Multi-mode remote collaboration

ABSTRACT

Generally discussed herein are systems and apparatuses for multi-mode collaboration between entities in different jurisdictions. According to an example a technique can include determining a location of a remote communication device by at least one of a global positioning system (GPS), low frequency (LF) atomic time radio, earth magnetic signature, internet protocol (IP) address, and cell phone tower triangulation, determine regulations regarding communication from an internal network to the remote device based on the determined location, and configure the remote device to transmit and receive communications in a manner compliant with the determined regulations including one of voice over internet protocol (VOIP) communication, hypertext transfer protocol (HTTP) communication, text communication, voice communication, video communication, and augmented reality communication.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of priority to U.S. PatentApplication Ser. No. 62/329,545, filed on Apr. 29, 2016, which is herebyincorporated by reference herein in its entirety.

TECHNICAL FIELD

Examples generally relate to inter-country communication and/orcollaboration. Some embodiments relate to secure communications acrossinternational boundaries, such as can be in accord with an internationalcommunication agreement, such as International Traffic in ArmsRegulations (ITAR) and/or Export Administration Regulations (EAR).

TECHNICAL BACKGROUND

For practical purposes, ITAR regulations dictate that information andmaterial pertaining to defense and military related technologies (itemslisted on the U.S. Munitions List) may only be shared with U.S. Personsunless authorization from the Department of State is received or aspecial exemption is used. U.S. Persons (including organizations) canface heavy fines if they have, without authorization or the use of anexemption, provided foreign persons with access to ITAR-protecteddefense articles, services, or technical data. Access, in terms of theITAR and EAR regulations can include a transfer of a copy of a documentor even a brief discussion about operation of the item.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings, which are not necessarily drawn to scale, like numeralsmay describe similar components in different views. Like numerals havingdifferent letter suffixes may represent different instances of similarcomponents. The drawings illustrate generally, by way of example, butnot by way of limitation, various embodiments discussed in the presentdocument.

FIG. 1 illustrates, by way of example, a system for providingcollaboration data between entities.

FIG. 2 illustrates, by way of example, a logical block diagram of asystem for providing multi-mode collaboration between entities (e.g.,clients, such as internal and remote clients).

FIG. 3 illustrates, by way of example, a logical block diagram of anembodiment of a system that includes a more detailed view of anembodiment of the network of FIG. 2.

FIG. 4 illustrates, by way of example, a logical block diagram of asystem that includes a collaboration environment processor (CEP) andcommunications to/from the CEP.

FIG. 5 illustrates, by way of example, a logical block diagram of anembodiment of a system for communicating collaboration data between twodevices.

FIG. 6 illustrates, by way of example, a flow chart of resolving anissue using one or more of the systems discussed herein.

FIG. 7 illustrates, by way of example, a line graph of a spectrum ofcapabilities, according to increasing bandwidth and resource usage thatcan be used in the collaboration.

FIG. 8 illustrates, by way of example, line graphs of accessibility,interactiveness, and timeliness.

FIG. 9 illustrates, by way of example, a block diagram of an embodimentof a machine in the example form of a computer system within whichinstructions, for causing the machine to perform any one or more of themethodologies discussed herein, may be executed.

DESCRIPTION OF EMBODIMENTS

The following description and the drawings sufficiently illustratespecific embodiments to enable those skilled in the art to practicethem. Other embodiments may incorporate structural, logical, electrical,process, and other changes. Portions and features of some embodimentsmay be included in, or substituted for, those of other embodiments.Embodiments set forth in the claims encompass all available equivalentsof those claims.

Whether internally within a company or externally between, for example,a company and its customers, an entity can spend millions of dollarsannually to provide “just in time” technical support for their customeror employee base. Technical support can include troubleshooting,maintenance, repair, training, inspection, or the like. Embodimentsdiscussed herein can help provide remote guidance and collaborationbetween geographically dispersed locations for engineering projectmanagement office (PMO), production/test facility, repair,refurbishment, troubleshooting, and/or training. Embodiments discussedherein can help provide remote guidance and/or collaboration betweenmaintenance personnel, such as for support of systems deployed in adifferent country or requiring “eyes on system”. Embodiments discussedherein can help in complying with ITAR and/or EAR mandates, such as byproviding a secure, compliant infrastructure through which to shareinformation. Embodiments discussed herein can provide a secure remotecollaboration solution that can provide an information mixing andpresentation that can be optimized in consideration of the toolsavailable and/or goal(s) at the time of collaboration.

Embodiments can include a solution that provides (e.g., automatically(without human interference after deployment)) an appropriatecollaboration approach by choosing appropriate functionality forcollaboration that meets the demands of the reason for thecollaboration, given the location, regulations, and available resources.Embodiments can address user resource constraints. For example, thesystems can consider user needs, capability of system, capacity ofsystem, and tools. For example, if a user only has a cellphone withlow/no bandwidth, the system can provide audio only access (e.g.,without video) because of the user's system's capacity constraint. Inanother example, a user only has a cellphone and the system can turn offa preferred embodiment of augmented reality due to a hardware capabilityrestraint.

Consider a scenario in which there is a machine in a remote location.Access to the machine includes travelling unimproved roads. Considerfurther that the machine is a helicopter with a mechanical problem. Thehelicopter was sent to the remote location to save people trapped from avolcano, flood, or earthquake. There is a need to fix the helicopter tosave lives, but the helicopter cannot just fly back to the factory wherethe expert to fix the helicopter resides because of the mechanicalproblem. National laws prevent the “transfer of knowledge” to thatcountry to fix the helicopter, even if it was in a hanger with aprofessional mechanic. If the personnel have a cell phone or othercommunication device, they could have the device “transmit” or “receive”data in an ITAR safe manner to “teach” or “help” the personnel in theremote location of the broken machine to fix it, without actuallytransmitting data, and without the mechanic on either end needing tounderstand ITAR, laws, information technology, bandwidth, and/or bitsand bytes.

Also consider the difficulty of transporting the helicopter to a repairfacility from the remote facility. The ability to repair the helicopterin the field would provide a much more resource and cost effectivesolution to repairing the helicopter. Also, repairing the helicopter inthe field would save time, such as can be important in many military andother operations. All that may be required to repair the helicopter isinformation, tools, and/or a mechanic.

Remote can mean any distance removed from the information source and outof the internal network. Communications can be machine to machine, peerto machine, or peer to peer. Note that some communication cases may notbe ITAR compliant. Whether across the parking lot, or across the globe,personnel (e.g., a subject-matter expert (SME)) is generallycommunicating with another person of equivalent or lesser understandingof the subject matter of the collaboration. The collaboration can be to“help” them diagnose and fix a problem, such as a mechanical, medical,personal, financial, economic, or business problem, among others.

FIG. 1 illustrates, by way of example, a system 100 for providingcollaboration data between entities. The system 100 as illustratedincludes a physical world 102, a view of the physical world 104, andcollaboration resources 106. The physical world 102 can include internalpersonnel (e.g., one or more experts) to provide collaborative supportto remote personnel (e.g., a remote mechanic). The physical world 102 isthe environment around the internal personnel and the remote personnel.The view of the physical world 104 can include a display of therespective physical worlds of the remote personnel, the collaborationresources 106, and the internal personnel. The view can be provided overa linkage 110.

A view of one or more of the collaboration resources 106 can be providedto the remote personnel, such as to assist them in fixing a remoteproblem. The collaboration resources 106 can include directions,discipline information, system function and/or sensor data, links,training resources, knowledge base content, tables and/or checklists,overlay pixels, hand gestures, tools, and/or parts.

