Abstract:
A method for monitoring a network for information includes repeatedly searching the network for sensitive information about a subscriber. The network is intermittently searched for obscuring information during the repeated searching to thereby disguise the sensitive information that is the target of the repeated searching. Related systems and computer program products are also discussed.
Abstract:
A communication network is operated by determining whether a network element can be trusted and monitoring traffic associated with the network element based on whether the network element can be trusted. At least some of the monitored traffic may be selected for examination based on the degree of trust for the network element. At least some of the monitored and/or examined traffic is selected to be blocked based on the degree of trust for the network element.
Abstract:
A method for monitoring a network for information includes repeatedly searching the network for sensitive information about a subscriber. The network is intermittently searched for obscuring information during the repeated searching to thereby disguise the sensitive information that is the target of the repeated searching. Related systems and computer program products are also discussed.
Abstract:
Based on electronic communication received from a wireless device or from an access point, it is determined that a wireless signal relay is needed between the wireless device and the access point. In response to the determination, a drone is deployed between the wireless device and the access point to relay wireless signals between the wireless device and the access point. The deployed drone measures a first strength of a first wireless signal received from the wireless device or measures a second strength of a second wireless signal received from the access point. Based on the measurements, it is determined that the wireless device has moved relative to the access point after the drone has been deployed. In response to the determining that the wireless device has moved, the location of the drone is adjusted to maintain the first strength or the second strength above a predetermined level.
Abstract:
In one example, a method and apparatus for optimizing a software defined network configuration are disclosed. In one example, the method determines a first network relative performance parameter for a current configuration of a network, based on respective weighting profiles associated with services for which the network carries data. The method then determines a second network relative performance parameter for a proposed configuration of the network, based on the respective weighting profiles associated with the services for which the network carries data. The proposed configuration is implemented in the network when the second network relative performance parameter is greater than the first network relative performance parameter.
Abstract:
Concepts and technologies disclosed herein are directed to escalation of feedback instances. In one aspect disclosed herein, a feedback instance escalation resolver (“FIER”) system can receive a feedback instance escalation request from an original feedback instance. The feedback instance escalation request can identify a deficiency in the original feedback instance. The FIER system can examine the feedback instance escalation request and an objective of the original feedback instance to identify a new objective of an escalated feedback instance. The FIER system can create a definition for the escalated feedback instance to satisfy the objective and can map the definition for the escalated feedback instance to an existing feedback instance model. The FIER system can generate a feedback instance escalation realization request directed to a feedback instance orchestrator and controller (“FIOC”) system. The feedback instance escalation realization request can instruct the FIOC system to realize the escalated feedback instance.
Abstract:
Based on electronic communication received from a wireless device or from an access point, it is determined that a wireless signal relay is needed between the wireless device and the access point. In response to the determination, a drone is deployed between the wireless device and the access point to relay wireless signals between the wireless device and the access point. The deployed drone measures a first strength of a first wireless signal received from the wireless device or measures a second strength of a second wireless signal received from the access point. Based on the measurements, it is determined that the wireless device has moved relative to the access point after the drone has been deployed. In response to the determining that the wireless device has moved, the location of the drone is adjusted to maintain the first strength or the second strength above a predetermined level.
Abstract:
Automatic rating optimization is described. In an embodiment, ratings of a program can be received from one or more rating sources. Based on these ratings, a representation of a content selection mechanism can be sent to potential consumers of the content. Access events for the content can be counted over a duration of time so a determination can be made regarding how the ratings provided by each of the rating sources affect popularity of the content. A weight accorded to ratings received from each of the rating sources can be adjusted based on the determination. Profiles can be established for consumers and/or rating sources.
Abstract:
Concepts and technologies disclosed herein are directed to a pressure-based input method for user devices. According to one aspect disclosed herein, a user device can receive an output from a pressure sensor. The output can include parameters associated with a pressure applied to the pressure sensor by a user. The user device can analyze the output to determine a command to be executed by the user device. The user device can execute the command.
Abstract:
Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.