Patent classifications
G06F11/3086
Method and system for implementing a log parser in a log analytics system
Disclosed is a system, method, and computer program product for implementing a log analytics method and system that can configure, collect, and analyze log records in an efficient manner. An improved approach has been described to automatically generate a log parser by analysis of the line content of a log. In addition, an efficient approach has been described to extract key-value content from the log content.
AUTOMATED ALERT AUGMENTATION FOR DEPLOYMENTS OF SOFTWARE-DEFINED STORAGE
Methods, apparatus, and processor-readable storage media for automated alert augmentation for deployments of software-defined storage are provided herein. An example computer-implemented method includes obtaining an alert from at least one software-defined storage device; determining one or more items of additional information pertaining to one or more of the alert and the at least one software-defined storage device; augmenting the alert based at least in part on the one or more determined items of additional information; generating a modified version of the augmented alert by incorporating, into the augmented alert, dependency information pertaining to the at least one software-defined storage device and one or more additional software-defined storage devices; and performing one or more automated actions based at least in part on the modified version of the augmented alert.
Optimization of application level parallelism
A system including a user interface, a memory, and a processor configured to perform operations stored in the memory is disclosed. The operations may include receiving an application specification including an application algorithm, and extracting from the application algorithm a first and a second node. The first node may include a first component of the application algorithm, and the second node may include a second component of the application algorithm that may be different from the first component. The operations may include analyzing execution dependency of the first node on the second node. The analyzing execution dependency may include analyzing computational requirements, bandwidth requirements, and input trigger requirements of the first node and the second node based on parallelism of available resources. The operations may include determining and simulating a plurality of application execution paths on a computational platform for generating a report including an analysis of the application algorithm.
METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR EXPORTING LOG
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product that involve exporting a log. The method includes acquiring a first set of attributes indicating a target asset among assets protected by a data protection product, a second set of attributes indicating target tasks executed on the target asset, and a third set of attributes indicating a computing resource running the data protection product. The method further includes determining an export time consumed to export a log of the target asset based on the first set of attributes, the second set of attributes, and the third set of attributes. With the embodiments of the present disclosure, the time required for exporting a log can be accurately estimated while the log is exported.
System and method of block chain based protection for customized data integration processes
A method of block chain based data protection may comprise receiving a user block chain instruction to record a address-identified memory location at which a dataset field value containing sensitive personal information is stored pursuant to a customized data integration process modeled via a graphical user interface, creating a block chain associated with the dataset field value, receiving an identification of the address-identified memory location from a customized data integration process remote execution location, and creating a first block storing the identification of the address-identified memory location within the block chain. The method may further comprise receiving a user deletion instruction to delete the dataset field value from the address-identified memory location, automatically generating a runtime engine and machine executable deletion code instructions for deletion of the dataset field value from the address-identified memory location, and transmitting the runtime engine and the machine executable deletion code instructions for execution at the remote execution location.
Fast change impact analysis tool for large-scale software systems
A method may include obtaining original source code including entities. The entities each correspond to a location in the original source code. The method may further include during an offline phase and by a computer processor, generating, from the original source code, (i) a dependency graph including nodes corresponding to the entities and (ii) a location index that maps each location in the original source code to one of the nodes, and during an online phase following the offline phase and using the dependency graph and the location index: identifying modified locations in the original source code by comparing modified source code to the original source code, obtaining, for each of the modified locations and by searching the location index, matching nodes, determining, for each of the matching nodes, impacted nodes reachable from the matching node, and identifying, using the location index, impacted entities corresponding to the impacted nodes.
Dynamically changing input data streams processed by data stream language programs
An instrumentation analysis system processes data streams by executing instructions specified using a data stream language program. The data stream language allows users to specify a search condition using a find block for identifying the set of data streams processed by the data stream language program. The set of identified data streams may change dynamically. The data stream language allows users to group data streams into sets of data streams based on distinct values of one or more metadata attributes associated with the input data streams. The data stream language allows users to specify a threshold block for determining whether data values of input data streams are outside boundaries specified using low/high thresholds. The elements of the set of data streams input to the threshold block can dynamically change. The low/high threshold values can be specified as data streams and can dynamically change.
Method and system for implementing a log parser in a log analytics system
Disclosed is a system, method, and computer program product for implementing a log analytics method and system that can configure, collect, and analyze log records in an efficient manner. An improved approach has been described to automatically generate a log parser by analysis of the line content of a log. In addition, an efficient approach has been described to extract key-value content from the log content.
WEARABLE SENSOR SYSTEM CONFIGURED FOR ALERTING FIRST RESPONDERS AND LOCAL CAREGIVERS
An apparatus comprises a processing device configured to receive health data characterizing outbreak of a disease and physiological monitoring data from wearable devices associated with users and to calculate user-specific risks of at least one of contracting and spreading the disease based on analysis of the physiological monitoring data and the health data characterizing the outbreak of the disease. The processing device is also configured to generate notifications for delivery to the users based on the user-specific risks, the notifications comprising information related to outbreak of the disease and measures for treating and mitigating spread of the disease. The processing device is further configured to modify at least a given one of the notifications to be delivered to the given user based at least in part on identifying that the given user is associated with at least one of the first responder network and the local caregiver network.
SYSTEM FOR GENERATING ELECTRONIC ALERTS THROUGH PREDICTIVE OPTIMIZATION ANALYSIS OF RESOURCE CONVERSIONS
A system generates electronic alerts through predictive analysis of resource conversions. The system may continuously monitor executed resource transfers to generate historical resource transfer data. Based on the historical resource transfer data, the system may generate a predicted outcome of executing transfers of resources in a first format compared to transfers of resources in a second format. The predicted outcome may then be implemented by the system to select a resource format for transfers occurring in the future and/or at specified intervals.