Entries |
Document | Title | Date |
20110078513 | Methods, Systems & Products for Detecting Failing Power Supplies - Methods, systems, and products are disclosed for predicting failures in power supplies. A count of exception messages is set to zero. When a exception message is received, the count of exception messages is incremented and compared to a threshold value. When the count of exception messages equals the threshold value, a cooling fan is determined to be failed, and a prediction is made that a power supply is proceeding towards failure. | 03-31-2011 |
20110093750 | Hardware resource management within a data processing system - A processor | 04-21-2011 |
20110099433 | INFORMATION GENERATING APPARATUS AND INFORMATION GENERATING METHOD - An information generating apparatus, includes: a process executing part that executes at least one process using a battery as a power source; a power detecting part that detects power consumption of the battery; a consumption determining part that determines whether the power consumption is equal to or more than a specified threshold; an acquisition part that specifies a process executed by the process executing part when the power consumption is equal to or more than the specified threshold; and a generating part that generates execution state information about the specified process. | 04-28-2011 |
20110107154 | SYSTEM AND METHOD FOR AUTOMATED AND ADAPTIVE THRESHOLD SETTING TO SEPARATELY CONTROL FALSE POSITIVE AND FALSE NEGATIVE PERFORMANCE PREDICTION ERRORS - Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert. | 05-05-2011 |
20110154125 | Method and System for Fault Detection Using Round Trip Time - A computer readable storage medium stores a set of instructions executable by a processor. The set of instructions is operable to receive, from a user device, a query relating to a degradation of performance of the device within a network; receive, from a transceiver station, a record relating to a time to send data to the device; and identify the existence of an error in the device based on a determination that the time is greater than a predetermined threshold. | 06-23-2011 |
20110161742 | Efficient Monitoring in a Software System - A monitoring of a server system during an execution of a server system processing logic, includes: during collection and storage of operational metrics by a given thread in a thread-local memory, determining that a checkpoint within the server system processing logic is reached; determining whether a threshold number of checkpoints have been encountered by the given thread; in response to the threshold number of checkpoints having been encountered, determining whether a threshold time interval since a last rollup of the collected operational metrics has been exceeded; and in response to the threshold time interval being exceeded, performing a rollup of the collected operational metrics from the thread-local memory to an accumulation point in a shared memory, where the accumulation point stores aggregated operational metrics from a plurality of threads. | 06-30-2011 |
20110161743 | OPERATION MANAGEMENT DEVICE, OPERATION MANAGEMENT METHOD, AND OPERATION MANAGEMENT PROGRAM - An operation management device includes: an information collection module which collects, from a managed device, first and second performance information showing a time series change in the performance information; a correlation model generation module which derives a correlation function between the first and second performance information and creates a correlation model based on the correlation function; a correlation change analysis module which judges whether or not the current first and second performance information acquired by the information collection module satisfy the relation shown by the conversion function between the first and second performance information of the correlation model within a specific error range; and a failure period extraction module which, when the first and second performance information does not satisfy the relation shown by the conversion function of the correlation model, extracts a period of that state as a failure period. | 06-30-2011 |
20110276840 | APPARATUS AND METHOD FOR MONITORING A COMPUTER SYSTEM - An apparatus and method for monitoring a computer system operable for alerting an operator to failures associated with critical resource consumption and comprises: a resource monitoring component for monitoring resource consumption; a threshold setting component for setting a threshold of resource consumption between an average resource consumption value and a critical resource consumption value; a diagnostic data collection component; and a threshold crossing detection component; wherein the diagnostic data collection component is operable, in response to the threshold crossing detection component detecting a threshold crossing, to start or stop diagnostic data collection. | 11-10-2011 |
20110289362 | NETWORK FAULT MANAGER - The network fault manager described herein may include one or more processors configured to detect alarms. For example, the one or more processors may periodically sample rates at which similar events that relate to occurrences on a network arrive, compare the periodically sampled rates to a first threshold, and determine whether a preexisting alarm exists. In response to a number of the periodically sampled rates that exceeded the first threshold within a preceding time window exceeding a second threshold and the preexisting alarm not existing, the one or more processors may assert a first alarm. Otherwise, if the number of periodically sampled rates that exceeded the first threshold within the preceding time window exceeds the second threshold but the preexisting alarm does exist, the one or more processors may maintain the preexisting alarm for a predetermined time period. | 11-24-2011 |
20110289363 | Predictive Diagnostics and Fault Management - The present application discloses a preventative, diagnostic maintenance system designed for gaming systems. Sensor and software monitor, accumulate, store and share information for efficient maintenance of the gaming systems. Diagnostic and prognostic tests are run and results prioritized wherein minor and intermittent problems that indicate potential future problems are stored. When a technician visit is prescribed, the system will present via a GUI a visualization of the status of gamed devices, and, forearm the technician with the high and low priority information regarding the high priority problems along with the low priority problems for all the game devices at the same site. The technician will be able to bring the specific tools, programs and parts to service the high and the low priority problems of all the game devices. | 11-24-2011 |
20110307743 | False alarm mitigation - A method for reducing false alarms in a monitoring system comprising the steps of: providing an initial fault set (or a preliminary fault set) and using a decision process to successively reduce this initial fault set to a fault ensemble, said decision process using increasing probability or confidence in the initial fault set to generate the fault ensemble, which is considered to reflect a true abnormal condition; the decision process comprising at least two steps: the first step is generating a preliminary fault set by using a standard anomaly detection method with the additional variable (or adaptive) thresholds or temporal filters; the second step is using the preliminary fault set to generate at least one fault ensemble, each of which comprises a reduced number of refined faults that represent a more confident explanation of the cause(s) of an abnormal condition. | 12-15-2011 |
20120023375 | GENERATING PERFORMANCE ALERTS - A method for generating performance alerts in a database system. The method includes collecting a predefined set of performance data, and comparing the performance data to one or more predefined thresholds. The method also includes determining if any of the performance data exceeds the one or more predefined thresholds, and generating an alert if any of the data exceeds one of the predefined thresholds. | 01-26-2012 |
