Feng Liu - Frisco TX, US Dongdong Li - Dallas TX, US Will A. Egner - Allen TX, US Chen Liao - Frisco TX, US Yindong Zheng - Dallas TX, US He Liu - Bellevue WA, US
International Classification:
G06Q 10/00 G06Q 50/00
US Classification:
705 8
Abstract:
A system and method for rehome sequencing optimization of a telecommunications network. In a preferred embodiment, a practicable optimized rehome sequencing plan is determined for a rehome plan in order to migrate the network topology from an initial state to a final state while minimizing the costs incurred during the network state transitions across multiple time periods. Constraints that may be considered include specific market restrictions such as the limit on the number of network elements in a cluster, the limit on the number of clusters in a sequencing step, the limit on the number of sequencing steps, and the immobility limit on the network elements. Constraints also may include cost restrictions incurred during network transitions, such as individual cost limits during each network transition state and an overall cost limit of network transitions from the initial state to the final state.
Sealing Secret Data With A Policy That Includes A Sensor-Based Constraint
Stefan Saroiu - Redmond WA, US Alastair Wolman - Seattle WA, US Himanshu Raj - Issaquah WA, US He Liu - La Jolla CA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 1
Abstract:
Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a constraint that can only be satisfied by predefined readings that may be output by at least one sensor on a mobile computing device. If the sensor on the mobile computing device outputs a reading that satisfies the sensor-based constraint, secret data is provided to a requesting application. Otherwise, the requesting application is prevented from accessing the secret data.
- Redmond WA, US Dionicio A. Avila - Issaquah WA, US He Liu - Sammamish WA, US Julia Zhao-Hua Lehner - Redmond WA, US Maruf Md Maniruzzaman Abbasi - Bellevue WA, US Nathan Staley - Edmonds WA, US Amisha Bhatia - Sammamish WA, US
Non-limiting examples of the present disclosure describe insight-based routing that is used to improve transparency and communication between customers and support agents of a help desk service. An unresolved case may be identified through a help desk service. Case details associated with the unresolved case may be evaluated. In examples, an evaluation of the case details may comprise analyzing an issue that requires resolution, detecting a case state that corresponds with one or more actions taken to resolve the issue of the unresolved case and detecting, through the help desk service, user presence information indicating availability of a customer associated with the unresolved case. A follow-up inquiry may be generated based on the detected case state. The follow-up inquiry may be automatically transmitted to the customer based on an evaluation of the user presence information indicating that the customer is available.
- Redmond WA, US Sanjeev Balarajan - Bellevue WA, US He Liu - Sammamish WA, US Matthew Lopez - Seattle WA, US Andy Siow - Bellevue WA, US
International Classification:
G06Q 30/00 G06Q 10/06
Abstract:
Technologies for enabling support providers to integrate into a support application and provide real-time support for requests based at least partly on authorizations associated with the support providers are described. The technologies described can access authentication data associated with support providers. The technologies described can receive a request associated with a product and/or a service and determine contextual data associated with the request. The technologies described can determine authorization data associated with support providers, determine support providers for supporting the request based partly on the contextual data, determine that the support providers are authorized to receive the request, and generate task data associated with the request. The technologies described can further include sending the task data to devices corresponding to the support providers, determining that an individual support provider accepts the request, and causing a display of a graphical element indicating that the individual support provider accepts the request.
- Redmond WA, US Sanjeev Balarajan - Bellevue WA, US He Liu - Sammamish WA, US Andy Siow - Bellevue WA, US Matthew Lopez - Seattle WA, US Masroor Syed Hussain - Mill Creek WA, US Brian Van Doren - Redmond WA, US
International Classification:
G06Q 30/00 G06Q 10/06
Abstract:
Technologies for enabling real-time support for requests (e.g., onboarding requests, support requests, managing requests, troubleshooting requests, etc.) based at least in part on contextual data are described. The technologies described can receive a request associated with a product and/or a service and determine contextual data associated with the request. The contextual data can define a status of an application associated with the product and/or the service. Additionally, the technologies described can include determining support providers for supporting the request based partly on the contextual data and generating task data associated with the request. The task data can include the contextual data. The technologies described can further include sending the task data to devices corresponding to the support providers, determining that an individual support provider of the support providers accepts the request, and causing a display of a graphical element indicating that the individual support provider accepts the request.
Sealing Secret Data With A Policy That Includes A Sensor-Based Constraint
Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a constraint that can only be satisfied by predefined readings that may be output by at least one sensor on a mobile computing device. If the sensor on the mobile computing device outputs a reading that satisfies the sensor-based constraint, secret data is provided to a requesting application. Otherwise, the requesting application is prevented from accessing the secret data.