Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 9105. Отображено 100.
02-02-2012 дата публикации

Method and apparatus for managing data of operation system

Номер: US20120030323A1
Автор: Akinori Matsuno
Принадлежит: Fujitsu Ltd

A server for an operation system includes a monitor to monitor a status of another server, a first storage to retain a first network configuration information, a second storage to copy the first network configuration information when an abnormality is detected in the another server, a third storage to retain a first update history information including update information of a network configuration information obtained from a client in the operation system, and an operation configuration manager to update the first network configuration information and a second network configuration information retained in the another server when the another server recovers from the abnormality. The operation configuration manager is configured to update the first network configuration information and the second network configuration information based on the first update history information and a second update history information retained in the another server.

Подробнее
02-02-2012 дата публикации

Tenant rescue for software change processes in multi-tenant architectures

Номер: US20120030502A1
Принадлежит: Individual

A multi-tenant system can be switched to a downtime state to implement a transition from a current state to a target state of a core software platform. During a second phase of the transition an error associated with tenant-specific content of a first customer tenant of the plurality of customer tenants of the multi-tenant system can be identified. The second phase can be suspended for the first customer tenant while continuing the second phase for a remainder of the plurality of customer tenants for which an error has not been identified. After a scheduled duration of the downtime state, the multi-tenant system can be reactivated such that the multi-tenant system includes the remainder of the plurality of customer tenants with the transition implemented and the first customer tenant either with the transition implemented if the error has been corrected or without the transition implemented if the error has not been corrected.

Подробнее
02-02-2012 дата публикации

Communication device

Номер: US20120030526A1
Автор: Munehisa Matsuda
Принадлежит: Brother Industries Ltd

A communication device includes a receiving unit, a first determining unit, and a sending unit. The receiving unit is configured to receive, from a terminal device, a plurality of input values corresponding to a plurality of setting items. The first determining unit, when the plurality of setting items includes a plurality of related items that are related to each other, is configured to determine whether input values, among the plurality of input values, corresponding to the plurality of related items are compatible. The sending unit is configured to send error data indicating an error screen toward the terminal device when the input values corresponding to the plurality of related items are incompatible, the error screen showing that at least one input value among the plurality of input values has an error.

Подробнее
03-05-2012 дата публикации

Highly available file system in a directly attached storage

Номер: US20120110370A1
Автор: Amos Benari, Shahar Havivi
Принадлежит: Red Hat Israel Ltd

A method and system to provide a highly available file system in a directly attached storage (DAS). The storage is directly attached to a computer system that has an inactive operating system. A hardware module in the computer system receives a network command to access the file system. The hardware module determines a physical location of data blocks to be accessed in the storage. According to the network command, the hardware module accesses the data blocks in the storage.

Подробнее
10-05-2012 дата публикации

Method and system for performing root cause analysis

Номер: US20120117573A1
Принадлежит: HITACHI LTD

A root cause analysis engine uses event survival times and gradual deletion of events to improve analysis accuracy and reduce the number of required calculations. Certainty factors of relevant rules are recalculated every time notification of an event is received. The calculation results are held in a rule memory in the analysis engine. Each event has a survival time, and when the time has expired, that event is deleted from the rule memory. Events held in the rule memory can be deleted without affecting other events held in the rule memory. The analysis engine can then re-calculate the certainty factor of each rule by only performing the re-calculation with respect to affected rules that are related with the deleted event. The calculation cost can be reduced because analysis engine processes events incrementally or decrementally.

Подробнее
14-06-2012 дата публикации

Web service information processing method and web service compositing method and appartus using the same

Номер: US20120151277A1

Disclosed is a method and apparatus for realizing an effective service adaptation in consideration of delay factors possibly generated in combining (or compositing) already existing Web services in constituting a composite Web service. A failure or delay in executing a Web service is predicted in consideration of features (or factors) of QoS of Web services constituting a composite Web service, and a substitute Web service is executed or a speculative execution is performed to thus stably and quickly constitute a composite Web service.

Подробнее
05-07-2012 дата публикации

System and method for root cause analysis

Номер: US20120173927A1
Принадлежит: American Power Conversion Corp

Systems and methods for determining the root cause of an event in a data center are presented. The system includes a data center management device coupled to a network and configured to receive an indication of the event from a physical infrastructure device via the network, determine a first generic cause model for the event by accessing an event cause model data store, determine a first event profile by adapting the first generic cause model to the data center using data center profile information stored in a data center profile data store and display a first probability that a potential cause defined by the first event profile is the root cause.

Подробнее
19-07-2012 дата публикации

Methods, Systems, and Products for Data Backup

Номер: US20120185431A1
Автор: Hong Nguyen, Michael Denny
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Methods, systems and computer program products automatically back-up data. Communication is established among a first device, a second device, and a network-based storage device. Key words associated with uniform resource locators are identified and stored in the network-based storage device. When corruption is detected of the data stored in the first device, the key words are automatically retrieved from the network-based storage device and listed in a user interface displayed at the second device.

Подробнее
02-08-2012 дата публикации

Re-establishing push notification channels via user identifiers

Номер: US20120198268A1
Автор: Rashid Qureshi
Принадлежит: Microsoft Corp

Embodiments enable recovery of push notification channels via session information associated with user identifiers. A proxy service creates session information describing push notification channels (e.g., subscriptions) for a user and associates the session information with a user identifier. The session information is stored in a cloud service or other storage area separate from the proxy service. After failure of a user computing device or the proxy service, the session information is obtained via the user identifiers and the push notification channels are re-created with the session information. In some embodiments, the proxy service enables delivery of the same notification to multiple computing devices associated with the user identifier.

Подробнее
04-10-2012 дата публикации

Fault detection and recovery as a service

Номер: US20120254652A1
Принадлежит: Microsoft Corp

The monitoring by a monitoring node of a process performed by a monitored node is often devised as a tightly coupled interaction, but such coupling may reduce the re-use of monitoring resources and processes and increase the administrative complexity of the monitoring scenario. Instead, fault detection and recovery may be designed as a non-proprietary service, wherein a set of monitored nodes, together performing a set of processes, may register for monitoring by a set of monitoring nodes. In the event of a failure of a process, or of an entire monitored node, the monitoring nodes may collaborate to initiate a restart of the processes on the same or a substitute monitored node (possibly in the state last reported by the respective processes). Additionally, failure of a monitoring node may be detected, and all monitored nodes assigned to the failed monitoring node may be reassigned to a substitute monitoring node.

Подробнее
04-10-2012 дата публикации

Proactive failure handling in database services

Номер: US20120254669A1
Принадлежит: Microsoft Corp

Embodiments are directed to predicting the health of a computer node using health report data and to proactively handling failures in database services. In an embodiment, a computer system monitors various health indicators for multiple nodes in a database cluster. The computer system accesses stored health indicators that provide a health history for the database cluster nodes. The computer system then generates a health status based on the monitored health factors and the health history. The generated health status indicates the likelihood that the node will be healthy within a specified future time period. The computer system then leverages the generated health status to handle current or predicted failures. The computer system also presents the generated health status to a user or other entity.

Подробнее
01-11-2012 дата публикации

Method and system for monitoring a monitoring-target process

Номер: US20120278478A1
Автор: Junichi Fujino
Принадлежит: International Business Machines Corp

A method and system for monitoring a monitoring-target process. A monitored server computer starts a monitoring-target process. After starting the monitoring-target process, the computer ascertains a current operating state of the monitoring-target process which includes utilizing a monitoring condition record included in a monitoring-condition registry. The monitoring-condition registry is a file or database stored in a data storage device in the computer. The monitoring condition record includes monitoring conditions controlling implementation of the monitoring-target process. The monitoring condition record includes a process label that uniquely identifies the monitoring-target process. After ascertaining the current operating state, the computer stops the monitoring-target process.

Подробнее
08-11-2012 дата публикации

User interface for managing monitoring profiles

Номер: US20120284628A1
Принадлежит: VMware LLC

A graphical user interface for a virtualized computing environment that includes a plurality of host computers, each having one or more virtual machines running therein, where the virtualized computing environment is configured with one or more monitoring profiles for monitoring a status of objects included in the virtualized computing environment, where the graphical user interface includes a first section and a second section. The first section organizes the one or more monitoring profiles, where each monitoring profile includes one or more rules and each rule corresponds to an action that is performed if the rule is violated. The second section organizes a first set of rules associated with a selected monitoring profile and corresponding actions associated with each rule in the first set of rules.

Подробнее
15-11-2012 дата публикации

Real-Time Diagnostics Pipeline for Large Scale Services

Номер: US20120290880A1
Принадлежит: Microsoft Corp

Real-time diagnostics may be provided. A plurality of data feeds may be aggregated from at least one of a plurality of nodes. Upon determining that at least one element of at least one of the data feeds meets a trigger condition, an action associated with the trigger condition may be executed.

Подробнее
22-11-2012 дата публикации

Monitoring Service in a Distributed Platform

Номер: US20120297054A1
Принадлежит: International Business Machines Corp

Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.

Подробнее
29-11-2012 дата публикации

Administering Incident Pools For Event And Alert Analysis

Номер: US20120304012A1
Принадлежит: International Business Machines Corp

Administering incident pools including receiving, by an incident analyzer from an incident queue, a plurality of incidents from one or more components of the distributed processing system; assigning, by the incident analyzer, each received incident to a pool of incidents; assigning, by the incident analyzer, to each incident a particular combined minimum time for inclusion in one or more pools, each particular combined minimum time corresponding to a particular incident; in response to the pool closing, determining, by the incident analyzer, for each incident in the pool whether the incident has met its combined minimum time for inclusion in one or more pools; and if the incident has been in the pool for its combined minimum time, including, by the incident analyzer, the incident in the closed pool; and if the incident has not been in the pool for its combined minimum time, including the incident in a next pool.

Подробнее
20-12-2012 дата публикации

Method of Reporting Execution Result for SACMO and Related Communication Device

Номер: US20120323996A1
Автор: Chun-Ta Yu, Yin-Yeh Tseng
Принадлежит: HTC Corp

A method of reporting a result of execution of a workflow of a software and application control management object (SACMO) management object tree for a SACMO client in a service system is disclosed. The method comprises determining a node of the SACMO management object tree according to the result of the execution of the workflow; generating a message comprising an address of the node of the SACMO management object tree; and transmitting the message to a SACMO server of the service system, for reporting the result to the SACMO server.

Подробнее
03-01-2013 дата публикации

Trace capture of successfully completed transactions for trace debugging of failed transactions

Номер: US20130007535A1
Автор: Darren R. Beard
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide a method, system and computer program product for trace capture of successfully completed transactions for trace debugging of failed transactions. In an embodiment of the invention, a method for trace capture of successfully completed transactions for trace debugging of failed transactions is provided. The method includes storing entries in a log with information pertaining to successfully completed transactions in a transaction processing system executing in memory of a host server, detecting a failed transaction in the transaction processing system, generating a trace for the failed transaction, and providing with the generated trace an entry from the log with information pertaining to a successful completion of the failed transaction.

Подробнее
07-02-2013 дата публикации

System and method for optimized event monitoring in a management environment

Номер: US20130036216A1
Принадлежит: Dell Products LP

In accordance with the present disclosure, a system and method for optimizing event monitoring in a management environment is disclosed. The system may include a management system, an agent system, an intermediate management module and an event generation engine. The intermediate management module may create a device object in the management system corresponding to the agent system. The event generation engine may convert a transmission from the agent system into a pre-determined event structure and inject the event structure into the device object. The intermediate management module may then generate an alert in response to the injection of the event structure.

Подробнее
14-02-2013 дата публикации

Method for processing data of a control unit in a data communication device

Номер: US20130042079A1
Принадлежит: Individual

A method for processing data of a control unit in a data communication device, which has a first memory area and a second memory area, and is connected to the control unit through an interface. Data from the control unit is transmitted to the data communication device through the interface. A value is stored identically in the first memory area and in the second memory area. The data communication device tests whether a first trigger is present, and if present, storage in the first memory area is discontinued, or the trigger class of the first trigger is tested and storage in the first memory area is discontinued only in the presence of a predefined trigger class. Subsequently, values of the data are read out from the first memory area, whereby values arriving chronologically after the first trigger are stored in the second memory area by the data communication device.