20120023376 | SYSTEMS AND METHODS FOR MONITORING A MEMORY SYSTEM - Systems and methods are disclosed herein, including those that operate to monitor a first set of operational parameters associated with a memory vault, to adjust a second set of operational parameters associated with the memory vault, and to perform alerting and reporting operations to a host device. | 01-26-2012 |
20120042214 | METHOD FOR DETECTING THE IMPENDING ANALYTICAL FAILURE OF NETWORKED DIAGNOSTIC CLINICAL ANALYZERS - A method of detecting impending analytical failure in a networked diagnostic clinical analyzer is based upon detecting whether the operation of a particular analyzer is statistically distinguishable based on one or more thresholds. A failure occurs when one or more components or modules of the analyzer fails. A method to detect such an impending failure is disclosed. Baseline data on a pre-selected set of analyzer variables for a population of diagnostic clinical analyzers is used to generate an impending failure threshold. Subsequently, operational data comprising the same pre-selected set of analyzer variables allows generation of a time series of operational statistics. If the operational statistic exceeds the impeding failure threshold in a prescribed manner, an impending analytical failure is predicted. Such detection of impending analytical failures facilitates intelligent scheduling of service for the analyzer in question to maintain high assay throughput and accuracy. | 02-16-2012 |
20120047403 | DATA PROCESSING SYSTEM - Disclosed is a data processing system capable of detecting a sign of abnormality in such a manner as to increase the degree of safety and availability of the system. The data processing system uses a prediction circuit that detects a sign of abnormality in accordance with a cumulative history of significant events encountered during the processing of CPUs. The prediction circuit retains latest notification timing information about periodic notification from the CPUs in association with the CPUs, acquires elapsed time from the latest notification timing at predetermined intervals, and successively retains history information corresponding to changes in the elapsed time from a target value in association with the CPUs. When the retained history information reaches a predetermined threshold value, the prediction circuit concludes that there is a sign of abnormality. | 02-23-2012 |
20120066553 | System and Methods for Monitoring a Geographic Information System - Disclosed are new approaches for monitoring an information system such as a GIS. For each service of a plurality of services provided by service computers, a periodic evaluation is performed by requesting performance of the selected test service routine by the service. If no valid response to the request is received within a response window the monitoring computer may produce an output indicating an error status for the service. The response window may be a time window or a maximum number of transmitted requests without a valid response. A monitoring computer may transmit requests to perform a service at a first period if an error indicator associated therewith is set and periodically at a second period if the error indicator associated therewith is not set. Requests to perform the service may not be transmitted during an exclusion time associated with a service or its corresponding service computer. | 03-15-2012 |
20120072780 | Continuous System Health Indicator For Managing Computer System Alerts - A method is provided for detecting when users are being adversely impacted by poor system performance. A system health indicator is determined that is based on the amount of work that is blocked waiting for each of a set of an external events and combined with a heuristic that is based on the number of users waiting for the work to complete. The system health indicator is compared to a threshold such that an alert is generated when the system health indicator crosses the threshold. However, the system health indicator is designed so that an alert is only generated when a significant user base is or will in the near future experience a problem with the system. Furthermore, the system health indicator is designed to vary smoothly to maintain its suitability for the application of predictive technology. | 03-22-2012 |
20120110390 | UPDATING A SET OF MEMORY DEVICES IN A DISPERSED STORAGE NETWORK - A method begins by a processing module determining a memory usability indication for a set of memory devices, wherein the set of memory devices stores data as first dispersed storage error coded data using first dispersed storage error coding parameters. The method continues with the processing module comparing the memory usability indication to a memory usability level threshold. The method continues with the processing module adding one or more memory devices to the set of memory devices to produce an updated set of memory devices when the memory usability indication compares unfavorably to the memory usability level threshold. The method continues with the processing module storing the data as second dispersed storage error coded data using second dispersed storage error coding parameters in the updated set of memory devices. | 05-03-2012 |
20120179938 | Methods and Systems for Managing Performance and Power Utilization of a Processor Employing a Fully Multithreaded Load Threshold - A method for managing performance and power utilization of a processor in an information handling system (IHS) employing a balanced fully-multithreaded load threshold is disclosed. The method includes providing a maximum current thread utilization (Umax) and a minimum current thread utilization (Umin) among all current thread utilizations of the processor and determining a current performance state (P state) of the processor. The method also includes increasing a current P state of the processor to a next P state of the processor towards a maximum P state (Pmax) of the processor when the current P state of the processor is between Umax and Umin and the current utilization rate of the processor is less than a first threshold utilization rate. The method further includes engaging the processor in a turbo mode when the current P state of the processor reaches the Pmax and the current utilization of the processor is greater than the first threshold utilization rate of the processor. | 07-12-2012 |
20120192015 | DEAD RECKONING IN A GAMING ENVIRONMENT - Client position in a multi-client game is determined using dead reckoning. Clients send information to a server over a network. The server distributes this information to other clients. A client uses this information and dead reckoning to determine a character's position. The server may calculate the client's position using dead reckoning and send updates to clients when errors between actual and calculated positions exceed a threshold. Clients may calculate their position according to dead reckoning, and when an error between actual and calculated position exceeds a threshold, send updated information to other clients. This Abstract is provided for the sole purpose of complying with the Abstract requirement rules that allow a reader to quickly ascertain the subject matter of the disclosure contained herein. This Abstract is submitted with the explicit understanding that it will not be used to interpret or to limit the scope or the meaning of the claims. | 07-26-2012 |
20120254669 | PROACTIVE FAILURE HANDLING IN DATABASE SERVICES - Embodiments are directed to predicting the health of a computer node using health report data and to proactively handling failures in database services. In an embodiment, a computer system monitors various health indicators for multiple nodes in a database cluster. The computer system accesses stored health indicators that provide a health history for the database cluster nodes. The computer system then generates a health status based on the monitored health factors and the health history. The generated health status indicates the likelihood that the node will be healthy within a specified future time period. The computer system then leverages the generated health status to handle current or predicted failures. The computer system also presents the generated health status to a user or other entity. | 10-04-2012 |
