Patent classifications
G06F11/1438
BACKUP NOTIFICATIONS IN A MEDICAL DEVICE SYSTEM
Techniques disclosed herein relate generally to notification generation in a medical device system. In some embodiments, the techniques involve generating a first notification via a medical application executing on a first device, determining that the first notification was not acknowledged within a predetermined time frame, and causing generation of a second notification at a medical device carried by a user to notify the user that the first notification has not been acknowledged.
DISTRIBUTED ZERO TRUST NETWORK ACCESS
In order to use zero trust network resources distributed across multiple gateways, an agent is deployed on an endpoint of an enterprise network. The agent maps requests for specific applications to corresponding gateways. The agent may also multiplex or otherwise aggregate communications among different network applications and gateways in order to provide seamless, transparent access to the distributed resources at a single endpoint, and/or within a single interface.
SYSTEMS AND METHODS FOR AUGMENTED NOTIFICATIONS IN REMOTE MANAGEMENT OF AN IHS (INFORMATION HANDLING SYSTEM)
Systems and methods are provided for supporting remote management of an IHS (Information Handling System). A first remote management command is received at an IHS. Managed hardware components of the IHS are identified that are configured by the first remote management command. While the first remote management command is pending, a mapping is maintained of the command and the managed hardware components configured by the command. A second remote management command is received that is related to a component of the IHS. Based on the maintained mapping, a determination is made whether the component of the second remote management command is configured by the pending first management command. When the component of the second remote management command is configured by the pending first management command, a notification of the pending first management command is appended to a response to the second management command.
System and device for data recovery for ephemeral storage
In various embodiments, a method for page cache management is described. The method can include: identifying a storage device fault associated with a fault-resilient storage device; determining that a first region associated with the fault-resilient storage device comprises an inaccessible space and that a second region associated with the fault-resilient storage device comprises an accessible space; identifying a read command at the second storage device for the data and determine, based on the read command, first data requested by a read operation from a local memory of the second storage device; determining, based on the read command, second data requested by the read operation from the second region; retrieving the second data from the second region; and scheduling a transmission of the second data from the fault-resilient storage device to the second storage device.
Service information processing method, apparatus, device and computer storage medium
The application discloses a service information processing method, apparatus, device, and computer storage medium, relating to the technical field of cloud computing. The specific implementation scheme is: sending polling information to a target process of a service running in a container according to a set time interval, wherein the target process is one of a plurality of processes running in the container; receiving reply information returned by the target process in response to the polling information; and obtaining the survival status of the target process according to the reply information.
Remote factory reset of an electronic device
During operation, an electronic device receives a packet or a frame associated with a second electronic device, where the packet or the frame includes information specifying a factory reset command. For example, the second electronic device may be a dynamic host configuration protocol (DHCP) server or may perform functions of a DHCP server. Moreover, the packet or the frame may include an acknowledgment (ACK) in a discover, offer, request and acknowledgment (DORA) procedure, and the information may be included in an option 43 subfield or an option 52 subfield in the packet or the frame. In response to receiving the factory reset command, the electronic device performs a factory reset. Note that the factory reset may restore firmware in the electronic device to a factory-fresh version and a configuration of the electronic device to a factory-fresh state, may erase memory in the electronic device.
Extending expiration of user sessions with authentication refresh
A gateway performs silent authentication refreshes with an identity management platform in order to extend the expiration of a cookie provided to an endpoint that accesses network applications through the gateway.
System and method for hybrid kernel and user-space checkpointing using a character device
A system, method, and computer readable medium for hybrid kernel-mode and user-mode checkpointing of multi-process applications. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Data processing pipeline error recovery
Techniques are disclosed for executing a data processing pipeline. The techniques may include receiving a job at a data pipeline queue, setting up one or more distributed processing environments, and allocating the job to one of the distributed processing environments. The techniques may further include receiving the allocated job at a job queue within the distributed processing environment, increasing a priority level of the job, and executing the job within the distributed processing environment. The techniques can further include providing a retry pipeline at the data processing pipeline, and re-executing the job at a stage following a failure of at least one of its components. The techniques may decrement the retry budget as the job is re-executed.
RESTART TOLERANCE IN SYSTEM MONITORING
When a restart event is detected within a technology landscape, restart-impacted performance metrics and non-restart-impacted performance metrics may be identified. The non-restart-impacted performance metrics may continue to be included within a performance characterization of the technology landscape. The restart-impacted performance metrics may be monitored, while being excluded from the performance characterization. The restart-impacted performance metric of the restart-impacted performance metrics may be transitioned to a non-restart-impacted performance metric, based on a monitored value of the restart-impacted performance metric following the restart event.