Abstract:
Aspects of the subject disclosure may include, for example, a method comprising authenticating, by a server comprising a processor, a communication device to a first communication network, in accordance with authentication information stored in a first repository of the first communication network. The method also comprises determining, by the server, that a second communication network is accessible to the communication device. The method further comprises providing, by the server, the authentication information to a second repository of the second communication network in accordance with the determining, wherein the providing is performed independently of a request from the second communication network. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, a method comprising caching, by a server comprising a processor, a subscriber profile in a network repository to create a cached subscriber profile. The cached subscriber profile comprises a replica of stored subscriber data. The method also comprises updating the cached subscriber profile in accordance with subscriber use of a first application from a first application provider to produce a first updated version of the cached subscriber profile. The method further comprises updating the first updated version of the cached subscriber profile in accordance with subscriber use of a second application from a second application provider to produce a second updated version of the cached subscriber profile. The first and second updated versions of the cached subscriber profile are accessible by the first application provider and by the second application provider. Other embodiments are disclosed.
Abstract:
A network device may receive intelligent operations interface information that may comprise resources or events that may affect a communication system. The intelligent operations interface information may be processed to isolate network performance problems and effectuate a prioritized resolution of the network performance problems.
Abstract:
Individually unique key performance indicator management may be utilized to enhance performance in a network. A warning alarm threshold for a key performance indicator associated with a mobile device may be determined. And upon receiving an alert message indicating that the warning alarm threshold has been exceeded, a network device may be modified.
Abstract:
An intelligent decision engine is configured on a mobile device that includes rules and criteria that the engine uses to determine whether to allow the mobile device to engage in M2M communications with an M2M device. The criteria may be based on user groups, location of the mobile device, privacy zones that may or may not include the M2M device, “black” and/or “white” access lists, time of day, traffic on a wireless link to a wireless network, etc. If the communication meets all applicable criteria it is permitted to commence, and if not, it is blocked.
Abstract:
Aspects of the subject disclosure include, for example, embodiments that include determining a content context of a first segment of content being presented by a media processor at a display to an audience. Further embodiments include determining an expected audience reaction according to the content context of the first segment, and receiving sensor data captured from a sensor device in proximity to the audience where the sensor data is indicative of a sensed audience reaction to the first segment of the content. Additional embodiments include comparing the sensed audience reaction with the expected audience reaction to determine a level of interest in the first segment, and adjusting a second segment of the content according to the level of interest to generate an adjusted second segment displayable at the display. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, receiving user input including a first message and identification information associated with a recipient that is intended to receive the first message, generating a second message by adjusting a first message according to a first attention span determined from activity information of a recipient, and transmitting the second message to a receiving device to enable the receiving device to generate a third message by adjusting the second message according to a second attention span determined by the receiving device for the recipient. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, a method comprising providing services over a network to a device, and constructing device capability and usage profiles. A level of service quality for the device is adjusted by adjusting a latency criterion regarding connection of the device to the network; adjusting a speed of transmissions to or from the device; and altering a routing of transmissions to or from the device. The network can be partitioned so that the adjusted service quality level is provided by a network portion having a predetermined level of resources. The adjusted service quality level can comprise a first level while the device is active and a second level while the device is inactive; the first level is higher than the second level. The first and second levels are lower than a service quality level provided by another network portion. Other embodiments are disclosed.
Abstract:
Smart M2M devices may be utilized to discover, generate, develop, and use customer behavior information. Security, marketing, and sales may be made through the use of short-range communication mechanisms, and customer behavior information may be gathered while providing devices with product information and other content. In an example configuration, smart M2M devices may determine the location of a device in a venue and compare it to historical location information associated with the device to determine whether authentication should be requested.
Abstract:
Aspects of the subject disclosure may include, for example, detecting a request for a network service between two network nodes and identifying a network path between the two network nodes, wherein the network path is realized by equipment performing a number of network functions. A first network function of the number of network functions is associated with a first number of redundant virtualized network resources performing at least a similar network function as the first network function. Usage metrics are determined corresponding to the first number of redundant virtualized network resources and a first virtualized network resource of the first number of redundant virtualized network resources is assigned to the network path based on the usage metrics to obtain a first assigned virtualized network resource. The network service is provided between the two network nodes using the first assigned virtualized network resource. Other embodiments are disclosed.