Abstract:
A request to instantiate a first service is received. The first service is subject to policy constraints including a location. It is determined that a first set of resources at the location is required for instantiation of the first service. The first set of resources is reallocated to the first service from a second service. The first service is instantiated at the location utilizing the first set of resources reallocated.
Abstract:
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
Abstract:
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
Abstract:
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
Abstract:
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
Abstract:
Examples for controlling an aerial device are described. An example method includes a processor receiving a request comprising an origin location and a destination location, determining a flight path based on the origin location and the destination location, wherein the flight path is determined based on at least one policy driven control rule, providing the flight path in response to the request and monitoring an unmanned aerial vehicle traversing the flight path.