G06F11/302

GEOGRAPHIC DEPLOYMENT OF APPLICATIONS TO EDGE COMPUTING NODES

An example system for geographic deployment of applications to edge computing nodes includes: a memory storing an application; a receive engine to receive, from edge computing nodes, indications of requests for the application as received at the edge computing nodes from edge clients, the indications being indicative of geographic demand for the application; a demand engine to determine a geographic area where demand for the application exceeds a threshold demand; and an application deployment engine to deploy the application to the edge computing nodes within the geographic area where the demand for the application exceeds the threshold demand.

Intelligent services for application dependency discovery, reporting, and management tool

Techniques for monitoring operating statuses of an application and its dependencies are provided. A monitoring application may collect and report the operating status of the monitored application and each dependency. Through use of existing monitoring interfaces, the monitoring application can collect operating status without requiring modification of the underlying monitored application or dependencies. The monitoring application may determine a problem service that is a root cause of an unhealthy state of the monitored application. Dependency analyzer and discovery crawler techniques may automatically configure and update the monitoring application. Machine learning techniques may be used to determine patterns of performance based on system state information associated with performance events and provide health reports relative to a baseline status of the monitored application. Also provided are techniques for testing a response of the monitored application through modifications to API calls. Such tests may be used to train the machine learning model.

Collaborative real-time solution efficacy

In an approach to determining the effectiveness of a proposed solution, one or more computer processors monitor real-time communications. The one or more computer processors identify or more topics associated with the monitored real-time communications. The one or more computer processors feed the identified one or more topics and associated real-time communications into a solution efficacy model. The one or more computer processors generate based on one or more calculations by the solution efficacy model, an efficacy rating for the identified real-time communications. The one or more computer processors generate a prioritization of the identified real-time communications based on the generated efficacy rating.

DISTRIBUTED EVENT PLATFORM FOR PROCESSING AND PUBLISHING EVENT TRANSACTIONS

The present invention is directed to a system and a method for ensuring high availability and guarantee delivery of event streams to target consumer applications. The distributed event streaming platform of the present invention is provided with an event streaming layer comprising a plurality of independent and non-replicating event streaming clusters that are configured to process events received from a producer module. A monitoring module is provided to monitor the propagation and delivery of each propagated event based on event notifications received from an event producer module and a plurality of the consumer modules.

Diffing a subject replayable execution trace against a comparison replayable execution trace
11698847 · 2023-07-11 · ·

Diffing a subject replayable trace against a comparison replayable trace includes identifying a first plurality of functions within a first sequence of instructions recorded in the subject trace, and identifying a second plurality of functions a second sequence of instructions recorded in the comparison trace. A first plurality of groups of the first plurality of functions, and a second plurality of groups of the second plurality of functions are identified. The first and second pluralities of groups are compared, including determining, based on an identity of each group, and on function(s) corresponding to the group, if each first group in the first plurality of groups is at least one of: equal to a second group in the second plurality of groups, a replacement of a second group in the second plurality of groups, deleted from the second plurality of groups, or inserted into the second plurality of groups.

Systems and method for flexible access of a regulated system

A method to provide flexible access to an internal data of an regulated system, the method comprising receiving, by a data access component of the regulated system, a loadable configuration file defining a set of triggering events and a set of memory, determining the occurrence of a single triggering event, accessing at least a subset of memory that contain the internal data of the avionics system to retrieve data associated with the one or more memory of the set of memory, and outputting the retrieved data to a receiving component.

System and method for scaling resources of a secondary network for disaster recovery

A system and method for scaling resources of a secondary network for disaster recovery uses a disaster recovery notification from a primary resource manager of a primary network to a secondary resource manager of the secondary network to generate a scale-up recommendation for additional resources to the secondary network. The additional resources are based on latest resource demands of workloads on the primary network included in the disaster recovery notification. A scale-up operation for the additional resources is then executed based on the scale-up recommendation from the secondary resource manager to operate the secondary network with the additional resources to run the workloads on the secondary network.

Application tuning based on performance characteristics
11698797 · 2023-07-11 · ·

According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to receive information regarding a performance characteristic of an application during predetermined time periods. The processor may calculate a rate of change in the performance characteristic over the predetermined time periods. Based on a determination that the performance characteristic of the application has changed over the predetermined time periods, the processor may tune values of a set of parameters for the application based on the calculated rate of change in the performance characteristic.

Identifying root causes of software defects

Root cause identification of a software defect includes identifying, in program code of a software feature, hedge code of the software feature based on errors induced from temporarily substituting program code of the software feature with substitute program code and obtaining an error graph for the hedge code, obtaining error logs of an application that incorporates the software feature, the error logs indicating errors with the software feature of the application, automatically generating an application error graph reflective of the errors with the software feature of the application, mapping the application error graph to the error graph for the hedge code, and based on the mapping aligning one of more errors reflected in the application error graph to error(s) reflected in the error graph for the hedge code, identifying the hedge code as inducing a root error identified in the application error graph.

APPLICATION LIFECYCLE MANAGEMENT BASED ON REAL-TIME RESOURCE USAGE
20230010567 · 2023-01-12 ·

Application lifecycle management based on real-time resource usage. A first plurality of resource values that quantify real-time computing resources used by a first instance of an application is determined at a first point in time. Based on the first plurality of resource values, one or more utilization values are stored in a profile that corresponds to the application. Subsequent to storing the one or more utilization values in the profile, it is determined that a second instance of the application is to be initiated. The profile is accessed, and the second instance of the application is caused to be initiated on a first computing device utilizing the one or more utilization values identified in the profile.