Подробнее
28-02-2013 дата публикации

Method for Automated Distributed Diagnostics for Networks

Номер: US20130055020A1
Принадлежит: Telcordia Technologies Inc

A method for distributed computations for fault-diagnosis in a system whose fault propagation model has deterministic couplings between faults and symptoms includes creating a ‘relation graph’ in which the nodes correspond to the potential faults, with two nodes connected by a ‘relational link’ if their corresponding faults have an observed symptom in common. Each relational link is assigned a weight equal to the sum, taken over the symptoms represented by the relational link, of the reciprocal of the number of distinct fault-pairs that produce each such symptom. The relation graph is then partitioned into several domains, while minimizing the number of cross-domain relational links, which correspond to cross-domain symptoms. In each domain, all the optimal local solutions to the domain's sub-problem are first determined, and then a combination is selected of the local solutions, one from each domain, that explains the maximum number of cross-domain symptoms, where the optimal solution is supplemented, if necessary, with additional faults to explain any remaining unexplained cross-domain symptoms, determining also a bound on the deviation from optimality of the global solution.

Подробнее
28-03-2013 дата публикации

Flexible event data content management for relevant event and alert analysis within a distributed processing system

Номер: US20130080630A1
Принадлежит: International Business Machines Corp

Flexible event data content management for relevant event and alert analysis within a distributed processing system includes receiving, by an interface connector, a raw event from a component of the distributed processing system; analyzing custom data within the raw event to determine a location to store the custom data, the custom data in a first data format; storing extended data within the raw event in a common event data format, the extended data indicating the location of the custom data; receiving, by an event analyzer, the event; and determining whether there are custom customer rules that need the custom data; and if there are such custom customer rules, retrieving the custom data based on the extended data from the event; and applying the custom customer rules to the extended data; if there are no such custom customer rules, applying the base rules to a base portion of the event.

Подробнее
11-04-2013 дата публикации

Server cluster and control mechanism thereof

Номер: US20130091371A1
Принадлежит: QUANTA COMPUTER INC

A server cluster including a network switch and multiple server nodes is provided. The network switch is connected to an external network. Each server node performs an operation system and respectively includes a network port, a network chip and a south bridge chip. The network port is connected to the network switch via a cable. The network chip outputs a power-off signal according to a received power-off packet after the network switch is started. The south bridge chip outputs a shutdown signal to shut down the server node according to the power-off signal when the server node is turned on and the operation system is working normally.

Подробнее
18-04-2013 дата публикации

Selected Alert Delivery In A Distributed Processing System

Номер: US20130097216A1
Принадлежит: International Business Machines Corp

Methods, apparatuses, and computer program products for selected alert delivery in a distributed processing system are provided. Embodiments include receiving a plurality of events from one or more event producing components of the distributed processing system; creating, by an incident analyzer, in dependence upon the events a truth space representing events that make one or more conditional event processing rules true, the truth space including a set of truth points, each truth point including a set of events and a set of event locations; creating, by the incident analyzer, in dependence upon the truth space one or more alerts; and sending, by the incident analyzer, the alerts to at least one component of the distributed processing system.

Подробнее
16-05-2013 дата публикации

Asics having programmable bypass of design faults

Номер: US20130124933A1
Автор: James T. Koo
Принадлежит: SHEYU GROUP LLC

A relatively small amount of programmable logic may be included in a mostly ASIC device such that the programmable logic can be used as a substitute for a fault-infected ASIC block. This substitution may occur permanently or temporarily. When an ASIC block is temporarily substituted, faulty outputs of the ASIC block are disabled just at the time they would otherwise propagate an error. The operations of the temporarily deactivated ASIC block(s) may be substituted for by appropriately programmed programmable logic. Thus, a fault-infected ASIC block that operates improperly 1% of the time can continue to be gainfully used for the 99% of the time when its operations are fault free. This substitution can be activated in various stages of the ASIC block's life including after: initial design; pilot production; and mass production. This provides for cost saving and faster time-to-market, repair, and maintenance even years after installation and use.

Подробнее
23-05-2013 дата публикации

Capturing telemetry data by dynamic language engine

Номер: US20130132930A1
Принадлежит: Microsoft Corp

At least one embodiment described herein relates to the selective capturing of script code stacks associated with exceptions thrown by script code. For unhandled exceptions, the script engine 1) captures the script code stack in a host-accessible manner in which a host that hosts the script engine may access the captured script code stack, 2) completes unwinding of the script stack, and 3) reports the captured script code stack to a host that hosts the script engine. For at least one of the handled exceptions thrown by the script code for which the script code itself handles the exception, the script code stack is not captured in the host-accessible manner. Also, the call stack property of an error object is populated at throw time, rather than creation time.

Подробнее
30-05-2013 дата публикации

Relevant alert delivery in a distributed processing system

Номер: US20130138809A1
Принадлежит: International Business Machines Corp

Methods, systems and products are provided relevant alert delivery including assigning by an event analyzer each received event to an events pool; determining by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool whether to suppress one or more of the events; identifying by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool one or more alerts; sending by the event analyzer to an alert analyzer all the alerts identified by the event analyzer; assigning by the alert analyzer the identified alerts to an alerts pool; determining by the alert analyzer in dependence upon alert analysis rules and the alerts in the alert pool whether to suppress any alerts; and transmitting the unsuppressed alerts to one or more components of the distributed processing system.

Подробнее
30-05-2013 дата публикации

Method of fencing in a cluster system

Номер: US20130139219A1
Автор: Zhifeng Cai
Принадлежит: HANGZHOU H3C TECHNOLOGIES CO LTD

A method of fencing in a cluster system including network devices and a management network device is disclosed. Each network device may run an application program and comprises a fence device. A first network device receives a fence operation command from the management network device. The fence operation command contains information of a target network device and information of a target application. The first network device may determine a fence device on the first network device that corresponds to the fence operation command and activates the determined fence device such that the fence device performs a fence operation on the target application program according to the fence operation command.

Подробнее
13-06-2013 дата публикации

Computing platform interface with memory management

Номер: US20130151569A1
Принадлежит: Individual

In some embodiments, a PPM interface may be provided with functionality to facilitate to an OS memory power state management for one or more memory nodes, regardless of a particular platform hardware configuration, as long as the platform hardware is in conformance with the PPM interface.

Подробнее
20-06-2013 дата публикации

CLIENT SELECTABLE SERVER-SIDE ERROR RESOLUTION

Номер: US20130159767A1
Автор: Camelon John, Hughes Evan

An illustrative embodiment of a computer-implemented process for client selectable server-side data error resolutions receives a request from a client to perform an action on a server, identifies a data error during performance of the action of the request and generates a response including an error description and a resolution subset for the identified error. The computer-implemented process further sends a response to the client, receives a selected resolution returned from the client, and responsive to a determination the selected resolution associated with the token returned executes on the server, executes the selected resolution, associated with the token returned, on the server to correct the data error. 1. A computer-implemented process for client selectable server-side data error resolutions , the computer-implemented process comprising:receiving a request from a client to perform an action on a server;identifying a data error during performance of the action of the request;generating a resolution subset of one or more resolutions for the error from a set of candidate resolutions;generating a token for each of the one or more resolutions in the resolution subset for the error;generating a response including an error description and the resolution subset for the identified error, sending the response to the client;receiving a token for the selected resolution from the client;determining whether the selected resolution associated with the token returned executes on the server; andresponsive to a determination the selected resolution associated with the token returned executes on the server, executing the selected resolution, associated with the token returned, on the server to correct the data error.2. The computer-implemented process of wherein identifying a data error during performance of the action of the request further comprises:identifying the data error related to data associated with the action of the request, wherein identification includes ...

Подробнее
11-07-2013 дата публикации

Repair method and device for abnormal-erase memory block of non-volatile flash memory

Номер: US20130179728A1
Автор: Tao Zhou
Принадлежит: MStar Semiconductor Inc Taiwan

A repair method for an abnormal-erase memory block of a non-volatile flash memory is provided. The method includes steps of: sequentially scanning bit data in a page of a block when reading data in a NAND flash; determining whether the page is an abnormal-erase page; setting logic “0” bit data in the page to logic “1” when the page is an abnormal-erase page; and re-erasing the block.

Подробнее
18-07-2013 дата публикации

FAULT TOLERANCE FOR COMPLEX DISTRIBUTED COMPUTING OPERATIONS

Номер: US20130185603A1
Принадлежит: NETSUITE INC.

A method for enabling a distributed computing system to tolerate system faults during the execution of a client process. The method includes instantiating an execution environment relating to the client process; executing instructions within the execution environment, the instructions causing the execution environment to issue further instructions to the distributing computing system, the further instructions relating to actions to be performed with respect to data stored on the distributed computing system. An object interface proxy receives the further instructions and monitors the received to determine if the execution environment is in a desired save-state condition; and, if so, save a current state of the execution environment in a data store. 1. A method for enabling fault tolerance in a distributed computing system executing a client process , the method comprising:(a) instantiating an execution environment relating to said client process;(b) executing instructions within said execution environment, said instructions causing said execution environment to issue further instructions to said distributed computing system, said further instructions relating to actions to be performed with respect to data stored on said distributed computing system; and(c) receiving said further instructions by an object interface proxy, wherein at least one of said further instructions is a save-state instruction, which causes said object interface proxy to save a current state of said execution environment in a data store.2. The method of claim 1 , wherein said object interface proxy functions as an application programming interface for said distributed computing system.3. The method of claim 1 , further comprising the steps of:(d) determining a fault has occurred with said client process;(e) instantiating a new execution environment relating to said client process;(f) receiving a restore-state instruction by an object interface proxy indicating said client process has ...

Подробнее
05-09-2013 дата публикации

Assigning States to Cloud Resources

Номер: US20130232252A1
Принадлежит: Citrix Systems Inc

Methods and systems for management of cloud computing resources are described herein. A management server for a cloud of physical computing resources may assign states to individual physical computing resources or groups of physical computing resources. The states may include a disabled state, in which only administrator access to the resources is permitted; an enabled state, in which user access to the resources is permitted; a restricted state, in which some, but not all user requests to the resources are permitted; and an unmanaged state, in which no communications between the resources and the management server are permitted.

Подробнее
05-09-2013 дата публикации

TRANSITIONAL REPLACEMENT OF OPERATIONS PERFORMED BY A CENTRAL HUB

Номер: US20130232375A1

A central hub is coupled to a plurality of computational devices. The central hub stores a data structure that grants locks for accessing common data stored at the central hub, wherein the common data is shared by the plurality of computational devices. Each computational device maintains locally those locks that are held by the computational device in the data structure stored at the central hub. In response to a failure of the data structure stored at the central hub, a selected computational device of the plurality of computational devices is determined to be a manager system. Other computational devices besides the manager system communicate to the manager system all locks held by the other computational devices in the data structure stored at the central hub. The data structure and the common data are generated and stored at the manager system. Transactions are performed with respect to the data structure stored at the manager system, until the data structure stored at the central hub is operational. 1. A method , comprising:numbering a plurality of computational devices at initialization time; andmaintaining locally for each of the plurality of computational devices, those locks that are held by the computational device in a data structure that grants locks for accessing common data stored at a central hub; andin response to a failure of the data structure, determining a selected computational device of the plurality of computational devices to be a manager system, based on the numbering of the plurality of computational devices at initialization time.2. The method of claim 1 , wherein the data structure grants locks for accessing common data stored at the central hub.3. The method of claim 2 , wherein the common data is shared by the plurality of computational devices.4. The method of claim 2 , the method further comprising:in response to the failure of the data structure stored at the central hub, communicating to the manager system, by other computational ...

Подробнее
19-09-2013 дата публикации

Systems and methods for supporting inline delegation of middle-tier transaction logs to database

Номер: US20130246368A1
Принадлежит: Oracle International Corp

Systems and methods are provided for supporting transaction recovery based on inline delegation of transaction logs to a database. The system can retrieve transaction recovery information of a transaction from a persistence store, wherein the transaction recovery information is persisted on a resource manager that is associated with the persistence store during a prepare phase. Furthermore, the system can retrieve one or more in-doubt transactions from one or more participating resource managers of the transaction. Then, the system can determine whether to commit or roll back the one or more in-doubt transactions by matching the one or more in-doubt transactions to the transaction recovery information.

