Abstract:
In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
Abstract:
In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
Abstract:
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Abstract:
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Abstract:
Data indicating a plurality of informational items is received at a processor. The data further comprises at least one useful informational item. Also received at the processor is data indicating a plurality of questions, including at least one unanswered question. The processor analyzes the data to determine a number of unanswered questions and a number of useful informational items. The processor generates a visualization comparing the number useful informational items to the number of unanswered questions. The visualization is displayed on a display.
Abstract:
Techniques for peer-to-peer backup in an administrative domain are described. The techniques may include identifying, by a first device, a second device as a trusted peer device. The techniques may also include receiving an advertisement that the second device supports a peer-to-peer backup system and transmitting an acknowledgement to the second device that the first device supports the peer-to-peer backup system. Additionally, techniques may include receiving a request to store backup data associated with the second device on the first device, the request may include an amount of memory needed. If the first device has the needed memory, the first device may transmit an indication that the memory is available. The indication may include a recovery key. The first device may then receive backup data associated with the second device, encrypted with the recovery key, and store the encrypted backup data in memory reserved for peer-to-peer backup data.
Abstract:
A computer executed process can be configured to identify a network traffic flow of a source network device. The process can select a traffic fidelity rate from a plurality of traffic fidelity rates for sending information regarding the network traffic flow to a digital twin device corresponding to the source network device. The process can transmit the information regarding the network traffic flow to the digital twin device according to the traffic fidelity rate. The digital twin device can be configured to replicate at least one operation of the source network device with respect to the network traffic flow.
Abstract:
This disclosure describes techniques for diagnosing a presence or malfunction of a network node. In an example method, a first network node receives an indication of a diagnostic transmission originating from a second network node. The second network node further receives a forwarded transmission corresponding to the diagnostic transmission. The first network node diagnoses at least one of a presence or a malfunction of an intermediary node between the first network node and the second network node based on at least one of the indications of the diagnostic transmission or the forwarded transmission.
Abstract:
In one embodiment, an issue analysis service obtains telemetry data from a plurality of devices in a network across a plurality of time intervals. The service detects a failure event in which a device in the network is in a failure state. The service clusters the telemetry data obtained prior to the failure event into rounds according to time intervals in which the telemetry data was collected. Each round corresponds to a particular time interval. The service applies a machine learning-based classifier to each one of the rounds of clustered telemetry data to identify one or more common traits appearing in the telemetry data for each round. The service generates a trait change report indicating a change in the one or more common traits appearing in the telemetry data across the rounds leading up to the failure event.
Abstract:
This disclosure describes techniques for providing notifications about events that occur during an online meeting. For instance, a system may establish an online meeting, such as a video conferencing meeting, for users. While in the meeting, a first user may view video of a second user and determine that the second user is experiencing an emergency event. As such, a user device of the first user may receive an input indicating that the emergency event is occurring with the second user. The system may receive the indication from the user device and verify that the emergency event is occurring. Additionally, the system may then send a notification to emergency personnel that indicates at least that the emergency event is occurring and a location of the second user. Furthermore, the system may send notification(s) to contact(s) associated with the second user that indicate at least that the emergency event is occurring.