20130031423 | System and Method for Identifying Fault Prone Computer Code Files - Metrics associated with computer code files within a codebase may be analyzed to identify bug-prone files. Functions of the method or system may determine metrics corresponding to each file of a plurality of codebase files within an application codebase. The functions may also store the metrics corresponding to each codebase file in a record of a database table, rank order the plurality of codebase files according to at least one metric, and flag each codebase file having a ranking over a threshold value of the metric. The codebase file metrics may describe fault-inducing characteristics of the plurality of codebase files and include both a total number of previous faults and a total number of changes that are associated with each codebase file. | 01-31-2013 |
20130031424 | PROACTIVE AND ADAPTIVE CLOUD MONITORING - Processes, computer-readable media, and machines are disclosed for reducing a likelihood that active functional components fail in a computing system. An active monitoring component receives metrics associated with different active functional components of a computing system. The different active functional components contribute to different functionalities of the system. Based at least in part on the metrics associated with a particular active functional component, the active monitoring component determines that the particular active functional component has reached a likelihood of failure but has not failed. In response to determining that the particular active functional component has reached the likelihood of failure but has not failed, the active monitoring component causes a set of actions that are predicted to reduce the likelihood of failure. | 01-31-2013 |
20130047040 | CHANNEL MARKING FOR CHIP MARK OVERFLOW AND CALIBRATION ERRORS - Marking memory chips as faulty when a fault is detected in data from the memory chip. Upon detecting that a plurality of memory chips are faulty, determining which of a plurality of memory channels contains the faulty memory chips. Marking one of a plurality of memory channels as failing in response to determining that the number of failing memory chips has exceeded a threshold. | 02-21-2013 |
20130103989 | FIELD CONTROL DEVICES HAVING PRE-DEFINED ERROR-STATES AND RELATED METHODS - Control apparatus having pre-defined error-states and related methods are described. An example method of controlling a field control device described herein includes receiving, via a controller coupled to the fluid control device, a communication from a control system remotely located from the controller to operate the field control device during a non-error condition, detecting whether an error condition has occurred, and operating the field control device based on a pre-determined error-state instruction stored in the controller when the error condition is detected. | 04-25-2013 |
20130132782 | METHOD TO IMPROVE I/O RELIABILITY ON A DEGRADED WIDE PORT CONNECTION - A method and system for controller level identification and isolation of a degraded physical link (PHY) in a serial attached small computer system interface (SA-SCSI) or SAS domain. The method and system uses computer readable code embodied within the controller level of an SAS domain to monitor a plurality of PHY pairs associated as connecting through a wide port. The invention compares a history of PHY pair errors to a tunable timer to determine if PHY errors reach a threshold. Should the threshold be exceeded, the controller disables the error prone PHY pair and delivers a notification. The controller may then re-enable the disabled PHY after user action or port power up. | 05-23-2013 |
20130139006 | SYSTEMS AND METHODS OF MEDIA MANAGEMENT, SUCH AS MANAGEMENT OF MEDIA TO AND FROM A MEDIA STORAGE LIBRARY - A system and method for determining media to be exported out of a media library is described. In some examples, the system determines a media component to be exported, determines the media component is in the media library for a specific process, and exports the media component after the process is completed. | 05-30-2013 |
20130159785 | SEMICONDUCTOR STORAGE DEVICE, METHOD FOR CONTROLLING THE SAME AND CONTROL PROGRAM - According to one embodiment, a semiconductor memory stores a program for causing a memory controller to operate in at least one of first and second modes. In the first mode, for each of the blocks, the memory controller autonomously erases and writes data and reads the written data, and determines that the block or the semiconductor storage device is defective when a count of errors in the read data exceeds a correction capability or a threshold. In the second mode, when error correction of read substantial data fails, the memory controller reads the substantial data which failed in the error correction using a read level shifted from the present read level. | 06-20-2013 |
20130166961 | DETECTING AND RESOLVING ERRORS WITHIN AN APPLICATION - Techniques for managing errors within an application are provided. Embodiments monitor errors occurring in each of a plurality of portions of the application while the application is executing. An error occurring in a first one of the plurality of portions of the application is detected. Additionally, upon detecting the error occurring in the first portion, embodiments determine whether to prevent subsequent executions of the first portion of the application. | 06-27-2013 |
20130205173 | STORAGE DEVICE, AND STORAGE DEVICE CONTROL METHOD - A storage device, which performs input/output processing on a memory device through a relay apparatus, includes a memory and a processor coupled to the memory. The processor executes a process including: determining whether or not a cumulative value accumulated according to occurrence of error in the memory device during the input/output processing reaches a predetermined threshold value; comparing when the determined cumulative value is greater than or equal to the threshold value, number of input/output processing on the memory device with number of input/output processing on another memory device mounted on the relay apparatus, and determining whether or not there is a bias; determining when the bias is determined, whether or not a connection status is normal with respect to the relay apparatus; and detaching when it is determined that the connection status of the relay apparatus is normal, the connection to the memory device. | 08-08-2013 |
20130262937 | NODE DEATH DETECTION BY QUERYING - Systems, methods, and other embodiments associated with detecting a node death in a clustered distributed system are described. In one embodiment, a method includes transmitting a ping message to a peer node in the network. If a reply to the ping message is not received from the peer node, a query is sent to table of port identifiers that lists ports in the cluster. In one embodiment, the query includes a port identifier associated with the peer node. The peer node is declared as inactive/dead when the query fails to locate a match in the table for the port identifier. When the query locates a match in the table for the port identifier, another ping message is periodically transmitted to the peer node. | 10-03-2013 |
20130275814 | ADAPTIVE SYSTEM MONITORING - Various embodiments of systems and methods for monitoring a system are described herein. A request is received from a user to generate a system watch for monitoring a system. The request may include a primary system monitoring parameter to be included in the system watch. One or more system monitoring parameters correlated to the primary system watch are identified from a system monitoring parameter database. The system watch is generated based on the primary system monitoring parameter and at least one secondary system monitoring parameter from the identified one or more system monitoring parameters. In one aspect, the system monitoring parameter database is built based on system watch related input received for a plurality of system watches. | 10-17-2013 |
20130275815 | DISTRIBUTED OBJECT STORAGE SYSTEM - A distributed object storage system has a monitoring agent and/or a maintenance agent configured to determine for each of a plurality of repair tasks the actual concurrent failure tolerance of a corresponding repair data object. The actual concurrent failure tolerance corresponds to the number of storage elements that store sub blocks of the repair data object and are allowed to fail concurrently. | 10-17-2013 |