Подробнее
19-09-2013 дата публикации

CHANGE MESSAGE BROADCAST ERROR DETECTION

Номер: US20130246863A1
Принадлежит:

A hardware device detects change messages broadcast within a system. The system includes the hardware device, one or more controller devices, one or more expander devices, and one or more target devices interconnected among one another. The hardware device determines whether the change messages were broadcast within the system every first period of time or less for at least a second period of time, the first period of time less than the second period of time. In response to determining that the change messages were broadcast within the system every first period of time or less for at least the second period of time, the hardware devices signals that an error has been detected. 1. A method comprising:detecting, by a hardware device within a system, a plurality of change messages broadcast within the system, the system comprising the hardware device, one or more controller devices, one or more expander devices, and one or more target devices interconnected among one another;determining, by the hardware device, whether the change messages were broadcast within the system every first period of time or less for at least a second period of time, the first period of time less than the second period of time;in response to determining that the change messages were broadcast within the system every first period of time or less for at least the second period of time, signaling by the hardware device that an error has been detected.2. The method of claim 1 , wherein each change message indicates that a change in a membership of the system has occurred claim 1 , such that one of the controller devices claim 1 , the expander devices claim 1 , and the target devices has been electrically connected or disconnected within the system.3. The method of claim 1 , wherein each target device includes one or more storage devices claim 1 ,wherein the hardware device is a switch device,wherein each target device is directly connected to one of the controller devices, to one of the expander ...

Подробнее
03-10-2013 дата публикации

CLOUD SYSTEM AND METHOD FOR MONITORING AND HANDLING ABNORMAL STATES OF PHYSICAL MACHINE IN THE CLOUD SYSTEM

Номер: US20130262914A1
Принадлежит: DELTA ELECTRONICS, INC.

A cloud system and a method for monitoring and handling abnormal states of physical machines in the cloud system are disclosed. Each physical machine of the cloud system respectively executes a daemon program for monitoring operation states of the physical machine and providing the operation states to a management terminal in the cloud system. When the management terminal determines that any physical machine is having abnormal operation states, the management terminal provides a control instruction to the cabinet of the physical machine having abnormal operation states. The physical machine having abnormal operation states is compulsorily ejected from the cabinet. Thus, it is convenient to the administrator when replacing the physical machine having abnormal operation states onsite by shortening the time looking for the faulted physical machine. 1. A method for monitoring and handling abnormal states of physical machines in a cloud system , used among at least one management terminal and a plurality of physical machines , wherein the plurality of physical machines respectively disposed in a plurality of cabinets in a computing data center , the method for monitoring and handling abnormal states of physical machines in a cloud system including:a) retrieving an abnormal message indicating at least one the physical machine having abnormal operation states by the management terminal;b) generating a control instruction according to the abnormal message, and transmitting the control instruction to the cabinet having the physical machine by the management terminal;c) receiving the control instruction at the cabinet, and ejecting the corresponding physical machine from the cabinet according to the control instruction.2. The method for monitoring and handling abnormal states of physical machines in a cloud system of claim 1 , wherein the cabinet is respectively installed with a light emitting component on the assigned location of each physical machine claim 1 , and the ...

Подробнее
03-10-2013 дата публикации

Node death detection by querying

Номер: US20130262937A1
Принадлежит: Oracle International Corp

Systems, methods, and other embodiments associated with detecting a node death in a clustered distributed system are described. In one embodiment, a method includes transmitting a ping message to a peer node in the network. If a reply to the ping message is not received from the peer node, a query is sent to table of port identifiers that lists ports in the cluster. In one embodiment, the query includes a port identifier associated with the peer node. The peer node is declared as inactive/dead when the query fails to locate a match in the table for the port identifier. When the query locates a match in the table for the port identifier, another ping message is periodically transmitted to the peer node.

Подробнее
17-10-2013 дата публикации

Collaborative processor and system performance and power management

Номер: US20130275737A1
Принадлежит: Individual

The present invention relates to a platform power management scheme. In some embodiments, a platform provides a relative performance scale using one or more parameters to be requested by an OSPM system.

Подробнее
17-10-2013 дата публикации

Collaborative processor and system performance and power management

Номер: US20130275796A1
Принадлежит: Individual

The present invention relates to a platform power management scheme. In some embodiments, a platform provides a relative performance scale using one or more parameters to be requested by an OSPM system.

Подробнее
14-11-2013 дата публикации

Automated trouble ticket generation

Номер: US20130305102A1
Автор: James Malnati
Принадлежит: Unisys Corp

Control over servers and partitions within a computer network may be automated to improve response to disaster events within the computer network. For example, a monitoring server may be configured to automatically monitor servers through remote communications sessions. A disaster event may be detected based on information received from the partitions and servers within the network. When a disaster event or events leading to a disaster event are detected, a trouble ticket may be generated. The trouble ticket may also generate an alert displayed to an administrator through a customized hierarchical graphical display. When the administrator is not logged in, messages may be generated to alert the administrator to the problem. The administrator may then log in remotely and respond to the alert.

Подробнее
21-11-2013 дата публикации

Evaluation of performance of software applications

Номер: US20130311651A1
Принадлежит: International Business Machines Corp

A method and system for evaluating performance of software applications of different web sites. Steps in a first software application of a first web site are mapped to respective similar-function steps in a second software application of a second web site. The mapping for each step in the first software application includes associating both each step in the first software application and the respective similar-function step in the second software with a respective task. Measures of performance of each mapped step in the first software application and measures of performance of the respective similar-function steps and of other steps in the second software application are determined and included in a report. A measure of performance of the first software application and a measure of performance of the second software application are included in the report.

Подробнее
26-12-2013 дата публикации

Tenant Rescue for Software Change Processes in Multi-Tenant Architectures

Номер: US20130346787A1
Принадлежит: SAP AG

A multi-tenant system can be switched to a downtime state to implement a transition from a current state to a target state of a core software platform. During a second phase of the transition an error associated with tenant-specific content of a first customer tenant of the plurality of customer tenants of the multi-tenant system can be identified. The second phase can be suspended for the first customer tenant while continuing the second phase for a remainder of the plurality of customer tenants for which an error has not been identified. After a scheduled duration of the downtime state, the multi-tenant system can be reactivated such that the multi-tenant system incldues the remainder of the plurality of customer tenants with the transition implemented and the first customer tenant either with the transition implemented if the error has been corrected or without the transition implemented if the error has not been corrected. 1. A computer program product comprising a non-transitory machine-readable medium storing instructions that , when executed by at least one processor , cause the at least one processor to perform operations comprising:identifying an error during a second phase of a transition of a core software platform of a multi-tenant computing system from a current state to a target state, the multi-tenant computing system providing access to a plurality of customer tenants comprising an organization-specific business configuration of the core software platform, the organization-specific business configuration for each tenant of the plurality of tenants comprising core software platform content relating to the operation of the core software platform that is common to all of the plurality of customer tenants and tenant-specific content that relates to the organization-specific business configuration and that is available to only that customer tenant, the error being associated with first tenant-specific content of a first customer tenant of the plurality of ...

Подробнее
02-01-2014 дата публикации

Detecting anomalies in real-time in multiple time series data with automated thresholding

Номер: US20140006325A1
Автор: Alain E. Biem
Принадлежит: International Business Machines Corp

An approach is provided for detecting an anomaly in a processing environment. The approach includes using a processor to obtain a series of values collected within a processing interval of the processor in the processing environment. The processor normalizes this first series of values to obtain a first series of normalized values. A second series of normalized values is generated by applying a predictive filter to the first series of normalized values. A comparison score is generated from the normalized values by comparing the first series of normalized values and the second series of normalized values. The approach then determines whether the comparison score represents an anomaly relative to at least one other comparison score derived from values collected within the processing interval.

Подробнее
02-01-2014 дата публикации

Method and system for automatically detecting and resolving infrastructure faults in cloud infrastructure

Номер: US20140006844A1
Принадлежит: Cycle Computing LLC

Systems and methods are provided for any party in a cloud ecosystem (cloud providers of such resources, the intermediate management software for such resources, and the end user of such resources) to detect and resolve faulty resources synchronously or asynchronously, before said faults adversely affect the users' workloads. The system requests a service or set of one or more resources within a cloud, automatically checking the infrastructure for various faults that would cause it to be non-functional, including pre-defined and user-defined checks, and resolving them before including the infrastructure in the working service cluster of resources. The system presents an API to the user that returns only functional, production-quality resources that are not in a faulty state. An API that tests and resolves bad infrastructure can be registered during the request or a preceding/subsequent API call, removing the need for the end-user to deal with various types of infrastructure faults.

Подробнее
30-01-2014 дата публикации

Systems and methods for control reliability operations

Номер: US20140031957A1
Принадлежит: General Electric Co

In one embodiment, a system includes a data collection system configured to collect a data from a control system. The system further includes a configuration management system configured to manage a hardware configuration and a software configuration for the control system based on the data. The system additionally includes a rule engine configured to use the data as input and to output a health assessment by using a rule database, and a report generator configured to provide a health assessment for the control system.

Подробнее
30-01-2014 дата публикации

CLUSTERED FILESYSTEMS FOR MIX OF TRUSTED AND UNTRUSTED NODES

Номер: US20140032958A1
Автор: Beck Kenneth S.
Принадлежит: Silicon Graphics International Corp.

A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted metadata server assigns a mandatory access control label as an extended attribute of each filesystem object regardless of whether required by a client node accessing the filesystem object. The mandatory access control label indicates the sensitivity and integrity of the filesystem object and is used by the trusted metadata server(s) to control access to the filesystem object by all client nodes. 1. A method for recovery of a failed node , the method comprising:interrupting threads processing messages from a failed node that are waiting for tokens to be returned;sending interrupts to one or more threads that are processing messages from the failed node and that are waiting for the token state to stabilize;sending interrupts to one or more threads that are attempting to lend tokens and that are waiting for the token state to stabilize; andsending interrupts to one or more threads forced offline because of an error and that are waiting for the token state to stabilize.2. The method of claim 1 , further comprising:determining, by the threads which have sent interrupts and that are waiting for the token state to stabilize, whether the threads are allowed to wait before being interrupted.3. The method of claim 2 , further comprising:waking one or more sleeping threads;checking the token state of the awoken threads;comparing the token state of each of the awoken threads to a previous state of the awoken thread;determining, for each respective woken thread, if the state of each respective awoken thread has changed from a previous state; andsetting each respective awoken thread having a state that has not changed in a sleep state.4. The method of claim 3 , further comprising:returning partial results to token functions for each of the respective awoken threads with an early state.5. The method of claim 4 , further ...

Подробнее
06-02-2014 дата публикации

Method for Transmitting Messages in a Redundantly Operable Industrial Communication Network and Communication Device for the Redundantly Operable Industrial Communication Network

Номер: US20140040657A1
Принадлежит:

A method for transmitting messages in a redundantly operable communication network includes a first subnetwork with a tree topology and a second subnetwork, wherein messages are transmitted in the first subnetwork in accordance with a spanning tree protocol, communication devices associated with network nodes of the first subnetwork interchange messages containing topology information with one another in order to form a tree topology, messages are transmitted in the second subnetwork in accordance with a parallel or ring redundancy protocol, and a virtual network node which is connected to all network nodes of the second subnetwork via a respective virtual connection which is uninterruptable by an error is configured as the root network node of the first subnetwork. 1. A method for transmitting messages in a redundantly operable industrial communication network , comprising:transmitting messages in a first subnetwork having a tree topology in accordance with a spanning tree protocol, communication devices associated with network nodes of the first subnetwork interchanging messages containing topology information with one another to form a tree topology, a root network node being determined as a basic element of the tree topology by the communication devices associated with the network nodes of the first subnetwork based on the interchanged topology information, and loop-free connections being set up from the root network node to remaining network nodes of the first subnetwork;transmitting messages in a second subnetwork in accordance with a parallel or ring redundancy protocol;coupling the first and second subnetworks to one another via a plurality of communication devices;configuring a virtual network node, which is connected to all network nodes of the second subnetwork via a respective virtual connection which cannot be interrupted by an error, as a root network node of the first subnetwork;configuring topology information for the first subnetwork, which ...

Подробнее
06-02-2014 дата публикации

DATA RECOVERY FOR FAILED MEMORY DEVICE OF MEMORY DEVICE ARRAY

Номер: US20140040661A1
Автор: Goel Atul
Принадлежит: NetApp Inc.

Some aspects of the disclosure relate to a data storage system that includes multiple memory device storage devices. If a memory device of a memory device array fails within a first data storage device, some portions of the lost or corrupted data from the failed memory device are recovered by reading them from a second data storage device. Other portions of the lost or corrupted data from the failed memory device are recovered from parity information in the first data storage device. 1. A method for recovering lost data in a data storage system , comprising:identifying a metadata unit comprising a logical address referencing one or more instances of a data block;responsive to identifying failure of a memory device resulting in a data loss of the data block, analyzing the logical address to determine an arrangement of a first copied instance of the data block within a data storage system;selectively retrieving a first portion of the data block, according to the arrangement, by reading the first copied instance of the data block from a second storage device within the data storage system;selectively recovering a second portion of the data block from parity information in a first data storage device comprising an original instance of the data block; andrecovering the data block based upon the first portion and the second portion.2. The method of claim 1 , the logical address referencing the original instance of the data block within the first storage device.3. The method of claim 1 , the logical address referencing the first copied instance of the data block within the second data storage device.4. The method of claim 1 , the metadata unit comprising a consistency point count corresponding to a checkpoint number at which an instance of the data block was written.5. The method of claim 1 , the metadata unit comprising a generation ID identifying a physical block associated with an instance of the data block.6. The method of claim 1 , the identifying comprising: ...

