Abstract:
Aspects of the subject disclosure may include, for example, a process that determines an identity of a subscriber of a media service. A viewing criterion of the subscriber is determined and a media content item is identified based on the viewing criterion of the subscriber. The media content item is provided for delivery to a media processing device without first requiring a request for delivery of the media content item. The media processing device is identified by a network service provider based on a selection of the media processing device from among a number of devices of the subscriber that are registered with the network service provider. The selection of the media processing device is based on device capabilities and the identity of the subscriber. Other embodiments are disclosed.
Abstract:
A request to instantiate a first service is received. The first service is subject to policy constraints including a location. It is determined that a first set of resources at the location is required for instantiation of the first service. The first set of resources is reallocated to the first service from a second service. The first service is instantiated at the location utilizing the first set of resources reallocated.
Abstract:
A device and method manages components of a network. The method performed in a registry includes recording, for an instantiated component (IC), an identification thereof. The method includes recording, for the IC, a location of the IC, the location being a physical location or a virtual location. The method includes recording, for the IC, a relation of the IC to a second IC. The method includes receiving a change to one of the identification, the location, and the relation. The method includes recording the change and a further change to another one of the identification, the location, and the relation based upon the change.
Abstract:
A request to instantiate a first service is received. The first service is subject to policy constraints including a location. It is determined that a first set of resources at the location is required for instantiation of the first service. The first set of resources is reallocated to the first service from a second service. The first service is instantiated at the location utilizing the first set of resources reallocated.
Abstract:
Aspects of the subject disclosure may include, for example, a process that determines an identity of a subscriber of a media service. A viewing criterion of the subscriber is determined and a media content item is identified based on the viewing criterion of the subscriber. The media content item is provided for delivery to a media processing device without first requiring a request for delivery of the media content item. The media processing device is identified by a network service provider based on a selection of the media processing device from among a number of devices of the subscriber that are registered with the network service provider. The selection of the media processing device is based on device capabilities and the identity of the subscriber. Other embodiments are disclosed.
Abstract:
A request to instantiate a first service is received. The first service is subject to policy constraints including a location. It is determined that a first set of resources at the location is required for instantiation of the first service. The first set of resources is reallocated to the first service from a second service. The first service is instantiated at the location utilizing the first set of resources reallocated.
Abstract:
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
Abstract:
Information is presented over a communications network. The presence of a party on a device is detected in real time. Identity of the party is confirmed based on detecting the presence of the party on the device in real time. Information to offer to the party is identified based on confirming identity of the party. A communication is pushed to the party on the device as a push communication in real time while the party is still present on the device. The information is offered in the push communication while the party is still present on the device.
Abstract:
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.
Abstract:
A network functions virtualization (NFV) network can be configured to operate according to NFV protocols that decouple software functionality from specific hardware elements. A referent system can be provided that identifies a precise physical location of devices associated with the NFV network relative to other equipment or devices associated with the NFV network.