The linkage 110 can provide the view of the physical world to therespective personnel in a variety of formats (e.g., video, real-timevideo, augmented reality video, text, voice, or other format).

FIG. 2 illustrates, by way of example, a logical block diagram of asystem 200 for providing multi-mode collaboration between entities(e.g., clients, such as internal and remote clients). The system 200generally includes more implementation details than the system 100. Thesystem 200 as illustrated includes a device at a remote location 202(e.g., a phone, radio, such as a smart phone, a tablet, computer, orother communication device), a remote user 203, a virtual privatenetwork (VPN) 204A, an external gateway 206A, a peer to peer network208, an SME device on the internal network 210A, an SME device remote tothe internal network 210B, a collaboration environment processor (CEP)212, equipment 216 (e.g., an object that is the reason for thecollaboration, such as a machine, system, person, circuit, system ofsystems, or the like), one or more SMEs 211A and/or 211B, and resources218A, 218B, and/or 218C. The resources 218A-C can include an equipmentuser manual, training bulletin, field bulletin, part number,manufacturer information, technical specification, video advice, audioadvice, textual advice, or the like.

The device at the remote location 202 has communication capabilities andcommunication limitations. The capabilities and/or limitations of thedevice 202 can be stored in a database of the network 208 (see FIG. 3).The device 202 can access the network 208 through the VPN 204A and/orthe external gateway 206A.

The VPN 204A extends the network 208 across a public network, such asthe Internet, a cellular network, a local area network (e.g., a Wi-Finetwork), or other network. The VPN 204A allows users (e.g., remote andlocal users) to send and receive data across the network 208 as if thedevices 202/210A-B were directly connected to the network 208. The VPN204A, such as through the CEP 212, provides the functionality, security,and management policies of the network 208 to the device 202. The VPN204A can be created by creating a virtual point-to-point connectionusing virtual tunneling protocols and/or traffic encryption.

The external gateway 206A provides access control to data on the network208. A user of the device 202 can have an identification that can beused to access resources of the network 208. The identification can beassociated with one or more privilege levels, such as in a database ofthe network 208 (see FIG. 3).

The network 208 is a private, secure network that provides collaborationresources and data to the remote device 202 and/or the device 210 A-B.More details regarding an embodiment of the network 208 is provided inFIG. 3.

The device 210A on the internal network 208 can include a communicationdevice, such as a phone, tablet, computer, scanner, radio, augmentedreality video processor (e.g., a 3D augmented reality video processor)or other communication device. The device 210A can be used to providecollaboration data to the device 202, such as can be in a manner asdetermined by the CEP 212. The device 210A-B has communicationcapabilities and communication limitations. The capabilities and/orlimitations of the device 210A-B can be stored in a database of thenetwork 208 (see FIG. 3). The device 210A has direct access to thenetwork, while the device 210B accesses the network 208 through the VPN204B and/or the gateway 206B. The device 202 can include communicationcapabilities and limitations that are apparent to the CEP 212.

The CEP 212 determines or identifies resources requested at the device202, such as by the remote user 203 or equipment 216, resources 218A-Cavailable for the SME 211A-B, the remote user 203, or the equipment 216to reference, capabilities of the device 202, capabilities of the remotenetwork to which the device 202 is connected, location of the device210A-B, location of the SME 211A-B, location of the device(s) 202 and/or210A-B, regulations or rules governing communication between thelocations of the devices 202, 210A-B, and/or SME 211A-B, a cost of thecollaboration, an urgency (e.g., concept of operations (CONOPS)) of thecollaboration that are determined automatically or provided by theremote user 203, bandwidth available (current and/or predicted) at thenetwork to which the device 202 is connected, bandwidth available(current and/or predicted) at the device 202, bandwidth available(current and/or predicted) at the device 210A-B, bandwidth available(current and/or predicted) over the network 208, and/or powerrequirements or power available at the device 202 and/or 210A-B or theequipment 216. The CEP 212 can consider one or more of limitationsand/or capabilities and the determined/identified data in providingcollaboration data (e.g., optimal collaboration data) to the device 202.Note that while the CEP 212 is illustrated as being a part of thenetwork 208, the CEP 212 can alternatively be implemented as a dangle,client, or other tool that can be on, communicatively coupled, orconnected to the device 202.

The power requirements and/or power available can include an amount ofbattery life available at the device 202 and/or 210A-B and/or theequipment 216, among others (if applicable). In one or more embodiments,an estimated amount of time for multiple collaboration scenarios can bedetermined based on the amount of battery life. If the determined amountof time (e.g., as determined by the CEP 212) is determined to beinsufficient to solve the problem, a less power consuming collaborationtechnique may be chosen, such as to help extend an amount of time toprovide collaboration data to the remote location. In one or moreembodiments, the CEP 212 may determine that there is a low powercondition during a collaboration, alert the remote user 203 and/or SME211A-B, and provide signals that cause the object with the low powersituation and other affected devices to alter the collaborationmethodology (e.g., switching from video and voice communication to justvoice communication, switching from voice communication to textcommunication, or the like).

If the internal device 210A, SME 211A, and/or resources 218A are notwithin the internal network 208 for a given collaboration, a second VPN204B and/or gateway 206B can be used to help securely facilitate thecollaboration. The VPN 204B and gateway 206B are optional and can beused in embodiments in which an SME is provided remote access to thenetwork 208, such as to help secure collaboration between two remoteusers (e.g., the SME 211A and the remote user 203). The VPN 204B can bethe same as or similar to the VPN 204A. The VPN 204B can provide thedevice 210B with access to the network 208. The gateway 206B providesaccess control to the content of then network 208, similar to thegateway 206A. The device 210B is the device or application through whichinternal collaboration personnel (e.g., an SME) receives data regardingthe collaboration from the network 208 and the device 202. The device210A-B can provide collaboration data back to the device 202, such asthrough the VPN 204B, gateway 206B, and the network 208. Thecollaboration data from the device 210B can include an indication of oneor more resources, resources themselves, answers, or other informationto provide to the device 202. The indication and/or use of one or moreresources 218A-C can include a pointer to information on the network 208which can be retrieved and provided to the device 202.

The equipment 216 is the object which is the subject of thecollaboration, such as a machine, system, person, circuit, system ofsystems, other entity, such as a government, corporation, organization,educational or other institution, or other entity, or the like.

The network 208 can receive a query or a request from the device 202 forcollaboration information, such as through the VPN 204A and/or thegateway 206A. The network 208 can provide the request or query to thedevice 210A-B, such as through the VPN 204B and/or the gateway 206B. Thedevice 210A-B can provide a request for more information to the device202, such as through the network 208.

The resources 218A-C can be in one or more locations, such as remote tothe internal network (i.e. resources 218B, local to the SME 211A on thenetwork (i.e. 218A), or accessible through the network 208 (i.e.resources 218C). Different resources 218A-C may be available indifferent locations.

In one or more embodiments, the resources 2181-C represent detailedcomponent information, such as a 3D computer aided design (CAD) model ofthe component. In such examples, substantially all of the system may beused to provide a physical component (e.g., a bushing or lever) orsystem upgrade (e.g., a firmware upgrade to a field programmable gatearray (FPGA)) to the equipment 216 with or without providing informationto the remote field device 202 and/or with or without also providing SMEadvice to a remote user. In example embodiments the information is usedto provide actual just-in-time physical components which aremanufactured on-site at or near the equipment 216 location withinstructions that are transmitted from resources, such as the resources218A-C to the device 202 (a 3D printer or lathe) and subsequentlyinstalled at the equipment 216 in the remote location. In one or moreembodiments the information is used to provide a firmware upgradedirectly to equipment 216 without reliance on the SME 210 A-B, amechanic (e.g., the remote user 203), or a device, such as the device202.

