4 research outputs found

    DEEPSORTING: CUSTOMER-CENTRIC SEQUENCE-TO-SEQUENCE NOTIFICATION PRIORITIZATION

    Get PDF
    Network operators may control many thousands of devices and, as a consequence, they may be bombarded with notifications (e.g., posture assessments and exceptions for devices that do not comply with standards or which require remediation actions to circumvent security issues) and can be discouraged by unimportant or irrelevant information. To address the challenge that was described above, techniques are presented herein that support a process for intelligently filtering and prioritizing notifications to reduce noise and deliver recommendations that will provide the greatest impact to an environment. Aspects of the presented techniques encompass a smart recommendation notification system that prioritizes network actions based on multiple embedding spaces and dimensions; the use of business and financial logic, a persona, and a network operating state for reducing network actions into a prioritized output; the use of click-through and sequence mining to establish a ground truth of event prioritization of a network operator; an adaptive learning method for tracking proposed network recommendations to the final action that may be executed by a network operator; and a method for reducing multi-step recommendations based on an identification of the most efficient sequence of events based on a network operator implementation

    AUTOMATING NETWORK DEVICE CONFIGURATION TEMPLATE DISCOVERY

    Get PDF
    Establishing network device golden configuration templates typically relies on largely manual efforts and a dialogue between network consulting engineers and customers. Techniques are presented herein that streamline the process of discovering and baselining network standards by examining underlying themes and relationships between micro-templates in customer environments. Aspects of the presented techniques employ a Masked-Language Model (MLM), in a way that an MLM was not necessarily intended, to detect locally significant attributes in network device configurations for the express purpose of identifying structures that are common across a set of devices. Under further aspects of the presented techniques, the creation of association rules between configuration blocks and the devices on which they are found allows for the identification of underlying themes in configurations that form the basis of network standards and platform-based templates

    ENDPOINT POLICY ENFORCEMENT OPTIMIZATION AND DYNAMIC ENVIRONMENT ASSESSMENT DURING VIDEO CONFERENCES

    Get PDF
    Techniques are presented herein that support an audio and video policy framework that utilizes available sensors (encompassing both true Internet of things (IoT) sensors as well as the identification of beacons from mobile phones, consumer laptops, etc.) in conjunction with historical meeting data to suggest and enforce policies during teleconference meetings. By taking stock of the immediate environment surrounding a meeting participant, such a framework can enforce the audio and video options that are available to the user to align with secure practices and confidentiality protections. Aspects of the presented techniques support the identification of safe spaces through the use of Global Positioning System (GPS) coordinates, the detection of an increased presence of consumer devices for the purpose of suggesting and applying audio and visual security profiling, and the ability to send a notification to a telepresence user in the event that predicted meeting content may be too sensitive based on the environment of the meeting participant

    ENABLING AND INTEGRATING DYNAMIC TELEPROMPTING CAPABILITIES FOR ONLINE MEETINGS

    Get PDF
    A natural and conversational style is difficult on video calls, particularly for the presenter. When the use of a teleprompter is included during such calls, the challenges are highlighted as the camera magnifies even the smallest movements, particularly in the eyes. To address such challenges, techniques are presented herein that support a “dynamic teleprompter” that may be seamlessly embedded within, and integrated into, a collaboration meeting platform. Such a dynamic teleprompter may move strategically (according to one or more of several different movement algorithms) around the speaker\u27s viewing area thus eliminating the problems of static teleprompters and allowing a presenter to project a much more natural and conversational speaking style. The resulting natural speaker motion and dynamism also provides a richer and more engaging meeting experience for the participants who are consuming the speaker\u27s content
    corecore