Patent classifications
G06F11/3089
USING MEMORY DEVICE SENSORS
Systems, apparatuses, and methods related to using memory device sensors are described. Some memory system or device types include sensors embedded in their circuitry. For instance, another device can be coupled to a memory device with an embedded sensor. The memory device can transmit a signal representing sensor data generated by the embedded sensor using a sensor output coupled to the other device. A controller coupled to a memory device may determine one or more threshold values of a sensor or sensors embedded in a memory device. The memory device may transmit an indication responsive to one or more sensors detecting a value greater or less than a threshold and may transmit the indication to another device.
SECURITY DEVICE TO PROTECT ACTIVE COMMUNICATION PORTS
The present disclosure pertains to systems and methods to monitor communication ports. In one embodiment, a system may include a first interface to connect to a first host device and a second interface to connect to a second host device. The first interface and the second interface may include a plurality of channels to enable communication between the first host device and the second host device. Control logic may monitor a power channel between the first host device and the second host device and a communication channel between the first host device and the second host device. The control logic may detect an interruption of at least one of the power channel or the communication channel. In response to the interruption, the control logic may disable communication between the first host device and the second host device.
DATA CENTER SELF-HEALING
Systems and methods for data center operational monitoring are disclosed. In at least one embodiment, a root cause for one or more data center component failures is determined based, at least in part, upon data from one or more sensors.
Method and system for distributing application for edge computing devices
A method for distributing an application for an edge computing device performed by a computing device according to an embodiment of the present invention includes selecting a cluster including two or more edge devices from among a plurality of edge devices, distributing a first application to a second edge device included in the cluster, modifying routing information such that a service request incoming to a first edge device included in the cluster is transmitted to the second edge device, and replacing the first application running in the first edge device with a second application.
Systems and methods for continuous data protection
Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
VEHICULAR CONTROL SYSTEM
A vehicular control system includes a plurality of electronic control units (ECUs), each providing a respective quantity of computational units representative of an amount of processing power of the respective ECU. The ECUs operate a vehicle in a nominal autonomous operational mode when a sum of the quantity of computational units exceeds a threshold. The system, while the ECUs operate the vehicle in the nominal autonomous operational mode, and responsive to detecting a failure of one of the ECUs, determines whether a sum of the quantity of computational units of the remaining ECUs that do not have a failure exceeds the threshold. The ECUs, responsive to the system determining that the sum of the quantity of computational units of the remaining ECUs fails to exceed the threshold, switches from operating the vehicle in the nominal autonomous operational mode to operating the vehicle in a degraded autonomous operational mode.
Security device, network system, and fraud detection method
A security device connected to a plurality of networks in a vehicle is provided. The security device determines, with regard to a frame received from a first network, whether to transmit a determination request for the frame outside the vehicle. The security device transmits the determination request outside the vehicle in a case where it is determined to transmit the determination request outside the vehicle, transmits, before obtaining a determination result from outside the vehicle in accordance with the determination request, the frame to a second network, and then obtains determination results from outside the vehicle in accordance with the determination request. The security device outputs presentation information in accordance with the determination result.
MANAGING VEHICLE OPERATOR PROFILES BASED ON TIERS OF TELEMATICS INFERENCES VIA A TELEMATICS MARKETPLACE
Method, system, device, and non-transitory computer-readable medium for data management. In some examples: a computer-implemented method includes: collecting a plurality of personal data sets continually; collecting a plurality of sensor data sets continually via one or mote sensing modules; for each vehicle operator of the plurality of vehicle operators; generating and continually updating an operator profile; determining and continually updating one or hums telematics inferences; generating and continually a data profile, assigning and continually updating an operator tier; and listing and continually updating the data profile onto a telematics marketplace according to the operator tier, receiving an information request for one or more operator profiles; and transmitting the one or more operator profiles to the requesting party.
Efficient configuration of scenarios for event sequencing
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for initiating actions based on sequences of events. In one aspect, a process includes receiving, from each of multiple devices, data specifying an event detected by the device. The events are compared to configured scenarios that each specify a sequence of trigger events and an action to be initiated in response to detecting the sequence of trigger events. A determination is made that the events match a first scenario of the scenarios. In response to determining that the events detected by the multiple devices match the first scenario, a first action specified by the first scenario is initiated. A determination is made that a combination of one or more of the events detected by the multiple devices and the first action matches a second scenario. In response, a second action specified by the second scenario is initiated.
APPARATUS AND METHOD FOR DETERMINING THE UNDERLYING CAUSE OF USER EXPERIENCE DEGRADATION
An apparatus for determining candidate causes of a user experience degradation includes a data collection agent to collect inventory data associated with a managed computer system, a change recording system to process the inventory data and determine any changes and to record change records including time-stamps, an alert detection system to detect alerts (alarms and sensors) including time-duration information and storing alert records, an analysis module to select alert records based on whether the alert, using the time-duration information, occurred in a predetermined lookback period, and identify, for each selected alert records, corresponding change records that precede in time the selected alert records. A user reporting interface outputs the identified change records as the candidate causes. A plurality of managed computers includes condensing agents to transmit respective alert and change records to a master computer system for correlation analysis, and outputting candidate causes based upon the analysis.