FIG. 3 illustrates, by way of example, a logical block diagram of anembodiment of a system 300 that includes a more detailed view of anembodiment of the network 208. The network 208 as illustrated includes acollaboration data repository 302, a remote collaborationcapabilities/tools network 304, a systems of record network 308, aresources repository 310 (e.g., a repository for file resources, such ascan be specific instances of the resources 218A-C), and a user networkenvironment 312.

The collaboration data repository 302 can store information about thecapabilities and limitations of the device(s) 202 and/or 210A-B, SME210A-B, and/or the remote user 203. The information can include countryspecific ITAR laws, network or modem connection preferences, cell phonelimitations, cell phone carrier limitations, equipment limitationsand/or capabilities, or the like. The remote collaborationcapabilities/tools network 304 provides access to devices to be usedduring the collaboration. The tools from the network 304 can be used topresent the information from the resource repository 310 to the device202, such as can include a view of the resources 218A-C and/or advicefrom the SME 210A-B. The tools can include a video player, an augmentedreality device, a voice over internet protocol (VOIP) device, a textrendering device, among others. The device 202 can include capabilitiesthat can interact with one or more tools available from the network 208.

The CEP 212 as illustrated includes a graphical user interface (GUI)306. The GUI 306 can provide a user with a view of collaboration accessinformation. The GUI 306 can allow a user, such as a user of the remotedevice 202 or the internal device 210, to alter one or more variablesgoverning the collaboration. Adjusting one or more variables of thecollaboration can alter the form in which the information is presentedto the device 202, such as by selecting a different tool from thenetwork 304 to provide the information. Adjusting one or more variablesof the collaboration can alter a timeframe in which the information isprovided to the device 202.

The systems of record network 308 provides access to details regardingresources available at remote locations, such as by users of the device202, and/or rules or regulations governing communications betweenlocations of the device 202 and the network 208. The collaboration datarepository 302 includes the actual details regarding resources availableat the remote devices and/or the rules or regulations governingcommunications between locations of the device 202 and the network 208.The details regard resources available at the remote locations caninclude device capabilities (voice, text, AR, or the like), toolsavailable to help fix the equipment 216, expertise, licenses, ortraining certificates of personnel at the remote and internal locations,or the like. The rules and/or regulations can include a table or fileindicating what types of communications are allowed between locations,such as by the ITAR/EAR.

The user network environment 312 includes resources through which thedevice 210 communicates, such as virtual and/or physical computers(e.g., a virtual desktop environment connected to a physical computerenvironment).

FIG. 4 illustrates, by way of example, a logical block diagram of asystem 400 that includes the CEP 212 and communications to/from the CEP212. The communications as illustrated include a remote devicetransmit/receive 402 communication. The remote device transmit/receive402 can include a request or query for information. In one or moreembodiments, the request or query can indicate one or more inputvariables to govern the collaboration. The remote devicetransmit/receive 402 communication can be encrypted and decrypted by theCEP 212. The one or more input variables can include an urgency,resources available remotely, capabilities of devices availableremotely, bandwidth available remotely, cost, or other variables. In oneor more embodiments, the CEP 212 can determine the one or morevariables, such as by issuing a query or request to the system of record(SOR) data repository. The request or query can include data indicatingthe make and/or model of the device 202, such as to determine thecapabilities of the device 202.

The communications as illustrated include an internal devicereceive/transmit 404 communication. The internal device receive/transmit404 can include some indication of the variables and/or the data beingrequested by the remote device, such as is indicated by the remotedevice transmit 402 communication. The internal device receive/transmit404 can be provided to the device 210A-B.

The communications as illustrated include instructions transmit 406. Theinstructions transmit 406 include information to help answer the query,a request for more information, or other information.

The communications as illustrated include an instructions receive 408communication. The instructions receive 408 can be provided in the formof pixels, such as can provide a view of a screen of a virtual computeror a physical computer. The instructions receive 408 can be encrypted.The instructions receive 408 can be deleted after viewing or after apredetermined amount of time has elapsed.

FIG. 5 illustrates, by way of example, a logical block diagram of anembodiment of a system 500 for communicating collaboration data betweentwo devices. The system 500 as illustrated includes a dongle 502 (i.e. aspecific embodiment of the CEP 212) connected between the device 202 andthe device 210. The dongle 502 (FPGA, power, memory, read-write, andassociated communication sensing hardware) is a switch capable ofrobustly evaluating first-order logic (such as which combination oflinkages to provide the user pair) in a number of ways by switchingbetween pairs to select a communication protocol to meet security,bandwidth, user needs, data on hand, power on hand, and/or communicationprotocol issues.

The dongle 502 can retrieve, such as from the network 208, ITAR laws 504of the country in which the remote device 202 resides and/or ITAR lawsof the country in which the internal network 208 resides. The ITAR laws504 can indicate which communication protocols are allowed or prohibitedbetween the respective countries of the device 202 and the device210A-B. The dongle 502 can retrieve or otherwise determine a priority506 of the request from the device 202 based on an urgency (e.g.,CONOPS) indicated in the request. The dongle 502 can receive and/ordetermine user requests and/or settings 508. The dongle 502 candetermine a location 510 of the internal network and a location of thedevice 202. These determined locations can be used to determine whichLIAR laws 504 to retrieve and/or process. The location can be determinedby issuing a request to the device 202 or the device 210. The locationcan be determined using a GPS, satellite triangulation, low frequency FMtriangulation, internet protocol (IP) address, or other locationdetermination process of the dongle 502.

The dongle 502 can determine capabilities of the internal and remotenetworks 512. The capabilities can include whether the network allowsVOIP data, video, text, AR data, bandwidth, security available, or othercapabilities. The dangle 502 can determine capabilities of the internaland external devices 514. The capabilities of the internal and externaldevices can include whether the device can handle VOIP data, video,text, audio, AR data, bandwidth, security available, or othercapabilities

FIG. 6 illustrates, by way of example, a flow chart 600 of resolving anissue using one or more of the systems discussed herein. An issue ispresented at operation 602. The issue generally regards a problem facedat the remote location. The issue can be presented to the device 210,such as by issuing a query or request to the network 208. Triage isperformed at operation 604. Triage includes determining a priority forthe issue and/or resources that can be used to help solve the issue.Remote collaboration occurs at operation 606. The remote collaborationincludes issuing instructions or requests for more information to thedevice 202 and receiving responses thereto. Executing an SME-assistedapproach can be performed at operation 608. In one or more embodiments,operation 608 can include manufacturing a component at or near theremote location. The SME-assisted approach can include the remotepersonnel fixing the issue to which they received instructions ordirection. After that issue is fixed operations 604, 606, and/or 608 canbe performed until the issue is fully resolved at operation 610. Theissue can be fully resolved after the personnel associated with thedevice 210 and the device 202 agree that the issue is resolved.

FIG. 7 illustrates, by way of example, a line graph 700 of a spectrum ofcapabilities, according to increasing bandwidth and resource usage thatcan be used in the collaboration. AR as illustrated generally takes upthe most resources and/or bandwidth. Real time video generally takes upless resources and/or bandwidth than the AR, but more than non-real timevideo. Non-real time video generally consumes fewer resources and/orbandwidth than real time video, but more resources than voice and commonreporting. Data access takes up the fewest resources and bandwidth, adocument update generally consumes more resources and/or bandwidth thanthe data access, and voice generally consumes more resources and/orbandwidth than the doc update and fewer resources and/or bandwidth thanthe voice and common reporting.

