Abstract:
Workforce and workload prediction is provided. A portal is configured to receive input from a user, wherein the input relates to forecasting workload and workforce for providing a communication service. The workload includes ticket loads relating to repair and provisioning, and the workforce includes human resources and equipment. A load prediction is output in response to the input, wherein the load prediction is generated by a forecast model that utilizes regression analysis of historical data and real-time information that includes workforce availability data and one or more factors impacting the workload.
Abstract:
A fiber optic connector may include a first cover with an integral restraining mechanism and a second cover with a reciprocal restraining mechanism. A fiber optic cable having a ferrule at a terminating end may be placed within the fiber optic connector. A dust cap may be placed on the terminating end of the fiber optic cable. The integral restraining mechanism and the reciprocal restraining mechanism may detachably mate and enclose the terminating end of the fiber optic cable within the fiber optic connector. The fiber optic connector may include one or more gaskets to assist in sealing the connector.
Abstract:
Apparatus and methods are provided for controlling a light emission from an end of an optical fiber by utilizing a cover that blocks the light emission at the fiber end, a detector situated between the fiber end and the cover that detects the blocked emission, and a signaling device, such as an LED, associated with the detector that illuminates in response to the detection of the blocked emission. The apparatus and methods may further provide for the filtering out of light from the emission that is not used for communications. The apparatus and methods may also provide for the attenuation of the power of the emission before the emission reaches the detector.
Abstract:
A device may include a first network module to capture network data at a first location in a network and a second network module to capture network data at a second location in the network different from the first location in the network. The device may include a control module to receive control commands relating to the first network module and the second network module. The control module may forwarded the control commands to the first network module and the second network module. The control module may receive the captured network data from the first network module and the second network module.
Abstract:
A method may include receiving, at a first network device, a message from a second network device. The method may include determining whether the message is a test setup message, where the test setup message includes a network address associated with the second network device. A test sequence may be initiated with the second network device based on the network address when it is determined that the message is a test setup message.
Abstract:
Sources of operational problems in business transactions often show themselves in relatively small pockets of data, which are called trouble hot spots. Identifying these hot spots from internal company transaction data is generally a fundamental step in the problem's resolution, but this analysis process is greatly complicated by huge numbers of transactions and large numbers of transaction variables to analyze. A suite of practical modifications are provided to data mining techniques and logistic regressions to tailor them for finding trouble hot spots. This approach thus allows the use of efficient automated data mining tools to quickly screen large numbers of candidate variables for their ability to characterize hot spots. One application is the screening of variables which distinguish a suspected hot spot from a reference set.
Abstract:
In one of many possible embodiments, a method of locating a mobile terminal within a location area of a mobile communication network is provided. In the method, a threshold is set by calculating a sum of all location probabilities in the location area and dividing the sum by a maximum number of polling cycles allowed before the mobile terminal is located. Cells in the location area are arranged in non-ascending order according to their location probabilities. Multiple paging areas are formed one at a time by starting with a first cell not used in a previous paging area, grouping cells in order, and stopping when the total of location probabilities reaches the threshold or when no more ungrouped cells exist within the location area.
Abstract:
A device prevents theft of service attacks on a Session Initiation Protocol (SIP)-based device using an identity assurance protection mechanism, a multiple end-points protection mechanism, and an intrusion detecting protection mechanism.
Abstract:
A system may receive configuration information relating to forwarding of communications in a network from a first endpoint to other endpoints. Presence information may also be received for the endpoints. The presence information may include proximity information indicating whether pairs of the endpoints are in physical proximity to one another. The system may forward communications destined for a first of the plurality of endpoints to a second of the plurality of endpoints based on the configuration information and the presence information.
Abstract:
A fiber optic cable with detectable ferromagnetic components may include a plurality of detectable ferromagnetic components distributed longitudinally along the cable and insulated from each other. The fiber optic cable may contain the typical layers of fiber core, cladding, coating, strengthening fibers, and cable jacket. Each of the detectable ferromagnetic components may be a ferromagnetic metal strip forming a band around the cable. The metal bands may be distributed at different locations of the cable. Other ferromagnetic materials than metal may be used, as long as they are detectable by a metal detector. The detectable ferromagnetic components may form patterns that may be identified by the metal detector.