G06F11/328

File system hierarchy mirroring across cloud data stores

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications. For instance, POSIX interfaces and semantics may be layered on cloud-based storage, while providing access to data in a manner consistent with file-based access with data organization in name hierarchies. Various embodiments also may provide for memory mapping of data so that memory map changes are reflected in persistent storage while ensuring consistency between memory map changes and writes. For example, by transforming a ZFS file system disk-based storage into ZFS cloud-based storage, the ZFS file system gains the elastic nature of cloud storage.

Systems and methods for application operational monitoring

A method for application operational monitoring may include an operational monitoring computer program: (1) ingesting a plurality of service level indicator (SLI) metrics for an application, each SLI metric identifying a number of successful observations and a number of total observations; (2) calculating a SLI score for each SLI metric based on the number of successful observations and the number of total observations for the SLI metric; (3) weighting the SLI score for each SLI metric; (4) combining the weighted SLI scores into an application SLI score; (5) calculating a calculated error budget based on the application SLI score; (6) determining that the calculated error budget exceeds an error budget for the application; (7) generating a notification in response to the calculated error budget breaching the error budget; and (8) causing implementation of a restriction on the application, wherein the restriction prevents enhancements to the application.

Analyzing movement of data collectors/gateways associated with retail displays
11188947 · 2021-11-30 · ·

Systems and methods for using wireless beacons in point of purchase (“POP”) displays to facilitate the delivery of consumer oriented content to mobile devices is disclosed. Wireless beacons may be used to broadcast wireless signals from POP displays, where the wireless signals include data packets with unique identifiers for the wireless beacons. The wireless signals may be received by mobile devices. A remote server may communicate with the mobile device and provide the mobile device with up-to-date content associated with the POP displays. Wireless data collection devices (such as network gateways) may be used to receive data packets from the wireless beacons provide the data packets to the remote server. Accelerometers may be used on the wireless data collection devices to assess movement of the devices. Movement data for the devices may be used to determine reprogramming of the devices after the devices are moved.

Monitoring an artificial intelligence (AI) based process

An Artificial Intelligence (AI)-based automated process is monitored via a process monitoring system that identifies components used in the execution of the sub-processes of the automated process. Various metrics are selected for collection prior to or during the execution of the AI-based automated process. The values of the metrics are collected as step outputs corresponding to the sub-processes. A final output generated upon the execution of the automated process is also collected. The step outputs can be used to determine the reason why the automated process produced a certain final output.

UNIFICATION OF DISPARATE CLOUD RESOURCES USING MACHINE LEARNING
20210365348 · 2021-11-25 ·

A device launches a respective instance on each respective cloud service provider (CSP) of a plurality of CSPs. The device receives, from each respective instance, performance benchmark data for each CSP shape of the respective CSP on which the respective instance is launched. The device inputs the performance benchmark data from each respective instance into a model and receives, as output from the model, a determination of, for each CSP shape, group of a plurality of groups to which the CSP shape belongs. The device ranks each group based on a parameter, and provides for display to a user a recommended CSP shape based on the ranking.

Automatic creation of graph time layer of model of computer network objects and relationships
11227079 · 2022-01-18 · ·

A method and system create a model of a set of relationships between a set of parent computer network objects and a set of corresponding child computer network objects, over a period of time, and output a user interface graphing the model in a single view to illustrate the set of relationships over the period of time. The parent computer network objects include virtual machines and the child computer network objects include hosts. The user interface includes a search option to provide for a search of problems with the child computer network objects over the period of time.

Local data acquisition for retail displays with wireless beacons
11227311 · 2022-01-18 · ·

Systems and methods for using wireless beacons in point of purchase (“POP”) displays to facilitate the delivery of consumer oriented content to mobile devices is disclosed. Wireless beacons may be used to broadcast wireless signals from POP displays, where the wireless signals include data packets with unique identifiers for the wireless beacons. The wireless signals may be received by mobile devices. A remote server may communicate with the mobile device and provide the mobile device with up-to-date content associated with the POP displays. A wireless data collection device may be used to receive and collect data from the wireless beacons. The collected data may be used to assess one or more properties of the POP displays.

METHOD FOR COMPUTING DEVICE MAINTENANCE, APPARATUS, STORAGE MEDIUM AND PROGRAM PRODUCT
20210357233 · 2021-11-18 ·

A method for computing device maintenance, an apparatus, a storage medium and a program product. The method includes: monitoring an operating status of a computing device; and sending a notification message to a maintenance device if the computing device operates abnormally, where the notification message is used to notify that the computing device operates abnormally, and is used to notify to restart the computing device. The cost of human resources can be reduced, and stability and safety of operation of the computing device is improved to some extent.

SYSTEMS AND METHODS FOR APPLICATION OPERATIONAL MONITORING

A method for application operational monitoring may include an operational monitoring computer program: (1) ingesting a plurality of service level indicator (SLI) metrics for an application, each SLI metric identifying a number of successful observations and a number of total observations; (2) calculating a SLI score for each SLI metric based on the number of successful observations and the number of total observations for the SLI metric; (3) weighting the SLI score for each SLI metric; (4) combining the weighted SLI scores into an application SLI score; (5) calculating a calculated error budget based on the application SLI score; (6) determining that the calculated error budget exceeds an error budget for the application; (7) generating a notification in response to the calculated error budget breaching the error budget; and (8) causing implementation of a restriction on the application, wherein the restriction prevents enhancements to the application.

Managing data from internet of things devices in a vehicle

A method and system for communicating with IoT devices connected to a vehicle to gather information related to device operation or performance is disclosed. The system makes a copy of at least a portion of the device's non-volatile memory and/or receives IoT device data (e.g., sensor data and/or log files etc.) from an IoT device that recently failed. The system determines which log files and/or sensor data, for example, the IoT device created before and/or after a failure. After gathering this information, the system stores the information, sends it to a storage destination for further analysis and diagnostics to troubleshoot the failure and send a fix or software update to the IoT device. The information can also be placed into secondary storage to comply with regulatory, insurance, or legal purposes.