FIG. 8 illustrates, by way of example, line graphs of accessibility,interactiveness, and timeliness. The CEP 212 considers these threefactors in determining a triage and communication protocol to be used inhelping to fix an issue. Accessibility can include factors likebandwidth, resources available, and the like. Interactiveness caninclude the nature of the issue (e.g., how much interaction is requiredor desired by the SME or the network 208 to help fix the issue), theresources and/or bandwidth available, or the like. The timeliness caninclude an urgency of the issue to be resolved.

The CEP 212 (whether in a dongle coupled or connected to the device 202,or available in the network 208) has, uses, or otherwise can communicateusing a modem or similar device on a remote device network and aninternal network (the network over which the SME personnel communicate).The modem can support several international standards, such asInternational Telecommunication Union ITU V.21, V.23, R.35, R.37, R.38A,R.38B, V.29, Bell 103, Bell 202, and/or proprietary communicationsstandards as needed. The modem can be a programmable modem for aSupervisory Control and Data Acquisition (SCADA) or power utilitycommunication network that can be switched according to the needscommanded by the CEP 212. The modem can operate in half or full-duplex,point-to-point, or point-to-multipoint modes. The CEP 212 can interfacewith the modem and command changes to a Digital Signal Processor (DSP)(e.g., a field programmable gate array (FPGA)), providing flexibilitythrough programmable features. Software configuration can be performedvia a command set, such as a Hayes AT command set or equivalentdepending on the brand and manufacturer of the DSP. Commands can beinitiated from within the network, such as by using an RS-232 or similarcommunication interface. In one or more embodiments, transmission ratescan be around 300 to 9600 baud, such as with a 2400 Hz deviation and 420to 3480 Hz channel mean frequency.

One or more embodiments of the system allow for if user mobility at theremote and/or internal networks. Usually the mobility is primarily atthe remote sick but can also be at the primary (internal) side. Such aconfiguration can help avoid the need to bring a large, heavy, and/orcomplex system into a secure location. For example, consider dismantlinga special weapon system. The system may be transported to a securelocation for diagnosis and repair that may be minor and may otherwisehave been able to be repaired in the field, such that transport to thesecure facility may be unnecessarily costly. Using one or more systemsdiscussed herein, internal personnel could make a diagnosis and instructthe remote personnel on how to repair the system without needing totransport to the secure location. This could potentially save months ofdown time and the costs of disassembly, transport, diagnosis, andrepair. This is, because the secure internal location knowledge isbrought to the system in need of repair instead of bringing the systemin need of repair to the secure location.

Each mission scenario (e.g., CONOP) can include a combination ofcommunication parameters (e.g., a different combination of communicationparameters), such as in a memory in the CEP 212 or otherwise accessibleby the CEP 212. For example, different location and CONOP pairs caninclude a different CEP solution. The number of combinations andpermutations can get large quickly with just a few communicationparameters (e.g., variables), such as security level, CONOPS (e.g.,urgency/speed/time constraint), cost, bandwidth available (e.g., at theremote device, internal device, remote network, and/or internalnetwork), bandwidth requested, data type, equipment type, or other. TheCEP 212 helps facilitate the decision and/or connection process andprovide a linkage/solution that matches the CONOPs for the end userpair.

Many communication systems use enabling technology including anin-country network. One or more embodiments can incorporate thattechnology into the solution. Each country generally has a differentnetwork and each network (Verizon, AT&T, Vodafone, Deutsche Telecom,etc.) has different technology (land lines, fiber, satellites, etc.),capability, and rule sets for usage. Some in-country networks are govt.controlled and some are private. Some in-country networks have noemitters, no connections, some have hot spots, and some have no hotspots. The in-country networks vary in throughput, cost per bit,reliability, speed, corporate and in-country policies, and so on. In oneor more embodiments, the CEP 212 can help the user navigate and choosebetween combinations and permutations of the equipment, the needs, andthe rule sets and/or choose between efficient or desirable providerswhen multiple bandwidth choices may be available.

In one or more embodiments, the CEP 212 can identify an availablenetwork, understand the protocols and policies associated with thatnetwork, and communicate using the network as needed. The CEP 212 canget a read on what is available through the network in terms of signalstrength, range, location, traffic control, users, devices, overrides,etc. and select (e.g., automatically) settings operable to communicateover the network, such as to help avoid user error and frustration inselecting operable settings.

The CEP 212 can balance resiliency, security, and functionality toprovide a collaboration between an internal device and an externaldevice. In the age of Cyber Security/Cyber Resiliency, it is difficultto provide resiliency, security, functionality, and ease of userinterface and still provide utility. If everything is locked down toprovide maximum security, then no work gets done and there is noutility. If everything is unlocked and there is no security, the dataexchange rate may increase, but the data may be vulnerable and utilitycan be affected. The CEP can help balance the supply of data and demandof data with security and legality and equipment capability to provide asolution with utility.

Along with remote collaboration capability and ITAR security of covereddefense information are information security and information assurance,both of which can be handled by one or more systems or devices discussedherein. ITAR de facto imposes a subset of cyber security requirementsand provides an additional layer of requirements beyond the general basecyber security requirements of an entity. Embodiments discussed herein,while not limited to such, are focused on ITAR compliance/requirements.

In some embodiments, information is provided to a remote device 202 andto an SME device 201A-B, such as without storing data on one or more ofthe devices 202 and/or 210A-B. Information transferred to the remotedevice can be streamed without being stored, temporarily stored,monitored, and then deleted, such as after a user of the remote devicedisconnects from the internal network. Since ITAR often does not allowtransfer of certain data types (e.g., pictures, files, executables, orthe like) across certain geographical boundaries, care can be taken tomake sure that information is provided without transferring the certaindata types. This may be done by removing data after rendering.

Information provided from the internal network cannot be stored orrecorded at the remote device. The data may never be “transferred” fromthe core environment to the remote user's (e.g., the remote user 203)environment, but still may be viewed by the remote user 203 who is ableto digest the information and act on it the information is removed afterthe session is ended, and in some embodiments, even before a next screenis presented.

Such a presentation can be ITAR compliant, such as if both receive andtransmit information are encrypted. The encryption can include anaugmented reality collaboration solution operating through a virtualdesktop infrastructure (VDI) environment. A combination of a securevirtual private network (VPN) pipe and VDI that hosts data behind afirewall with physical and electronic access control can provideincreased information security. Further security can be gained byrequiring both parties to meet authentication standards.

In one or more embodiments, only pixels can be transmitted, instead ofmoving data files. The pixel transmissions can be encrypted on both sendand receive ends, so that if anything intercepts in between orinterrupts at the ends, there may be no actual data stolen since thepixels will be random, indiscernible, and/or meaningless. Such a systembecomes a virtual disappearing network that provides display data, butdoes not send other to the peripheral locations. In one or moreembodiments, the transmitted data can be a floating and/or encrypted VIMpacket, and can be self-regulating. In such an environment, there is no“data at rest” (i.e. stored on a memory) beyond the core environment ora cache memory that will be overwritten on the external device. In thecontext of ITAR relevance, residence of data within the internal networkdoes not constitute an export. Taken as a whole, the data provided tothe device 202 can remain internal to the network 208. Some examples ofdata that can be rendered on the remote device through the VPN/VDI aspixels can include: line drawings; text of manuals (e.g., machinesettings, instructions, etc.); field bulletins; maintenance data;two-dimensional (2D) video; three-dimensional (3D) video; 3Dvirtual/augmented reality (e.g., with goggles, etc.); and computer-aideddesign (CAD) models, among others. In one or more embodiments, the datacan be voice data that is provided through a speaker and not stored onthe external device such as in voicemail (VM).