Подробнее
13-02-2014 дата публикации

Test Case Crash Recovery

Номер: US20140046615A1
Автор: Jerome Demay
Принадлежит: Texas Instruments Inc

A safe operating region of a complex integrated circuit may be determined by selecting an operating point for the integrated circuit (IC) at a first voltage and first frequency. A test program is executed by a central processing unit (CPU) comprised within the IC to test a portion of the IC. Communication activity between the IC and a host system is recorded to form a data log while the test program is being executed. A crash is detected by storing and examining the data log periodically, and assuming that the test program has crashed when any one of a predetermined set of crash conditions is detected during examination of the data log. The operating point may be iteratively changed and execution of the test program repeated while continuing to check for a crash until a crash is detected.

Подробнее
13-02-2014 дата публикации

Flexray network runtime error detection and containment

Номер: US20140047282A1
Принадлежит: NXP BV

A FlexRay network guardian including: a resetting leading coldstart node (RLCN) detector configured to detect a RLCN failure; a deaf coldstart node (DCN) detector configured to detect a DCN failure; a babbling idiot (BI) detector configured to detect a BI failure; and a FlexRay network decoder configured to output a signal regarding the status of the FlexRay network to the RLCN detector, DCN detector, and BI detector, wherein the RLCN detector, DCN detector, and BI detector are configured to send an indication of a failure to a containment module.

Подробнее
27-02-2014 дата публикации

INFORMATION PROCESSING APPARATUS AND ACTIVATION METHOD

Номер: US20140059335A1
Принадлежит:

An information processing apparatus manages activation of a program by a task which is a unit of execution, and executes a task for each sequence in units of process block. The information processing apparatus has a nonvolatile memory which keeps an execution state management table. The execution state of the process block is stored in the execution state management table. The control unit performs a first activation procedure which initializes the execution state management table and, while updating the execution state in the execution state management table, executes the task. When activation by the first activation procedure has failed, the control unit performs activation by a second activation procedure and identifies a suspicious sequence. When activation by the second activation procedure has failed, the control unit performs activation by a third activation procedure and identifies a suspicious task. 1. An information processing apparatus comprising:a nonvolatile memory configured to keep an execution state management table capable of storing execution states of process blocks which are divisions of each task and sorted according to sequences; andone or more processors configured to perform a procedure including:performing a first activation which initializes the execution state management table and, while storing the execution state for each of the process blocks in the execution state management table, executes the task for each of the sequences, and activates the information processing apparatus;performing, after activation of the information processing apparatus by the first activation has failed, a second activation which identifies a suspicious sequence having failed to activate the information processing apparatus based on the execution state management table and, while storing the execution state for each of the process blocks in the execution state management table, executes the process block for said each task in the suspicious sequence, and ...

Подробнее
27-02-2014 дата публикации

Ticket consolidation for multi-tiered applications

Номер: US20140059394A1
Принадлежит: International Business Machines Corp

Consolidating problem tickets for a multi-tiered application may comprise identifying a plurality of correlated virtual machines that are running one or more application components of the multi-tiered application. Problem reports may be identified that are generated by one or more of the plurality of correlated virtual machines and caused by a failure of a same single component of the multi-tiered application. The identified problem reports may be consolidated into a single ticket and placed into a ticket handling system.

Подробнее
06-03-2014 дата публикации

Systems and Methods for Automated Memory and Thread Execution Anomaly Detection in a Computer Network

Номер: US20140068326A1
Автор: Mitchell N. Quinn
Принадлежит: Triumfant Inc

Systems and methods are provided for detecting an anomaly in a computer that is part of a population of networked computers. Snapshots are received from a plurality of computers within the population of computers, where individual snapshots include a state of assets and runtime processes of a respective computer. An asset normalization model is generated from the snapshots and serves as a baseline model for detecting an anomaly in the state of assets and runtime processes of a respective computer. A snapshot from at least one of the computers is compared to the asset normalization model in order to determine whether an anomaly is present in a state of static assets and runtime processes of the at least one of the computers.

Подробнее
06-03-2014 дата публикации

Management system for managing computer system comprising multiple monitoring-target devices

Номер: US20140068343A1
Принадлежит: HITACHI LTD

A management system manages a computer system including multiple monitoring-target devices. A storage device of the management system stores a general rule, general plan information, unresolved information, and configuration information. A control device of the management system creates multiple expanded rules based on the general rule and the configuration information, and if an event related to any of the multiple monitoring-target devices has occurred, identifies, based on the multiple expanded rules, a first conclusion event constituting a candidate for the cause of the occurred event, creates, based on the general plan information, one or more expanded plans, which are recovery plans that can be implemented if the first conclusion event is a cause, identifies an unresolved event based on the unresolved information, identifies a risk site based on the identified unresolved event, and displays data showing the first conclusion event, expanded plan, and risk site.

Подробнее
20-03-2014 дата публикации

Managing Incident Reports

Номер: US20140081925A1
Принадлежит: Individual

The present disclosure describes methods, systems, and computer program products for managing incident reports can include receiving alert messages from multiple tenants and aggregating the alert messages into a reduced, correlated incident reports. For example, the method includes receiving, from a number of tenants, alert reports that represent at least one system alert incident associated with the tenants. The alert reports can be collected and analyzed for duplicate reports. The analysis for duplicate reports can include identifying a number of duplicate alert reports and correlating each identified duplicate alert reports into a correlated incident report. The correlated incident report can be aggregated into a summarized incident report for processing.

Подробнее
20-03-2014 дата публикации

Remediating events using behaviors

Номер: US20140082407A1
Принадлежит: International Business Machines Corp

Remediating events of components using behaviors via an administrator system and an administrator client. The administrator system receives an event from a component of an information technology (IT) environment. A behavior is determined at least partly from the event. The behavior is determined to be an anomalous behavior at least partly from a group of previously received events. A coefficient is calculated, via a calculation, for the anomalous behavior at least partly from a weight. The administrator system sends a description of the anomalous behavior and a group of options to the administrator client. The description is at least partly based on the calculation. The administrator system receives a severity indication from the administrator client. The weight, the calculation, and the description are updated based on the severity indication.

Подробнее
20-03-2014 дата публикации

AUTOMATED NODE FENCING INTEGRATED WITHIN A QUORUM SERVICE OF A CLUSTER INFRASTRUCTURE

Номер: US20140082409A1

A quorum service detects liveness failures of at least two failed nodes in a domain of a cluster infrastructure layer of a cluster environment within a limited time frame and adds the at least two failed nodes to a list of nodes set to pending to be fenced by a group leader node. The quorum service determines whether the at least two failed nodes include the group leader node. The quorum service, responsive to the at least two failed nodes not including the group leader node, triggers the group leader node to trigger at least one fencing operation to fence the at least two failed nodes in the list of nodes. The quorum service, responsive to the at least two failed nodes including the group leader node, sets a new node as the group leader node and triggers the new node set as the group leader node to trigger the at least one fencing operation to fence the at least two failed nodes in the list of nodes. 1. A method for managing quorum services in a cluster infrastructure for reliable failover of shared resources , comprising:responsive to detecting, using a processor, by a quorum service, a plurality of liveness failures of at least two failed nodes from among a plurality of nodes in a domain of a cluster infrastructure layer of a cluster environment within a limited time frame, adding the at least two failed nodes to a list of nodes set to pending to be fenced by a group leader node from among the plurality of nodes;determining, by the quorum service, whether the at least two failed nodes include the group leader node;responsive to the at least two failed nodes not including the group leader node, triggering, by the quorum service, the group leader node to trigger at least one fencing operation to fence the at least two failed nodes in the list of nodes; andresponsive to the at least two failed nodes including the group leader node, setting a new node as the group leader node and triggering, by the quorum service, the new node set as the group leader node to trigger ...

Подробнее
20-03-2014 дата публикации

Method and apparatus for cause analysis involving configuration changes

Номер: US20140082423A1
Принадлежит: HITACHI LTD

A technique determines which configuration change(s) caused an application invocation failure of a computer application without the need for a knowledge database. To determine which configuration change is the most likely cause, the cause analysis program checks other computers that have experienced the same configuration changes. The cause analysis program checks and counts the application invocation results before and after each configuration change is done. If the same configuration changes are found in the other computers, the program checks whether each configuration change caused or cured the same problem in that computer. The program counts the similar cases for all of the computers. Subsequently, the program calculates the ratio of those instances involving a change from success to failure and the ratio of those instances involving a change from failure to success out of all instances for each configuration change.

Подробнее
27-03-2014 дата публикации

Agent communication bulletin board

Номер: US20140089274A1
Принадлежит: International Business Machines Corp

A data communication system comprising a first plurality of software entities, each having a respective entity identifier and a respective plurality of characteristics, and a data repository, wherein a first software entity of the first plurality of software entities instigates establishment of a first collection of data at the data repository, the first collection of data having at least one collection identifier selected from the plurality of characteristics of the first software entity, each of a second plurality of the first plurality of software entities having a respective set of the respective plurality of characteristics that matches the at least one collection identifier instigates addition of the entity identifier of the respective software entity to the first collection of data, at least one of the second plurality of software entities instigates addition of data to the first collection of data, and at least one other of the second plurality of software entities obtains a portion of the data from the first collection of data.

Подробнее
05-01-2017 дата публикации

INFORMATION PROCESSING SYSTEM, SERVER DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT

Номер: US20170004029A1
Автор: Endo Kotaro
Принадлежит:

An information processing system includes a first determining unit, a second determining unit, and a processing unit. The first determining unit determines a result indicating a second fixed state for data when a first condition is satisfied, the first condition indicating that t2 or more results of a first recommended state or a first fixed state are selected for the same data. The second determining unit determines the result indicating the first fixed state for the data when a second condition is satisfied, the second condition indicating that ti or more results indicating the second fixed state are selected for the same data. The second determining unit also determines the result indicating the first recommended state for the data when a third condition is satisfied, the third condition indicating that (b+1) or more results indicating the second fixed state are selected for the same data. 1Byzantine. An information processing system including n or more server devices (n is an integer satisfying n>2f+3b where f is an integer of 0 or larger and indicates a maximum permissible number of node faults , and b is an integer of 1 or larger and indicates a maximum permissible number of faults) , the information processing system comprising:a receiving unit configured to receive a selection result selected for data, the selection result indicating any one of a first fixed state, a first recommended state, and a second fixed state;a first determining unit configured to perform first determination processing for determining the selection result indicating the second fixed state for the data when a first condition is satisfied, the first condition indicating that t2 or more selection results indicating the first recommended state or the first fixed state are selected for the same data (t2 is an integer satisfying (n+b)/2 Подробнее

05-01-2017 дата публикации

Error and solution tracking in a software development environment

Номер: US20170004065A1
Принадлежит: International Business Machines Corp

In an approach for error and solution tracking a processor identifies that a first occurrence of a first error is present in code. A processor tracks a first set of actions made to the code which affect the first occurrence of the first error. A processor determines that the first occurrence of the first error has been resolved. A processor records the first error and the first set of actions to the code. A processor identifies that a second occurrence of the first error is present in the code. A processor determines that the first error has previously occurred. A processor retrieves the first set of actions. A processor causes the first set of actions to be made to the code to affect the second occurrence of the first error.

