component includes an impact model utilizing machine learning to analyze real-time event and metric data with incident-related data to generate predicted impact data. The predicted impact data identifies potentially impacted infrastructure elements, such as, potentially impacted users, predicted infrastructure components impacted by the issue and/or an updated time-period associated with the issue. The ticket manager component creates labeled incident tickets by updating user-generated incident tickets with additional data generated by the impact model, including predicted impact data and/or additional details associated with the issue. The labeled incident tickets are provided back to the model as training data to further refine predictions generated by the model.
5G network slicing with distributed ledger traceability and resource utilization inferencing
Various systems and methods for implementing an edge computing system to realize 5G network slices with blockchain traceability for informed 5G service supply chain are disclosed. A system configured to track network slicing operations includes memory and processing circuitry configured to select a network slice instance (NSI) from a plurality of available NSIs based on an NSI type specified by a client node. The available NSIs uses virtualized network resources of a first network resource provider. The client node is associated with the selected NSI. The utilization of the network resources by the plurality of available NSIs is determined using an artificial intelligence (AI)-based network inferencing function. A ledger entry of associating the selected NSI with the client node is recorded in a distributed ledger, which further includes a second ledger entry indicating allocations of resource subsets to each of the NSIs based on the utilization.
Methods of managing audio data transmissions over a network to ensure live voice quality
Methods of managing audio data transmissions over a network disclosed herein may include the step of selecting a client device from a plurality of client devices as a participating device, each client device of the plurality of client devices being in data communication with a network. The methods may include the step of signaling the participating device over said network thereby initiating transmitting of audio data from the participating device at least in part over said network for live broadcasting, the audio data being indicative of a speaking voice being input into a participating device microphone of the participating device. The methods may include the step of minimizing latency in transmitting of the audio data by throttling data being communicated over said network by one or more client devices of the plurality of client devices only while the participating device is transmitting audio data over said network.
Request response based on a performance value of a server
The present invention relates to a method, computer system, and computer program product for data processing based on a response strategy. According to the method, a performance value of a server is determined in response to receiving at least one request to the server. A response strategy for the at least one request is determined based on the determined performance value. At least one response is provided to the at least one request according to the determined response strategy.
Request response based on a performance value of a server
The present invention relates to a method, computer system, and computer program product for data processing based on a response strategy. According to the method, a performance value of a server is determined in response to receiving at least one request to the server. A response strategy for the at least one request is determined based on the determined performance value. At least one response is provided to the at least one request according to the determined response strategy.
System for Adaptive Data Center Asset Configuration
A system, method, and computer-readable medium are disclosed for performing a data center monitoring and management operation. The data center monitoring and management operation includes: generating a series of data center asset configuration questions; performing an adaptive configuration session using the series of data center asset configuration questions; and, dynamically adapting a data center asset configuration recommendation based upon the adaptive configuration session.
DETECTING CRITICAL REGIONS AND PATHS IN THE CORE NETWORK FOR APPLICATION-DRIVEN PREDICTIVE ROUTING
In one embodiment, a device obtains quality of experience metrics for an online application. The device generates a mapping between network paths traversed by traffic of the online application and the quality of experience metrics. The device identifies a core entity along the network paths that is responsible for degradation of the quality of experience metrics. The device sends an alert regarding the core entity, whereby the alert causes the traffic of the online application to avoid the core entity.
MACHINE LEARNING BASED ADAPTATION OF QOE CONTROL POLICY
A node of a wireless communication network receives first data indicating a desired quality of experience level for user data traffic of a user of the wireless communication network. Based on a control policy and the desired quality of experience level, the node determines a rule for controlling the user data traffic. Further, the node obtains second data indicating an estimated quality of experience level for the user data traffic subject to control according to the rule. Based on the first data and the second data, the node adapts the control policy, e.g., using a reinforcement learning, RL, mechanism.
Managing service user discovery and service launch object placement on a device
Methods and apparatuses to manage service user discovery and service launch object placement on a device. A method comprising: obtaining information to assist in identifying a portion of a user interface of a wireless device, the wireless device communicatively coupled to a network system over a wireless access network; determining a differentiating attribute of the identified portion of the user interface; obtaining one or more service launch objects for placement in the identified portion of the user interface; and sending configuration information to the wireless device over the wireless access network to assist the wireless device in placing the one or more service launch objects in the identified portion of the user interface.