Abstract:
Novel tools and techniques are provided for providing service provider cloud services. In some embodiments, a virtualized service equipment (“VSE”), in communication with a cloud service network, might establish communications with a central controller over a network, register with the central controller, and receive a configuration file having a base configuration (which might cause the VSE to retrieve and display a cloud service marketplace having a service offering(s)). The VSE might also receive a selection of the service offering(s) and transmit the selection of the service offering(s) to the central controller. A network controller in communication with the VSE might provision cloud network resources, as part of a programmable service backbone, to provide the selected service offering(s). An app controller in communication with the VSE might setup app services on the VSE and the programmable service backbone based on the selected service offering(s).
Abstract:
Novel tools and techniques are utilized or implemented for providing a cloud services marketplace. In some embodiments, a method might include providing an index of product offerings for selection. The index of product offerings including at least one product offering, each of the at least one product offering in the index of product offerings including a respective qualifier. The method might also include receiving a customer selection of one or more product offerings among the at least one product offering, and providing at least one network service needed to provision the one or more customer selected product offerings based on the respective qualifier. The at least one network service might be associated with at least one virtualized network function. The method might further include provisioning network resources to perform the at least one virtualized network function, based on the respective qualifier.
Abstract:
Novel tools and techniques might provide for implementing interconnection gateway and/or hub functionalities between two or more network functions virtualization (“NFV”) entities that are located in different networks. In some embodiments, a NFV interconnection gateway (“NFVIG”) might receive a set of network interconnection information from each of two or more sets of NFV entities, each set of NFV entities being located within a network separate from the networks in which the other sets of NFV entities are located. The NFVIG might be located in one of these networks. The NFVIG might abstract each set of network interconnection information, and might establish one or more links between the two or more sets of NFV entities, based at least in part on the abstracted sets of network interconnection information. The NFVIG might provide access to one or more virtualized network functions (“VNFs”) via the one or more links.
Abstract:
Novel tools and techniques are described for auto-summarizing video and/or audio content. In some embodiments, a summary server might retrieve one or more time codes from a time code database, and might analyze the one or more time codes to determine at least one selected time code among the one or more time codes that exceeds a predetermined number of selections. The one or more time codes might correspond to one or more triggers, which might include user-inputted triggers, triggers associated with actions by a live audience, or broadcaster/distributor/producer-provided triggers (i.e., cue tones). The summary server might determine one or more selected segments of video or audio content corresponding to the at least one selected time code, and might create one or more summary tracks, where each of the one or more summary tracks might comprise each of the one or more selected segments of the video or audio content.
Abstract:
Novel tools and techniques are provided for implementing Inference as a Service. In various embodiments, a computing system may receive a request to perform an AI/ML task on first data, the request including desired parameters, in some cases, without information regarding any of specific hardware, specific hardware type, specific location, or specific network for providing network services for performing the requested AI/ML task. The computing system may identify edge compute nodes within a network based on the desired parameters and/or unused processing capacity of each node. The computing system may identify AI/ML pipelines capable of performing the AI/ML task, the pipelines including neural networks utilizing pre-trained AI/ML models. The computing system may cause the identified nodes to run the identified pipelines to perform the AI/ML task. In response to receiving inference results from the identified pipelines, the computing system may send, store, and/or cause display of the received inference results.
Abstract:
Novel tools and techniques are provided for implementing tracking or storing of equipment configuration data using immutable ledger functionality of blockchains. In various embodiments, in response to receiving a first request for first configuration data that is output by first equipment, a computing system might determine whether a communicatively coupled data repository contains the first configuration data. If so, the computing system might retrieve and send (to the requesting device) the first configuration data. If not, the computing system might send, to a blockchain system, a second request for identifying a blockchain containing a block containing the first configuration data. In response to such a blockchain being identified, the computing system might receive the identified blockchain; might abstract the block containing the first configuration data from the identified blockchain; might abstract the first configuration data from the block; and might send the first configuration data to the requesting device.
Abstract:
Novel tools and techniques are provided for utilizing blockchain to implement named data networking. In various embodiments, a computing system might determine whether a cache that is communicatively coupled to the computing system contains data that is responsive to a first request received from a user. If so, the computing system might retrieve and send (to the client device) data that is responsive to the received first request. If not, the computing system might send, to a blockchain system, a second request for identifying a blockchain containing a block containing data responsive to the received first request. In response to identifying such a blockchain, the computing system might receive a copy of the identified blockchain; might abstract, from the identified blockchain, the block containing the data responsive to the received first request; might abstract the data from the identified block; and might send the data to the client device.
Abstract:
Novel tools and techniques are provided for remotely configuring and orchestrating multifunctional cloud devices located on customer premises, in some cases, using a smart cloud adaptive device. In some embodiments, the smart cloud adaptive device, which might have one or more wireless programmable radios configured to communicate with a network termination device, might communicate with a cloud configuration server over a network via the one or more wireless programmable radios (and, in some embodiments, through the network termination device). The smart cloud adaptive device might transmit device identification information associated with a customer and/or service codes indicative of services to be provided to the customer. The smart cloud adaptive device might receive one or more configuration files from the cloud configuration server based on the service codes, and enable functionality among a plurality of functionalities to provision the services, based on the one or more configuration files.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques are provided for utilizing blockchain to implement named data networking. In various embodiments, a computing system might determine whether a cache that is communicatively coupled to the computing system contains data that is responsive to a first request received from a user. If so, the computing system might retrieve and send (to the client device) data that is responsive to the received first request. If not, the computing system might send, to a blockchain system, a second request for identifying a blockchain containing a block containing data responsive to the received first request. In response to identifying such a blockchain, the computing system might receive a copy of the identified blockchain; might abstract, from the identified blockchain, the block containing the data responsive to the received first request; might abstract the data from the identified block; and might send the data to the client device.