Подробнее
07-01-2016 дата публикации

SYSTEM FOR PROJECT MANAGEMENT FROM NON-FUNCTION EVALUATION, METHOD FOR PROJECT MANAGEMENT FROM NON-FUNCTION EVALUATION, AND PROGRAM FOR PROJECT MANAGEMENT FROM NON-FUNCTION EVALUATION

Номер: US20160004583A1
Автор: Sakaki Hiroshi
Принадлежит: NEC Corporation

Provided is a progress management technique for a project, the technique also covering a non-functional requirement of the project. A parameter required for evaluating the non-functional requirement is adjusted according to the progress of the project, and calculation is made, using the adjusted parameter, on to which extent the non-functional requirement may finally differ from a target value. 1. A project management system comprising:a storage unit configured to store information of error that may be generated between a non-functional evaluation value of a system in an unfinished stage and a non-functional requirement of the finished system, as evaluation error information with respect to each degree of progress of the project;a system model acquisition unit configured to acquire a system model of the system;a non-functional requirement acquisition unit configured to acquire the non-functional requirement of the system;a progress input unit configured to input the degree of progress of the project;a non-functional evaluation parameter input unit configured to input a non-functional evaluation parameter of the system corresponding to the degree of progress input;a non-functional evaluation parameter adjustment unit configured to adjust the input non-functional evaluation parameter with the stored evaluation error information corresponding to the input degree of progress; anda non-functional evaluation unit configured to evaluate a non-functional factor of the system at the input degree of progress based on the adjusted non-functional evaluation parameter, the acquired system model and the acquired non-functional requirement.2. The project management system according to claim 1 , whereinthe non-functional evaluation unit further configured to evaluate the non-functional factor of the system at the input degree of progress using the unadjusted non-functional evaluation parameter and the acquired system model and the non-functional requirement, and outputs a plurality ...

Подробнее
07-01-2016 дата публикации

METHOD AND COMPUTER SYSTEM TO ALLOCATE ACTUAL MEMORY AREA FROM STORAGE POOL TO VIRTUAL VOLUME

Номер: US20160004584A1
Принадлежит: Hitachi, Ltd.

An exemplary event analysis method generates a topology, indicating a correlation between management objects corresponding to a correlation between events defined in selected event propagation model, from configuration management information. It generates, from the selected event propagation model and the topology, a causality indicating a correlation between the causal event identifying an identifier of the management object and the type of the event, and the derivative event sequentially taking place from the causal event. It, in generating the causality, identifies the type of the management object where the derivative event takes place and the type of the event, without identifying the identifier of the management object where the derivative event takes place, when the topology for identifying the identifier of the derivative event is ungeneratable. It performs an event analysis by comparing the generated causality and the event actually taking place at the management target apparatuses. 1. A management system arranged to mange a plurality of management target apparatuses and including a computation resource and a storage resource ,wherein the storage resource includes configuration management information arranged to store configuration information related to a plurality of management objects including the plurality of management target apparatuses and a plurality of components arranged at the plurality of management target apparatuses, andwherein the storage resource includes event propagation model management information arranged to store an event propagation model indicating, using a type of the management object and a type of an event, a correlation between a causal event and a derivative event taking place in a sequential manner from the causal event,wherein the computation resource selects the event propagation model from the event propagation model management information,wherein the computation resource generates a topology, indicating a correlation ...

Подробнее
04-01-2018 дата публикации

Electronic device and remote control system

Номер: US20180004423A1
Автор: Shunsuke Saito

A computer includes an SMS module that communicates with a management server apparatus via a network, a display that displays predetermined information, and a CPU that controls an operation of the display. When the SMS module receives a control command from the management server apparatus via the network, the CPU executes processing corresponding to the control command. Furthermore, the CPU transmits a notification signal including information, which indicates a state of execution of the control program, to the management server apparatus via the network. Furthermore, the CPU displays, on the display, a state indicator including information which indicates a state of execution of the control program when the notification signal cannot be transmitted to the management server apparatus via the network.

Подробнее
04-01-2018 дата публикации

TROUBLESHOOTING METHOD BASED ON NETWORK FUNCTION VIRTUALIZATION, AND DEVICE

Номер: US20180004589A1
Автор: LIU Jianning
Принадлежит: HUAWEI TECHNOLOGIES CO., LTD.

A troubleshooting method based on network function virtualization is provided, where the troubleshooting method may include: obtaining, by a first function management entity, fault information of a function entity; triggering, by the first function management entity, fault correlation processing according to the fault information, and formulating a troubleshooting policy according to a result of the fault correlation processing; and if the troubleshooting policy is formulated when troubleshooting time arrives, processing, by the first function management entity, a fault according to the troubleshooting policy; or if the troubleshooting policy is not formulated, processing, by the first function management entity, a fault according to a preset troubleshooting policy, where the preset troubleshooting policy is a policy formulated for a fault generated due to a reason of the function entity, so as to ensure that a service is not interrupted in a troubleshooting process, so that user experience is improved. 1. A troubleshooting method based on network function virtualization , comprising:obtaining, by a first function management entity, fault information of a function entity;triggering, by the first function management entity, fault correlation processing according to the fault information, and formulating a troubleshooting policy according to a result of the fault correlation processing; andif the troubleshooting policy is formulated when troubleshooting time arrives, processing, by the first function management entity, a fault according to the troubleshooting policy; or if the troubleshooting policy is not formulated, processing, by the first function management entity, a fault according to a preset troubleshooting policy, wherein the preset troubleshooting policy is a policy formulated for a fault generated due to a reason of the function entity.2. The method according to claim 1 , wherein:the triggering fault correlation processing and formulating a troubleshooting ...

Подробнее
04-01-2018 дата публикации

FAILURE NOTIFICATIONS IN MULTI-NODE CLUSTERS

Номер: US20180004590A1
Принадлежит:

Examples include a system comprising a non-volatile memory, a cluster management interface, and a multi-node cluster. In some examples, the cluster management interface may monitor a system critical alert to determine if the system critical alert has been triggered. Based on the determination that it has been triggered, the cluster management interface may multicast a system failure notification. The multi-node cluster of the system has multiple nodes, each node connected to the non-volatile memory and having a processor and a processor cache. Each node of the multi-node cluster may determine if the system failure notification has been received and based on the determination that it has been received, each node may freeze execution of all processes on the process and flush the processor cache to the non-volatile memory. 1. A system comprising:a non-volatile memory;a cluster management interface to monitor a system critical alert to determine if the system critical alert has been triggered and based on a determination that the system critical alert has been triggered, multicast a system failure notification;a multi-node cluster having multiple nodes, wherein each node of the multi-node cluster is connected to the non-volatile memory and includes a processor and a processor cache and wherein each node determines if the system failure notification has been received from the cluster management interface and based on the determination that the system failure notification has been received, freezes execution of all processes on the processor.2. The system of claim 1 , wherein each node of the multi-node cluster further:based on the determination that the system failure notification has been received, flushes the processor cache to the non-volatile memory.determines if the node is in failure; and multicasts an outgoing node failure notification to each node of the multi-node cluster,', 'freezes all processes on the node, and', 'flushes the processor cache to the non- ...

Подробнее
07-01-2021 дата публикации

DATA PROCESSING

Номер: US20210004286A1
Принадлежит:

Provided are a data processing method and an apparatus thereof. The method includes: when data writing is to be performed for a target Trunk Group (TKG), determining whether the target TKG is available (S); when the target TKG is available, performing data writing for the target TKG (S); and, when the target TKG is unavailable, repairing the target TKG, and performing data writing for the repaired target TKG (S). 1. A data processing method , comprising:when data writing is to be performed for a target Trunk Group (TKG), determining whether the target TKG is available, wherein in an initial state, one TKG comprises N Trunks for storing raw data and M Trunks for storing check data, any M Trunks in the N+M Trunks belong to at least K storage nodes, where N≥M, N>1, and 0≤K≤M;when the target TKG is available, performing data writing for the target TKG; andwhen the target TKG is unavailable, repairing the target TKG, and performing data writing for the repaired target TKG.2. The method according to claim 1 , wherein repairing the target TKG comprises:determining whether a first repair scheme by which the target TKG is repaired to have N+M available Trunks with any M Trunks belonging to the at least K storage nodes exists according to available Trunk resources; andwhen the first repair scheme exists, repairing the target TKG according to the first repair scheme.3. The method according to claim 2 , wherein repairing the target TKG further comprises:when the first repair scheme does not exist and K>0, letting K=K−1 and repeating the above determining block until it is determined that the first repair scheme exists or K=0; andwhen K=0, determining whether a second repair scheme by which the target TKG is repaired to have N+M available Trunks exists according to the available Trunk resources;when the second repair scheme exists, repairing the target TKG according to the second repair scheme; andwhen the second repair scheme does not exist and M>0, letting M=M−1, and ...

Подробнее
04-01-2018 дата публикации

Application aware input/output fencing

Номер: US20180004612A1
Автор: Abhijit Toley, Jai Gahlot
Принадлежит: Veritas Technologies LLC

Disclosed herein are methods, systems, and processes to perform application aware input/output (I/O) fencing operations. Performing such an application aware I/O fencing operation includes installing an identifier that identifies an instance of an application with a node on which the instance of the application is executing, on coordination points. A weight assigned to the instance of the application is determined, and the instance of the application is terminated based on the weight.

Подробнее
04-01-2018 дата публикации

FAILURE DETECTION VIA IMPLICIT LEASES IN DISTRIBUTED COMPUTING SYSTEMS

Номер: US20180004614A1
Автор: Lu Xun
Принадлежит:

Failure detection techniques in distributed computing systems are disclosed herein. In one embodiment, a method includes receiving an arbitration request from a first node in a computing system having a plurality of nodes interconnected by a computer network. Each of the nodes has a logic relationship with another node in the computing system. The arbitration request indicates that the first node is unable to establish a lease with a second node for a predetermined threshold period. The second node is logically related to the first node according to the logic relationship and is a default monitor for the first node for the lease. The method also includes in response to receiving the arbitration request from the first node, providing a neutral arbitration result to the first node, and allowing the first node to continue to operate without causing the second node to terminate itself. 1. A computing device , comprising:a processor; and receiving an arbitration request from a first node in a computing system having a plurality of nodes interconnected by a computer network, each of the nodes having a logic relationship with another node in the computing system, the arbitration request indicating that the first node is unable to establish a lease with a second node for a predetermined threshold period, wherein the second node is logically related to the first node according to the logic relationship and is a default monitor for the first node for the lease; and', 'in response to receiving the arbitration request from the first node, providing a neutral arbitration result to the first node within an arbitration timeout period, the neutral arbitration result allowing the first node to continue to operate without causing the second node to terminate itself., 'a memory containing instructions executable by the processor to cause the processor to perform a process including2. The computing device of wherein:the arbitration request is a first arbitration request; receiving a ...

Подробнее
13-01-2022 дата публикации

CREATING ROBUSTNESS SCORES FOR SELECTED PORTIONS OF A COMPUTING INFRASTRUCTURE

Номер: US20220012112A1
Принадлежит: Intel Corporation

A system for generating a robustness score for hardware components, nodes, and clusters of nodes in a computing infrastructure is provided. The system includes a memory and at least one processing device coupled to the memory. The processing device is to obtain first telemetry data associated with a selected portion of a computing infrastructure, and the selected portion includes a first node and a first hardware component. The processing device is further to obtain first metadata associated with the selected portion, input one or more telemetry inputs corresponding to the first telemetry data into a machine learning model, input one or more metadata inputs corresponding to the first metadata into the machine learning model, and generate, from the machine learning model, a first robustness score for the first hardware component representing a health state of the first hardware component. 1. One or more machine readable storage media comprising instructions stored thereon , the instructions when executed by a machine , cause the machine to:obtain first telemetry data associated with a selected portion of a computing infrastructure, the selected portion including a first node and a first hardware component;obtain first metadata associated with the selected portion;input one or more telemetry inputs corresponding to the first telemetry data into a machine learning model;input one or more metadata inputs corresponding to the first metadata into the machine learning model; andgenerate, from the machine learning model, a first robustness score for the first hardware component representing a health state of the first hardware component.2. The one or more machine readable storage media of claim 1 , wherein a first telemetry data input and a first metadata input are associated with the first hardware component.3. The one or more machine readable storage media of claim 1 , wherein a second telemetry data input and a second metadata input are associated with the first node.4. ...

Подробнее
03-01-2019 дата публикации

Modularized Collaborative Performance Issue Diagnostic System

Номер: US20190004884A1
Принадлежит: Microsoft Technology Licensing, LLC

A collaborative diagnostic system monitors events in a system and identifies a causality chain from a detected performance issue to the root cause of that performance issue. The collaborative diagnostic system includes multiple issue detectors, multiple analysis core modules, and multiple scenario modules that work together to identify the causality chain and root cause. Each issue detector is a module or component that includes logic to detect known behaviors in the system, such as performance issues in the system. Each analysis core module includes logic to analyze and correlate low level system behavior within a conceptual area. Within each analysis core module are one or more diagnostic modules that are specific to that analysis core module to help determine what is happening in the system. Each scenario module includes logic to take an appropriate responsive action in response to the root cause of a performance issue being determined. 1. A method comprising:detecting, by each of multiple issue detectors in a system, one or more performance issues in the system;analyzing, by one or more analysis core modules in the system, system behavior to determine root causes for the one or more performance issues, each of the one or more analysis core modules receiving, in response to one of the multiple issue detectors detecting a performance issue in the system, a query regarding the detected performance issue; andtaking, by a first scenario module of multiple scenario modules in the system, the first scenario module being associated with a root cause for the detected performance issue, a responsive action in response to the root cause for the detected performance issue being determined by the multiple analysis modules.2. The method as recited in claim 1 , the taking the responsive action comprising presenting an indication of the root cause of the detected performance issue.32. The method as recited in claim claim 1 , claim 1 , the taking the responsive action further ...

