Patent classifications
G06F11/32
TECHNIQUES FOR IMPLEMENTING ROLLBACK OF INFRASTRUCTURE CHANGES IN A CLOUD INFRASTRUCTURE ORCHESTRATION SERVICE
Techniques for implementing rollback of infrastructure changes in an infrastructure orchestration service are described. In certain examples, an infrastructure orchestration service is disclosed that manages both provisioning and deploying of infrastructure assets within a cloud environment. The service receives a plan comprising a set of instructions associated with a set of infrastructure assets of an execution target and identifies a first state of the set of infrastructure assets. The service executes the set of instructions in the plan to achieve a second state for the set of infrastructure assets. Based in part on the executing, the service receives a trigger for rolling back the plan to restore the set of infrastructure assets in the plan to the first state and executes a rollback plan for the plan. The service then transmits a result associated with the execution of the rollback plan.
ERROR HANDLING RECOMMENDATION ENGINE
Systems and methods are disclosed herein for recommending solutions to execution errors of software packages. An error message related to compilation or execution of computer code is received and, based on a vector representation of the error message and vector representations corresponding to message threads from one or more collaborative messaging systems, a set of message threads that match the error message is identified. Furthermore, a known error message that matches the set of message threads is identified and updated computer code is generated based on the known error message. The updated computer code is then provided to a client device.
SYSTEM AND METHOD FOR CONFIGURING A SERVER DISPLAY
In one aspect, an example methodology implementing the disclosed techniques can include, by a baseboard management controller (BMC), responsive to a virtual console of a server being launched on a client device via the BMC, collecting one or more environment parameters of the client device and collecting one or more environmental parameters of the server. The method can also include, by the BMC, determining an appropriate display configuration for the server based on an analysis of the one or more environment parameters of the client device and the one or more environmental parameters of the server and configuring a display configuration of the server in accordance with the determined appropriate display configuration.
Low-latency direct cloud access with file system hierarchies and semantics
Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications. For instance, POSIX interfaces and semantics may be layered on cloud-based storage, while providing access to data in a manner consistent with file-based access with data organization in name hierarchies. Various embodiments also may provide for memory mapping of data so that memory map changes are reflected in persistent storage while ensuring consistency between memory map changes and writes. For example, by transforming a ZFS file system disk-based storage into ZFS cloud-based storage, the ZFS file system gains the elastic nature of cloud storage.
Memory device with status feedback for error correction
Methods, systems, and devices for a memory device with status feedback for error correction are described. For example, during a read operation, a memory device may perform an error correction operation on first data read from a memory array of the memory device. The error correction operation may generate second data and an indicator of a state of error corresponding to the second data. In one example, the indicator may indicate one of multiple possible states of error. In another example, the indicator may indicate a corrected error or no detectable error. The memory device may output the first or second data and the indicator of the state of error during a same burst interval. The memory device may output the data on a first channel and the indicator of the state of error on a second channel.
Method and system for indicating BIOS POST status from a chassis identifying LED
A system and method for providing status information during a power-on self-test routine. The system includes a basic input output system operable to execute the power-on self-test routine and output the status of the power-on self-test routine. The system includes an externally visible indicator such as a server chassis identify LED. A controller is coupled to the basic input output system and the externally visible indicator. The controller is operable to receive the status from the basic input output system, and to control the externally visible indicator in response to the status received from the basic input output system.
Method and system for analytics of data from disparate sources
A system and process extract software application performance data from disparate ownership sources and make the various source data compatible for comparison data. A software application's performance in the marketplace may be compared to other applications in a same group with comparable data information. A M2M (mobile-to-mobile) technology is an interface layer connection to a backend server that builds machine learning pipelines and may use artificial intelligence to turn massive datasets into identifiable patterns, algorithms and statistical models. This layer is capable of cleaning, aggregating, and organizing data from disparate sources to produce meaningful conclusions to complex problems to inform strategic business decisions.
Facility management systems and methods thereof
A facility management system comprises a server, a biometric identification unit, and a processing circuit. The server is configured to store a list of registered users, and biometric information and access rights pertaining to each registered users. The biometric identification unit is associated with the building equipment. The biometric identification unit is enabled to facilitate a user desiring access to the associated building equipment to scan at least one biometric parameter, and subsequent to scanning of the biometric parameter the biometric identification unit is configured to generate a scanned biometric information. The processing circuit is communicatively coupled with the server and the biometric identification unit, and is configured to: authenticate the user based on the biometric information and the scanned biometric information; determine the access rights for the authenticated user; and subsequently provide access to the authenticated user to operate the associated building equipment based on the determined access rights.
Classifying images utilizing generative-discriminative feature representations
The present disclosure relates to systems, non-transitory computer-readable media, and methods for classifying an input image utilizing a classification model conditioned by a generative model and/or self-supervision. For example, the disclosed systems can utilize a generative model to generate a reconstructed image from an input image to be classified. In turn, the disclosed systems can combine the reconstructed image with the input image itself. Using the combination of the input image and the reconstructed image, the disclosed systems utilize a classification model to determine a classification for the input image. Furthermore, the disclosed systems can employ self-supervised learning to cause the classification model to learn discriminative features for better classifying images of both known classes and open-set categories.
Homomorphic Encryption-Based Testing Computing System
A homomorphic encryption-based testing computing system provides a risk-based, automated, one-directional push of production data through a homomorphic encryption tool and distributes the encrypted data to use in testing of applications. Data elements and test requirements are considered when automatically selecting a homomorphic encryption algorithm. A decisioning component selects an algorithm to use to homomorphically encrypt the data set and a push mechanism performs one or both of the homomorphic encryption and distribution of the encrypted data set to at least one intended host. Once delivered, the testing software and/or testing procedures proceed using the encrypted data set, where results of the testing may be stored in a data store. A validation mechanism may validate the test data against production data and communicates whether testing was successful.