20130326284 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING SOLID-STATE STORAGE RELIABILITY - A storage controller may be configured to assess the reliability of a solid-state storage medium. The storage controller may be further configured to project, forecast, and/or estimate storage reliability at a future time. The projection may be based on a currently reliability metric of the storage and a reliability model. The portions or sections of the solid-state storage media may be retired in response the projected reliability metric failing to satisfy a reliability threshold. The reliability threshold may be based on data correction and/or reconstruction characteristics. The projected reliability metrics of a plurality of erase blocks of a storage division may be combined, and one or more of the erase blocks may be retired in response to determining that the combined reliability metric projection fails to satisfy the reliability threshold. | 12-05-2013 |
20130346807 | Automatic Parallel Performance Profiling Systems And Methods - An automatic profiling system and method determines an algorithm profile including performance predictability and pricing of a parallel processing algorithm. | 12-26-2013 |
20130346808 | DISTRIBUTED COMPUTING SYSTEM THAT MONITORS CLIENT DEVICE REQUEST TIME IN ORDER TO DETECT PERFORMANCE PROBLEMS AND AUTOMATICALLY ISSUE ALERTS - A client device in a distributed system includes a timer for timing a request time duration substantially including a period of time that the client device is waiting for results to be received via a network from a server in response to a request sent by the client device. A processor of the client device compares the request time duration with a dynamically generated request time threshold, and automatically controls a network interface to issue one or more alert messages to a network operation center (NOC) via the network when the request time duration is greater than the request time threshold. The request time threshold is dynamically calculated according to historic request time durations timed by the timer for a plurality of previous requests sent by the client device. | 12-26-2013 |
20140013166 | POWER SAVING TECHNIQUES THAT USE A LOWER BOUND ON BIT ERRORS - A read back bit sequence and charge constraint information are obtained. A lower bound on a number of bit errors associated with the read back bit sequence is determined based at least in part on the read back bit sequence and the charge constraint information. The lower bound and an error correction capability threshold associated with an error correction decoder are compared. In the event the lower bound is greater than or equal to the error correction capability threshold, an error correction decoding failure is predicted and in response to the prediction a component is configured to save power. | 01-09-2014 |
20140032977 | MANAGING OPERATION PERFORMANCE - Systems and methods for managing operation performance are included herein. In one example, a method includes determining an operation execution time. The method also includes storing the operation execution time. Furthermore, the method includes calculating an operation performance characteristic based on the operation execution time. The method also includes determining a threshold based on the operation performance characteristic. Additionally, the method includes determining the operation execution time is above the threshold. In addition, the method includes providing a warning based at least on the operation performance characteristic and the threshold. | 01-30-2014 |
20140032978 | SERVER AND METHOD OF MONITORING BASEBOARD MANAGEMENT CONTROLLER - A server includes a baseboard management controller. The server controls a real time clock to send a clock signal to a platform controller hub (PCH) in a predefined interval. When a system management interrupt has been activated, the server executes a monitoring instruction to obtain a state value of the BMC. When the state value of the BMC is not the same as a normal state value, the server is restarted. An event log of the BMC is written to the BMC and an alarm is raised. | 01-30-2014 |
20140068350 | SELF-CHECKING SYSTEM AND METHOD USING SAME - An electronic apparatus controlled by a self-checking system. The self-checking system constantly detects and stores, in a limited storage, a number of state characteristics of the electronic apparatus and constantly writes over and thus deletes previous data. An operating system in the electronic apparatus transmits a reset instruction before the expiry of predetermined time intervals. The self-checking system starts a timing process when the operating system is started and resets the timing process when a reset instruction is received from the operating system. If a reset instruction is not received before the expiry of a predetermined time interval, the self-checking system stores the instantaneous state characteristic of the electronic apparatus to make preparation for a failure analysis by the user. | 03-06-2014 |
20140082429 | METHOD AND SYSTEM FOR MONITORING THE STATE OF HEALTH OF AN ELECTRONIC DATA CARRIER - According to an aspect of the invention, a method for monitoring the state of health of an electronic data carrier is conceived, wherein a reader device operable to read data from said electronic data carrier determines the state of health of the electronic data carrier by reading a parameter value indicative of said state of health from the electronic data carrier. According to a further aspect of the invention, a system for monitoring the state of health of an electronic data carrier is provided, the system comprising a reader device operable to read data from said electronic data carrier, wherein said reader device is arranged to determine the state of health of the electronic data carrier by reading a parameter value indicative of said state of health from the electronic data carrier. | 03-20-2014 |
20140101493 | METHODS AND SYSTEMS FOR OPTIMIZING INFORMATION TECHNOLOGY COSTS BASED ON OUTAGE COSTS - A method that includes monitoring, by a computing device including a processor, transaction activity level of a plurality of pre-defined IT transactions, and determining, by the computing device, that an IT outage has occurred when the activity level is below a threshold. | 04-10-2014 |
20140129881 | OBJECT STORAGE SYSTEM FOR AN UNRELIABLE STORAGE MEDIUM - A method and computer device for storage and retrieval of a data object on a storage medium. The method includes steps of disassembling the data object into a predetermined number of redundant sub blocks, storing the redundant sub blocks on the storage medium, retrieving at least a predetermined multiple of a minimal spreading requirement of the redundant sub blocks from the storage medium, and assembling the data object from any combination of a particular number of the redundant sub blocks, the particular number corresponding to a predetermined multiple of a minimal spreading requirement. The computer device includes modules for performing the steps. | 05-08-2014 |
20140164849 | RAID SURVEYOR - A method for surveying a data storage subsystem for latent errors before a failing disk drive of the data storage subsystem fails and recovering unreadable data usable to reconstruct data of the failing disk drive. The method includes determining that a disk drive of a plurality of disk drives of the data storage subsystem meets a threshold for being identified as a failing disk drive, and prior to failure of the failing disk drive, surveying at least a portion of the data on the remaining plurality of disk drives to identify data storage areas with latent errors. The identified data storage areas may be reconstructed utilizing, at least in part, data stored on the failing disk drive. | 06-12-2014 |
20140173361 | SYSTEM AND METHOD TO INJECT A BIT ERROR ON A BUS LANE - A method includes modifying, at a bit error injection circuit, a multiplier value by a first value according to an occurrence of a first event. The method also includes, in response to a determination that the modified multiplier value matches a first threshold, modifying, at the bit error injection circuit, the offset value according to an occurrence of a second event. The method further includes, in response to a determination that the modified offset value matches a second threshold, asserting, at the bit error injection circuit, an error injection signal. The method further includes asserting a first error pattern to be transmitted via a bus lane based on the error injection signal. | 06-19-2014 |
