Fog drone fleet orchestrator
    11.
    发明授权

    公开(公告)号:US10586186B2

    公开(公告)日:2020-03-10

    申请号:US15147605

    申请日:2016-05-05

    Abstract: Embodiments herein describe a fog drone that selects, organizes, monitors, and controls a plurality of drones in a fleet. The fog drone receives a job to be completed from a dispatcher and identifies the resources for accomplishing the job such as the amount of material (e.g., fiber optic cable) or the type of drones (e.g., drones with RF antennas or digging implements) needed to execute the job. Using the identified resources, the fog drone estimates the number of drones needed to complete the job and can recruit available drones to form the fleet. Once the fleet is formed, the fog drone determines a number of drones to place on standby to replace active drones if those drones need to recharge or malfunction.

    Minimizing productivity loss in a collaborative sharing environment

    公开(公告)号:US10462194B2

    公开(公告)日:2019-10-29

    申请号:US14618532

    申请日:2015-02-10

    Abstract: According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.

    NETWORK SECURITY INDICATOR OF COMPROMISE BASED ON HUMAN CONTROL CLASSIFICATIONS

    公开(公告)号:US20190297108A1

    公开(公告)日:2019-09-26

    申请号:US15933923

    申请日:2018-03-23

    Abstract: In one embodiment, a service classifies a device in a network as human-controlled or self-controlled. The service also classifies an online resource as designed for access by human-controlled devices or by self-controlled devices. The service obtains traffic data regarding an attempt by the device to access the online resource via the network. The service determines that the attempt by the device to access the online resource is a security violation, based on the classifications of the device and the online resource. The service initiates a mitigation action in the network for the security violation.

    Mitigating network impact of disruptive device changes

    公开(公告)号:US10355929B2

    公开(公告)日:2019-07-16

    申请号:US15443571

    申请日:2017-02-27

    Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller determines how network flows will be distributed in the networks due to the outage from installing the update, and generates an update plan that includes timing for installing the update on each network element. The timing is based on how the network flows will be distributed in the networks. The network controller installs the update in each network element according to the timing of the update plan.

    DYNAMIC REVIEW CADENCE FOR INTELLECTUAL CAPITAL

    公开(公告)号:US20180316545A1

    公开(公告)日:2018-11-01

    申请号:US15582630

    申请日:2017-04-29

    Abstract: In one embodiment, a device in a network maintains an information module to recommend system actions for a monitored system in the network. The information module generates recommendations using an information library database populated by one or more data sources. The device assesses behaviors of the information module and determines a review cadence for the information library database based on the assessed behaviors of the information module. The device updates the information library database according to the determined review cadence.

    PROACTIVE SCHEDULING OF SHARED RESOURCES OR RESPONSIBILITIES

    公开(公告)号:US20240144193A1

    公开(公告)日:2024-05-02

    申请号:US17973688

    申请日:2022-10-26

    CPC classification number: G06Q10/1095 G06Q10/06314

    Abstract: Presented herein are techniques associated with proactively scheduling shared resources or responsibilities among multiple users. In one example a method is provided that may include sharing masked calendar information between a first device of a first user and at least one second device of at least one second user based on the first device being proximate to the at least one second device; identifying a conflict involving use of a shared resource at a particular time; comparing first priority metadata for the first user and second priority metadata for the at least one second user; and assigning the use of the shared resource to one of the first user or the at least one second user based, at least in part, on determining that the first user or the at least one second user has a highest priority for use of the shared resource.

Patent Agency Ranking