G06F2201/835

ENHANCED APPLICATION PERFORMANCE FRAMEWORK

This document describes a framework for measuring and improving the performance of applications, such as distributed applications and web applications. In one aspect, a method includes performing a test on an application. The test includes executing the application on one or more computers and, while executing the application, simulating a set of workload scenarios for which performance of the application is measured during the test. While performing the test, a set of performance metrics that indicate performance of individual components involved in executing the application during the test is obtained. A knowledge graph is queried using the set of performance metrics. The knowledge graph links the individual components to corresponding performance metrics and defines a set of hotspot conditions that are each based on one or more of the corresponding performance metrics for the individual components. A given hotspot condition is detected based on the set of performance metrics.

Generating Datasets Using Approximate Baselines
20220405302 · 2022-12-22 ·

Generating datasets using approximate baselines including receiving, by a source storage system, an instruction to create, on a target storage system, a current snapshot for a source dataset stored on the source storage system, wherein no snapshots for the source dataset exist on the target storage system; selecting, as a baseline dataset, a similar dataset from a plurality of datasets on the source storage system with an existing snapshot on the target storage system, wherein the similar dataset comprises at least a portion of the source dataset; instructing the target storage system to generate a baseline snapshot for the source dataset using a copy of the existing snapshot of the baseline dataset; and transferring, from the source storage system to the target storage system, only a difference between the baseline dataset and the source dataset.

METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR DATA PROCESSING
20220405184 · 2022-12-22 ·

Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data processing. The method described herein includes determining identification information for an operation, wherein the identification information includes at least one field indicating content of the operation and a field indicating a unique identification of the operation. The method further includes identifying, based on the identification information, log entries for the operation in log files for at least one microservice invoked by the operation. The method further includes determining a log for the operation, wherein the log includes the identified log entries. With the solution for data processing of the present application, it is possible to easily acquire logs for an operation using identification information that includes a field indicating the content of the operation, so as to facilitate targeted analysis of the operation based on the content of the operation.

Non-blocking secondary reads
11531595 · 2022-12-20 · ·

Described herein are embodiments of a database system. The database system receives a read command to read at least some stored data. The database system may generate a plurality of snapshots of data stored in a first data storage node of a plurality of data storage nodes. The database system may determine whether data is being written to the first data storage node. Responsive to determining that data is not being written to the first data storage node, the database system may process the read command at least in part by reading at least some data stored on the first data storage node. Responsive to determining that data is being written to the first data storage node, the database system may process the read command at least in part by reading at least some data from a snapshot of the plurality of snapshots.

Distributed Application Orchestration Management in a Heterogeneous Distributed Computing Environment

Distributed application orchestration management is provided. A first passive member of a set of passive members sends a notification message to other members indicating that the first passive member is initiating start of a distributed application in response to the first passive member validating that a self-restart by a leader member failed. The first passive member compares timestamps associated with an attempt to start the distributed application by other passive members in the set of passive members. The first passive member stops a particular attempt to start the distributed application in response to the first passive member determining that a timestamp associated with the particular attempt to start the distributed application by the first passive member is newer than another timestamp of another passive member. The first passive member designates the other passive member having an older timestamp as a new leader member to continue starting the distributed application.

UPDATED DRIVER PARAMETERS DETERMINED BY TELEMETRY DATA

A computing system is provided. The computing system includes a server having one or more processors configured to receive from a user computing device run-time telemetry data, the run-time telemetry data being recorded during execution of a target program of a plurality of programs by the user computing device and being indicative of communication between the user computing device and a user input device. The one or more processors are further configured to determine a performance metric based on the run-time telemetry data, determine an updated driver parameter for the target program based on the determined performance metric, send the updated driver parameter to the user computing device, and apply the updated driver parameter for use during a subsequent execution of the target program.

METHOD AND SYSTEM FOR MANAGING WARRANTY CLAIMS ASSOCIATED WITH INFORMATION HANDLING SYSTEMS

Techniques described herein relate to a method for deploying workflows with data management services. The method may include identifying, by a warranty measuring model associated with an information handling system, a first change event associated with the information handling system; obtaining first change information associated with the first change event; making a first determination that the first change event is not associated with an entry of a warranty audit table (WAT); generating a new WAT entry in the WAT using the first change information and an initial timestamp; identifying, by a warranty measuring model, a second change event associated with the information handling system; obtaining second change information associated with the second change event; making a second determination that the second change event is associated with an existing WAT entry of the WAT; updating the existing WAT entry using the second change information and a final timestamp.

CUSTOM BASEBOARD MANAGEMENT CONTROLLER (BMC) FIRMWARE STACK WATCHDOG SYSTEM AND METHOD

An Information Handling System (IHS) includes multiple hardware devices, and a baseboard Management Controller (BMC) in communication with the plurality of hardware devices. The BMC includes a first processor for executing a custom BMC firmware stack, and transmitting a watchdog message at an ongoing basis. The BMC also includes a second processor for receiving the watchdog message. When the watchdog message is received within a specified elapsed period of time, allow continued operation of the custom BMC firmware stack, and when not received within the specified elapsed period of time, place the BMC in a failsafe mode of operation.

INTELLIGENT SUPPORT BUNDLE COLLECTION

A method and system for intelligent support bundle collection. A support bundle may refer to a set of log files pertinent to components of a computing system, which may generally be created when issues or problems plaguing the computing system need to be triaged by technical support teams. Further, at least presently and for any complex computing system, a support bundle may include a plethora of log files that are not all necessary for assessing and/or resolving the aforementioned issues or problems. Accordingly, to reduce the set of log files, as well as minimize the storage space, processing time, and network bandwidth associated with handling the log files, the disclosed method and system propose intelligently selecting a subset of the log files relevant to a given user-defined issue or problem. Selection of the subset of log files may employ natural language processing (NLP) based machine learning, as well as runtime rules to collect dynamic, problem-specific log files.

Data correlation using file object cache
11526371 · 2022-12-13 · ·

Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a file system.