20140173362 | Automatic Training Proposal For Data Transport - The subject matter disclosed herein provides methods and apparatus, including computer program products, for proposing training based on the prediction or measurement of different metrics associated with a transport request. In one aspect there is provided a method that may include preparing a transport request including one or more objects configured to provide an update of an application. The transport request may be associated with one or more metrics, each metric having a metric value. The method may also include determining whether the transport request includes at least one error by at least evaluating the metric value for each of the one or more metrics and comparing the metric value for each of the metrics with a threshold value; and proposing, based on the determining, at least one training course when the transport request includes the at least one error. Related systems, apparatus, methods, and/or articles are also described. | 06-19-2014 |
20140195861 | IMPLEMENTING RATE CONTROLS TO LIMIT TIMEOUT-BASED FAULTS - Embodiments are directed to implementing rate controls to limit faults detected by timeout and to learning and adjusting an optimal timeout value. In one scenario, a computer system identifies cloud components that have the potential to fail within a time frame that is specified by a timeout value. The computer system establishes a number of components that are allowed to fail during the time frame specified by the timeout value and further determines that the number of component failures within the time frame specified by the timeout value has exceeded the established number of components that are allowed to fail. In response, the computer system increases the timeout value by a specified amount of time to ensure that fewer than or equal to the established number of components fail within the time frame specified by the timeout value. | 07-10-2014 |
20140201576 | System and Method for Improving Solid State Storage System Reliability - A method of operating a storage system. The method includes a storage controller receiving a first life parameter of a first storage device and determining if the first life parameter indicates that the first storage device has a remaining life that is less than a pre-determined life parameter threshold. The method further includes, in response to the remaining life being less than the pre-determined life parameter threshold, designating the first storage device for replacement. | 07-17-2014 |
20140208171 | MONITORING AND CAPTURING EARLY DIAGNOSTIC DATA - A deviance monitoring module is provided for examining various parameters of an operating system for deviance from a baseline behavior at specified intervals. A range of acceptable deviance values from a baseline behavior is set for parameters of an operating system. The parameters of the operating system are then monitored at specified intervals for deviance from the baseline behavior. In response to detecting that the deviance exceeds a predetermined threshold, the method triggers diagnostic data gathering on the parameters of the operating system according to an embodiment. | 07-24-2014 |
20140208172 | Monitoring of Computer Events - A data processing system ( | 07-24-2014 |
20140215278 | SYSTEM AND METHOD FOR THREE INPUT VOTING - An embodiment described herein includes a method for input channel voting. The method includes steps for sorting the three input values by magnitude into a high input value, a middle input value, and a low input value. The three input values are then tested. The testing includes subtracting the middle input value form the high input value to calculate a first difference, and comparing an absolute value of the first difference to a failure threshold. A first intermediate value is determined based on the comparison of the first difference to the failure threshold. The testing also includes subtracting the middle input value from the low input value to calculate a second difference, and comparing the second difference to the failure threshold. A second intermediate value is determined based on this comparison. The first intermediate value and second intermediate value are averaged to produce an output based on the three input values. | 07-31-2014 |
20140258787 | METHOD AND DEVICE TO PERFORM EVENT THRESHOLDING IN A FIRMWARE ENVIRONMENT UTILIZING A SCALABLE SLIDING TIME-WINDOW - A scalable method of determining in a firmware environment if the rate of occurrence of a detectable specified type of system event that occurs to a system component or discrete functional unit, has met a criteria with respect to a pre-selected threshold. When the meeting of the threshold criteria is detected, a previously defined action associated with the threshold criteria for the particular event can be invoked by the firmware. Embodiments may establish a sliding time-window that includes a currently detected type of system event and extends back a set duration in the past. Any occurrences of the specified event taking place earlier than the established time-window may be discarded while occurrences of the events during the specified time-window are added together with the newly detected event and compared to a threshold value to see if the threshold criteria has been met. | 09-11-2014 |
20140281739 | CRITICAL SYSTEMS INSPECTOR - Techniques are described for identifying a root cause of a pattern of performance data in a system including a plurality of services. Embodiments provide dependency information for each of the plurality of services, where at least one of the plurality of services is dependent upon a first one of the plurality of services. Each of the plurality of services is monitored to collect performance data for the respective service. Embodiments further analyze the performance data to identify a cluster of services that each follow a pattern of performance data. The first one of the services in the cluster of services is determined to be a root cause of the pattern of performance data, based on the determined dependency information for each of the plurality of services. | 09-18-2014 |
20140281740 | VULNERABILITY ESTIMATION FOR CACHE MEMORY - A method of determining vulnerability of a cache memory includes associating a first counter with a cache element and periodically incrementing the first counter. When a read or other access that consumes the data in the cache element occurs, a current value of the first counter is accumulated. When a write or other cache access that modifies data in the cache element occurs, the first counter is reset. At the end of an evaluation period, the value in a total counter approximates the number of clock cycles during which data that was consumed was vulnerable. Dividing this value by the number of clock cycles approximates the vulnerability of this cache element. The vulnerability for a subset of all cache elements may be measured and extrapolated to obtain an estimate for the vulnerability of the cache memory as a whole. | 09-18-2014 |
20140289571 | SYNCHRONOUS SERIAL INTERFACE CIRCUIT AND MOTION CONTROL FUNCTION MODULE - A clock output unit outputs a synchronous clock signal. A serial data receiving unit receives data representing an absolute position and an encoder sends data in synchronization with the synchronous clock signal. A position conversion unit converts the received absolute position into a current position. The position conversion unit calculates a difference between a last received absolute position and an absolute position received immediately before the last received absolute position. The position conversion unit obtains the latest current position by adding the difference and a current position that was calculated immediately before the latest current position. If the absolute value of the calculated difference is greater than a threshold value, the position conversion unit determines that the last received absolute position has an error. | 09-25-2014 |
