O Berzin, RJ Huey - US Patent 11,985,534, 2024 - Google Patents
Techniques are described for a network providing application workload routing and application workload interworking. For example, a controller may move or replicate an …
M Segler - US Patent 11,522,747, 2022 - Google Patents
US11522747B1 - Cloud service outage reporting - Google Patents US11522747B1 - Cloud service outage reporting - Google Patents Cloud service outage reporting Download PDF …
M Segler - US Patent 11,748,080, 2023 - Google Patents
A cloud service provider system may receive a commit instruction including a modified build of the software service. The cloud service provider system may use the modified build to …
S Lee, H Chae, K Kyuhwan - US Patent 11,272,461, 2022 - Google Patents
An embodiment of the present invention provides a method for transmitting a plurality of packets by a sidelink terminal in a wireless communication system, the method comprising …
S Herath, J Abdoli, J Ma - US Patent 11,271,781, 2022 - Google Patents
Some embodiments of the present disclosure provide control signaling mechanisms to support data transmission by a user equipment (UE) that is in the RRC_INACTIVE state and …
Q Zhang, Y Zhou, N Abedini, T Luo… - US Patent App. 17/371,418, 2023 - Google Patents
H04B7/0615—Diversity systems; Multi-antenna system, ie transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting …
K Takeda, L Liu, P Gaal, A Sengupta… - US Patent …, 2022 - Google Patents
Methods, systems, and devices for wireless communications are described. A base station may communicate with a user equipment (UE) or multiple UEs using multicast …
S Hosseini, W Yang, W Chen, P Gaal… - US Patent …, 2023 - Google Patents
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first user equipment (UE) may receive, from a second UE, information via a …
S Nair, RM Dhanasekaran - US Patent 11,564,086, 2023 - Google Patents
Techniques for securing mobile-terminated messages are disclosed. In one example, a method comprises receiving, at user equipment, a concealed message from a …