G06F11/0718

Fallback command in a modular control system
11539642 · 2022-12-27 · ·

A device may include a memory storing instructions and a processor configured to execute the instructions to receive an instruction from an administration device; identify a link selector in the instruction that corresponds to a resource attribute of a first resource that specifies how a second resource is to be controlled by the first resource; query a database of contracts between resources to determine that the second resource is available to be controlled by the first resource, based on resource contracts associated with the second resource. The processor may be further configured to generate a resource contract between the first resource and the second resource that indicates the second resource is controlled by the first resource and enable the first resource to communicate with the second resource in accordance with the generated resource contract.

SYSTEM THAT AUTOMATICALLY RESPONDS TO EVENT ALARMS OR FAILURES IN IT MANAGEMENT IN REAL TIME AND ITS OPERATION METHOD
20230032264 · 2023-02-02 ·

A system according to an embodiment of the present disclosure automatically responds to event alarms or failures in IT management in real-time and its operation method. The system provides a management object system accumulating responses IT managers made in case of issues including the event alarms, and the failures, wherein data is used as a learning data that suggests response measures for the event alarms or the failures through a status collector, a controller, and a linker, wherein future event alarms or failures, the learning data suggests the responding measures for corresponding phenomenon to the IT managers through a response measure suggester, and wherein responses are automatically made with a responder, where the responder is an artificial intelligence function.

Supporting file system clones in any ordered key-value store using inode back pointers
11263252 · 2022-03-01 · ·

Embodiments described herein are related to cloning a volume in a file system. In some embodiments, for each index node representing a file or directory in the volume, the index node is updated to include a back pointer to each file or directory which points to the index node in the volume. In some embodiments, a copy-on-write operation is performed in order to generate a clone of the volume's root node. In certain embodiments, upon determining that a file or directory of the clone has been modified, a new index node is generated representing the file or directory by copying an index node representing a corresponding file or directory of the volume. In some embodiments, each file or directory which should point to the new index node in the clone is identified based on one or more back pointers and updated to point to the new index node.

METHODS, MEDIA, AND SYSTEMS FOR DETECTING ANOMALOUS PROGRAM EXECUTIONS

Methods, media, and systems for detecting anomalous program executions are provided. In some embodiments, methods for detecting anomalous program executions are provided, comprising: executing at least a part of a program in an emulator; comparing a function call made in the emulator to a model of function calls for the at least a part of the program; and identifying the function call as anomalous based on the comparison. In some embodiments, methods for detecting anomalous program executions are provided, comprising: modifying a program to include indicators of program-level function calls being made during execution of the program; comparing at least one of the indicators of program-level function calls made in the emulator to a model of function calls for the at least a part of the program; and identifying a function call corresponding to the at least one of the indicators as anomalous based on the comparison.

ALIGNED PURPOSE DISASSOCIATION PROTOCOL FOR MULTIPLE APPLICATIONS
20230176894 · 2023-06-08 ·

The present disclosure involves systems, software, and computer implemented methods for integrated data privacy services. An example method includes receiving a request to initiate an aligned purpose disassociation protocol for a purpose for an object instance. A determination is made as to whether a timestamp is stored for the purpose and the object instance that indicates an earliest time that the purpose can be disassociated from the object instance. The request is accepted in response to determining that no timestamp is stored for the purpose and the object instance that is greater than the current time. A status request is sent to applications that requests a status response that indicates whether an application can disassociate the purpose from the object instance. Status responses are received from at least some of the applications. A disassociation decision for the purpose and the object instance is determined based on the received status responses.

Storing data using a dual path storage approach

A method begins by a processing module of a dispersed storage network (DSN) receiving a data object for storage in DSN memory and determining dispersed storage error encoding parameters for encoding the data object to produce a plurality of sets of encoded data slices. The method continues with the processing module determining to use a dual storage path approach for storing the plurality of sets of encoded data slices in first memory type of the DSN memory and in second memory type of the DSN memory. The method continues with the processing module dispersed storage error encoding the data object to produce the plurality of sets of encoded data slices and outputting the plurality of sets of encoded data slices to the first and second memory types of the DSN memory in accordance with the dispersed storage error encoding parameters.

IN-MEMORY DATA ANALYTIC SYSTEM THAT PROVIDES AN INTEGRATED TRACKING MECHANISM FOR EXPLICIT MEMORY RESOURCES

Techniques and a system are provided for managing resources used by user-provided programs. The system includes an application programming interface (API) that allows user-provided programs to access memory resources managed by functions provided by the API. The system stores memory-usage records made during memory allocations. Memory-usage records may be used to identify memory resources, analyze memory usage, and provide other features.

Analysis of program code
09760469 · 2017-09-12 · ·

This disclosure relates to the analysis of a program based on source code where the source code comprises a call to a function associated with a function implementation. A processor determines, based on a summary that over-approximates the function, an assignment of an input variable and an output variable of the function call to reach a predefined state. The processor then determines, based on the implementation of the function whether the assignment of the input variable results in the assignment of the output variable. If it does not, the processor determines a narrowed summary for the function such that the narrowed summary over-approximates the function and excludes the assignment of the input variable and the output variable. Finally, the processor stores the narrowed summary on a datastore. Inlining of function code and unfolding of loops is avoided and parallel processing of multiple functions is possible.

DISTINGUISHED NEST-BASED ACCESS CONTROL

Techniques for determining and displaying error messages including a cause of an error generated because two types are not members of the same nest are disclosed. The system detects, at runtime, an instruction in a first type that attempts to access a private member of a second type. The system evaluates one or more nestmate criteria to determine whether the first type and the second type are within a same nest. A nest host corresponding to the nest specifies each nest member of the nest, and each nest member specifies an association with the nest. Responsive to determining that a particular nestmate criterion is not met, the system determines that the first type and the second type are not within the same nest and records or displays data identifying the particular nestmate criterion that has not been met, and throws an access error.

System that automatically responds to event alarms or failures in it management in real time and its operation method

A system according to an embodiment of the present disclosure automatically responds to event alarms or failures in IT management in real-time and its operation method. The system provides a management object system accumulating responses IT managers made in case of issues including the event alarms, and the failures, wherein data is used as a learning data that suggests response measures for the event alarms or the failures through a status collector, a controller, and a linker, wherein future event alarms or failures, the learning data suggests the responding measures for corresponding phenomenon to the IT managers through a response measure suggester, and wherein responses are automatically made with a responder, where the responder is an artificial intelligence function.