Abstract:
A service system receives a request for a service from a computing device of a user. In response to receiving the service request, the service system determines the content of the request and communicates a data collection module to the user device. Based on the content of the request, the service system determines a data collection instruction. The service system communicates the data collection instruction to the data collection module, which executes the instruction, thus resulting in collection of data from the user device and/or devices associated with the user device. The service system then receives the collected data. Based on an analysis of the received data, for example, the service system determines a response to the service request. For example, the service system determines a service product that is responsive to the request. The service system then communicates the response to the user device.
Abstract:
A context-driven publication option is received over a network at an adaptive publish subscribe broker from a publishing network device. The context driven publication options are presented over the network to a subscribing network device. A selection of a context-driven subscription is received over the network at the adaptive publish/subscribe broker from the subscribing network device. A publication configured for network management and operations is received at the adaptive publish/subscribe broker. Publications are filtered at the adaptive publish/subscribe broker for the subscribing network device according to the selection of the context-driven subscription.
Abstract:
Techniques are provided herein for establishing at a network management server a presence on a network. A presence associated with one or more managed devices on the network is detected. An instant messaging (IM) session is established with the one or more managed devices. The IM session forms a virtual chat room for performing a management function on the one or more managed devices, and IM messages are sent that are configured to perform the management function on the one or more managed devices. Techniques are also provided herein for establishing on a network an enriched presence by a network management server that is configured to perform a management function via a presence function of a messaging and presence protocol.
Abstract:
Network topology information may be determined for a plurality of network devices on a network. System identifier information may then be determined for each of the plurality of network devices on the network. The system identifier information may be a list of network solutions that each network device actually or potentially belongs to. The system may then flag the system identifier information to indicate whether each solution is an actual or a potential solution.
Abstract:
A cloud proxy communicates over a public network with a network proxy in a private network. The network proxy communicates with the public network through a firewall. The cloud proxy receives from a requester a request to communicate with a remote device in the private network. The cloud proxy creates first forwarding rules to forward traffic from the requester to the network proxy and from the network proxy to the requester. The cloud proxy sends the request to the network proxy, which causes the network proxy to create second forwarding rules to forward traffic from the network proxy to the remote device and from the remote device to the cloud proxy. A communication tunnel through the firewall device between the cloud proxy and the network proxy is established over which the southbound and northbound traffic is forwarded based on the first forwarding rules and the second forwarding rules.
Abstract:
Network topology information may be determined for a plurality of network devices on a network. System identifier information may then be determined for each of the plurality of network devices on the network. The system identifier information may be a list of network solutions that each network device actually or potentially belongs to. The system may then flag the system identifier information to indicate whether each solution is an actual or a potential solution.
Abstract:
Techniques are provided herein for enabling a virtual private network (VPN) using a bidirectional, full duplex transport channel configured to send and receive application layer data packets. At a source network device that hosts a VPN client, the VPN client is configured with a bidirectional, full duplex transport channel that is configured to send and receive Open Systems Interconnection application layer data packets. The VPN client is also configured with a virtual network interface that operates to virtually link the VPN client with the transport channel.