Patent classifications
G06F11/324
SOFTWARE GENERATING DEVICE
A plurality of apparatuses mounted on cars are monitored and controlled by control devices mounted on the cars. A display device capable of displaying apparatus information of the apparatuses is mounted on a driver's cab. A display screen of the display device is configured by arranging a plurality of display components by which apparatus information of each of the apparatuses can be displayed. A software generating device determines arrangement positions of the display components arranged on the display screen, automatically generates layout design data of the display screen, and automatically generates software for generating the display screen on the basis of the layout design data. The arrangement positions of the display components respectively representing the apparatuses when a number of apparatuses of the same type are monitored and controlled by one and the same control device are determined according to arrangement rule information that is exceptional rules.
Adaptive thresholding of data streamed to a data processing pipeline
Systems and methods are described for performing adaptive thresholding on key performance indicator (KPI) values using an online machine learning algorithm as the KPI values or the data from which the KPI values are derived is being ingested. For example, the system can identify outliers in a moving window of KPI values. To implement the adaptive thresholding, the system may identify seasonality and/or trend components in historical KPI values. When a new KPI value is obtained, the system may remove the identified seasonality and/or trend components from the KPI value, and determine whether the modified KPI value is an outlier using sketches or quantiles. The system can then repeat this process for each subsequently received KPI value.
OPERATING STATUS DISPLAY SYSTEM
An operating status display system includes: a configuration information storage storing information indicating a relationship between systems provided on cloud computing systems, business applications operating on the cloud computing systems to realize the systems, virtual servers, one server being used for the business applications, physical servers configuring the virtual servers, and facilities used for the physical servers; an operating information storage storing operating information indicating respective operating statuses of the business applications, the virtual servers, the physical servers, and the facilities; and an operating status display performing switching among system operating statuses indicating operating statuses of some of the systems, cloud computing system operating statuses indicating operating statuses of some of the cloud computing systems, and facility operating statuses indicating operating statuses of some of the facilities according to a user operation and displaying the switched operating statuses, based on the configuration information and the operating information.
SECURE APPROACH FOR PROVIDING COMBINED ENVIRONMENT FOR OWNERS/OPERATORS AND MULTIPLE THIRD PARTIES TO COOPERATIVELY ENGINEER, OPERATE, AND MAINTAIN AN INDUSTRIAL PROCESS CONTROL AND AUTOMATION SYSTEM
A method includes creating, in a secure platform, multiple securely-partitioned system sandboxes under control of at least one user associated with an industrial process control and automation system. Different system sandboxes are associated with different third parties who are not owners or operators of the industrial process control and automation system. The method also includes receiving content from the third parties in the system sandboxes. The method further includes receiving from the at least one user a selective activation of at least some of the content in the system sandboxes in order to place the at least some of the content into use by the industrial process control and automation system. The content could include equipment configurations for equipment associated with the industrial process control and automation system, and the equipment configurations could include control strategies and visualizations for the equipment.
STEAM BREAKTHROUGH DETECTION AND PREVENTION FOR STEAM ASSISTED GRAVITY DRAINAGE WELLS
According to examples, steam breakthrough detection and prevention for a steam assisted gravity drainage (SAGD) well may include accessing real-time data associated with the SAGD well. Parameter values associated with an operation of the SAGD well may be determined based on the real-time data associated with the SAGD well. A potential of occurrence of steam breakthrough may be determined based on an analysis of selected parameter values from the parameter values associated with the operation of the SAGD well. A procedure to prevent the occurrence of the steam breakthrough may be determined based on an application of hypothetical parameter values associated with the operation of the SAGD well to an engineering analysis model associated with the SAGD well. Further, the operation of the SAGD well may be controlled based on the procedure to prevent the occurrence of the steam breakthrough.
Apparatuses, methods and systems for determining a virtual machine state
APPARATUSES, METHODS AND SYSTEMS FOR DETERMINING A VIRTUAL MACHINE STATE (“CRV”) (transforms register retrieval requests, via CRV components, into boot success messages and screenshot capture command invocation outputs. A method comprises determining when to capture a screenshot of a virtual machine's display output by observing the values of a virtual CPU's registers, or the entropy of the virtual CPU's register values, obtained from a hypervisor in communication with the virtual machine's virtual CPU. The method further comprises determining when the virtual machine is at a boot success state and capturing a screenshot of the virtual machine display output.
Enterprise service bus business activity monitoring system and related methods
An enterprise service bus (ESB) business activity monitoring system and related methods. Specific implementations include a message box server, an itinerary server, a business activity monitoring (BAM) server, a message box database, an itinerary database, a BAM database, a web server and a caching server all operatively coupled together. A developer computer and user computer may be coupled with the web server through a telecommunication channel. The first user computer may include a first computer interface and a second computer interface. The first computer interface may be configured to display a real-time status of the selected itinerary process using the web server, the caching server, the BAM server, and the message box server. The data resubmit button may be configured to resubmit the selected itinerary process for processing by the message box server beginning at the error step.
System and method for generating a factory layout for optimizing media content production
A system and method are provided for generating a factory layout to dynamically optimize a media content production in a real-time environment. The system includes a media production optimizer with a widget controller that provides widgets that represent work packages as micro-services that perform functions of the media content production, respectively. A user interface controller receive inputs from a user interface to dynamically update the factory layout for the media content production. The media production optimizer then recompiles underlying code to update a model of the factory layout in response to the inputs from the operator of the system, and also migrates the updated factory layout to a cloud platform that includes a plurality of media production components including the plurality of micro-services for deployment thereon.
METHODS FOR PRESENTING PROGRAM EXECUTION IN A GRAPHICAL FASHION
Methods for analyzing data inside a computer program. As the program executes, a display of internal file contents is provided in real-time. Additionally, graphics and document text are provided to provide a better understanding of the program.
SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR ANALYZING INTERCEPTED TELEMETRY EVENTS TO GENERATE VULNERABILITY REPORTS
Systems, methods, and computer-readable media for intercepting telemetry events obtained during operation of an application and analyzing the telemetry events are provided. The telemetry events are intercepted at the library level by interposing on application calls to a native library. The telemetry events are collected and transmitted to a platform that analyzes the collected events and presents information based on the analysis.