-
公开(公告)号:US20200380633A1
公开(公告)日:2020-12-03
申请号:US16995770
申请日:2020-08-17
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Brian S. Amento , Matti A. Hiltunen , Kaustubh Joshi , David P. Kormann , Rajesh Krishna Panta , Kermit Hal Purdy , Thomas M. Smith , Alex Varshavsky , Svetlana Yarosh
Abstract: A method and computer-readable storage device and apparatus for controlling a roadway resource are disclosed. For example, the method receives from a device associated with a vehicle a request to reach a target destination by a target arrival time and a maximum payment amount to reach the target destination by the target arrival time. The method next determining a route to the target destination and determines a roadway resource along the route that is controllable. The method then sends an instruction to the device associated with the vehicle, where the instruction indicates to navigate the vehicle along the route and controls the roadway resource to enable the vehicle to reach the target destination by the target arrival time.
-
公开(公告)号:US10820204B2
公开(公告)日:2020-10-27
申请号:US16119427
申请日:2018-08-31
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Kaustubh Joshi
Abstract: Example mobile devices disclosed herein include a camera, memory including computer-executable instructions, and a processor to execute the instructions to at least associate a location of the mobile device with picture data obtained with the camera. The processor is also to assign a first data tag to the picture data when the location of the mobile device corresponds to a first area, the first data tag to identify a first security level for the picture data, or assign a second data tag to the picture data when the location of the mobile device does not correspond to the first area, the second data tag to identify a second security level for the picture data. The processor is further to determine whether to permit an application to access the picture data based on whether the first data tag or the second data tag is assigned to the picture data.
-
公开(公告)号:US20200211541A1
公开(公告)日:2020-07-02
申请号:US16234343
申请日:2018-12-27
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Varun Gupta , John Murray , Kaustubh Joshi , Mazin Gilbert , Oliver Spatscheck , Rittwik Jana
Abstract: Devices, computer-readable media, and methods for submitting a modified voice input to a service based upon a user intent determined from a voice input in accordance with a voice interface of the service are disclosed. A processing system including at least one processor may obtain a voice input of a user, determine an intent from the voice input, identify a first service, from among a plurality of services, in accordance with the intent, and formulate a first modified voice input from the voice input in accordance with a voice interface of the first service, where each of the services is associated with one of a plurality of different voice interfaces. The processing system may further submit the first modified voice input to the first service, obtain a first voice response from the first service, and present a voice output to the user in accordance with the first voice response.
-
公开(公告)号:US20200186593A1
公开(公告)日:2020-06-11
申请号:US16790848
申请日:2020-02-14
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Gueyoung Jung , Kaustubh Joshi , Matti A. Hiltunen , Richard D. Schlichting
Abstract: Concepts and technologies are disclosed herein for an application deployment engine. A processor that executes an application deployment engine can receive an application request. The processor can obtain network topology data that indicates availability of resources of a data center, an application template associated with the application, and a running time during which an application placement plan is to be identified out of a large number of placement scenarios within the running time. The application template can describe an application flow path associated with the application. The processor can identify the application placement plan, where the application placement plan can include an optimal placement of the application at the data center, before a given running time expires by pruning the large search space. The processor can generate a command to effect deployment of the application in accordance with the application placement plan.
-
公开(公告)号:US20190215715A1
公开(公告)日:2019-07-11
申请号:US16357495
申请日:2019-03-19
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Kaustubh Joshi , Rajesh Krishna Panta , Cong Shi
CPC classification number: H04W28/0231 , H04L12/1435 , H04L41/5029 , H04M15/8016 , H04M15/8022 , H04M15/8027 , H04W4/24
Abstract: An eNodeB or other cell access point device can receive demand data from mobile devices served by the cell. The demand data can represent an estimate of demand over a future period for network resources (e.g., bandwidth). The cell can aggregate this demand data and determine price data for the time period or for various intervals of the time period, then transmit the price data to the mobile devices. The price data can operate as a collaborative approach to scheduling traffic. For example, data (e.g., delay tolerant data) can be shifted (e.g., delayed for a few seconds) based on an examination of the price data in conjunction a determined priority of the data. Such can be applicable to data traffic not traditionally thought of as delay tolerant such as streaming video or web browsing, and can be accomplished without negatively impacting the quality of service or experience of the client.
