G06F11/3089

Sensor device, sensor device management system, and sensor device management method

A processor of a sensor device performs measurement processing by one or a plurality of sensors and transmission processing of sensor data generated by the measurement processing. The sensor device includes a processing routine table that stores a processing routine configured to include, corresponding to an identifier for identifying processing performed by a processor, a type of the processing, an execution trigger of the processing, and trigger information that prescribes a trigger for transmitting the sensor data. The processor controls processing in a processing routine of the processing routine table, based on trigger information, so that the sensor data subjected to measurement processing is immediately transmitted, or temporarily stored in a buffer and transmitted after a predetermined time.

SOFTWARE PLACEMENT SYSTEM, SOFTWARE PLACEMENT DEVICE, SOFTWARE PLACEMENT METHOD, BASE COMPUTER AND PROGRAM
20220413834 · 2022-12-29 ·

A software placement device of a software placement system includes an information acquiring unit configured to acquire a finally-found location and a finally-found time, a deployment destination determining unit configured to calculate a data presence probability indicating a probability of a search target being detected at a certain time using the finally-found location and the finally-found time, to calculate a total cost using the data presence probability calculated and a computational cost and a network cost of each of base computers, and to select a base computer and a time interval for which the calculated total cost is a minimum, and a software distributing unit configured to distribute software to the selected base computer and transmit an analysis instruction for data of the selected time interval to the selected base computer.

MANAGING COMPUTE RESOURCES AND RUNTIME OBJECT LOAD STATUS IN A PLATFORM FRAMEWORK

Embodiments of systems and methods for managing compute resources and runtime object load status in a platform framework are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive, at a platform framework via an Application Programming Interface (API), an arbitration policy; notify an application, by the platform framework via the API, of a state change with respect to the arbitration policy based upon a change in context; receive, at the platform framework from the application via the API, an identification of at least one compute resource to execute a workload associated with the arbitration policy; and offload the workload to the compute resource.

Method and device for monitoring server based on recordings of data from sensors, and non-transitory storage medium

A method for monitoring multiple servers in one or more server clusters includes collecting and recording sensor data (SDR data) and storing the SDR as a predetermined file format into a specified storage area. The SDR stored in the specified storage area is analyzed according to a predetermined analysis rule to determine whether the SDR comprises data indicating abnormal functioning on a moment-by-moment basis SDR. When the SDR indicates an abnormality, SDR warning information corresponding to the abnormality SDR is outputted. A server monitoring device utilizing the method and a non-transitory storage medium are also provided.

Real-time database performance tuning

Techniques are described for enabling real-time database performance measurement and tuning in a service provider network. To efficiently test one or more proposed configuration changes to a database in a service provider network, a database service is able to create a replicated copy of the database in an environment that mirrors that of the primary database. The database service then automatically causes database traffic destined for the primary database to be routed to both the primary database and the test database. Once the test database is created and traffic is routed to both databases, the database service obtains performance data by monitoring performance of both the primary database and the test database over a period of time. Based on the obtained performance database, the database service can automatically determine which of the primary database and the test database is exhibiting better performance.

SERVER AND APPLICATION MONITORING
20220405115 · 2022-12-22 ·

A system for monitoring server and application events, metrics or topology of an airport management system in a cloud infrastructure environment. The adapter can be coupled to a vROPS API of the cloud infrastructure environment and arranged to issue requests for data to the network via the vROPS API. The adapter can include a means for issuing multiple initial requests. The adapter can include a means for receiving initial responses to the multiple initial requests. The adapter can include a means for issuing multiple subsequent requests in response to each initial response. The adapter can include a means for receiving subsequent responses to the subsequent requests. The adapter can include a means for processing the subsequent responses related to each resource ID to provide events, metrics or topology information. The adapter can include a means for delivering the events, metrics or topology information to a user display system.

DYNAMIC REMOTE COLLECTION OF SUPPLEMENTAL DIAGNOSTIC DATA AND TRIGGERING OF CLIENT ACTIONS FOR CLIENT SOFTWARE APPLICATION

A system and method for sampling telemetry events are provided. The method includes monitoring, using at least one listening module, execution of instructions by a processor, identifying, using the at least one listening module, one or more unique tags, determining, based on one or more trigger conditions, if the one or more unique tags is associated with at least one of the one or more trigger conditions, wherein the one or more trigger conditions are dynamically modifiable via a remote device, obtaining, based on the determination, a portion of a stack data structure associated with the execution of the instructions by the processor; and performing, based on the determination, at least one action.

Blood treatment systems and methods

Dialysis systems comprising actuators that cooperate to perform dialysis functions and sensors that cooperate to monitor dialysis functions are disclosed. According to one aspect, such a hemodialysis system comprises a user interface model layer, a therapy layer, below the user interface model layer, and a machine layer below the therapy layer. The user interface model layer is configured to manage the state of a graphical user interface and receive inputs from a graphical user interface. The therapy layer is configured to run state machines that generate therapy commands based at least in part on the inputs from the graphical user interface. The machine layer is configured to provide commands for the actuators based on the therapy commands.

Systems, methods, and apparatuses for resource monitoring

Systems, methods, and apparatuses for resource monitoring identification reuse are described. In an embodiment, a system comprising a hardware processor core to execute instructions storage for a resource monitoring identification (RMID) recycling instructions to be executed by a hardware processor core, a logical processor to execute on the hardware processor core, the logical processor including associated storage for a RMID and state, are described.

MECHANISMS FOR SECURE USER INPUT
20220398336 · 2022-12-15 ·

Methods, apparatuses, and systems for secure data input mechanisms are described herein. An example method comprises monitoring a user interface presented on a display of a mobile device, identifying an input field of the application shown within the display, and adjusting operation of the mobile device in response to entry of data within the input field, the adjusting operation occurring via an input method, the input method changing at least one characteristic of the mobile device indicative of entry of data with use of the mobile device, so as to prevent acquisition of the data by a malicious application installed on the mobile device.