Abstract:
Embodiments herein describe a fog drone that selects, organizes, monitors, and controls a plurality of drones in a fleet. The fog drone receives a job to be completed from a dispatcher and identifies the resources for accomplishing the job such as the amount of material (e.g., fiber optic cable) or the type of drones (e.g., drones with RF antennas or digging implements) needed to execute the job. Using the identified resources, the fog drone estimates the number of drones needed to complete the job and can recruit available drones to form the fleet. Once the fleet is formed, the fog drone determines a number of drones to place on standby to replace active drones if those drones need to recharge or malfunction.
Abstract:
According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.
Abstract:
In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes; broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
Abstract:
According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.
Abstract:
According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
Abstract:
In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.