20140298110 | System and Method for Bit Error Rate Monitoring - In an embodiment, a method of determining whether to trigger an event based on data blocks having status data includes electronically receiving the data blocks over a channel, performing a data integrity check on the data blocks to determine whether a particular data block has a transmission fault, calculating a received error metric based on performing the data integrity check, and disabling an event trigger if the received error metric crosses a first error threshold. | 10-02-2014 |
20140298111 | CONTROLLER, SATA SYSTEM AND METHOD OF OPERATION THEREFOR - A controller for operably coupling a drive unit to a host unit in a serial advanced technology attachment (SATA) system is described. The controller comprises a hardware processor arranged to: receive a plurality of SATA data frames; identify a first primitive sequence in at least one of the plurality of SATA data frames that adversely affects a performance of the SATA system; and replace the identified first primitive sequence with a second primitive sequence in response thereto. | 10-02-2014 |
20140325288 | Method and Device for Monitoring an Adaptive Network - An adaptive network has respective network nodes and network connections between the network nodes, the network nodes each having a transceiver which is coupled with a respective network connection. The respective transceiver is designed for providing a mean error value (MSE_i) which is representative of deviations of a received signal from predefined reference signal values. In a reference operating state of the adaptive network, a respective reference error value (MSE_REF) is determined as a function of the mean error value (MSE_i) provided by the respective transceiver. In at least one predefined operating state of the adaptive network, a respective actual error value (MSE_AV) is determined as a function of the mean error value (MSE_i) provided by the respective transceiver. As a function of the respective reference error value (MSE_REF) and the assigned actual error value (MSE_AV), it is determined whether a fault is present in the respective network connection which is coupled with the respective transceiver. | 10-30-2014 |
20140351658 | REDUNDANT COMPUTING ARCHITECTURE - A redundant computing architecture includes a first control unit, a second control unit, and a switch. The first control unit is configured to provide a first control signal in response to a sensory input and is further configured to provide a health status indicator that is indicative of a fault condition within the first control unit. Additionally, the second control unit is configured to provide a second control signal in response to the sensory input. Each of the first and second control signals is respectively operative to control an actuator. The switch is configured to: receive the health status indicator, the first control signal, and second control signal; provide the first control signal to the actuator if this health status indicator does not indicate a fault: and provide the second control signal to the actuator if this health status indicator does indicate a fault. | 11-27-2014 |
20140351659 | STORING DATA IN ACCORDANCE WITH A PERFORMANCE THRESHOLD - In response to a write operation for a set of encoded data slices, a method begins by a dispersed storage (DS) processing module determining whether to use a performance threshold number of encoded data slices of the set of encoded data slices. When the performance threshold number of encoded data slices is to be used, the method continues with the DS processing module determining the performance threshold number of encoded data slices and sending a performance threshold number of initial phase write requests to storage units. When a write threshold number of write responses are received, the method continues with the DS processing module sending a number of next phase write requests to the storage units, where the number of next phase write requests is equal to or greater than the write threshold number and is less than or equal to the performance threshold number. | 11-27-2014 |
20150046756 | PREDICTIVE FAILURE ANALYSIS TO TRIGGER REBUILD OF A DRIVE IN A RAID ARRAY - An apparatus comprising a first interface, a second interface and a processor. The first interface may be configured to connect to a host device. The second interface may be configured to connect to a plurality of drives. The processor may be configured to (i) periodically read a drive attribute from each of the drives, (ii) determine a risk factor based on the attribute, (iii) determine if each of the drives is likely to fail based on the risk factor, (iv) determine a cost factor for each of the drives determined to be likely to fail, (v) determine a threshold risk factor based on the cost factor for each of the drives determined to be likely to fail and (vi) if one of the drives is determined to be likely to fail and if the risk factor is more than the threshold risk factor, replace the drive determined to be likely to fail prior to the failure. | 02-12-2015 |
20150058679 | APPLICATION RESOURCE UTILIZATON MANAGEMENT - Methods and systems for automatically identifying an application that is experiencing performance problems caused by a resource utilization event may include receiving an indication that an application is experiencing a performance issue. It may be determined that the performance issue is caused by a resource utilization event on a device. The resource utilization event may include the application and one or more other applications running simultaneously, use of one or more functions of the device simultaneously by at least one of the first application and one or more other applications, and/or a resource utilization overload based on simultaneous use of a plurality of sensors on the device. Next, action may be taken to correct the performance issue of the application. | 02-26-2015 |
20150058680 | NETWORK-BASED TESTING SERVICE AND METHOD OF TESTING IN A NETWORK - A network-based testing method and service integrated with a tool that publishes one or more tagged test cases with tags being executable to reproduce a sequence of events for a system under test, SUT, caused by an original test case. The method is performed in a network and is intended for testing software or hardware by first creating an original test case for a system under test, SUT, and performing a sequence of events for the original test case for testing it. The tested case is stored and information of the performed sequence of events is tagged to the tested case. The tagged test case is then sent to a service that publishes tagged test cases. The service publishes the tagged case in a way to be reproduced via the service. | 02-26-2015 |
20150067409 | DETECTION OF CODE INJECTION ATTACKS - A method for detecting foreign code injected into a computer system including a processor and memory, the processor being configured to execute instructions stored in the memory, includes: detecting, on the computer system, an illegal instruction error; recording the illegal instruction error; determining whether a threshold condition is met; and generating an alert if the threshold condition is met. | 03-05-2015 |
20150074469 | METHODS, APPARATUS AND SYSTEM FOR NOTIFICATION OF PREDICTABLE MEMORY FAILURE - A method for providing notification of a predictable memory failure includes the steps of: obtaining information regarding at least one condition associated with a memory; calculating a memory failure probability as a function of the obtained information; calculating a failure probability threshold; and generating a signal when the memory failure probability exceeds the failure probability threshold, the signal being indicative of a predicted future memory failure. | 03-12-2015 |
20150089302 | METHODS AND APPARATUS TO PROVIDE FAILURE DETECTION - Methods and apparatus to provide failure detection are disclosed herein. An example method to synchronize data operations between multiple workload units in a computing device to facilitate failure detection includes identifying a number of first data operations to write data from a computing node in a first workload unit to locations that are not in a local cache of the computing node and are not in a memory of the first workload unit, the first data operations corresponding to a set of computing instructions that are assigned to the first workload unit and, when a flag in the first workload unit has been set to a first value, synchronizing the first data operations with second data operations by a second workload unit. | 03-26-2015 |