In one or more embodiments, the system can include a VDI/VPN and AR,non-AR video, and/or audio based collaboration equipment. One or moreembodiments include about 8 or more technologies integrated to eachother to provide security, network management, bandwidth monitoring,VPN, VDI, and the like. There are currently no known systems thatprovide ITAR secure transfers of collaboration content as one or moreembodiments discussed herein. Embodiments discussed herein can providecapability of hosting the data, systems of record (manuals, technicaldata package, reliability info, vendor info, part info, maintenanceinfo, field bulletins, etc.) behind the firewall, and a VPN/VDI pipe.

In one or more embodiments, the CEP 212 can include code running onhardware which can remotely sense or otherwise gather knowledge of whatresources a remote user has available in the field (the remote location)(e.g., by the ‘user sign in’ CEP 212 can detect the users personal info(e.g., system administration (s/a) training certs, welding certs, etc.)through a link to the organizational human resources (FIR) system (e.g.,data stored on the internal network). In one or more embodiments, theCEP 212 can detect and determine the user's communications equipmentcapability (cell phone (basic or smart), tablet, full PC, radio, or thelike), such as by detecting a type of equipment to which the CEP 212 isconnected or otherwise communicatively coupled to or prompting theremote user to provide such information.

In one or more embodiments, the CEP 212 can detect the internal deviceand remote device location(s) for both primary (home base, SME) andremote (mechanic in the field) using global positioning system (GPS),low frequency (LF) Radio, Internet protocol (IP) address, or the like).In one or more embodiments, the CEP can receive user specific commands(requests) for data type (photo, text, video, full 3D VR, voice, etc.),speed, cost, transmission urgency (e.g., CONOPS), and/or a request tooverride rules/regulations, such as in case of emergency.

In one or more embodiments, the CEP 212 can look up, such as in adatabase, local and national governmental laws and regulations relatedto inter-country data transfer (known as EXIM in USA). In one or moreembodiments, the CEP 212 can look up, such as from the database,specific organizational data transmission regulations (company specific)and CEP 212 can sense or receive CONOPS (concept of operations)priorities, such as “fix as quickly as possible for emergency situationregardless of reliability”, “fix in most reliable method regardless ofcost or time required”, or “reset to operate in degraded mode regardlessof pending damage to machinery”, or the like. The CEP 212 may choose orsuggest, based on the CONOPS or other parameter(s), a variety ofdifferent collaboration methods (e.g., VOIP, video call, text only,augmented reality, voice only collaboration, or the like), resources toconsider, and/or an SME to handle the collaboration. Based on theCONOPS, capabilities, limitations, or other factors, the CEP 212 canselect a communication protocol that would, for example, “providemaximum collaboration capability regardless of bandwidth/communicationsreliability” or “provide most reliable and information assuredcommunications capability regardless of cost or time required”.

In one or more embodiments, the CEP 212 can make compliant switchingchoices so as to provide the highest level of connectivity permitted bythe lowest level of constraints from the above limitations and requests.In one or more embodiments, the CEP 212 optionally also subsequently(re)monitors signal strength, bandwidth between primary and remoteusers, and/or warns a user and/or adjusts the connection pairaccordingly, in one or more embodiments, the CEP 212 can switch theusers “experience” based on security level, bandwidth, weather,regulations, available equipment, time, cost, priority, urgency(CONOPS), etc. In one or more embodiments, the CEP 212 can include avirtual or physical rotary switch (e.g., combined with health status),which can allow selection of alternative support methods, such asswitching into or out of augmented reality on the linkage, etc. In oneor more embodiments, the rotary switch can include a corresponding userinterface status screen including an indication of a strength of aconnection, safety, security, speed, and/or connectivity reliabilitystatus. The indication can be in the form of a stop light sort of colorindication that indicates whether the status is good (e.g., green), bad(e.g., red), or somewhere in between (e.g., yellow). In one or moreembodiments, if the status is not good, the CEP 212 can providealternative connections for the user if the status is had and/orsomewhere in between good and bad.

In one or more embodiments, the system can include a client based sensorswitch, a server based switch with client based sensors, or a serverbased switch that receives client based status and identification data.The CEP 212 can be implements as a dongle, client, or server basedsoftware. The dongle can be a USB powered device with an FPGA, memory,sensors, and/or IP interface, such as can meet standards for modems. Inone or more embodiments, information obtained by the CEP 212, such ascan be provided to the external device, can be gathered over a computercloud, such as a virtual cloud (e.g., a stream of information in spaceautomatically linked/provided to the consumer from the supplier, such aswithout ever going hack to an in-country server). In one or moreembodiments, the data can be provided in a real time, temporary,transient, virtual floating secure environment.

For the data to be persistent beyond transmission timelines, and to beaccessible, the actual bits have to live somewhere. The bits can bedistributed across multiple platforms and not externally traceable toeach other or attributable to the remote device or the remote location,but there is still a physical manifestation in some locality. Streamprocessing in some implementations allows data to exist, in essence,only for transmission and processing, with only the processed resultsavailable afterwards:

In one or more embodiments, the choices the CEP considers can includemultiple CONOPS, such as can include multiple use cases. Each CONOP(e.g., mission scenario) can include a different combination in thedatabase of options, such that respective location and scenario pairscan include a different CEP collaboration pair. The number ofcombinations and permutations can include a rather high number quicklywith just a few variables (e.g., security level, bandwidth available,bandwidth requested, data type, equipment type, or the like), which maybe difficult for a person, such as the mechanic in the field to quicklyand correctly navigate to effect the best transmission settings,especially given the mechanics primary interest is in fixing the systemat hand. So CEP can help facilitate the decision process on how tocommunicate collaboration information to a remote device, such as bychoosing communication protocol, data type, speed of transmission,connecting to VPN/VDI, and/or provide a linkage that matches therequirements for the end user pair.

In one or more embodiments, a drone can provide video, audio, radiofrequency (RF) or laser downlinks to a base station. The base stationcan then remotely send (in an ITAR safe manner) the provided downlinkinformation to another location for post processing. The drone operatorneed not be concerned with all the legal and IT issues and can simply“initiate” the link and be assured it was working in the most optimalmanner for the network, equipment, regulations, and location.

A modem modulates digital information on analogue waves. In the oppositedirection, it demodulates analogue data in order to convert them intodigital data. Modem is an acronym for “mo(dulate)/dem(odulate)”.

Example Including 3D Part Printer

In an alternative embodiment, the resources 218A-C represent detailedcomponent information, such as a 3D CAD drawing. This example uses thesystem described to provide a physical component (e.g., a bushing,lever, or the like) or system upgrade (e.g., a firmware upgrade to anFPGA) to the equipment 216 with or without also providing information tothe remote field device 202 and/or with or without also providing SMEadvice to a remote user. In example embodiments, the information is usedto provide actual just-in-time physical components which aremanufactured on-site at or near the equipment 216 location withinstructions that are transmitted from resources (e.g., the resources218A-C) to the device 202 (e.g., a 3D printer or lathe) and subsequentlyinstalled at the equipment 216 in the remote location. In alternativeexample embodiments the information is used to provide a firmwareupgrade directly to equipment 216 without reliance on the SME 210 A-B,the remote user 203, and/or the device 202.

Modules, Components and Logic

Certain embodiments are described herein as including logic or a numberof components, modules, or mechanisms. Modules may constitute eithersoftware modules (e.g., code embodied (1) on a non-transitorymachine-readable medium or (2) in a transmission signal) orhardware-implemented modules. A hardware-implemented module is tangibleunit capable of performing certain operations and may be configured orarranged in a certain manner. In example embodiments, one or morecomputer systems (e.g., a standalone, client or server computer system)or one or more processors may be configured by software (e.g., anapplication or application portion) as a hardware-implemented modulethat operates to perform certain operations as described herein.

