HYBRID AGENT STRATEGY FOR FULL STACK OBSERVABILITY

    公开(公告)号:US20250130911A1

    公开(公告)日:2025-04-24

    申请号:US18415892

    申请日:2024-01-18

    Abstract: In one implementation, a method is introduced herein that facilitates a hybrid agent strategy for full stack observability. The method can include observing, by a device executing an agent of a first observability platform, first observability information associated with the first observability platform and monitoring, by the device executing the agent, for a message containing second observability information on the device generated for a second observability platform. The method can further include generating a new observability information as a combination of the first observability information and the second observability information and providing the new observability information to a given observability backend service within a computer network via an observability pipeline associated with the given observability backend service.

    Event notifications for online meetings

    公开(公告)号:US12284463B2

    公开(公告)日:2025-04-22

    申请号:US18203173

    申请日:2023-05-30

    Abstract: This disclosure describes techniques for providing notifications about events that occur during an online meeting. For instance, a system may establish an online meeting, such as a video conferencing meeting, for users. While in the meeting, a first user may view video of a second user and determine that the second user is experiencing an emergency event. As such, a user device of the first user may receive an input indicating that the emergency event is occurring with the second user. The system may receive the indication from the user device and verify that the emergency event is occurring. Additionally, the system may then send a notification to emergency personnel that indicates at least that the emergency event is occurring and a location of the second user. Furthermore, the system may send notification(s) to contact(s) associated with the second user that indicate at least that the emergency event is occurring.

    Efficient nonlinear equalizer for transmitter predistortion

    公开(公告)号:US12283996B1

    公开(公告)日:2025-04-22

    申请号:US18098764

    申请日:2023-01-19

    Abstract: A method, system and apparatus for mapping a symbol from a N-QAM constellation into a binary bit set, where N is the number of symbols in the constellation, and reducing the length of the binary bit set according to at least one property of nonlinear distortion by generating a lookup table (LUT) address from a LUT address generator, and adding the LUT address to a LUT of size smaller than N{circumflex over ( )}(2M+1), where 2M is the number of neighboring symbols to be stored.

    ENABLING ULTRA WIDE BAND OUT-OF-BAND OVER BLUETOOTH AND WI-FI

    公开(公告)号:US20250126596A1

    公开(公告)日:2025-04-17

    申请号:US18828949

    申请日:2024-09-09

    Abstract: Techniques and apparatus for configuring ultra-wideband (UWB) communications using out-of-band (OOB) mechanisms are described. An example technique performed by a wireless device includes obtaining, prior to association with an access point (AP), ultra-wideband (UWB) information from the AP via an out-of-band (OOB) communication link between the wireless device and the AP. A location server within a network including the wireless device and the AP is determined based on the UWB information. Configuration information associated with a UWB ranging session from the location server is obtained via the OOB communication link. The UWB ranging session is performed in accordance with the configuration information.

    RESTRICTED TARGET WAIT TIME INTERFERENCE DETECTION AND MANAGEMENT

    公开(公告)号:US20250126557A1

    公开(公告)日:2025-04-17

    申请号:US19002336

    申请日:2024-12-26

    Abstract: Network traffic interference detection and management may be provided. An infringement event by an infringing Access Point (AP) on a Restricted Target Wake Time (rTWT) transmission opportunity (TxOp) associated with a victim AP may be detected, and information associated with the infringement event may be added to an infringement list, wherein the information includes a MAC address associated with the infringing AP. A controller, may receive the infringement list and notify the infringement event to the infringing AP. The infringing AP may determine whether a transmission associated with the infringement event is low latency and high priority. When the transmission is not low latency and high priority the infringing AP may modify future transmissions based on the notification. When the transmission is low latency and high priority the infringing AP may notify the controller that the transmission is low latency and high priority. The controller may then create a negotiation between the victim AP and the infringing AP, wherein the negotiation comprises managing future transmissions of the victim AP and the infringing AP.

    FEATURE LEVEL POWER CALIBRATION
    46.
    发明申请

    公开(公告)号:US20250126552A1

    公开(公告)日:2025-04-17

    申请号:US18664101

    申请日:2024-05-14

    Abstract: Devices, systems, methods, and processes for feature level power calibration are described herein. Network devices include sensors that generate sensor readings indicative of various device parameters. A calibration logic utilizes the sensor readings and feature permutations associated with the sensor readings to predict a feature level power consumption for all features of the network device. The calibration logic then applies a calibration factor to the predicted feature level power consumption and obtains an actual feature level power consumption. Using the actual feature level power consumption, the calibration logic determines an actual power consumption for feature licenses of the network device. The feature and feature license level power consumption is utilized for determining which features or feature licenses can be deactivated when the device power consumption is outside a threshold limit. Such dynamic deactivation ensures that the network device accurately meets the sustainability goals.

    MULTI-HOMED LAYER-2 (L2) SERVICE INSERTION ENTERPRISE FABRIC NETWORKS

    公开(公告)号:US20250126060A1

    公开(公告)日:2025-04-17

    申请号:US18380457

    申请日:2023-10-16

    Abstract: Techniques and architecture are described for L2 service insertion in a network. More particularly, the techniques and architecture provide for monitoring a L2 service, e.g., firewall, MAC address (instead of learning the MAC address) and registering/de-registering the service node (e.g., fabric border or edge or LISP service_etr) to the service control plane (e.g., LISP MSMR) based on this. This not only load-balances the traffic (per L2 flow) but also tracks it for node's liveliness. The techniques and architecture also provide L2 service insertion connected to a service border to allow for dynamic SGT based service, e.g., firewall, insertion for both software defined access (SDA) fabric and non-fabric deployments.

Patent Agency Ranking