Подробнее
03-01-2019 дата публикации

REMOTE DEBUG FOR SCALED COMPUTING ENVIRONMENTS

Номер: US20190004887A1
Принадлежит: Intel Corporation

Techniques and apparatus for remotely accessing debugging resources of a target system are described. A target system including physical compute resources, such as, processors and a chipset can be coupled to a controller remotely accessible over a network. The controller can be arranged to facilitate remote access to debug resources of the physical compute resources. The controller can be coupled to debug pin, such as, those of a debug port and arranged to assert control signals on the pins to access debug resources. The controller can also be arranged to exchange information elements with a remote debug host to include indication of debug operations and/or debug results. 1. An apparatus , comprising:a processor comprising a debug circuit; and receive, over a network, an information element including an indication of a debug operation; and', 'send a control signal to the debug circuit of the processor including an indication to implement the debug operation., 'a management controller coupled to the debug circuit of the processor, the management controller comprising logic, at least a portion of which is implemented in hardware, the logic to2. The apparatus of claim 1 , the management controller comprising logic to:receive a control signal from the debug circuit including an indication of a debug result; andsend, via the network, an information element including an indication of the debug result.3. The apparatus of claim 1 , the management controller comprising a baseboard management controller (BMC).4. The apparatus of claim 1 , comprising a chipset comprising a debug circuit claim 1 , the management controller coupled to the debug circuit of the chipset and comprising logic to:send a control signal to the debug circuit of the chipset including an indication to implement the debug operation;receive a control signal from the debug circuit of the chipset including an indication of a debug result; andsend, via the network, an information element including an indication ...

Подробнее
03-01-2019 дата публикации

DRIVE-BASED STORAGE SCRUBBING

Номер: US20190004888A1
Принадлежит:

Apparatuses, systems and methods are disclosed herein that generally relate to distributed storage, such as for big data, distributed databases, large datasets, artificial intelligence, genomics, or any other data processing environment using that host large data sets or utilize big data hosts using local storage or storage remotely located over a network. More particularly since large scale data requires many storage devices, scrubbing storage for reliability and accuracy requires communication bandwidth and processor resources. Discussed are various ways to use known storage structure, such as LBA, to offload scrubbing overhead to storage by having storage engage in autonomous self-validation. Storage may scrub itself and identify stored data failing data integrity validation, or identify unreadable storage locations, and report errors to a distributed storage system that may reverse-lookup the affected storage location to identify, for example, a data block at that location needing correction. 1. A nonvolatile memory (NVM) communicatively coupled to a distributed storage service (DSS) , the DSS having a scrubber to validate data stored by the DSS on the nonvolatile memory , comprising:a first background task to review NVM operation to identify a first potential error; anda second background task operable to read a block of data from the NVM having a first portion containing data and a second portion containing validation information for the data, determine a reference validation for the data, and compare the reference validation to the second portion to identify a second potential error;wherein the first and second potential errors are selectively reported to the scrubber.2. The NVM of claim 1 , wherein the NVM has a format having a known validation function claim 1 , and wherein the determine the reference validation for the data is based at least in part on applying the validation function to the data of the first portion.3. The NVM of claim 1 , wherein the NVM ...

Подробнее
03-01-2019 дата публикации

PREVENTING SOFTWARE COMPONENT TIMER PROCESSING ISSUES

Номер: US20190004889A1
Принадлежит:

Method and system are provided for preventing local processing problems interfering with a time-sensitive validation process. The method monitors an elapsed time of an instance of a time-sensitive validation process of a software component including dispatching of the process instance and determines if the elapsed time is significantly greater than a preset processing time. If so, the method may dynamically alter error processing of the time-sensitive validation process of the software component. 1. A computer-implemented method for preventing local processing problems interfering with a time-sensitive validation process comprising:monitoring an elapsed time of a process instance of a time-sensitive validation process of a software component including dispatching of the process instance and determining if the elapsed time is significantly greater than a preset processing time; anddynamically altering error processing of the time-sensitive validation process of the software component.2. The method of claim 1 , further comprising:determining that a signal has been received in the preset processing time indicating that the time-sensitive validation process has executed correctly; andexiting the time-sensitive validation process.3. The method of claim 1 , further comprising:in response to determining that the elapsed time is not significantly greater than the preset processing time and a signal has not been received in the preset processing time indicating that the time-sensitive validation process has executed correctly, initiating a normal error processing logic for the time-sensitive validation process.4. The method of claim 1 , wherein the time-sensitive validation process includes a request and response communication with an external system.5. The method of claim 1 , wherein monitoring the elapsed time records a start time prior to initiating the instance of a time-sensitive validation process and records an end time when prompted by the end of the preset ...

Подробнее
03-01-2019 дата публикации

METHOD AND SYSTEM FOR HANDLING ONE OR MORE ISSUES IN A COMPUTING ENVIRONMENT

Номер: US20190004890A1
Принадлежит:

Disclosed herein is method and system for handling issues in a computing environment. An issue template is generated by mapping problem statements of the issues with system log information of the computing environment. Critical features in the issue templates are determined based on natural language analysis of the issue templates and predetermined parameters associated with the issues. Further, one or more clusters of issues are created based on semantic similarity analysis of the critical features, and finally, a correlation map of various clusters is created to dynamically identify issue resolution scripts required for handling the issues. The present method facilitates automated mapping of an issue to corresponding problem statements and action scripts, thereby eliminating manual intervention associated with classifying and handling of the issues in the computing environment. 1103100. A method for handling one or more issues () in a computing environment () , the method comprising:{'b': 101', '104', '103, 'identifying, by an issue handling system (), a problem statement () associated with the one or more issues () from one or more tickets;'}{'b': 101', '107', '103', '106', '100, 'extracting, by the issue handling system (), system log information (), related to the one or more issues (), from a system logger () associated with the computing environment ();'}{'b': 101', '109', '104', '103', '107, 'generating, by the issue handling system (), one or more issue templates () by mapping the problem statement () of each of the one or more issues () with corresponding system log information ();'}{'b': 101', '110', '109', '211, 'determining, by the issue handling system (), one or more critical features () in each of the one or more issue templates () based on one or more Natural Language Processing (NLP) components and predetermined issue parameters ();'}{'b': 101', '114', '110', '112', '103, 'creating, by the issue handling system (), one or more clusters of issues () ...

Подробнее
03-01-2019 дата публикации

SYSTEMS AND METHODS FOR REDUCING WRITE LATENCY

Номер: US20190004979A1
Принадлежит:

A computer system having reduced write latency and methods for use in computer systems for reducing write latency are provided. Processing circuitry of the computer system is configured to execute a volume filter driver (VFD) that can be switched between a fast termination (FT) mode of operations and a normal, or quiescent, mode of operations. When the processing circuitry receives input/output (IO) write requests to write data to memory while the VFD is in the FT mode of operations, the VFD causes metadata associated with received IO write requests to be written to a volume of memory while preventing actual data associated with received IO write requests from being written to the volume, thereby resulting in extremely fast FT mode operation. After the file has been written to the volume, the VFD enters the quiescent mode of operations during which the VFD passes all IO write requests to the volume. 1. A computer system that reduces an amount of time that is required to write data to memory , the computer system comprising:memory; andprocessing circuitry configured to execute a volume filter driver (VFD), wherein when the processing circuitry receives input/output (IO) requests to write data associated with a file to the memory while the VFD is in a fast termination (FT) mode of operations, the VFD causes metadata associated with received IO write requests to be written to a volume of the memory while preventing actual data associated with received IO write requests from being written to the volume of the memory, and wherein after the FT mode of operations is terminated, the VFD enters a quiescent mode of operations during which the VFD passes all IO write requests to the volume, thereby allowing actual data associated with the file to be written to the volume.2. The computer system of claim 1 , wherein the VFD runs in a kernel of a Windows operating system that is executed by the processing circuitry.3. The computer system of claim 1 , wherein the VFD is executed ...

Подробнее
02-01-2020 дата публикации

AUTO-TUNE ANOMALY DETECTION

Номер: US20200005193A1
Автор: Li Baolei, Nie Kexin, Yang Yang
Принадлежит:

Techniques for auto-tuning anomaly detection are provided. In one technique, training data is stored that comprises training instances, each of which comprises a severity-duration pair and a label that indicates whether the severity-duration pair represents an anomaly. A model is trained based on a first subset of the training data. A second subset of the training data is identified where each training instance includes a positive label that indicates that that training instance represents an anomaly. Based on the second subset of the training data, the model generates multiple scores, each of which corresponds to a different training instance. A minimum score is identified that ensures a particular recall rate of the model. In response to receiving a particular severity-duration pair, the model generates a particular score for the particular severity-duration pair. A notification of an anomaly is generated if the particular score is greater than the minimum score. 1. A method comprising:storing training data that comprises a plurality of training instances, each of which comprises a severity-duration pair and a label that indicates whether the severity-duration pair represents an anomaly;using one or more machine learning techniques to train a model based on a first subset of the training data;identifying a second subset of the training data, wherein each training instance in the second subset includes a positive label that indicates that said each training instance represents an anomaly;based on the second subset of the training data, generating, using the model, a plurality of scores, wherein each score corresponds to a different training instance in the second subset;identifying a minimum score of the plurality of scores that ensures a particular recall rate relative to training instances in the second subset;in response to receiving a particular severity-duration pair, using the model to generate a particular score for the particular severity-duration pair; ...

Подробнее
04-01-2018 дата публикации

Proactive customer support system

Номер: US20180005246A1
Автор: Dileep Kumar Basam
Принадлежит: eBay Inc

In various example embodiments, a system and method for a proactive customer support system are provided. In some example embodiments, outgoing communications from an application server to a client device are monitored for error messages, outgoing error messages are detected, an error type for an error message is determined, an issue ticket including the error message and the error type is generated, and instructions are transmitted that cause a customer service device to display the issue ticket. In some example embodiments, the system additionally assigns a priority score and ranks open error tickets based on their respective error messages. In some example embodiments, the system provides a help message to the client device based on the error message, receives an information request from the client device, determines a reply message based on the information request, and transmits instructions to the client device to display the reply message.

Подробнее
01-01-2015 дата публикации

Frequency signal generator, a frequency modulated continuous wave radar system and a method for generating a frequency signal

Номер: US20150007002A1
Принадлежит:

A frequency signal generator includes a controllable oscillator unit, a frequency control unit and an error detection unit. The controllable oscillator unit generates and provides a frequency signal. The frequency control unit generates a frequency control signal and the controllable oscillator unit varies a frequency of the frequency signal based on the frequency control signal. Further, the error detection unit receives the frequency control signal, detects an error within the frequency control signal and provides an error signal. The error signal comprises information on a detected error. 1. A frequency signal generator comprising:a controllable oscillator unit configured to generate and provide a frequency signal;a frequency control unit configured to generate a frequency control signal, wherein the controllable oscillator unit is configured to vary a frequency of the frequency signal based on the frequency control signal; andan error detection unit configured to receive the frequency control signal, detect an error within the frequency control signal and provide an error signal, wherein the error signal comprises information on a detected error.2. The frequency signal generator according to claim 1 , wherein the error detection unit comprises a comparison unit configured to compare the frequency control signal or comparison information derived from the frequency control signal with a reference comparison signal or reference comparison information.3. The frequency signal generator according to claim 2 , wherein the error detection unit comprises a hash value generator configured to generate the comparison information by determining characteristic hash values based on the frequency control signal.4. The frequency signal generator according to claim 3 , wherein the hash value generator is configured to determine the characteristic hash values based on a cyclic redundancy check algorithm.5. The frequency signal generator according to claim 3 , wherein the ...