In various embodiments, a hardware-implemented module may be implementedmechanically or electronically. For example, a hardware-implementedmodule may comprise dedicated circuitry or logic that is permanentlyconfigured (e.g., as a special-purpose processor, such as a fieldprogrammable gate array (FPGA) or an application-specific integratedcircuit (ASIC)) to perform certain operations. A hardware-implementedmodule may also comprise programmable logic or circuitry (e.g., asencompassed within a general-purpose processor or other programmableprocessor) that is temporarily configured by software to perform certainoperations. It will be appreciated that the decision to implement ahardware-implemented module mechanically, in dedicated and permanentlyconfigured circuitry, or in temporarily configured circuitry (e.g.,configured by software) may be driven by cost and time considerations.

Accordingly, the term “hardware-implemented module” should be understoodto encompass a tangible entity, be that an entity that is physicallyconstructed, permanently configured (e.g., hardwired) or temporarily ortransitorily configured (e.g., programmed) to operate in a certainmanner and/or to perform certain operations described herein.Considering embodiments in which hardware-implemented modules aretemporarily configured (e.g., programmed), each of thehardware-implemented modules need not be configured or instantiated atany one instance in time. For example, where the hardware-implementedmodules comprise a general-purpose processor configured using software,the general-purpose processor may be configured as respective differenthardware-implemented modules at different times. Software mayaccordingly configure a processor, for example, to constitute aparticular hardware-implemented module at one instance of time and toconstitute a different hardware-implemented module at a differentinstance of time.

Hardware-implemented modules may provide information to, and receiveinformation from, other hardware-implemented modules. Accordingly, thedescribed hardware-implemented modules may be regarded as beingcommunicatively coupled. Where multiple of such hardware-implementedmodules exist contemporaneously, communications may be achieved throughsignal transmission (e.g., over appropriate circuits and buses) thatconnect the hardware-implemented modules. In embodiments in whichmultiple hardware-implemented modules are configured or instantiated atdifferent times, communications between such hardware-implementedmodules may be achieved, for example, through the storage and retrievalof information in memory structures to which the multiplehardware-implemented modules have access. For example, onehardware-implemented module may perform an operation, and store theoutput of that operation in a memory device to which it iscommunicatively coupled. A further hardware-implemented module may then,at a later time, access the memory device to retrieve and process thestored output. Hardware-implemented modules may also initiatecommunications with input or output devices, and may operate on aresource (e.g., a collection of information).

The various operations of example methods described herein may beperformed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implemented modulesthat operate to perform one or more operations or functions. The modulesreferred to herein may, in some example embodiments, compriseprocessor-implemented modules.

Similarly, the methods described herein may be at least partiallyprocessor-implemented. For example, at least some of the operations of amethod may be performed by one or processors or processor-implementedmodules. The performance of certain of the operations may be distributedamong the one or more processors, not only residing within a singlemachine, but deployed across a number of machines. In some exampleembodiments, the processor or processors may be located in a singlelocation (e.g., within a home environment, an office environment or as aserver farm), while in other embodiments the processors may bedistributed across a number of locations.

The one or more processors may also operate to support performance ofthe relevant operations in a “cloud computing” environment or as a“software as a service” (SaaS). For example, at least some of theoperations may be performed by a group of computers (as examples ofmachines including processors), these operations being accessible via anetwork (e.g., the Internet) and via one or more appropriate interfaces(e.g., Application Program Interfaces (APIs).)

Electronic Apparatus and System

Example embodiments may be implemented in digital electronic circuitry,or in computer hardware, firmware, software, or in combinations of them.Example embodiments may be implemented using a computer program product,e.g., a computer program tangibly embodied in an information carrier,e.g., in a machine-readable medium for execution by, or to control theoperation of, data processing apparatus, e.g., a programmable processor,a computer, or multiple computers.

A computer program may be written in any form of programming language,including compiled or interpreted languages, and it may be deployed inany form, including as a stand-alone program or as a module, subroutine,or other unit suitable for use in a computing environment. A computerprogram may be deployed to be executed on one computer or on multiplecomputers at one site or distributed across multiple sites andinterconnected by a communication network.

In example embodiments, operations may be performed by one or moreprogrammable processors executing a computer program to performfunctions by operating on input data and generating output. Methodoperations may also be performed by, and apparatus of exampleembodiments may be implemented as, special purpose logic circuitry,e.g., a field programmable gate array (FPGA) or an application-specificintegrated circuit (ASIC).

The computing system may include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other. Inembodiments deploying a programmable computing system, it will beappreciated that that both hardware and software architectures requireconsideration. Specifically, it will be appreciated that the choice ofwhether to implement certain functionality in permanently configuredhardware (e.g., an ASIC), in temporarily configured hardware (e.g., acombination of software and a programmable processor), or a combinationof permanently and temporarily configured hardware may be a designchoice. Below are set out hardware (e.g., machine) and softwarearchitectures that may be deployed, in various example embodiments.

Example Machine Architecture and Machine-Readable Medium (e.g., StorageDevice)

FIG. 9 illustrates, by way of example, a block diagram of an embodimentof a machine in the example form of a computer system 900 within whichinstructions, for causing the machine to perform any one or more of themethodologies discussed herein, may be executed. In one or moreembodiments, the CEP 212, device 202 and/or 210A-B, network 208,equipment 216, VPN 204A-B, gateway 206A-B, or other device discussedherein can include one or more items of the system 900. In one or moreembodiments, the CEP 212, device 202 and/or 210A-B, network 208,equipment 216, VPN 204A-B, gateway 206A-B, or other device discussedherein can be implemented using one or inure items of the system 900.

In alternative embodiments, the machine operates as a standalone deviceor may be connected (e.g., networked) to other machines. In a networkeddeployment, the machine may operate in the capacity of a server or aclient machine in server-client network environment, or as a peermachine in a peer-to-peer (or distributed) network environment. Themachine may be a personal computer (PC), a tablet PC, a set-top box(STB), a Personal Digital Assistant (PDA), a cellular telephone, a webappliance, a network router, switch or bridge, or any machine capable ofexecuting instructions (sequential or otherwise) that specify actions tobe taken by that machine. Further, while only a single machine isillustrated, the term “machine” shall also be taken to include anycollection of machines that individually or jointly execute a set (ormultiple sets) of instructions to perform any one or more of themethodologies discussed herein.

The example computer system 900 includes a processor 902 (e.g., acentral processing unit (CPU), a graphics processing unit (GPU) orboth), a main memory 904 and a static memory 906, which communicate witheach other via a bus 908. The computer system 900 may further include avideo display unit 910 (e.g., a liquid crystal display (LCD) or acathode ray tube (CRT)). The computer system 900 also includes analphanumeric input device 912 (e.g., a keyboard), a user interface (UI)navigation device 914 (e.g., a mouse), a disk drive unit 916, a signalgeneration device 918 (e.g., a speaker), a network interface device 920,and radios 930 such as Bluetooth, WWAN, WLAN, and NFC, permitting theapplication of security controls on such protocols.

Machine-Readable Medium

The disk drive unit 916 includes a machine-readable medium 922 on whichis stored one or more sets of instructions and data structures (e.g.,software) 924 embodying or utilized by any one or more of themethodologies or functions described herein. The instructions 924 mayalso reside, completely or at least partially, within the main memory904 and/or within the processor 902 during execution thereof by thecomputer system 900, the main memory 904 and the processor 902 alsoconstituting machine-readable media.