-
公开(公告)号:US20180351874A1
公开(公告)日:2018-12-06
申请号:US15608371
申请日:2017-05-30
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Abhigyan , Kaustubh Joshi , Richard Schlichting , Matti Hiltunen , Yoji Ozawa
IPC: H04L12/911 , H04L29/06 , H04L12/46
CPC classification number: H04L47/70 , H04L12/4641 , H04L41/0893 , H04L45/02 , H04L45/34 , H04L47/80 , H04L67/10 , H04L67/42
Abstract: Concepts and technologies are disclosed herein for creating cross-service chains of virtual network functions in a wide area network. A controller can receive a chain request from a requestor. The chain request can specify functionality that is to be included in a service chain. The functionality can include a first function and a second function. The controller can compute a route associated with the service chain. The route can specify a first site that hosts a first service that provides the first function and a second site that hosts a second service that provides the second function. A first virtual network function can be located at the first site and a second virtual network function can be located at the second site. The controller can configure edge devices and forwarding devices to various entities at the two sites to enable the cross-service virtual network function chain.
-
公开(公告)号:US10070315B2
公开(公告)日:2018-09-04
申请号:US14089942
申请日:2013-11-26
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Kaustubh Joshi
Abstract: A method for managing security levels on a mobile device includes receiving a capsule including first data; assigning a first data tag to the capsule, the first data tag identifying a security level for the first data; storing the capsule on the mobile device; executing a process on the mobile device, the process associated with an application tag; allowing the process to access the first data when the application tag matches the first data tag, the process for generating second data in response to the first data.
-
公开(公告)号:US20180173745A1
公开(公告)日:2018-06-21
申请号:US15387178
申请日:2016-12-21
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Bharath Balasubramanian , Gerald Karam , Kaustubh Joshi , Pamela Zave
IPC: G06F17/30
CPC classification number: G06F16/2365 , G06F16/2336 , G06F16/275
Abstract: A system includes a plurality of sites a first plurality of key value data stores and a second plurality of key value stores. The first plurality of key value stores are provided with eventually consistent semantics for storing a plurality of keys. The second plurality of key value stores are provided with strongly consistent semantics for creating and storing locks created by a client. The system further includes a service for performing operations on the first plurality of key value store replicas and the second plurality of key value store replicas. the operations performed by the service conform to the following properties: when a client acquires a lock to a set of keys from the plurality of keys to create a set of locked keys, the client is guaranteed a consistent version that reflects a most recent update to each key in the set of locked keys; when the client performs reads and writes to the set of locked keys all reads and writes are ordered and other writers are excluded; and when a member key of the set of locked keys is unlocked, anyone can read and write to the member key, and values of member key replicas are eventually consistent.
-
公开(公告)号:US20150095718A1
公开(公告)日:2015-04-02
申请号:US14042089
申请日:2013-09-30
Applicant: FUJITSU LIMITED , AT&T Intellectual Property I, L.P.
Inventor: Hiroshi Otsuka , Kaustubh Joshi , Matti A. Hiltunen , Edward Scott Daniels , Yasuhide Matsumoto
CPC classification number: G06F11/3409 , G06F11/008 , G06N99/005 , H04L41/0677 , H04L41/147
Abstract: Methods, systems, and products predict locations of failures. Messages historically received are analyzed to predict a future failure. A pattern in the messages historically received is used to retrieve a template. A location of the future failure is predicted from the template.
Abstract translation: 方法,系统和产品预测故障的位置。 分析历史上收到的消息来预测未来的故障。 历史上接收到的消息中的模式用于检索模板。 从模板预测未来故障的位置。
-
公开(公告)号:US12177871B2
公开(公告)日:2024-12-24
申请号:US17809363
申请日:2022-06-28
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Aleksandr Zelezniak , Gueyoung Jung , Kaustubh Joshi , Shankaranarayanan Puzhavakath Narayanan
Abstract: Described is centralized scheduling of baseband unit resources of a hub, including allocating and deallocating baseband unit resources of a distributed unit instance based on anticipated and/or actual demand for the resources. For example, when user equipment transitions to a connected state, a corresponding message can be detected and used to determine whether sufficient baseband unit resources exist to handle the traffic of the newly connecting user equipment. If not, additional baseband unit resources are allocated, coupled to a node (cell), and the node scheduled to handle the user equipment traffic. When user equipment transitions to an inactive state, the corresponding command can be detected and used to determine whether the baseband unit resources are still needed for other traffic. If not, the baseband unit resources are deallocated.
-
-
-
-
-
-
-
-
-