Abstract:
In one embodiment, a data processing device includes power port units for connection to network devices. Each power port unit is selectively configurable to operate as either (i) a Power Source Equipment port unit to provide power to a network device, or (ii) a Powered Device (PD) port unit to sink power from a network device. The device also includes a processor. In response to a power supply failure, the processor is operative to poll at least two network devices to determine if they are able to supply power, receive a response from each of the at least two network devices, and configure at least two power port units as PD port units to sink power from the at least two network devices. At least part of the received power is transferred from the at least two power port units via a power summing node to at least one local load.
Abstract:
In one embodiment, a first device in a network receives information regarding one or more nodes in the network. The first device determines a property of the one or more nodes based on the received information. The first device determines a degree of trustworthiness of the one or more nodes based on the received information. The first device attests to the determined property and degree of trustworthiness of the one or more nodes to a verification device. The verification device is configured to verify the attested property and degree of trustworthiness.
Abstract:
A network device may connect to a smart-enabled network. Once connected, the network device may receive a network address for a network management server (NMS). Having the network address for the NMS, the network device may generate a vCard comprising the attributes necessary for registering with the NMS. The network device may then communicate the vCard to the NMS. The NMS may then be configured to identify, register, and add the network device to a directory.
Abstract:
A system and method for an artificial intelligence (AI) confidentiality proxy that can protect a network from the transferal of sensitive AI data sets to outside AI systems. A data contract is established between the proxy and outside AI systems could function as well as user personas for additional protection. This system can also integrate with the network and provide security policy content and inspection rules.
Abstract:
Techniques for associating manufacturer usage description (MUD) security profiles for Internet-of-Things (IoT) device(s) with secure access service edge (SASE) solutions, providing for automated and scalable integration of IoT devices with SASE frameworks. A MUD controller may utilize a MUD uniform resource identifier (URI) emitted by an IoT device to fetch an associated MUD file from a MUD file server associated with a manufacturer of the IoT device. The MUD controller may determine that a security recommendation included in the MUD file is to be implemented by a cloud-based security service provided by the SASE service and cause the IoT device to establish a connection with a secure internet gateway associated with the cloud-based security service. Additionally, or alternatively, the MUD file may include SASE extensions indicating manufacturer recommended cloud-based security services. Further, cloud-based security services may be implemented if local services are unavailable.
Abstract:
A system and method for creating a context-aware, conversational chat bot or agent in multi-party conversations where participants have different levels of security access to information and the bot operates in one or more modes depending on the business context of the multi-user collaboration virtual workspace. The methods include adding a bot, as a participant, to a virtual workspace that is a multi-user collaboration workspace, obtaining, at a bot application server, context of the virtual workspace, setting, by the bot application server, a skill set for the bot from among a plurality of skill sets. The skill set varies based on the context of the virtual workspace. The methods further include configuring, by the bot application server, the bot to perform at least one task in the virtual workspace based on the skill set.
Abstract:
Methods are provided in which a collaboration server connects at least two participants via respective user devices to a collaboration session. The collaboration server further distributes, to the respective user devices, media stream data and one or more customized graphical items that are distinguishably displayed in the collaboration session. The one or more customized graphical items are displayed in a foreground or a background associated with a collaboration space of first participant of the at least two participants. The collaboration server further detects a selection, by one of the respective user devices, of a graphical item from the one or more customized graphical items displayed in the collaboration space and performs at least one action associated with the graphical item during the collaboration session based on detecting the selection of the graphical item.
Abstract:
Presented herein are techniques to geographically track and monitor an unpowered device. A method includes during a powered off state of the device, and upon detecting a predetermined event, enabling a radio frequency monitoring tag affixed to the device to collect, via radio frequency reception, information indicative of a geographical location of the radio frequency monitoring tag, storing the information indicative of the geographical location of the radio frequency monitoring tag in memory of the radio frequency monitoring tag, and upon powering up of the device, sending by the device, to a remote server, the information indicative of the detected geographical location of the radio frequency monitoring tag.
Abstract:
Methods are provided in which a collaboration server connects at least two participants via respective user devices to a collaboration session. The collaboration server further distributes, to the respective user devices, media stream data and one or more customized graphical items that are distinguishably displayed in the collaboration session. The one or more customized graphical items are displayed in a foreground or a background associated with a collaboration space of first participant of the at least two participants. The collaboration server further detects a selection, by one of the respective user devices, of a graphical item from the one or more customized graphical items displayed in the collaboration space and performs at least one action associated with the graphical item during the collaboration session based on detecting the selection of the graphical item.
Abstract:
A device associated with an enterprise receives, from a user device, a message indicating that a user of the user device has requested a service level for accessing a service while performing teleworking activities for the enterprise. The user device accesses the service via a network that includes a portion controlled by an Internet Service Provider (ISP). The enterprise has established an agreement with the ISP indicating that the ISP is to provide service levels for users who are performing teleworking activities for the enterprise via the ISP. The ISP associated with the user device is identified based on the message. A request is transmitted to the ISP to provide the service level for the portion of the network that is controlled by the ISP and the ISP provides the service level for accessing the service based on the request.