While the machine-readable medium 922 is shown in an example embodimentto be a single medium, the term “machine-readable medium” may include asingle medium or multiple media (e.g., a centralized or distributeddatabase, and/or associated caches and servers) that store the one ormore instructions or data structures. The term “machine-readable medium”shall also be taken to include any tangible medium that is capable ofstoring, encoding or carrying instructions for execution by the machineand that cause the machine to perform any one or more of themethodologies of the present invention, or that is capable of storing,encoding or carrying data structures utilized by or associated with suchinstructions. The term “machine-readable medium” shall accordingly betaken to include, but not be limited to, solid-state memories, andoptical and magnetic media. Specific examples of machine-readable mediainclude non-volatile memory, including by way of example semiconductormemory devices, e.g., Erasable Programmable Read-Only Memory (EPROM),Electrically Erasable Programmable Read-Only Memory (EEPROM), and flashmemory devices; magnetic disks such as internal hard disks and removabledisks; magneto-optical disks; and CD-ROM and DVD-ROM disks.

Transmission Medium

The instructions 924 may further be transmitted or received over acommunications network 926 using a transmission medium. The instructions924 may be transmitted using the network interface device 920 and anyone of a number of well-known transfer protocols (e.g., hypertexttransfer protocol (HTTP), such as HTTP secure (HTTPS)). Examples ofcommunication networks include a local area network (“LAN”), a wide areanetwork (“WAN”), the Internet, mobile telephone networks, Plain OldTelephone (POTS) networks, and wireless data networks (e.g., WiFi andWiMax networks). The term “transmission medium” shall be taken toinclude any intangible medium that is capable of storing, encoding orcarrying instructions for execution by the machine, and includes digitalor analog communications signals or other intangible media to facilitatecommunication of such software.

ADDITIONAL NOTES AND EXAMPLES

Example 1 can include subject matter (such as a system, apparatus,method, tangible, non-transitory, machine readable medium, etc.) thatcan include determining a location of a remote communication device byat least one of a global positioning system (GPS), low frequency (LF)atomic time radio, earth magnetic signature, internet protocol (IP)address, and cell phone tower triangulation, determining regulationsregarding communication from an internal network to the remote devicebased on the determined location, and configuring the remote device totransmit and receive communications in a manner compliant with thedetermined regulations including one of voice over internet protocol(VOIP) communication, hypertext transfer protocol (HTTP) communication,text communication, voice communication, video communication, andaugmented reality communication.

In Example 2, Example 1 can further include or use receiving thecommunications without permanently storing any data on the remotedevice.

In Example 3, at least one of Examples 1-2 can include or useterminating a connection between the remote device and the internalnetwork, and removing any data received from the internal network inresponse to the connection being terminated.

In Example 4, at least one of Examples 1-3 can include or use receiving,from the remote device, data indicating at least one of a securitylevel, a cost, bandwidth, priority, power, and speed, and changing themanner in which the remote device transmits and receives communicationsto one of VOIP communication, HTTP communication, text communication,voice communication, video communication, and augmented realitycommunication.

In Example 5, at least one of Examples 1-4 can include or use monitoringa bandwidth of the communications between the remote device and theinternal network, and in response to determining that the bandwidth isno longer capable of supporting the manner in which communications aretransmitted or received, changing the manner in which communications aretransmitted or received to a manner that requires less bandwidth.

In Example 6, at least one of Examples 1-5 can include or use monitoringa bandwidth of the communications between the remote device and theinternal network, and in response to determining that the bandwidth hasincreased and is capable of supporting a different manner in whichcommunications are transmitted or received, changing the manner in whichcommunications are transmitted or received to a manner that requiresmore bandwidth and is allowed by the determined regulations.

In Example 7, at least one of Examples 1-6 can include or use receiving,from the remote device, a request to override the determinedregulations, identifying whether the user that requested the overridehas sufficient permissions to override the determined regulations, andin response to identifying the user has the sufficient permissions,changing the manner in which communications are transmitted or receivedto the manner that uses the most bandwidth and includes a bandwidth thatis less than the bandwidth available at the remote device.

Example 8 can include subject matter (such as a system, apparatus,method, tangible, non-transitory, machine readable medium, etc.) thatcan include a device (e.g., a dongle) configured to be connected to aninput/output port of a remote communication device or internal network,the device including a memory, and processing circuitry coupled to thememory, the processing circuitry configured to execute instructionsstored on the memory that, when executed, cause the processing circuitryto perform one or more of Examples 1-7.

In Example 9, Example 8 can further include one or more of a remotedevice connected to a remote network, a local device connected to alocal network, a first virtual private network (VPN) that providesaccess to resources on the local network to the remote device, a firstgateway to provide access control to the local network, wherein thefirst gateway is communicatively connected between the first VPN and thelocal network, a second virtual private network (VPN) that providesaccess to resources on the local network to the local device, a secondgateway to provide access control to the local network, wherein thesecond gateway is communicatively connected between the second VPN andthe local network, and resources accessible over the local network(e.g., through the first and/or second VPN and/or the first and/orsecond gateway).

Although an embodiment has been described with reference to specificexample embodiments, it will be evident that various modifications andchanges may be made to these embodiments without departing from thebroader spirit and scope of the invention. Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense. The accompanying drawings that form a parthereof, show by way of illustration, and not of limitation, specificembodiments in which the subject matter may be practiced. Theembodiments illustrated are described in sufficient detail to enablethose skilled in the art to practice the teachings disclosed herein.Other embodiments may be utilized and derived therefrom, such thatstructural and logical substitutions and changes may be made withoutdeparting from the scope of this disclosure. This Detailed Description,therefore, is not to be taken in a limiting sense, and the scope ofvarious embodiments is defined only by the appended claims, along withthe full range of equivalents to which such claims are entitled.

