Abstract:
Disclosed are systems, methods and non-transitory computer-readable mediums for dynamically presenting and updating a directed time graph displayed in a graphical user interface. In some examples, the method can include displaying a suggested path within a graphical user interface on a computer screen, the suggested path can include outstanding issues of elements of a network. The displaying the suggested path can include determining based on one or more factors an efficient ordering of the outstanding issues and ordering the outstanding issues based on the one or more factors. The method can also include monitoring, at regular intervals, updates to the one or more outstanding issues and automatically updating the suggested path, by a processor, based on the updates to the one or more outstanding issues.
Abstract:
In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes; broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
Abstract:
The present technology is a videoconference system for addressing room contention for a multi-endpoint meeting. The videoconference system includes a videoconference server that hosts a multi-endpoint meeting amongst local endpoints and remote endpoints, and a wallplate located outside of a physical room that includes a local endpoint. The wallplate receives input and transmits a room contention state indicator. The local endpoint receives the room contention state indicator and sends a room contention signal to the videoconference server, where the videoconference server transmits a room contention message to the remote endpoint.
Abstract:
In one embodiment, a supervisory device in a network identifies a workaround for a symptom exhibited by a particular device in the network by traversing a path in a symptom-problem graph. The path in the graph includes a symptom vertex that represents the symptom, a problem vertex that shares an edge with the symptom vertex and represents a problem that causes the symptom, and a workaround vertex that shares an edge with the problem vertex and represents the workaround for the symptom. The supervisory device causes the identified workaround to be applied to the particular device and updates the path in the graph to replace the workaround vertex with a fix vertex that represents a fix for the problem that causes the symptom exhibited by the particular device. The supervisory device causes the fix to be applied to the particular device based on the updated path in the graph.
Abstract:
A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.
Abstract:
According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.
Abstract:
Techniques are presented herein to visually display who is speaking when an online conference session is established involving participants at multiple locations. When it is determined that there are multiple participants of the online conference session at a first location at which one or more microphones can detect audio from the multiple participants, a visual indicator of the first location is generated for display to the participants in the online conference session. In addition, in a predetermined relationship with the visual indicator of the first location, identifiers of the multiple participants at the first location are generated that can also be displayed to the participants in the online conference session.
Abstract:
In one embodiment, a method for delegating partial administrative controls across one or more administrative domains is provided. An upstream network device may advertise capabilities for controlling certain administrative functions to a downstream network device. The downstream network device may chose to act on one or more capabilities, allowing for partial administrative control across the administrative domain.
Abstract:
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.