20150135019 | AUTOMATED TESTING OF APPLICATION PROGRAMS FROM AN APPLICATION PROGRAM ECOSYSTEM - Automated testing of application programs from an application program ecosystem is performed. As one example, a server system is disclosed that includes an application program management service residing at and executable by the server system. The application program management service may be configured to identify one or more networked components of a target application program of a plurality of application programs accessible by clients at an application program data store via a communication network. The application program management service may be configured to test the one or more networked components of the target application program, and output an indication of a result of the test of the target application program. | 05-14-2015 |
20150293802 | PREDICTING ANOMALIES AND INCIDENTS IN A COMPUTER APPLICATION - A method for predicting anomalies in a computer application includes during runtime of the computer application, detecting traffic metrics and incident tickets associated with the computer application, the incident ticket indicating an incident might occur in the computer application; calculating a threshold based on absolute values of second order differences associated with the traffic metrics, wherein the threshold is such that when the absolute value of the second order difference associated with the traffic metrics exceeds the threshold, a recall rate R | 10-15-2015 |
20150317196 | ADJUSTING A NUMBER OF DISPERSED STORAGE UNITS - A method begins by a processing module of a dispersed storage network (DSN) determining that a set of storage units of the DSN will be substantially used for read operations of dispersed storage error encoded data. For the set of storage units, the method continues with the processing module determining an actual level of reliability in retrieving a decode threshold number of encoded data slices per read request of a plurality of read requests. The method continues with the processing module comparing the actual reliability to a desired level of reliability in retrieving the decode threshold number of encoded data slices per read request of the plurality of read requests. When the actual reliability exceeds the desired reliability by a reconfiguration threshold, the method continues with the processing module removing one or more storage units from the set of storage units. | 11-05-2015 |
20150331731 | TRACKING AND FACTORING APPLICATION NEAR MISSES/TIMEOUTS INTO PATH SELECTION AND MULTIPATHING STATUS - Various embodiments for management of multipath Input/Output (I/O) in a computing system by a processor device. Upon surpassing a threshold for at least one predetermined criterion associated with near timeouts/near misses in the multipath I/O, a system notification is provided that is usable by the processor device to perform a multipath layer path selection aimed at reducing near timeouts/near misses in the multipath I/O. | 11-19-2015 |
20150347211 | SCALABLE PREDICTION FAILURE ANALYSIS FOR MEMORY USED IN MODERN COMPUTERS - One embodiment provides a method for scalable predictive failure analysis. Embodiments of the method may include gathering memory information for memory on a user computer system having at least one processor. Further, the method includes selecting one or more memory-related parameters. Further still, the method includes calculating based on the gathering and the selecting, a single bit error value for the scalable predictive failure analysis through calculations for each of the one or more memory-related parameters that utilize the memory information. Yet further, the method includes setting, based on the calculating, the single bit error value for the user computer system. | 12-03-2015 |
20150347267 | Monitoring Performance of a Processing Device to Manage Non-Precise Events - In accordance with embodiments disclosed herein, there is provided systems and methods for monitoring performance of a processing device to manage non-precise events. A processing device includes a performance counter to increment upon occurrence of a non-precise event in the processing device. The processing device also includes a precise event based sampling (PEBS) enable control communicably coupled to the performance counter. The processing device also includes a PEBS handler to generate and store a PEBS record including an architectural metadata defining a state of the processing device at a time of generation of the PEBS record. The processing device further includes a non-precise event based sampling (NPEBS) module communicably coupled to the PEBS control and the PEBS handler. The NPEBS module causes the PEBS handler to generate the PEBS record for the non-precise event upon overflow of the performance counter. | 12-03-2015 |
20150347268 | Bottleneck Detector Application Programming Interface - An application programming interface may receive workload identifiers and checkpoint identifiers from which bottleneck detection may be performed. Workloads may be tracked through various checkpoints in an application and timestamps collected at each checkpoint. From these data, bottlenecks may be identified in real time or by analyzing the data in a subsequent analysis. The workloads may be processed by multiple devices which may comprise a large application. In some cases, the workloads may be processed by different devices in sequence or in a serial fashion, while in other cases workloads may be processed in parallel by different devices. The application programming interface may be part of a bottleneck detection service which may be sold on a pay-per-use model, a subscription model, or some other payment scheme. | 12-03-2015 |
20150370677 | DISTRIBUTED OBJECT STORAGE SYSTEM - A distributed object storage system has a monitoring agent and/or a maintenance agent configured to determine for each of a plurality of repair tasks the actual concurrent failure tolerance of a corresponding repair data object. The actual concurrent failure tolerance corresponds to the number of storage elements that store sub blocks of the repair data object and are allowed to fail concurrently. | 12-24-2015 |
20150370682 | DATA-AGNOSTIC ADJUSTMENT OF HARD THRESHOLDS BASED ON USER FEEDBACK - This disclosure is directed to data-agnostic computational methods and systems for adjusting hard thresholds based on user feedback. Hard thresholds are used to monitor time-series data generated by a data-generating entity. The time-series data may be metric data that represents usage of the data-generating entity over time. The data is compared with a hard threshold associated with usage of the resource or process and when the data violates the threshold, an alert is typically generated and presented to a user. Methods and systems collect user feedback after a number of alerts to determine the quality and significance of the alerts. Based on the user feedback, methods and systems automatically adjust the hard thresholds to better represent how the user perceives the alerts. | 12-24-2015 |
20160011924 | RESOURCE-UTILIZATION MONITOR WITH SELF-ADJUSTING SAMPLE SIZE | 01-14-2016 |
20160026520 | RAINBOW EVENT DROP DETECTION SYSTEM - In one embodiment, data received from one or more streaming data sources may be monitored by one or more devices. A rate of change in flow of the data received from the one or more streaming data sources may be ascertained. It may be determined whether the rate of change in flow of the data received from the one or more streaming data sources exceeds a threshold rate. Transmission of an alert may be initiated according to a result of determining whether the rate of change in the flow of the data received from the one or more streaming data sources exceeds the threshold rate. | 01-28-2016 |
