-
公开(公告)号:US10586186B2
公开(公告)日:2020-03-10
申请号:US15147605
申请日:2016-05-05
Applicant: Cisco Technology, Inc.
Inventor: Jay Johnston , Rama Darbha , David C. White, Jr. , Magnus Mortensen
Abstract: Embodiments herein describe a fog drone that selects, organizes, monitors, and controls a plurality of drones in a fleet. The fog drone receives a job to be completed from a dispatcher and identifies the resources for accomplishing the job such as the amount of material (e.g., fiber optic cable) or the type of drones (e.g., drones with RF antennas or digging implements) needed to execute the job. Using the identified resources, the fog drone estimates the number of drones needed to complete the job and can recruit available drones to form the fleet. Once the fleet is formed, the fog drone determines a number of drones to place on standby to replace active drones if those drones need to recharge or malfunction.
-
公开(公告)号:US20200074862A1
公开(公告)日:2020-03-05
申请号:US16118118
申请日:2018-08-30
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White , Magnus Mortensen
IPC: G08G1/16 , G06T7/73 , G06K9/00 , G06K9/62 , G05D1/00 , G05D1/02 , G08G1/00 , G08G1/04 , G06N99/00
Abstract: In one embodiment, a first vehicle makes, using a first machine learning-based model, a determination that raw image data captured by the first vehicle does not indicate the presence of a driving hazard. The first vehicle sends a hazard assessment request to a second vehicle in communication proximity of the first vehicle that includes the raw image data. The first vehicle receives a hazard detection response from the second vehicle that indicates a driving hazard identified by the second vehicle by applying a second machine learning-based model to the raw image data included in the hazard assessment request. The first vehicle adjusts a path of travel of the first vehicle to avoid the driving hazard identified by the second vehicle.
-
公开(公告)号:US10462194B2
公开(公告)日:2019-10-29
申请号:US14618532
申请日:2015-02-10
Applicant: Cisco Technology, Inc.
Inventor: Rama Darbha , Magnus Mortensen , Jay Kemper Johnston , David C. White, Jr.
Abstract: According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.
-
公开(公告)号:US20190297108A1
公开(公告)日:2019-09-26
申请号:US15933923
申请日:2018-03-23
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, JR. , Magnus Mortensen
Abstract: In one embodiment, a service classifies a device in a network as human-controlled or self-controlled. The service also classifies an online resource as designed for access by human-controlled devices or by self-controlled devices. The service obtains traffic data regarding an attempt by the device to access the online resource via the network. The service determines that the attempt by the device to access the online resource is a security violation, based on the classifications of the device and the online resource. The service initiates a mitigation action in the network for the security violation.
-
公开(公告)号:US10355929B2
公开(公告)日:2019-07-16
申请号:US15443571
申请日:2017-02-27
Applicant: Cisco Technology, Inc.
Inventor: Jay K. Johnston , David C. White, Jr. , Magnus Mortensen
Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller determines how network flows will be distributed in the networks due to the outage from installing the update, and generates an update plan that includes timing for installing the update on each network element. The timing is based on how the network flows will be distributed in the networks. The network controller installs the update in each network element according to the timing of the update plan.
-
公开(公告)号:US20180316545A1
公开(公告)日:2018-11-01
申请号:US15582630
申请日:2017-04-29
Applicant: Cisco Technology, Inc.
Inventor: David C. White, JR. , Magnus Mortensen , Jay Kemper Johnston
Abstract: In one embodiment, a device in a network maintains an information module to recommend system actions for a monitored system in the network. The information module generates recommendations using an information library database populated by one or more data sources. The device assesses behaviors of the information module and determines a review cadence for the information library database based on the assessed behaviors of the information module. The device updates the information library database according to the determined review cadence.
-
17.
公开(公告)号:US20180239689A1
公开(公告)日:2018-08-23
申请号:US15957295
申请日:2018-04-19
Applicant: Cisco Technology, Inc.
Inventor: David C. White, JR. , Magnus Mortensen , Jay K. Johnston
CPC classification number: G06F11/3604 , G06F8/71 , G06F11/3612 , G06F21/53 , G06F21/57 , G06F2221/033
Abstract: A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.
-
公开(公告)号:US20240144193A1
公开(公告)日:2024-05-02
申请号:US17973688
申请日:2022-10-26
Applicant: Cisco Technology, Inc.
Inventor: Jay K. Johnston , Magnus Mortensen , David C. White, JR.
CPC classification number: G06Q10/1095 , G06Q10/06314
Abstract: Presented herein are techniques associated with proactively scheduling shared resources or responsibilities among multiple users. In one example a method is provided that may include sharing masked calendar information between a first device of a first user and at least one second device of at least one second user based on the first device being proximate to the at least one second device; identifying a conflict involving use of a shared resource at a particular time; comparing first priority metadata for the first user and second priority metadata for the at least one second user; and assigning the use of the shared resource to one of the first user or the at least one second user based, at least in part, on determining that the first user or the at least one second user has a highest priority for use of the shared resource.
-
公开(公告)号:US11877154B2
公开(公告)日:2024-01-16
申请号:US16810551
申请日:2020-03-05
Applicant: Cisco Technology, Inc.
Inventor: Jay K. Johnston , Jerome Henry , David C. White, Jr. , Magnus Mortensen , John M. Swartz , Robert E. Barton
Abstract: Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network comprising a service set identifier (SSID), a network message is received at a wireless station (STA), from an access point (AP) associated with the wireless network. The STA identifies an encrypted identifier in the network message. The STA validates the encrypted identifier, and in response determines that the AP corresponds to a trusted wireless network. The SSID is designated as trusted, at the STA.
-
公开(公告)号:US20230245072A1
公开(公告)日:2023-08-03
申请号:US18193142
申请日:2023-03-30
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, JR. , Magnus Mortensen
IPC: G06Q10/1093 , G06F16/9038 , G06F16/9035
CPC classification number: G06Q10/1095 , G06F16/9038 , G06F16/9035
Abstract: A meeting system facilitates spontaneous social encounter between users with a meeting server. The meeting server obtains calendar data, user preferences, and an organization chart associated with each user of a plurality of users. The meeting server selects a first user and a second user for a social encounter based on the calendar data, user preferences, and roles in the organization chart. The meeting server prompts a first user device associated with the first user, and a second user device associated with the second user, for a social encounter. Responsive to obtaining acceptances from the first user and the second user, the meeting server facilitates the social encounter between the first user and the second user.
-
-
-
-
-
-
-
-
-