Подробнее
04-01-2018 дата публикации

Application aware input/output fencing

Номер: US20180007129A1
Автор: Abhijit Toley, Jai Gahlot
Принадлежит: Veritas Technologies LLC

Disclosed herein are methods, systems, and processes to perform application aware input/output (I/O) fencing operations. A determination is made that an instance of an application is executing on a node that is part of a cluster. In response to the determination that the instance of the application is executing on the node, an identifier that associates the instance of the application and the node on which the instance of the application is executing is generated for the instance of the application. The identifier is installed on one or more coordination points.

Подробнее
02-01-2020 дата публикации

PREDICTING COMPUTER NETWORK EQUIPMENT FAILURE

Номер: US20200007381A1
Принадлежит:

A network monitor may receive network log events and identify: a first set of network devices that have reported a target network log event, a second set of network devices that have not reported the target network log event, a first set of network log events reported by the first set of network devices, and a second set of network log events reported by the second set of network devices. The network monitor may determine which network log events are legitimate, and filter the legitimate network log events from the first set of network log events or the second set of network log events to produce a group of suspicious network log events that may be correlated with the target network log event. The network monitor may predict future suspicious network log events that may be correlated with the target network log event in order to predict equipment failures. 1. A computer-implemented method comprising:producing a first group of suspicious network log events that may be correlated with a target network log event, wherein the first group of suspicious network log events corresponds to a first product family;identifying a second group of suspicious network log events that may be correlated with the target network log event, wherein the second group of suspicious network log events corresponds to a second product family; andanalyzing the first group of suspicious network log events and the second group of suspicious network log events to identify a pattern relating to the target network log event across the first product family and the second product family.2. The method of claim 1 , wherein analyzing the first group of suspicious network log events and the second group of suspicious network log events includes:analyzing network log events of the first group of suspicious network log events and the second group of suspicious network log events that occurred within a first amount of time before the target network log event or a second amount of time after the target ...

Подробнее
20-01-2022 дата публикации

Dynamically creating a contact address to customer support based on information associated with a computing device

Номер: US20220019498A1
Принадлежит: Dell Products LP

In some examples, a computing device may determine that an issue (e.g., crash, restart etc.) occurred, gather context data (e.g., logs, device profile, etc.) associated with the issue, and generate a contact address to technical support based on the context data. The computing device may upload the context data to a location accessible to a server. After a user of the computing device initiates a communication to technical support using the contact address, the server may automatically route the call, based on the contact address, to a particular technician that has experience addressing the issue. The server may retrieve the context data and use machine learning to determine recommendations to address the issue. The machine learning may prioritize the recommendations and provide the context data and the prioritized recommendations to enable the particular technician to quickly resolve the issue.

Подробнее
03-01-2019 дата публикации

INSIDER ATTACK RESISTANT SYSTEM AND METHOD FOR CLOUD SERVICES INTEGRITY CHECKING

Номер: US20190007431A1
Принадлежит: AT&T Intellectual Property I, L.P.

An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred. 1. A system , comprising:a memory that stores instructions; and executing, during a first mode, a set of operations associated with a service to check an integrity of the service, wherein the set of operations are executed based on a minimum level of access to a peripheral that is required for at least one operation in the set of operations to be executed, wherein the minimum level of access is established by suspending access to a network port;', 'executing, when the system is in a second mode, the set of operations associated with the service based on a full level of access to the peripheral; and', 'determining whether a failure of the at least one operation in the set of operations has occurred., 'a processor that executes the instructions to perform operations, the operations comprising2. The system of claim 1 , wherein the operations further comprise determining claim 1 , if the failure of the at least one operation in the set of operations has occurred claim 1 , that a change in a system behavior associated with the service has occurred.3. The system of claim 2 , wherein the ...

Подробнее
27-01-2022 дата публикации

Predicting Equipment Fail Mode from Process Trace

Номер: US20220027230A1
Принадлежит: PDF Solutions, Inc.

A predictive model for equipment fail modes. An anomaly is detected in a collection of trace data, then key features are calculated. A search is conducted for the same or similar anomalies having the same key features in a database of past trace data. If the same anomaly occurred before and is in the database, then the type of anomaly, its root cause, and action steps to correct can be retrieved from the database. 1. A method , comprising:receiving a plurality of traces from a plurality of semiconductor equipment sensors during a plurality of steps in a semiconductor process;comparing a plurality of features corresponding to a first anomalous pattern detected in the plurality of traces with a plurality of prior anomalous patterns having features associated therewith and stored in a database of past trace data;determining that the features of the first anomalous pattern match the features of at least one of the plurality of prior anomalous patterns;retrieving a root cause for the matched prior anomalous pattern from the database; andtaking an action to correct the root cause.2. The method of claim 1 , further comprising:retrieving a corrective action for the root cause from the database.3. The method of claim 1 , wherein the determining step further comprises:determining a likelihood that the feature of the first anomalous pattern match at least one of the plurality of prior anomalous patterns; andretrieving the root cause if the likelihood exceeds a threshold.4. The method of claim 3 , wherein the step of retrieving a root cause further comprises:retrieving a corrective action for the root cause from the database.5. The method of claim 1 , the comparing step further comprising:defining a window containing a portion of the plurality of current traces including the first anomalous pattern;calculating statistics on the portion of the current trace data in the window; andbased on the calculated statistics, identifying the first anomalous pattern in at least a first one ...

Подробнее
12-01-2017 дата публикации

DYNAMIC POWER SUPPLY MANAGEMENT

Номер: US20170010652A1
Принадлежит:

In some implementations, a rack management controller can dynamically manage power supply units in a server rack system. For example, the rack management controller can determine how many power supply units should be powered on based on the power requirements of the server rack system. The management controller can configure a power management controller to turn on the determined number of power supply units. The rack management controller can receive status signals from the power supply units in the server rack. The rack management controller can detect when a power supply unit fails based on the status signals. The rack management controller can dynamically reconfigure the power management controller to replace the failed power supply unit by turning on a reserved power supply unit. 1. A method comprising: determining, by the controller, a total number of power supply units coupled to the server rack system;', 'calculating a minimum threshold number of power supply units capable of providing the minimum amount of power;', 'determining a power supply unit configuration based on the threshold number; and', 'sending the power supply unit configuration to a power management controller, wherein the power management controller determines which power supply units to turn on based on the power supply unit configuration., 'determining, by a controller in a server rack system, a minimum amount of power for operating the server rack system;'}2. The method of claim 1 , further comprising:receiving status signals from one or more power supply units; 'in response to detecting the failure, reconfiguring the power supply units coupled to the server rack system.', 'based on the status signals, detecting that at least one power supply unit has failed; and'}3. The method of claim 1 , wherein the power supply unit configuration identifies how many power supply units to power on and how many power supply units to power off.4. The method of claim 1 , wherein the power supply unit ...

Подробнее
08-01-2015 дата публикации

Intelligent diagnostic system and method of use

Номер: US20150012232A1
Принадлежит: Oceaneering International Inc

A diagnostic system may utilize telemetry from a monitored system to infer information about the operation of various components systems within the monitored system. In embodiments, inferences may be drawn from a comparison of various component systems using a system of implication and exoneration. Exoneration is utilized to isolate faulty components from functioning components by comparing information between the systems, which may run in parallel. A dynamic grouping algorithm may eventually isolate faulty components and suggest the root cause as well as multiple distinct faults.

Подробнее
12-01-2017 дата публикации

COMMUNICATION SYSTEM AND COMMUNICATION METHOD

Номер: US20170010932A1
Принадлежит: KABUSHIKI KAISHA TOSHIBA

A communication system includes a plurality of communication devices that transmits shared data in turn through wireless communication. Each of the communication devices includes a shared memory, a transmission processor, a reception processor, and a data comparator. The shared memory is capable of storing shared data for each of the communication devices. The transmission processor transmits the shared data of the communication device stored in the shared memory to a second communication device as another communication device. The reception processor monitors data as the shared data received by the second communication device from the communication device and transferred to a third communication device as another communication device other than the second communication device, and receives the data as monitored data. The data comparator compares the received monitored data with the data previously transmitted to the second communication device. 1. A communication system comprising: a shared memory that is capable of storing shared data for each of the communication devices;', 'a transmission processor that transmits the shared data of the communication device stored in the shared memory to a second communication device as another communication device;', 'a reception processor that monitors data as the shared data received by the second communication device from the communication device and transferred to a third communication device as another communication device other than the second communication device, and that receives the data as monitored data; and', 'a data comparator that compares the received monitored data with the data previously transmitted to the second communication device., 'a plurality of communication devices that transmits shared data in turn through wireless communication, each of the communication devices comprising2. The communication system according to claim 1 , wherein the data comparator compares the received monitored data with the ...

Подробнее
12-01-2017 дата публикации

DUMPING RESOURCES

Номер: US20170010935A1
Автор: Vaden Thomas L.
Принадлежит:

Dumping resources can include identifying a resource associated with a computing device, dumping the resource associated with the computing device, determining whether the resource has changed since the resource has been dumped, and dumping the resource, prior to a crash of the computing device occurring, when the resource has changed since the last dump. 1. A system , comprising:an identification engine to identify a resource associated with a computing device;a dumping engine to dump the resource associated with the computing device;a determination engine to determine whether the dumped resource has changed since the resource has been dumped; andthe dumping engine to dump the resource, prior to a crash of the computing device occurring, in response to the resource having changed since the last dump.2. The system of claim 1 , wherein the resource is system state information associated with the computing device.3. The system of claim 1 , wherein the resource is a memory associated with the computing device.4. The system of claim 1 , including the determination engine to determine whether the dumped resource has changed since being dumped claim 1 , using an idle resource.5. The system of claim 1 , including the identification engine to record an identification of the resource dumped prior to the crash.6. The system of claim 1 , including a filtering engine to filter the resource associated with the computing device prior to dumping the resource.7. The system of claim 6 , including the dumping engine to dump the resource associated with the computing device when it passes through the filter.8. A non-transitory computer readable medium storing instructions executable by a processing resource to cause a computer to:identify a memory associated with the computer with an idle resource, in response to a processing usage of the computer being below a defined level;dumping the memory associated with the computer;determine whether the dumped memory has changed since the ...

Подробнее
12-01-2017 дата публикации

SYSTEMS AND METHODS FOR PROVIDING ERROR CORRECTION AND MANAGEMENT IN A MOBILE-BASED CROWDSOURCING PLATFORM

Номер: US20170010936A1
Принадлежит:

The present invention provides systems and methods for providing error correction and management in a mobile-based crowdsourcing platform, specifically a platform providing geolocation services. More specifically, the system of the present invention includes a plurality of remote mobile devices configured to communicate and exchange data with a cloud-based service, such as a crowdsourcing platform. The crowdsourcing platform generally provides a geolocation service based on the crowdsourcing, or polling, of users of the mobile devices so as to determine location and movement of the users within a specific environment. The system is further configured to automatically render a floor plan or layout of a location based on the user data. The system is further configured to recognize and recalibrate data errors during the collection and aggregation of the crowd-sourced data. 1. A system for providing error correction and management in a mobile-based crowdsourcing platform , the system comprising:a mobile device for user input and interaction; and receive user data from the mobile device, the user data associated with at least one of a location of the user and movement of the user within an environment over a period of time;', 'generate a layout of the environment based on the user data;', 'prompt a user of the mobile device for user input confirming at least one of the location of the user and movement of the user within the environment;', 'correlate the user input with the user data;', 'identify any discrepancies between the user input and the user data based on the correlation; and', 'revise the layout of the environment based on identified discrepancies., 'a server configured to communicate with and exchange data with the mobile device, the server comprising a processor coupled to a memory containing instructions executable by the processor to cause the server to2. The system of claim 1 , wherein the mobile device is selected from the group consisting of a tablet ...

Подробнее
14-01-2016 дата публикации

Engineering tool

Номер: US20160011578A1
Принадлежит: Mitsubishi Electric Corp

Included are a connection monitoring unit that monitors the presence of connection with a PLC (Programmable Logic Controller) constituting a PLC system, and that, upon detection of connection with the PLC, acquires data related to the state of the PLC system; a function-selecting-screen display unit that displays a list of functions that can be used for searching for an error according to the state of the PLC system acquired by the connection monitoring unit and receives a function selected from the list; and a function-screen display unit that displays information related to the error acquired by the function selected from the list.

