Abstract:
A method performed by a processor in a network function virtualization infrastructure includes determining an amount of resources consumed by a virtual network function subsequent to a scaling of the amount of resources in response to an occurrence of a predefined trigger event, determining an amount of time elapsed between the predefined trigger event and a completion of the scaling, determining a key performance indicator value for the virtual network function subsequent to completion of the scaling, evaluating an efficiency of the predefined trigger event that triggers the scaling, based on the amount of resources consumed by the virtual network function subsequent to the scaling, the amount of time elapsed between the detection of the predefined trigger event and completion of the scaling, and the key performance indicator for the virtual network function subsequent to completion of the scaling, and adjusting the predefined trigger event based on the evaluating.
Abstract:
A method performed by a processor in a network function virtualization infrastructure includes determining an amount of resources consumed by a virtual network function subsequent to a scaling of the amount of resources in response to an occurrence of a predefined trigger event, determining an amount of time elapsed between the predefined trigger event and a completion of the scaling, determining a key performance indicator value for the virtual network function subsequent to completion of the scaling, evaluating an efficiency of the predefined trigger event that triggers the scaling, based on the amount of resources consumed by the virtual network function subsequent to the scaling, the amount of time elapsed between the detection of the predefined trigger event and completion of the scaling, and the key performance indicator for the virtual network function subsequent to completion of the scaling, and adjusting the predefined trigger event based on the evaluating.
Abstract:
Methods and systems for providing content. A selection of a single virtual channel may be received from the user. Virtual programming data for the single virtual channel may be accessed. The virtual programming data may define content to be provided over the single virtual channel. The content may be provided over the single virtual channel in accordance with the virtual programming data.
Abstract:
A method performed by a processor in a network function virtualization infrastructure includes determining an amount of resources consumed by a virtual network function subsequent to a scaling of the amount of resources in response to an occurrence of a predefined trigger event, determining an amount of time elapsed between the predefined trigger event and a completion of the scaling, determining a key performance indicator value for the virtual network function subsequent to completion of the scaling, evaluating an efficiency of the predefined trigger event that triggers the scaling, based on the amount of resources consumed by the virtual network function subsequent to the scaling, the amount of time elapsed between the detection of the predefined trigger event and completion of the scaling, and the key performance indicator for the virtual network function subsequent to completion of the scaling, and adjusting the predefined trigger event based on the evaluating.
Abstract:
A cloud oversubscription system comprising an overload detector configured to model a time series of data of at least one virtual machine on a host as a vector-valued stochastic process including at least one model parameter, the overload detector communicating with an inventory database, the overload detector configured to obtain an availability requirement for each of the at least one virtual machine; a model parameter estimator communicating with the overload detector, the model parameter estimator communicating with a database containing resource measurement data for at least one virtual machine on a host at a selected time interval, the model parameter estimator is configured to estimate the at least one model parameter from the resource measurement data; a loading assessment module communicating with the model parameter module to obtain the at least one model parameter for each of the at least one host running at least one virtual machine and determine a probability of overload based on the at least one model parameter, wherein the loading assessment module communicates the probability of overload to the overload detector; wherein the overload detector compares the probability of overload to the availability requirement to identify a probable overload condition value; and wherein the overload detector communicates the probable overload condition value to a recommender, wherein the recommender generates an alert when the overload condition value exceeds the service level agreement requirements for any of the at least one virtual machine.
Abstract:
A computerized system and method for managing a passive optical network (PON) is disclosed. The system includes a detection and analysis module adapted for receiving uploaded measurement data from an optical line terminal (OLT) and at least one optical network terminal (ONT), and at least one of technical tools data, service failure data, and outside plant data. The detection and analysis module is adapted for determining a source of failure or potential failure in the PON by correlating the uploaded measurement data and the at least one of technical tools data and service failure data with information stored in a memory medium for the OLT and each ONT.
Abstract:
Devices and methods are disclosed which relate to a wireless communications device comprising a wireless power transmission detector and a wireless power transmission indicator for displaying to a user the current level of wireless power transmission. A voltmeter and ammeter take readings from the wireless transceiver circuit while the wireless communications device is on. A power logic stored on a memory within the wireless communications device converts the readings into a wireless power transmission level. The wireless power transmission level is output to an indicator on the wireless communications device where a user can view it. Exemplary embodiments include a true battery life indicator on the wireless communications device. The true battery life indicator gives an amount of time a battery powering the wireless communications device will last at the current wireless power transmission level.
Abstract:
A wireless communication device includes a processor and a memory coupled to the processor. The memory includes instructions executable by the processor to perform operations. The operations include receiving a communication request input corresponding to an action to be executed with respect to a data file. The action is executable by the processor when the processor is connected to an external resource. The operations include automatically determining, in response to receiving the communication request input, whether the processor is connected to the external resource. The external resource enables the processor to communication via a wireless wide area network. The method also includes generating delayed action metadata in response to determining that the processor is not connected to the external resource. The delayed action metadata indicates that the requested action is to be executed by the processor when the processor is subsequently coupled to the external resource.
Abstract:
In one example, the present disclosure describes a device, computer-readable medium, and method for implementing programmable security specifications in home routers. For instance, in one example, a method performed by a processing system including at least one processor includes monitoring network traffic flowing into and out of a home network that is connected to a core network via a gateway device, constructing a model of network traffic flowing into and out of the home network, based on the monitoring, detecting an anomaly in the model of the network traffic, generating a rule based on the anomaly, where the rule specifies an action to be taken when a match condition related to the anomaly is detected, and deploying the rule on the gateway device.
Abstract:
Aspects of the subject disclosure may include determining a local classifier device classification associated with a first device via a local machine learning (ML) device classifier according to basic information data associated with the first device, storing the local classifier device classification at a local device classification database, and storing the local classifier device classification at a device classification for ML training database, receiving a ML model update from a trainer for ML device classifier, the ML model update is generated by the trainer for ML device classifier according to the device classification for ML training database and a remote classifier device classification, and the remote classifier device classification is determined via a remote ML device classifier according to historical network information associated with the first device, and updating the local ML device classifier according to the ML model update. Other embodiments are disclosed.