What is claimed is:
 1. A method for providing information for acollaboration between a remote communication device and a deviceconnected to an internal network, the method comprising: determining alocation of the remote communication device by at least one of a globalpositioning system (GPS), low frequency (LF) atomic time radio, earthmagnetic signature, internet protocol (IP) address, and cell phone towertriangulation; identifying regulations regarding communication from theinternal network to the remote device based on the determined locationand a location of the internal network; identifying a bandwidth of aremote network, different from the internal network, to which the remotecommunication device is connected, the remote network communicativelyaccessible by the internal network; estimating a battery life of theremote device and an amount of time the remote device can communicatewith the device of the internal network using each of voice overinternet protocol (VOIP) communication, hypertext transfer protocol(HTTP) communication, text communication, voice communication, videocommunication, and augmented reality communication; selecting, based onthe estimated battery life and the amount of time the remote device cancommunicate, a communication protocol including one of VOIPcommunication, HTTP communication, text communication, voicecommunication, video communication, and augmented reality communication;configuring the remote device to transmit and receive communications ina manner compliant with the identified regulations and the selectedcommunication protocol; and transmitting VOIP communications, HTTPcommunications, text communications, voice communications, videocommunications, or augmented reality communications to the remote devicebased on the selected communication protocol, the estimated battery lifeand the identified bandwidth.
 2. The method of claim 1, wherein themethod further comprises receiving the communications withoutpermanently storing any data on the remote device.
 3. The method ofclaim 2, wherein the method further includes: terminating a connectionbetween the remote device and the internal network; and removing anydata on the remote device received from the internal network in responseto the connection being terminated.
 4. The method of claim 3, furthercomprising: receiving, from the remote device, data indicating at leastone of a security level, a cost, priority, power, and speed of theremote network; and changing the manner in which the remote devicetransmits and receives communications to one of VOIP communication, HTTPcommunication, text communication, voice communication, videocommunication, and augmented reality communication based on the receiveddata.
 5. The method of claim 4, further comprising: monitoring abandwidth of the communications between the remote device and theinternal network; and in response to determining that the bandwidth isno longer capable of supporting the manner in which communications aretransmitted or received, changing the manner in which communications aretransmitted or received to a manner that requires less bandwidth.
 6. Themethod of claim 4, further comprising: monitoring a bandwidth of thecommunications between the remote device and the internal network; andin response to determining that the bandwidth has increased and iscapable of supporting a different manner in which communications aretransmitted or received, changing the manner in which communications aretransmitted or received to a manner that requires more bandwidth and isallowed by the identified regulations.
 7. The method of claim 6, furthercomprising: receiving, from the remote device, a request to override thedetermined regulations; and identifying whether a user of the remotedevice that requested the override has sufficient permissions tooverride the determined regulations; and in response to identifying theuser has the sufficient permissions, changing the manner in whichcommunications are transmitted or received to the manner that uses themost bandwidth and includes a bandwidth that is less than the bandwidthavailable at the remote device.
 8. The method of claim 1, whereindetermining the location of the remote communication device includesdetermining the remote device is in one of (1) a different country thanthe internal network and (2) a same country as the internal network. 9.A non transitory machine-readable storage device including instructionsstored thereon that, when executed by the machine, configure the machineto perform operations for remote collaboration between a user of remotecommunication device and a user of a device of an internal network, theoperations comprising: determining a location of the remotecommunication device by at least one of a global positioning system(GPS), low frequency (LF) atomic time radio, earth magnetic signature,internet protocol (IP) address, and cell phone tower triangulation;identifying regulations regarding communication from the internalnetwork to the remote device based on the determined location and alocation of the internal network; identifying a bandwidth of a remotenetwork, different from the internal network, to which the remotecommunication device is connected, the remote network communicativelyaccessible by the internal network; estimating a battery life of theremote device and an amount of time the remote device can communicatewith the device of the internal network using each of voice overinternet protocol (VOIP) communication, hypertext transfer protocol(HTTP) communication, text communication, voice communication, videocommunication, and augmented reality communication; selecting, based onthe estimated battery life and the amount of time the remote device cancommunicate, a communication protocol including one of VOIPcommunication, HTTP communication, text communication, voicecommunication, video communication, and augmented reality communication;configuring the remote device to transmit and receive communications ina manner compliant with the identified regulations and the selectedcommunication protocol; and transmitting VOIP communications, HTTPcommunications, text communications, voice communications, videocommunications, or augmented reality communications to the remote devicebased on the selected communication protocol, the estimated battery lifeand the identified bandwidth.
 10. The storage device of claim 9, furtherincluding instructions that, when executed by the machine, configure themachine to perform further operations comprising: receiving thecommunications at the remote device without permanently storing any dataon the remote device.
 11. The storage device of claim 10, furtherincluding instructions that, when executed by the machine, configure themachine to perform further operations comprising: terminating aconnection between the remote device and the internal network; andremoving any data received at the remote device and from the internalnetwork in response to the connection being terminated.
 12. The storagedevice of claim 11, further including instructions that, when executedby the machine, configure the machine to perform further operationscomprising: receiving, from the remote device, data indicating at leastone of a security level, a cost, power, and speed; and changing themanner in which the remote device transmits and receives communicationsto one of VOIP communication, HTTP communication, text communication,voice communication, video communication, and augmented realitycommunication based on the received data.
 13. The storage device ofclaim 12, further including instructions that, when executed by themachine, configure the machine to perform further operations comprising:monitoring a bandwidth of the communications between the remote deviceand the internal network; and in response to determining that thebandwidth is no longer capable of supporting the manner in whichcommunications are transmitted or received, changing the manner in whichcommunications are transmitted or received to a manner that requiresless bandwidth.
 14. The storage device of claim 12, further includinginstructions that, when executed by the machine, configure the machineto perform further operations comprising: monitoring a bandwidth of thecommunications between the remote device and the internal network; andin response to determining that the bandwidth has increased and iscapable of supporting a different manner in which communications aretransmitted or received, changing the manner in which communications aretransmitted or received to a manner that requires more bandwidth and isallowed by the identified regulations.
 15. The storage device of claim14, further including instructions that, when executed by the machine,configure the machine to perform further operations comprising:receiving, from the remote device, a request to override the determinedregulations; identifying whether the user of the remote device thatrequested the override has sufficient permissions to override theidentified regulations; and in response to identifying the user has thesufficient permissions, changing the manner in which communications aretransmitted or received to the manner that uses the most bandwidth andincludes a bandwidth that is less than the bandwidth available at theremote device.
 16. The storage device of claim 9, wherein determiningthe location of the remote communication device includes determiningthat the remote communication device is in one of (1) a differentcountry than the internal network and (2) a same country as the internalnetwork.
 17. A dongle configured to be connected to an input/output portof a remote communication device or internal network, the dongleincluding: a memory; processing circuitry coupled to the memory, theprocessing circuitry: determines a location of the remote communicationdevice by at least one of a global positioning system (GPS), lowfrequency (LF) atomic time radio, earth magnetic signature, internetprotocol (IP) address, and cell phone tower triangulation; identifyingregulations regarding communication from the internal network to theremote device based on the determined location and a location of theinternal network; identifies a bandwidth of a remote network, differentfrom the internal network, to which the remote communication device isconnected, the remote network communicatively accessible by the internalnetwork; estimates a battery life of the remote device and an amount oftime the remote device can communicate with the device of the internalnetwork using each of voice over internet protocol (VOIP) communication,hypertext transfer protocol (HTTP) communication, text communication,voice communication, video communication, and augmented realitycommunication; selects, based on the estimated battery life and theamount of time the remote device can communicate, a communicationprotocol including one of VOIP communication, HTTP communication, textcommunication, voice communication, video communication, and augmentedreality communication; configures the remote device to transmit andreceive communications in a manner compliant with the identifiedregulations and the selected communication protocol; and provides VOIPcommunications, HTTP communications, text communications, voicecommunications, video communications, or augmented realitycommunications to the remote device based on the selected communicationprotocol, estimated battery life and the identified bandwidth.
 18. Thedongle of claim 17, wherein the processing circuitry receives thecommunications without permanently storing any data on the memory. 19.The dongle of claim 18, wherein the processing circuitry: terminates aconnection between the remote device and the internal network; andremoves any data at the remote device and received from the internalnetwork in response to the connection being terminated.
 20. The dongleof claim 18, wherein the processing circuitry: receives, from the remotedevice, data indicating at least one of a security level, a cost, andspeed; and changes the manner in which the remote device transmits andreceives communications to one of VOIP communication, HTTPcommunication, text communication, voice communication, videocommunication, and augmented reality communication based on the receiveddata.
 21. The dongle of claim 20, wherein the processing circuitry:monitors a bandwidth of the communications between the remote device andthe internal network; and in response to a determination that thebandwidth is no longer capable of supporting the manner in whichcommunications are transmitted or received, changes the manner in whichcommunications are transmitted or received to a manner that requiresless bandwidth.
 22. The dongle of claim 20, wherein the processingcircuitry: monitors a bandwidth of the communications between the remotedevice and the internal network; and in response to a determination thatthe bandwidth has increased and is capable of supporting a differentmanner in which communications are transmitted or received, changes themanner in which communications are transmitted or received to a mannerthat requires more bandwidth and is allowed by identified regulations.23. The dongle of claim 17, wherein the remote device is in one of (1) adifferent country than the internal network and (2) a same country asthe internal network.