Abstract:
A system is provided that includes a power transmitter configured to provide power to a current loop, a power receiver configured to receive the power from the current loop. The power receiver is configured to, on a periodic basis, disconnect from the current loop to stop pulling power from the current loop for a period of time to enable a safety check to be performed by the power transmitter. The power transmitter is configured to: monitor current on the current loop; determine whether a current level on the current loop passes the safety check within a predetermined time interval since a determination that the current level was not within a safe range; and control connectivity of the power to the current loop depending on whether the safety check has or has not passed within the predetermined time interval.
Abstract:
A controller of a macro wireless network provisions a user device for access to local private networks based on the cell that the user device uses to attach to the macro wireless network. The controller obtains information on private networks operating within a coverage area of the macro wireless network. The controller associates a particular cell of the macro wireless network with one or more private networks operating within the particular cell. The controller detects a user device in the particular cell and provisions the user device with access to the one or more private networks.
Abstract:
In one embodiment an approach is provided to efficiently program routes on line cards and fabric modules in a modular router to avoid hot spots and thus avoid undesirable packet loss. Each fabric module includes two separate processors or application specific integrated circuits (ASICs). In another embodiment, each fabric module processor is replaced by a pair of fabric module processors arranged in series with each other, and each processor is responsible for routing only, e.g., IPv4 or IPv6 traffic. The pair of fabric module processors communicates with one another via a trunk line and any packet received at either one of the pair is passed to the other of the pair before being passed back to a line card.
Abstract:
A web browser (252) configured to execute on a network element (130(1)) receives a Hypertext Markup Language, HTML, document including HTML network service tags. The network service tags include commands to cause a corresponding network action to be taken in connection with the network element, such as configuring and/or causing information to be read from the network element. The web browser determines, based on each HTML network service tag, the command to cause the network action to be taken in connection with the network element. The web browser issues the determined command for each HTML network service tag to a corresponding application program interface, API, (254), which in turn cause the network action to be taken in connection with the network element.
Abstract:
Techniques are provided for monitoring power consumption for individual systems or devices as a way to detect illicit or rogue hardware, e.g., addition of an unauthorized integrated circuit (IC), which may have been added to an existing system. Techniques include monitoring a power on sequence of a system, the power on sequence including one or more distinct stages, determining for each stage of the one or more distinct stages of the power on sequence, whether an observed power load of any distinct stage has deviated from an expected power load according to a power profile for the system, and when the observed power load of a given distinct stage has deviated from the expected power load, performing an action indicating that a deviation from the expected power load has occurred. The power profile specifies expected power characteristics of the system for each stage of a power on sequence.
Abstract:
According to one embodiment, a technique is presented to dynamically adjust a sample period used at a presenter device for a screen content capture sharing function during a communication session. In another embodiment, a technique is provided to control how frames of screen capture content, e.g., in a desktop sharing function, are sent to attendee devices during an online conference session. According to a still another embodiment, a technique is provided to enable on-demand designation of frames as key-frames during a desktop sharing function of an online conference session.
Abstract:
A first device having a plurality of antennas wirelessly transmits multiple series of test packets to a second device having one or more antennas, each series of test packets being transmitted with a different level of interference imposed on the test packets. The first device determines a packet error rate for each series of test packets transmitted by the first device. The first device derives an estimate of an interference cancellation capability of the second device based on the packet error rate for different levels of interference.
Abstract:
A method is provided to prevent phishing and targeted attacks. Email messages are received. When an email message is received that contains a suspicious uniform resource locator (URL), the suspicious URL is rewritten such that it points to a proxy server instead of an original destination of the suspicious URL. As a result, a request for content associated with the suspicious URL is directed to the proxy server. The proxy server determines whether to deliver content associated with the suspicious URL and if so, delivers a protected or safer version of the content with appropriate warnings. When the content is determined to be malicious, the proxy server blocks access to the content.
Abstract:
At a plurality of first devices, wireless transmissions are received at different locations in a region where multiple target devices may be emitting. Identifier data associated with reception of emissions from target devices at multiple first devices is generated. Similar identifier data associated with received emissions at multiple first devices are grouped together into a cluster record that potentially represents the same target device detected by multiple first devices. Data is stored that represents a plurality of cluster records from identifier data associated with received emissions made over time by multiple first devices. The cluster records are analyzed over time to correlate detections of target devices across multiple first devices.
Abstract:
A fiber amplifier system and method are provided for reducing noise produced by a fiber amplifier by combining an optical signal to be amplified with a continuous wave optical signal that stimulates ions in the fiber amplifier to reduce photons produced by spontaneous emission when a level of the optical signal of interest is very low or zero.