Patent classifications
G06F11/30
Synchronous replication of high throughput streaming data
A method for synchronous replication of stream data includes receiving a stream of data blocks for storage at a first storage location associated with a first geographical region and at a second storage location associated with a second geographical region. The method also includes synchronously writing the stream of data blocks to the first storage location and to the second storage location. While synchronously writing the stream of data blocks, the method includes determining an unrecoverable failure at the second storage location. The method also includes determining a failure point in the writing of the stream of data blocks that demarcates data blocks that were successfully written and not successfully written to the second storage location. The method also includes synchronously writing, starting at the failure point, the stream of data blocks to the first storage location and to a third storage location associated with a third geographical region.
System and method for optimizing network topology in a virtual computing environment
A computer network optimization methodology is disclosed. In a computer-implemented method, components of a computing environment are automatically monitored, and have a feature selection analysis performed thereon. Provided the feature selection analysis determines that features of the components are in frequent communication and generating network latency. Provided the feature selection analysis determines that features of the components are not well defined, a similarity analysis of the features is performed. Results of the feature selection methodology are generated, and the components involved in the network traffic latency are reassigned to migrate the latency.
Selectively enabling features based on rules
Aspects of the present disclosure involve a system and method for performing operations comprising providing to a client device, a messaging application comprising multiple features; accessing a configuration rule that associates a device property rule with a feature; determining at a first point in time, that a property of the client device matches the device property rule associated with the configuration rule; in response to determining that the property of the client device matches the device property rule associated with the configuration rule, enabling the feature on the client device at the first point in time; receiving an updated property of the client device at a second point in time; and in response to determining that the updated property of the client device fails to match the device property rule associated with the configuration rule at the second point in time, disabling the feature on the client device.
Maintenance command interfaces for a memory system
Methods, systems, and devices for maintenance command interfaces for a memory system are described. A host system and a memory system may be configured according to a shared protocol that supports enhanced management of maintenance operations between the host system and memory system, such as maintenance operations to resolve error conditions at a physical address of a memory system. In some examples, a memory system may initiate maintenance operations based on detections performed at the memory system, and the memory system may provide a maintenance indication for the host system. In some examples, a host system may initiate maintenance operations based on detections performed at the host system. In various examples, the described maintenance signaling may include capability signaling between the host system and memory system, status indications between the host system and memory system, and other maintenance management techniques.
Dynamic generation of instrumentation locators from a document object model
Systems for web page or web application instrumentation. Embodiments commence upon identification of a computer-readable user interface description comprising at least some markup language conforming to a respective document object model that is codified in a computer-readable language. An injector process modifies the user interface description by inserting markup text and code into the user interface description, where the inserted code includes instrumentation code to invoke dynamic generation of instrumentation locator IDs using the hierarchical elements found in the document object model. The modified computer-readable interface description is transmitted to a user device. Log messages are emitted upon user actions taken while using the user device. The log messages comprise the instrumentation locator IDs that are formed using hierarchical elements found in the document object model.
Dynamic generation of instrumentation locators from a document object model
Systems for web page or web application instrumentation. Embodiments commence upon identification of a computer-readable user interface description comprising at least some markup language conforming to a respective document object model that is codified in a computer-readable language. An injector process modifies the user interface description by inserting markup text and code into the user interface description, where the inserted code includes instrumentation code to invoke dynamic generation of instrumentation locator IDs using the hierarchical elements found in the document object model. The modified computer-readable interface description is transmitted to a user device. Log messages are emitted upon user actions taken while using the user device. The log messages comprise the instrumentation locator IDs that are formed using hierarchical elements found in the document object model.
Anomaly detection for cloud applications
Requests are received for handling by a cloud computing environment which are then executed by the cloud computing environment. While each request is executing, performance metrics associated with the request are monitored. A vector is subsequently generated that encapsulates information associated with the request including the text within the request and the corresponding monitored performance metrics. Each request is then assigned (after it has been executed) to either a normal request cluster or an abnormal request cluster based on which cluster has a nearest mean relative to the corresponding vector. In addition, data can be provided that characterizes requests assigned to the abnormal request cluster. Related apparatus, systems, techniques and articles are also described.
Device telemetry control
Various example embodiments for supporting device telemetry control are presented. Various example embodiments may provide a customer of a device, which is monitoring the device based on device telemetry whereby the device exposes device data of the device based on device telemetry control information of the device such that the data of the device may be accessed by the customer, with control over device telemetry of the device. Various example embodiments may provide a customer, which may access device data of a device based on device telemetry supported by the device, with additional control over access to the device data of the device via device telemetry by providing the customer with control over the device telemetry including enabling the customer to insert customer device telemetry control information into the device telemetry control information of the device that controls device telemetry on the device.
Disk drive failure prediction with neural networks
Techniques are described herein for predicting disk drive failure using a machine learning model. The framework involves receiving disk drive sensor attributes as training data, preprocessing the training data to select a set of enhanced feature sequences, and using the enhanced feature sequences to train a machine learning model to predict disk drive failures from disk drive sensor monitoring data. Prior to the training phase, the RNN LSTM model is tuned using a set of predefined hyper-parameters. The preprocessing, which is performed during the training and evaluation phase as well as later during the prediction phase, involves using predefined values for a set of parameters to generate the set of enhanced sequences from raw sensor reading. The enhanced feature sequences are generated to maintain a desired healthy/failed disk ratio, and only use samples leading up to a last-valid-time sample in order to honor a pre-specified heads-up-period alert requirement.
Gateway conformance validation
A patient record gateway of an electronic health record system can be validated using a conformance statement that defines capabilities and characteristics of patient record servers associated with the gateway. Part of validating the patient record gateway includes performing a configuration test of the patient record gateway using the conformance statement.