Abstract:
Aspects of the disclosed technology address the problems of manually identifying and optimizing service function chaining (SFC) performance in response to changes in traffic profiles. In one aspect of the present disclosure, a method includes monitoring, by a first network component, incoming data packets; detecting, by the first network component, a change in a traffic profile of the incoming data packets; generating, by the first network component, in-band information on changes in the traffic profile; and transmitting, by the first network component, the in-band information with one or more data packets of the incoming data packets, the in-band information being used by a second network component to adjust one or more corresponding settings for servicing the incoming data packets.
Abstract:
Aspects of the disclosed technology address the problems of manually identifying and optimizing service chain (SC) performance bottlenecks by providing solutions for automatically identifying and tuning various SC parameters. In some aspects, a SC optimization process of the disclosed technology includes the replication or cloning of a SC for which traffic flow is to be optimized. Traffic flows for the production chain can then be simulated over one or more SC clones to identify and tune individual system parameters, for example, to determine if the simulated changes produce a positive, negative, or neutral change in flow performance. Systems and machine-readable media are also provided.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
Abstract:
In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
Abstract:
Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
Abstract:
A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller determines how network flows will be distributed in the networks due to the outage from installing the update, and generates an update plan that includes timing for installing the update on each network element. The timing is based on how the network flows will be distributed in the networks. The network controller installs the update in each network element according to the timing of the update plan.
Abstract:
A testing server tests new code modules, or re-tests previously tested code modules, using individualized sets of test data. The testing server receives test datasets from an execution engine, which runs tested code modules to process operational datasets of computing devices. The testing server receives an untested code module from a user, and obtains test dataset parameters applicable to the untested code module. The testing server generates an individualized set of test datasets based on the test dataset parameters. The testing server tests the untested code module by processing each test dataset in the individualized set of test datasets to produce test results.
Abstract:
In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
Abstract:
Data indicating a plurality of informational items is received at a processor. The data further comprises at least one useful informational item. Also received at the processor is data indicating a plurality of questions, including at least one unanswered question. The processor analyzes the data to determine a number of unanswered questions and a number of useful informational items. The processor generates a visualization comparing the number useful informational items to the number of unanswered questions. The visualization is displayed on a display.
Abstract:
Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network, a first network message is received from a first access point (AP) identifying a first service set identifier (SSID) associated with a first wireless network, a second network message is received from a second AP identifying a second SSID associated with a second wireless network, and a visual similarity is determined between a first visual representation of the first SSID and a second visual representation of the second SSID. The second SSID is designated as suspicious based on the determined visual similarity.