Подробнее
14-01-2016 дата публикации

CYBER SECURED AIRGAP REMOTE MONITORING AND DIAGNOSTICS INFRASTRUCTURE

Номер: US20160011921A1
Принадлежит:

A system and method for remotely monitoring and diagnosing a device is disclosed. Data related to the device is obtained at a first network. The obtained data is encrypted to generate an encrypted code at the first network. A copy of the encrypted code is obtained at a second network that is separated from the first network via a non-network medium such as an air gap. The copy of the encrypted code is decoded to obtain the data related to the device at the second network. The data is used at the second network to monitor and diagnose the device at the second network. 1. A method of remotely monitoring and diagnosing a device , comprising:obtaining data from the device at a first network;encrypting the data to generate an encrypted code at the first network;obtaining a copy of the encrypted code at a second network separated from the first network via a non-network medium;decoding the copy of the encrypted code to obtain a copy of the data at the second network; andmonitoring and diagnosing the device at the second network using the copy of the data.2. The method of claim 1 , further comprising displaying the encrypted code as a visual signal at a visual interface of the first network and reading the visual signal from the visual interface via an optical scanner of the second network.3. The method of claim 2 , wherein the visual signal is a QR code.4. The method of claim 1 , further comprising generating an audio signal relating to the encrypted code at an audio transmitter of the first network and receiving the audio signal at an audio receiver of the second network.5. The method of claim 1 , wherein the first network is a private network.6. The method of claim 1 , further comprising generating the encrypted code dynamically at a selected refresh rate.7. The method of claim 1 , further comprising obtaining the copy of the data using at least one of: (i) a device having a continuous network connection to the second network; (ii) a device having a non-continuous ...

Подробнее
14-01-2016 дата публикации

ANNOTATION OF NETWORK ACTIVITY THROUGH DIFFERENT PHASES OF EXECUTION

Номер: US20160011925A1
Принадлежит:

The subject technology provides a drillable time-series heat map, which combines information of separate network element (e.g., switch, router, server or storage) and relates them together through impact zones to correlate network wide events and the potential impact on the other units in the network. The subject technology also brings together the network and its components, the distributed application(s) and a heat map controller to proactively communicate with one another to disseminate information such as failures, timeouts, new jobs, etc. For an individual job (e.g., for a distributed application), the subject technology may monitor consumption of resources during different phases of execution to provide individual job profile data that could be presented as a drillable heat map. The heat map, in this regard, nay include resource utilization heat metrics of resources such as CPU, Input/Output (I/O), memory, etc., in the heat map or graphs and presented along with network activity. 1. A system , comprising:at least one processor; and receive information for a job to be processed by a distributed application, the job being submitted from a user or other application and having at least two phases of execution for completion of the job;', 'identify a set of network elements to monitor during processing of the job, the set of network elements corresponding to nodes that are involved in at least a first phase of the job;', 'monitor, over a period of time, the set of network elements during processing of the job for the at least two phases of execution;', 'detect a failure during at least one phase of execution in at least one network element; and', 'generate job profile data indicating at least the failure., 'memory including instructions that, when executed by the at least one processor, cause the system to2. The system of claim 1 , wherein the instructions further cause the at least one processor to:indicate, in a graphical representation, the failure in the at ...

Подробнее
14-01-2016 дата публикации

LOG OUTPUT CONTROL DEVICE, METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

Номер: US20160011928A1
Автор: FUJIWARA Takumi
Принадлежит: NEC Corporation

Provided is a log output control device that dynamically controls the log output location in a program that is requested by a client using a log history output by the client, irregular operation information that is related to irregular operation of a program that is detected from the log, and log generation information that is related to log output processing that is inserted in a program executed by the client. 1. A log output control device comprising:a log processing unit that dynamically controls a log output location in a program requested by a client, by using a history of a log output by the client, wrong operation information concerning wrong operation of the program detected from the log, and log generation information concerning a log output process inserted in the program executed by the client.2. The log output control device according to claim 1 , wherein the wrong operation information includes identification information of the log of the detected wrong operation claim 1 ,the log generation information includes location information representing a location in the program where the log output process is inserted, and includes identification information of the log corresponding to the inserted log output process, andbased on the wrong operation information and the log generation information, the log processing unit specifies an output location of the log of the detected wrong operation in the program requested by the client, and inserts a log output process at the specified location.3. The log output control device according to claim 1 , wherein the log processing unit obtains user identification information of the client claim 1 , andby using the user identification information of the client, controls an inserting process of the log output process for the program requested by the client.4. The log output control device according to claim 3 , wherein in control of the inserting process of the log output process claim 3 , in accordance with the user ...

Подробнее
14-01-2021 дата публикации

ABNORMALITY DETECTION SYSTEM, ABNORMALITY DETECTION METHOD, ABNORMALITY DETECTION PROGRAM, AND METHOD FOR GENERATING LEARNED MODEL

Номер: US20210011791A1
Принадлежит: Preferred Networks, Inc.

A method and system that efficiently selects sensors without requiring advanced expertise or extensive experience even in a case of new machines and unknown failures. An abnormality detection system includes a storage unit for storing a latent variable model and a joint probability model, an acquisition unit for acquiring sensor data that is output by a sensor, a measurement unit for measuring the probability of the sensor data acquired by the acquisition unit based on the latent variable model and the joint probability model stored by the storage unit, a determination unit for determining whether the sensor data is normal or abnormal based on the probability of the sensor data measured by the measurement unit, and a learning unit for learning the latent variable model and the joint probability model based on the sensor data output by the sensor. 18-. (canceled)9. A system comprising:one or more memories; andone or more processors configured to output anomaly information of target data inputted into the system using at least an encoder of a machine learning model,wherein, in the encoder of the machine learning model, a probability distribution of a latent variable of normal data is modeled based on a predetermined probability distribution.10. The system according to claim 9 , further comprising the encoder of the machine learning model claim 9 , and a decoder of the machine learning model capable of decoding latent variables generated by the encoder of the machine learning model.11. The system according to claim 10 , wherein the encoder and the decoder of the machine learning model have been learned based on training data that is normal.12. The system according to claim 9 , wherein the one or more processors are configured to generate a latent variable from the target data based on the encoder of the machine learning model and perform a predetermined process on the generated latent variable to output the anomaly information of the target data.13. The system ...

Подробнее
14-01-2021 дата публикации

CORRECTIVE DATABASE CONNECTION MANAGEMENT

Номер: US20210011797A1
Принадлежит:

Systems and methods for are provided for predicting impending failure of a database and preemptively initiating mitigating failover actions, for example by shedding connections or redirecting connection requests to an alternate database that can fulfill resources being requested. In an example embodiment, to detect a slow or unstable database, connection wait times are monitored over a rolling window of time intervals, a quantity of intervals in which at least one excessive wait time event occurred are counted during the time window, and if the quantity exceeds a threshold, the database is deemed unavailable, thereby triggering connection adjustments. 1. A computer-implemented method of processing a connection request , comprising:receiving database connection requests from a plurality of application servers and directing the database connection requests to a first database;accessing metrics data including a wait time for each database connection request describing how long the request waited until being serviced by an open connection at a first database;determining if at least one of the wait times occurring during a time interval exceeds a wait limit;counting, during a time window comprising a series of intervals, a quantity of the intervals in which the wait limit was exceeded at least once;determining that the first database is unhealthy if the quantity exceeds a predetermined count threshold during the time window; andtriggering at least one mitigating action if the first database is determined to be unhealthy.2. The computer implemented method of claim 1 , wherein the at least one mitigating action includes redirecting new connection requests to a second database.3. The computer-implemented method of claim 1 , wherein the at least one mitigating action includes notifying the plurality of application servers that the first database is unavailable for connection requests.4. The computer-implemented method of claim 1 , wherein the time window is a fixed amount of ...

Подробнее
10-01-2019 дата публикации

COMPACT BINARY EVENT LOG GENERATION

Номер: US20190012223A1
Автор: Cheriton David R.
Принадлежит:

Logging includes: obtaining an event designating message (EDM) comprising: a set of keys, or a type of designation corresponding to the set of keys, or both; looking up a set of values associated with the set of keys in a key-value store storing a plurality of keys and their corresponding values; constructing an event using the set of keys and values corresponding to the set of keys; and outputting the constructed event. 1. A method , comprising:obtaining a first key-value assignment message (KVAM) that comprises a key and one or more values, wherein the key-value assignment message is a definition associated with an event, the key of the KVAM indicates an event designating key, and the one or more values indicate one or more keys associated with the event;storing in a key-value store the definition associated with the event; andin response to obtaining a second KVAM that includes the event designating key, constructing the event based in part on the definition associated with the event.2. The method of claim 1 , wherein the obtaining of the first KVAM and second KVAM includes accessing a log comprising one or more KVAMs.3. The method of claim 2 , wherein the log is used to represent an event log recording event information and a recovery log recording state information.4. The method of claim 2 , wherein the log allows the key-value store to be resynchronized with a key-value store of a computer system after a connection failure between the computer system and a receiver storing the key-value store.5. The method of claim 1 , further comprising:obtaining one or more additional KVAMs, wherein the one or more additional KVAMs comprise corresponding additional keys and corresponding additional values;storing in the key-value store the corresponding additional keys and the corresponding additional values.6. The method of claim 5 , wherein at least one of the corresponding additional keys is one of the one or more keys associated with the event claim 5 , wherein the event ...

Подробнее
10-01-2019 дата публикации

Method for sending a plurality of data from a server to a plurality of devices

Номер: US20190012224A1
Автор: Frédéric Dao
Принадлежит: GEMALTO SA

The invention is a method sending a plurality of data ( 21, 22, 23 ) from a server ( 10 ) to a fleet of devices ( 11, 12, 13 ). The method comprises the following steps: splitting said plurality of data ( 21, 22, 23 ) in a set of disjoint batches ( 31, 32 ), uniquely allocating to each of said disjoint batches a time slot, identifying a selected data belonging to the disjoint batch which is allocated to the current time slot and sending the selected data from the server ( 10 ) to one device of said fleet, if an incident occurs at the server ( 10 ), discarding from the server ( 10 ) the disjoint batch allocated to the time slot during which the incident occurred.

Подробнее
10-01-2019 дата публикации

SOFTWARE ANALYTICS PLATFORM

Номер: US20190012254A1
Принадлежит:

A device may receive information associated with a software program executing on a device, and may generate event records based on the information associated with the software program. The device may identify pattern information associated with the event records, and may perform data analytics on the event records and the pattern information to identify one or more defects associated with the software program and to determine an expected behavior of the software program. The device may generate one or more reports based on the one or more defects associated with the software program and the expected behavior of the software program, and may provide the one or more reports. 1. A device , comprising: receive information associated with a software program executing on another device;', 'generate event records based on the information associated with the software program;', 'identify pattern information associated with the event records;', 'perform data analytics on the event records and the pattern information to identify one or more defects associated with the software program and to determine an expected behavior of the software program;', 'generate one or more reports based on the one or more defects associated with the software program and the expected behavior of the software program; and', 'provide the one or more reports., 'one or more processors to2. The device of claim 1 , where the one or more processors are further to:determine one or more recommendations to address the one or more defects associated with the software program; andprovide information indicating the one or more recommendations in the one or more reports.3. The device of claim 1 , where the one or more processors are further to:determine one or more corrections to address the one or more defects associated with the software program; andcause the other device to implement the one or more corrections in the software program.4. The device of claim 1 , where the one or more processors are further ...

Подробнее
12-01-2017 дата публикации

OPTIMIZING APPLICATION AVAILABILITY

Номер: US20170012832A1
Автор: HLADIK, JR. William J.
Принадлежит:

An approach to an optimal application configuration. The approach includes a method that includes computing, by at least one computing device, an actual application impact based on an “N” number of failing information technology (IT) infrastructure components within an application architecture. The method includes determining, by the at least one computing device, a factor in likelihood of failure of the “N” number of IT infrastructure components. The method includes determining, by the at least one computing device, a failure profile for the application architecture based on the actual application impact and the factor in likelihood of failure. 1. A method comprising:computing, by at least one computing device, an actual application impact based on an “N” number of failing information technology (IT) infrastructure components within an application architecture; anddetermining, by the at least one computing device, a factor in likelihood of failure of the “N” number of IT infrastructure components,wherein the “N” number of failing IT infrastructure components include application components that include feed servers, web load balanced servers, and application servers,the computing of the actual application impact includes analyzing a vertical application layer and calculating throughput volume in the vertical application layer, andthe calculating the throughput volume in the vertical application layer comprises subtracting a product of a previous layer throughput volume and a current level fail percentage from the previous layer throughput volume.2. The method of claim 1 , wherein the computing of the actual application impact includes analyzing the “N” number of IT infrastructure components across different layers in the application architecture.3. The method of claim 1 , further comprising determining claim 1 , by the at least one computing device claim 1 , a failure profile for the application architecture based on the actual application impact and the factor in ...

Подробнее