20160041858 | INFORMATION PROCESSING DEVICE, EXTERNAL STORAGE DEVICE, HOST DEVICE, RELAY DEVICE, CONTROL PROGRAM, AND CONTROL METHOD OF INFORMATION PROCESSING DEVICE - According to the embodiments, an external storage device switches to an interface controller for supporting only a read operation of nonvolatile memory when a shift condition for shifting to a read only mode is met. A host device switches to an interface driver for supporting only the read operation of the nonvolatile memory when determining to recognize as read only memory based on information acquired from the external storage device. | 02-11-2016 |
20160055075 | MONITORING ACTIVITIES OF A SOFTWARE APPLICATION - Disclosed are a method and a system for monitoring one or more activities offered by a software application in a computer network. The method comprises monitoring a response time for one or more activities. The one or more activities are performed by a software application. The method further comprises comparing the response time of the one or more activities with a corresponding pre-defined threshold time. The method also comprises detecting a faulty activity of the one or more activities based on the comparison. The method further comprises highlighting a code snippet corresponding to the faulty activity in a source code of the software application. | 02-25-2016 |
20160062809 | Method for Implementing Counting Control of Counter, and Network Chip - Provided are a method for implementing counting control of a counter in a network chip, and a network chip. The method includes: periodically generating a counting value scanning message; reading a counting value of a corresponding counter item according to the generated counting value scanning message; analyzing and judging whether the read counting value is less than a preset overflow threshold; and informing the processor to handle counting abnormality of the counter when the read counting value is not less than the preset overflow threshold. The system can realize the periodic diagnosis on the counting state of the counter in the network chip by using a packet generator and a message processing engine, so as to prevent the processor from constantly sampling the counter to check the state of the counter, and ensure the calculation performance of the processor. | 03-03-2016 |
20160070610 | SEMICONDUCTOR DEVICE - A semiconductor device includes a counter configured to increment a counter value each predetermined time period, a register storing values including a first value and a second value that is smaller than the first value, and a comparator configured to compare the counter value with the stored values, output a first signal to an external device if the counter value is greater than the first value when an initialization command is received from the external device, and set a flag in the register if the counter value is greater than the second value and smaller than the first value when the initialization command is received. | 03-10-2016 |
20160110276 | GENERATION AND APPLICATION OF STRESSMARKS IN A COMPUTER SYSTEM - One aspect is a method that includes analyzing, by a processor of an analysis system, an instruction set architecture of a targeted complex-instruction set computer (CISC) processor to generate an instruction set profile for each CISC architectural instruction variant of the instruction set architecture. A combination of instruction sequences for the targeted CISC processor is determined from the instruction set profile that corresponds to a desired stressmark type. The desired stressmark type defines a metric representative of functionality of interest of the targeted CISC processor. Performance of the targeted CISC processor is monitored with respect to the desired stressmark type while executing each of the instruction sequences. One of the instruction sequences is identified as most closely aligning with the desired stressmark type based on performance results of execution of the instruction sequences with respect to the desired stressmark type. | 04-21-2016 |
20160110278 | PROCESSOR STRESSMARKS GENERATION - One aspect is a method that includes analyzing, by a processor of an analysis system, an instruction set architecture of a targeted processor to generate an instruction set profile for each instruction of the instruction set architecture. A combination of instruction sequences for the targeted processor is determined from the instruction set profile that corresponds to a desired stressmark type. The desired stressmark type defines a metric representative of functionality of interest of the targeted processor. Performance of the targeted processor is monitored with respect to the desired stressmark type while executing each of the instruction sequences. One of the instruction sequences is identified as most closely aligning with the desired stressmark type based on performance results of execution of the instruction sequences with respect to the desired stressmark type. | 04-21-2016 |
20160132375 | METHOD FOR DETECTING THE IMPENDING ANALYTICAL FAILURE OF NETWORKED DIAGNOSTIC CLINICAL ANALYZERS - A method of detecting impending analytical failure in a networked diagnostic clinical analyzer is based upon detecting whether the operation of a particular analyzer is statistically distinguishable based on one or more thresholds. A failure occurs when one or more components or modules of the analyzer fails. A method to detect such an impending failure is disclosed. Baseline data on a pre-selected set of analyzer variables for a population of diagnostic clinical analyzers is used to generate an impending failure threshold. Subsequently, operational data comprising the same pre-selected set of analyzer variables allows generation of a time series of operational statistics. If the operational statistic exceeds the impeding failure threshold in a prescribed manner, an impending analytical failure is predicted. Such detection of impending analytical failures facilitates intelligent scheduling of service for the analyzer in question to maintain high assay throughput and accuracy. | 05-12-2016 |
20160139972 | REDUNDANT ENCODING - Analyzing data is disclosed. Error events are tracked. The error events are classified based on a number of errors included in each event. A desired level of error event to be able to be corrected in order to maintain an acceptable rate of uncorrected errors is determined. A redundancy level is selected so that new error events corresponding to the desired level of error event or a lower level of error event are corrected. | 05-19-2016 |
20160154721 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND MONITORING METHOD | 06-02-2016 |
20160162383 | Monitoring Redundant Components - A device for monitoring a component has at least one processor core and a further processor core. The device further includes a determining unit configured to determine a profile of the processor core, the profile being influenced by an input signal applied to the processor core, and to determine a further profile of the further processor core, the further profile being influenced by a further input signal applied to the further processor core. The device further includes a comparison unit configured to compare the profile and the further profile and to generate a fault signal, if a comparison result of a comparison carried out by the comparison unit indicates defective similarity of the profile to the further profile. | 06-09-2016 |
20160179602 | END OF LIFE PREDICTION TO REDUCE RETENTION TRIGGERED OPERATIONS | 06-23-2016 |
20160179650 | INSTRUCTION AND LOGIC FOR TRACKING ACCESS TO MONITORED REGIONS | 06-23-2016 |
20160196171 | METHOD AND SYSTEM FOR ADJUSTING THE MAXIMUM DURATION OF TIME-CRITICAL FUNCTIONS | 07-07-2016 |
20160203039 | LINK SPEED DOWNSHIFTING FOR ERROR DETERMINATION AND PERFORMANCE ENHANCEMENTS | 07-14-2016 |
20160253230 | METHOD AND APPARATUS FOR PREDICTING GPU MALFUNCTIONS | 09-01-2016 |
20170235620 | PREDICTIVE MONITORING SYSTEM AND METHOD | 08-17-2017 |
20170235622 | SYSTEM AND METHOD TO ASSESS INFORMATION HANDLING SYSTEM HEALTH AND RESOURCE UTILIZATION | 08-17-2017 |
20170235659 | ANALYSIS DEVICE FOR ANALYZING PERFORMANCE INFORMATION OF AN APPLICATION AND A VIRTUAL MACHINE | 08-17-2017 |
20180025624 | SYSTEMS AND METHODS TO PREVENT CARWASH COLLISIONS | 01-25-2018 |
20190146860 | METHOD OF DETECTING FAULTS IN A FAUT TOLERANT DISTRIBUTED COMPUTING NETWORK SYSTEM | 05-16-2019 |
20190146864 | DYNAMIC ADJUSTMENTS WITHIN MEMORY SYSTEMS | 05-16-2019 |