G06F11/0793

Enhanced in-system test coverage based on detecting component degradation

In various examples, permanent faults in hardware component(s) and/or connections to the hardware component(s) of a computing platform may be predicted before they occur using in-system testing. As a result of this prediction, one or more remedial actions may be determined to enhance the safety of the computing platform (e.g., an autonomous vehicle). A degradation rate of a performance characteristic associated with the hardware component may be determined, detected, and/or computed by monitoring values of performance characteristics over time using fault testing.

Optimizing hardware replacement using performance analytics

A solution is disclosed for computer hardware replacement using performance analytics that selects replacement computer hardware based on actual user needs and enterprise priorities. Key performance data is collected and compared with various baselines, thereby identifying hardware that is performing below acceptable levels. Enterprise data and collected data are received from an instrumented operating system on a computing device. The collected data includes boot performance, application performance, and hardware performance. Based at least on the collected data, a usability score is determined by performing a weighted calculation on the collected data. Based at least on the usability score and the enterprise data, it is determined whether a score improvement is required. Based at least on the enterprise data, a score improvement selection is determined. The score improvement selection is reported based at least on determining that a score improvement is required.

Approximate matching
11693860 · 2023-07-04 · ·

A first set of subconditions is obtained. Approximate matching of the first set of subconditions against a plurality of sets of subconditions is performed. A second set of subconditions among the plurality of sets of subconditions is accessed, wherein a representation of a subcondition in the first set and/or the second set of subconditions comprises a value having one of a plurality of states, and wherein the plurality of states comprises a state of “don't care”. The first set of subconditions is approximately matched against the second set of subconditions. The first set of subconditions is compared against the second set of subconditions. A matching criterion is determined to be met based on a result of the matching. Information indicating that the second set of subconditions is at least an approximate match for the first set of subconditions is output.

Automatic ransomware detection with an on-demand file system lock down and automatic repair function

A method and system for detecting ransomware and repairing data following an attack. The method includes, collecting file statistics for files in a file system, identifying an affected file based on collected file statistics, locking down of access to the file system in response to identifying the affected file, undoing of reconcile processing, repairing the affected files, and unlocking access to the file system. The system includes a computer node, a file system, a plurality of disc storage components, a backup client, a backup client, and a hierarchical storage client. The hierarchical storage client is configured to collect file statistics for files in file system, identify affected files based on collected file statistics for the file, lock down of access to the file system in response to an identified affected file, undo reconcile processing, repair the affected file; and unlock access to the file system.

Bit error rate estimation and error correction and related systems, methods, devices

Physical layer devices and related methods for determining Bit Error Rates (BERs) and correcting errors in signals received through shared transmission media of wireless local area networks are disclosed. A physical layer device is configured to identify coding violations in received signal, determine a rate of the coding violations in the signal, and estimate a BER of the signal to be equal to the determined rate of the coding violations. A physical layer device is configured to invert a half symbol immediately preceding or immediately following a coding violation based, at least in part, on signal integrities of the half symbol immediately preceding and the half symbol immediately following the coding violation to correct a bit error.

Techniques for preventing concurrent execution of declarative infrastructure provisioners

Techniques for preventing concurrent execution of an infrastructure orchestration service are described. Worker nodes can receive instructions, or tasks, for deploying infrastructure resources and can provide heartbeat notifications to scheduler nodes, also considered a lease. A signing proxy can track the heartbeat notifications sent from the worker nodes to the scheduler node. The signing proxy can receive requests corresponding to a performance of the tasks assigned to the worker nodes. The signing proxy can determine whether the lease between each worker node and the scheduler is valid. If the lease is valid, the signing proxy may make a call to services on behalf of the worker node, and if the lease is not valid, the signing proxy may not make a call to services on behalf of the worker node. Instead, the signing proxy may cut off all outgoing network traffic, blocking access of the worker node to services.

Generation of an issue response analysis evaluation regarding a system aspect of a system

A method includes determining, by an analysis system, a system aspect of a system for an issue response analysis evaluation. The method further includes determining, by the analysis system, at least one evaluation perspective and at least one evaluation viewpoint for use in performing the issue response analysis evaluation on the system aspect. The method further includes obtaining, by the analysis system, issue response analysis data regarding the system aspect in accordance with the at least one evaluation perspective and the at least one evaluation viewpoint. The method further includes calculating, by the analysis system, an issue response analysis rating as a measure of system issue response analysis maturity for the system aspect based on the issue response analysis data, the at least one evaluation perspective, the at least one evaluation viewpoint, and at least one evaluation rating metric.

Fast memory mapped IO support by register switch
11693722 · 2023-07-04 · ·

The technology disclosed herein enhances a fault-based communication channel between a virtual machine and a hypervisor. An example method may include: configuring, by a hypervisor, a first memory location to generate one or more faults when accessed by a virtual machine process, wherein the first memory location is mapped to a device and a second memory location is mapped to memory; detecting, by the hypervisor, a fault caused by a first execution of an instruction of the virtual machine process, wherein the instruction comprises a reference to a register comprising the first memory location; responsive to the detecting the fault, the hypervisor performing a computing task for the virtual machine process and updating the register to comprise the second memory location; and initiating, by the hypervisor, a second execution of the instruction of the virtual machine process, wherein the second execution of the instruction accesses the second memory location.

Methods and systems for reducing volumes of log messages sent to a data center
11693918 · 2023-07-04 · ·

Computer-implemented methods and systems described herein are directed to reducing volumes of log messages sent from edge systems to a data center. The computer-implemented methods performed at each edge system includes collecting a stream of log messages generated by one or more event sources of the edge system. Representative log messages of the stream of log messages are determined. The edge systems may discard non-representative log messages from data storage devices at the edge system. The representative log messages are sent from each of the edge systems to the data center where the representative log messages are received and stored in data storage devices of the data center, thereby reducing the volumes of log messages sent from the edge systems to the data center.

Handling input data errors in an autonomous vehicle
11691637 · 2023-07-04 · ·

Handling input data errors in an autonomous vehicle using predictive inputs, including: determining an error in input data for a model of a plurality of models of an automation system of the autonomous vehicle; generating predicted input data for the model; and generating, based on the predicted input data, output data for the model.