摘要:
Methods and apparatus are disclosed to adjust resource allocation in a distributive computing network. An example method includes receiving data representing performance of a first resource allocation provided by the distributive computing network. The example method includes receiving a resource request specifying a second resource allocation to be provided by the distributive computing network. The example method includes simulating the distributive computing network using the data to determine an operating configuration for adjusting the first resource allocation to satisfy the resource request with a third resource allocation, different than the second resource allocation. The example method includes adjusting the first resource allocation based on the operating configuration.
摘要:
Methods and apparatus are disclosed to adjust resource allocation in a distributive computing network. An example method includes receiving data representing performance of a first resource allocation provided by the distributive computing network. The example method includes receiving a resource request specifying a second resource allocation to be provided by the distributive computing network. The example method includes simulating the distributive computing network using the data to determine an operating configuration for adjusting the first resource allocation to satisfy the resource request with a third resource allocation, different than the second resource allocation. The example method includes adjusting the first resource allocation based on the operating configuration.
摘要:
Systems, methods, and computer program products are for managing access to a femtocell coverage area. An exemplary method includes storing in a memory component a first identifier corresponding to a subscribed service of a communication device and a second identifier corresponding to a user of the communication device, and granting access to the femtocell coverage area using the second identifier.
摘要:
Systems and methods for providing wireless enabled inventory peering are disclosed. According to one embodiment, a system for providing wireless enabled inventory peering includes a wireless enabled inventory peering vehicle system (WEIPVS). The WEIPVS is configured to receive an inventory search request. In response to receiving the inventory search request, the WEIPVS searches inventories of proximate technician vehicles. If a needed inventory item is located in an inventory of a proximate technician vehicle, the WEIPVS generates a request for an inventory transfer and sends the request to the proximate technician vehicle. When the item is received at the WEIPVS, the WEIPVS updates the inventory associated with the WEIPVS.
摘要:
A method of managing a policy related to a network-based service can include receiving a policy request at a policy creation system from a service creation and development (SCD) system, the request identifying a network-based service. The method can also include developing a policy template related to the network-based service based on requirements of a service level agreement associated with the network-based service. The method can also include sending the policy template to the SCD system after verifying that the policy template meets the requirements of the service level agreement.
摘要:
Embodiments of the disclosed technology comprise a dispatch management system and method. Customer information is received by a first company and forwarded with dispatch instructions to a second company, namely, a dispatch company which handles dispatching a service technician or other support representative to the customer. The dispatch company then sends to the first company customer information regarding products and/or service related to the customer. It is then determined which products and/or services are to be advertised to the customer based on the customer information and information received from the dispatch company. Advertisements are then sent to the customer based on this determination.
摘要:
A method for providing cellular access to a mobile device when the device is out of a home network operated by a home wireless service provider. The method includes presenting an option to initiate a process to establish a temporary roaming agreement between the home wireless service provider and a foreign wireless service provider operating a foreign network in a location of the mobile device outside of the home network. The method also includes receiving a selection of the option, accessing a web application associated with a negotiation server in response to the selection, providing subscriber credentials to the negotiation server for use by the negotiation server to negotiate the temporary roaming agreement, and allowing the mobile device to access a foreign network operated by the foreign wireless service provider in accordance with the temporary roaming agreement.
摘要:
Systems, methods, and devices that integrate a subscriber's communication services, including home wireline communication services, and a service-entity communication services are presented. User equipment (UE) is associated with a subscription for communication services, comprising wireline and wireless communication services, of a subscriber. The UE communicates with an enhanced service management component (ESMC) associated with a service entity to facilitate integration of at least a portion of the subscriber's communication services with the service entity's communication services while the UE is registered with the ESMC. While registered, the subscriber's UE is used to facilitate controlling a door lock to the subscriber's room associated with the service entity; and accessing the integrated communication services, including at least a portion of the home services, while in a location of the service entity, at least when the home services are provided via the same provider as that serving the service entity.
摘要:
A method for providing cellular access to a mobile device when the mobile device is out of a home network operated by a home wireless service provider that has no pre-arranged roaming agreements with any foreign wireless service provider in a location of the mobile device, The method includes implementing an intelligent Mobile Device Access Network Manager (iMDANM) application on a Universal Integrated Circuit Card (UICC). The iMDANM application being configured to allow a foreign wireless service provider to lease a portion of the UICC from the home wireless service provider to provision service credentials to the leased portion of the UICC, thereby providing the mobile device access to a foreign network operated by the foreign wireless service provider.
摘要:
A device is configured to enter a stealth mode in response to a trigger and/or triggering event. The trigger/triggering event can be a voice command, a depression(s) of a button(s) or pattern of buttons on the device, a keyboard and/or softkey entry, entry of a pattern on the display of the device, a designated movement of the device, detection of an event, and/or lack of detection of an event. The device activates the stealth mode without any indication to the user of the device that the device is activating the stealth mode. The stealth mode operates concurrently with all other functions of the device. A virtual secure channel can be established that allows communication with the device without providing an indication that the device is communicating via the virtual secure channel. A token can be utilized for authentication and to discriminate be stealth and normal modes.