Patent classifications
G06F11/20
Layer 7 health check automated execution framework
A method, computer readable medium, and computer network are provided for performing a synchronization operation. The method may comprise retrieving a list of network addresses of all standby servers in a standby server pool. The method may further include, using the list of network addresses, sending a health check query to each standby server in the standby server pool, and receiving response messages from the standby servers in the standby server pool. A positive response may indicate that the standby server is active in the standby server pool, and a negative response may indicate that the standby server is inactive in the standby server pool. The method may include, when any standby server returns the positive response, sending a message to an administrator. The method may further include, when every standby server returns the negative response, initiating a synchronization operation on a standby database connected to the standby servers.
METHOD AND SYSTEM FOR AUTOMATED HEALING OF HARDWARE RESOURCES IN A COMPOSED INFORMATION HANDLING SYSTEM
In general, the invention relate to providing computer implemented services using information handling systems. One or more embodiments includes after being allocated to a composed information handling system of the composed information handling systems: monitoring health of a hardware resource of the composed information handling system, making a determination, based on the monitoring of the health of the hardware resource, that the hardware resource is in a compromised state, and based on the determination, initiating a hardware replacement operation using replacement option information (ROI) for the hardware resource and replacement conditions for the hardware resource.
METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS TO MANAGE A SELF-ADAPTIVE HETEROGENEOUS EMERGENCY NETWORK (SHEN)
- Ned M. Smith ,
- Francesc Guim Bernat ,
- Satish Jha ,
- Vesh Raj Sharma Banjade ,
- Arvind Merwaday ,
- S M Iftekharul Alam ,
- Christian Maciocco ,
- Kshitij Arun Doshi ,
- Wei Mao ,
- Rath Vannithamby ,
- Srikathyayani Srikanteswara ,
- Yi Zhang ,
- Hao Feng ,
- Nageen Himayat ,
- Hosein Nikopour ,
- Liuyang Yang ,
- Kathiravetpillai Sivanesan ,
- Alexander BACHMUTSKY
Methods, apparatus, systems, and articles of manufacture are disclosed to manage a self-adaptive heterogeneous emergency network. An example apparatus to establish recovery nodes includes failure detection circuitry to determine a node initiated a reset procedure, override circuitry to suppress a native recovery procedure of the node, formation circuitry to initiate a heterogeneous recovery procedure, and trust circuitry to measure a root of trust of the node. Further, the example apparatus instantiates the formation circuitry further to broadcast heterogeneous recovery packets, and activate listener ports for responses to the heterogeneous recovery packets.
Systems and methods for host image transfer
Methods and systems for transferring a host image of a first machine to a second machine, such as during disaster recovery or migration, are disclosed. In one example, a first profile of a first machine of a first type is compared to a second profile of a second machine of a second type different from the first type, to which the host image is to be transferred. The first and second profiles each comprise at least one property of the first type of first machine and the second type of second machine, respectively. At least one property of a host image of the first machine is conformed to at least one corresponding property of the second machine. The conformed host image is provided to the second machine, via a network. The second machine is configured with at least one conformed property of the host image.
Systems and methods for host image transfer
Methods and systems for transferring a host image of a first machine to a second machine, such as during disaster recovery or migration, are disclosed. In one example, a first profile of a first machine of a first type is compared to a second profile of a second machine of a second type different from the first type, to which the host image is to be transferred. The first and second profiles each comprise at least one property of the first type of first machine and the second type of second machine, respectively. At least one property of a host image of the first machine is conformed to at least one corresponding property of the second machine. The conformed host image is provided to the second machine, via a network. The second machine is configured with at least one conformed property of the host image.
Optimized disaster-recovery-as-a-service system
Methods, computer program products, and systems are presented. The methods include, for instance: analyzing a dataset associated with a service provided by the data protection service provider in order to determine a policy for when and how to replicate the respective components of the dataset corresponding to the service from a source site to a target site, such that the target site may perform the service with a minimum cost.
Control device for vehicle-mounted apparatus
A control device for a vehicle-mounted apparatus, the control device includes: a second CPU state judging section provided to the first CPU, and configured to judge a state of the second CPU based on a state of the inter-CPU communication and a voltage value of the electric power supplied from the first electric power supply section, or the second reset signal; and a first CPU state judging section provided to the second CPU, and configured to judge a state of the first CPU based on the state of the inter-CPU communication and a voltage value of the electric power supplied from the second electric power supply section, or the first reset signal.
DETECTION OF AND PROTECTION FROM MALWARE AND STEGANOGRAPHY
A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
AUTOMATICALLY PREDICTING FAIL-OVER OF MESSAGE-ORIENTED MIDDLEWARE SYSTEMS
Methods, apparatus, and processor-readable storage media for automatically predicting fail-over of message-oriented middleware systems are provided herein. An example computer-implemented method includes obtaining one or more message-oriented middleware parameter values for at least a portion of multiple message-oriented middleware systems; detecting one or more fail-over-related anomalies associated with at least one of the multiple message-oriented middleware systems by processing at least a portion of the one or more message-oriented middleware parameter values using one or more machine learning techniques; and automatically migrating, based at least in part on the one or more detected fail-over-related anomalies, at least a portion of data associated with the at least one message-oriented middleware system associated with the one or more detected fail-over-related anomalies to at least one of the other of the multiple message-oriented middleware systems.
CLUSTER SYSTEM AND RESTORATION METHOD
A cluster system including a plurality of nodes, a plurality of clusters included in each node and a management module managing the cluster system and an arithmetic module, which are included in each of the clusters, wherein, among all the management modules included in the cluster system, one management module is set representative management module, in the individual clusters, one is set as a master management module, and another is set as a standby management module. Each of the management modules includes a failure monitoring unit and a failover control unit. When a failure in the representative management module is detected by any of the failure monitoring units, any of the management modules included in the non-representative management modules, is set as a new representative management module. A recovery unit restores the failure monitoring unit and the failover control unit in the management module in which a failure is detected.