G06F11/3055

Indicating data health in a DSN memory

A method includes acquiring, by a managing unit of a dispersed storage network (DSN), storage unit status information and data object storage status information from a plurality of storage units of DSN memory of the DSN. The method further includes determining, by the managing unit, DSN status information of the DSN memory based on the storage unit status information and the data object storage status information. The method further includes identifying, by the managing unit, DSN memory issues within the DSN memory. The method further includes prioritizing, by the managing unit, corrective remedies for the DSN memory issues based on the status information of the DSN memory. The method further includes facilitating, by the managing unit, the execution of the prioritized corrective remedies to correct the DSN memory issues.

MONITORING HIGHER-LEVEL SERVICE HEALTH IN A SCALABLE WAY
20230126757 · 2023-04-27 · ·

Methods, system, and non-transitory processor-readable storage medium for higher-level service health are provided herein. An example method includes monitoring, by a monitoring tool, status metrics associated with at least one of a plurality of physical devices and a plurality of component services, where alerts generated from the monitoring tool are stored in a database associated with the monitoring tool. At least one of the component services executes on the at least one of the plurality of physical devices. A microservice identifies at least one logical service. The logical service is comprised of at least one of the plurality of physical devices, and/or at least one of the plurality of component services. The microservice determines a health metric associated with at least one logical service based on the generated alerts. The microservice transmits the health metric associated with the logical service from the microservice to the monitoring tool.

Storage system and control software deployment method

A storage system includes a plurality of storage nodes. The storage node includes: one or more storage devices which respectively provide a storage area; and one or more control software which read/write requested data from/into the corresponding storage device according to a request from a higher-level device, wherein each of the control software retains predetermined configuration information required for reading/writing requested data from/into the corresponding storage device according to a request from the higher-level device, wherein a plurality of the control software are managed as a redundancy group, and the configuration information retained in each of the control software belonging to the same redundancy group is synchronously updated, and wherein the plurality of control software configuring the redundancy group are each deployed in respectively different storage nodes so as to distribute a load of each of the storage nodes.

Preserving system integrity using file manifests
11636021 · 2023-04-25 · ·

A system is described for preserving integrity of computing devices. A manifest that uniquely identifies files on a computing device is periodically captured from the computing device. The manifest is compared against a reference manifest, which represents an ideal or clean state of the device. If the manifest comparison indicates that there have been changes to the contents of the computing device, the system can determine whether the changes constitute a compromise to the endpoint's integrity. If it is determined that a change constitutes a compromise to the endpoint's integrity, the system can perform certain remedial actions, such as sending a message to an administrator or enforcing a base layer onto the device so that the content of the device is replaced with a clean image.

Connectivity infrastructure for a telehealth platform

A secure, reliable telehealth delivery platform that also provides flexibility and scalability. The platform includes a plurality of geographically dispersed communication servers that facilitate communication sessions between remotely located patients and healthcare providers over a public communications network. The platform includes a connectivity server that manages access among users and locations. The platform also includes a monitoring server that monitors the health and usage of devices coupled to the network and proactively identifies issues requiring intervention before service interruptions occur.

Electronic device and on-device method for enhancing user experience in electronic device

Embodiments herein provide an on-device method for enhancing user experience in an electronic device. The method includes monitoring a plurality of parameters associated with an operation of the electronic device. The method includes identifying an anomaly associated with the electronic device based on the plurality of parameters associated with the operation of the electronic device and identifying a class of anomaly to which the anomaly associated with the electronic device belongs using a first on-device model. Further, the method includes presenting at least one question associated with the identified class of anomaly to user of the electronic device using on a second on-device model and receiving at least one user input for the at least one question. Furthermore, the method includes performing at least one action for enhancing the user experience based on the at least one user input for the at least one question.

Method for notifying user of operational state of web application
11474923 · 2022-10-18 · ·

Various methods, apparatuses, and media for notifying a user of an operational state of a web application are provided. Three values that relate to data caching, error occurrence, and data retrieval are used to determine the operational state. The methods may use a software module that is compatible with any React JavaScript application.

Detection of security intrusion in a computing system

Some examples relate to detecting a security intrusion in a computer system. In an example, the detection of the security intrusion may be performed by analyzing a plurality of log records generated corresponding to a plurality of milestone actions performed during invocation of an operation on the computing system, based on a rule-set. Upon detection of a deviation in the plurality of log record from the rule-set, a security action is performed.

Systems and methods for legacy source code optimization and modernization

Disclosed herein are embodiments of systems, methods, and products for modernizing and optimizing legacy software. A computing device may perform an automated runtime performance profiling process. The performance profiler may automatically profile the legacy software at runtime, monitor the memory usage and module activities of the legacy software, and pinpoint/identify a subset of inefficient functions in the legacy software that scale poorly or otherwise inefficient. The computing device may further perform a source code analysis and refactoring process. The computing device may parse the source code of the subset of inefficient functions and identify code violations within the source code. The computing device may provide one or more refactoring options to optimize the source code. Each refactoring option may comprise a change to the source code configured to correct the code violations. The computing device may refactor the source code based on a selected refactoring option.

Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem

Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem are described. In some embodiments, a client Information Handling System (IHS) may include a processor, and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the client IHS to: transmit, by a local management agent to a workspace orchestration service, an access request and context information; receive, at the local management agent from the workspace orchestration service, one or more files or policies configured to enable the local management agent to instantiate a workspace based upon a workspace definition, wherein the workspace orchestration service is configured to: (i) calculate a security target and a productivity target based upon the access request and the context information, and (ii) create the workspace definition based upon the security target and the productivity target; and instantiate the workspace.